Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2011-2605 (GCVE-0-2011-2605)
Vulnerability from cvelistv5 – Published: 2011-06-30 16:00 – Updated: 2024-08-06 23:08- n/a
| URL | Tags |
|---|---|
| https://bugzilla.mozilla.org/show_bug.cgi?id=643051 | x_refsource_CONFIRM |
| https://oval.cisecurity.org/repository/search/def… | vdb-entrysignaturex_refsource_OVAL |
| http://www.redhat.com/support/errata/RHSA-2011-08… | vendor-advisoryx_refsource_REDHAT |
| http://www.redhat.com/support/errata/RHSA-2011-08… | vendor-advisoryx_refsource_REDHAT |
| http://www.mozilla.org/security/announce/2011/mfs… | x_refsource_MISC |
| http://www.redhat.com/support/errata/RHSA-2011-08… | vendor-advisoryx_refsource_REDHAT |
| http://www.redhat.com/support/errata/RHSA-2011-08… | vendor-advisoryx_refsource_REDHAT |
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T23:08:23.460Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=643051"
},
{
"name": "oval:org.mitre.oval:def:14401",
"tags": [
"vdb-entry",
"signature",
"x_refsource_OVAL",
"x_transferred"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14401"
},
{
"name": "RHSA-2011:0887",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "http://www.redhat.com/support/errata/RHSA-2011-0887.html"
},
{
"name": "RHSA-2011:0885",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "http://www.redhat.com/support/errata/RHSA-2011-0885.html"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://www.mozilla.org/security/announce/2011/mfsa2011-19.html"
},
{
"name": "RHSA-2011:0888",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "http://www.redhat.com/support/errata/RHSA-2011-0888.html"
},
{
"name": "RHSA-2011:0886",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "http://www.redhat.com/support/errata/RHSA-2011-0886.html"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2011-06-21T00:00:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "CRLF injection vulnerability in the nsCookieService::SetCookieStringInternal function in netwerk/cookie/nsCookieService.cpp in Mozilla Firefox before 3.6.18 and 4.x through 4.0.1, and Thunderbird before 3.1.11, allows remote attackers to bypass intended access restrictions via a string containing a \\n (newline) character, which is not properly handled in a JavaScript \"document.cookie =\" expression, a different vulnerability than CVE-2011-2374."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-09-18T12:57:01.000Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=643051"
},
{
"name": "oval:org.mitre.oval:def:14401",
"tags": [
"vdb-entry",
"signature",
"x_refsource_OVAL"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14401"
},
{
"name": "RHSA-2011:0887",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "http://www.redhat.com/support/errata/RHSA-2011-0887.html"
},
{
"name": "RHSA-2011:0885",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "http://www.redhat.com/support/errata/RHSA-2011-0885.html"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://www.mozilla.org/security/announce/2011/mfsa2011-19.html"
},
{
"name": "RHSA-2011:0888",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "http://www.redhat.com/support/errata/RHSA-2011-0888.html"
},
{
"name": "RHSA-2011:0886",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "http://www.redhat.com/support/errata/RHSA-2011-0886.html"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2011-2605",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "CRLF injection vulnerability in the nsCookieService::SetCookieStringInternal function in netwerk/cookie/nsCookieService.cpp in Mozilla Firefox before 3.6.18 and 4.x through 4.0.1, and Thunderbird before 3.1.11, allows remote attackers to bypass intended access restrictions via a string containing a \\n (newline) character, which is not properly handled in a JavaScript \"document.cookie =\" expression, a different vulnerability than CVE-2011-2374."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=643051",
"refsource": "CONFIRM",
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=643051"
},
{
"name": "oval:org.mitre.oval:def:14401",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14401"
},
{
"name": "RHSA-2011:0887",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2011-0887.html"
},
{
"name": "RHSA-2011:0885",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2011-0885.html"
},
{
"name": "http://www.mozilla.org/security/announce/2011/mfsa2011-19.html",
"refsource": "MISC",
"url": "http://www.mozilla.org/security/announce/2011/mfsa2011-19.html"
},
{
"name": "RHSA-2011:0888",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2011-0888.html"
},
{
"name": "RHSA-2011:0886",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2011-0886.html"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2011-2605",
"datePublished": "2011-06-30T16:00:00.000Z",
"dateReserved": "2011-06-30T00:00:00.000Z",
"dateUpdated": "2024-08-06T23:08:23.460Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"epss": {
"cve": "CVE-2011-2605",
"date": "2026-05-19",
"epss": "0.00346",
"percentile": "0.57255"
},
"fkie_nvd": {
"configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"3.6.17\", \"matchCriteriaId\": \"9477355B-F98C-42FF-A2A6-C596DF2CE690\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:firefox:1.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5A545A77-2198-4685-A87F-E0F2DAECECF6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:firefox:1.0:preview_release:*:*:*:*:*:*\", \"matchCriteriaId\": \"438AACF8-006F-4522-853F-30DBBABD8C15\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:firefox:1.0.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"778FAE0C-A5CF-4B67-93A9-1A803E3E699F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:firefox:1.0.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E7447185-7509-449D-8907-F30A42CF7EB5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:firefox:1.0.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0EDBAC37-9D08-44D1-B279-BC6ACF126CAF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:firefox:1.0.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3FFF89FA-2020-43CC-BACD-D66117B3DD26\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:firefox:1.0.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"834BB391-5EB5-43A8-980A-D305EDAE6FA7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:firefox:1.0.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9A38AD88-BAA6-4FBE-885B-69E951BD1EFE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:firefox:1.0.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B500EE6C-99DB-49A3-A1F1-AFFD7FE28068\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:firefox:1.0.8:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4F2938F2-A801-45E5-8E06-BE03DE03C8A7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:firefox:1.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"ABB88E86-6E83-4A59-9266-8B98AA91774D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:firefox:1.5:beta1:*:*:*:*:*:*\", \"matchCriteriaId\": \"E19ED1CA-DEBD-4786-BA7B-C122C7D2E5B7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:firefox:1.5:beta2:*:*:*:*:*:*\", \"matchCriteriaId\": \"66BE50FE-EA21-4633-A181-CD35196DF06E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:firefox:1.5.0.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7D6BF5B1-86D1-47FE-9D9C-735718F94874\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:firefox:1.5.0.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"84D15CE0-69DF-4EFD-801E-96A4D6AABEDB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:firefox:1.5.0.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CEE203DE-6C0E-4FDE-9C3A-0E73430F17DA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:firefox:1.5.0.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F2F38886-C25A-4C6B-93E7-36461405BA99\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:firefox:1.5.0.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C65D2670-F37F-48CB-804A-D35BB1C27D9F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:firefox:1.5.0.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DE8E5194-7B34-4802-BDA6-6A86EB5EDE05\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:firefox:1.5.0.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FABA5F56-99F7-4F8F-9CC1-5B0B2EB72922\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:firefox:1.5.0.8:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2917BD67-CE81-4B94-B241-D4A9DDA60319\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:firefox:1.5.0.9:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A524A94E-F19B-42B9-AA8E-171751C339AA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:firefox:1.5.0.10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F71436CF-F756-44E0-8E69-6951F6B3E54A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:firefox:1.5.0.11:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"582EE839-B83F-4908-9780-D0C92DC44FD0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:firefox:1.5.0.12:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"824369CF-00A0-434E-94BC-71CA1317012C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:firefox:1.5.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BCB35099-B04E-4796-A25D-953329FE62F3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:firefox:1.5.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5DBEBCFD-80D6-466A-BAEF-C75E65A3B12E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:firefox:1.5.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C30ACBCA-4FA1-46DE-8F15-4830BC27E160\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:firefox:1.5.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9453EF65-7C69-449E-BF7C-4FECFB56713E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:firefox:1.5.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4AA75825-21CF-475B-8040-126A13FA2216\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:firefox:1.5.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CA97C80E-17FA-4866-86CE-29886145ED80\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:firefox:1.5.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7DE24BED-202E-416D-B5F2-8207D97B9939\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:firefox:1.5.8:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"04198E04-CE1D-4A5A-A20C-D1E135B45F94\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:firefox:2.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3487FA64-BE04-42CA-861E-3DAC097D7D32\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:firefox:2.0.0.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F3D956DC-C73B-439F-8D79-8239207CC76F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:firefox:2.0.0.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"57E2C7E7-56C0-466C-BB08-5EB43922C4F9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:firefox:2.0.0.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"462E135A-5616-46CC-A9C0-5A7A0526ACC6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:firefox:2.0.0.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6121F9C1-F4DF-4AAB-9E51-AC1592AA5639\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:firefox:2.0.0.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"58D44634-A0B5-4F05-8983-B08D392EC742\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:firefox:2.0.0.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EB3AC3D3-FDD7-489F-BDCF-BDB55DF33A8B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:firefox:2.0.0.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4105171B-9C90-4ABF-B220-A35E7BA9EE40\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:firefox:2.0.0.8:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"20985549-DB24-4B69-9D40-208A47AE658E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:firefox:2.0.0.9:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"43A13026-416F-4308-8A1B-E989BD769E12\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:firefox:2.0.0.10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"612B015E-9F96-4CE6-83E4-23848FD609E5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:firefox:2.0.0.11:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1E391619-0967-43E1-8CBC-4D54F72A85C2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:firefox:2.0.0.12:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0544D626-E269-4677-9B05-7DAB23BD103B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:firefox:2.0.0.13:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C95F7B2C-80FC-4DF2-9680-F74634DCE3E6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:firefox:2.0.0.14:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"863C140E-DC15-4A88-AB8A-8AEF9F4B8164\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:firefox:2.0.0.15:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"38CD049A-5333-4FF7-AD34-6B74E19BADCB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:firefox:2.0.0.16:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0066576D-D66A-4B59-B5C3-471EEBEE8B9A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:firefox:2.0.0.17:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"60ED6DAA-9194-4829-BC1A-00F04BE7930A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:firefox:2.0.0.18:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"13BEB9A6-EFD5-4793-9603-84DB84F1CF7D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:firefox:2.0.0.19:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"461163C6-4CA8-4BA9-95A1-136E612CBA6B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:firefox:2.0.0.20:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"275E9D96-1290-44AB-BF9B-E9E4A803F593\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:firefox:3.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"412DF091-7604-4110-87A0-3488116A97E5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:firefox:3.0.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"11E07FED-ABDB-4B0A-AB2E-4CBF1EAC4301\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:firefox:3.0.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9A6558F1-9E0D-4107-909A-8EF4BC8A9C2F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:firefox:3.0.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"63DF3D65-C992-44CF-89B4-893526C6242E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:firefox:3.0.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A9024117-2E8B-4240-9E21-CC501F3879B5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:firefox:3.0.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FBC3CAD3-2F54-4E32-A0C9-0D826C45AC23\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:firefox:3.0.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"52624B41-AB34-40AD-8709-D9646B618AB0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:firefox:3.0.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"917E9856-9556-4FD6-A834-858F8837A6B4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:firefox:3.0.8:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"98BBD74D-930C-4D80-A91B-0D61347BAA63\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:firefox:3.0.9:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FAF2E696-883D-4DE5-8B79-D8E5D9470253\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:firefox:3.0.10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"94E04FD9-38E8-462D-82C2-729F7F7F0465\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:firefox:3.0.11:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5888517E-3C57-4A0A-9895-EA4BCB0A0ED5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:firefox:3.0.12:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0BB21291-B9F3-445E-A9E9-EA1822083DD3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:firefox:3.0.13:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D595F649-ECBE-45E0-8AAD-BCBC65A654B9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:firefox:3.0.14:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4FE6E920-9A4C-431B-89EA-683A22F15ACD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:firefox:3.0.15:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"18B6CC9F-6295-4598-B28B-0CA19D1D9F45\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:firefox:3.0.16:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C9F0434D-C84F-49FD-9F44-66D3ACD7B601\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:firefox:3.0.17:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F6AAB416-E865-4EEE-8FCB-A91253BEB52B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:firefox:3.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"76CD3BDF-A079-4EF3-ABDE-43CBDD08DB1F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:firefox:3.5.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"031E8624-5161-43AF-AF19-6BAB5A94FDD8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:firefox:3.5.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"54186D4A-C6F0-44AD-94FB-73B4346ABB6B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:firefox:3.5.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"47E50AD9-BA35-4817-BD4D-5D678FC5A3C5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:firefox:3.5.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DD09DE40-8C9B-41EA-B372-9E4E4830E8F4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:firefox:3.5.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F223FB83-0EDB-4429-94B9-1AEEF314B73F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:firefox:3.5.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BC6B977F-292F-4981-95A0-6065A3C487D5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:firefox:3.5.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"342226B9-2C0C-416C-81FE-19C49F03AA88\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:firefox:3.5.8:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2A6A28E0-F67A-4275-B0D9-A02822E9EF7E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:firefox:3.5.9:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"ECAB4696-76F3-458C-B33B-D7F8690C60A0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:firefox:3.5.10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BBB444FD-15F3-4447-9EA8-1669779A5749\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:firefox:3.5.11:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F92E2EF3-A612-476F-9D31-1EEC240C7EA7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:firefox:3.5.12:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0F175D30-2416-4172-BF11-DA78D252D608\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:firefox:3.5.13:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5DD3F168-3EF4-492E-BBAA-EACB1357C709\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:firefox:3.5.14:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4B46BA97-2860-45E4-9FD3-F418A202E4F0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:firefox:3.5.15:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B1C23289-38C3-4C62-8B27-249EAECC297E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:firefox:3.5.16:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"96B0C0CB-6B81-45F0-B71F-A09164501414\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:firefox:3.5.17:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"869D2763-D953-4532-9353-DC9045A7EF2A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:firefox:3.5.18:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"80082DA0-7E48-4F5F-A005-915151226C2E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:firefox:3.5.19:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"51925FD3-D730-4938-BE35-C5FDF57F8DD2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:firefox:3.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F3782354-7EB7-49D2-B240-1871F6CB84C7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:firefox:3.6.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"30D47263-03AD-4060-91E3-90F997B3D174\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:firefox:3.6.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"AFD775DF-277E-4D5B-B980-B8E6E782467D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:firefox:3.6.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C8587BFD-417D-42BE-A5F8-22FDC68FA9E6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:firefox:3.6.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D7364FAB-EEE9-4064-A8AD-6547239F9AB3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:firefox:3.6.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4C50485F-BC7B-4B70-A47B-1712E2DBAC5A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:firefox:3.6.8:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"51EE386B-0833-484E-A2AB-86B4470D4D45\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:firefox:3.6.9:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C3EF1B4D-6556-4B3C-BDD0-6348A4D4A91D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:firefox:3.6.10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"68C5C7CF-005B-42FC-B950-90303F0CC115\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:firefox:3.6.11:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0B2FA2CF-7FE4-43B1-96A0-C14666EDBD7B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:firefox:3.6.12:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"30290F6D-55CA-47EB-8F41-7BBB745C7A34\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:firefox:3.6.13:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F61F0607-14B0-49AD-B7E6-C4D75401C270\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:firefox:3.6.14:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7FED863D-2898-4148-A9FB-73BFF9DE4396\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:firefox:3.6.15:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"779C1245-A6F9-41F5-B8D4-FAE506A23FD3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:firefox:3.6.16:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9E7CFEE9-70D4-465F-9FB9-397E6B200FA3\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"3.1.10\", \"matchCriteriaId\": \"EDA95FA2-3563-4D8A-A96C-2514720B8CBD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:thunderbird:0.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0618BD26-0EF5-4774-9131-B5ABD4CD302A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:thunderbird:0.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0D604DAE-DF63-413C-9F49-FFC8E84699F8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:thunderbird:0.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"11DE6185-09F4-48E3-9742-F9D8030B5774\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:thunderbird:0.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B2E70864-E077-4CD6-A0E8-BC2C4C298A6A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:thunderbird:0.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"61E565E5-286D-4A68-B085-5659DFE59A9C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:thunderbird:0.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8E2A68B4-9101-4AC5-9E82-EEB5A5405541\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:thunderbird:0.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EDA6C390-9BA7-4355-8C0A-CD68FF6AC236\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:thunderbird:0.7.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0C75B125-E5BB-49A0-B12D-6CF40D8A5DB7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:thunderbird:0.7.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"70DDB53E-7A12-4A08-8999-DB68E6DF901E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:thunderbird:0.7.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6514EDE8-7C78-4C72-A313-E0915D89E4EF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:thunderbird:0.8:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5263F879-9B90-4582-B677-F133DEBE5259\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:thunderbird:0.9:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C256B73C-9ABC-43D4-8C57-09161BC9F923\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:thunderbird:1.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"055D1044-9FC5-45AA-8407-649E96C5AFE3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:thunderbird:1.0.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7C1C87A5-C14D-4A23-B865-3BB1FCDC8470\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:thunderbird:1.0.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5C4DB0BB-BFD7-4E7A-B3EF-9C5422602216\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:thunderbird:1.0.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F0D56153-E20A-46D8-859E-A51E5C03D674\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:thunderbird:1.0.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2C51A6F4-F88F-4BF2-BF71-5DC48559C085\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:thunderbird:1.0.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FFC390CB-774C-47BE-95C3-059943A9E645\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:thunderbird:1.0.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B71DE7AC-553B-4524-8B33-5605518449EB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:thunderbird:1.0.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"72B02389-0DCD-45BC-A09F-CB6B75940616\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:thunderbird:1.0.8:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"41AE4644-2D23-43EA-ABDA-7BE60EFD1EFF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:thunderbird:1.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4FB87608-0DF8-4729-95C5-CFA386AB3AC2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:thunderbird:1.5:beta2:*:*:*:*:*:*\", \"matchCriteriaId\": \"1A406214-29E5-4E13-B2E1-1CF72F1E60BC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:thunderbird:1.5.0.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E6C169DA-26BC-42EE-817B-2F0685069495\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:thunderbird:1.5.0.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9C99BAF7-B48E-4402-B2BF-EB07235E402E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:thunderbird:1.5.0.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C3F0C73F-291F-4A92-87B8-2269B5C1516D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:thunderbird:1.5.0.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A0ADE8D7-B3C3-4490-9CD5-0263BBA75D28\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:thunderbird:1.5.0.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C86FD617-E4FE-4F85-AAA4-4F968A9DEC9F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:thunderbird:1.5.0.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"938B1260-74A7-4CFF-8086-415DCC284430\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:thunderbird:1.5.0.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E28672BA-E3C2-40C3-80E1-95B7CDD089E2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:thunderbird:1.5.0.8:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9308147C-0A23-48BC-BFA9-A49B9D73014E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:thunderbird:1.5.0.9:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E6654EC3-BED6-4D6D-9B7F-DF4CC8E464BB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:thunderbird:1.5.0.10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5CAD8DCC-DBB4-40EE-927C-7B0969700077\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:thunderbird:1.5.0.11:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"77F9CE47-E3AA-49D7-AEC9-447951AC31E5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:thunderbird:1.5.0.12:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"581615BB-C781-42CA-836E-0E0EAB8C4504\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:thunderbird:1.5.0.13:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"257F43FA-D22C-4BF0-A02E-261A54142BCB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:thunderbird:1.5.0.14:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0C8D63F5-78D5-4F7B-B15A-2C15FC405E27\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:thunderbird:1.5.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"84BC6D68-4ED4-43CF-A2EB-47BD15D11AE5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:thunderbird:1.5.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3D291234-D64A-4E8A-A7CD-08BB980E1CD6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:thunderbird:1.7.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BB1FC6D1-8D93-4D87-9D73-7C6C0F8D45C7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:thunderbird:1.7.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0A3C27EC-5794-49C1-96E0-997E700B13DB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:thunderbird:2.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"97BDCEEC-25FE-4763-AC63-BA6B4F25E0C1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:thunderbird:2.0.0.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CFC60781-766B-4B9C-B68D-45D51C5E5D20\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:thunderbird:2.0.0.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"745C2CBA-4824-441B-A6BC-E80959C2E035\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:thunderbird:2.0.0.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8C6A7D00-A203-4891-96CE-20C91FCBF048\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:thunderbird:2.0.0.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0A8CB480-0595-4BC1-998E-3638E85DB367\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:thunderbird:2.0.0.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"AC7EAB8D-CA40-4C29-99DF-24FF1753BCF9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:thunderbird:2.0.0.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5C9218A9-DA27-436A-AC93-F465FC14ECF3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:thunderbird:2.0.0.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E66503D7-72CB-42A5-8C85-D9579EF2C0A5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:thunderbird:2.0.0.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5CD7D204-3EBA-4D9E-B95A-86524B4C03D6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:thunderbird:2.0.0.8:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1FBBF526-7A28-436B-9B01-EADE913602B6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:thunderbird:2.0.0.9:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B373B409-0939-4707-99F1-95B121BFF7FC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:thunderbird:2.0.0.12:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E80CA1DE-B920-4E28-BEFC-574148D19A0D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:thunderbird:2.0.0.14:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4DCDAA51-4AA3-4EC4-B441-71FB3C3304F7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:thunderbird:2.0.0.16:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D54ACD07-FAB7-4513-A707-18FAF7D565C2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:thunderbird:2.0.0.17:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7260CE1F-501D-44FF-A3FA-2137CA01733B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:thunderbird:2.0.0.18:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"55D3DD1B-64DF-46C8-80A3-99D2E34B665F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:thunderbird:2.0.0.19:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6DF479C3-95A0-414F-B47B-C94BE95713D1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:thunderbird:2.0.0.21:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"AC650D89-CEEC-4A90-B3B9-5F0ADCEFCBB9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:thunderbird:2.0.0.22:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7C8C0115-94B1-4046-A599-E92DCFB936F1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:thunderbird:2.0.0.23:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4033E532-7298-40DF-A582-22B7106035C7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:thunderbird:3.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"AE19E377-CB55-4784-A003-5335D531AAF3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:thunderbird:3.0.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4BF605F6-2A84-4DE5-AB62-282E9C46479B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:thunderbird:3.0.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"08F10B5E-0780-4756-919C-B0C00C673412\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:thunderbird:3.0.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6D930F0F-DCC3-4905-A4B1-288F0CCC6975\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:thunderbird:3.0.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CBA0F9D4-B68A-4018-BC4E-95B87A1A8489\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:thunderbird:3.0.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"61CCB291-B71B-40D3-8493-215003851BDB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:thunderbird:3.0.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"AFD1FE7A-B888-461D-93F3-B71C94B4AA56\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:thunderbird:3.0.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E2727C9C-618D-4AEF-B7BE-8BE5935483F7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:thunderbird:3.0.8:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"95B21CE4-AF78-4D1B-A73E-84E83DB4A2C4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:thunderbird:3.0.9:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"48F3528F-4E43-4D91-957E-49C7DB2A135A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:thunderbird:3.0.10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4E7706B2-D0F0-4E37-B9B5-8DA72413382B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:thunderbird:3.0.11:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2BEE78E5-D163-4764-B3BB-5BE270549F5D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:thunderbird:3.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"58FC2EFB-CE85-4A65-A7B4-A0779F11B5BA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:thunderbird:3.1.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"27B9EA91-A461-42CE-9ED7-3805BD13A4B6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:thunderbird:3.1.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8C48E432-8945-4918-B2A4-AD2E05A51633\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:thunderbird:3.1.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2A95B301-A72B-4F95-A7D6-4B574E9D3BDA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:thunderbird:3.1.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"968C261F-A7D5-4EB6-BCFF-EE40DB5A11D9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:thunderbird:3.1.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EB49CD91-C21E-4494-97CF-DDCFB38B2D92\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:thunderbird:3.1.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5EC37D84-29B9-4F64-B72B-79A8B086A94A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:thunderbird:3.1.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C59D0C61-28FB-4031-BFC3-CB0D82646337\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:thunderbird:3.1.8:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C930EF12-CB52-4C67-944D-5FE5771B556C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:thunderbird:3.1.9:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4131F65C-E08B-4F4F-8783-15092732E6DA\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:firefox:4.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C69962C4-FA56-47F2-82A4-DFF4C19DAF3A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:firefox:4.0:beta1:*:*:*:*:*:*\", \"matchCriteriaId\": \"B7BC1684-3634-4585-B7E6-8C8777E1DA0D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:firefox:4.0:beta10:*:*:*:*:*:*\", \"matchCriteriaId\": \"A490D040-EF74-45C2-89ED-D88ADD222712\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:firefox:4.0:beta11:*:*:*:*:*:*\", \"matchCriteriaId\": \"6CDA17D1-CD93-401E-860C-7C3291FEEB7E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:firefox:4.0:beta12:*:*:*:*:*:*\", \"matchCriteriaId\": \"6F72FDE3-54E0-48E4-9015-1B8A36DB1EC3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:firefox:4.0:beta2:*:*:*:*:*:*\", \"matchCriteriaId\": \"4062C901-3828-415B-A6C3-EDD0E7B20C0E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:firefox:4.0:beta3:*:*:*:*:*:*\", \"matchCriteriaId\": \"CC0D8730-7034-4AD6-9B05-F8BAFB0145EF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:firefox:4.0:beta4:*:*:*:*:*:*\", \"matchCriteriaId\": \"857AFB05-F0C1-4061-9680-9561D68C908F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:firefox:4.0:beta5:*:*:*:*:*:*\", \"matchCriteriaId\": \"EC37EBAF-C979-4ACC-ACA9-BDC2AECCB0D7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:firefox:4.0:beta6:*:*:*:*:*:*\", \"matchCriteriaId\": \"80801CD8-EEAF-4BC4-9085-DCCC6CF73076\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:firefox:4.0:beta7:*:*:*:*:*:*\", \"matchCriteriaId\": \"FAF4C78A-5093-4871-AF69-A8E8FD7E1AAE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:firefox:4.0:beta8:*:*:*:*:*:*\", \"matchCriteriaId\": \"560AD4C7-89D2-4323-BBCC-A89EEB6832CB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:firefox:4.0:beta9:*:*:*:*:*:*\", \"matchCriteriaId\": \"6B389CBC-4F6C-4C17-A87B-A6DD92703A10\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:firefox:4.0.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DDFBA043-91BC-4FB5-A34D-FCE1A9C65A88\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"CRLF injection vulnerability in the nsCookieService::SetCookieStringInternal function in netwerk/cookie/nsCookieService.cpp in Mozilla Firefox before 3.6.18 and 4.x through 4.0.1, and Thunderbird before 3.1.11, allows remote attackers to bypass intended access restrictions via a string containing a \\\\n (newline) character, which is not properly handled in a JavaScript \\\"document.cookie =\\\" expression, a different vulnerability than CVE-2011-2374.\"}, {\"lang\": \"es\", \"value\": \"Inyecci\\u00f3n CRLF en la funci\\u00f3n nsCookieService::SetCookieStringInternal en netwerk/cookie/nsCookieService.cpp de Mozilla Firefox antes de v3.6.18 y v4.x hasta 4.0.1 y Thunderbird antes de v3.1.11, permite a atacantes remotos evitar las restricciones de acceso a trav\\u00e9s de una cadena que contiene un car\\u00e1cter \\\\n (nueva l\\u00ednea) , que no se maneja en una expresion \\\"document.cookie =\\\" de JavaScript es una vulnerabilidad diferente a CVE-2011-2374.\"}]",
"id": "CVE-2011-2605",
"lastModified": "2024-11-21T01:28:34.507",
"metrics": "{\"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:M/Au:N/C:N/I:P/A:N\", \"baseScore\": 4.3, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"MEDIUM\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"PARTIAL\", \"availabilityImpact\": \"NONE\"}, \"baseSeverity\": \"MEDIUM\", \"exploitabilityScore\": 8.6, \"impactScore\": 2.9, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": true}]}",
"published": "2011-06-30T16:55:05.550",
"references": "[{\"url\": \"http://www.mozilla.org/security/announce/2011/mfsa2011-19.html\", \"source\": \"cve@mitre.org\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://www.redhat.com/support/errata/RHSA-2011-0885.html\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.redhat.com/support/errata/RHSA-2011-0886.html\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.redhat.com/support/errata/RHSA-2011-0887.html\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.redhat.com/support/errata/RHSA-2011-0888.html\", \"source\": \"cve@mitre.org\"}, {\"url\": \"https://bugzilla.mozilla.org/show_bug.cgi?id=643051\", \"source\": \"cve@mitre.org\", \"tags\": [\"Patch\"]}, {\"url\": \"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14401\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.mozilla.org/security/announce/2011/mfsa2011-19.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://www.redhat.com/support/errata/RHSA-2011-0885.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.redhat.com/support/errata/RHSA-2011-0886.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.redhat.com/support/errata/RHSA-2011-0887.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.redhat.com/support/errata/RHSA-2011-0888.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://bugzilla.mozilla.org/show_bug.cgi?id=643051\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\"]}, {\"url\": \"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14401\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}]",
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-94\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2011-2605\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2011-06-30T16:55:05.550\",\"lastModified\":\"2026-04-29T01:13:23.040\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"CRLF injection vulnerability in the nsCookieService::SetCookieStringInternal function in netwerk/cookie/nsCookieService.cpp in Mozilla Firefox before 3.6.18 and 4.x through 4.0.1, and Thunderbird before 3.1.11, allows remote attackers to bypass intended access restrictions via a string containing a \\\\n (newline) character, which is not properly handled in a JavaScript \\\"document.cookie =\\\" expression, a different vulnerability than CVE-2011-2374.\"},{\"lang\":\"es\",\"value\":\"Inyecci\u00f3n CRLF en la funci\u00f3n nsCookieService::SetCookieStringInternal en netwerk/cookie/nsCookieService.cpp de Mozilla Firefox antes de v3.6.18 y v4.x hasta 4.0.1 y Thunderbird antes de v3.1.11, permite a atacantes remotos evitar las restricciones de acceso a trav\u00e9s de una cadena que contiene un car\u00e1cter \\\\n (nueva l\u00ednea) , que no se maneja en una expresion \\\"document.cookie =\\\" de JavaScript es una vulnerabilidad diferente a CVE-2011-2374.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:N/I:P/A:N\",\"baseScore\":4.3,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.6,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":true}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-94\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"3.6.17\",\"matchCriteriaId\":\"9477355B-F98C-42FF-A2A6-C596DF2CE690\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5A545A77-2198-4685-A87F-E0F2DAECECF6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:1.0:preview_release:*:*:*:*:*:*\",\"matchCriteriaId\":\"438AACF8-006F-4522-853F-30DBBABD8C15\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:1.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"778FAE0C-A5CF-4B67-93A9-1A803E3E699F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:1.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E7447185-7509-449D-8907-F30A42CF7EB5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:1.0.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0EDBAC37-9D08-44D1-B279-BC6ACF126CAF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:1.0.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3FFF89FA-2020-43CC-BACD-D66117B3DD26\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:1.0.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"834BB391-5EB5-43A8-980A-D305EDAE6FA7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:1.0.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9A38AD88-BAA6-4FBE-885B-69E951BD1EFE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:1.0.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B500EE6C-99DB-49A3-A1F1-AFFD7FE28068\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:1.0.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4F2938F2-A801-45E5-8E06-BE03DE03C8A7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:1.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ABB88E86-6E83-4A59-9266-8B98AA91774D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:1.5:beta1:*:*:*:*:*:*\",\"matchCriteriaId\":\"E19ED1CA-DEBD-4786-BA7B-C122C7D2E5B7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:1.5:beta2:*:*:*:*:*:*\",\"matchCriteriaId\":\"66BE50FE-EA21-4633-A181-CD35196DF06E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:1.5.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7D6BF5B1-86D1-47FE-9D9C-735718F94874\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:1.5.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"84D15CE0-69DF-4EFD-801E-96A4D6AABEDB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:1.5.0.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CEE203DE-6C0E-4FDE-9C3A-0E73430F17DA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:1.5.0.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F2F38886-C25A-4C6B-93E7-36461405BA99\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:1.5.0.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C65D2670-F37F-48CB-804A-D35BB1C27D9F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:1.5.0.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DE8E5194-7B34-4802-BDA6-6A86EB5EDE05\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:1.5.0.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FABA5F56-99F7-4F8F-9CC1-5B0B2EB72922\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:1.5.0.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2917BD67-CE81-4B94-B241-D4A9DDA60319\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:1.5.0.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A524A94E-F19B-42B9-AA8E-171751C339AA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:1.5.0.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F71436CF-F756-44E0-8E69-6951F6B3E54A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:1.5.0.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"582EE839-B83F-4908-9780-D0C92DC44FD0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:1.5.0.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"824369CF-00A0-434E-94BC-71CA1317012C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:1.5.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BCB35099-B04E-4796-A25D-953329FE62F3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:1.5.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5DBEBCFD-80D6-466A-BAEF-C75E65A3B12E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:1.5.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C30ACBCA-4FA1-46DE-8F15-4830BC27E160\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:1.5.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9453EF65-7C69-449E-BF7C-4FECFB56713E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:1.5.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4AA75825-21CF-475B-8040-126A13FA2216\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:1.5.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CA97C80E-17FA-4866-86CE-29886145ED80\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:1.5.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7DE24BED-202E-416D-B5F2-8207D97B9939\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:1.5.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"04198E04-CE1D-4A5A-A20C-D1E135B45F94\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3487FA64-BE04-42CA-861E-3DAC097D7D32\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:2.0.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F3D956DC-C73B-439F-8D79-8239207CC76F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:2.0.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"57E2C7E7-56C0-466C-BB08-5EB43922C4F9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:2.0.0.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"462E135A-5616-46CC-A9C0-5A7A0526ACC6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:2.0.0.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6121F9C1-F4DF-4AAB-9E51-AC1592AA5639\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:2.0.0.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"58D44634-A0B5-4F05-8983-B08D392EC742\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:2.0.0.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EB3AC3D3-FDD7-489F-BDCF-BDB55DF33A8B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:2.0.0.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4105171B-9C90-4ABF-B220-A35E7BA9EE40\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:2.0.0.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"20985549-DB24-4B69-9D40-208A47AE658E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:2.0.0.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"43A13026-416F-4308-8A1B-E989BD769E12\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:2.0.0.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"612B015E-9F96-4CE6-83E4-23848FD609E5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:2.0.0.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1E391619-0967-43E1-8CBC-4D54F72A85C2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:2.0.0.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0544D626-E269-4677-9B05-7DAB23BD103B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:2.0.0.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C95F7B2C-80FC-4DF2-9680-F74634DCE3E6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:2.0.0.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"863C140E-DC15-4A88-AB8A-8AEF9F4B8164\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:2.0.0.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"38CD049A-5333-4FF7-AD34-6B74E19BADCB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:2.0.0.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0066576D-D66A-4B59-B5C3-471EEBEE8B9A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:2.0.0.17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"60ED6DAA-9194-4829-BC1A-00F04BE7930A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:2.0.0.18:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"13BEB9A6-EFD5-4793-9603-84DB84F1CF7D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:2.0.0.19:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"461163C6-4CA8-4BA9-95A1-136E612CBA6B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:2.0.0.20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"275E9D96-1290-44AB-BF9B-E9E4A803F593\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:3.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"412DF091-7604-4110-87A0-3488116A97E5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:3.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"11E07FED-ABDB-4B0A-AB2E-4CBF1EAC4301\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:3.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9A6558F1-9E0D-4107-909A-8EF4BC8A9C2F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:3.0.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"63DF3D65-C992-44CF-89B4-893526C6242E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:3.0.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A9024117-2E8B-4240-9E21-CC501F3879B5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:3.0.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FBC3CAD3-2F54-4E32-A0C9-0D826C45AC23\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:3.0.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"52624B41-AB34-40AD-8709-D9646B618AB0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:3.0.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"917E9856-9556-4FD6-A834-858F8837A6B4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:3.0.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"98BBD74D-930C-4D80-A91B-0D61347BAA63\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:3.0.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FAF2E696-883D-4DE5-8B79-D8E5D9470253\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:3.0.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"94E04FD9-38E8-462D-82C2-729F7F7F0465\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:3.0.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5888517E-3C57-4A0A-9895-EA4BCB0A0ED5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:3.0.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0BB21291-B9F3-445E-A9E9-EA1822083DD3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:3.0.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D595F649-ECBE-45E0-8AAD-BCBC65A654B9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:3.0.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4FE6E920-9A4C-431B-89EA-683A22F15ACD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:3.0.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"18B6CC9F-6295-4598-B28B-0CA19D1D9F45\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:3.0.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C9F0434D-C84F-49FD-9F44-66D3ACD7B601\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:3.0.17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F6AAB416-E865-4EEE-8FCB-A91253BEB52B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:3.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"76CD3BDF-A079-4EF3-ABDE-43CBDD08DB1F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:3.5.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"031E8624-5161-43AF-AF19-6BAB5A94FDD8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:3.5.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"54186D4A-C6F0-44AD-94FB-73B4346ABB6B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:3.5.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"47E50AD9-BA35-4817-BD4D-5D678FC5A3C5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:3.5.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DD09DE40-8C9B-41EA-B372-9E4E4830E8F4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:3.5.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F223FB83-0EDB-4429-94B9-1AEEF314B73F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:3.5.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BC6B977F-292F-4981-95A0-6065A3C487D5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:3.5.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"342226B9-2C0C-416C-81FE-19C49F03AA88\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:3.5.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2A6A28E0-F67A-4275-B0D9-A02822E9EF7E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:3.5.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ECAB4696-76F3-458C-B33B-D7F8690C60A0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:3.5.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BBB444FD-15F3-4447-9EA8-1669779A5749\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:3.5.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F92E2EF3-A612-476F-9D31-1EEC240C7EA7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:3.5.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0F175D30-2416-4172-BF11-DA78D252D608\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:3.5.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5DD3F168-3EF4-492E-BBAA-EACB1357C709\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:3.5.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4B46BA97-2860-45E4-9FD3-F418A202E4F0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:3.5.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B1C23289-38C3-4C62-8B27-249EAECC297E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:3.5.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"96B0C0CB-6B81-45F0-B71F-A09164501414\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:3.5.17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"869D2763-D953-4532-9353-DC9045A7EF2A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:3.5.18:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"80082DA0-7E48-4F5F-A005-915151226C2E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:3.5.19:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"51925FD3-D730-4938-BE35-C5FDF57F8DD2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:3.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F3782354-7EB7-49D2-B240-1871F6CB84C7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:3.6.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"30D47263-03AD-4060-91E3-90F997B3D174\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:3.6.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AFD775DF-277E-4D5B-B980-B8E6E782467D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:3.6.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C8587BFD-417D-42BE-A5F8-22FDC68FA9E6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:3.6.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D7364FAB-EEE9-4064-A8AD-6547239F9AB3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:3.6.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4C50485F-BC7B-4B70-A47B-1712E2DBAC5A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:3.6.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"51EE386B-0833-484E-A2AB-86B4470D4D45\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:3.6.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C3EF1B4D-6556-4B3C-BDD0-6348A4D4A91D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:3.6.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"68C5C7CF-005B-42FC-B950-90303F0CC115\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:3.6.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0B2FA2CF-7FE4-43B1-96A0-C14666EDBD7B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:3.6.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"30290F6D-55CA-47EB-8F41-7BBB745C7A34\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:3.6.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F61F0607-14B0-49AD-B7E6-C4D75401C270\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:3.6.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7FED863D-2898-4148-A9FB-73BFF9DE4396\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:3.6.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"779C1245-A6F9-41F5-B8D4-FAE506A23FD3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:3.6.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9E7CFEE9-70D4-465F-9FB9-397E6B200FA3\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"3.1.10\",\"matchCriteriaId\":\"EDA95FA2-3563-4D8A-A96C-2514720B8CBD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:thunderbird:0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0618BD26-0EF5-4774-9131-B5ABD4CD302A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:thunderbird:0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0D604DAE-DF63-413C-9F49-FFC8E84699F8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:thunderbird:0.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"11DE6185-09F4-48E3-9742-F9D8030B5774\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:thunderbird:0.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B2E70864-E077-4CD6-A0E8-BC2C4C298A6A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:thunderbird:0.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"61E565E5-286D-4A68-B085-5659DFE59A9C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:thunderbird:0.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8E2A68B4-9101-4AC5-9E82-EEB5A5405541\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:thunderbird:0.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EDA6C390-9BA7-4355-8C0A-CD68FF6AC236\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:thunderbird:0.7.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0C75B125-E5BB-49A0-B12D-6CF40D8A5DB7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:thunderbird:0.7.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"70DDB53E-7A12-4A08-8999-DB68E6DF901E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:thunderbird:0.7.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6514EDE8-7C78-4C72-A313-E0915D89E4EF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:thunderbird:0.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5263F879-9B90-4582-B677-F133DEBE5259\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:thunderbird:0.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C256B73C-9ABC-43D4-8C57-09161BC9F923\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:thunderbird:1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"055D1044-9FC5-45AA-8407-649E96C5AFE3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:thunderbird:1.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7C1C87A5-C14D-4A23-B865-3BB1FCDC8470\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:thunderbird:1.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5C4DB0BB-BFD7-4E7A-B3EF-9C5422602216\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:thunderbird:1.0.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F0D56153-E20A-46D8-859E-A51E5C03D674\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:thunderbird:1.0.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2C51A6F4-F88F-4BF2-BF71-5DC48559C085\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:thunderbird:1.0.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FFC390CB-774C-47BE-95C3-059943A9E645\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:thunderbird:1.0.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B71DE7AC-553B-4524-8B33-5605518449EB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:thunderbird:1.0.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"72B02389-0DCD-45BC-A09F-CB6B75940616\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:thunderbird:1.0.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"41AE4644-2D23-43EA-ABDA-7BE60EFD1EFF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:thunderbird:1.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4FB87608-0DF8-4729-95C5-CFA386AB3AC2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:thunderbird:1.5:beta2:*:*:*:*:*:*\",\"matchCriteriaId\":\"1A406214-29E5-4E13-B2E1-1CF72F1E60BC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:thunderbird:1.5.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E6C169DA-26BC-42EE-817B-2F0685069495\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:thunderbird:1.5.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9C99BAF7-B48E-4402-B2BF-EB07235E402E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:thunderbird:1.5.0.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C3F0C73F-291F-4A92-87B8-2269B5C1516D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:thunderbird:1.5.0.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A0ADE8D7-B3C3-4490-9CD5-0263BBA75D28\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:thunderbird:1.5.0.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C86FD617-E4FE-4F85-AAA4-4F968A9DEC9F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:thunderbird:1.5.0.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"938B1260-74A7-4CFF-8086-415DCC284430\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:thunderbird:1.5.0.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E28672BA-E3C2-40C3-80E1-95B7CDD089E2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:thunderbird:1.5.0.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9308147C-0A23-48BC-BFA9-A49B9D73014E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:thunderbird:1.5.0.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E6654EC3-BED6-4D6D-9B7F-DF4CC8E464BB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:thunderbird:1.5.0.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5CAD8DCC-DBB4-40EE-927C-7B0969700077\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:thunderbird:1.5.0.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"77F9CE47-E3AA-49D7-AEC9-447951AC31E5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:thunderbird:1.5.0.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"581615BB-C781-42CA-836E-0E0EAB8C4504\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:thunderbird:1.5.0.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"257F43FA-D22C-4BF0-A02E-261A54142BCB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:thunderbird:1.5.0.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0C8D63F5-78D5-4F7B-B15A-2C15FC405E27\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:thunderbird:1.5.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"84BC6D68-4ED4-43CF-A2EB-47BD15D11AE5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:thunderbird:1.5.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3D291234-D64A-4E8A-A7CD-08BB980E1CD6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:thunderbird:1.7.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BB1FC6D1-8D93-4D87-9D73-7C6C0F8D45C7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:thunderbird:1.7.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0A3C27EC-5794-49C1-96E0-997E700B13DB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:thunderbird:2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"97BDCEEC-25FE-4763-AC63-BA6B4F25E0C1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:thunderbird:2.0.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CFC60781-766B-4B9C-B68D-45D51C5E5D20\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:thunderbird:2.0.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"745C2CBA-4824-441B-A6BC-E80959C2E035\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:thunderbird:2.0.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8C6A7D00-A203-4891-96CE-20C91FCBF048\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:thunderbird:2.0.0.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0A8CB480-0595-4BC1-998E-3638E85DB367\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:thunderbird:2.0.0.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AC7EAB8D-CA40-4C29-99DF-24FF1753BCF9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:thunderbird:2.0.0.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5C9218A9-DA27-436A-AC93-F465FC14ECF3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:thunderbird:2.0.0.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E66503D7-72CB-42A5-8C85-D9579EF2C0A5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:thunderbird:2.0.0.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5CD7D204-3EBA-4D9E-B95A-86524B4C03D6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:thunderbird:2.0.0.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1FBBF526-7A28-436B-9B01-EADE913602B6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:thunderbird:2.0.0.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B373B409-0939-4707-99F1-95B121BFF7FC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:thunderbird:2.0.0.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E80CA1DE-B920-4E28-BEFC-574148D19A0D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:thunderbird:2.0.0.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4DCDAA51-4AA3-4EC4-B441-71FB3C3304F7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:thunderbird:2.0.0.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D54ACD07-FAB7-4513-A707-18FAF7D565C2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:thunderbird:2.0.0.17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7260CE1F-501D-44FF-A3FA-2137CA01733B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:thunderbird:2.0.0.18:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"55D3DD1B-64DF-46C8-80A3-99D2E34B665F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:thunderbird:2.0.0.19:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6DF479C3-95A0-414F-B47B-C94BE95713D1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:thunderbird:2.0.0.21:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AC650D89-CEEC-4A90-B3B9-5F0ADCEFCBB9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:thunderbird:2.0.0.22:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7C8C0115-94B1-4046-A599-E92DCFB936F1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:thunderbird:2.0.0.23:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4033E532-7298-40DF-A582-22B7106035C7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:thunderbird:3.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AE19E377-CB55-4784-A003-5335D531AAF3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:thunderbird:3.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4BF605F6-2A84-4DE5-AB62-282E9C46479B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:thunderbird:3.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"08F10B5E-0780-4756-919C-B0C00C673412\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:thunderbird:3.0.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6D930F0F-DCC3-4905-A4B1-288F0CCC6975\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:thunderbird:3.0.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CBA0F9D4-B68A-4018-BC4E-95B87A1A8489\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:thunderbird:3.0.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"61CCB291-B71B-40D3-8493-215003851BDB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:thunderbird:3.0.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AFD1FE7A-B888-461D-93F3-B71C94B4AA56\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:thunderbird:3.0.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E2727C9C-618D-4AEF-B7BE-8BE5935483F7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:thunderbird:3.0.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"95B21CE4-AF78-4D1B-A73E-84E83DB4A2C4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:thunderbird:3.0.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"48F3528F-4E43-4D91-957E-49C7DB2A135A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:thunderbird:3.0.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4E7706B2-D0F0-4E37-B9B5-8DA72413382B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:thunderbird:3.0.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2BEE78E5-D163-4764-B3BB-5BE270549F5D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:thunderbird:3.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"58FC2EFB-CE85-4A65-A7B4-A0779F11B5BA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:thunderbird:3.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"27B9EA91-A461-42CE-9ED7-3805BD13A4B6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:thunderbird:3.1.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8C48E432-8945-4918-B2A4-AD2E05A51633\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:thunderbird:3.1.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2A95B301-A72B-4F95-A7D6-4B574E9D3BDA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:thunderbird:3.1.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"968C261F-A7D5-4EB6-BCFF-EE40DB5A11D9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:thunderbird:3.1.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EB49CD91-C21E-4494-97CF-DDCFB38B2D92\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:thunderbird:3.1.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5EC37D84-29B9-4F64-B72B-79A8B086A94A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:thunderbird:3.1.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C59D0C61-28FB-4031-BFC3-CB0D82646337\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:thunderbird:3.1.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C930EF12-CB52-4C67-944D-5FE5771B556C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:thunderbird:3.1.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4131F65C-E08B-4F4F-8783-15092732E6DA\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:4.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C69962C4-FA56-47F2-82A4-DFF4C19DAF3A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:4.0:beta1:*:*:*:*:*:*\",\"matchCriteriaId\":\"B7BC1684-3634-4585-B7E6-8C8777E1DA0D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:4.0:beta10:*:*:*:*:*:*\",\"matchCriteriaId\":\"A490D040-EF74-45C2-89ED-D88ADD222712\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:4.0:beta11:*:*:*:*:*:*\",\"matchCriteriaId\":\"6CDA17D1-CD93-401E-860C-7C3291FEEB7E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:4.0:beta12:*:*:*:*:*:*\",\"matchCriteriaId\":\"6F72FDE3-54E0-48E4-9015-1B8A36DB1EC3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:4.0:beta2:*:*:*:*:*:*\",\"matchCriteriaId\":\"4062C901-3828-415B-A6C3-EDD0E7B20C0E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:4.0:beta3:*:*:*:*:*:*\",\"matchCriteriaId\":\"CC0D8730-7034-4AD6-9B05-F8BAFB0145EF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:4.0:beta4:*:*:*:*:*:*\",\"matchCriteriaId\":\"857AFB05-F0C1-4061-9680-9561D68C908F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:4.0:beta5:*:*:*:*:*:*\",\"matchCriteriaId\":\"EC37EBAF-C979-4ACC-ACA9-BDC2AECCB0D7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:4.0:beta6:*:*:*:*:*:*\",\"matchCriteriaId\":\"80801CD8-EEAF-4BC4-9085-DCCC6CF73076\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:4.0:beta7:*:*:*:*:*:*\",\"matchCriteriaId\":\"FAF4C78A-5093-4871-AF69-A8E8FD7E1AAE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:4.0:beta8:*:*:*:*:*:*\",\"matchCriteriaId\":\"560AD4C7-89D2-4323-BBCC-A89EEB6832CB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:4.0:beta9:*:*:*:*:*:*\",\"matchCriteriaId\":\"6B389CBC-4F6C-4C17-A87B-A6DD92703A10\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:4.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DDFBA043-91BC-4FB5-A34D-FCE1A9C65A88\"}]}]}],\"references\":[{\"url\":\"http://www.mozilla.org/security/announce/2011/mfsa2011-19.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2011-0885.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2011-0886.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2011-0887.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2011-0888.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://bugzilla.mozilla.org/show_bug.cgi?id=643051\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\"]},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14401\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.mozilla.org/security/announce/2011/mfsa2011-19.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2011-0885.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2011-0886.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2011-0887.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2011-0888.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://bugzilla.mozilla.org/show_bug.cgi?id=643051\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14401\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}"
}
}
GSD-2011-2605
Vulnerability from gsd - Updated: 2023-12-13 01:19{
"GSD": {
"alias": "CVE-2011-2605",
"description": "CRLF injection vulnerability in the nsCookieService::SetCookieStringInternal function in netwerk/cookie/nsCookieService.cpp in Mozilla Firefox before 3.6.18 and 4.x through 4.0.1, and Thunderbird before 3.1.11, allows remote attackers to bypass intended access restrictions via a string containing a \\n (newline) character, which is not properly handled in a JavaScript \"document.cookie =\" expression, a different vulnerability than CVE-2011-2374.",
"id": "GSD-2011-2605",
"references": [
"https://www.suse.com/security/cve/CVE-2011-2605.html",
"https://access.redhat.com/errata/RHSA-2011:0888",
"https://access.redhat.com/errata/RHSA-2011:0887",
"https://access.redhat.com/errata/RHSA-2011:0886",
"https://access.redhat.com/errata/RHSA-2011:0885",
"https://linux.oracle.com/cve/CVE-2011-2605.html"
]
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2011-2605"
],
"details": "CRLF injection vulnerability in the nsCookieService::SetCookieStringInternal function in netwerk/cookie/nsCookieService.cpp in Mozilla Firefox before 3.6.18 and 4.x through 4.0.1, and Thunderbird before 3.1.11, allows remote attackers to bypass intended access restrictions via a string containing a \\n (newline) character, which is not properly handled in a JavaScript \"document.cookie =\" expression, a different vulnerability than CVE-2011-2374.",
"id": "GSD-2011-2605",
"modified": "2023-12-13T01:19:06.674922Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2011-2605",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "CRLF injection vulnerability in the nsCookieService::SetCookieStringInternal function in netwerk/cookie/nsCookieService.cpp in Mozilla Firefox before 3.6.18 and 4.x through 4.0.1, and Thunderbird before 3.1.11, allows remote attackers to bypass intended access restrictions via a string containing a \\n (newline) character, which is not properly handled in a JavaScript \"document.cookie =\" expression, a different vulnerability than CVE-2011-2374."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=643051",
"refsource": "CONFIRM",
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=643051"
},
{
"name": "oval:org.mitre.oval:def:14401",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14401"
},
{
"name": "RHSA-2011:0887",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2011-0887.html"
},
{
"name": "RHSA-2011:0885",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2011-0885.html"
},
{
"name": "http://www.mozilla.org/security/announce/2011/mfsa2011-19.html",
"refsource": "MISC",
"url": "http://www.mozilla.org/security/announce/2011/mfsa2011-19.html"
},
{
"name": "RHSA-2011:0888",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2011-0888.html"
},
{
"name": "RHSA-2011:0886",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2011-0886.html"
}
]
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:3.5.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:3.5.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:3.5.8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:3.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:3.0.11:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:3.0.10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:3.0.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:3.0.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:2.0.0.9:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:2.0.0.17:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:2.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:2.0.0.18:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:1.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:1.5.0.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:1.5.0.10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:1.5.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:1.5.0.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:1.5:beta2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:1.0.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:1.0.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:3.5.12:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:3.5.13:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:3.6.12:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:3.6.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:3.6.9:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:3.6.13:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:3.5.18:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:3.5.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:3.5.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:3.0.17:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:3.0.16:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:3.0.9:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:3.0.8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:3.0.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:3.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:2.0.0.10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:2.0.0.16:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:2.0.0.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:2.0.0.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:1.5.0.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:1.5.0.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:1.5.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:1.5.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:1.5.8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:1.5.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:1.0.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:1.0.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:1.0.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:3.5.14:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:3.5.15:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:3.6.8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:3.6.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:3.5.19:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:3.6.14:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:3.5.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:3.5.10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:3.5.9:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:3.0.13:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:3.0.12:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:3.0.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:3.0.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:2.0.0.20:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:2.0.0.8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:2.0.0.13:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:2.0.0.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:2.0.0.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:2.0.0.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:1.5.0.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:1.5:beta1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:1.5.0.9:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:1.5.0.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:1.0.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:1.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:1.0:preview_release:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:3.5.11:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:3.6.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:3.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:3.6.11:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:3.6.10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "3.6.17",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:3.5.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:3.5.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:3.0.15:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:3.0.14:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:3.0.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:3.0.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:2.0.0.14:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:2.0.0.12:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:2.0.0.19:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:2.0.0.11:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:2.0.0.15:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:2.0.0.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:2.0.0.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:1.5.0.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:1.5.0.11:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:1.5.0.12:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:1.5.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:1.5.0.8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:1.5.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:1.5.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:1.0.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:1.0.8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:3.5.16:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:3.5.17:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:3.6.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:3.6.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:3.6.15:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:3.6.16:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:2.0.0.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:2.0.0.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:1.5.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:1.5.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:1.0.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:1.0.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:1.0.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:3.0.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:1.5.0.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:3.1.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:1.5.0.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:3.1.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:3.0.10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:2.0.0.16:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:2.0.0.23:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:1.7.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:3.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:2.0.0.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:2.0.0.19:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:2.0.0.12:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:1.0.8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:1.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:1.0.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:3.1.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:1.5.0.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:1.5.0.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:3.0.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:3.1.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:2.0.0.14:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:2.0.0.17:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:1.7.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:1.5.0.13:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:1.5:beta2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:1.0.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:0.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:0.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:2.0.0.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:1.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:0.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:0.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "3.1.10",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:1.5.0.9:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:1.5.0.8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:2.0.0.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:3.0.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:3.0.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:1.0.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:3.0.8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:3.1.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:3.0.11:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:1.5.0.10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:1.5.0.11:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:2.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:2.0.0.21:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:2.0.0.22:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:2.0.0.9:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:0.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:0.7.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:0.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:0.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:3.1.8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:3.1.9:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:3.0.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:2.0.0.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:2.0.0.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:3.0.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:2.0.0.8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:1.0.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:1.5.0.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:3.1.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:3.1.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:1.5.0.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:3.0.9:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:3.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:2.0.0.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:1.5.0.12:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:1.5.0.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:1.5.0.14:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:0.7.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:0.7.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:0.8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:0.9:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:3.0.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:2.0.0.18:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:4.0:beta11:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:4.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:4.0.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:4.0:beta7:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:4.0:beta8:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:4.0:beta5:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:4.0:beta6:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:4.0:beta10:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:4.0:beta12:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:4.0:beta2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:4.0:beta9:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:4.0:beta1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:4.0:beta3:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:4.0:beta4:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2011-2605"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "CRLF injection vulnerability in the nsCookieService::SetCookieStringInternal function in netwerk/cookie/nsCookieService.cpp in Mozilla Firefox before 3.6.18 and 4.x through 4.0.1, and Thunderbird before 3.1.11, allows remote attackers to bypass intended access restrictions via a string containing a \\n (newline) character, which is not properly handled in a JavaScript \"document.cookie =\" expression, a different vulnerability than CVE-2011-2374."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-94"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=643051",
"refsource": "CONFIRM",
"tags": [
"Patch"
],
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=643051"
},
{
"name": "http://www.mozilla.org/security/announce/2011/mfsa2011-19.html",
"refsource": "MISC",
"tags": [
"Vendor Advisory"
],
"url": "http://www.mozilla.org/security/announce/2011/mfsa2011-19.html"
},
{
"name": "RHSA-2011:0886",
"refsource": "REDHAT",
"tags": [],
"url": "http://www.redhat.com/support/errata/RHSA-2011-0886.html"
},
{
"name": "RHSA-2011:0888",
"refsource": "REDHAT",
"tags": [],
"url": "http://www.redhat.com/support/errata/RHSA-2011-0888.html"
},
{
"name": "RHSA-2011:0887",
"refsource": "REDHAT",
"tags": [],
"url": "http://www.redhat.com/support/errata/RHSA-2011-0887.html"
},
{
"name": "RHSA-2011:0885",
"refsource": "REDHAT",
"tags": [],
"url": "http://www.redhat.com/support/errata/RHSA-2011-0885.html"
},
{
"name": "oval:org.mitre.oval:def:14401",
"refsource": "OVAL",
"tags": [],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14401"
}
]
}
},
"impact": {
"baseMetricV2": {
"cvssV2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"userInteractionRequired": true
}
},
"lastModifiedDate": "2017-09-19T01:33Z",
"publishedDate": "2011-06-30T16:55Z"
}
}
}
RHSA-2011:0885
Vulnerability from csaf_redhat - Published: 2011-06-21 22:39 - Updated: 2026-01-13 22:11Use-after-free vulnerability in the nsSVGPathSegList::ReplaceItem function in the implementation of SVG element lists in Mozilla Firefox before 3.6.18, Thunderbird before 3.1.11, and SeaMonkey through 2.0.14 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via vectors involving a user-supplied callback.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS:firefox-0:3.6.18-2.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-0:3.6.18-2.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-0:3.6.18-2.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-0:3.6.18-2.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-0:3.6.18-2.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-0:3.6.18-2.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-0:3.6.18-2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-debuginfo-0:3.6.18-2.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-debuginfo-0:3.6.18-2.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-debuginfo-0:3.6.18-2.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-debuginfo-0:3.6.18-2.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-debuginfo-0:3.6.18-2.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-debuginfo-0:3.6.18-2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-0:3.6.18-2.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-0:3.6.18-2.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-0:3.6.18-2.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-0:3.6.18-2.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-0:3.6.18-2.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-0:3.6.18-2.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-0:3.6.18-2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-debuginfo-0:3.6.18-2.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-debuginfo-0:3.6.18-2.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-debuginfo-0:3.6.18-2.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-debuginfo-0:3.6.18-2.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-debuginfo-0:3.6.18-2.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-debuginfo-0:3.6.18-2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-0:3.6.18-2.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-0:3.6.18-2.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-0:3.6.18-2.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-0:3.6.18-2.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-0:3.6.18-2.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-0:3.6.18-2.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-0:3.6.18-2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-debuginfo-0:3.6.18-2.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-debuginfo-0:3.6.18-2.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-debuginfo-0:3.6.18-2.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-debuginfo-0:3.6.18-2.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-debuginfo-0:3.6.18-2.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-debuginfo-0:3.6.18-2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-0:3.6.18-2.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-0:3.6.18-2.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-0:3.6.18-2.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-0:3.6.18-2.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-0:3.6.18-2.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-0:3.6.18-2.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-0:3.6.18-2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-debuginfo-0:3.6.18-2.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-debuginfo-0:3.6.18-2.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-debuginfo-0:3.6.18-2.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-debuginfo-0:3.6.18-2.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-debuginfo-0:3.6.18-2.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-debuginfo-0:3.6.18-2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-0:3.6.18-1.el6_1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-0:3.6.18-1.el6_1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-0:3.6.18-1.el6_1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-0:3.6.18-1.el6_1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-0:3.6.18-1.el6_1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-0:3.6.18-1.el6_1.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-0:3.6.18-1.el6_1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.x86_64 | — |
Vendor Fix
fix
|
Use-after-free vulnerability in the nsXULCommandDispatcher function in Mozilla Firefox before 3.6.18, Thunderbird before 3.1.11, and SeaMonkey through 2.0.14 allows remote attackers to execute arbitrary code via a crafted XUL document that dequeues the current command updater.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS:firefox-0:3.6.18-2.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-0:3.6.18-2.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-0:3.6.18-2.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-0:3.6.18-2.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-0:3.6.18-2.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-0:3.6.18-2.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-0:3.6.18-2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-debuginfo-0:3.6.18-2.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-debuginfo-0:3.6.18-2.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-debuginfo-0:3.6.18-2.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-debuginfo-0:3.6.18-2.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-debuginfo-0:3.6.18-2.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-debuginfo-0:3.6.18-2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-0:3.6.18-2.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-0:3.6.18-2.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-0:3.6.18-2.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-0:3.6.18-2.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-0:3.6.18-2.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-0:3.6.18-2.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-0:3.6.18-2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-debuginfo-0:3.6.18-2.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-debuginfo-0:3.6.18-2.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-debuginfo-0:3.6.18-2.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-debuginfo-0:3.6.18-2.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-debuginfo-0:3.6.18-2.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-debuginfo-0:3.6.18-2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-0:3.6.18-2.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-0:3.6.18-2.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-0:3.6.18-2.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-0:3.6.18-2.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-0:3.6.18-2.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-0:3.6.18-2.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-0:3.6.18-2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-debuginfo-0:3.6.18-2.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-debuginfo-0:3.6.18-2.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-debuginfo-0:3.6.18-2.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-debuginfo-0:3.6.18-2.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-debuginfo-0:3.6.18-2.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-debuginfo-0:3.6.18-2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-0:3.6.18-2.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-0:3.6.18-2.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-0:3.6.18-2.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-0:3.6.18-2.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-0:3.6.18-2.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-0:3.6.18-2.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-0:3.6.18-2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-debuginfo-0:3.6.18-2.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-debuginfo-0:3.6.18-2.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-debuginfo-0:3.6.18-2.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-debuginfo-0:3.6.18-2.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-debuginfo-0:3.6.18-2.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-debuginfo-0:3.6.18-2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-0:3.6.18-1.el6_1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-0:3.6.18-1.el6_1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-0:3.6.18-1.el6_1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-0:3.6.18-1.el6_1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-0:3.6.18-1.el6_1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-0:3.6.18-1.el6_1.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-0:3.6.18-1.el6_1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.x86_64 | — |
Vendor Fix
fix
|
Mozilla Firefox before 3.6.18, Thunderbird before 3.1.11, and SeaMonkey through 2.0.14 do not distinguish between cookies for two domain names that differ only in a trailing dot, which allows remote web servers to bypass the Same Origin Policy via Set-Cookie headers.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS:firefox-0:3.6.18-2.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-0:3.6.18-2.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-0:3.6.18-2.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-0:3.6.18-2.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-0:3.6.18-2.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-0:3.6.18-2.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-0:3.6.18-2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-debuginfo-0:3.6.18-2.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-debuginfo-0:3.6.18-2.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-debuginfo-0:3.6.18-2.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-debuginfo-0:3.6.18-2.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-debuginfo-0:3.6.18-2.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-debuginfo-0:3.6.18-2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-0:3.6.18-2.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-0:3.6.18-2.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-0:3.6.18-2.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-0:3.6.18-2.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-0:3.6.18-2.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-0:3.6.18-2.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-0:3.6.18-2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-debuginfo-0:3.6.18-2.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-debuginfo-0:3.6.18-2.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-debuginfo-0:3.6.18-2.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-debuginfo-0:3.6.18-2.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-debuginfo-0:3.6.18-2.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-debuginfo-0:3.6.18-2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-0:3.6.18-2.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-0:3.6.18-2.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-0:3.6.18-2.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-0:3.6.18-2.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-0:3.6.18-2.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-0:3.6.18-2.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-0:3.6.18-2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-debuginfo-0:3.6.18-2.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-debuginfo-0:3.6.18-2.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-debuginfo-0:3.6.18-2.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-debuginfo-0:3.6.18-2.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-debuginfo-0:3.6.18-2.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-debuginfo-0:3.6.18-2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-0:3.6.18-2.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-0:3.6.18-2.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-0:3.6.18-2.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-0:3.6.18-2.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-0:3.6.18-2.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-0:3.6.18-2.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-0:3.6.18-2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-debuginfo-0:3.6.18-2.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-debuginfo-0:3.6.18-2.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-debuginfo-0:3.6.18-2.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-debuginfo-0:3.6.18-2.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-debuginfo-0:3.6.18-2.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-debuginfo-0:3.6.18-2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-0:3.6.18-1.el6_1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-0:3.6.18-1.el6_1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-0:3.6.18-1.el6_1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-0:3.6.18-1.el6_1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-0:3.6.18-1.el6_1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-0:3.6.18-1.el6_1.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-0:3.6.18-1.el6_1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.x86_64 | — |
Vendor Fix
fix
|
Use-after-free vulnerability in the nsSVGPointList::AppendElement function in the implementation of SVG element lists in Mozilla Firefox before 3.6.18, Thunderbird before 3.1.11, and SeaMonkey through 2.0.14 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via vectors involving a user-supplied callback.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS:firefox-0:3.6.18-2.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-0:3.6.18-2.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-0:3.6.18-2.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-0:3.6.18-2.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-0:3.6.18-2.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-0:3.6.18-2.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-0:3.6.18-2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-debuginfo-0:3.6.18-2.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-debuginfo-0:3.6.18-2.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-debuginfo-0:3.6.18-2.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-debuginfo-0:3.6.18-2.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-debuginfo-0:3.6.18-2.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-debuginfo-0:3.6.18-2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-0:3.6.18-2.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-0:3.6.18-2.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-0:3.6.18-2.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-0:3.6.18-2.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-0:3.6.18-2.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-0:3.6.18-2.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-0:3.6.18-2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-debuginfo-0:3.6.18-2.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-debuginfo-0:3.6.18-2.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-debuginfo-0:3.6.18-2.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-debuginfo-0:3.6.18-2.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-debuginfo-0:3.6.18-2.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-debuginfo-0:3.6.18-2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-0:3.6.18-2.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-0:3.6.18-2.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-0:3.6.18-2.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-0:3.6.18-2.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-0:3.6.18-2.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-0:3.6.18-2.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-0:3.6.18-2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-debuginfo-0:3.6.18-2.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-debuginfo-0:3.6.18-2.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-debuginfo-0:3.6.18-2.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-debuginfo-0:3.6.18-2.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-debuginfo-0:3.6.18-2.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-debuginfo-0:3.6.18-2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-0:3.6.18-2.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-0:3.6.18-2.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-0:3.6.18-2.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-0:3.6.18-2.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-0:3.6.18-2.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-0:3.6.18-2.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-0:3.6.18-2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-debuginfo-0:3.6.18-2.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-debuginfo-0:3.6.18-2.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-debuginfo-0:3.6.18-2.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-debuginfo-0:3.6.18-2.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-debuginfo-0:3.6.18-2.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-debuginfo-0:3.6.18-2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-0:3.6.18-1.el6_1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-0:3.6.18-1.el6_1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-0:3.6.18-1.el6_1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-0:3.6.18-1.el6_1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-0:3.6.18-1.el6_1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-0:3.6.18-1.el6_1.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-0:3.6.18-1.el6_1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.x86_64 | — |
Vendor Fix
fix
|
Unspecified vulnerability in the browser engine in Mozilla Firefox 3.6.x before 3.6.18 and Thunderbird before 3.1.11 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors, a different vulnerability than CVE-2011-2365.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS:firefox-0:3.6.18-2.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-0:3.6.18-2.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-0:3.6.18-2.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-0:3.6.18-2.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-0:3.6.18-2.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-0:3.6.18-2.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-0:3.6.18-2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-debuginfo-0:3.6.18-2.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-debuginfo-0:3.6.18-2.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-debuginfo-0:3.6.18-2.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-debuginfo-0:3.6.18-2.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-debuginfo-0:3.6.18-2.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-debuginfo-0:3.6.18-2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-0:3.6.18-2.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-0:3.6.18-2.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-0:3.6.18-2.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-0:3.6.18-2.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-0:3.6.18-2.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-0:3.6.18-2.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-0:3.6.18-2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-debuginfo-0:3.6.18-2.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-debuginfo-0:3.6.18-2.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-debuginfo-0:3.6.18-2.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-debuginfo-0:3.6.18-2.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-debuginfo-0:3.6.18-2.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-debuginfo-0:3.6.18-2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-0:3.6.18-2.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-0:3.6.18-2.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-0:3.6.18-2.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-0:3.6.18-2.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-0:3.6.18-2.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-0:3.6.18-2.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-0:3.6.18-2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-debuginfo-0:3.6.18-2.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-debuginfo-0:3.6.18-2.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-debuginfo-0:3.6.18-2.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-debuginfo-0:3.6.18-2.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-debuginfo-0:3.6.18-2.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-debuginfo-0:3.6.18-2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-0:3.6.18-2.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-0:3.6.18-2.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-0:3.6.18-2.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-0:3.6.18-2.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-0:3.6.18-2.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-0:3.6.18-2.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-0:3.6.18-2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-debuginfo-0:3.6.18-2.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-debuginfo-0:3.6.18-2.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-debuginfo-0:3.6.18-2.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-debuginfo-0:3.6.18-2.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-debuginfo-0:3.6.18-2.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-debuginfo-0:3.6.18-2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-0:3.6.18-1.el6_1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-0:3.6.18-1.el6_1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-0:3.6.18-1.el6_1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-0:3.6.18-1.el6_1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-0:3.6.18-1.el6_1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-0:3.6.18-1.el6_1.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-0:3.6.18-1.el6_1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.x86_64 | — |
Vendor Fix
fix
|
Unspecified vulnerability in the browser engine in Mozilla Firefox 3.6.x before 3.6.18 and Thunderbird before 3.1.11 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors, a different vulnerability than CVE-2011-2364.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS:firefox-0:3.6.18-2.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-0:3.6.18-2.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-0:3.6.18-2.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-0:3.6.18-2.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-0:3.6.18-2.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-0:3.6.18-2.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-0:3.6.18-2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-debuginfo-0:3.6.18-2.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-debuginfo-0:3.6.18-2.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-debuginfo-0:3.6.18-2.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-debuginfo-0:3.6.18-2.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-debuginfo-0:3.6.18-2.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-debuginfo-0:3.6.18-2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-0:3.6.18-2.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-0:3.6.18-2.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-0:3.6.18-2.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-0:3.6.18-2.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-0:3.6.18-2.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-0:3.6.18-2.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-0:3.6.18-2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-debuginfo-0:3.6.18-2.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-debuginfo-0:3.6.18-2.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-debuginfo-0:3.6.18-2.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-debuginfo-0:3.6.18-2.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-debuginfo-0:3.6.18-2.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-debuginfo-0:3.6.18-2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-0:3.6.18-2.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-0:3.6.18-2.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-0:3.6.18-2.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-0:3.6.18-2.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-0:3.6.18-2.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-0:3.6.18-2.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-0:3.6.18-2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-debuginfo-0:3.6.18-2.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-debuginfo-0:3.6.18-2.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-debuginfo-0:3.6.18-2.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-debuginfo-0:3.6.18-2.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-debuginfo-0:3.6.18-2.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-debuginfo-0:3.6.18-2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-0:3.6.18-2.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-0:3.6.18-2.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-0:3.6.18-2.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-0:3.6.18-2.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-0:3.6.18-2.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-0:3.6.18-2.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-0:3.6.18-2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-debuginfo-0:3.6.18-2.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-debuginfo-0:3.6.18-2.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-debuginfo-0:3.6.18-2.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-debuginfo-0:3.6.18-2.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-debuginfo-0:3.6.18-2.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-debuginfo-0:3.6.18-2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-0:3.6.18-1.el6_1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-0:3.6.18-1.el6_1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-0:3.6.18-1.el6_1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-0:3.6.18-1.el6_1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-0:3.6.18-1.el6_1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-0:3.6.18-1.el6_1.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-0:3.6.18-1.el6_1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.x86_64 | — |
Vendor Fix
fix
|
Integer overflow in the Array.reduceRight method in Mozilla Firefox before 3.6.18 and 4.x through 4.0.1, Thunderbird before 3.1.11, and SeaMonkey through 2.0.14 allows remote attackers to execute arbitrary code via vectors involving a long JavaScript Array object.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS:firefox-0:3.6.18-2.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-0:3.6.18-2.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-0:3.6.18-2.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-0:3.6.18-2.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-0:3.6.18-2.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-0:3.6.18-2.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-0:3.6.18-2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-debuginfo-0:3.6.18-2.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-debuginfo-0:3.6.18-2.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-debuginfo-0:3.6.18-2.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-debuginfo-0:3.6.18-2.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-debuginfo-0:3.6.18-2.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-debuginfo-0:3.6.18-2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-0:3.6.18-2.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-0:3.6.18-2.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-0:3.6.18-2.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-0:3.6.18-2.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-0:3.6.18-2.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-0:3.6.18-2.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-0:3.6.18-2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-debuginfo-0:3.6.18-2.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-debuginfo-0:3.6.18-2.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-debuginfo-0:3.6.18-2.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-debuginfo-0:3.6.18-2.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-debuginfo-0:3.6.18-2.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-debuginfo-0:3.6.18-2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-0:3.6.18-2.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-0:3.6.18-2.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-0:3.6.18-2.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-0:3.6.18-2.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-0:3.6.18-2.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-0:3.6.18-2.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-0:3.6.18-2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-debuginfo-0:3.6.18-2.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-debuginfo-0:3.6.18-2.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-debuginfo-0:3.6.18-2.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-debuginfo-0:3.6.18-2.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-debuginfo-0:3.6.18-2.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-debuginfo-0:3.6.18-2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-0:3.6.18-2.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-0:3.6.18-2.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-0:3.6.18-2.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-0:3.6.18-2.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-0:3.6.18-2.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-0:3.6.18-2.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-0:3.6.18-2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-debuginfo-0:3.6.18-2.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-debuginfo-0:3.6.18-2.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-debuginfo-0:3.6.18-2.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-debuginfo-0:3.6.18-2.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-debuginfo-0:3.6.18-2.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-debuginfo-0:3.6.18-2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-0:3.6.18-1.el6_1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-0:3.6.18-1.el6_1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-0:3.6.18-1.el6_1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-0:3.6.18-1.el6_1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-0:3.6.18-1.el6_1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-0:3.6.18-1.el6_1.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-0:3.6.18-1.el6_1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.x86_64 | — |
Vendor Fix
fix
|
Use-after-free vulnerability in Mozilla Firefox before 3.6.18 and 4.x through 4.0.1, Thunderbird before 3.1.11, and SeaMonkey through 2.0.14, when JavaScript is disabled, allows remote attackers to execute arbitrary code via a crafted XUL document.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS:firefox-0:3.6.18-2.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-0:3.6.18-2.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-0:3.6.18-2.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-0:3.6.18-2.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-0:3.6.18-2.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-0:3.6.18-2.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-0:3.6.18-2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-debuginfo-0:3.6.18-2.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-debuginfo-0:3.6.18-2.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-debuginfo-0:3.6.18-2.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-debuginfo-0:3.6.18-2.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-debuginfo-0:3.6.18-2.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-debuginfo-0:3.6.18-2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-0:3.6.18-2.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-0:3.6.18-2.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-0:3.6.18-2.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-0:3.6.18-2.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-0:3.6.18-2.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-0:3.6.18-2.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-0:3.6.18-2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-debuginfo-0:3.6.18-2.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-debuginfo-0:3.6.18-2.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-debuginfo-0:3.6.18-2.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-debuginfo-0:3.6.18-2.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-debuginfo-0:3.6.18-2.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-debuginfo-0:3.6.18-2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-0:3.6.18-2.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-0:3.6.18-2.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-0:3.6.18-2.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-0:3.6.18-2.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-0:3.6.18-2.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-0:3.6.18-2.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-0:3.6.18-2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-debuginfo-0:3.6.18-2.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-debuginfo-0:3.6.18-2.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-debuginfo-0:3.6.18-2.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-debuginfo-0:3.6.18-2.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-debuginfo-0:3.6.18-2.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-debuginfo-0:3.6.18-2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-0:3.6.18-2.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-0:3.6.18-2.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-0:3.6.18-2.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-0:3.6.18-2.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-0:3.6.18-2.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-0:3.6.18-2.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-0:3.6.18-2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-debuginfo-0:3.6.18-2.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-debuginfo-0:3.6.18-2.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-debuginfo-0:3.6.18-2.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-debuginfo-0:3.6.18-2.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-debuginfo-0:3.6.18-2.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-debuginfo-0:3.6.18-2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-0:3.6.18-1.el6_1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-0:3.6.18-1.el6_1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-0:3.6.18-1.el6_1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-0:3.6.18-1.el6_1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-0:3.6.18-1.el6_1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-0:3.6.18-1.el6_1.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-0:3.6.18-1.el6_1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.x86_64 | — |
Vendor Fix
fix
|
Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 3.6.18 and 4.x through 4.0.1, and Thunderbird before 3.1.11, allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS:firefox-0:3.6.18-2.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-0:3.6.18-2.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-0:3.6.18-2.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-0:3.6.18-2.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-0:3.6.18-2.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-0:3.6.18-2.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-0:3.6.18-2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-debuginfo-0:3.6.18-2.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-debuginfo-0:3.6.18-2.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-debuginfo-0:3.6.18-2.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-debuginfo-0:3.6.18-2.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-debuginfo-0:3.6.18-2.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-debuginfo-0:3.6.18-2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-0:3.6.18-2.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-0:3.6.18-2.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-0:3.6.18-2.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-0:3.6.18-2.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-0:3.6.18-2.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-0:3.6.18-2.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-0:3.6.18-2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-debuginfo-0:3.6.18-2.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-debuginfo-0:3.6.18-2.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-debuginfo-0:3.6.18-2.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-debuginfo-0:3.6.18-2.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-debuginfo-0:3.6.18-2.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-debuginfo-0:3.6.18-2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-0:3.6.18-2.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-0:3.6.18-2.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-0:3.6.18-2.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-0:3.6.18-2.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-0:3.6.18-2.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-0:3.6.18-2.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-0:3.6.18-2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-debuginfo-0:3.6.18-2.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-debuginfo-0:3.6.18-2.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-debuginfo-0:3.6.18-2.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-debuginfo-0:3.6.18-2.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-debuginfo-0:3.6.18-2.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-debuginfo-0:3.6.18-2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-0:3.6.18-2.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-0:3.6.18-2.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-0:3.6.18-2.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-0:3.6.18-2.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-0:3.6.18-2.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-0:3.6.18-2.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-0:3.6.18-2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-debuginfo-0:3.6.18-2.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-debuginfo-0:3.6.18-2.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-debuginfo-0:3.6.18-2.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-debuginfo-0:3.6.18-2.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-debuginfo-0:3.6.18-2.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-debuginfo-0:3.6.18-2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-0:3.6.18-1.el6_1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-0:3.6.18-1.el6_1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-0:3.6.18-1.el6_1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-0:3.6.18-1.el6_1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-0:3.6.18-1.el6_1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-0:3.6.18-1.el6_1.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-0:3.6.18-1.el6_1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.x86_64 | — |
Vendor Fix
fix
|
Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 5.0 and Thunderbird through 3.1.11 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS:firefox-0:3.6.18-2.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-0:3.6.18-2.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-0:3.6.18-2.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-0:3.6.18-2.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-0:3.6.18-2.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-0:3.6.18-2.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-0:3.6.18-2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-debuginfo-0:3.6.18-2.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-debuginfo-0:3.6.18-2.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-debuginfo-0:3.6.18-2.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-debuginfo-0:3.6.18-2.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-debuginfo-0:3.6.18-2.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-debuginfo-0:3.6.18-2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-0:3.6.18-2.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-0:3.6.18-2.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-0:3.6.18-2.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-0:3.6.18-2.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-0:3.6.18-2.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-0:3.6.18-2.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-0:3.6.18-2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-debuginfo-0:3.6.18-2.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-debuginfo-0:3.6.18-2.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-debuginfo-0:3.6.18-2.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-debuginfo-0:3.6.18-2.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-debuginfo-0:3.6.18-2.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-debuginfo-0:3.6.18-2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-0:3.6.18-2.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-0:3.6.18-2.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-0:3.6.18-2.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-0:3.6.18-2.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-0:3.6.18-2.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-0:3.6.18-2.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-0:3.6.18-2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-debuginfo-0:3.6.18-2.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-debuginfo-0:3.6.18-2.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-debuginfo-0:3.6.18-2.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-debuginfo-0:3.6.18-2.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-debuginfo-0:3.6.18-2.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-debuginfo-0:3.6.18-2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-0:3.6.18-2.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-0:3.6.18-2.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-0:3.6.18-2.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-0:3.6.18-2.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-0:3.6.18-2.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-0:3.6.18-2.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-0:3.6.18-2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-debuginfo-0:3.6.18-2.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-debuginfo-0:3.6.18-2.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-debuginfo-0:3.6.18-2.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-debuginfo-0:3.6.18-2.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-debuginfo-0:3.6.18-2.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-debuginfo-0:3.6.18-2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-0:3.6.18-1.el6_1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-0:3.6.18-1.el6_1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-0:3.6.18-1.el6_1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-0:3.6.18-1.el6_1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-0:3.6.18-1.el6_1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-0:3.6.18-1.el6_1.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-0:3.6.18-1.el6_1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.x86_64 | — |
Vendor Fix
fix
|
Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 3.6.18 and Thunderbird before 3.1.11 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS:firefox-0:3.6.18-2.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-0:3.6.18-2.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-0:3.6.18-2.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-0:3.6.18-2.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-0:3.6.18-2.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-0:3.6.18-2.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-0:3.6.18-2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-debuginfo-0:3.6.18-2.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-debuginfo-0:3.6.18-2.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-debuginfo-0:3.6.18-2.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-debuginfo-0:3.6.18-2.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-debuginfo-0:3.6.18-2.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-debuginfo-0:3.6.18-2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-0:3.6.18-2.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-0:3.6.18-2.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-0:3.6.18-2.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-0:3.6.18-2.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-0:3.6.18-2.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-0:3.6.18-2.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-0:3.6.18-2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-debuginfo-0:3.6.18-2.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-debuginfo-0:3.6.18-2.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-debuginfo-0:3.6.18-2.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-debuginfo-0:3.6.18-2.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-debuginfo-0:3.6.18-2.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-debuginfo-0:3.6.18-2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-0:3.6.18-2.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-0:3.6.18-2.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-0:3.6.18-2.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-0:3.6.18-2.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-0:3.6.18-2.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-0:3.6.18-2.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-0:3.6.18-2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-debuginfo-0:3.6.18-2.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-debuginfo-0:3.6.18-2.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-debuginfo-0:3.6.18-2.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-debuginfo-0:3.6.18-2.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-debuginfo-0:3.6.18-2.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-debuginfo-0:3.6.18-2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-0:3.6.18-2.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-0:3.6.18-2.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-0:3.6.18-2.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-0:3.6.18-2.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-0:3.6.18-2.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-0:3.6.18-2.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-0:3.6.18-2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-debuginfo-0:3.6.18-2.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-debuginfo-0:3.6.18-2.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-debuginfo-0:3.6.18-2.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-debuginfo-0:3.6.18-2.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-debuginfo-0:3.6.18-2.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-debuginfo-0:3.6.18-2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-0:3.6.18-1.el6_1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-0:3.6.18-1.el6_1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-0:3.6.18-1.el6_1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-0:3.6.18-1.el6_1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-0:3.6.18-1.el6_1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-0:3.6.18-1.el6_1.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-0:3.6.18-1.el6_1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.x86_64 | — |
Vendor Fix
fix
|
Mozilla Firefox before 3.6.18 and 4.x through 4.0.1, Thunderbird before 3.1.11, and SeaMonkey through 2.0.14 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via a multipart/x-mixed-replace image.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS:firefox-0:3.6.18-2.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-0:3.6.18-2.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-0:3.6.18-2.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-0:3.6.18-2.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-0:3.6.18-2.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-0:3.6.18-2.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-0:3.6.18-2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-debuginfo-0:3.6.18-2.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-debuginfo-0:3.6.18-2.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-debuginfo-0:3.6.18-2.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-debuginfo-0:3.6.18-2.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-debuginfo-0:3.6.18-2.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-debuginfo-0:3.6.18-2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-0:3.6.18-2.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-0:3.6.18-2.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-0:3.6.18-2.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-0:3.6.18-2.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-0:3.6.18-2.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-0:3.6.18-2.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-0:3.6.18-2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-debuginfo-0:3.6.18-2.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-debuginfo-0:3.6.18-2.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-debuginfo-0:3.6.18-2.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-debuginfo-0:3.6.18-2.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-debuginfo-0:3.6.18-2.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-debuginfo-0:3.6.18-2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-0:3.6.18-2.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-0:3.6.18-2.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-0:3.6.18-2.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-0:3.6.18-2.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-0:3.6.18-2.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-0:3.6.18-2.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-0:3.6.18-2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-debuginfo-0:3.6.18-2.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-debuginfo-0:3.6.18-2.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-debuginfo-0:3.6.18-2.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-debuginfo-0:3.6.18-2.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-debuginfo-0:3.6.18-2.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-debuginfo-0:3.6.18-2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-0:3.6.18-2.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-0:3.6.18-2.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-0:3.6.18-2.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-0:3.6.18-2.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-0:3.6.18-2.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-0:3.6.18-2.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-0:3.6.18-2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-debuginfo-0:3.6.18-2.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-debuginfo-0:3.6.18-2.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-debuginfo-0:3.6.18-2.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-debuginfo-0:3.6.18-2.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-debuginfo-0:3.6.18-2.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-debuginfo-0:3.6.18-2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-0:3.6.18-1.el6_1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-0:3.6.18-1.el6_1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-0:3.6.18-1.el6_1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-0:3.6.18-1.el6_1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-0:3.6.18-1.el6_1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-0:3.6.18-1.el6_1.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-0:3.6.18-1.el6_1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.x86_64 | — |
Vendor Fix
fix
|
CRLF injection vulnerability in the nsCookieService::SetCookieStringInternal function in netwerk/cookie/nsCookieService.cpp in Mozilla Firefox before 3.6.18 and 4.x through 4.0.1, and Thunderbird before 3.1.11, allows remote attackers to bypass intended access restrictions via a string containing a \n (newline) character, which is not properly handled in a JavaScript "document.cookie =" expression, a different vulnerability than CVE-2011-2374.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS:firefox-0:3.6.18-2.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-0:3.6.18-2.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-0:3.6.18-2.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-0:3.6.18-2.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-0:3.6.18-2.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-0:3.6.18-2.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-0:3.6.18-2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-debuginfo-0:3.6.18-2.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-debuginfo-0:3.6.18-2.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-debuginfo-0:3.6.18-2.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-debuginfo-0:3.6.18-2.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-debuginfo-0:3.6.18-2.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-debuginfo-0:3.6.18-2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-0:3.6.18-2.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-0:3.6.18-2.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-0:3.6.18-2.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-0:3.6.18-2.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-0:3.6.18-2.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-0:3.6.18-2.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-0:3.6.18-2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-debuginfo-0:3.6.18-2.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-debuginfo-0:3.6.18-2.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-debuginfo-0:3.6.18-2.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-debuginfo-0:3.6.18-2.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-debuginfo-0:3.6.18-2.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-debuginfo-0:3.6.18-2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-0:3.6.18-2.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-0:3.6.18-2.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-0:3.6.18-2.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-0:3.6.18-2.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-0:3.6.18-2.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-0:3.6.18-2.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-0:3.6.18-2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-debuginfo-0:3.6.18-2.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-debuginfo-0:3.6.18-2.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-debuginfo-0:3.6.18-2.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-debuginfo-0:3.6.18-2.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-debuginfo-0:3.6.18-2.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-debuginfo-0:3.6.18-2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-0:3.6.18-2.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-0:3.6.18-2.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-0:3.6.18-2.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-0:3.6.18-2.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-0:3.6.18-2.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-0:3.6.18-2.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-0:3.6.18-2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-debuginfo-0:3.6.18-2.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-debuginfo-0:3.6.18-2.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-debuginfo-0:3.6.18-2.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-debuginfo-0:3.6.18-2.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-debuginfo-0:3.6.18-2.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-debuginfo-0:3.6.18-2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-0:3.6.18-1.el6_1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-0:3.6.18-1.el6_1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-0:3.6.18-1.el6_1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-0:3.6.18-1.el6_1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-0:3.6.18-1.el6_1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-0:3.6.18-1.el6_1.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-0:3.6.18-1.el6_1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.x86_64 | — |
Vendor Fix
fix
|
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Critical"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated firefox packages that fix several security issues and one bug are\nnow available for Red Hat Enterprise Linux 4, 5, and 6.\n\nThe Red Hat Security Response Team has rated this update as having critical\nsecurity impact. Common Vulnerability Scoring System (CVSS) base scores,\nwhich give detailed severity ratings, are available for each vulnerability\nfrom the CVE links in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Mozilla Firefox is an open source web browser. XULRunner provides the XUL\nRuntime environment for Mozilla Firefox.\n\nA flaw was found in the way Firefox handled malformed JPEG images. A\nwebsite containing a malicious JPEG image could cause Firefox to crash or,\npotentially, execute arbitrary code with the privileges of the user running\nFirefox. (CVE-2011-2377)\n\nMultiple dangling pointer flaws were found in Firefox. A web page\ncontaining malicious content could cause Firefox to crash or, potentially,\nexecute arbitrary code with the privileges of the user running Firefox.\n(CVE-2011-0083, CVE-2011-0085, CVE-2011-2363)\n\nSeveral flaws were found in the processing of malformed web content. A web\npage containing malicious content could cause Firefox to crash or,\npotentially, execute arbitrary code with the privileges of the user running\nFirefox. (CVE-2011-2364, CVE-2011-2365, CVE-2011-2374, CVE-2011-2375,\nCVE-2011-2376)\n\nAn integer overflow flaw was found in the way Firefox handled JavaScript\nArray objects. A website containing malicious JavaScript could cause\nFirefox to execute that JavaScript with the privileges of the user running\nFirefox. (CVE-2011-2371)\n\nA use-after-free flaw was found in the way Firefox handled malformed\nJavaScript. A website containing malicious JavaScript could cause Firefox\nto execute that JavaScript with the privileges of the user running Firefox.\n(CVE-2011-2373)\n\nIt was found that Firefox could treat two separate cookies as\ninterchangeable if both were for the same domain name but one of those\ndomain names had a trailing \".\" character. This violates the same-origin\npolicy and could possibly lead to data being leaked to the wrong domain.\n(CVE-2011-2362)\n\nFor technical details regarding these flaws, refer to the Mozilla security\nadvisories for Firefox 3.6.18. You can find a link to the Mozilla\nadvisories in the References section of this erratum.\n\nThis update also fixes the following bug:\n\n* With previous versions of Firefox on Red Hat Enterprise Linux 5, the\n\"background-repeat\" CSS (Cascading Style Sheets) property did not work\n(such images were not displayed and repeated as expected). (BZ#698313)\n\nAll Firefox users should upgrade to these updated packages, which contain\nFirefox version 3.6.18, which corrects these issues. After installing the\nupdate, Firefox must be restarted for the changes to take effect.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2011:0885",
"url": "https://access.redhat.com/errata/RHSA-2011:0885"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#critical",
"url": "https://access.redhat.com/security/updates/classification/#critical"
},
{
"category": "external",
"summary": "http://www.mozilla.org/security/known-vulnerabilities/firefox36.html#firefox3.6.18",
"url": "http://www.mozilla.org/security/known-vulnerabilities/firefox36.html#firefox3.6.18"
},
{
"category": "external",
"summary": "698313",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=698313"
},
{
"category": "external",
"summary": "714576",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=714576"
},
{
"category": "external",
"summary": "714577",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=714577"
},
{
"category": "external",
"summary": "714580",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=714580"
},
{
"category": "external",
"summary": "714581",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=714581"
},
{
"category": "external",
"summary": "714583",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=714583"
},
{
"category": "external",
"summary": "714929",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=714929"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2011/rhsa-2011_0885.json"
}
],
"title": "Red Hat Security Advisory: firefox security and bug fix update",
"tracking": {
"current_release_date": "2026-01-13T22:11:38+00:00",
"generator": {
"date": "2026-01-13T22:11:38+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.15"
}
},
"id": "RHSA-2011:0885",
"initial_release_date": "2011-06-21T22:39:00+00:00",
"revision_history": [
{
"date": "2011-06-21T22:39:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2011-06-21T18:50:32+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-01-13T22:11:38+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux (v. 5.6.z server)",
"product": {
"name": "Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:5::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AS version 4",
"product": {
"name": "Red Hat Enterprise Linux AS version 4",
"product_id": "4AS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:4::as"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop version 4",
"product": {
"name": "Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:4::desktop"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ES version 4",
"product": {
"name": "Red Hat Enterprise Linux ES version 4",
"product_id": "4ES",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:4::es"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux WS version 4",
"product": {
"name": "Red Hat Enterprise Linux WS version 4",
"product_id": "4WS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:4::ws"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "firefox-0:3.6.18-1.el5_6.ia64",
"product": {
"name": "firefox-0:3.6.18-1.el5_6.ia64",
"product_id": "firefox-0:3.6.18-1.el5_6.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/firefox@3.6.18-1.el5_6?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "firefox-debuginfo-0:3.6.18-1.el5_6.ia64",
"product": {
"name": "firefox-debuginfo-0:3.6.18-1.el5_6.ia64",
"product_id": "firefox-debuginfo-0:3.6.18-1.el5_6.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/firefox-debuginfo@3.6.18-1.el5_6?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ia64",
"product": {
"name": "xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ia64",
"product_id": "xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xulrunner-debuginfo@1.9.2.18-2.el5_6?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "xulrunner-devel-0:1.9.2.18-2.el5_6.ia64",
"product": {
"name": "xulrunner-devel-0:1.9.2.18-2.el5_6.ia64",
"product_id": "xulrunner-devel-0:1.9.2.18-2.el5_6.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xulrunner-devel@1.9.2.18-2.el5_6?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "xulrunner-0:1.9.2.18-2.el5_6.ia64",
"product": {
"name": "xulrunner-0:1.9.2.18-2.el5_6.ia64",
"product_id": "xulrunner-0:1.9.2.18-2.el5_6.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xulrunner@1.9.2.18-2.el5_6?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "firefox-debuginfo-0:3.6.18-2.el4.ia64",
"product": {
"name": "firefox-debuginfo-0:3.6.18-2.el4.ia64",
"product_id": "firefox-debuginfo-0:3.6.18-2.el4.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/firefox-debuginfo@3.6.18-2.el4?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "firefox-0:3.6.18-2.el4.ia64",
"product": {
"name": "firefox-0:3.6.18-2.el4.ia64",
"product_id": "firefox-0:3.6.18-2.el4.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/firefox@3.6.18-2.el4?arch=ia64"
}
}
}
],
"category": "architecture",
"name": "ia64"
},
{
"branches": [
{
"category": "product_version",
"name": "firefox-0:3.6.18-1.el5_6.ppc",
"product": {
"name": "firefox-0:3.6.18-1.el5_6.ppc",
"product_id": "firefox-0:3.6.18-1.el5_6.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/firefox@3.6.18-1.el5_6?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "firefox-debuginfo-0:3.6.18-1.el5_6.ppc",
"product": {
"name": "firefox-debuginfo-0:3.6.18-1.el5_6.ppc",
"product_id": "firefox-debuginfo-0:3.6.18-1.el5_6.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/firefox-debuginfo@3.6.18-1.el5_6?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ppc",
"product": {
"name": "xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ppc",
"product_id": "xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xulrunner-debuginfo@1.9.2.18-2.el5_6?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "xulrunner-devel-0:1.9.2.18-2.el5_6.ppc",
"product": {
"name": "xulrunner-devel-0:1.9.2.18-2.el5_6.ppc",
"product_id": "xulrunner-devel-0:1.9.2.18-2.el5_6.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xulrunner-devel@1.9.2.18-2.el5_6?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "xulrunner-0:1.9.2.18-2.el5_6.ppc",
"product": {
"name": "xulrunner-0:1.9.2.18-2.el5_6.ppc",
"product_id": "xulrunner-0:1.9.2.18-2.el5_6.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xulrunner@1.9.2.18-2.el5_6?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "firefox-debuginfo-0:3.6.18-1.el6_1.ppc",
"product": {
"name": "firefox-debuginfo-0:3.6.18-1.el6_1.ppc",
"product_id": "firefox-debuginfo-0:3.6.18-1.el6_1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/firefox-debuginfo@3.6.18-1.el6_1?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "firefox-0:3.6.18-1.el6_1.ppc",
"product": {
"name": "firefox-0:3.6.18-1.el6_1.ppc",
"product_id": "firefox-0:3.6.18-1.el6_1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/firefox@3.6.18-1.el6_1?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "xulrunner-devel-0:1.9.2.18-2.el6_1.ppc",
"product": {
"name": "xulrunner-devel-0:1.9.2.18-2.el6_1.ppc",
"product_id": "xulrunner-devel-0:1.9.2.18-2.el6_1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xulrunner-devel@1.9.2.18-2.el6_1?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc",
"product": {
"name": "xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc",
"product_id": "xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xulrunner-debuginfo@1.9.2.18-2.el6_1?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "xulrunner-0:1.9.2.18-2.el6_1.ppc",
"product": {
"name": "xulrunner-0:1.9.2.18-2.el6_1.ppc",
"product_id": "xulrunner-0:1.9.2.18-2.el6_1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xulrunner@1.9.2.18-2.el6_1?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "firefox-debuginfo-0:3.6.18-2.el4.ppc",
"product": {
"name": "firefox-debuginfo-0:3.6.18-2.el4.ppc",
"product_id": "firefox-debuginfo-0:3.6.18-2.el4.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/firefox-debuginfo@3.6.18-2.el4?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "firefox-0:3.6.18-2.el4.ppc",
"product": {
"name": "firefox-0:3.6.18-2.el4.ppc",
"product_id": "firefox-0:3.6.18-2.el4.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/firefox@3.6.18-2.el4?arch=ppc"
}
}
}
],
"category": "architecture",
"name": "ppc"
},
{
"branches": [
{
"category": "product_version",
"name": "firefox-0:3.6.18-1.el5_6.src",
"product": {
"name": "firefox-0:3.6.18-1.el5_6.src",
"product_id": "firefox-0:3.6.18-1.el5_6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/firefox@3.6.18-1.el5_6?arch=src"
}
}
},
{
"category": "product_version",
"name": "xulrunner-0:1.9.2.18-2.el5_6.src",
"product": {
"name": "xulrunner-0:1.9.2.18-2.el5_6.src",
"product_id": "xulrunner-0:1.9.2.18-2.el5_6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xulrunner@1.9.2.18-2.el5_6?arch=src"
}
}
},
{
"category": "product_version",
"name": "firefox-0:3.6.18-1.el6_1.src",
"product": {
"name": "firefox-0:3.6.18-1.el6_1.src",
"product_id": "firefox-0:3.6.18-1.el6_1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/firefox@3.6.18-1.el6_1?arch=src"
}
}
},
{
"category": "product_version",
"name": "xulrunner-0:1.9.2.18-2.el6_1.src",
"product": {
"name": "xulrunner-0:1.9.2.18-2.el6_1.src",
"product_id": "xulrunner-0:1.9.2.18-2.el6_1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xulrunner@1.9.2.18-2.el6_1?arch=src"
}
}
},
{
"category": "product_version",
"name": "firefox-0:3.6.18-2.el4.src",
"product": {
"name": "firefox-0:3.6.18-2.el4.src",
"product_id": "firefox-0:3.6.18-2.el4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/firefox@3.6.18-2.el4?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "firefox-0:3.6.18-1.el5_6.s390x",
"product": {
"name": "firefox-0:3.6.18-1.el5_6.s390x",
"product_id": "firefox-0:3.6.18-1.el5_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/firefox@3.6.18-1.el5_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "firefox-debuginfo-0:3.6.18-1.el5_6.s390x",
"product": {
"name": "firefox-debuginfo-0:3.6.18-1.el5_6.s390x",
"product_id": "firefox-debuginfo-0:3.6.18-1.el5_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/firefox-debuginfo@3.6.18-1.el5_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "xulrunner-debuginfo-0:1.9.2.18-2.el5_6.s390x",
"product": {
"name": "xulrunner-debuginfo-0:1.9.2.18-2.el5_6.s390x",
"product_id": "xulrunner-debuginfo-0:1.9.2.18-2.el5_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xulrunner-debuginfo@1.9.2.18-2.el5_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "xulrunner-devel-0:1.9.2.18-2.el5_6.s390x",
"product": {
"name": "xulrunner-devel-0:1.9.2.18-2.el5_6.s390x",
"product_id": "xulrunner-devel-0:1.9.2.18-2.el5_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xulrunner-devel@1.9.2.18-2.el5_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "xulrunner-0:1.9.2.18-2.el5_6.s390x",
"product": {
"name": "xulrunner-0:1.9.2.18-2.el5_6.s390x",
"product_id": "xulrunner-0:1.9.2.18-2.el5_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xulrunner@1.9.2.18-2.el5_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "firefox-debuginfo-0:3.6.18-1.el6_1.s390x",
"product": {
"name": "firefox-debuginfo-0:3.6.18-1.el6_1.s390x",
"product_id": "firefox-debuginfo-0:3.6.18-1.el6_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/firefox-debuginfo@3.6.18-1.el6_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "firefox-0:3.6.18-1.el6_1.s390x",
"product": {
"name": "firefox-0:3.6.18-1.el6_1.s390x",
"product_id": "firefox-0:3.6.18-1.el6_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/firefox@3.6.18-1.el6_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "xulrunner-devel-0:1.9.2.18-2.el6_1.s390x",
"product": {
"name": "xulrunner-devel-0:1.9.2.18-2.el6_1.s390x",
"product_id": "xulrunner-devel-0:1.9.2.18-2.el6_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xulrunner-devel@1.9.2.18-2.el6_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390x",
"product": {
"name": "xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390x",
"product_id": "xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xulrunner-debuginfo@1.9.2.18-2.el6_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "xulrunner-0:1.9.2.18-2.el6_1.s390x",
"product": {
"name": "xulrunner-0:1.9.2.18-2.el6_1.s390x",
"product_id": "xulrunner-0:1.9.2.18-2.el6_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xulrunner@1.9.2.18-2.el6_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "firefox-debuginfo-0:3.6.18-2.el4.s390x",
"product": {
"name": "firefox-debuginfo-0:3.6.18-2.el4.s390x",
"product_id": "firefox-debuginfo-0:3.6.18-2.el4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/firefox-debuginfo@3.6.18-2.el4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "firefox-0:3.6.18-2.el4.s390x",
"product": {
"name": "firefox-0:3.6.18-2.el4.s390x",
"product_id": "firefox-0:3.6.18-2.el4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/firefox@3.6.18-2.el4?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "firefox-0:3.6.18-1.el5_6.s390",
"product": {
"name": "firefox-0:3.6.18-1.el5_6.s390",
"product_id": "firefox-0:3.6.18-1.el5_6.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/firefox@3.6.18-1.el5_6?arch=s390"
}
}
},
{
"category": "product_version",
"name": "firefox-debuginfo-0:3.6.18-1.el5_6.s390",
"product": {
"name": "firefox-debuginfo-0:3.6.18-1.el5_6.s390",
"product_id": "firefox-debuginfo-0:3.6.18-1.el5_6.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/firefox-debuginfo@3.6.18-1.el5_6?arch=s390"
}
}
},
{
"category": "product_version",
"name": "xulrunner-debuginfo-0:1.9.2.18-2.el5_6.s390",
"product": {
"name": "xulrunner-debuginfo-0:1.9.2.18-2.el5_6.s390",
"product_id": "xulrunner-debuginfo-0:1.9.2.18-2.el5_6.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xulrunner-debuginfo@1.9.2.18-2.el5_6?arch=s390"
}
}
},
{
"category": "product_version",
"name": "xulrunner-devel-0:1.9.2.18-2.el5_6.s390",
"product": {
"name": "xulrunner-devel-0:1.9.2.18-2.el5_6.s390",
"product_id": "xulrunner-devel-0:1.9.2.18-2.el5_6.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xulrunner-devel@1.9.2.18-2.el5_6?arch=s390"
}
}
},
{
"category": "product_version",
"name": "xulrunner-0:1.9.2.18-2.el5_6.s390",
"product": {
"name": "xulrunner-0:1.9.2.18-2.el5_6.s390",
"product_id": "xulrunner-0:1.9.2.18-2.el5_6.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xulrunner@1.9.2.18-2.el5_6?arch=s390"
}
}
},
{
"category": "product_version",
"name": "firefox-debuginfo-0:3.6.18-1.el6_1.s390",
"product": {
"name": "firefox-debuginfo-0:3.6.18-1.el6_1.s390",
"product_id": "firefox-debuginfo-0:3.6.18-1.el6_1.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/firefox-debuginfo@3.6.18-1.el6_1?arch=s390"
}
}
},
{
"category": "product_version",
"name": "firefox-0:3.6.18-1.el6_1.s390",
"product": {
"name": "firefox-0:3.6.18-1.el6_1.s390",
"product_id": "firefox-0:3.6.18-1.el6_1.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/firefox@3.6.18-1.el6_1?arch=s390"
}
}
},
{
"category": "product_version",
"name": "xulrunner-devel-0:1.9.2.18-2.el6_1.s390",
"product": {
"name": "xulrunner-devel-0:1.9.2.18-2.el6_1.s390",
"product_id": "xulrunner-devel-0:1.9.2.18-2.el6_1.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xulrunner-devel@1.9.2.18-2.el6_1?arch=s390"
}
}
},
{
"category": "product_version",
"name": "xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390",
"product": {
"name": "xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390",
"product_id": "xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xulrunner-debuginfo@1.9.2.18-2.el6_1?arch=s390"
}
}
},
{
"category": "product_version",
"name": "xulrunner-0:1.9.2.18-2.el6_1.s390",
"product": {
"name": "xulrunner-0:1.9.2.18-2.el6_1.s390",
"product_id": "xulrunner-0:1.9.2.18-2.el6_1.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xulrunner@1.9.2.18-2.el6_1?arch=s390"
}
}
},
{
"category": "product_version",
"name": "firefox-debuginfo-0:3.6.18-2.el4.s390",
"product": {
"name": "firefox-debuginfo-0:3.6.18-2.el4.s390",
"product_id": "firefox-debuginfo-0:3.6.18-2.el4.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/firefox-debuginfo@3.6.18-2.el4?arch=s390"
}
}
},
{
"category": "product_version",
"name": "firefox-0:3.6.18-2.el4.s390",
"product": {
"name": "firefox-0:3.6.18-2.el4.s390",
"product_id": "firefox-0:3.6.18-2.el4.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/firefox@3.6.18-2.el4?arch=s390"
}
}
}
],
"category": "architecture",
"name": "s390"
},
{
"branches": [
{
"category": "product_version",
"name": "firefox-0:3.6.18-1.el5_6.x86_64",
"product": {
"name": "firefox-0:3.6.18-1.el5_6.x86_64",
"product_id": "firefox-0:3.6.18-1.el5_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/firefox@3.6.18-1.el5_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "firefox-debuginfo-0:3.6.18-1.el5_6.x86_64",
"product": {
"name": "firefox-debuginfo-0:3.6.18-1.el5_6.x86_64",
"product_id": "firefox-debuginfo-0:3.6.18-1.el5_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/firefox-debuginfo@3.6.18-1.el5_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "xulrunner-debuginfo-0:1.9.2.18-2.el5_6.x86_64",
"product": {
"name": "xulrunner-debuginfo-0:1.9.2.18-2.el5_6.x86_64",
"product_id": "xulrunner-debuginfo-0:1.9.2.18-2.el5_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xulrunner-debuginfo@1.9.2.18-2.el5_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "xulrunner-devel-0:1.9.2.18-2.el5_6.x86_64",
"product": {
"name": "xulrunner-devel-0:1.9.2.18-2.el5_6.x86_64",
"product_id": "xulrunner-devel-0:1.9.2.18-2.el5_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xulrunner-devel@1.9.2.18-2.el5_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "xulrunner-0:1.9.2.18-2.el5_6.x86_64",
"product": {
"name": "xulrunner-0:1.9.2.18-2.el5_6.x86_64",
"product_id": "xulrunner-0:1.9.2.18-2.el5_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xulrunner@1.9.2.18-2.el5_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "firefox-debuginfo-0:3.6.18-1.el6_1.x86_64",
"product": {
"name": "firefox-debuginfo-0:3.6.18-1.el6_1.x86_64",
"product_id": "firefox-debuginfo-0:3.6.18-1.el6_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/firefox-debuginfo@3.6.18-1.el6_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "firefox-0:3.6.18-1.el6_1.x86_64",
"product": {
"name": "firefox-0:3.6.18-1.el6_1.x86_64",
"product_id": "firefox-0:3.6.18-1.el6_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/firefox@3.6.18-1.el6_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "xulrunner-devel-0:1.9.2.18-2.el6_1.x86_64",
"product": {
"name": "xulrunner-devel-0:1.9.2.18-2.el6_1.x86_64",
"product_id": "xulrunner-devel-0:1.9.2.18-2.el6_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xulrunner-devel@1.9.2.18-2.el6_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "xulrunner-debuginfo-0:1.9.2.18-2.el6_1.x86_64",
"product": {
"name": "xulrunner-debuginfo-0:1.9.2.18-2.el6_1.x86_64",
"product_id": "xulrunner-debuginfo-0:1.9.2.18-2.el6_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xulrunner-debuginfo@1.9.2.18-2.el6_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "xulrunner-0:1.9.2.18-2.el6_1.x86_64",
"product": {
"name": "xulrunner-0:1.9.2.18-2.el6_1.x86_64",
"product_id": "xulrunner-0:1.9.2.18-2.el6_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xulrunner@1.9.2.18-2.el6_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"product": {
"name": "firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"product_id": "firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/firefox-debuginfo@3.6.18-2.el4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "firefox-0:3.6.18-2.el4.x86_64",
"product": {
"name": "firefox-0:3.6.18-2.el4.x86_64",
"product_id": "firefox-0:3.6.18-2.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/firefox@3.6.18-2.el4?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "firefox-0:3.6.18-1.el5_6.i386",
"product": {
"name": "firefox-0:3.6.18-1.el5_6.i386",
"product_id": "firefox-0:3.6.18-1.el5_6.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/firefox@3.6.18-1.el5_6?arch=i386"
}
}
},
{
"category": "product_version",
"name": "firefox-debuginfo-0:3.6.18-1.el5_6.i386",
"product": {
"name": "firefox-debuginfo-0:3.6.18-1.el5_6.i386",
"product_id": "firefox-debuginfo-0:3.6.18-1.el5_6.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/firefox-debuginfo@3.6.18-1.el5_6?arch=i386"
}
}
},
{
"category": "product_version",
"name": "xulrunner-debuginfo-0:1.9.2.18-2.el5_6.i386",
"product": {
"name": "xulrunner-debuginfo-0:1.9.2.18-2.el5_6.i386",
"product_id": "xulrunner-debuginfo-0:1.9.2.18-2.el5_6.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xulrunner-debuginfo@1.9.2.18-2.el5_6?arch=i386"
}
}
},
{
"category": "product_version",
"name": "xulrunner-devel-0:1.9.2.18-2.el5_6.i386",
"product": {
"name": "xulrunner-devel-0:1.9.2.18-2.el5_6.i386",
"product_id": "xulrunner-devel-0:1.9.2.18-2.el5_6.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xulrunner-devel@1.9.2.18-2.el5_6?arch=i386"
}
}
},
{
"category": "product_version",
"name": "xulrunner-0:1.9.2.18-2.el5_6.i386",
"product": {
"name": "xulrunner-0:1.9.2.18-2.el5_6.i386",
"product_id": "xulrunner-0:1.9.2.18-2.el5_6.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xulrunner@1.9.2.18-2.el5_6?arch=i386"
}
}
},
{
"category": "product_version",
"name": "firefox-debuginfo-0:3.6.18-2.el4.i386",
"product": {
"name": "firefox-debuginfo-0:3.6.18-2.el4.i386",
"product_id": "firefox-debuginfo-0:3.6.18-2.el4.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/firefox-debuginfo@3.6.18-2.el4?arch=i386"
}
}
},
{
"category": "product_version",
"name": "firefox-0:3.6.18-2.el4.i386",
"product": {
"name": "firefox-0:3.6.18-2.el4.i386",
"product_id": "firefox-0:3.6.18-2.el4.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/firefox@3.6.18-2.el4?arch=i386"
}
}
}
],
"category": "architecture",
"name": "i386"
},
{
"branches": [
{
"category": "product_version",
"name": "xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ppc64",
"product": {
"name": "xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ppc64",
"product_id": "xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xulrunner-debuginfo@1.9.2.18-2.el5_6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "xulrunner-devel-0:1.9.2.18-2.el5_6.ppc64",
"product": {
"name": "xulrunner-devel-0:1.9.2.18-2.el5_6.ppc64",
"product_id": "xulrunner-devel-0:1.9.2.18-2.el5_6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xulrunner-devel@1.9.2.18-2.el5_6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "xulrunner-0:1.9.2.18-2.el5_6.ppc64",
"product": {
"name": "xulrunner-0:1.9.2.18-2.el5_6.ppc64",
"product_id": "xulrunner-0:1.9.2.18-2.el5_6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xulrunner@1.9.2.18-2.el5_6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "firefox-debuginfo-0:3.6.18-1.el6_1.ppc64",
"product": {
"name": "firefox-debuginfo-0:3.6.18-1.el6_1.ppc64",
"product_id": "firefox-debuginfo-0:3.6.18-1.el6_1.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/firefox-debuginfo@3.6.18-1.el6_1?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "firefox-0:3.6.18-1.el6_1.ppc64",
"product": {
"name": "firefox-0:3.6.18-1.el6_1.ppc64",
"product_id": "firefox-0:3.6.18-1.el6_1.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/firefox@3.6.18-1.el6_1?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "xulrunner-devel-0:1.9.2.18-2.el6_1.ppc64",
"product": {
"name": "xulrunner-devel-0:1.9.2.18-2.el6_1.ppc64",
"product_id": "xulrunner-devel-0:1.9.2.18-2.el6_1.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xulrunner-devel@1.9.2.18-2.el6_1?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc64",
"product": {
"name": "xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc64",
"product_id": "xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xulrunner-debuginfo@1.9.2.18-2.el6_1?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "xulrunner-0:1.9.2.18-2.el6_1.ppc64",
"product": {
"name": "xulrunner-0:1.9.2.18-2.el6_1.ppc64",
"product_id": "xulrunner-0:1.9.2.18-2.el6_1.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xulrunner@1.9.2.18-2.el6_1?arch=ppc64"
}
}
}
],
"category": "architecture",
"name": "ppc64"
},
{
"branches": [
{
"category": "product_version",
"name": "firefox-debuginfo-0:3.6.18-1.el6_1.i686",
"product": {
"name": "firefox-debuginfo-0:3.6.18-1.el6_1.i686",
"product_id": "firefox-debuginfo-0:3.6.18-1.el6_1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/firefox-debuginfo@3.6.18-1.el6_1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "firefox-0:3.6.18-1.el6_1.i686",
"product": {
"name": "firefox-0:3.6.18-1.el6_1.i686",
"product_id": "firefox-0:3.6.18-1.el6_1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/firefox@3.6.18-1.el6_1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "xulrunner-devel-0:1.9.2.18-2.el6_1.i686",
"product": {
"name": "xulrunner-devel-0:1.9.2.18-2.el6_1.i686",
"product_id": "xulrunner-devel-0:1.9.2.18-2.el6_1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xulrunner-devel@1.9.2.18-2.el6_1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "xulrunner-debuginfo-0:1.9.2.18-2.el6_1.i686",
"product": {
"name": "xulrunner-debuginfo-0:1.9.2.18-2.el6_1.i686",
"product_id": "xulrunner-debuginfo-0:1.9.2.18-2.el6_1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xulrunner-debuginfo@1.9.2.18-2.el6_1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "xulrunner-0:1.9.2.18-2.el6_1.i686",
"product": {
"name": "xulrunner-0:1.9.2.18-2.el6_1.i686",
"product_id": "xulrunner-0:1.9.2.18-2.el6_1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xulrunner@1.9.2.18-2.el6_1?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-0:3.6.18-2.el4.i386 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:firefox-0:3.6.18-2.el4.i386"
},
"product_reference": "firefox-0:3.6.18-2.el4.i386",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-0:3.6.18-2.el4.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:firefox-0:3.6.18-2.el4.ia64"
},
"product_reference": "firefox-0:3.6.18-2.el4.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-0:3.6.18-2.el4.ppc as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:firefox-0:3.6.18-2.el4.ppc"
},
"product_reference": "firefox-0:3.6.18-2.el4.ppc",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-0:3.6.18-2.el4.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:firefox-0:3.6.18-2.el4.s390"
},
"product_reference": "firefox-0:3.6.18-2.el4.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-0:3.6.18-2.el4.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:firefox-0:3.6.18-2.el4.s390x"
},
"product_reference": "firefox-0:3.6.18-2.el4.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-0:3.6.18-2.el4.src as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:firefox-0:3.6.18-2.el4.src"
},
"product_reference": "firefox-0:3.6.18-2.el4.src",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-0:3.6.18-2.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:firefox-0:3.6.18-2.el4.x86_64"
},
"product_reference": "firefox-0:3.6.18-2.el4.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-debuginfo-0:3.6.18-2.el4.i386 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:firefox-debuginfo-0:3.6.18-2.el4.i386"
},
"product_reference": "firefox-debuginfo-0:3.6.18-2.el4.i386",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-debuginfo-0:3.6.18-2.el4.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:firefox-debuginfo-0:3.6.18-2.el4.ia64"
},
"product_reference": "firefox-debuginfo-0:3.6.18-2.el4.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-debuginfo-0:3.6.18-2.el4.ppc as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:firefox-debuginfo-0:3.6.18-2.el4.ppc"
},
"product_reference": "firefox-debuginfo-0:3.6.18-2.el4.ppc",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-debuginfo-0:3.6.18-2.el4.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:firefox-debuginfo-0:3.6.18-2.el4.s390"
},
"product_reference": "firefox-debuginfo-0:3.6.18-2.el4.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-debuginfo-0:3.6.18-2.el4.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:firefox-debuginfo-0:3.6.18-2.el4.s390x"
},
"product_reference": "firefox-debuginfo-0:3.6.18-2.el4.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-debuginfo-0:3.6.18-2.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:firefox-debuginfo-0:3.6.18-2.el4.x86_64"
},
"product_reference": "firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-0:3.6.18-2.el4.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:firefox-0:3.6.18-2.el4.i386"
},
"product_reference": "firefox-0:3.6.18-2.el4.i386",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-0:3.6.18-2.el4.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:firefox-0:3.6.18-2.el4.ia64"
},
"product_reference": "firefox-0:3.6.18-2.el4.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-0:3.6.18-2.el4.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:firefox-0:3.6.18-2.el4.ppc"
},
"product_reference": "firefox-0:3.6.18-2.el4.ppc",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-0:3.6.18-2.el4.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:firefox-0:3.6.18-2.el4.s390"
},
"product_reference": "firefox-0:3.6.18-2.el4.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-0:3.6.18-2.el4.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:firefox-0:3.6.18-2.el4.s390x"
},
"product_reference": "firefox-0:3.6.18-2.el4.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-0:3.6.18-2.el4.src as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:firefox-0:3.6.18-2.el4.src"
},
"product_reference": "firefox-0:3.6.18-2.el4.src",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-0:3.6.18-2.el4.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:firefox-0:3.6.18-2.el4.x86_64"
},
"product_reference": "firefox-0:3.6.18-2.el4.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-debuginfo-0:3.6.18-2.el4.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:firefox-debuginfo-0:3.6.18-2.el4.i386"
},
"product_reference": "firefox-debuginfo-0:3.6.18-2.el4.i386",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-debuginfo-0:3.6.18-2.el4.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:firefox-debuginfo-0:3.6.18-2.el4.ia64"
},
"product_reference": "firefox-debuginfo-0:3.6.18-2.el4.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-debuginfo-0:3.6.18-2.el4.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:firefox-debuginfo-0:3.6.18-2.el4.ppc"
},
"product_reference": "firefox-debuginfo-0:3.6.18-2.el4.ppc",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-debuginfo-0:3.6.18-2.el4.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:firefox-debuginfo-0:3.6.18-2.el4.s390"
},
"product_reference": "firefox-debuginfo-0:3.6.18-2.el4.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-debuginfo-0:3.6.18-2.el4.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:firefox-debuginfo-0:3.6.18-2.el4.s390x"
},
"product_reference": "firefox-debuginfo-0:3.6.18-2.el4.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-debuginfo-0:3.6.18-2.el4.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:firefox-debuginfo-0:3.6.18-2.el4.x86_64"
},
"product_reference": "firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-0:3.6.18-2.el4.i386 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:firefox-0:3.6.18-2.el4.i386"
},
"product_reference": "firefox-0:3.6.18-2.el4.i386",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-0:3.6.18-2.el4.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:firefox-0:3.6.18-2.el4.ia64"
},
"product_reference": "firefox-0:3.6.18-2.el4.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-0:3.6.18-2.el4.ppc as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:firefox-0:3.6.18-2.el4.ppc"
},
"product_reference": "firefox-0:3.6.18-2.el4.ppc",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-0:3.6.18-2.el4.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:firefox-0:3.6.18-2.el4.s390"
},
"product_reference": "firefox-0:3.6.18-2.el4.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-0:3.6.18-2.el4.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:firefox-0:3.6.18-2.el4.s390x"
},
"product_reference": "firefox-0:3.6.18-2.el4.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-0:3.6.18-2.el4.src as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:firefox-0:3.6.18-2.el4.src"
},
"product_reference": "firefox-0:3.6.18-2.el4.src",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-0:3.6.18-2.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:firefox-0:3.6.18-2.el4.x86_64"
},
"product_reference": "firefox-0:3.6.18-2.el4.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-debuginfo-0:3.6.18-2.el4.i386 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:firefox-debuginfo-0:3.6.18-2.el4.i386"
},
"product_reference": "firefox-debuginfo-0:3.6.18-2.el4.i386",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-debuginfo-0:3.6.18-2.el4.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:firefox-debuginfo-0:3.6.18-2.el4.ia64"
},
"product_reference": "firefox-debuginfo-0:3.6.18-2.el4.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-debuginfo-0:3.6.18-2.el4.ppc as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:firefox-debuginfo-0:3.6.18-2.el4.ppc"
},
"product_reference": "firefox-debuginfo-0:3.6.18-2.el4.ppc",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-debuginfo-0:3.6.18-2.el4.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:firefox-debuginfo-0:3.6.18-2.el4.s390"
},
"product_reference": "firefox-debuginfo-0:3.6.18-2.el4.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-debuginfo-0:3.6.18-2.el4.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:firefox-debuginfo-0:3.6.18-2.el4.s390x"
},
"product_reference": "firefox-debuginfo-0:3.6.18-2.el4.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-debuginfo-0:3.6.18-2.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:firefox-debuginfo-0:3.6.18-2.el4.x86_64"
},
"product_reference": "firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-0:3.6.18-2.el4.i386 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:firefox-0:3.6.18-2.el4.i386"
},
"product_reference": "firefox-0:3.6.18-2.el4.i386",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-0:3.6.18-2.el4.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:firefox-0:3.6.18-2.el4.ia64"
},
"product_reference": "firefox-0:3.6.18-2.el4.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-0:3.6.18-2.el4.ppc as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:firefox-0:3.6.18-2.el4.ppc"
},
"product_reference": "firefox-0:3.6.18-2.el4.ppc",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-0:3.6.18-2.el4.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:firefox-0:3.6.18-2.el4.s390"
},
"product_reference": "firefox-0:3.6.18-2.el4.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-0:3.6.18-2.el4.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:firefox-0:3.6.18-2.el4.s390x"
},
"product_reference": "firefox-0:3.6.18-2.el4.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-0:3.6.18-2.el4.src as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:firefox-0:3.6.18-2.el4.src"
},
"product_reference": "firefox-0:3.6.18-2.el4.src",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-0:3.6.18-2.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:firefox-0:3.6.18-2.el4.x86_64"
},
"product_reference": "firefox-0:3.6.18-2.el4.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-debuginfo-0:3.6.18-2.el4.i386 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:firefox-debuginfo-0:3.6.18-2.el4.i386"
},
"product_reference": "firefox-debuginfo-0:3.6.18-2.el4.i386",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-debuginfo-0:3.6.18-2.el4.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:firefox-debuginfo-0:3.6.18-2.el4.ia64"
},
"product_reference": "firefox-debuginfo-0:3.6.18-2.el4.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-debuginfo-0:3.6.18-2.el4.ppc as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:firefox-debuginfo-0:3.6.18-2.el4.ppc"
},
"product_reference": "firefox-debuginfo-0:3.6.18-2.el4.ppc",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-debuginfo-0:3.6.18-2.el4.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:firefox-debuginfo-0:3.6.18-2.el4.s390"
},
"product_reference": "firefox-debuginfo-0:3.6.18-2.el4.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-debuginfo-0:3.6.18-2.el4.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:firefox-debuginfo-0:3.6.18-2.el4.s390x"
},
"product_reference": "firefox-debuginfo-0:3.6.18-2.el4.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-debuginfo-0:3.6.18-2.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:firefox-debuginfo-0:3.6.18-2.el4.x86_64"
},
"product_reference": "firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-0:3.6.18-1.el5_6.i386 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.i386"
},
"product_reference": "firefox-0:3.6.18-1.el5_6.i386",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-0:3.6.18-1.el5_6.ia64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.ia64"
},
"product_reference": "firefox-0:3.6.18-1.el5_6.ia64",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-0:3.6.18-1.el5_6.ppc as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.ppc"
},
"product_reference": "firefox-0:3.6.18-1.el5_6.ppc",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-0:3.6.18-1.el5_6.s390 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.s390"
},
"product_reference": "firefox-0:3.6.18-1.el5_6.s390",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-0:3.6.18-1.el5_6.s390x as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.s390x"
},
"product_reference": "firefox-0:3.6.18-1.el5_6.s390x",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-0:3.6.18-1.el5_6.src as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.src"
},
"product_reference": "firefox-0:3.6.18-1.el5_6.src",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-0:3.6.18-1.el5_6.x86_64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.x86_64"
},
"product_reference": "firefox-0:3.6.18-1.el5_6.x86_64",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-debuginfo-0:3.6.18-1.el5_6.i386 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.i386"
},
"product_reference": "firefox-debuginfo-0:3.6.18-1.el5_6.i386",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-debuginfo-0:3.6.18-1.el5_6.ia64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.ia64"
},
"product_reference": "firefox-debuginfo-0:3.6.18-1.el5_6.ia64",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-debuginfo-0:3.6.18-1.el5_6.ppc as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.ppc"
},
"product_reference": "firefox-debuginfo-0:3.6.18-1.el5_6.ppc",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-debuginfo-0:3.6.18-1.el5_6.s390 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.s390"
},
"product_reference": "firefox-debuginfo-0:3.6.18-1.el5_6.s390",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-debuginfo-0:3.6.18-1.el5_6.s390x as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.s390x"
},
"product_reference": "firefox-debuginfo-0:3.6.18-1.el5_6.s390x",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-debuginfo-0:3.6.18-1.el5_6.x86_64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.x86_64"
},
"product_reference": "firefox-debuginfo-0:3.6.18-1.el5_6.x86_64",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-0:1.9.2.18-2.el5_6.i386 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.i386"
},
"product_reference": "xulrunner-0:1.9.2.18-2.el5_6.i386",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-0:1.9.2.18-2.el5_6.ia64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ia64"
},
"product_reference": "xulrunner-0:1.9.2.18-2.el5_6.ia64",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-0:1.9.2.18-2.el5_6.ppc as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ppc"
},
"product_reference": "xulrunner-0:1.9.2.18-2.el5_6.ppc",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-0:1.9.2.18-2.el5_6.ppc64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ppc64"
},
"product_reference": "xulrunner-0:1.9.2.18-2.el5_6.ppc64",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-0:1.9.2.18-2.el5_6.s390 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.s390"
},
"product_reference": "xulrunner-0:1.9.2.18-2.el5_6.s390",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-0:1.9.2.18-2.el5_6.s390x as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.s390x"
},
"product_reference": "xulrunner-0:1.9.2.18-2.el5_6.s390x",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-0:1.9.2.18-2.el5_6.src as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.src"
},
"product_reference": "xulrunner-0:1.9.2.18-2.el5_6.src",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-0:1.9.2.18-2.el5_6.x86_64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.x86_64"
},
"product_reference": "xulrunner-0:1.9.2.18-2.el5_6.x86_64",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-debuginfo-0:1.9.2.18-2.el5_6.i386 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.i386"
},
"product_reference": "xulrunner-debuginfo-0:1.9.2.18-2.el5_6.i386",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ia64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ia64"
},
"product_reference": "xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ia64",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ppc as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ppc"
},
"product_reference": "xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ppc",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ppc64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ppc64"
},
"product_reference": "xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ppc64",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-debuginfo-0:1.9.2.18-2.el5_6.s390 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.s390"
},
"product_reference": "xulrunner-debuginfo-0:1.9.2.18-2.el5_6.s390",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-debuginfo-0:1.9.2.18-2.el5_6.s390x as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.s390x"
},
"product_reference": "xulrunner-debuginfo-0:1.9.2.18-2.el5_6.s390x",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-debuginfo-0:1.9.2.18-2.el5_6.x86_64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.x86_64"
},
"product_reference": "xulrunner-debuginfo-0:1.9.2.18-2.el5_6.x86_64",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-devel-0:1.9.2.18-2.el5_6.i386 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.i386"
},
"product_reference": "xulrunner-devel-0:1.9.2.18-2.el5_6.i386",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-devel-0:1.9.2.18-2.el5_6.ia64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ia64"
},
"product_reference": "xulrunner-devel-0:1.9.2.18-2.el5_6.ia64",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-devel-0:1.9.2.18-2.el5_6.ppc as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ppc"
},
"product_reference": "xulrunner-devel-0:1.9.2.18-2.el5_6.ppc",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-devel-0:1.9.2.18-2.el5_6.ppc64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ppc64"
},
"product_reference": "xulrunner-devel-0:1.9.2.18-2.el5_6.ppc64",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-devel-0:1.9.2.18-2.el5_6.s390 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.s390"
},
"product_reference": "xulrunner-devel-0:1.9.2.18-2.el5_6.s390",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-devel-0:1.9.2.18-2.el5_6.s390x as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.s390x"
},
"product_reference": "xulrunner-devel-0:1.9.2.18-2.el5_6.s390x",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-devel-0:1.9.2.18-2.el5_6.x86_64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.x86_64"
},
"product_reference": "xulrunner-devel-0:1.9.2.18-2.el5_6.x86_64",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-0:3.6.18-1.el6_1.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:firefox-0:3.6.18-1.el6_1.i686"
},
"product_reference": "firefox-0:3.6.18-1.el6_1.i686",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-0:3.6.18-1.el6_1.ppc as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:firefox-0:3.6.18-1.el6_1.ppc"
},
"product_reference": "firefox-0:3.6.18-1.el6_1.ppc",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-0:3.6.18-1.el6_1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:firefox-0:3.6.18-1.el6_1.ppc64"
},
"product_reference": "firefox-0:3.6.18-1.el6_1.ppc64",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-0:3.6.18-1.el6_1.s390 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:firefox-0:3.6.18-1.el6_1.s390"
},
"product_reference": "firefox-0:3.6.18-1.el6_1.s390",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-0:3.6.18-1.el6_1.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:firefox-0:3.6.18-1.el6_1.s390x"
},
"product_reference": "firefox-0:3.6.18-1.el6_1.s390x",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-0:3.6.18-1.el6_1.src as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:firefox-0:3.6.18-1.el6_1.src"
},
"product_reference": "firefox-0:3.6.18-1.el6_1.src",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-0:3.6.18-1.el6_1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:firefox-0:3.6.18-1.el6_1.x86_64"
},
"product_reference": "firefox-0:3.6.18-1.el6_1.x86_64",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-debuginfo-0:3.6.18-1.el6_1.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.i686"
},
"product_reference": "firefox-debuginfo-0:3.6.18-1.el6_1.i686",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-debuginfo-0:3.6.18-1.el6_1.ppc as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.ppc"
},
"product_reference": "firefox-debuginfo-0:3.6.18-1.el6_1.ppc",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-debuginfo-0:3.6.18-1.el6_1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.ppc64"
},
"product_reference": "firefox-debuginfo-0:3.6.18-1.el6_1.ppc64",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-debuginfo-0:3.6.18-1.el6_1.s390 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.s390"
},
"product_reference": "firefox-debuginfo-0:3.6.18-1.el6_1.s390",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-debuginfo-0:3.6.18-1.el6_1.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.s390x"
},
"product_reference": "firefox-debuginfo-0:3.6.18-1.el6_1.s390x",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-debuginfo-0:3.6.18-1.el6_1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.x86_64"
},
"product_reference": "firefox-debuginfo-0:3.6.18-1.el6_1.x86_64",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-0:1.9.2.18-2.el6_1.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.i686"
},
"product_reference": "xulrunner-0:1.9.2.18-2.el6_1.i686",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-0:1.9.2.18-2.el6_1.ppc as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc"
},
"product_reference": "xulrunner-0:1.9.2.18-2.el6_1.ppc",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-0:1.9.2.18-2.el6_1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc64"
},
"product_reference": "xulrunner-0:1.9.2.18-2.el6_1.ppc64",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-0:1.9.2.18-2.el6_1.s390 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390"
},
"product_reference": "xulrunner-0:1.9.2.18-2.el6_1.s390",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-0:1.9.2.18-2.el6_1.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390x"
},
"product_reference": "xulrunner-0:1.9.2.18-2.el6_1.s390x",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-0:1.9.2.18-2.el6_1.src as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.src"
},
"product_reference": "xulrunner-0:1.9.2.18-2.el6_1.src",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-0:1.9.2.18-2.el6_1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.x86_64"
},
"product_reference": "xulrunner-0:1.9.2.18-2.el6_1.x86_64",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-debuginfo-0:1.9.2.18-2.el6_1.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.i686"
},
"product_reference": "xulrunner-debuginfo-0:1.9.2.18-2.el6_1.i686",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc"
},
"product_reference": "xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc64"
},
"product_reference": "xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc64",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390"
},
"product_reference": "xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390x"
},
"product_reference": "xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390x",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-debuginfo-0:1.9.2.18-2.el6_1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.x86_64"
},
"product_reference": "xulrunner-debuginfo-0:1.9.2.18-2.el6_1.x86_64",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-devel-0:1.9.2.18-2.el6_1.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.i686"
},
"product_reference": "xulrunner-devel-0:1.9.2.18-2.el6_1.i686",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-devel-0:1.9.2.18-2.el6_1.ppc as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc"
},
"product_reference": "xulrunner-devel-0:1.9.2.18-2.el6_1.ppc",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-devel-0:1.9.2.18-2.el6_1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc64"
},
"product_reference": "xulrunner-devel-0:1.9.2.18-2.el6_1.ppc64",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-devel-0:1.9.2.18-2.el6_1.s390 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390"
},
"product_reference": "xulrunner-devel-0:1.9.2.18-2.el6_1.s390",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-devel-0:1.9.2.18-2.el6_1.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390x"
},
"product_reference": "xulrunner-devel-0:1.9.2.18-2.el6_1.s390x",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-devel-0:1.9.2.18-2.el6_1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.x86_64"
},
"product_reference": "xulrunner-devel-0:1.9.2.18-2.el6_1.x86_64",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-0:1.9.2.18-2.el6_1.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.i686"
},
"product_reference": "xulrunner-0:1.9.2.18-2.el6_1.i686",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-0:1.9.2.18-2.el6_1.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc"
},
"product_reference": "xulrunner-0:1.9.2.18-2.el6_1.ppc",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-0:1.9.2.18-2.el6_1.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc64"
},
"product_reference": "xulrunner-0:1.9.2.18-2.el6_1.ppc64",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-0:1.9.2.18-2.el6_1.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390"
},
"product_reference": "xulrunner-0:1.9.2.18-2.el6_1.s390",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-0:1.9.2.18-2.el6_1.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390x"
},
"product_reference": "xulrunner-0:1.9.2.18-2.el6_1.s390x",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-0:1.9.2.18-2.el6_1.src as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.src"
},
"product_reference": "xulrunner-0:1.9.2.18-2.el6_1.src",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-0:1.9.2.18-2.el6_1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.x86_64"
},
"product_reference": "xulrunner-0:1.9.2.18-2.el6_1.x86_64",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-debuginfo-0:1.9.2.18-2.el6_1.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.i686"
},
"product_reference": "xulrunner-debuginfo-0:1.9.2.18-2.el6_1.i686",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc"
},
"product_reference": "xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc64"
},
"product_reference": "xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc64",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390"
},
"product_reference": "xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390x"
},
"product_reference": "xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390x",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-debuginfo-0:1.9.2.18-2.el6_1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.x86_64"
},
"product_reference": "xulrunner-debuginfo-0:1.9.2.18-2.el6_1.x86_64",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-devel-0:1.9.2.18-2.el6_1.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.i686"
},
"product_reference": "xulrunner-devel-0:1.9.2.18-2.el6_1.i686",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-devel-0:1.9.2.18-2.el6_1.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc"
},
"product_reference": "xulrunner-devel-0:1.9.2.18-2.el6_1.ppc",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-devel-0:1.9.2.18-2.el6_1.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc64"
},
"product_reference": "xulrunner-devel-0:1.9.2.18-2.el6_1.ppc64",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-devel-0:1.9.2.18-2.el6_1.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390"
},
"product_reference": "xulrunner-devel-0:1.9.2.18-2.el6_1.s390",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-devel-0:1.9.2.18-2.el6_1.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390x"
},
"product_reference": "xulrunner-devel-0:1.9.2.18-2.el6_1.s390x",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-devel-0:1.9.2.18-2.el6_1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.x86_64"
},
"product_reference": "xulrunner-devel-0:1.9.2.18-2.el6_1.x86_64",
"relates_to_product_reference": "6Server-optional-6.1.z"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2011-0083",
"discovery_date": "2011-06-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "714581"
}
],
"notes": [
{
"category": "description",
"text": "Use-after-free vulnerability in the nsSVGPathSegList::ReplaceItem function in the implementation of SVG element lists in Mozilla Firefox before 3.6.18, Thunderbird before 3.1.11, and SeaMonkey through 2.0.14 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via vectors involving a user-supplied callback.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Mozilla Multiple dangling pointer vulnerabilities (MFSA 2011-23)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS:firefox-0:3.6.18-2.el4.i386",
"4AS:firefox-0:3.6.18-2.el4.ia64",
"4AS:firefox-0:3.6.18-2.el4.ppc",
"4AS:firefox-0:3.6.18-2.el4.s390",
"4AS:firefox-0:3.6.18-2.el4.s390x",
"4AS:firefox-0:3.6.18-2.el4.src",
"4AS:firefox-0:3.6.18-2.el4.x86_64",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"4Desktop:firefox-0:3.6.18-2.el4.i386",
"4Desktop:firefox-0:3.6.18-2.el4.ia64",
"4Desktop:firefox-0:3.6.18-2.el4.ppc",
"4Desktop:firefox-0:3.6.18-2.el4.s390",
"4Desktop:firefox-0:3.6.18-2.el4.s390x",
"4Desktop:firefox-0:3.6.18-2.el4.src",
"4Desktop:firefox-0:3.6.18-2.el4.x86_64",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"4ES:firefox-0:3.6.18-2.el4.i386",
"4ES:firefox-0:3.6.18-2.el4.ia64",
"4ES:firefox-0:3.6.18-2.el4.ppc",
"4ES:firefox-0:3.6.18-2.el4.s390",
"4ES:firefox-0:3.6.18-2.el4.s390x",
"4ES:firefox-0:3.6.18-2.el4.src",
"4ES:firefox-0:3.6.18-2.el4.x86_64",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"4WS:firefox-0:3.6.18-2.el4.i386",
"4WS:firefox-0:3.6.18-2.el4.ia64",
"4WS:firefox-0:3.6.18-2.el4.ppc",
"4WS:firefox-0:3.6.18-2.el4.s390",
"4WS:firefox-0:3.6.18-2.el4.s390x",
"4WS:firefox-0:3.6.18-2.el4.src",
"4WS:firefox-0:3.6.18-2.el4.x86_64",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.i386",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.ia64",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.ppc",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.s390",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.s390x",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.src",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.x86_64",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.i386",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.ia64",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.ppc",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.s390",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.s390x",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.x86_64",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.i386",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ia64",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ppc",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ppc64",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.s390",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.s390x",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.src",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.x86_64",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.i386",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ia64",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ppc",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ppc64",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.s390",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.s390x",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.x86_64",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.i386",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ia64",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ppc",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ppc64",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.s390",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.s390x",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.x86_64",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.i686",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.ppc",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.ppc64",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.s390",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.s390x",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.src",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.x86_64",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.i686",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.ppc",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.ppc64",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.s390",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.s390x",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.x86_64",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.i686",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc64",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390x",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.src",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.x86_64",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.i686",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc64",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390x",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.x86_64",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.i686",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc64",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390x",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.x86_64",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.i686",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc64",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390x",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.src",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.x86_64",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.i686",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc64",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390x",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.x86_64",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.i686",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc64",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390x",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-0083"
},
{
"category": "external",
"summary": "RHBZ#714581",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=714581"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-0083",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0083"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-0083",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-0083"
}
],
"release_date": "2011-06-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-06-21T22:39:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"4AS:firefox-0:3.6.18-2.el4.i386",
"4AS:firefox-0:3.6.18-2.el4.ia64",
"4AS:firefox-0:3.6.18-2.el4.ppc",
"4AS:firefox-0:3.6.18-2.el4.s390",
"4AS:firefox-0:3.6.18-2.el4.s390x",
"4AS:firefox-0:3.6.18-2.el4.src",
"4AS:firefox-0:3.6.18-2.el4.x86_64",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"4Desktop:firefox-0:3.6.18-2.el4.i386",
"4Desktop:firefox-0:3.6.18-2.el4.ia64",
"4Desktop:firefox-0:3.6.18-2.el4.ppc",
"4Desktop:firefox-0:3.6.18-2.el4.s390",
"4Desktop:firefox-0:3.6.18-2.el4.s390x",
"4Desktop:firefox-0:3.6.18-2.el4.src",
"4Desktop:firefox-0:3.6.18-2.el4.x86_64",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"4ES:firefox-0:3.6.18-2.el4.i386",
"4ES:firefox-0:3.6.18-2.el4.ia64",
"4ES:firefox-0:3.6.18-2.el4.ppc",
"4ES:firefox-0:3.6.18-2.el4.s390",
"4ES:firefox-0:3.6.18-2.el4.s390x",
"4ES:firefox-0:3.6.18-2.el4.src",
"4ES:firefox-0:3.6.18-2.el4.x86_64",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"4WS:firefox-0:3.6.18-2.el4.i386",
"4WS:firefox-0:3.6.18-2.el4.ia64",
"4WS:firefox-0:3.6.18-2.el4.ppc",
"4WS:firefox-0:3.6.18-2.el4.s390",
"4WS:firefox-0:3.6.18-2.el4.s390x",
"4WS:firefox-0:3.6.18-2.el4.src",
"4WS:firefox-0:3.6.18-2.el4.x86_64",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.i386",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.ia64",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.ppc",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.s390",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.s390x",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.src",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.x86_64",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.i386",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.ia64",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.ppc",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.s390",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.s390x",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.x86_64",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.i386",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ia64",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ppc",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ppc64",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.s390",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.s390x",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.src",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.x86_64",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.i386",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ia64",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ppc",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ppc64",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.s390",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.s390x",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.x86_64",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.i386",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ia64",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ppc",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ppc64",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.s390",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.s390x",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.x86_64",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.i686",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.ppc",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.ppc64",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.s390",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.s390x",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.src",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.x86_64",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.i686",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.ppc",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.ppc64",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.s390",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.s390x",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.x86_64",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.i686",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc64",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390x",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.src",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.x86_64",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.i686",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc64",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390x",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.x86_64",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.i686",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc64",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390x",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.x86_64",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.i686",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc64",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390x",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.src",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.x86_64",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.i686",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc64",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390x",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.x86_64",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.i686",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc64",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390x",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:0885"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS:firefox-0:3.6.18-2.el4.i386",
"4AS:firefox-0:3.6.18-2.el4.ia64",
"4AS:firefox-0:3.6.18-2.el4.ppc",
"4AS:firefox-0:3.6.18-2.el4.s390",
"4AS:firefox-0:3.6.18-2.el4.s390x",
"4AS:firefox-0:3.6.18-2.el4.src",
"4AS:firefox-0:3.6.18-2.el4.x86_64",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"4Desktop:firefox-0:3.6.18-2.el4.i386",
"4Desktop:firefox-0:3.6.18-2.el4.ia64",
"4Desktop:firefox-0:3.6.18-2.el4.ppc",
"4Desktop:firefox-0:3.6.18-2.el4.s390",
"4Desktop:firefox-0:3.6.18-2.el4.s390x",
"4Desktop:firefox-0:3.6.18-2.el4.src",
"4Desktop:firefox-0:3.6.18-2.el4.x86_64",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"4ES:firefox-0:3.6.18-2.el4.i386",
"4ES:firefox-0:3.6.18-2.el4.ia64",
"4ES:firefox-0:3.6.18-2.el4.ppc",
"4ES:firefox-0:3.6.18-2.el4.s390",
"4ES:firefox-0:3.6.18-2.el4.s390x",
"4ES:firefox-0:3.6.18-2.el4.src",
"4ES:firefox-0:3.6.18-2.el4.x86_64",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"4WS:firefox-0:3.6.18-2.el4.i386",
"4WS:firefox-0:3.6.18-2.el4.ia64",
"4WS:firefox-0:3.6.18-2.el4.ppc",
"4WS:firefox-0:3.6.18-2.el4.s390",
"4WS:firefox-0:3.6.18-2.el4.s390x",
"4WS:firefox-0:3.6.18-2.el4.src",
"4WS:firefox-0:3.6.18-2.el4.x86_64",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.i386",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.ia64",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.ppc",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.s390",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.s390x",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.src",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.x86_64",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.i386",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.ia64",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.ppc",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.s390",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.s390x",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.x86_64",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.i386",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ia64",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ppc",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ppc64",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.s390",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.s390x",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.src",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.x86_64",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.i386",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ia64",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ppc",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ppc64",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.s390",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.s390x",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.x86_64",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.i386",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ia64",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ppc",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ppc64",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.s390",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.s390x",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.x86_64",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.i686",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.ppc",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.ppc64",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.s390",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.s390x",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.src",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.x86_64",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.i686",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.ppc",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.ppc64",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.s390",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.s390x",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.x86_64",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.i686",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc64",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390x",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.src",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.x86_64",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.i686",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc64",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390x",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.x86_64",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.i686",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc64",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390x",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.x86_64",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.i686",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc64",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390x",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.src",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.x86_64",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.i686",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc64",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390x",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.x86_64",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.i686",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc64",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390x",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "Mozilla Multiple dangling pointer vulnerabilities (MFSA 2011-23)"
},
{
"cve": "CVE-2011-0085",
"discovery_date": "2011-06-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "714581"
}
],
"notes": [
{
"category": "description",
"text": "Use-after-free vulnerability in the nsXULCommandDispatcher function in Mozilla Firefox before 3.6.18, Thunderbird before 3.1.11, and SeaMonkey through 2.0.14 allows remote attackers to execute arbitrary code via a crafted XUL document that dequeues the current command updater.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Mozilla Multiple dangling pointer vulnerabilities (MFSA 2011-23)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS:firefox-0:3.6.18-2.el4.i386",
"4AS:firefox-0:3.6.18-2.el4.ia64",
"4AS:firefox-0:3.6.18-2.el4.ppc",
"4AS:firefox-0:3.6.18-2.el4.s390",
"4AS:firefox-0:3.6.18-2.el4.s390x",
"4AS:firefox-0:3.6.18-2.el4.src",
"4AS:firefox-0:3.6.18-2.el4.x86_64",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"4Desktop:firefox-0:3.6.18-2.el4.i386",
"4Desktop:firefox-0:3.6.18-2.el4.ia64",
"4Desktop:firefox-0:3.6.18-2.el4.ppc",
"4Desktop:firefox-0:3.6.18-2.el4.s390",
"4Desktop:firefox-0:3.6.18-2.el4.s390x",
"4Desktop:firefox-0:3.6.18-2.el4.src",
"4Desktop:firefox-0:3.6.18-2.el4.x86_64",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"4ES:firefox-0:3.6.18-2.el4.i386",
"4ES:firefox-0:3.6.18-2.el4.ia64",
"4ES:firefox-0:3.6.18-2.el4.ppc",
"4ES:firefox-0:3.6.18-2.el4.s390",
"4ES:firefox-0:3.6.18-2.el4.s390x",
"4ES:firefox-0:3.6.18-2.el4.src",
"4ES:firefox-0:3.6.18-2.el4.x86_64",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"4WS:firefox-0:3.6.18-2.el4.i386",
"4WS:firefox-0:3.6.18-2.el4.ia64",
"4WS:firefox-0:3.6.18-2.el4.ppc",
"4WS:firefox-0:3.6.18-2.el4.s390",
"4WS:firefox-0:3.6.18-2.el4.s390x",
"4WS:firefox-0:3.6.18-2.el4.src",
"4WS:firefox-0:3.6.18-2.el4.x86_64",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.i386",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.ia64",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.ppc",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.s390",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.s390x",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.src",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.x86_64",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.i386",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.ia64",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.ppc",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.s390",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.s390x",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.x86_64",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.i386",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ia64",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ppc",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ppc64",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.s390",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.s390x",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.src",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.x86_64",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.i386",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ia64",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ppc",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ppc64",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.s390",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.s390x",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.x86_64",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.i386",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ia64",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ppc",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ppc64",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.s390",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.s390x",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.x86_64",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.i686",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.ppc",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.ppc64",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.s390",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.s390x",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.src",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.x86_64",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.i686",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.ppc",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.ppc64",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.s390",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.s390x",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.x86_64",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.i686",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc64",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390x",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.src",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.x86_64",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.i686",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc64",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390x",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.x86_64",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.i686",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc64",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390x",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.x86_64",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.i686",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc64",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390x",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.src",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.x86_64",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.i686",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc64",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390x",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.x86_64",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.i686",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc64",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390x",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-0085"
},
{
"category": "external",
"summary": "RHBZ#714581",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=714581"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-0085",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0085"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-0085",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-0085"
}
],
"release_date": "2011-06-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-06-21T22:39:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"4AS:firefox-0:3.6.18-2.el4.i386",
"4AS:firefox-0:3.6.18-2.el4.ia64",
"4AS:firefox-0:3.6.18-2.el4.ppc",
"4AS:firefox-0:3.6.18-2.el4.s390",
"4AS:firefox-0:3.6.18-2.el4.s390x",
"4AS:firefox-0:3.6.18-2.el4.src",
"4AS:firefox-0:3.6.18-2.el4.x86_64",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"4Desktop:firefox-0:3.6.18-2.el4.i386",
"4Desktop:firefox-0:3.6.18-2.el4.ia64",
"4Desktop:firefox-0:3.6.18-2.el4.ppc",
"4Desktop:firefox-0:3.6.18-2.el4.s390",
"4Desktop:firefox-0:3.6.18-2.el4.s390x",
"4Desktop:firefox-0:3.6.18-2.el4.src",
"4Desktop:firefox-0:3.6.18-2.el4.x86_64",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"4ES:firefox-0:3.6.18-2.el4.i386",
"4ES:firefox-0:3.6.18-2.el4.ia64",
"4ES:firefox-0:3.6.18-2.el4.ppc",
"4ES:firefox-0:3.6.18-2.el4.s390",
"4ES:firefox-0:3.6.18-2.el4.s390x",
"4ES:firefox-0:3.6.18-2.el4.src",
"4ES:firefox-0:3.6.18-2.el4.x86_64",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"4WS:firefox-0:3.6.18-2.el4.i386",
"4WS:firefox-0:3.6.18-2.el4.ia64",
"4WS:firefox-0:3.6.18-2.el4.ppc",
"4WS:firefox-0:3.6.18-2.el4.s390",
"4WS:firefox-0:3.6.18-2.el4.s390x",
"4WS:firefox-0:3.6.18-2.el4.src",
"4WS:firefox-0:3.6.18-2.el4.x86_64",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.i386",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.ia64",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.ppc",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.s390",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.s390x",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.src",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.x86_64",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.i386",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.ia64",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.ppc",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.s390",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.s390x",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.x86_64",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.i386",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ia64",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ppc",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ppc64",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.s390",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.s390x",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.src",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.x86_64",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.i386",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ia64",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ppc",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ppc64",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.s390",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.s390x",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.x86_64",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.i386",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ia64",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ppc",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ppc64",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.s390",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.s390x",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.x86_64",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.i686",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.ppc",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.ppc64",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.s390",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.s390x",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.src",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.x86_64",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.i686",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.ppc",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.ppc64",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.s390",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.s390x",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.x86_64",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.i686",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc64",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390x",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.src",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.x86_64",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.i686",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc64",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390x",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.x86_64",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.i686",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc64",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390x",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.x86_64",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.i686",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc64",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390x",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.src",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.x86_64",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.i686",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc64",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390x",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.x86_64",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.i686",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc64",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390x",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:0885"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS:firefox-0:3.6.18-2.el4.i386",
"4AS:firefox-0:3.6.18-2.el4.ia64",
"4AS:firefox-0:3.6.18-2.el4.ppc",
"4AS:firefox-0:3.6.18-2.el4.s390",
"4AS:firefox-0:3.6.18-2.el4.s390x",
"4AS:firefox-0:3.6.18-2.el4.src",
"4AS:firefox-0:3.6.18-2.el4.x86_64",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"4Desktop:firefox-0:3.6.18-2.el4.i386",
"4Desktop:firefox-0:3.6.18-2.el4.ia64",
"4Desktop:firefox-0:3.6.18-2.el4.ppc",
"4Desktop:firefox-0:3.6.18-2.el4.s390",
"4Desktop:firefox-0:3.6.18-2.el4.s390x",
"4Desktop:firefox-0:3.6.18-2.el4.src",
"4Desktop:firefox-0:3.6.18-2.el4.x86_64",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"4ES:firefox-0:3.6.18-2.el4.i386",
"4ES:firefox-0:3.6.18-2.el4.ia64",
"4ES:firefox-0:3.6.18-2.el4.ppc",
"4ES:firefox-0:3.6.18-2.el4.s390",
"4ES:firefox-0:3.6.18-2.el4.s390x",
"4ES:firefox-0:3.6.18-2.el4.src",
"4ES:firefox-0:3.6.18-2.el4.x86_64",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"4WS:firefox-0:3.6.18-2.el4.i386",
"4WS:firefox-0:3.6.18-2.el4.ia64",
"4WS:firefox-0:3.6.18-2.el4.ppc",
"4WS:firefox-0:3.6.18-2.el4.s390",
"4WS:firefox-0:3.6.18-2.el4.s390x",
"4WS:firefox-0:3.6.18-2.el4.src",
"4WS:firefox-0:3.6.18-2.el4.x86_64",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.i386",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.ia64",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.ppc",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.s390",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.s390x",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.src",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.x86_64",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.i386",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.ia64",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.ppc",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.s390",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.s390x",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.x86_64",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.i386",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ia64",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ppc",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ppc64",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.s390",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.s390x",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.src",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.x86_64",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.i386",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ia64",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ppc",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ppc64",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.s390",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.s390x",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.x86_64",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.i386",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ia64",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ppc",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ppc64",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.s390",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.s390x",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.x86_64",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.i686",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.ppc",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.ppc64",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.s390",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.s390x",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.src",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.x86_64",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.i686",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.ppc",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.ppc64",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.s390",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.s390x",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.x86_64",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.i686",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc64",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390x",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.src",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.x86_64",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.i686",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc64",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390x",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.x86_64",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.i686",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc64",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390x",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.x86_64",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.i686",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc64",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390x",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.src",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.x86_64",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.i686",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc64",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390x",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.x86_64",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.i686",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc64",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390x",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "Mozilla Multiple dangling pointer vulnerabilities (MFSA 2011-23)"
},
{
"cve": "CVE-2011-2362",
"discovery_date": "2011-06-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "714583"
}
],
"notes": [
{
"category": "description",
"text": "Mozilla Firefox before 3.6.18, Thunderbird before 3.1.11, and SeaMonkey through 2.0.14 do not distinguish between cookies for two domain names that differ only in a trailing dot, which allows remote web servers to bypass the Same Origin Policy via Set-Cookie headers.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Mozilla Cookie isolation error (MFSA 2011-24)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS:firefox-0:3.6.18-2.el4.i386",
"4AS:firefox-0:3.6.18-2.el4.ia64",
"4AS:firefox-0:3.6.18-2.el4.ppc",
"4AS:firefox-0:3.6.18-2.el4.s390",
"4AS:firefox-0:3.6.18-2.el4.s390x",
"4AS:firefox-0:3.6.18-2.el4.src",
"4AS:firefox-0:3.6.18-2.el4.x86_64",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"4Desktop:firefox-0:3.6.18-2.el4.i386",
"4Desktop:firefox-0:3.6.18-2.el4.ia64",
"4Desktop:firefox-0:3.6.18-2.el4.ppc",
"4Desktop:firefox-0:3.6.18-2.el4.s390",
"4Desktop:firefox-0:3.6.18-2.el4.s390x",
"4Desktop:firefox-0:3.6.18-2.el4.src",
"4Desktop:firefox-0:3.6.18-2.el4.x86_64",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"4ES:firefox-0:3.6.18-2.el4.i386",
"4ES:firefox-0:3.6.18-2.el4.ia64",
"4ES:firefox-0:3.6.18-2.el4.ppc",
"4ES:firefox-0:3.6.18-2.el4.s390",
"4ES:firefox-0:3.6.18-2.el4.s390x",
"4ES:firefox-0:3.6.18-2.el4.src",
"4ES:firefox-0:3.6.18-2.el4.x86_64",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"4WS:firefox-0:3.6.18-2.el4.i386",
"4WS:firefox-0:3.6.18-2.el4.ia64",
"4WS:firefox-0:3.6.18-2.el4.ppc",
"4WS:firefox-0:3.6.18-2.el4.s390",
"4WS:firefox-0:3.6.18-2.el4.s390x",
"4WS:firefox-0:3.6.18-2.el4.src",
"4WS:firefox-0:3.6.18-2.el4.x86_64",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.i386",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.ia64",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.ppc",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.s390",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.s390x",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.src",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.x86_64",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.i386",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.ia64",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.ppc",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.s390",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.s390x",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.x86_64",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.i386",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ia64",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ppc",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ppc64",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.s390",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.s390x",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.src",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.x86_64",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.i386",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ia64",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ppc",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ppc64",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.s390",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.s390x",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.x86_64",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.i386",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ia64",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ppc",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ppc64",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.s390",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.s390x",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.x86_64",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.i686",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.ppc",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.ppc64",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.s390",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.s390x",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.src",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.x86_64",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.i686",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.ppc",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.ppc64",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.s390",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.s390x",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.x86_64",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.i686",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc64",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390x",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.src",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.x86_64",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.i686",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc64",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390x",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.x86_64",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.i686",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc64",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390x",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.x86_64",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.i686",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc64",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390x",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.src",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.x86_64",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.i686",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc64",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390x",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.x86_64",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.i686",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc64",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390x",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-2362"
},
{
"category": "external",
"summary": "RHBZ#714583",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=714583"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-2362",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2362"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-2362",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-2362"
}
],
"release_date": "2011-06-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-06-21T22:39:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"4AS:firefox-0:3.6.18-2.el4.i386",
"4AS:firefox-0:3.6.18-2.el4.ia64",
"4AS:firefox-0:3.6.18-2.el4.ppc",
"4AS:firefox-0:3.6.18-2.el4.s390",
"4AS:firefox-0:3.6.18-2.el4.s390x",
"4AS:firefox-0:3.6.18-2.el4.src",
"4AS:firefox-0:3.6.18-2.el4.x86_64",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"4Desktop:firefox-0:3.6.18-2.el4.i386",
"4Desktop:firefox-0:3.6.18-2.el4.ia64",
"4Desktop:firefox-0:3.6.18-2.el4.ppc",
"4Desktop:firefox-0:3.6.18-2.el4.s390",
"4Desktop:firefox-0:3.6.18-2.el4.s390x",
"4Desktop:firefox-0:3.6.18-2.el4.src",
"4Desktop:firefox-0:3.6.18-2.el4.x86_64",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"4ES:firefox-0:3.6.18-2.el4.i386",
"4ES:firefox-0:3.6.18-2.el4.ia64",
"4ES:firefox-0:3.6.18-2.el4.ppc",
"4ES:firefox-0:3.6.18-2.el4.s390",
"4ES:firefox-0:3.6.18-2.el4.s390x",
"4ES:firefox-0:3.6.18-2.el4.src",
"4ES:firefox-0:3.6.18-2.el4.x86_64",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"4WS:firefox-0:3.6.18-2.el4.i386",
"4WS:firefox-0:3.6.18-2.el4.ia64",
"4WS:firefox-0:3.6.18-2.el4.ppc",
"4WS:firefox-0:3.6.18-2.el4.s390",
"4WS:firefox-0:3.6.18-2.el4.s390x",
"4WS:firefox-0:3.6.18-2.el4.src",
"4WS:firefox-0:3.6.18-2.el4.x86_64",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.i386",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.ia64",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.ppc",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.s390",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.s390x",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.src",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.x86_64",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.i386",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.ia64",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.ppc",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.s390",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.s390x",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.x86_64",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.i386",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ia64",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ppc",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ppc64",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.s390",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.s390x",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.src",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.x86_64",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.i386",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ia64",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ppc",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ppc64",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.s390",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.s390x",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.x86_64",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.i386",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ia64",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ppc",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ppc64",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.s390",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.s390x",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.x86_64",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.i686",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.ppc",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.ppc64",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.s390",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.s390x",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.src",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.x86_64",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.i686",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.ppc",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.ppc64",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.s390",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.s390x",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.x86_64",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.i686",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc64",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390x",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.src",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.x86_64",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.i686",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc64",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390x",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.x86_64",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.i686",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc64",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390x",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.x86_64",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.i686",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc64",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390x",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.src",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.x86_64",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.i686",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc64",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390x",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.x86_64",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.i686",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc64",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390x",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:0885"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.1,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS:firefox-0:3.6.18-2.el4.i386",
"4AS:firefox-0:3.6.18-2.el4.ia64",
"4AS:firefox-0:3.6.18-2.el4.ppc",
"4AS:firefox-0:3.6.18-2.el4.s390",
"4AS:firefox-0:3.6.18-2.el4.s390x",
"4AS:firefox-0:3.6.18-2.el4.src",
"4AS:firefox-0:3.6.18-2.el4.x86_64",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"4Desktop:firefox-0:3.6.18-2.el4.i386",
"4Desktop:firefox-0:3.6.18-2.el4.ia64",
"4Desktop:firefox-0:3.6.18-2.el4.ppc",
"4Desktop:firefox-0:3.6.18-2.el4.s390",
"4Desktop:firefox-0:3.6.18-2.el4.s390x",
"4Desktop:firefox-0:3.6.18-2.el4.src",
"4Desktop:firefox-0:3.6.18-2.el4.x86_64",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"4ES:firefox-0:3.6.18-2.el4.i386",
"4ES:firefox-0:3.6.18-2.el4.ia64",
"4ES:firefox-0:3.6.18-2.el4.ppc",
"4ES:firefox-0:3.6.18-2.el4.s390",
"4ES:firefox-0:3.6.18-2.el4.s390x",
"4ES:firefox-0:3.6.18-2.el4.src",
"4ES:firefox-0:3.6.18-2.el4.x86_64",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"4WS:firefox-0:3.6.18-2.el4.i386",
"4WS:firefox-0:3.6.18-2.el4.ia64",
"4WS:firefox-0:3.6.18-2.el4.ppc",
"4WS:firefox-0:3.6.18-2.el4.s390",
"4WS:firefox-0:3.6.18-2.el4.s390x",
"4WS:firefox-0:3.6.18-2.el4.src",
"4WS:firefox-0:3.6.18-2.el4.x86_64",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.i386",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.ia64",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.ppc",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.s390",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.s390x",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.src",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.x86_64",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.i386",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.ia64",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.ppc",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.s390",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.s390x",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.x86_64",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.i386",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ia64",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ppc",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ppc64",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.s390",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.s390x",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.src",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.x86_64",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.i386",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ia64",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ppc",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ppc64",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.s390",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.s390x",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.x86_64",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.i386",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ia64",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ppc",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ppc64",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.s390",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.s390x",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.x86_64",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.i686",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.ppc",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.ppc64",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.s390",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.s390x",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.src",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.x86_64",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.i686",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.ppc",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.ppc64",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.s390",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.s390x",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.x86_64",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.i686",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc64",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390x",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.src",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.x86_64",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.i686",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc64",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390x",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.x86_64",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.i686",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc64",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390x",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.x86_64",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.i686",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc64",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390x",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.src",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.x86_64",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.i686",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc64",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390x",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.x86_64",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.i686",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc64",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390x",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "Mozilla Cookie isolation error (MFSA 2011-24)"
},
{
"cve": "CVE-2011-2363",
"discovery_date": "2011-06-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "714581"
}
],
"notes": [
{
"category": "description",
"text": "Use-after-free vulnerability in the nsSVGPointList::AppendElement function in the implementation of SVG element lists in Mozilla Firefox before 3.6.18, Thunderbird before 3.1.11, and SeaMonkey through 2.0.14 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via vectors involving a user-supplied callback.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Mozilla Multiple dangling pointer vulnerabilities (MFSA 2011-23)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS:firefox-0:3.6.18-2.el4.i386",
"4AS:firefox-0:3.6.18-2.el4.ia64",
"4AS:firefox-0:3.6.18-2.el4.ppc",
"4AS:firefox-0:3.6.18-2.el4.s390",
"4AS:firefox-0:3.6.18-2.el4.s390x",
"4AS:firefox-0:3.6.18-2.el4.src",
"4AS:firefox-0:3.6.18-2.el4.x86_64",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"4Desktop:firefox-0:3.6.18-2.el4.i386",
"4Desktop:firefox-0:3.6.18-2.el4.ia64",
"4Desktop:firefox-0:3.6.18-2.el4.ppc",
"4Desktop:firefox-0:3.6.18-2.el4.s390",
"4Desktop:firefox-0:3.6.18-2.el4.s390x",
"4Desktop:firefox-0:3.6.18-2.el4.src",
"4Desktop:firefox-0:3.6.18-2.el4.x86_64",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"4ES:firefox-0:3.6.18-2.el4.i386",
"4ES:firefox-0:3.6.18-2.el4.ia64",
"4ES:firefox-0:3.6.18-2.el4.ppc",
"4ES:firefox-0:3.6.18-2.el4.s390",
"4ES:firefox-0:3.6.18-2.el4.s390x",
"4ES:firefox-0:3.6.18-2.el4.src",
"4ES:firefox-0:3.6.18-2.el4.x86_64",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"4WS:firefox-0:3.6.18-2.el4.i386",
"4WS:firefox-0:3.6.18-2.el4.ia64",
"4WS:firefox-0:3.6.18-2.el4.ppc",
"4WS:firefox-0:3.6.18-2.el4.s390",
"4WS:firefox-0:3.6.18-2.el4.s390x",
"4WS:firefox-0:3.6.18-2.el4.src",
"4WS:firefox-0:3.6.18-2.el4.x86_64",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.i386",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.ia64",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.ppc",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.s390",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.s390x",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.src",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.x86_64",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.i386",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.ia64",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.ppc",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.s390",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.s390x",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.x86_64",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.i386",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ia64",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ppc",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ppc64",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.s390",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.s390x",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.src",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.x86_64",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.i386",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ia64",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ppc",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ppc64",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.s390",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.s390x",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.x86_64",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.i386",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ia64",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ppc",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ppc64",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.s390",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.s390x",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.x86_64",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.i686",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.ppc",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.ppc64",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.s390",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.s390x",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.src",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.x86_64",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.i686",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.ppc",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.ppc64",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.s390",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.s390x",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.x86_64",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.i686",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc64",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390x",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.src",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.x86_64",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.i686",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc64",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390x",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.x86_64",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.i686",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc64",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390x",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.x86_64",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.i686",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc64",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390x",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.src",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.x86_64",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.i686",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc64",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390x",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.x86_64",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.i686",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc64",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390x",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-2363"
},
{
"category": "external",
"summary": "RHBZ#714581",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=714581"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-2363",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2363"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-2363",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-2363"
}
],
"release_date": "2011-06-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-06-21T22:39:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"4AS:firefox-0:3.6.18-2.el4.i386",
"4AS:firefox-0:3.6.18-2.el4.ia64",
"4AS:firefox-0:3.6.18-2.el4.ppc",
"4AS:firefox-0:3.6.18-2.el4.s390",
"4AS:firefox-0:3.6.18-2.el4.s390x",
"4AS:firefox-0:3.6.18-2.el4.src",
"4AS:firefox-0:3.6.18-2.el4.x86_64",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"4Desktop:firefox-0:3.6.18-2.el4.i386",
"4Desktop:firefox-0:3.6.18-2.el4.ia64",
"4Desktop:firefox-0:3.6.18-2.el4.ppc",
"4Desktop:firefox-0:3.6.18-2.el4.s390",
"4Desktop:firefox-0:3.6.18-2.el4.s390x",
"4Desktop:firefox-0:3.6.18-2.el4.src",
"4Desktop:firefox-0:3.6.18-2.el4.x86_64",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"4ES:firefox-0:3.6.18-2.el4.i386",
"4ES:firefox-0:3.6.18-2.el4.ia64",
"4ES:firefox-0:3.6.18-2.el4.ppc",
"4ES:firefox-0:3.6.18-2.el4.s390",
"4ES:firefox-0:3.6.18-2.el4.s390x",
"4ES:firefox-0:3.6.18-2.el4.src",
"4ES:firefox-0:3.6.18-2.el4.x86_64",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"4WS:firefox-0:3.6.18-2.el4.i386",
"4WS:firefox-0:3.6.18-2.el4.ia64",
"4WS:firefox-0:3.6.18-2.el4.ppc",
"4WS:firefox-0:3.6.18-2.el4.s390",
"4WS:firefox-0:3.6.18-2.el4.s390x",
"4WS:firefox-0:3.6.18-2.el4.src",
"4WS:firefox-0:3.6.18-2.el4.x86_64",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.i386",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.ia64",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.ppc",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.s390",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.s390x",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.src",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.x86_64",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.i386",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.ia64",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.ppc",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.s390",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.s390x",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.x86_64",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.i386",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ia64",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ppc",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ppc64",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.s390",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.s390x",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.src",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.x86_64",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.i386",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ia64",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ppc",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ppc64",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.s390",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.s390x",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.x86_64",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.i386",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ia64",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ppc",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ppc64",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.s390",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.s390x",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.x86_64",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.i686",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.ppc",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.ppc64",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.s390",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.s390x",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.src",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.x86_64",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.i686",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.ppc",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.ppc64",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.s390",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.s390x",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.x86_64",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.i686",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc64",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390x",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.src",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.x86_64",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.i686",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc64",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390x",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.x86_64",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.i686",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc64",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390x",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.x86_64",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.i686",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc64",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390x",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.src",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.x86_64",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.i686",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc64",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390x",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.x86_64",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.i686",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc64",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390x",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:0885"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS:firefox-0:3.6.18-2.el4.i386",
"4AS:firefox-0:3.6.18-2.el4.ia64",
"4AS:firefox-0:3.6.18-2.el4.ppc",
"4AS:firefox-0:3.6.18-2.el4.s390",
"4AS:firefox-0:3.6.18-2.el4.s390x",
"4AS:firefox-0:3.6.18-2.el4.src",
"4AS:firefox-0:3.6.18-2.el4.x86_64",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"4Desktop:firefox-0:3.6.18-2.el4.i386",
"4Desktop:firefox-0:3.6.18-2.el4.ia64",
"4Desktop:firefox-0:3.6.18-2.el4.ppc",
"4Desktop:firefox-0:3.6.18-2.el4.s390",
"4Desktop:firefox-0:3.6.18-2.el4.s390x",
"4Desktop:firefox-0:3.6.18-2.el4.src",
"4Desktop:firefox-0:3.6.18-2.el4.x86_64",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"4ES:firefox-0:3.6.18-2.el4.i386",
"4ES:firefox-0:3.6.18-2.el4.ia64",
"4ES:firefox-0:3.6.18-2.el4.ppc",
"4ES:firefox-0:3.6.18-2.el4.s390",
"4ES:firefox-0:3.6.18-2.el4.s390x",
"4ES:firefox-0:3.6.18-2.el4.src",
"4ES:firefox-0:3.6.18-2.el4.x86_64",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"4WS:firefox-0:3.6.18-2.el4.i386",
"4WS:firefox-0:3.6.18-2.el4.ia64",
"4WS:firefox-0:3.6.18-2.el4.ppc",
"4WS:firefox-0:3.6.18-2.el4.s390",
"4WS:firefox-0:3.6.18-2.el4.s390x",
"4WS:firefox-0:3.6.18-2.el4.src",
"4WS:firefox-0:3.6.18-2.el4.x86_64",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.i386",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.ia64",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.ppc",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.s390",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.s390x",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.src",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.x86_64",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.i386",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.ia64",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.ppc",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.s390",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.s390x",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.x86_64",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.i386",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ia64",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ppc",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ppc64",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.s390",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.s390x",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.src",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.x86_64",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.i386",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ia64",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ppc",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ppc64",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.s390",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.s390x",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.x86_64",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.i386",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ia64",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ppc",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ppc64",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.s390",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.s390x",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.x86_64",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.i686",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.ppc",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.ppc64",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.s390",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.s390x",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.src",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.x86_64",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.i686",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.ppc",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.ppc64",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.s390",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.s390x",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.x86_64",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.i686",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc64",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390x",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.src",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.x86_64",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.i686",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc64",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390x",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.x86_64",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.i686",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc64",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390x",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.x86_64",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.i686",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc64",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390x",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.src",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.x86_64",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.i686",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc64",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390x",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.x86_64",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.i686",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc64",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390x",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "Mozilla Multiple dangling pointer vulnerabilities (MFSA 2011-23)"
},
{
"cve": "CVE-2011-2364",
"discovery_date": "2011-06-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "714576"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the browser engine in Mozilla Firefox 3.6.x before 3.6.18 and Thunderbird before 3.1.11 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors, a different vulnerability than CVE-2011-2365.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Mozilla Miscellaneous memory safety hazards (MFSA 2011-19)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS:firefox-0:3.6.18-2.el4.i386",
"4AS:firefox-0:3.6.18-2.el4.ia64",
"4AS:firefox-0:3.6.18-2.el4.ppc",
"4AS:firefox-0:3.6.18-2.el4.s390",
"4AS:firefox-0:3.6.18-2.el4.s390x",
"4AS:firefox-0:3.6.18-2.el4.src",
"4AS:firefox-0:3.6.18-2.el4.x86_64",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"4Desktop:firefox-0:3.6.18-2.el4.i386",
"4Desktop:firefox-0:3.6.18-2.el4.ia64",
"4Desktop:firefox-0:3.6.18-2.el4.ppc",
"4Desktop:firefox-0:3.6.18-2.el4.s390",
"4Desktop:firefox-0:3.6.18-2.el4.s390x",
"4Desktop:firefox-0:3.6.18-2.el4.src",
"4Desktop:firefox-0:3.6.18-2.el4.x86_64",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"4ES:firefox-0:3.6.18-2.el4.i386",
"4ES:firefox-0:3.6.18-2.el4.ia64",
"4ES:firefox-0:3.6.18-2.el4.ppc",
"4ES:firefox-0:3.6.18-2.el4.s390",
"4ES:firefox-0:3.6.18-2.el4.s390x",
"4ES:firefox-0:3.6.18-2.el4.src",
"4ES:firefox-0:3.6.18-2.el4.x86_64",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"4WS:firefox-0:3.6.18-2.el4.i386",
"4WS:firefox-0:3.6.18-2.el4.ia64",
"4WS:firefox-0:3.6.18-2.el4.ppc",
"4WS:firefox-0:3.6.18-2.el4.s390",
"4WS:firefox-0:3.6.18-2.el4.s390x",
"4WS:firefox-0:3.6.18-2.el4.src",
"4WS:firefox-0:3.6.18-2.el4.x86_64",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.i386",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.ia64",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.ppc",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.s390",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.s390x",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.src",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.x86_64",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.i386",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.ia64",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.ppc",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.s390",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.s390x",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.x86_64",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.i386",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ia64",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ppc",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ppc64",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.s390",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.s390x",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.src",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.x86_64",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.i386",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ia64",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ppc",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ppc64",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.s390",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.s390x",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.x86_64",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.i386",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ia64",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ppc",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ppc64",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.s390",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.s390x",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.x86_64",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.i686",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.ppc",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.ppc64",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.s390",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.s390x",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.src",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.x86_64",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.i686",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.ppc",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.ppc64",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.s390",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.s390x",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.x86_64",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.i686",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc64",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390x",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.src",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.x86_64",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.i686",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc64",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390x",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.x86_64",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.i686",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc64",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390x",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.x86_64",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.i686",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc64",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390x",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.src",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.x86_64",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.i686",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc64",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390x",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.x86_64",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.i686",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc64",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390x",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-2364"
},
{
"category": "external",
"summary": "RHBZ#714576",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=714576"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-2364",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2364"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-2364",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-2364"
}
],
"release_date": "2011-06-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-06-21T22:39:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"4AS:firefox-0:3.6.18-2.el4.i386",
"4AS:firefox-0:3.6.18-2.el4.ia64",
"4AS:firefox-0:3.6.18-2.el4.ppc",
"4AS:firefox-0:3.6.18-2.el4.s390",
"4AS:firefox-0:3.6.18-2.el4.s390x",
"4AS:firefox-0:3.6.18-2.el4.src",
"4AS:firefox-0:3.6.18-2.el4.x86_64",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"4Desktop:firefox-0:3.6.18-2.el4.i386",
"4Desktop:firefox-0:3.6.18-2.el4.ia64",
"4Desktop:firefox-0:3.6.18-2.el4.ppc",
"4Desktop:firefox-0:3.6.18-2.el4.s390",
"4Desktop:firefox-0:3.6.18-2.el4.s390x",
"4Desktop:firefox-0:3.6.18-2.el4.src",
"4Desktop:firefox-0:3.6.18-2.el4.x86_64",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"4ES:firefox-0:3.6.18-2.el4.i386",
"4ES:firefox-0:3.6.18-2.el4.ia64",
"4ES:firefox-0:3.6.18-2.el4.ppc",
"4ES:firefox-0:3.6.18-2.el4.s390",
"4ES:firefox-0:3.6.18-2.el4.s390x",
"4ES:firefox-0:3.6.18-2.el4.src",
"4ES:firefox-0:3.6.18-2.el4.x86_64",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"4WS:firefox-0:3.6.18-2.el4.i386",
"4WS:firefox-0:3.6.18-2.el4.ia64",
"4WS:firefox-0:3.6.18-2.el4.ppc",
"4WS:firefox-0:3.6.18-2.el4.s390",
"4WS:firefox-0:3.6.18-2.el4.s390x",
"4WS:firefox-0:3.6.18-2.el4.src",
"4WS:firefox-0:3.6.18-2.el4.x86_64",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.i386",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.ia64",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.ppc",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.s390",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.s390x",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.src",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.x86_64",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.i386",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.ia64",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.ppc",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.s390",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.s390x",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.x86_64",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.i386",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ia64",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ppc",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ppc64",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.s390",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.s390x",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.src",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.x86_64",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.i386",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ia64",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ppc",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ppc64",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.s390",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.s390x",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.x86_64",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.i386",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ia64",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ppc",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ppc64",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.s390",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.s390x",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.x86_64",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.i686",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.ppc",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.ppc64",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.s390",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.s390x",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.src",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.x86_64",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.i686",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.ppc",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.ppc64",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.s390",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.s390x",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.x86_64",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.i686",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc64",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390x",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.src",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.x86_64",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.i686",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc64",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390x",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.x86_64",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.i686",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc64",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390x",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.x86_64",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.i686",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc64",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390x",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.src",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.x86_64",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.i686",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc64",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390x",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.x86_64",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.i686",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc64",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390x",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:0885"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS:firefox-0:3.6.18-2.el4.i386",
"4AS:firefox-0:3.6.18-2.el4.ia64",
"4AS:firefox-0:3.6.18-2.el4.ppc",
"4AS:firefox-0:3.6.18-2.el4.s390",
"4AS:firefox-0:3.6.18-2.el4.s390x",
"4AS:firefox-0:3.6.18-2.el4.src",
"4AS:firefox-0:3.6.18-2.el4.x86_64",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"4Desktop:firefox-0:3.6.18-2.el4.i386",
"4Desktop:firefox-0:3.6.18-2.el4.ia64",
"4Desktop:firefox-0:3.6.18-2.el4.ppc",
"4Desktop:firefox-0:3.6.18-2.el4.s390",
"4Desktop:firefox-0:3.6.18-2.el4.s390x",
"4Desktop:firefox-0:3.6.18-2.el4.src",
"4Desktop:firefox-0:3.6.18-2.el4.x86_64",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"4ES:firefox-0:3.6.18-2.el4.i386",
"4ES:firefox-0:3.6.18-2.el4.ia64",
"4ES:firefox-0:3.6.18-2.el4.ppc",
"4ES:firefox-0:3.6.18-2.el4.s390",
"4ES:firefox-0:3.6.18-2.el4.s390x",
"4ES:firefox-0:3.6.18-2.el4.src",
"4ES:firefox-0:3.6.18-2.el4.x86_64",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"4WS:firefox-0:3.6.18-2.el4.i386",
"4WS:firefox-0:3.6.18-2.el4.ia64",
"4WS:firefox-0:3.6.18-2.el4.ppc",
"4WS:firefox-0:3.6.18-2.el4.s390",
"4WS:firefox-0:3.6.18-2.el4.s390x",
"4WS:firefox-0:3.6.18-2.el4.src",
"4WS:firefox-0:3.6.18-2.el4.x86_64",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.i386",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.ia64",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.ppc",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.s390",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.s390x",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.src",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.x86_64",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.i386",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.ia64",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.ppc",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.s390",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.s390x",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.x86_64",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.i386",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ia64",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ppc",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ppc64",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.s390",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.s390x",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.src",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.x86_64",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.i386",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ia64",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ppc",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ppc64",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.s390",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.s390x",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.x86_64",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.i386",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ia64",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ppc",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ppc64",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.s390",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.s390x",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.x86_64",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.i686",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.ppc",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.ppc64",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.s390",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.s390x",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.src",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.x86_64",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.i686",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.ppc",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.ppc64",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.s390",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.s390x",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.x86_64",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.i686",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc64",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390x",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.src",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.x86_64",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.i686",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc64",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390x",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.x86_64",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.i686",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc64",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390x",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.x86_64",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.i686",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc64",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390x",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.src",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.x86_64",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.i686",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc64",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390x",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.x86_64",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.i686",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc64",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390x",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "Mozilla Miscellaneous memory safety hazards (MFSA 2011-19)"
},
{
"cve": "CVE-2011-2365",
"discovery_date": "2011-06-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "714576"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the browser engine in Mozilla Firefox 3.6.x before 3.6.18 and Thunderbird before 3.1.11 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors, a different vulnerability than CVE-2011-2364.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Mozilla Miscellaneous memory safety hazards (MFSA 2011-19)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS:firefox-0:3.6.18-2.el4.i386",
"4AS:firefox-0:3.6.18-2.el4.ia64",
"4AS:firefox-0:3.6.18-2.el4.ppc",
"4AS:firefox-0:3.6.18-2.el4.s390",
"4AS:firefox-0:3.6.18-2.el4.s390x",
"4AS:firefox-0:3.6.18-2.el4.src",
"4AS:firefox-0:3.6.18-2.el4.x86_64",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"4Desktop:firefox-0:3.6.18-2.el4.i386",
"4Desktop:firefox-0:3.6.18-2.el4.ia64",
"4Desktop:firefox-0:3.6.18-2.el4.ppc",
"4Desktop:firefox-0:3.6.18-2.el4.s390",
"4Desktop:firefox-0:3.6.18-2.el4.s390x",
"4Desktop:firefox-0:3.6.18-2.el4.src",
"4Desktop:firefox-0:3.6.18-2.el4.x86_64",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"4ES:firefox-0:3.6.18-2.el4.i386",
"4ES:firefox-0:3.6.18-2.el4.ia64",
"4ES:firefox-0:3.6.18-2.el4.ppc",
"4ES:firefox-0:3.6.18-2.el4.s390",
"4ES:firefox-0:3.6.18-2.el4.s390x",
"4ES:firefox-0:3.6.18-2.el4.src",
"4ES:firefox-0:3.6.18-2.el4.x86_64",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"4WS:firefox-0:3.6.18-2.el4.i386",
"4WS:firefox-0:3.6.18-2.el4.ia64",
"4WS:firefox-0:3.6.18-2.el4.ppc",
"4WS:firefox-0:3.6.18-2.el4.s390",
"4WS:firefox-0:3.6.18-2.el4.s390x",
"4WS:firefox-0:3.6.18-2.el4.src",
"4WS:firefox-0:3.6.18-2.el4.x86_64",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.i386",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.ia64",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.ppc",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.s390",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.s390x",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.src",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.x86_64",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.i386",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.ia64",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.ppc",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.s390",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.s390x",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.x86_64",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.i386",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ia64",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ppc",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ppc64",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.s390",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.s390x",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.src",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.x86_64",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.i386",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ia64",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ppc",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ppc64",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.s390",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.s390x",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.x86_64",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.i386",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ia64",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ppc",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ppc64",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.s390",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.s390x",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.x86_64",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.i686",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.ppc",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.ppc64",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.s390",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.s390x",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.src",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.x86_64",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.i686",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.ppc",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.ppc64",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.s390",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.s390x",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.x86_64",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.i686",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc64",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390x",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.src",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.x86_64",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.i686",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc64",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390x",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.x86_64",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.i686",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc64",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390x",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.x86_64",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.i686",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc64",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390x",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.src",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.x86_64",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.i686",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc64",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390x",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.x86_64",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.i686",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc64",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390x",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-2365"
},
{
"category": "external",
"summary": "RHBZ#714576",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=714576"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-2365",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2365"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-2365",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-2365"
}
],
"release_date": "2011-06-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-06-21T22:39:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"4AS:firefox-0:3.6.18-2.el4.i386",
"4AS:firefox-0:3.6.18-2.el4.ia64",
"4AS:firefox-0:3.6.18-2.el4.ppc",
"4AS:firefox-0:3.6.18-2.el4.s390",
"4AS:firefox-0:3.6.18-2.el4.s390x",
"4AS:firefox-0:3.6.18-2.el4.src",
"4AS:firefox-0:3.6.18-2.el4.x86_64",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"4Desktop:firefox-0:3.6.18-2.el4.i386",
"4Desktop:firefox-0:3.6.18-2.el4.ia64",
"4Desktop:firefox-0:3.6.18-2.el4.ppc",
"4Desktop:firefox-0:3.6.18-2.el4.s390",
"4Desktop:firefox-0:3.6.18-2.el4.s390x",
"4Desktop:firefox-0:3.6.18-2.el4.src",
"4Desktop:firefox-0:3.6.18-2.el4.x86_64",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"4ES:firefox-0:3.6.18-2.el4.i386",
"4ES:firefox-0:3.6.18-2.el4.ia64",
"4ES:firefox-0:3.6.18-2.el4.ppc",
"4ES:firefox-0:3.6.18-2.el4.s390",
"4ES:firefox-0:3.6.18-2.el4.s390x",
"4ES:firefox-0:3.6.18-2.el4.src",
"4ES:firefox-0:3.6.18-2.el4.x86_64",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"4WS:firefox-0:3.6.18-2.el4.i386",
"4WS:firefox-0:3.6.18-2.el4.ia64",
"4WS:firefox-0:3.6.18-2.el4.ppc",
"4WS:firefox-0:3.6.18-2.el4.s390",
"4WS:firefox-0:3.6.18-2.el4.s390x",
"4WS:firefox-0:3.6.18-2.el4.src",
"4WS:firefox-0:3.6.18-2.el4.x86_64",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.i386",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.ia64",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.ppc",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.s390",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.s390x",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.src",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.x86_64",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.i386",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.ia64",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.ppc",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.s390",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.s390x",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.x86_64",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.i386",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ia64",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ppc",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ppc64",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.s390",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.s390x",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.src",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.x86_64",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.i386",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ia64",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ppc",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ppc64",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.s390",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.s390x",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.x86_64",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.i386",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ia64",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ppc",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ppc64",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.s390",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.s390x",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.x86_64",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.i686",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.ppc",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.ppc64",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.s390",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.s390x",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.src",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.x86_64",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.i686",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.ppc",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.ppc64",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.s390",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.s390x",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.x86_64",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.i686",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc64",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390x",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.src",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.x86_64",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.i686",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc64",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390x",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.x86_64",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.i686",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc64",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390x",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.x86_64",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.i686",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc64",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390x",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.src",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.x86_64",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.i686",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc64",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390x",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.x86_64",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.i686",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc64",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390x",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:0885"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS:firefox-0:3.6.18-2.el4.i386",
"4AS:firefox-0:3.6.18-2.el4.ia64",
"4AS:firefox-0:3.6.18-2.el4.ppc",
"4AS:firefox-0:3.6.18-2.el4.s390",
"4AS:firefox-0:3.6.18-2.el4.s390x",
"4AS:firefox-0:3.6.18-2.el4.src",
"4AS:firefox-0:3.6.18-2.el4.x86_64",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"4Desktop:firefox-0:3.6.18-2.el4.i386",
"4Desktop:firefox-0:3.6.18-2.el4.ia64",
"4Desktop:firefox-0:3.6.18-2.el4.ppc",
"4Desktop:firefox-0:3.6.18-2.el4.s390",
"4Desktop:firefox-0:3.6.18-2.el4.s390x",
"4Desktop:firefox-0:3.6.18-2.el4.src",
"4Desktop:firefox-0:3.6.18-2.el4.x86_64",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"4ES:firefox-0:3.6.18-2.el4.i386",
"4ES:firefox-0:3.6.18-2.el4.ia64",
"4ES:firefox-0:3.6.18-2.el4.ppc",
"4ES:firefox-0:3.6.18-2.el4.s390",
"4ES:firefox-0:3.6.18-2.el4.s390x",
"4ES:firefox-0:3.6.18-2.el4.src",
"4ES:firefox-0:3.6.18-2.el4.x86_64",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"4WS:firefox-0:3.6.18-2.el4.i386",
"4WS:firefox-0:3.6.18-2.el4.ia64",
"4WS:firefox-0:3.6.18-2.el4.ppc",
"4WS:firefox-0:3.6.18-2.el4.s390",
"4WS:firefox-0:3.6.18-2.el4.s390x",
"4WS:firefox-0:3.6.18-2.el4.src",
"4WS:firefox-0:3.6.18-2.el4.x86_64",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.i386",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.ia64",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.ppc",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.s390",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.s390x",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.src",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.x86_64",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.i386",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.ia64",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.ppc",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.s390",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.s390x",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.x86_64",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.i386",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ia64",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ppc",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ppc64",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.s390",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.s390x",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.src",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.x86_64",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.i386",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ia64",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ppc",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ppc64",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.s390",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.s390x",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.x86_64",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.i386",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ia64",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ppc",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ppc64",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.s390",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.s390x",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.x86_64",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.i686",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.ppc",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.ppc64",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.s390",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.s390x",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.src",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.x86_64",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.i686",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.ppc",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.ppc64",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.s390",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.s390x",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.x86_64",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.i686",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc64",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390x",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.src",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.x86_64",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.i686",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc64",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390x",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.x86_64",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.i686",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc64",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390x",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.x86_64",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.i686",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc64",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390x",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.src",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.x86_64",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.i686",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc64",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390x",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.x86_64",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.i686",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc64",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390x",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "Mozilla Miscellaneous memory safety hazards (MFSA 2011-19)"
},
{
"cve": "CVE-2011-2371",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"discovery_date": "2011-06-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "714580"
}
],
"notes": [
{
"category": "description",
"text": "Integer overflow in the Array.reduceRight method in Mozilla Firefox before 3.6.18 and 4.x through 4.0.1, Thunderbird before 3.1.11, and SeaMonkey through 2.0.14 allows remote attackers to execute arbitrary code via vectors involving a long JavaScript Array object.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Mozilla Integer overflow and arbitrary code execution (MFSA 2011-22)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS:firefox-0:3.6.18-2.el4.i386",
"4AS:firefox-0:3.6.18-2.el4.ia64",
"4AS:firefox-0:3.6.18-2.el4.ppc",
"4AS:firefox-0:3.6.18-2.el4.s390",
"4AS:firefox-0:3.6.18-2.el4.s390x",
"4AS:firefox-0:3.6.18-2.el4.src",
"4AS:firefox-0:3.6.18-2.el4.x86_64",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"4Desktop:firefox-0:3.6.18-2.el4.i386",
"4Desktop:firefox-0:3.6.18-2.el4.ia64",
"4Desktop:firefox-0:3.6.18-2.el4.ppc",
"4Desktop:firefox-0:3.6.18-2.el4.s390",
"4Desktop:firefox-0:3.6.18-2.el4.s390x",
"4Desktop:firefox-0:3.6.18-2.el4.src",
"4Desktop:firefox-0:3.6.18-2.el4.x86_64",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"4ES:firefox-0:3.6.18-2.el4.i386",
"4ES:firefox-0:3.6.18-2.el4.ia64",
"4ES:firefox-0:3.6.18-2.el4.ppc",
"4ES:firefox-0:3.6.18-2.el4.s390",
"4ES:firefox-0:3.6.18-2.el4.s390x",
"4ES:firefox-0:3.6.18-2.el4.src",
"4ES:firefox-0:3.6.18-2.el4.x86_64",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"4WS:firefox-0:3.6.18-2.el4.i386",
"4WS:firefox-0:3.6.18-2.el4.ia64",
"4WS:firefox-0:3.6.18-2.el4.ppc",
"4WS:firefox-0:3.6.18-2.el4.s390",
"4WS:firefox-0:3.6.18-2.el4.s390x",
"4WS:firefox-0:3.6.18-2.el4.src",
"4WS:firefox-0:3.6.18-2.el4.x86_64",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.i386",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.ia64",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.ppc",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.s390",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.s390x",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.src",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.x86_64",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.i386",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.ia64",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.ppc",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.s390",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.s390x",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.x86_64",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.i386",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ia64",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ppc",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ppc64",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.s390",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.s390x",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.src",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.x86_64",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.i386",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ia64",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ppc",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ppc64",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.s390",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.s390x",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.x86_64",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.i386",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ia64",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ppc",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ppc64",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.s390",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.s390x",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.x86_64",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.i686",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.ppc",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.ppc64",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.s390",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.s390x",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.src",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.x86_64",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.i686",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.ppc",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.ppc64",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.s390",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.s390x",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.x86_64",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.i686",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc64",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390x",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.src",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.x86_64",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.i686",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc64",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390x",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.x86_64",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.i686",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc64",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390x",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.x86_64",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.i686",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc64",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390x",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.src",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.x86_64",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.i686",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc64",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390x",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.x86_64",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.i686",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc64",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390x",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-2371"
},
{
"category": "external",
"summary": "RHBZ#714580",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=714580"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-2371",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2371"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-2371",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-2371"
}
],
"release_date": "2011-06-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-06-21T22:39:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"4AS:firefox-0:3.6.18-2.el4.i386",
"4AS:firefox-0:3.6.18-2.el4.ia64",
"4AS:firefox-0:3.6.18-2.el4.ppc",
"4AS:firefox-0:3.6.18-2.el4.s390",
"4AS:firefox-0:3.6.18-2.el4.s390x",
"4AS:firefox-0:3.6.18-2.el4.src",
"4AS:firefox-0:3.6.18-2.el4.x86_64",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"4Desktop:firefox-0:3.6.18-2.el4.i386",
"4Desktop:firefox-0:3.6.18-2.el4.ia64",
"4Desktop:firefox-0:3.6.18-2.el4.ppc",
"4Desktop:firefox-0:3.6.18-2.el4.s390",
"4Desktop:firefox-0:3.6.18-2.el4.s390x",
"4Desktop:firefox-0:3.6.18-2.el4.src",
"4Desktop:firefox-0:3.6.18-2.el4.x86_64",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"4ES:firefox-0:3.6.18-2.el4.i386",
"4ES:firefox-0:3.6.18-2.el4.ia64",
"4ES:firefox-0:3.6.18-2.el4.ppc",
"4ES:firefox-0:3.6.18-2.el4.s390",
"4ES:firefox-0:3.6.18-2.el4.s390x",
"4ES:firefox-0:3.6.18-2.el4.src",
"4ES:firefox-0:3.6.18-2.el4.x86_64",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"4WS:firefox-0:3.6.18-2.el4.i386",
"4WS:firefox-0:3.6.18-2.el4.ia64",
"4WS:firefox-0:3.6.18-2.el4.ppc",
"4WS:firefox-0:3.6.18-2.el4.s390",
"4WS:firefox-0:3.6.18-2.el4.s390x",
"4WS:firefox-0:3.6.18-2.el4.src",
"4WS:firefox-0:3.6.18-2.el4.x86_64",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.i386",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.ia64",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.ppc",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.s390",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.s390x",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.src",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.x86_64",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.i386",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.ia64",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.ppc",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.s390",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.s390x",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.x86_64",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.i386",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ia64",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ppc",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ppc64",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.s390",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.s390x",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.src",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.x86_64",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.i386",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ia64",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ppc",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ppc64",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.s390",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.s390x",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.x86_64",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.i386",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ia64",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ppc",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ppc64",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.s390",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.s390x",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.x86_64",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.i686",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.ppc",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.ppc64",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.s390",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.s390x",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.src",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.x86_64",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.i686",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.ppc",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.ppc64",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.s390",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.s390x",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.x86_64",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.i686",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc64",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390x",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.src",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.x86_64",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.i686",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc64",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390x",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.x86_64",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.i686",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc64",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390x",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.x86_64",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.i686",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc64",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390x",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.src",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.x86_64",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.i686",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc64",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390x",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.x86_64",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.i686",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc64",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390x",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:0885"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS:firefox-0:3.6.18-2.el4.i386",
"4AS:firefox-0:3.6.18-2.el4.ia64",
"4AS:firefox-0:3.6.18-2.el4.ppc",
"4AS:firefox-0:3.6.18-2.el4.s390",
"4AS:firefox-0:3.6.18-2.el4.s390x",
"4AS:firefox-0:3.6.18-2.el4.src",
"4AS:firefox-0:3.6.18-2.el4.x86_64",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"4Desktop:firefox-0:3.6.18-2.el4.i386",
"4Desktop:firefox-0:3.6.18-2.el4.ia64",
"4Desktop:firefox-0:3.6.18-2.el4.ppc",
"4Desktop:firefox-0:3.6.18-2.el4.s390",
"4Desktop:firefox-0:3.6.18-2.el4.s390x",
"4Desktop:firefox-0:3.6.18-2.el4.src",
"4Desktop:firefox-0:3.6.18-2.el4.x86_64",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"4ES:firefox-0:3.6.18-2.el4.i386",
"4ES:firefox-0:3.6.18-2.el4.ia64",
"4ES:firefox-0:3.6.18-2.el4.ppc",
"4ES:firefox-0:3.6.18-2.el4.s390",
"4ES:firefox-0:3.6.18-2.el4.s390x",
"4ES:firefox-0:3.6.18-2.el4.src",
"4ES:firefox-0:3.6.18-2.el4.x86_64",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"4WS:firefox-0:3.6.18-2.el4.i386",
"4WS:firefox-0:3.6.18-2.el4.ia64",
"4WS:firefox-0:3.6.18-2.el4.ppc",
"4WS:firefox-0:3.6.18-2.el4.s390",
"4WS:firefox-0:3.6.18-2.el4.s390x",
"4WS:firefox-0:3.6.18-2.el4.src",
"4WS:firefox-0:3.6.18-2.el4.x86_64",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.i386",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.ia64",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.ppc",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.s390",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.s390x",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.src",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.x86_64",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.i386",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.ia64",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.ppc",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.s390",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.s390x",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.x86_64",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.i386",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ia64",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ppc",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ppc64",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.s390",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.s390x",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.src",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.x86_64",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.i386",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ia64",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ppc",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ppc64",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.s390",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.s390x",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.x86_64",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.i386",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ia64",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ppc",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ppc64",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.s390",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.s390x",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.x86_64",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.i686",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.ppc",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.ppc64",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.s390",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.s390x",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.src",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.x86_64",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.i686",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.ppc",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.ppc64",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.s390",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.s390x",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.x86_64",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.i686",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc64",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390x",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.src",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.x86_64",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.i686",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc64",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390x",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.x86_64",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.i686",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc64",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390x",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.x86_64",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.i686",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc64",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390x",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.src",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.x86_64",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.i686",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc64",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390x",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.x86_64",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.i686",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc64",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390x",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "Mozilla Integer overflow and arbitrary code execution (MFSA 2011-22)"
},
{
"cve": "CVE-2011-2373",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2011-06-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "714577"
}
],
"notes": [
{
"category": "description",
"text": "Use-after-free vulnerability in Mozilla Firefox before 3.6.18 and 4.x through 4.0.1, Thunderbird before 3.1.11, and SeaMonkey through 2.0.14, when JavaScript is disabled, allows remote attackers to execute arbitrary code via a crafted XUL document.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Mozilla Use-after-free vulnerability when viewing XUL document with script disabled (MFSA 2011-20)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS:firefox-0:3.6.18-2.el4.i386",
"4AS:firefox-0:3.6.18-2.el4.ia64",
"4AS:firefox-0:3.6.18-2.el4.ppc",
"4AS:firefox-0:3.6.18-2.el4.s390",
"4AS:firefox-0:3.6.18-2.el4.s390x",
"4AS:firefox-0:3.6.18-2.el4.src",
"4AS:firefox-0:3.6.18-2.el4.x86_64",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"4Desktop:firefox-0:3.6.18-2.el4.i386",
"4Desktop:firefox-0:3.6.18-2.el4.ia64",
"4Desktop:firefox-0:3.6.18-2.el4.ppc",
"4Desktop:firefox-0:3.6.18-2.el4.s390",
"4Desktop:firefox-0:3.6.18-2.el4.s390x",
"4Desktop:firefox-0:3.6.18-2.el4.src",
"4Desktop:firefox-0:3.6.18-2.el4.x86_64",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"4ES:firefox-0:3.6.18-2.el4.i386",
"4ES:firefox-0:3.6.18-2.el4.ia64",
"4ES:firefox-0:3.6.18-2.el4.ppc",
"4ES:firefox-0:3.6.18-2.el4.s390",
"4ES:firefox-0:3.6.18-2.el4.s390x",
"4ES:firefox-0:3.6.18-2.el4.src",
"4ES:firefox-0:3.6.18-2.el4.x86_64",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"4WS:firefox-0:3.6.18-2.el4.i386",
"4WS:firefox-0:3.6.18-2.el4.ia64",
"4WS:firefox-0:3.6.18-2.el4.ppc",
"4WS:firefox-0:3.6.18-2.el4.s390",
"4WS:firefox-0:3.6.18-2.el4.s390x",
"4WS:firefox-0:3.6.18-2.el4.src",
"4WS:firefox-0:3.6.18-2.el4.x86_64",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.i386",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.ia64",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.ppc",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.s390",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.s390x",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.src",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.x86_64",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.i386",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.ia64",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.ppc",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.s390",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.s390x",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.x86_64",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.i386",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ia64",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ppc",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ppc64",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.s390",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.s390x",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.src",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.x86_64",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.i386",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ia64",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ppc",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ppc64",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.s390",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.s390x",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.x86_64",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.i386",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ia64",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ppc",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ppc64",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.s390",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.s390x",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.x86_64",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.i686",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.ppc",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.ppc64",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.s390",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.s390x",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.src",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.x86_64",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.i686",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.ppc",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.ppc64",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.s390",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.s390x",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.x86_64",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.i686",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc64",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390x",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.src",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.x86_64",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.i686",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc64",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390x",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.x86_64",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.i686",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc64",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390x",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.x86_64",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.i686",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc64",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390x",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.src",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.x86_64",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.i686",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc64",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390x",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.x86_64",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.i686",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc64",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390x",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-2373"
},
{
"category": "external",
"summary": "RHBZ#714577",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=714577"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-2373",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2373"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-2373",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-2373"
}
],
"release_date": "2011-06-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-06-21T22:39:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"4AS:firefox-0:3.6.18-2.el4.i386",
"4AS:firefox-0:3.6.18-2.el4.ia64",
"4AS:firefox-0:3.6.18-2.el4.ppc",
"4AS:firefox-0:3.6.18-2.el4.s390",
"4AS:firefox-0:3.6.18-2.el4.s390x",
"4AS:firefox-0:3.6.18-2.el4.src",
"4AS:firefox-0:3.6.18-2.el4.x86_64",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"4Desktop:firefox-0:3.6.18-2.el4.i386",
"4Desktop:firefox-0:3.6.18-2.el4.ia64",
"4Desktop:firefox-0:3.6.18-2.el4.ppc",
"4Desktop:firefox-0:3.6.18-2.el4.s390",
"4Desktop:firefox-0:3.6.18-2.el4.s390x",
"4Desktop:firefox-0:3.6.18-2.el4.src",
"4Desktop:firefox-0:3.6.18-2.el4.x86_64",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"4ES:firefox-0:3.6.18-2.el4.i386",
"4ES:firefox-0:3.6.18-2.el4.ia64",
"4ES:firefox-0:3.6.18-2.el4.ppc",
"4ES:firefox-0:3.6.18-2.el4.s390",
"4ES:firefox-0:3.6.18-2.el4.s390x",
"4ES:firefox-0:3.6.18-2.el4.src",
"4ES:firefox-0:3.6.18-2.el4.x86_64",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"4WS:firefox-0:3.6.18-2.el4.i386",
"4WS:firefox-0:3.6.18-2.el4.ia64",
"4WS:firefox-0:3.6.18-2.el4.ppc",
"4WS:firefox-0:3.6.18-2.el4.s390",
"4WS:firefox-0:3.6.18-2.el4.s390x",
"4WS:firefox-0:3.6.18-2.el4.src",
"4WS:firefox-0:3.6.18-2.el4.x86_64",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.i386",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.ia64",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.ppc",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.s390",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.s390x",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.src",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.x86_64",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.i386",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.ia64",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.ppc",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.s390",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.s390x",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.x86_64",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.i386",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ia64",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ppc",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ppc64",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.s390",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.s390x",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.src",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.x86_64",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.i386",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ia64",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ppc",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ppc64",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.s390",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.s390x",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.x86_64",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.i386",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ia64",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ppc",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ppc64",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.s390",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.s390x",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.x86_64",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.i686",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.ppc",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.ppc64",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.s390",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.s390x",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.src",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.x86_64",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.i686",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.ppc",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.ppc64",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.s390",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.s390x",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.x86_64",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.i686",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc64",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390x",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.src",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.x86_64",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.i686",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc64",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390x",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.x86_64",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.i686",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc64",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390x",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.x86_64",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.i686",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc64",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390x",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.src",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.x86_64",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.i686",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc64",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390x",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.x86_64",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.i686",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc64",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390x",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:0885"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS:firefox-0:3.6.18-2.el4.i386",
"4AS:firefox-0:3.6.18-2.el4.ia64",
"4AS:firefox-0:3.6.18-2.el4.ppc",
"4AS:firefox-0:3.6.18-2.el4.s390",
"4AS:firefox-0:3.6.18-2.el4.s390x",
"4AS:firefox-0:3.6.18-2.el4.src",
"4AS:firefox-0:3.6.18-2.el4.x86_64",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"4Desktop:firefox-0:3.6.18-2.el4.i386",
"4Desktop:firefox-0:3.6.18-2.el4.ia64",
"4Desktop:firefox-0:3.6.18-2.el4.ppc",
"4Desktop:firefox-0:3.6.18-2.el4.s390",
"4Desktop:firefox-0:3.6.18-2.el4.s390x",
"4Desktop:firefox-0:3.6.18-2.el4.src",
"4Desktop:firefox-0:3.6.18-2.el4.x86_64",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"4ES:firefox-0:3.6.18-2.el4.i386",
"4ES:firefox-0:3.6.18-2.el4.ia64",
"4ES:firefox-0:3.6.18-2.el4.ppc",
"4ES:firefox-0:3.6.18-2.el4.s390",
"4ES:firefox-0:3.6.18-2.el4.s390x",
"4ES:firefox-0:3.6.18-2.el4.src",
"4ES:firefox-0:3.6.18-2.el4.x86_64",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"4WS:firefox-0:3.6.18-2.el4.i386",
"4WS:firefox-0:3.6.18-2.el4.ia64",
"4WS:firefox-0:3.6.18-2.el4.ppc",
"4WS:firefox-0:3.6.18-2.el4.s390",
"4WS:firefox-0:3.6.18-2.el4.s390x",
"4WS:firefox-0:3.6.18-2.el4.src",
"4WS:firefox-0:3.6.18-2.el4.x86_64",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.i386",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.ia64",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.ppc",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.s390",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.s390x",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.src",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.x86_64",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.i386",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.ia64",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.ppc",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.s390",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.s390x",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.x86_64",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.i386",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ia64",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ppc",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ppc64",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.s390",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.s390x",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.src",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.x86_64",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.i386",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ia64",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ppc",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ppc64",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.s390",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.s390x",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.x86_64",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.i386",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ia64",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ppc",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ppc64",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.s390",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.s390x",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.x86_64",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.i686",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.ppc",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.ppc64",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.s390",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.s390x",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.src",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.x86_64",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.i686",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.ppc",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.ppc64",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.s390",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.s390x",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.x86_64",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.i686",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc64",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390x",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.src",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.x86_64",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.i686",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc64",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390x",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.x86_64",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.i686",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc64",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390x",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.x86_64",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.i686",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc64",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390x",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.src",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.x86_64",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.i686",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc64",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390x",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.x86_64",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.i686",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc64",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390x",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "Mozilla Use-after-free vulnerability when viewing XUL document with script disabled (MFSA 2011-20)"
},
{
"cve": "CVE-2011-2374",
"discovery_date": "2011-06-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "714576"
}
],
"notes": [
{
"category": "description",
"text": "Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 3.6.18 and 4.x through 4.0.1, and Thunderbird before 3.1.11, allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Mozilla Miscellaneous memory safety hazards (MFSA 2011-19)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS:firefox-0:3.6.18-2.el4.i386",
"4AS:firefox-0:3.6.18-2.el4.ia64",
"4AS:firefox-0:3.6.18-2.el4.ppc",
"4AS:firefox-0:3.6.18-2.el4.s390",
"4AS:firefox-0:3.6.18-2.el4.s390x",
"4AS:firefox-0:3.6.18-2.el4.src",
"4AS:firefox-0:3.6.18-2.el4.x86_64",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"4Desktop:firefox-0:3.6.18-2.el4.i386",
"4Desktop:firefox-0:3.6.18-2.el4.ia64",
"4Desktop:firefox-0:3.6.18-2.el4.ppc",
"4Desktop:firefox-0:3.6.18-2.el4.s390",
"4Desktop:firefox-0:3.6.18-2.el4.s390x",
"4Desktop:firefox-0:3.6.18-2.el4.src",
"4Desktop:firefox-0:3.6.18-2.el4.x86_64",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"4ES:firefox-0:3.6.18-2.el4.i386",
"4ES:firefox-0:3.6.18-2.el4.ia64",
"4ES:firefox-0:3.6.18-2.el4.ppc",
"4ES:firefox-0:3.6.18-2.el4.s390",
"4ES:firefox-0:3.6.18-2.el4.s390x",
"4ES:firefox-0:3.6.18-2.el4.src",
"4ES:firefox-0:3.6.18-2.el4.x86_64",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"4WS:firefox-0:3.6.18-2.el4.i386",
"4WS:firefox-0:3.6.18-2.el4.ia64",
"4WS:firefox-0:3.6.18-2.el4.ppc",
"4WS:firefox-0:3.6.18-2.el4.s390",
"4WS:firefox-0:3.6.18-2.el4.s390x",
"4WS:firefox-0:3.6.18-2.el4.src",
"4WS:firefox-0:3.6.18-2.el4.x86_64",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.i386",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.ia64",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.ppc",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.s390",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.s390x",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.src",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.x86_64",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.i386",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.ia64",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.ppc",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.s390",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.s390x",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.x86_64",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.i386",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ia64",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ppc",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ppc64",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.s390",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.s390x",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.src",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.x86_64",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.i386",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ia64",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ppc",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ppc64",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.s390",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.s390x",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.x86_64",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.i386",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ia64",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ppc",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ppc64",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.s390",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.s390x",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.x86_64",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.i686",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.ppc",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.ppc64",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.s390",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.s390x",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.src",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.x86_64",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.i686",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.ppc",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.ppc64",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.s390",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.s390x",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.x86_64",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.i686",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc64",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390x",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.src",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.x86_64",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.i686",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc64",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390x",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.x86_64",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.i686",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc64",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390x",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.x86_64",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.i686",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc64",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390x",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.src",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.x86_64",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.i686",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc64",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390x",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.x86_64",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.i686",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc64",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390x",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-2374"
},
{
"category": "external",
"summary": "RHBZ#714576",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=714576"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-2374",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2374"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-2374",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-2374"
}
],
"release_date": "2011-06-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-06-21T22:39:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"4AS:firefox-0:3.6.18-2.el4.i386",
"4AS:firefox-0:3.6.18-2.el4.ia64",
"4AS:firefox-0:3.6.18-2.el4.ppc",
"4AS:firefox-0:3.6.18-2.el4.s390",
"4AS:firefox-0:3.6.18-2.el4.s390x",
"4AS:firefox-0:3.6.18-2.el4.src",
"4AS:firefox-0:3.6.18-2.el4.x86_64",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"4Desktop:firefox-0:3.6.18-2.el4.i386",
"4Desktop:firefox-0:3.6.18-2.el4.ia64",
"4Desktop:firefox-0:3.6.18-2.el4.ppc",
"4Desktop:firefox-0:3.6.18-2.el4.s390",
"4Desktop:firefox-0:3.6.18-2.el4.s390x",
"4Desktop:firefox-0:3.6.18-2.el4.src",
"4Desktop:firefox-0:3.6.18-2.el4.x86_64",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"4ES:firefox-0:3.6.18-2.el4.i386",
"4ES:firefox-0:3.6.18-2.el4.ia64",
"4ES:firefox-0:3.6.18-2.el4.ppc",
"4ES:firefox-0:3.6.18-2.el4.s390",
"4ES:firefox-0:3.6.18-2.el4.s390x",
"4ES:firefox-0:3.6.18-2.el4.src",
"4ES:firefox-0:3.6.18-2.el4.x86_64",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"4WS:firefox-0:3.6.18-2.el4.i386",
"4WS:firefox-0:3.6.18-2.el4.ia64",
"4WS:firefox-0:3.6.18-2.el4.ppc",
"4WS:firefox-0:3.6.18-2.el4.s390",
"4WS:firefox-0:3.6.18-2.el4.s390x",
"4WS:firefox-0:3.6.18-2.el4.src",
"4WS:firefox-0:3.6.18-2.el4.x86_64",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.i386",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.ia64",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.ppc",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.s390",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.s390x",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.src",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.x86_64",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.i386",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.ia64",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.ppc",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.s390",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.s390x",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.x86_64",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.i386",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ia64",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ppc",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ppc64",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.s390",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.s390x",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.src",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.x86_64",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.i386",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ia64",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ppc",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ppc64",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.s390",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.s390x",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.x86_64",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.i386",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ia64",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ppc",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ppc64",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.s390",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.s390x",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.x86_64",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.i686",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.ppc",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.ppc64",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.s390",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.s390x",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.src",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.x86_64",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.i686",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.ppc",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.ppc64",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.s390",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.s390x",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.x86_64",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.i686",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc64",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390x",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.src",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.x86_64",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.i686",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc64",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390x",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.x86_64",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.i686",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc64",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390x",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.x86_64",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.i686",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc64",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390x",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.src",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.x86_64",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.i686",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc64",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390x",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.x86_64",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.i686",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc64",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390x",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:0885"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS:firefox-0:3.6.18-2.el4.i386",
"4AS:firefox-0:3.6.18-2.el4.ia64",
"4AS:firefox-0:3.6.18-2.el4.ppc",
"4AS:firefox-0:3.6.18-2.el4.s390",
"4AS:firefox-0:3.6.18-2.el4.s390x",
"4AS:firefox-0:3.6.18-2.el4.src",
"4AS:firefox-0:3.6.18-2.el4.x86_64",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"4Desktop:firefox-0:3.6.18-2.el4.i386",
"4Desktop:firefox-0:3.6.18-2.el4.ia64",
"4Desktop:firefox-0:3.6.18-2.el4.ppc",
"4Desktop:firefox-0:3.6.18-2.el4.s390",
"4Desktop:firefox-0:3.6.18-2.el4.s390x",
"4Desktop:firefox-0:3.6.18-2.el4.src",
"4Desktop:firefox-0:3.6.18-2.el4.x86_64",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"4ES:firefox-0:3.6.18-2.el4.i386",
"4ES:firefox-0:3.6.18-2.el4.ia64",
"4ES:firefox-0:3.6.18-2.el4.ppc",
"4ES:firefox-0:3.6.18-2.el4.s390",
"4ES:firefox-0:3.6.18-2.el4.s390x",
"4ES:firefox-0:3.6.18-2.el4.src",
"4ES:firefox-0:3.6.18-2.el4.x86_64",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"4WS:firefox-0:3.6.18-2.el4.i386",
"4WS:firefox-0:3.6.18-2.el4.ia64",
"4WS:firefox-0:3.6.18-2.el4.ppc",
"4WS:firefox-0:3.6.18-2.el4.s390",
"4WS:firefox-0:3.6.18-2.el4.s390x",
"4WS:firefox-0:3.6.18-2.el4.src",
"4WS:firefox-0:3.6.18-2.el4.x86_64",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.i386",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.ia64",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.ppc",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.s390",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.s390x",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.src",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.x86_64",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.i386",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.ia64",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.ppc",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.s390",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.s390x",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.x86_64",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.i386",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ia64",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ppc",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ppc64",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.s390",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.s390x",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.src",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.x86_64",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.i386",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ia64",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ppc",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ppc64",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.s390",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.s390x",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.x86_64",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.i386",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ia64",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ppc",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ppc64",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.s390",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.s390x",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.x86_64",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.i686",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.ppc",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.ppc64",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.s390",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.s390x",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.src",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.x86_64",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.i686",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.ppc",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.ppc64",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.s390",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.s390x",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.x86_64",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.i686",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc64",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390x",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.src",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.x86_64",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.i686",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc64",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390x",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.x86_64",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.i686",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc64",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390x",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.x86_64",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.i686",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc64",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390x",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.src",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.x86_64",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.i686",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc64",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390x",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.x86_64",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.i686",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc64",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390x",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "Mozilla Miscellaneous memory safety hazards (MFSA 2011-19)"
},
{
"cve": "CVE-2011-2375",
"discovery_date": "2011-06-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "714576"
}
],
"notes": [
{
"category": "description",
"text": "Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 5.0 and Thunderbird through 3.1.11 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Mozilla Miscellaneous memory safety hazards (MFSA 2011-19)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS:firefox-0:3.6.18-2.el4.i386",
"4AS:firefox-0:3.6.18-2.el4.ia64",
"4AS:firefox-0:3.6.18-2.el4.ppc",
"4AS:firefox-0:3.6.18-2.el4.s390",
"4AS:firefox-0:3.6.18-2.el4.s390x",
"4AS:firefox-0:3.6.18-2.el4.src",
"4AS:firefox-0:3.6.18-2.el4.x86_64",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"4Desktop:firefox-0:3.6.18-2.el4.i386",
"4Desktop:firefox-0:3.6.18-2.el4.ia64",
"4Desktop:firefox-0:3.6.18-2.el4.ppc",
"4Desktop:firefox-0:3.6.18-2.el4.s390",
"4Desktop:firefox-0:3.6.18-2.el4.s390x",
"4Desktop:firefox-0:3.6.18-2.el4.src",
"4Desktop:firefox-0:3.6.18-2.el4.x86_64",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"4ES:firefox-0:3.6.18-2.el4.i386",
"4ES:firefox-0:3.6.18-2.el4.ia64",
"4ES:firefox-0:3.6.18-2.el4.ppc",
"4ES:firefox-0:3.6.18-2.el4.s390",
"4ES:firefox-0:3.6.18-2.el4.s390x",
"4ES:firefox-0:3.6.18-2.el4.src",
"4ES:firefox-0:3.6.18-2.el4.x86_64",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"4WS:firefox-0:3.6.18-2.el4.i386",
"4WS:firefox-0:3.6.18-2.el4.ia64",
"4WS:firefox-0:3.6.18-2.el4.ppc",
"4WS:firefox-0:3.6.18-2.el4.s390",
"4WS:firefox-0:3.6.18-2.el4.s390x",
"4WS:firefox-0:3.6.18-2.el4.src",
"4WS:firefox-0:3.6.18-2.el4.x86_64",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.i386",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.ia64",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.ppc",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.s390",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.s390x",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.src",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.x86_64",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.i386",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.ia64",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.ppc",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.s390",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.s390x",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.x86_64",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.i386",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ia64",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ppc",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ppc64",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.s390",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.s390x",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.src",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.x86_64",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.i386",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ia64",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ppc",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ppc64",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.s390",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.s390x",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.x86_64",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.i386",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ia64",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ppc",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ppc64",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.s390",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.s390x",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.x86_64",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.i686",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.ppc",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.ppc64",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.s390",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.s390x",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.src",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.x86_64",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.i686",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.ppc",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.ppc64",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.s390",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.s390x",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.x86_64",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.i686",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc64",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390x",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.src",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.x86_64",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.i686",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc64",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390x",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.x86_64",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.i686",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc64",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390x",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.x86_64",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.i686",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc64",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390x",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.src",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.x86_64",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.i686",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc64",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390x",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.x86_64",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.i686",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc64",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390x",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-2375"
},
{
"category": "external",
"summary": "RHBZ#714576",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=714576"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-2375",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2375"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-2375",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-2375"
}
],
"release_date": "2011-06-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-06-21T22:39:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"4AS:firefox-0:3.6.18-2.el4.i386",
"4AS:firefox-0:3.6.18-2.el4.ia64",
"4AS:firefox-0:3.6.18-2.el4.ppc",
"4AS:firefox-0:3.6.18-2.el4.s390",
"4AS:firefox-0:3.6.18-2.el4.s390x",
"4AS:firefox-0:3.6.18-2.el4.src",
"4AS:firefox-0:3.6.18-2.el4.x86_64",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"4Desktop:firefox-0:3.6.18-2.el4.i386",
"4Desktop:firefox-0:3.6.18-2.el4.ia64",
"4Desktop:firefox-0:3.6.18-2.el4.ppc",
"4Desktop:firefox-0:3.6.18-2.el4.s390",
"4Desktop:firefox-0:3.6.18-2.el4.s390x",
"4Desktop:firefox-0:3.6.18-2.el4.src",
"4Desktop:firefox-0:3.6.18-2.el4.x86_64",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"4ES:firefox-0:3.6.18-2.el4.i386",
"4ES:firefox-0:3.6.18-2.el4.ia64",
"4ES:firefox-0:3.6.18-2.el4.ppc",
"4ES:firefox-0:3.6.18-2.el4.s390",
"4ES:firefox-0:3.6.18-2.el4.s390x",
"4ES:firefox-0:3.6.18-2.el4.src",
"4ES:firefox-0:3.6.18-2.el4.x86_64",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"4WS:firefox-0:3.6.18-2.el4.i386",
"4WS:firefox-0:3.6.18-2.el4.ia64",
"4WS:firefox-0:3.6.18-2.el4.ppc",
"4WS:firefox-0:3.6.18-2.el4.s390",
"4WS:firefox-0:3.6.18-2.el4.s390x",
"4WS:firefox-0:3.6.18-2.el4.src",
"4WS:firefox-0:3.6.18-2.el4.x86_64",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.i386",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.ia64",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.ppc",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.s390",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.s390x",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.src",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.x86_64",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.i386",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.ia64",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.ppc",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.s390",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.s390x",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.x86_64",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.i386",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ia64",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ppc",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ppc64",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.s390",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.s390x",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.src",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.x86_64",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.i386",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ia64",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ppc",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ppc64",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.s390",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.s390x",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.x86_64",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.i386",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ia64",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ppc",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ppc64",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.s390",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.s390x",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.x86_64",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.i686",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.ppc",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.ppc64",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.s390",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.s390x",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.src",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.x86_64",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.i686",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.ppc",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.ppc64",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.s390",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.s390x",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.x86_64",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.i686",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc64",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390x",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.src",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.x86_64",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.i686",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc64",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390x",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.x86_64",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.i686",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc64",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390x",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.x86_64",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.i686",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc64",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390x",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.src",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.x86_64",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.i686",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc64",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390x",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.x86_64",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.i686",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc64",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390x",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:0885"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS:firefox-0:3.6.18-2.el4.i386",
"4AS:firefox-0:3.6.18-2.el4.ia64",
"4AS:firefox-0:3.6.18-2.el4.ppc",
"4AS:firefox-0:3.6.18-2.el4.s390",
"4AS:firefox-0:3.6.18-2.el4.s390x",
"4AS:firefox-0:3.6.18-2.el4.src",
"4AS:firefox-0:3.6.18-2.el4.x86_64",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"4Desktop:firefox-0:3.6.18-2.el4.i386",
"4Desktop:firefox-0:3.6.18-2.el4.ia64",
"4Desktop:firefox-0:3.6.18-2.el4.ppc",
"4Desktop:firefox-0:3.6.18-2.el4.s390",
"4Desktop:firefox-0:3.6.18-2.el4.s390x",
"4Desktop:firefox-0:3.6.18-2.el4.src",
"4Desktop:firefox-0:3.6.18-2.el4.x86_64",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"4ES:firefox-0:3.6.18-2.el4.i386",
"4ES:firefox-0:3.6.18-2.el4.ia64",
"4ES:firefox-0:3.6.18-2.el4.ppc",
"4ES:firefox-0:3.6.18-2.el4.s390",
"4ES:firefox-0:3.6.18-2.el4.s390x",
"4ES:firefox-0:3.6.18-2.el4.src",
"4ES:firefox-0:3.6.18-2.el4.x86_64",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"4WS:firefox-0:3.6.18-2.el4.i386",
"4WS:firefox-0:3.6.18-2.el4.ia64",
"4WS:firefox-0:3.6.18-2.el4.ppc",
"4WS:firefox-0:3.6.18-2.el4.s390",
"4WS:firefox-0:3.6.18-2.el4.s390x",
"4WS:firefox-0:3.6.18-2.el4.src",
"4WS:firefox-0:3.6.18-2.el4.x86_64",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.i386",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.ia64",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.ppc",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.s390",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.s390x",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.src",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.x86_64",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.i386",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.ia64",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.ppc",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.s390",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.s390x",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.x86_64",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.i386",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ia64",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ppc",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ppc64",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.s390",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.s390x",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.src",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.x86_64",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.i386",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ia64",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ppc",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ppc64",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.s390",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.s390x",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.x86_64",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.i386",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ia64",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ppc",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ppc64",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.s390",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.s390x",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.x86_64",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.i686",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.ppc",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.ppc64",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.s390",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.s390x",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.src",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.x86_64",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.i686",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.ppc",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.ppc64",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.s390",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.s390x",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.x86_64",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.i686",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc64",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390x",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.src",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.x86_64",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.i686",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc64",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390x",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.x86_64",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.i686",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc64",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390x",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.x86_64",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.i686",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc64",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390x",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.src",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.x86_64",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.i686",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc64",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390x",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.x86_64",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.i686",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc64",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390x",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "Mozilla Miscellaneous memory safety hazards (MFSA 2011-19)"
},
{
"cve": "CVE-2011-2376",
"discovery_date": "2011-06-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "714576"
}
],
"notes": [
{
"category": "description",
"text": "Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 3.6.18 and Thunderbird before 3.1.11 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Mozilla Miscellaneous memory safety hazards (MFSA 2011-19)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS:firefox-0:3.6.18-2.el4.i386",
"4AS:firefox-0:3.6.18-2.el4.ia64",
"4AS:firefox-0:3.6.18-2.el4.ppc",
"4AS:firefox-0:3.6.18-2.el4.s390",
"4AS:firefox-0:3.6.18-2.el4.s390x",
"4AS:firefox-0:3.6.18-2.el4.src",
"4AS:firefox-0:3.6.18-2.el4.x86_64",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"4Desktop:firefox-0:3.6.18-2.el4.i386",
"4Desktop:firefox-0:3.6.18-2.el4.ia64",
"4Desktop:firefox-0:3.6.18-2.el4.ppc",
"4Desktop:firefox-0:3.6.18-2.el4.s390",
"4Desktop:firefox-0:3.6.18-2.el4.s390x",
"4Desktop:firefox-0:3.6.18-2.el4.src",
"4Desktop:firefox-0:3.6.18-2.el4.x86_64",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"4ES:firefox-0:3.6.18-2.el4.i386",
"4ES:firefox-0:3.6.18-2.el4.ia64",
"4ES:firefox-0:3.6.18-2.el4.ppc",
"4ES:firefox-0:3.6.18-2.el4.s390",
"4ES:firefox-0:3.6.18-2.el4.s390x",
"4ES:firefox-0:3.6.18-2.el4.src",
"4ES:firefox-0:3.6.18-2.el4.x86_64",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"4WS:firefox-0:3.6.18-2.el4.i386",
"4WS:firefox-0:3.6.18-2.el4.ia64",
"4WS:firefox-0:3.6.18-2.el4.ppc",
"4WS:firefox-0:3.6.18-2.el4.s390",
"4WS:firefox-0:3.6.18-2.el4.s390x",
"4WS:firefox-0:3.6.18-2.el4.src",
"4WS:firefox-0:3.6.18-2.el4.x86_64",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.i386",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.ia64",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.ppc",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.s390",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.s390x",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.src",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.x86_64",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.i386",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.ia64",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.ppc",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.s390",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.s390x",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.x86_64",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.i386",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ia64",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ppc",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ppc64",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.s390",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.s390x",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.src",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.x86_64",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.i386",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ia64",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ppc",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ppc64",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.s390",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.s390x",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.x86_64",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.i386",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ia64",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ppc",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ppc64",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.s390",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.s390x",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.x86_64",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.i686",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.ppc",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.ppc64",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.s390",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.s390x",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.src",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.x86_64",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.i686",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.ppc",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.ppc64",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.s390",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.s390x",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.x86_64",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.i686",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc64",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390x",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.src",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.x86_64",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.i686",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc64",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390x",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.x86_64",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.i686",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc64",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390x",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.x86_64",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.i686",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc64",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390x",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.src",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.x86_64",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.i686",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc64",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390x",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.x86_64",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.i686",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc64",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390x",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-2376"
},
{
"category": "external",
"summary": "RHBZ#714576",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=714576"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-2376",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2376"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-2376",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-2376"
}
],
"release_date": "2011-06-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-06-21T22:39:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"4AS:firefox-0:3.6.18-2.el4.i386",
"4AS:firefox-0:3.6.18-2.el4.ia64",
"4AS:firefox-0:3.6.18-2.el4.ppc",
"4AS:firefox-0:3.6.18-2.el4.s390",
"4AS:firefox-0:3.6.18-2.el4.s390x",
"4AS:firefox-0:3.6.18-2.el4.src",
"4AS:firefox-0:3.6.18-2.el4.x86_64",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"4Desktop:firefox-0:3.6.18-2.el4.i386",
"4Desktop:firefox-0:3.6.18-2.el4.ia64",
"4Desktop:firefox-0:3.6.18-2.el4.ppc",
"4Desktop:firefox-0:3.6.18-2.el4.s390",
"4Desktop:firefox-0:3.6.18-2.el4.s390x",
"4Desktop:firefox-0:3.6.18-2.el4.src",
"4Desktop:firefox-0:3.6.18-2.el4.x86_64",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"4ES:firefox-0:3.6.18-2.el4.i386",
"4ES:firefox-0:3.6.18-2.el4.ia64",
"4ES:firefox-0:3.6.18-2.el4.ppc",
"4ES:firefox-0:3.6.18-2.el4.s390",
"4ES:firefox-0:3.6.18-2.el4.s390x",
"4ES:firefox-0:3.6.18-2.el4.src",
"4ES:firefox-0:3.6.18-2.el4.x86_64",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"4WS:firefox-0:3.6.18-2.el4.i386",
"4WS:firefox-0:3.6.18-2.el4.ia64",
"4WS:firefox-0:3.6.18-2.el4.ppc",
"4WS:firefox-0:3.6.18-2.el4.s390",
"4WS:firefox-0:3.6.18-2.el4.s390x",
"4WS:firefox-0:3.6.18-2.el4.src",
"4WS:firefox-0:3.6.18-2.el4.x86_64",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.i386",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.ia64",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.ppc",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.s390",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.s390x",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.src",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.x86_64",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.i386",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.ia64",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.ppc",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.s390",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.s390x",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.x86_64",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.i386",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ia64",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ppc",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ppc64",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.s390",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.s390x",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.src",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.x86_64",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.i386",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ia64",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ppc",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ppc64",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.s390",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.s390x",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.x86_64",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.i386",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ia64",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ppc",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ppc64",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.s390",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.s390x",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.x86_64",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.i686",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.ppc",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.ppc64",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.s390",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.s390x",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.src",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.x86_64",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.i686",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.ppc",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.ppc64",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.s390",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.s390x",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.x86_64",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.i686",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc64",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390x",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.src",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.x86_64",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.i686",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc64",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390x",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.x86_64",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.i686",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc64",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390x",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.x86_64",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.i686",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc64",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390x",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.src",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.x86_64",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.i686",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc64",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390x",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.x86_64",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.i686",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc64",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390x",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:0885"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS:firefox-0:3.6.18-2.el4.i386",
"4AS:firefox-0:3.6.18-2.el4.ia64",
"4AS:firefox-0:3.6.18-2.el4.ppc",
"4AS:firefox-0:3.6.18-2.el4.s390",
"4AS:firefox-0:3.6.18-2.el4.s390x",
"4AS:firefox-0:3.6.18-2.el4.src",
"4AS:firefox-0:3.6.18-2.el4.x86_64",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"4Desktop:firefox-0:3.6.18-2.el4.i386",
"4Desktop:firefox-0:3.6.18-2.el4.ia64",
"4Desktop:firefox-0:3.6.18-2.el4.ppc",
"4Desktop:firefox-0:3.6.18-2.el4.s390",
"4Desktop:firefox-0:3.6.18-2.el4.s390x",
"4Desktop:firefox-0:3.6.18-2.el4.src",
"4Desktop:firefox-0:3.6.18-2.el4.x86_64",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"4ES:firefox-0:3.6.18-2.el4.i386",
"4ES:firefox-0:3.6.18-2.el4.ia64",
"4ES:firefox-0:3.6.18-2.el4.ppc",
"4ES:firefox-0:3.6.18-2.el4.s390",
"4ES:firefox-0:3.6.18-2.el4.s390x",
"4ES:firefox-0:3.6.18-2.el4.src",
"4ES:firefox-0:3.6.18-2.el4.x86_64",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"4WS:firefox-0:3.6.18-2.el4.i386",
"4WS:firefox-0:3.6.18-2.el4.ia64",
"4WS:firefox-0:3.6.18-2.el4.ppc",
"4WS:firefox-0:3.6.18-2.el4.s390",
"4WS:firefox-0:3.6.18-2.el4.s390x",
"4WS:firefox-0:3.6.18-2.el4.src",
"4WS:firefox-0:3.6.18-2.el4.x86_64",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.i386",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.ia64",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.ppc",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.s390",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.s390x",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.src",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.x86_64",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.i386",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.ia64",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.ppc",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.s390",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.s390x",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.x86_64",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.i386",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ia64",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ppc",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ppc64",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.s390",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.s390x",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.src",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.x86_64",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.i386",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ia64",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ppc",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ppc64",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.s390",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.s390x",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.x86_64",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.i386",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ia64",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ppc",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ppc64",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.s390",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.s390x",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.x86_64",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.i686",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.ppc",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.ppc64",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.s390",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.s390x",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.src",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.x86_64",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.i686",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.ppc",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.ppc64",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.s390",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.s390x",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.x86_64",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.i686",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc64",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390x",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.src",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.x86_64",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.i686",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc64",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390x",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.x86_64",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.i686",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc64",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390x",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.x86_64",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.i686",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc64",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390x",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.src",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.x86_64",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.i686",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc64",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390x",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.x86_64",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.i686",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc64",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390x",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "Mozilla Miscellaneous memory safety hazards (MFSA 2011-19)"
},
{
"cve": "CVE-2011-2377",
"discovery_date": "2011-06-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "714929"
}
],
"notes": [
{
"category": "description",
"text": "Mozilla Firefox before 3.6.18 and 4.x through 4.0.1, Thunderbird before 3.1.11, and SeaMonkey through 2.0.14 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via a multipart/x-mixed-replace image.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Mozilla Crash caused by corrupted JPEG image (MFSA 2011-21)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS:firefox-0:3.6.18-2.el4.i386",
"4AS:firefox-0:3.6.18-2.el4.ia64",
"4AS:firefox-0:3.6.18-2.el4.ppc",
"4AS:firefox-0:3.6.18-2.el4.s390",
"4AS:firefox-0:3.6.18-2.el4.s390x",
"4AS:firefox-0:3.6.18-2.el4.src",
"4AS:firefox-0:3.6.18-2.el4.x86_64",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"4Desktop:firefox-0:3.6.18-2.el4.i386",
"4Desktop:firefox-0:3.6.18-2.el4.ia64",
"4Desktop:firefox-0:3.6.18-2.el4.ppc",
"4Desktop:firefox-0:3.6.18-2.el4.s390",
"4Desktop:firefox-0:3.6.18-2.el4.s390x",
"4Desktop:firefox-0:3.6.18-2.el4.src",
"4Desktop:firefox-0:3.6.18-2.el4.x86_64",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"4ES:firefox-0:3.6.18-2.el4.i386",
"4ES:firefox-0:3.6.18-2.el4.ia64",
"4ES:firefox-0:3.6.18-2.el4.ppc",
"4ES:firefox-0:3.6.18-2.el4.s390",
"4ES:firefox-0:3.6.18-2.el4.s390x",
"4ES:firefox-0:3.6.18-2.el4.src",
"4ES:firefox-0:3.6.18-2.el4.x86_64",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"4WS:firefox-0:3.6.18-2.el4.i386",
"4WS:firefox-0:3.6.18-2.el4.ia64",
"4WS:firefox-0:3.6.18-2.el4.ppc",
"4WS:firefox-0:3.6.18-2.el4.s390",
"4WS:firefox-0:3.6.18-2.el4.s390x",
"4WS:firefox-0:3.6.18-2.el4.src",
"4WS:firefox-0:3.6.18-2.el4.x86_64",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.i386",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.ia64",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.ppc",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.s390",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.s390x",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.src",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.x86_64",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.i386",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.ia64",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.ppc",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.s390",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.s390x",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.x86_64",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.i386",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ia64",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ppc",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ppc64",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.s390",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.s390x",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.src",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.x86_64",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.i386",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ia64",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ppc",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ppc64",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.s390",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.s390x",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.x86_64",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.i386",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ia64",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ppc",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ppc64",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.s390",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.s390x",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.x86_64",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.i686",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.ppc",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.ppc64",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.s390",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.s390x",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.src",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.x86_64",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.i686",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.ppc",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.ppc64",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.s390",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.s390x",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.x86_64",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.i686",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc64",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390x",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.src",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.x86_64",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.i686",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc64",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390x",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.x86_64",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.i686",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc64",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390x",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.x86_64",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.i686",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc64",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390x",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.src",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.x86_64",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.i686",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc64",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390x",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.x86_64",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.i686",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc64",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390x",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-2377"
},
{
"category": "external",
"summary": "RHBZ#714929",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=714929"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-2377",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2377"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-2377",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-2377"
}
],
"release_date": "2011-06-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-06-21T22:39:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"4AS:firefox-0:3.6.18-2.el4.i386",
"4AS:firefox-0:3.6.18-2.el4.ia64",
"4AS:firefox-0:3.6.18-2.el4.ppc",
"4AS:firefox-0:3.6.18-2.el4.s390",
"4AS:firefox-0:3.6.18-2.el4.s390x",
"4AS:firefox-0:3.6.18-2.el4.src",
"4AS:firefox-0:3.6.18-2.el4.x86_64",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"4Desktop:firefox-0:3.6.18-2.el4.i386",
"4Desktop:firefox-0:3.6.18-2.el4.ia64",
"4Desktop:firefox-0:3.6.18-2.el4.ppc",
"4Desktop:firefox-0:3.6.18-2.el4.s390",
"4Desktop:firefox-0:3.6.18-2.el4.s390x",
"4Desktop:firefox-0:3.6.18-2.el4.src",
"4Desktop:firefox-0:3.6.18-2.el4.x86_64",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"4ES:firefox-0:3.6.18-2.el4.i386",
"4ES:firefox-0:3.6.18-2.el4.ia64",
"4ES:firefox-0:3.6.18-2.el4.ppc",
"4ES:firefox-0:3.6.18-2.el4.s390",
"4ES:firefox-0:3.6.18-2.el4.s390x",
"4ES:firefox-0:3.6.18-2.el4.src",
"4ES:firefox-0:3.6.18-2.el4.x86_64",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"4WS:firefox-0:3.6.18-2.el4.i386",
"4WS:firefox-0:3.6.18-2.el4.ia64",
"4WS:firefox-0:3.6.18-2.el4.ppc",
"4WS:firefox-0:3.6.18-2.el4.s390",
"4WS:firefox-0:3.6.18-2.el4.s390x",
"4WS:firefox-0:3.6.18-2.el4.src",
"4WS:firefox-0:3.6.18-2.el4.x86_64",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.i386",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.ia64",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.ppc",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.s390",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.s390x",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.src",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.x86_64",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.i386",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.ia64",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.ppc",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.s390",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.s390x",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.x86_64",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.i386",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ia64",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ppc",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ppc64",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.s390",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.s390x",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.src",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.x86_64",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.i386",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ia64",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ppc",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ppc64",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.s390",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.s390x",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.x86_64",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.i386",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ia64",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ppc",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ppc64",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.s390",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.s390x",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.x86_64",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.i686",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.ppc",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.ppc64",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.s390",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.s390x",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.src",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.x86_64",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.i686",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.ppc",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.ppc64",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.s390",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.s390x",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.x86_64",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.i686",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc64",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390x",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.src",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.x86_64",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.i686",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc64",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390x",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.x86_64",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.i686",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc64",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390x",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.x86_64",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.i686",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc64",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390x",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.src",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.x86_64",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.i686",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc64",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390x",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.x86_64",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.i686",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc64",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390x",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:0885"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS:firefox-0:3.6.18-2.el4.i386",
"4AS:firefox-0:3.6.18-2.el4.ia64",
"4AS:firefox-0:3.6.18-2.el4.ppc",
"4AS:firefox-0:3.6.18-2.el4.s390",
"4AS:firefox-0:3.6.18-2.el4.s390x",
"4AS:firefox-0:3.6.18-2.el4.src",
"4AS:firefox-0:3.6.18-2.el4.x86_64",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"4Desktop:firefox-0:3.6.18-2.el4.i386",
"4Desktop:firefox-0:3.6.18-2.el4.ia64",
"4Desktop:firefox-0:3.6.18-2.el4.ppc",
"4Desktop:firefox-0:3.6.18-2.el4.s390",
"4Desktop:firefox-0:3.6.18-2.el4.s390x",
"4Desktop:firefox-0:3.6.18-2.el4.src",
"4Desktop:firefox-0:3.6.18-2.el4.x86_64",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"4ES:firefox-0:3.6.18-2.el4.i386",
"4ES:firefox-0:3.6.18-2.el4.ia64",
"4ES:firefox-0:3.6.18-2.el4.ppc",
"4ES:firefox-0:3.6.18-2.el4.s390",
"4ES:firefox-0:3.6.18-2.el4.s390x",
"4ES:firefox-0:3.6.18-2.el4.src",
"4ES:firefox-0:3.6.18-2.el4.x86_64",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"4WS:firefox-0:3.6.18-2.el4.i386",
"4WS:firefox-0:3.6.18-2.el4.ia64",
"4WS:firefox-0:3.6.18-2.el4.ppc",
"4WS:firefox-0:3.6.18-2.el4.s390",
"4WS:firefox-0:3.6.18-2.el4.s390x",
"4WS:firefox-0:3.6.18-2.el4.src",
"4WS:firefox-0:3.6.18-2.el4.x86_64",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.i386",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.ia64",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.ppc",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.s390",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.s390x",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.src",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.x86_64",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.i386",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.ia64",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.ppc",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.s390",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.s390x",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.x86_64",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.i386",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ia64",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ppc",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ppc64",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.s390",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.s390x",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.src",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.x86_64",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.i386",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ia64",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ppc",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ppc64",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.s390",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.s390x",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.x86_64",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.i386",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ia64",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ppc",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ppc64",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.s390",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.s390x",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.x86_64",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.i686",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.ppc",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.ppc64",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.s390",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.s390x",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.src",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.x86_64",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.i686",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.ppc",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.ppc64",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.s390",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.s390x",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.x86_64",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.i686",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc64",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390x",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.src",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.x86_64",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.i686",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc64",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390x",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.x86_64",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.i686",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc64",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390x",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.x86_64",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.i686",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc64",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390x",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.src",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.x86_64",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.i686",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc64",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390x",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.x86_64",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.i686",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc64",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390x",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "Mozilla Crash caused by corrupted JPEG image (MFSA 2011-21)"
},
{
"cve": "CVE-2011-2605",
"discovery_date": "2011-06-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "714576"
}
],
"notes": [
{
"category": "description",
"text": "CRLF injection vulnerability in the nsCookieService::SetCookieStringInternal function in netwerk/cookie/nsCookieService.cpp in Mozilla Firefox before 3.6.18 and 4.x through 4.0.1, and Thunderbird before 3.1.11, allows remote attackers to bypass intended access restrictions via a string containing a \\n (newline) character, which is not properly handled in a JavaScript \"document.cookie =\" expression, a different vulnerability than CVE-2011-2374.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Mozilla Miscellaneous memory safety hazards (MFSA 2011-19)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS:firefox-0:3.6.18-2.el4.i386",
"4AS:firefox-0:3.6.18-2.el4.ia64",
"4AS:firefox-0:3.6.18-2.el4.ppc",
"4AS:firefox-0:3.6.18-2.el4.s390",
"4AS:firefox-0:3.6.18-2.el4.s390x",
"4AS:firefox-0:3.6.18-2.el4.src",
"4AS:firefox-0:3.6.18-2.el4.x86_64",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"4Desktop:firefox-0:3.6.18-2.el4.i386",
"4Desktop:firefox-0:3.6.18-2.el4.ia64",
"4Desktop:firefox-0:3.6.18-2.el4.ppc",
"4Desktop:firefox-0:3.6.18-2.el4.s390",
"4Desktop:firefox-0:3.6.18-2.el4.s390x",
"4Desktop:firefox-0:3.6.18-2.el4.src",
"4Desktop:firefox-0:3.6.18-2.el4.x86_64",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"4ES:firefox-0:3.6.18-2.el4.i386",
"4ES:firefox-0:3.6.18-2.el4.ia64",
"4ES:firefox-0:3.6.18-2.el4.ppc",
"4ES:firefox-0:3.6.18-2.el4.s390",
"4ES:firefox-0:3.6.18-2.el4.s390x",
"4ES:firefox-0:3.6.18-2.el4.src",
"4ES:firefox-0:3.6.18-2.el4.x86_64",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"4WS:firefox-0:3.6.18-2.el4.i386",
"4WS:firefox-0:3.6.18-2.el4.ia64",
"4WS:firefox-0:3.6.18-2.el4.ppc",
"4WS:firefox-0:3.6.18-2.el4.s390",
"4WS:firefox-0:3.6.18-2.el4.s390x",
"4WS:firefox-0:3.6.18-2.el4.src",
"4WS:firefox-0:3.6.18-2.el4.x86_64",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.i386",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.ia64",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.ppc",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.s390",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.s390x",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.src",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.x86_64",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.i386",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.ia64",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.ppc",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.s390",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.s390x",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.x86_64",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.i386",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ia64",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ppc",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ppc64",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.s390",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.s390x",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.src",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.x86_64",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.i386",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ia64",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ppc",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ppc64",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.s390",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.s390x",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.x86_64",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.i386",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ia64",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ppc",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ppc64",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.s390",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.s390x",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.x86_64",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.i686",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.ppc",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.ppc64",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.s390",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.s390x",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.src",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.x86_64",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.i686",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.ppc",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.ppc64",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.s390",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.s390x",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.x86_64",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.i686",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc64",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390x",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.src",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.x86_64",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.i686",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc64",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390x",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.x86_64",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.i686",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc64",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390x",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.x86_64",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.i686",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc64",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390x",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.src",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.x86_64",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.i686",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc64",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390x",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.x86_64",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.i686",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc64",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390x",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-2605"
},
{
"category": "external",
"summary": "RHBZ#714576",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=714576"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-2605",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2605"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-2605",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-2605"
}
],
"release_date": "2011-06-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-06-21T22:39:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"4AS:firefox-0:3.6.18-2.el4.i386",
"4AS:firefox-0:3.6.18-2.el4.ia64",
"4AS:firefox-0:3.6.18-2.el4.ppc",
"4AS:firefox-0:3.6.18-2.el4.s390",
"4AS:firefox-0:3.6.18-2.el4.s390x",
"4AS:firefox-0:3.6.18-2.el4.src",
"4AS:firefox-0:3.6.18-2.el4.x86_64",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"4Desktop:firefox-0:3.6.18-2.el4.i386",
"4Desktop:firefox-0:3.6.18-2.el4.ia64",
"4Desktop:firefox-0:3.6.18-2.el4.ppc",
"4Desktop:firefox-0:3.6.18-2.el4.s390",
"4Desktop:firefox-0:3.6.18-2.el4.s390x",
"4Desktop:firefox-0:3.6.18-2.el4.src",
"4Desktop:firefox-0:3.6.18-2.el4.x86_64",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"4ES:firefox-0:3.6.18-2.el4.i386",
"4ES:firefox-0:3.6.18-2.el4.ia64",
"4ES:firefox-0:3.6.18-2.el4.ppc",
"4ES:firefox-0:3.6.18-2.el4.s390",
"4ES:firefox-0:3.6.18-2.el4.s390x",
"4ES:firefox-0:3.6.18-2.el4.src",
"4ES:firefox-0:3.6.18-2.el4.x86_64",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"4WS:firefox-0:3.6.18-2.el4.i386",
"4WS:firefox-0:3.6.18-2.el4.ia64",
"4WS:firefox-0:3.6.18-2.el4.ppc",
"4WS:firefox-0:3.6.18-2.el4.s390",
"4WS:firefox-0:3.6.18-2.el4.s390x",
"4WS:firefox-0:3.6.18-2.el4.src",
"4WS:firefox-0:3.6.18-2.el4.x86_64",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.i386",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.ia64",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.ppc",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.s390",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.s390x",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.src",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.x86_64",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.i386",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.ia64",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.ppc",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.s390",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.s390x",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.x86_64",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.i386",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ia64",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ppc",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ppc64",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.s390",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.s390x",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.src",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.x86_64",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.i386",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ia64",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ppc",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ppc64",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.s390",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.s390x",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.x86_64",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.i386",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ia64",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ppc",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ppc64",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.s390",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.s390x",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.x86_64",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.i686",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.ppc",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.ppc64",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.s390",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.s390x",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.src",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.x86_64",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.i686",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.ppc",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.ppc64",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.s390",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.s390x",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.x86_64",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.i686",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc64",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390x",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.src",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.x86_64",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.i686",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc64",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390x",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.x86_64",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.i686",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc64",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390x",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.x86_64",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.i686",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc64",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390x",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.src",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.x86_64",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.i686",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc64",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390x",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.x86_64",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.i686",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc64",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390x",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:0885"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS:firefox-0:3.6.18-2.el4.i386",
"4AS:firefox-0:3.6.18-2.el4.ia64",
"4AS:firefox-0:3.6.18-2.el4.ppc",
"4AS:firefox-0:3.6.18-2.el4.s390",
"4AS:firefox-0:3.6.18-2.el4.s390x",
"4AS:firefox-0:3.6.18-2.el4.src",
"4AS:firefox-0:3.6.18-2.el4.x86_64",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"4Desktop:firefox-0:3.6.18-2.el4.i386",
"4Desktop:firefox-0:3.6.18-2.el4.ia64",
"4Desktop:firefox-0:3.6.18-2.el4.ppc",
"4Desktop:firefox-0:3.6.18-2.el4.s390",
"4Desktop:firefox-0:3.6.18-2.el4.s390x",
"4Desktop:firefox-0:3.6.18-2.el4.src",
"4Desktop:firefox-0:3.6.18-2.el4.x86_64",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"4ES:firefox-0:3.6.18-2.el4.i386",
"4ES:firefox-0:3.6.18-2.el4.ia64",
"4ES:firefox-0:3.6.18-2.el4.ppc",
"4ES:firefox-0:3.6.18-2.el4.s390",
"4ES:firefox-0:3.6.18-2.el4.s390x",
"4ES:firefox-0:3.6.18-2.el4.src",
"4ES:firefox-0:3.6.18-2.el4.x86_64",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"4WS:firefox-0:3.6.18-2.el4.i386",
"4WS:firefox-0:3.6.18-2.el4.ia64",
"4WS:firefox-0:3.6.18-2.el4.ppc",
"4WS:firefox-0:3.6.18-2.el4.s390",
"4WS:firefox-0:3.6.18-2.el4.s390x",
"4WS:firefox-0:3.6.18-2.el4.src",
"4WS:firefox-0:3.6.18-2.el4.x86_64",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.i386",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.ia64",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.ppc",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.s390",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.s390x",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.src",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.x86_64",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.i386",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.ia64",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.ppc",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.s390",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.s390x",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.x86_64",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.i386",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ia64",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ppc",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ppc64",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.s390",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.s390x",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.src",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.x86_64",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.i386",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ia64",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ppc",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ppc64",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.s390",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.s390x",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.x86_64",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.i386",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ia64",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ppc",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ppc64",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.s390",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.s390x",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.x86_64",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.i686",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.ppc",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.ppc64",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.s390",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.s390x",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.src",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.x86_64",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.i686",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.ppc",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.ppc64",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.s390",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.s390x",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.x86_64",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.i686",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc64",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390x",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.src",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.x86_64",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.i686",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc64",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390x",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.x86_64",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.i686",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc64",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390x",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.x86_64",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.i686",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc64",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390x",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.src",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.x86_64",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.i686",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc64",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390x",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.x86_64",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.i686",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc64",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390x",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "Mozilla Miscellaneous memory safety hazards (MFSA 2011-19)"
}
]
}
RHSA-2011_0888
Vulnerability from csaf_redhat - Published: 2011-06-21 22:42 - Updated: 2024-12-01 11:54Use-after-free vulnerability in the nsSVGPathSegList::ReplaceItem function in the implementation of SVG element lists in Mozilla Firefox before 3.6.18, Thunderbird before 3.1.11, and SeaMonkey through 2.0.14 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via vectors involving a user-supplied callback.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS:seamonkey-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-0:1.0.9-71.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-chat-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-chat-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-chat-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-chat-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-chat-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-chat-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-debuginfo-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-debuginfo-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-debuginfo-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-debuginfo-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-debuginfo-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-devel-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-devel-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-devel-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-devel-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-devel-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-devel-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-js-debugger-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-js-debugger-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-js-debugger-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-js-debugger-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-js-debugger-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-mail-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-mail-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-mail-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-mail-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-mail-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-mail-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-0:1.0.9-71.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-chat-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-chat-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-chat-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-chat-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-chat-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-chat-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-devel-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-devel-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-devel-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-devel-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-devel-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-devel-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-mail-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-mail-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-mail-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-mail-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-mail-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-mail-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-0:1.0.9-71.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-chat-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-chat-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-chat-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-chat-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-chat-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-chat-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-debuginfo-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-debuginfo-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-debuginfo-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-debuginfo-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-debuginfo-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-devel-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-devel-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-devel-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-devel-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-devel-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-devel-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-js-debugger-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-js-debugger-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-js-debugger-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-js-debugger-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-js-debugger-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-mail-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-mail-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-mail-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-mail-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-mail-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-mail-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-0:1.0.9-71.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-chat-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-chat-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-chat-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-chat-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-chat-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-chat-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-debuginfo-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-debuginfo-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-debuginfo-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-debuginfo-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-debuginfo-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-devel-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-devel-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-devel-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-devel-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-devel-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-devel-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-js-debugger-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-js-debugger-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-js-debugger-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-js-debugger-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-js-debugger-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-mail-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-mail-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-mail-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-mail-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-mail-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-mail-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
Use-after-free vulnerability in the nsXULCommandDispatcher function in Mozilla Firefox before 3.6.18, Thunderbird before 3.1.11, and SeaMonkey through 2.0.14 allows remote attackers to execute arbitrary code via a crafted XUL document that dequeues the current command updater.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS:seamonkey-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-0:1.0.9-71.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-chat-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-chat-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-chat-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-chat-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-chat-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-chat-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-debuginfo-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-debuginfo-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-debuginfo-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-debuginfo-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-debuginfo-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-devel-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-devel-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-devel-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-devel-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-devel-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-devel-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-js-debugger-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-js-debugger-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-js-debugger-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-js-debugger-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-js-debugger-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-mail-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-mail-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-mail-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-mail-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-mail-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-mail-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-0:1.0.9-71.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-chat-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-chat-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-chat-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-chat-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-chat-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-chat-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-devel-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-devel-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-devel-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-devel-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-devel-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-devel-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-mail-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-mail-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-mail-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-mail-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-mail-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-mail-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-0:1.0.9-71.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-chat-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-chat-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-chat-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-chat-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-chat-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-chat-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-debuginfo-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-debuginfo-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-debuginfo-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-debuginfo-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-debuginfo-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-devel-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-devel-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-devel-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-devel-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-devel-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-devel-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-js-debugger-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-js-debugger-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-js-debugger-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-js-debugger-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-js-debugger-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-mail-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-mail-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-mail-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-mail-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-mail-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-mail-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-0:1.0.9-71.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-chat-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-chat-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-chat-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-chat-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-chat-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-chat-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-debuginfo-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-debuginfo-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-debuginfo-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-debuginfo-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-debuginfo-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-devel-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-devel-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-devel-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-devel-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-devel-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-devel-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-js-debugger-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-js-debugger-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-js-debugger-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-js-debugger-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-js-debugger-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-mail-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-mail-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-mail-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-mail-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-mail-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-mail-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
Mozilla Firefox before 3.6.18, Thunderbird before 3.1.11, and SeaMonkey through 2.0.14 do not distinguish between cookies for two domain names that differ only in a trailing dot, which allows remote web servers to bypass the Same Origin Policy via Set-Cookie headers.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS:seamonkey-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-0:1.0.9-71.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-chat-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-chat-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-chat-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-chat-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-chat-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-chat-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-debuginfo-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-debuginfo-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-debuginfo-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-debuginfo-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-debuginfo-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-devel-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-devel-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-devel-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-devel-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-devel-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-devel-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-js-debugger-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-js-debugger-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-js-debugger-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-js-debugger-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-js-debugger-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-mail-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-mail-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-mail-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-mail-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-mail-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-mail-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-0:1.0.9-71.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-chat-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-chat-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-chat-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-chat-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-chat-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-chat-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-devel-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-devel-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-devel-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-devel-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-devel-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-devel-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-mail-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-mail-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-mail-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-mail-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-mail-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-mail-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-0:1.0.9-71.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-chat-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-chat-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-chat-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-chat-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-chat-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-chat-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-debuginfo-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-debuginfo-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-debuginfo-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-debuginfo-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-debuginfo-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-devel-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-devel-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-devel-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-devel-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-devel-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-devel-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-js-debugger-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-js-debugger-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-js-debugger-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-js-debugger-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-js-debugger-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-mail-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-mail-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-mail-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-mail-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-mail-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-mail-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-0:1.0.9-71.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-chat-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-chat-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-chat-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-chat-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-chat-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-chat-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-debuginfo-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-debuginfo-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-debuginfo-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-debuginfo-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-debuginfo-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-devel-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-devel-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-devel-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-devel-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-devel-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-devel-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-js-debugger-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-js-debugger-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-js-debugger-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-js-debugger-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-js-debugger-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-mail-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-mail-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-mail-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-mail-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-mail-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-mail-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
Use-after-free vulnerability in the nsSVGPointList::AppendElement function in the implementation of SVG element lists in Mozilla Firefox before 3.6.18, Thunderbird before 3.1.11, and SeaMonkey through 2.0.14 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via vectors involving a user-supplied callback.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS:seamonkey-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-0:1.0.9-71.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-chat-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-chat-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-chat-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-chat-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-chat-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-chat-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-debuginfo-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-debuginfo-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-debuginfo-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-debuginfo-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-debuginfo-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-devel-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-devel-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-devel-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-devel-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-devel-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-devel-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-js-debugger-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-js-debugger-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-js-debugger-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-js-debugger-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-js-debugger-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-mail-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-mail-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-mail-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-mail-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-mail-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-mail-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-0:1.0.9-71.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-chat-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-chat-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-chat-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-chat-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-chat-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-chat-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-devel-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-devel-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-devel-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-devel-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-devel-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-devel-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-mail-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-mail-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-mail-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-mail-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-mail-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-mail-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-0:1.0.9-71.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-chat-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-chat-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-chat-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-chat-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-chat-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-chat-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-debuginfo-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-debuginfo-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-debuginfo-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-debuginfo-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-debuginfo-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-devel-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-devel-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-devel-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-devel-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-devel-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-devel-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-js-debugger-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-js-debugger-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-js-debugger-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-js-debugger-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-js-debugger-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-mail-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-mail-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-mail-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-mail-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-mail-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-mail-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-0:1.0.9-71.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-chat-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-chat-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-chat-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-chat-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-chat-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-chat-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-debuginfo-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-debuginfo-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-debuginfo-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-debuginfo-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-debuginfo-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-devel-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-devel-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-devel-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-devel-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-devel-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-devel-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-js-debugger-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-js-debugger-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-js-debugger-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-js-debugger-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-js-debugger-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-mail-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-mail-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-mail-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-mail-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-mail-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-mail-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
Unspecified vulnerability in the browser engine in Mozilla Firefox 3.6.x before 3.6.18 and Thunderbird before 3.1.11 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors, a different vulnerability than CVE-2011-2365.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS:seamonkey-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-0:1.0.9-71.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-chat-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-chat-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-chat-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-chat-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-chat-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-chat-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-debuginfo-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-debuginfo-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-debuginfo-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-debuginfo-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-debuginfo-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-devel-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-devel-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-devel-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-devel-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-devel-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-devel-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-js-debugger-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-js-debugger-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-js-debugger-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-js-debugger-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-js-debugger-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-mail-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-mail-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-mail-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-mail-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-mail-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-mail-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-0:1.0.9-71.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-chat-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-chat-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-chat-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-chat-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-chat-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-chat-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-devel-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-devel-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-devel-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-devel-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-devel-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-devel-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-mail-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-mail-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-mail-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-mail-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-mail-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-mail-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-0:1.0.9-71.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-chat-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-chat-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-chat-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-chat-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-chat-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-chat-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-debuginfo-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-debuginfo-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-debuginfo-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-debuginfo-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-debuginfo-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-devel-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-devel-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-devel-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-devel-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-devel-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-devel-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-js-debugger-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-js-debugger-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-js-debugger-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-js-debugger-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-js-debugger-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-mail-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-mail-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-mail-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-mail-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-mail-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-mail-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-0:1.0.9-71.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-chat-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-chat-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-chat-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-chat-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-chat-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-chat-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-debuginfo-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-debuginfo-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-debuginfo-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-debuginfo-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-debuginfo-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-devel-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-devel-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-devel-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-devel-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-devel-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-devel-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-js-debugger-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-js-debugger-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-js-debugger-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-js-debugger-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-js-debugger-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-mail-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-mail-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-mail-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-mail-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-mail-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-mail-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
Unspecified vulnerability in the browser engine in Mozilla Firefox 3.6.x before 3.6.18 and Thunderbird before 3.1.11 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors, a different vulnerability than CVE-2011-2364.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS:seamonkey-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-0:1.0.9-71.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-chat-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-chat-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-chat-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-chat-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-chat-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-chat-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-debuginfo-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-debuginfo-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-debuginfo-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-debuginfo-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-debuginfo-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-devel-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-devel-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-devel-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-devel-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-devel-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-devel-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-js-debugger-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-js-debugger-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-js-debugger-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-js-debugger-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-js-debugger-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-mail-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-mail-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-mail-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-mail-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-mail-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-mail-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-0:1.0.9-71.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-chat-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-chat-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-chat-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-chat-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-chat-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-chat-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-devel-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-devel-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-devel-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-devel-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-devel-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-devel-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-mail-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-mail-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-mail-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-mail-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-mail-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-mail-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-0:1.0.9-71.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-chat-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-chat-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-chat-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-chat-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-chat-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-chat-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-debuginfo-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-debuginfo-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-debuginfo-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-debuginfo-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-debuginfo-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-devel-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-devel-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-devel-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-devel-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-devel-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-devel-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-js-debugger-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-js-debugger-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-js-debugger-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-js-debugger-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-js-debugger-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-mail-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-mail-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-mail-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-mail-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-mail-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-mail-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-0:1.0.9-71.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-chat-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-chat-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-chat-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-chat-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-chat-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-chat-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-debuginfo-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-debuginfo-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-debuginfo-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-debuginfo-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-debuginfo-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-devel-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-devel-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-devel-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-devel-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-devel-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-devel-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-js-debugger-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-js-debugger-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-js-debugger-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-js-debugger-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-js-debugger-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-mail-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-mail-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-mail-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-mail-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-mail-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-mail-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
Integer overflow in the Array.reduceRight method in Mozilla Firefox before 3.6.18 and 4.x through 4.0.1, Thunderbird before 3.1.11, and SeaMonkey through 2.0.14 allows remote attackers to execute arbitrary code via vectors involving a long JavaScript Array object.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS:seamonkey-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-0:1.0.9-71.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-chat-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-chat-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-chat-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-chat-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-chat-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-chat-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-debuginfo-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-debuginfo-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-debuginfo-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-debuginfo-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-debuginfo-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-devel-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-devel-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-devel-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-devel-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-devel-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-devel-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-js-debugger-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-js-debugger-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-js-debugger-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-js-debugger-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-js-debugger-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-mail-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-mail-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-mail-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-mail-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-mail-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-mail-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-0:1.0.9-71.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-chat-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-chat-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-chat-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-chat-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-chat-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-chat-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-devel-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-devel-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-devel-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-devel-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-devel-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-devel-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-mail-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-mail-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-mail-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-mail-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-mail-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-mail-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-0:1.0.9-71.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-chat-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-chat-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-chat-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-chat-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-chat-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-chat-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-debuginfo-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-debuginfo-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-debuginfo-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-debuginfo-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-debuginfo-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-devel-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-devel-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-devel-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-devel-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-devel-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-devel-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-js-debugger-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-js-debugger-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-js-debugger-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-js-debugger-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-js-debugger-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-mail-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-mail-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-mail-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-mail-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-mail-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-mail-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-0:1.0.9-71.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-chat-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-chat-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-chat-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-chat-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-chat-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-chat-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-debuginfo-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-debuginfo-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-debuginfo-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-debuginfo-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-debuginfo-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-devel-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-devel-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-devel-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-devel-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-devel-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-devel-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-js-debugger-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-js-debugger-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-js-debugger-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-js-debugger-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-js-debugger-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-mail-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-mail-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-mail-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-mail-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-mail-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-mail-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
Use-after-free vulnerability in Mozilla Firefox before 3.6.18 and 4.x through 4.0.1, Thunderbird before 3.1.11, and SeaMonkey through 2.0.14, when JavaScript is disabled, allows remote attackers to execute arbitrary code via a crafted XUL document.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS:seamonkey-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-0:1.0.9-71.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-chat-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-chat-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-chat-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-chat-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-chat-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-chat-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-debuginfo-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-debuginfo-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-debuginfo-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-debuginfo-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-debuginfo-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-devel-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-devel-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-devel-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-devel-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-devel-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-devel-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-js-debugger-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-js-debugger-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-js-debugger-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-js-debugger-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-js-debugger-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-mail-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-mail-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-mail-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-mail-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-mail-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-mail-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-0:1.0.9-71.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-chat-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-chat-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-chat-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-chat-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-chat-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-chat-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-devel-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-devel-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-devel-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-devel-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-devel-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-devel-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-mail-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-mail-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-mail-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-mail-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-mail-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-mail-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-0:1.0.9-71.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-chat-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-chat-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-chat-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-chat-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-chat-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-chat-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-debuginfo-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-debuginfo-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-debuginfo-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-debuginfo-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-debuginfo-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-devel-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-devel-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-devel-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-devel-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-devel-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-devel-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-js-debugger-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-js-debugger-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-js-debugger-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-js-debugger-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-js-debugger-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-mail-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-mail-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-mail-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-mail-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-mail-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-mail-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-0:1.0.9-71.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-chat-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-chat-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-chat-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-chat-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-chat-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-chat-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-debuginfo-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-debuginfo-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-debuginfo-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-debuginfo-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-debuginfo-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-devel-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-devel-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-devel-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-devel-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-devel-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-devel-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-js-debugger-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-js-debugger-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-js-debugger-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-js-debugger-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-js-debugger-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-mail-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-mail-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-mail-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-mail-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-mail-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-mail-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 3.6.18 and 4.x through 4.0.1, and Thunderbird before 3.1.11, allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS:seamonkey-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-0:1.0.9-71.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-chat-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-chat-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-chat-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-chat-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-chat-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-chat-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-debuginfo-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-debuginfo-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-debuginfo-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-debuginfo-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-debuginfo-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-devel-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-devel-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-devel-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-devel-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-devel-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-devel-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-js-debugger-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-js-debugger-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-js-debugger-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-js-debugger-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-js-debugger-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-mail-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-mail-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-mail-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-mail-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-mail-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-mail-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-0:1.0.9-71.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-chat-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-chat-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-chat-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-chat-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-chat-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-chat-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-devel-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-devel-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-devel-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-devel-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-devel-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-devel-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-mail-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-mail-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-mail-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-mail-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-mail-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-mail-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-0:1.0.9-71.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-chat-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-chat-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-chat-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-chat-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-chat-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-chat-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-debuginfo-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-debuginfo-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-debuginfo-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-debuginfo-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-debuginfo-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-devel-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-devel-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-devel-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-devel-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-devel-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-devel-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-js-debugger-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-js-debugger-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-js-debugger-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-js-debugger-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-js-debugger-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-mail-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-mail-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-mail-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-mail-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-mail-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-mail-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-0:1.0.9-71.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-chat-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-chat-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-chat-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-chat-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-chat-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-chat-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-debuginfo-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-debuginfo-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-debuginfo-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-debuginfo-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-debuginfo-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-devel-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-devel-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-devel-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-devel-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-devel-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-devel-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-js-debugger-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-js-debugger-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-js-debugger-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-js-debugger-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-js-debugger-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-mail-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-mail-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-mail-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-mail-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-mail-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-mail-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 5.0 and Thunderbird through 3.1.11 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS:seamonkey-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-0:1.0.9-71.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-chat-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-chat-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-chat-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-chat-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-chat-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-chat-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-debuginfo-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-debuginfo-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-debuginfo-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-debuginfo-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-debuginfo-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-devel-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-devel-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-devel-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-devel-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-devel-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-devel-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-js-debugger-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-js-debugger-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-js-debugger-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-js-debugger-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-js-debugger-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-mail-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-mail-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-mail-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-mail-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-mail-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-mail-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-0:1.0.9-71.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-chat-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-chat-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-chat-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-chat-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-chat-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-chat-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-devel-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-devel-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-devel-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-devel-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-devel-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-devel-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-mail-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-mail-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-mail-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-mail-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-mail-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-mail-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-0:1.0.9-71.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-chat-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-chat-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-chat-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-chat-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-chat-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-chat-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-debuginfo-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-debuginfo-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-debuginfo-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-debuginfo-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-debuginfo-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-devel-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-devel-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-devel-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-devel-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-devel-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-devel-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-js-debugger-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-js-debugger-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-js-debugger-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-js-debugger-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-js-debugger-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-mail-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-mail-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-mail-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-mail-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-mail-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-mail-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-0:1.0.9-71.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-chat-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-chat-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-chat-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-chat-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-chat-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-chat-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-debuginfo-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-debuginfo-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-debuginfo-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-debuginfo-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-debuginfo-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-devel-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-devel-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-devel-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-devel-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-devel-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-devel-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-js-debugger-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-js-debugger-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-js-debugger-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-js-debugger-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-js-debugger-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-mail-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-mail-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-mail-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-mail-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-mail-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-mail-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 3.6.18 and Thunderbird before 3.1.11 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS:seamonkey-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-0:1.0.9-71.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-chat-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-chat-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-chat-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-chat-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-chat-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-chat-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-debuginfo-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-debuginfo-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-debuginfo-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-debuginfo-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-debuginfo-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-devel-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-devel-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-devel-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-devel-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-devel-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-devel-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-js-debugger-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-js-debugger-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-js-debugger-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-js-debugger-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-js-debugger-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-mail-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-mail-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-mail-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-mail-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-mail-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-mail-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-0:1.0.9-71.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-chat-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-chat-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-chat-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-chat-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-chat-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-chat-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-devel-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-devel-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-devel-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-devel-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-devel-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-devel-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-mail-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-mail-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-mail-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-mail-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-mail-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-mail-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-0:1.0.9-71.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-chat-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-chat-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-chat-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-chat-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-chat-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-chat-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-debuginfo-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-debuginfo-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-debuginfo-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-debuginfo-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-debuginfo-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-devel-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-devel-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-devel-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-devel-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-devel-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-devel-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-js-debugger-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-js-debugger-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-js-debugger-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-js-debugger-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-js-debugger-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-mail-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-mail-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-mail-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-mail-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-mail-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-mail-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-0:1.0.9-71.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-chat-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-chat-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-chat-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-chat-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-chat-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-chat-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-debuginfo-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-debuginfo-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-debuginfo-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-debuginfo-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-debuginfo-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-devel-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-devel-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-devel-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-devel-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-devel-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-devel-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-js-debugger-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-js-debugger-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-js-debugger-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-js-debugger-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-js-debugger-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-mail-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-mail-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-mail-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-mail-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-mail-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-mail-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
Mozilla Firefox before 3.6.18 and 4.x through 4.0.1, Thunderbird before 3.1.11, and SeaMonkey through 2.0.14 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via a multipart/x-mixed-replace image.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS:seamonkey-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-0:1.0.9-71.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-chat-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-chat-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-chat-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-chat-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-chat-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-chat-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-debuginfo-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-debuginfo-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-debuginfo-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-debuginfo-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-debuginfo-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-devel-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-devel-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-devel-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-devel-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-devel-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-devel-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-js-debugger-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-js-debugger-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-js-debugger-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-js-debugger-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-js-debugger-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-mail-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-mail-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-mail-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-mail-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-mail-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-mail-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-0:1.0.9-71.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-chat-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-chat-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-chat-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-chat-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-chat-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-chat-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-devel-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-devel-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-devel-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-devel-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-devel-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-devel-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-mail-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-mail-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-mail-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-mail-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-mail-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-mail-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-0:1.0.9-71.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-chat-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-chat-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-chat-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-chat-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-chat-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-chat-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-debuginfo-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-debuginfo-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-debuginfo-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-debuginfo-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-debuginfo-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-devel-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-devel-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-devel-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-devel-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-devel-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-devel-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-js-debugger-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-js-debugger-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-js-debugger-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-js-debugger-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-js-debugger-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-mail-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-mail-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-mail-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-mail-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-mail-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-mail-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-0:1.0.9-71.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-chat-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-chat-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-chat-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-chat-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-chat-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-chat-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-debuginfo-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-debuginfo-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-debuginfo-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-debuginfo-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-debuginfo-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-devel-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-devel-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-devel-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-devel-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-devel-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-devel-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-js-debugger-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-js-debugger-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-js-debugger-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-js-debugger-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-js-debugger-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-mail-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-mail-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-mail-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-mail-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-mail-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-mail-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
CRLF injection vulnerability in the nsCookieService::SetCookieStringInternal function in netwerk/cookie/nsCookieService.cpp in Mozilla Firefox before 3.6.18 and 4.x through 4.0.1, and Thunderbird before 3.1.11, allows remote attackers to bypass intended access restrictions via a string containing a \n (newline) character, which is not properly handled in a JavaScript "document.cookie =" expression, a different vulnerability than CVE-2011-2374.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS:seamonkey-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-0:1.0.9-71.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-chat-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-chat-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-chat-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-chat-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-chat-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-chat-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-debuginfo-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-debuginfo-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-debuginfo-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-debuginfo-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-debuginfo-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-devel-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-devel-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-devel-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-devel-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-devel-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-devel-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-js-debugger-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-js-debugger-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-js-debugger-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-js-debugger-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-js-debugger-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-mail-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-mail-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-mail-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-mail-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-mail-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-mail-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-0:1.0.9-71.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-chat-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-chat-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-chat-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-chat-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-chat-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-chat-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-devel-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-devel-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-devel-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-devel-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-devel-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-devel-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-mail-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-mail-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-mail-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-mail-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-mail-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-mail-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-0:1.0.9-71.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-chat-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-chat-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-chat-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-chat-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-chat-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-chat-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-debuginfo-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-debuginfo-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-debuginfo-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-debuginfo-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-debuginfo-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-devel-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-devel-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-devel-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-devel-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-devel-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-devel-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-js-debugger-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-js-debugger-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-js-debugger-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-js-debugger-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-js-debugger-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-mail-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-mail-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-mail-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-mail-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-mail-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-mail-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-0:1.0.9-71.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-chat-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-chat-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-chat-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-chat-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-chat-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-chat-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-debuginfo-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-debuginfo-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-debuginfo-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-debuginfo-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-debuginfo-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-devel-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-devel-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-devel-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-devel-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-devel-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-devel-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-js-debugger-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-js-debugger-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-js-debugger-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-js-debugger-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-js-debugger-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-mail-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-mail-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-mail-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-mail-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-mail-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-mail-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Critical"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated seamonkey packages that fix several security issues are now\navailable for Red Hat Enterprise Linux 4.\n\nThe Red Hat Security Response Team has rated this update as having critical\nsecurity impact. Common Vulnerability Scoring System (CVSS) base scores,\nwhich give detailed severity ratings, are available for each vulnerability\nfrom the CVE links in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "SeaMonkey is an open source web browser, email and newsgroup client, IRC\nchat client, and HTML editor.\n\nA flaw was found in the way SeaMonkey handled malformed JPEG images. A\nwebsite containing a malicious JPEG image could cause SeaMonkey to crash\nor, potentially, execute arbitrary code with the privileges of the user\nrunning SeaMonkey. (CVE-2011-2377)\n\nMultiple dangling pointer flaws were found in SeaMonkey. A web page\ncontaining malicious content could cause SeaMonkey to crash or,\npotentially, execute arbitrary code with the privileges of the user running\nSeaMonkey. (CVE-2011-0083, CVE-2011-0085, CVE-2011-2363)\n\nSeveral flaws were found in the processing of malformed web content. A web\npage containing malicious content could cause SeaMonkey to crash or,\npotentially, execute arbitrary code with the privileges of the user running\nSeaMonkey. (CVE-2011-2364, CVE-2011-2365, CVE-2011-2374, CVE-2011-2375,\nCVE-2011-2376)\n\nAn integer overflow flaw was found in the way SeaMonkey handled JavaScript\nArray objects. A website containing malicious JavaScript could cause\nSeaMonkey to execute that JavaScript with the privileges of the user\nrunning SeaMonkey. (CVE-2011-2371)\n\nA use-after-free flaw was found in the way SeaMonkey handled malformed\nJavaScript. A website containing malicious JavaScript could cause SeaMonkey\nto execute that JavaScript with the privileges of the user running\nSeaMonkey. (CVE-2011-2373)\n\nIt was found that SeaMonkey could treat two separate cookies as\ninterchangeable if both were for the same domain name but one of those\ndomain names had a trailing \".\" character. This violates the same-origin\npolicy and could possibly lead to data being leaked to the wrong domain.\n(CVE-2011-2362)\n\nAll SeaMonkey users should upgrade to these updated packages, which correct\nthese issues. After installing the update, SeaMonkey must be restarted for\nthe changes to take effect.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2011:0888",
"url": "https://access.redhat.com/errata/RHSA-2011:0888"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#critical",
"url": "https://access.redhat.com/security/updates/classification/#critical"
},
{
"category": "external",
"summary": "714576",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=714576"
},
{
"category": "external",
"summary": "714577",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=714577"
},
{
"category": "external",
"summary": "714580",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=714580"
},
{
"category": "external",
"summary": "714581",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=714581"
},
{
"category": "external",
"summary": "714583",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=714583"
},
{
"category": "external",
"summary": "714929",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=714929"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2011/rhsa-2011_0888.json"
}
],
"title": "Red Hat Security Advisory: seamonkey security update",
"tracking": {
"current_release_date": "2024-12-01T11:54:15+00:00",
"generator": {
"date": "2024-12-01T11:54:15+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2011:0888",
"initial_release_date": "2011-06-21T22:42:00+00:00",
"revision_history": [
{
"date": "2011-06-21T22:42:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2011-06-21T18:50:01+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-12-01T11:54:15+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AS version 4",
"product": {
"name": "Red Hat Enterprise Linux AS version 4",
"product_id": "4AS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:4::as"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop version 4",
"product": {
"name": "Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:4::desktop"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ES version 4",
"product": {
"name": "Red Hat Enterprise Linux ES version 4",
"product_id": "4ES",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:4::es"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux WS version 4",
"product": {
"name": "Red Hat Enterprise Linux WS version 4",
"product_id": "4WS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:4::ws"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "seamonkey-mail-0:1.0.9-71.el4.ia64",
"product": {
"name": "seamonkey-mail-0:1.0.9-71.el4.ia64",
"product_id": "seamonkey-mail-0:1.0.9-71.el4.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-mail@1.0.9-71.el4?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "seamonkey-chat-0:1.0.9-71.el4.ia64",
"product": {
"name": "seamonkey-chat-0:1.0.9-71.el4.ia64",
"product_id": "seamonkey-chat-0:1.0.9-71.el4.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-chat@1.0.9-71.el4?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "seamonkey-devel-0:1.0.9-71.el4.ia64",
"product": {
"name": "seamonkey-devel-0:1.0.9-71.el4.ia64",
"product_id": "seamonkey-devel-0:1.0.9-71.el4.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-devel@1.0.9-71.el4?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "seamonkey-0:1.0.9-71.el4.ia64",
"product": {
"name": "seamonkey-0:1.0.9-71.el4.ia64",
"product_id": "seamonkey-0:1.0.9-71.el4.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey@1.0.9-71.el4?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"product": {
"name": "seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"product_id": "seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-js-debugger@1.0.9-71.el4?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"product": {
"name": "seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"product_id": "seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-dom-inspector@1.0.9-71.el4?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"product": {
"name": "seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"product_id": "seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-debuginfo@1.0.9-71.el4?arch=ia64"
}
}
}
],
"category": "architecture",
"name": "ia64"
},
{
"branches": [
{
"category": "product_version",
"name": "seamonkey-mail-0:1.0.9-71.el4.x86_64",
"product": {
"name": "seamonkey-mail-0:1.0.9-71.el4.x86_64",
"product_id": "seamonkey-mail-0:1.0.9-71.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-mail@1.0.9-71.el4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "seamonkey-chat-0:1.0.9-71.el4.x86_64",
"product": {
"name": "seamonkey-chat-0:1.0.9-71.el4.x86_64",
"product_id": "seamonkey-chat-0:1.0.9-71.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-chat@1.0.9-71.el4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "seamonkey-devel-0:1.0.9-71.el4.x86_64",
"product": {
"name": "seamonkey-devel-0:1.0.9-71.el4.x86_64",
"product_id": "seamonkey-devel-0:1.0.9-71.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-devel@1.0.9-71.el4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "seamonkey-0:1.0.9-71.el4.x86_64",
"product": {
"name": "seamonkey-0:1.0.9-71.el4.x86_64",
"product_id": "seamonkey-0:1.0.9-71.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey@1.0.9-71.el4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"product": {
"name": "seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"product_id": "seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-js-debugger@1.0.9-71.el4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"product": {
"name": "seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"product_id": "seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-dom-inspector@1.0.9-71.el4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"product": {
"name": "seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"product_id": "seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-debuginfo@1.0.9-71.el4?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "seamonkey-mail-0:1.0.9-71.el4.i386",
"product": {
"name": "seamonkey-mail-0:1.0.9-71.el4.i386",
"product_id": "seamonkey-mail-0:1.0.9-71.el4.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-mail@1.0.9-71.el4?arch=i386"
}
}
},
{
"category": "product_version",
"name": "seamonkey-chat-0:1.0.9-71.el4.i386",
"product": {
"name": "seamonkey-chat-0:1.0.9-71.el4.i386",
"product_id": "seamonkey-chat-0:1.0.9-71.el4.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-chat@1.0.9-71.el4?arch=i386"
}
}
},
{
"category": "product_version",
"name": "seamonkey-devel-0:1.0.9-71.el4.i386",
"product": {
"name": "seamonkey-devel-0:1.0.9-71.el4.i386",
"product_id": "seamonkey-devel-0:1.0.9-71.el4.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-devel@1.0.9-71.el4?arch=i386"
}
}
},
{
"category": "product_version",
"name": "seamonkey-0:1.0.9-71.el4.i386",
"product": {
"name": "seamonkey-0:1.0.9-71.el4.i386",
"product_id": "seamonkey-0:1.0.9-71.el4.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey@1.0.9-71.el4?arch=i386"
}
}
},
{
"category": "product_version",
"name": "seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"product": {
"name": "seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"product_id": "seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-js-debugger@1.0.9-71.el4?arch=i386"
}
}
},
{
"category": "product_version",
"name": "seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"product": {
"name": "seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"product_id": "seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-dom-inspector@1.0.9-71.el4?arch=i386"
}
}
},
{
"category": "product_version",
"name": "seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"product": {
"name": "seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"product_id": "seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-debuginfo@1.0.9-71.el4?arch=i386"
}
}
}
],
"category": "architecture",
"name": "i386"
},
{
"branches": [
{
"category": "product_version",
"name": "seamonkey-0:1.0.9-71.el4.src",
"product": {
"name": "seamonkey-0:1.0.9-71.el4.src",
"product_id": "seamonkey-0:1.0.9-71.el4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey@1.0.9-71.el4?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "seamonkey-mail-0:1.0.9-71.el4.ppc",
"product": {
"name": "seamonkey-mail-0:1.0.9-71.el4.ppc",
"product_id": "seamonkey-mail-0:1.0.9-71.el4.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-mail@1.0.9-71.el4?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "seamonkey-chat-0:1.0.9-71.el4.ppc",
"product": {
"name": "seamonkey-chat-0:1.0.9-71.el4.ppc",
"product_id": "seamonkey-chat-0:1.0.9-71.el4.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-chat@1.0.9-71.el4?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "seamonkey-devel-0:1.0.9-71.el4.ppc",
"product": {
"name": "seamonkey-devel-0:1.0.9-71.el4.ppc",
"product_id": "seamonkey-devel-0:1.0.9-71.el4.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-devel@1.0.9-71.el4?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "seamonkey-0:1.0.9-71.el4.ppc",
"product": {
"name": "seamonkey-0:1.0.9-71.el4.ppc",
"product_id": "seamonkey-0:1.0.9-71.el4.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey@1.0.9-71.el4?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"product": {
"name": "seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"product_id": "seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-js-debugger@1.0.9-71.el4?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"product": {
"name": "seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"product_id": "seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-dom-inspector@1.0.9-71.el4?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"product": {
"name": "seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"product_id": "seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-debuginfo@1.0.9-71.el4?arch=ppc"
}
}
}
],
"category": "architecture",
"name": "ppc"
},
{
"branches": [
{
"category": "product_version",
"name": "seamonkey-mail-0:1.0.9-71.el4.s390x",
"product": {
"name": "seamonkey-mail-0:1.0.9-71.el4.s390x",
"product_id": "seamonkey-mail-0:1.0.9-71.el4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-mail@1.0.9-71.el4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "seamonkey-chat-0:1.0.9-71.el4.s390x",
"product": {
"name": "seamonkey-chat-0:1.0.9-71.el4.s390x",
"product_id": "seamonkey-chat-0:1.0.9-71.el4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-chat@1.0.9-71.el4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "seamonkey-devel-0:1.0.9-71.el4.s390x",
"product": {
"name": "seamonkey-devel-0:1.0.9-71.el4.s390x",
"product_id": "seamonkey-devel-0:1.0.9-71.el4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-devel@1.0.9-71.el4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "seamonkey-0:1.0.9-71.el4.s390x",
"product": {
"name": "seamonkey-0:1.0.9-71.el4.s390x",
"product_id": "seamonkey-0:1.0.9-71.el4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey@1.0.9-71.el4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"product": {
"name": "seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"product_id": "seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-js-debugger@1.0.9-71.el4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"product": {
"name": "seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"product_id": "seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-dom-inspector@1.0.9-71.el4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"product": {
"name": "seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"product_id": "seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-debuginfo@1.0.9-71.el4?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "seamonkey-mail-0:1.0.9-71.el4.s390",
"product": {
"name": "seamonkey-mail-0:1.0.9-71.el4.s390",
"product_id": "seamonkey-mail-0:1.0.9-71.el4.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-mail@1.0.9-71.el4?arch=s390"
}
}
},
{
"category": "product_version",
"name": "seamonkey-chat-0:1.0.9-71.el4.s390",
"product": {
"name": "seamonkey-chat-0:1.0.9-71.el4.s390",
"product_id": "seamonkey-chat-0:1.0.9-71.el4.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-chat@1.0.9-71.el4?arch=s390"
}
}
},
{
"category": "product_version",
"name": "seamonkey-devel-0:1.0.9-71.el4.s390",
"product": {
"name": "seamonkey-devel-0:1.0.9-71.el4.s390",
"product_id": "seamonkey-devel-0:1.0.9-71.el4.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-devel@1.0.9-71.el4?arch=s390"
}
}
},
{
"category": "product_version",
"name": "seamonkey-0:1.0.9-71.el4.s390",
"product": {
"name": "seamonkey-0:1.0.9-71.el4.s390",
"product_id": "seamonkey-0:1.0.9-71.el4.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey@1.0.9-71.el4?arch=s390"
}
}
},
{
"category": "product_version",
"name": "seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"product": {
"name": "seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"product_id": "seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-js-debugger@1.0.9-71.el4?arch=s390"
}
}
},
{
"category": "product_version",
"name": "seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"product": {
"name": "seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"product_id": "seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-dom-inspector@1.0.9-71.el4?arch=s390"
}
}
},
{
"category": "product_version",
"name": "seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"product": {
"name": "seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"product_id": "seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-debuginfo@1.0.9-71.el4?arch=s390"
}
}
}
],
"category": "architecture",
"name": "s390"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-0:1.0.9-71.el4.i386 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:seamonkey-0:1.0.9-71.el4.i386"
},
"product_reference": "seamonkey-0:1.0.9-71.el4.i386",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-0:1.0.9-71.el4.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:seamonkey-0:1.0.9-71.el4.ia64"
},
"product_reference": "seamonkey-0:1.0.9-71.el4.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-0:1.0.9-71.el4.ppc as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:seamonkey-0:1.0.9-71.el4.ppc"
},
"product_reference": "seamonkey-0:1.0.9-71.el4.ppc",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-0:1.0.9-71.el4.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:seamonkey-0:1.0.9-71.el4.s390"
},
"product_reference": "seamonkey-0:1.0.9-71.el4.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-0:1.0.9-71.el4.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:seamonkey-0:1.0.9-71.el4.s390x"
},
"product_reference": "seamonkey-0:1.0.9-71.el4.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-0:1.0.9-71.el4.src as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:seamonkey-0:1.0.9-71.el4.src"
},
"product_reference": "seamonkey-0:1.0.9-71.el4.src",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-0:1.0.9-71.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:seamonkey-0:1.0.9-71.el4.x86_64"
},
"product_reference": "seamonkey-0:1.0.9-71.el4.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-chat-0:1.0.9-71.el4.i386 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:seamonkey-chat-0:1.0.9-71.el4.i386"
},
"product_reference": "seamonkey-chat-0:1.0.9-71.el4.i386",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-chat-0:1.0.9-71.el4.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:seamonkey-chat-0:1.0.9-71.el4.ia64"
},
"product_reference": "seamonkey-chat-0:1.0.9-71.el4.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-chat-0:1.0.9-71.el4.ppc as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:seamonkey-chat-0:1.0.9-71.el4.ppc"
},
"product_reference": "seamonkey-chat-0:1.0.9-71.el4.ppc",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-chat-0:1.0.9-71.el4.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:seamonkey-chat-0:1.0.9-71.el4.s390"
},
"product_reference": "seamonkey-chat-0:1.0.9-71.el4.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-chat-0:1.0.9-71.el4.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:seamonkey-chat-0:1.0.9-71.el4.s390x"
},
"product_reference": "seamonkey-chat-0:1.0.9-71.el4.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-chat-0:1.0.9-71.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:seamonkey-chat-0:1.0.9-71.el4.x86_64"
},
"product_reference": "seamonkey-chat-0:1.0.9-71.el4.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-debuginfo-0:1.0.9-71.el4.i386 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:seamonkey-debuginfo-0:1.0.9-71.el4.i386"
},
"product_reference": "seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-debuginfo-0:1.0.9-71.el4.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:seamonkey-debuginfo-0:1.0.9-71.el4.ia64"
},
"product_reference": "seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-debuginfo-0:1.0.9-71.el4.ppc as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:seamonkey-debuginfo-0:1.0.9-71.el4.ppc"
},
"product_reference": "seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-debuginfo-0:1.0.9-71.el4.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:seamonkey-debuginfo-0:1.0.9-71.el4.s390"
},
"product_reference": "seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-debuginfo-0:1.0.9-71.el4.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:seamonkey-debuginfo-0:1.0.9-71.el4.s390x"
},
"product_reference": "seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-debuginfo-0:1.0.9-71.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64"
},
"product_reference": "seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-devel-0:1.0.9-71.el4.i386 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:seamonkey-devel-0:1.0.9-71.el4.i386"
},
"product_reference": "seamonkey-devel-0:1.0.9-71.el4.i386",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-devel-0:1.0.9-71.el4.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:seamonkey-devel-0:1.0.9-71.el4.ia64"
},
"product_reference": "seamonkey-devel-0:1.0.9-71.el4.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-devel-0:1.0.9-71.el4.ppc as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:seamonkey-devel-0:1.0.9-71.el4.ppc"
},
"product_reference": "seamonkey-devel-0:1.0.9-71.el4.ppc",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-devel-0:1.0.9-71.el4.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:seamonkey-devel-0:1.0.9-71.el4.s390"
},
"product_reference": "seamonkey-devel-0:1.0.9-71.el4.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-devel-0:1.0.9-71.el4.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:seamonkey-devel-0:1.0.9-71.el4.s390x"
},
"product_reference": "seamonkey-devel-0:1.0.9-71.el4.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-devel-0:1.0.9-71.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:seamonkey-devel-0:1.0.9-71.el4.x86_64"
},
"product_reference": "seamonkey-devel-0:1.0.9-71.el4.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-dom-inspector-0:1.0.9-71.el4.i386 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.i386"
},
"product_reference": "seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-dom-inspector-0:1.0.9-71.el4.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64"
},
"product_reference": "seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-dom-inspector-0:1.0.9-71.el4.ppc as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc"
},
"product_reference": "seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-dom-inspector-0:1.0.9-71.el4.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390"
},
"product_reference": "seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-dom-inspector-0:1.0.9-71.el4.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x"
},
"product_reference": "seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64"
},
"product_reference": "seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-js-debugger-0:1.0.9-71.el4.i386 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:seamonkey-js-debugger-0:1.0.9-71.el4.i386"
},
"product_reference": "seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-js-debugger-0:1.0.9-71.el4.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:seamonkey-js-debugger-0:1.0.9-71.el4.ia64"
},
"product_reference": "seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-js-debugger-0:1.0.9-71.el4.ppc as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:seamonkey-js-debugger-0:1.0.9-71.el4.ppc"
},
"product_reference": "seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-js-debugger-0:1.0.9-71.el4.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:seamonkey-js-debugger-0:1.0.9-71.el4.s390"
},
"product_reference": "seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-js-debugger-0:1.0.9-71.el4.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:seamonkey-js-debugger-0:1.0.9-71.el4.s390x"
},
"product_reference": "seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-js-debugger-0:1.0.9-71.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64"
},
"product_reference": "seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-mail-0:1.0.9-71.el4.i386 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:seamonkey-mail-0:1.0.9-71.el4.i386"
},
"product_reference": "seamonkey-mail-0:1.0.9-71.el4.i386",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-mail-0:1.0.9-71.el4.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:seamonkey-mail-0:1.0.9-71.el4.ia64"
},
"product_reference": "seamonkey-mail-0:1.0.9-71.el4.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-mail-0:1.0.9-71.el4.ppc as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:seamonkey-mail-0:1.0.9-71.el4.ppc"
},
"product_reference": "seamonkey-mail-0:1.0.9-71.el4.ppc",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-mail-0:1.0.9-71.el4.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:seamonkey-mail-0:1.0.9-71.el4.s390"
},
"product_reference": "seamonkey-mail-0:1.0.9-71.el4.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-mail-0:1.0.9-71.el4.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:seamonkey-mail-0:1.0.9-71.el4.s390x"
},
"product_reference": "seamonkey-mail-0:1.0.9-71.el4.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-mail-0:1.0.9-71.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:seamonkey-mail-0:1.0.9-71.el4.x86_64"
},
"product_reference": "seamonkey-mail-0:1.0.9-71.el4.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-0:1.0.9-71.el4.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:seamonkey-0:1.0.9-71.el4.i386"
},
"product_reference": "seamonkey-0:1.0.9-71.el4.i386",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-0:1.0.9-71.el4.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:seamonkey-0:1.0.9-71.el4.ia64"
},
"product_reference": "seamonkey-0:1.0.9-71.el4.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-0:1.0.9-71.el4.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:seamonkey-0:1.0.9-71.el4.ppc"
},
"product_reference": "seamonkey-0:1.0.9-71.el4.ppc",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-0:1.0.9-71.el4.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:seamonkey-0:1.0.9-71.el4.s390"
},
"product_reference": "seamonkey-0:1.0.9-71.el4.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-0:1.0.9-71.el4.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:seamonkey-0:1.0.9-71.el4.s390x"
},
"product_reference": "seamonkey-0:1.0.9-71.el4.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-0:1.0.9-71.el4.src as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:seamonkey-0:1.0.9-71.el4.src"
},
"product_reference": "seamonkey-0:1.0.9-71.el4.src",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-0:1.0.9-71.el4.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:seamonkey-0:1.0.9-71.el4.x86_64"
},
"product_reference": "seamonkey-0:1.0.9-71.el4.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-chat-0:1.0.9-71.el4.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:seamonkey-chat-0:1.0.9-71.el4.i386"
},
"product_reference": "seamonkey-chat-0:1.0.9-71.el4.i386",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-chat-0:1.0.9-71.el4.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:seamonkey-chat-0:1.0.9-71.el4.ia64"
},
"product_reference": "seamonkey-chat-0:1.0.9-71.el4.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-chat-0:1.0.9-71.el4.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:seamonkey-chat-0:1.0.9-71.el4.ppc"
},
"product_reference": "seamonkey-chat-0:1.0.9-71.el4.ppc",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-chat-0:1.0.9-71.el4.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:seamonkey-chat-0:1.0.9-71.el4.s390"
},
"product_reference": "seamonkey-chat-0:1.0.9-71.el4.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-chat-0:1.0.9-71.el4.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:seamonkey-chat-0:1.0.9-71.el4.s390x"
},
"product_reference": "seamonkey-chat-0:1.0.9-71.el4.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-chat-0:1.0.9-71.el4.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:seamonkey-chat-0:1.0.9-71.el4.x86_64"
},
"product_reference": "seamonkey-chat-0:1.0.9-71.el4.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-debuginfo-0:1.0.9-71.el4.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.i386"
},
"product_reference": "seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-debuginfo-0:1.0.9-71.el4.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.ia64"
},
"product_reference": "seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-debuginfo-0:1.0.9-71.el4.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.ppc"
},
"product_reference": "seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-debuginfo-0:1.0.9-71.el4.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.s390"
},
"product_reference": "seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-debuginfo-0:1.0.9-71.el4.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.s390x"
},
"product_reference": "seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-debuginfo-0:1.0.9-71.el4.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64"
},
"product_reference": "seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-devel-0:1.0.9-71.el4.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:seamonkey-devel-0:1.0.9-71.el4.i386"
},
"product_reference": "seamonkey-devel-0:1.0.9-71.el4.i386",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-devel-0:1.0.9-71.el4.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:seamonkey-devel-0:1.0.9-71.el4.ia64"
},
"product_reference": "seamonkey-devel-0:1.0.9-71.el4.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-devel-0:1.0.9-71.el4.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:seamonkey-devel-0:1.0.9-71.el4.ppc"
},
"product_reference": "seamonkey-devel-0:1.0.9-71.el4.ppc",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-devel-0:1.0.9-71.el4.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:seamonkey-devel-0:1.0.9-71.el4.s390"
},
"product_reference": "seamonkey-devel-0:1.0.9-71.el4.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-devel-0:1.0.9-71.el4.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:seamonkey-devel-0:1.0.9-71.el4.s390x"
},
"product_reference": "seamonkey-devel-0:1.0.9-71.el4.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-devel-0:1.0.9-71.el4.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:seamonkey-devel-0:1.0.9-71.el4.x86_64"
},
"product_reference": "seamonkey-devel-0:1.0.9-71.el4.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-dom-inspector-0:1.0.9-71.el4.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.i386"
},
"product_reference": "seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-dom-inspector-0:1.0.9-71.el4.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64"
},
"product_reference": "seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-dom-inspector-0:1.0.9-71.el4.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc"
},
"product_reference": "seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-dom-inspector-0:1.0.9-71.el4.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.s390"
},
"product_reference": "seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-dom-inspector-0:1.0.9-71.el4.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x"
},
"product_reference": "seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64"
},
"product_reference": "seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-js-debugger-0:1.0.9-71.el4.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.i386"
},
"product_reference": "seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-js-debugger-0:1.0.9-71.el4.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.ia64"
},
"product_reference": "seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-js-debugger-0:1.0.9-71.el4.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.ppc"
},
"product_reference": "seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-js-debugger-0:1.0.9-71.el4.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.s390"
},
"product_reference": "seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-js-debugger-0:1.0.9-71.el4.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.s390x"
},
"product_reference": "seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-js-debugger-0:1.0.9-71.el4.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64"
},
"product_reference": "seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-mail-0:1.0.9-71.el4.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:seamonkey-mail-0:1.0.9-71.el4.i386"
},
"product_reference": "seamonkey-mail-0:1.0.9-71.el4.i386",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-mail-0:1.0.9-71.el4.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:seamonkey-mail-0:1.0.9-71.el4.ia64"
},
"product_reference": "seamonkey-mail-0:1.0.9-71.el4.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-mail-0:1.0.9-71.el4.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:seamonkey-mail-0:1.0.9-71.el4.ppc"
},
"product_reference": "seamonkey-mail-0:1.0.9-71.el4.ppc",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-mail-0:1.0.9-71.el4.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:seamonkey-mail-0:1.0.9-71.el4.s390"
},
"product_reference": "seamonkey-mail-0:1.0.9-71.el4.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-mail-0:1.0.9-71.el4.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:seamonkey-mail-0:1.0.9-71.el4.s390x"
},
"product_reference": "seamonkey-mail-0:1.0.9-71.el4.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-mail-0:1.0.9-71.el4.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:seamonkey-mail-0:1.0.9-71.el4.x86_64"
},
"product_reference": "seamonkey-mail-0:1.0.9-71.el4.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-0:1.0.9-71.el4.i386 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:seamonkey-0:1.0.9-71.el4.i386"
},
"product_reference": "seamonkey-0:1.0.9-71.el4.i386",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-0:1.0.9-71.el4.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:seamonkey-0:1.0.9-71.el4.ia64"
},
"product_reference": "seamonkey-0:1.0.9-71.el4.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-0:1.0.9-71.el4.ppc as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:seamonkey-0:1.0.9-71.el4.ppc"
},
"product_reference": "seamonkey-0:1.0.9-71.el4.ppc",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-0:1.0.9-71.el4.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:seamonkey-0:1.0.9-71.el4.s390"
},
"product_reference": "seamonkey-0:1.0.9-71.el4.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-0:1.0.9-71.el4.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:seamonkey-0:1.0.9-71.el4.s390x"
},
"product_reference": "seamonkey-0:1.0.9-71.el4.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-0:1.0.9-71.el4.src as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:seamonkey-0:1.0.9-71.el4.src"
},
"product_reference": "seamonkey-0:1.0.9-71.el4.src",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-0:1.0.9-71.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:seamonkey-0:1.0.9-71.el4.x86_64"
},
"product_reference": "seamonkey-0:1.0.9-71.el4.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-chat-0:1.0.9-71.el4.i386 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:seamonkey-chat-0:1.0.9-71.el4.i386"
},
"product_reference": "seamonkey-chat-0:1.0.9-71.el4.i386",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-chat-0:1.0.9-71.el4.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:seamonkey-chat-0:1.0.9-71.el4.ia64"
},
"product_reference": "seamonkey-chat-0:1.0.9-71.el4.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-chat-0:1.0.9-71.el4.ppc as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:seamonkey-chat-0:1.0.9-71.el4.ppc"
},
"product_reference": "seamonkey-chat-0:1.0.9-71.el4.ppc",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-chat-0:1.0.9-71.el4.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:seamonkey-chat-0:1.0.9-71.el4.s390"
},
"product_reference": "seamonkey-chat-0:1.0.9-71.el4.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-chat-0:1.0.9-71.el4.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:seamonkey-chat-0:1.0.9-71.el4.s390x"
},
"product_reference": "seamonkey-chat-0:1.0.9-71.el4.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-chat-0:1.0.9-71.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:seamonkey-chat-0:1.0.9-71.el4.x86_64"
},
"product_reference": "seamonkey-chat-0:1.0.9-71.el4.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-debuginfo-0:1.0.9-71.el4.i386 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:seamonkey-debuginfo-0:1.0.9-71.el4.i386"
},
"product_reference": "seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-debuginfo-0:1.0.9-71.el4.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:seamonkey-debuginfo-0:1.0.9-71.el4.ia64"
},
"product_reference": "seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-debuginfo-0:1.0.9-71.el4.ppc as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:seamonkey-debuginfo-0:1.0.9-71.el4.ppc"
},
"product_reference": "seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-debuginfo-0:1.0.9-71.el4.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:seamonkey-debuginfo-0:1.0.9-71.el4.s390"
},
"product_reference": "seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-debuginfo-0:1.0.9-71.el4.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:seamonkey-debuginfo-0:1.0.9-71.el4.s390x"
},
"product_reference": "seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-debuginfo-0:1.0.9-71.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64"
},
"product_reference": "seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-devel-0:1.0.9-71.el4.i386 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:seamonkey-devel-0:1.0.9-71.el4.i386"
},
"product_reference": "seamonkey-devel-0:1.0.9-71.el4.i386",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-devel-0:1.0.9-71.el4.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:seamonkey-devel-0:1.0.9-71.el4.ia64"
},
"product_reference": "seamonkey-devel-0:1.0.9-71.el4.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-devel-0:1.0.9-71.el4.ppc as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:seamonkey-devel-0:1.0.9-71.el4.ppc"
},
"product_reference": "seamonkey-devel-0:1.0.9-71.el4.ppc",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-devel-0:1.0.9-71.el4.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:seamonkey-devel-0:1.0.9-71.el4.s390"
},
"product_reference": "seamonkey-devel-0:1.0.9-71.el4.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-devel-0:1.0.9-71.el4.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:seamonkey-devel-0:1.0.9-71.el4.s390x"
},
"product_reference": "seamonkey-devel-0:1.0.9-71.el4.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-devel-0:1.0.9-71.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:seamonkey-devel-0:1.0.9-71.el4.x86_64"
},
"product_reference": "seamonkey-devel-0:1.0.9-71.el4.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-dom-inspector-0:1.0.9-71.el4.i386 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.i386"
},
"product_reference": "seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-dom-inspector-0:1.0.9-71.el4.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64"
},
"product_reference": "seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-dom-inspector-0:1.0.9-71.el4.ppc as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc"
},
"product_reference": "seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-dom-inspector-0:1.0.9-71.el4.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.s390"
},
"product_reference": "seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-dom-inspector-0:1.0.9-71.el4.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x"
},
"product_reference": "seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64"
},
"product_reference": "seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-js-debugger-0:1.0.9-71.el4.i386 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:seamonkey-js-debugger-0:1.0.9-71.el4.i386"
},
"product_reference": "seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-js-debugger-0:1.0.9-71.el4.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:seamonkey-js-debugger-0:1.0.9-71.el4.ia64"
},
"product_reference": "seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-js-debugger-0:1.0.9-71.el4.ppc as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:seamonkey-js-debugger-0:1.0.9-71.el4.ppc"
},
"product_reference": "seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-js-debugger-0:1.0.9-71.el4.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:seamonkey-js-debugger-0:1.0.9-71.el4.s390"
},
"product_reference": "seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-js-debugger-0:1.0.9-71.el4.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:seamonkey-js-debugger-0:1.0.9-71.el4.s390x"
},
"product_reference": "seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-js-debugger-0:1.0.9-71.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64"
},
"product_reference": "seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-mail-0:1.0.9-71.el4.i386 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:seamonkey-mail-0:1.0.9-71.el4.i386"
},
"product_reference": "seamonkey-mail-0:1.0.9-71.el4.i386",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-mail-0:1.0.9-71.el4.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:seamonkey-mail-0:1.0.9-71.el4.ia64"
},
"product_reference": "seamonkey-mail-0:1.0.9-71.el4.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-mail-0:1.0.9-71.el4.ppc as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:seamonkey-mail-0:1.0.9-71.el4.ppc"
},
"product_reference": "seamonkey-mail-0:1.0.9-71.el4.ppc",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-mail-0:1.0.9-71.el4.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:seamonkey-mail-0:1.0.9-71.el4.s390"
},
"product_reference": "seamonkey-mail-0:1.0.9-71.el4.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-mail-0:1.0.9-71.el4.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:seamonkey-mail-0:1.0.9-71.el4.s390x"
},
"product_reference": "seamonkey-mail-0:1.0.9-71.el4.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-mail-0:1.0.9-71.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:seamonkey-mail-0:1.0.9-71.el4.x86_64"
},
"product_reference": "seamonkey-mail-0:1.0.9-71.el4.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-0:1.0.9-71.el4.i386 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:seamonkey-0:1.0.9-71.el4.i386"
},
"product_reference": "seamonkey-0:1.0.9-71.el4.i386",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-0:1.0.9-71.el4.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:seamonkey-0:1.0.9-71.el4.ia64"
},
"product_reference": "seamonkey-0:1.0.9-71.el4.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-0:1.0.9-71.el4.ppc as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:seamonkey-0:1.0.9-71.el4.ppc"
},
"product_reference": "seamonkey-0:1.0.9-71.el4.ppc",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-0:1.0.9-71.el4.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:seamonkey-0:1.0.9-71.el4.s390"
},
"product_reference": "seamonkey-0:1.0.9-71.el4.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-0:1.0.9-71.el4.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:seamonkey-0:1.0.9-71.el4.s390x"
},
"product_reference": "seamonkey-0:1.0.9-71.el4.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-0:1.0.9-71.el4.src as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:seamonkey-0:1.0.9-71.el4.src"
},
"product_reference": "seamonkey-0:1.0.9-71.el4.src",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-0:1.0.9-71.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:seamonkey-0:1.0.9-71.el4.x86_64"
},
"product_reference": "seamonkey-0:1.0.9-71.el4.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-chat-0:1.0.9-71.el4.i386 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:seamonkey-chat-0:1.0.9-71.el4.i386"
},
"product_reference": "seamonkey-chat-0:1.0.9-71.el4.i386",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-chat-0:1.0.9-71.el4.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:seamonkey-chat-0:1.0.9-71.el4.ia64"
},
"product_reference": "seamonkey-chat-0:1.0.9-71.el4.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-chat-0:1.0.9-71.el4.ppc as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:seamonkey-chat-0:1.0.9-71.el4.ppc"
},
"product_reference": "seamonkey-chat-0:1.0.9-71.el4.ppc",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-chat-0:1.0.9-71.el4.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:seamonkey-chat-0:1.0.9-71.el4.s390"
},
"product_reference": "seamonkey-chat-0:1.0.9-71.el4.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-chat-0:1.0.9-71.el4.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:seamonkey-chat-0:1.0.9-71.el4.s390x"
},
"product_reference": "seamonkey-chat-0:1.0.9-71.el4.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-chat-0:1.0.9-71.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:seamonkey-chat-0:1.0.9-71.el4.x86_64"
},
"product_reference": "seamonkey-chat-0:1.0.9-71.el4.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-debuginfo-0:1.0.9-71.el4.i386 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:seamonkey-debuginfo-0:1.0.9-71.el4.i386"
},
"product_reference": "seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-debuginfo-0:1.0.9-71.el4.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:seamonkey-debuginfo-0:1.0.9-71.el4.ia64"
},
"product_reference": "seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-debuginfo-0:1.0.9-71.el4.ppc as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:seamonkey-debuginfo-0:1.0.9-71.el4.ppc"
},
"product_reference": "seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-debuginfo-0:1.0.9-71.el4.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:seamonkey-debuginfo-0:1.0.9-71.el4.s390"
},
"product_reference": "seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-debuginfo-0:1.0.9-71.el4.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:seamonkey-debuginfo-0:1.0.9-71.el4.s390x"
},
"product_reference": "seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-debuginfo-0:1.0.9-71.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64"
},
"product_reference": "seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-devel-0:1.0.9-71.el4.i386 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:seamonkey-devel-0:1.0.9-71.el4.i386"
},
"product_reference": "seamonkey-devel-0:1.0.9-71.el4.i386",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-devel-0:1.0.9-71.el4.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:seamonkey-devel-0:1.0.9-71.el4.ia64"
},
"product_reference": "seamonkey-devel-0:1.0.9-71.el4.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-devel-0:1.0.9-71.el4.ppc as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:seamonkey-devel-0:1.0.9-71.el4.ppc"
},
"product_reference": "seamonkey-devel-0:1.0.9-71.el4.ppc",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-devel-0:1.0.9-71.el4.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:seamonkey-devel-0:1.0.9-71.el4.s390"
},
"product_reference": "seamonkey-devel-0:1.0.9-71.el4.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-devel-0:1.0.9-71.el4.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:seamonkey-devel-0:1.0.9-71.el4.s390x"
},
"product_reference": "seamonkey-devel-0:1.0.9-71.el4.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-devel-0:1.0.9-71.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:seamonkey-devel-0:1.0.9-71.el4.x86_64"
},
"product_reference": "seamonkey-devel-0:1.0.9-71.el4.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-dom-inspector-0:1.0.9-71.el4.i386 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.i386"
},
"product_reference": "seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-dom-inspector-0:1.0.9-71.el4.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64"
},
"product_reference": "seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-dom-inspector-0:1.0.9-71.el4.ppc as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc"
},
"product_reference": "seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-dom-inspector-0:1.0.9-71.el4.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390"
},
"product_reference": "seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-dom-inspector-0:1.0.9-71.el4.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x"
},
"product_reference": "seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64"
},
"product_reference": "seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-js-debugger-0:1.0.9-71.el4.i386 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:seamonkey-js-debugger-0:1.0.9-71.el4.i386"
},
"product_reference": "seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-js-debugger-0:1.0.9-71.el4.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:seamonkey-js-debugger-0:1.0.9-71.el4.ia64"
},
"product_reference": "seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-js-debugger-0:1.0.9-71.el4.ppc as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:seamonkey-js-debugger-0:1.0.9-71.el4.ppc"
},
"product_reference": "seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-js-debugger-0:1.0.9-71.el4.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:seamonkey-js-debugger-0:1.0.9-71.el4.s390"
},
"product_reference": "seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-js-debugger-0:1.0.9-71.el4.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:seamonkey-js-debugger-0:1.0.9-71.el4.s390x"
},
"product_reference": "seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-js-debugger-0:1.0.9-71.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64"
},
"product_reference": "seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-mail-0:1.0.9-71.el4.i386 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:seamonkey-mail-0:1.0.9-71.el4.i386"
},
"product_reference": "seamonkey-mail-0:1.0.9-71.el4.i386",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-mail-0:1.0.9-71.el4.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:seamonkey-mail-0:1.0.9-71.el4.ia64"
},
"product_reference": "seamonkey-mail-0:1.0.9-71.el4.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-mail-0:1.0.9-71.el4.ppc as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:seamonkey-mail-0:1.0.9-71.el4.ppc"
},
"product_reference": "seamonkey-mail-0:1.0.9-71.el4.ppc",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-mail-0:1.0.9-71.el4.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:seamonkey-mail-0:1.0.9-71.el4.s390"
},
"product_reference": "seamonkey-mail-0:1.0.9-71.el4.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-mail-0:1.0.9-71.el4.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:seamonkey-mail-0:1.0.9-71.el4.s390x"
},
"product_reference": "seamonkey-mail-0:1.0.9-71.el4.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-mail-0:1.0.9-71.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:seamonkey-mail-0:1.0.9-71.el4.x86_64"
},
"product_reference": "seamonkey-mail-0:1.0.9-71.el4.x86_64",
"relates_to_product_reference": "4WS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2011-0083",
"discovery_date": "2011-06-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "714581"
}
],
"notes": [
{
"category": "description",
"text": "Use-after-free vulnerability in the nsSVGPathSegList::ReplaceItem function in the implementation of SVG element lists in Mozilla Firefox before 3.6.18, Thunderbird before 3.1.11, and SeaMonkey through 2.0.14 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via vectors involving a user-supplied callback.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Mozilla Multiple dangling pointer vulnerabilities (MFSA 2011-23)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS:seamonkey-0:1.0.9-71.el4.i386",
"4AS:seamonkey-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-0:1.0.9-71.el4.s390",
"4AS:seamonkey-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-0:1.0.9-71.el4.src",
"4AS:seamonkey-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-chat-0:1.0.9-71.el4.i386",
"4AS:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-chat-0:1.0.9-71.el4.s390",
"4AS:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-devel-0:1.0.9-71.el4.i386",
"4AS:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-devel-0:1.0.9-71.el4.s390",
"4AS:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-mail-0:1.0.9-71.el4.i386",
"4AS:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-mail-0:1.0.9-71.el4.s390",
"4AS:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-mail-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-0:1.0.9-71.el4.src",
"4Desktop:seamonkey-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-0:1.0.9-71.el4.i386",
"4ES:seamonkey-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-0:1.0.9-71.el4.s390",
"4ES:seamonkey-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-0:1.0.9-71.el4.src",
"4ES:seamonkey-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-chat-0:1.0.9-71.el4.i386",
"4ES:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-chat-0:1.0.9-71.el4.s390",
"4ES:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-devel-0:1.0.9-71.el4.i386",
"4ES:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-devel-0:1.0.9-71.el4.s390",
"4ES:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-mail-0:1.0.9-71.el4.i386",
"4ES:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-mail-0:1.0.9-71.el4.s390",
"4ES:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-mail-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-0:1.0.9-71.el4.i386",
"4WS:seamonkey-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-0:1.0.9-71.el4.s390",
"4WS:seamonkey-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-0:1.0.9-71.el4.src",
"4WS:seamonkey-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-chat-0:1.0.9-71.el4.i386",
"4WS:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-chat-0:1.0.9-71.el4.s390",
"4WS:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-devel-0:1.0.9-71.el4.i386",
"4WS:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-devel-0:1.0.9-71.el4.s390",
"4WS:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-mail-0:1.0.9-71.el4.i386",
"4WS:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-mail-0:1.0.9-71.el4.s390",
"4WS:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-mail-0:1.0.9-71.el4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-0083"
},
{
"category": "external",
"summary": "RHBZ#714581",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=714581"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-0083",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0083"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-0083",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-0083"
}
],
"release_date": "2011-06-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-06-21T22:42:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"4AS:seamonkey-0:1.0.9-71.el4.i386",
"4AS:seamonkey-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-0:1.0.9-71.el4.s390",
"4AS:seamonkey-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-0:1.0.9-71.el4.src",
"4AS:seamonkey-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-chat-0:1.0.9-71.el4.i386",
"4AS:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-chat-0:1.0.9-71.el4.s390",
"4AS:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-devel-0:1.0.9-71.el4.i386",
"4AS:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-devel-0:1.0.9-71.el4.s390",
"4AS:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-mail-0:1.0.9-71.el4.i386",
"4AS:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-mail-0:1.0.9-71.el4.s390",
"4AS:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-mail-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-0:1.0.9-71.el4.src",
"4Desktop:seamonkey-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-0:1.0.9-71.el4.i386",
"4ES:seamonkey-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-0:1.0.9-71.el4.s390",
"4ES:seamonkey-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-0:1.0.9-71.el4.src",
"4ES:seamonkey-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-chat-0:1.0.9-71.el4.i386",
"4ES:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-chat-0:1.0.9-71.el4.s390",
"4ES:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-devel-0:1.0.9-71.el4.i386",
"4ES:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-devel-0:1.0.9-71.el4.s390",
"4ES:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-mail-0:1.0.9-71.el4.i386",
"4ES:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-mail-0:1.0.9-71.el4.s390",
"4ES:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-mail-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-0:1.0.9-71.el4.i386",
"4WS:seamonkey-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-0:1.0.9-71.el4.s390",
"4WS:seamonkey-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-0:1.0.9-71.el4.src",
"4WS:seamonkey-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-chat-0:1.0.9-71.el4.i386",
"4WS:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-chat-0:1.0.9-71.el4.s390",
"4WS:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-devel-0:1.0.9-71.el4.i386",
"4WS:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-devel-0:1.0.9-71.el4.s390",
"4WS:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-mail-0:1.0.9-71.el4.i386",
"4WS:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-mail-0:1.0.9-71.el4.s390",
"4WS:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-mail-0:1.0.9-71.el4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:0888"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS:seamonkey-0:1.0.9-71.el4.i386",
"4AS:seamonkey-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-0:1.0.9-71.el4.s390",
"4AS:seamonkey-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-0:1.0.9-71.el4.src",
"4AS:seamonkey-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-chat-0:1.0.9-71.el4.i386",
"4AS:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-chat-0:1.0.9-71.el4.s390",
"4AS:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-devel-0:1.0.9-71.el4.i386",
"4AS:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-devel-0:1.0.9-71.el4.s390",
"4AS:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-mail-0:1.0.9-71.el4.i386",
"4AS:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-mail-0:1.0.9-71.el4.s390",
"4AS:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-mail-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-0:1.0.9-71.el4.src",
"4Desktop:seamonkey-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-0:1.0.9-71.el4.i386",
"4ES:seamonkey-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-0:1.0.9-71.el4.s390",
"4ES:seamonkey-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-0:1.0.9-71.el4.src",
"4ES:seamonkey-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-chat-0:1.0.9-71.el4.i386",
"4ES:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-chat-0:1.0.9-71.el4.s390",
"4ES:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-devel-0:1.0.9-71.el4.i386",
"4ES:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-devel-0:1.0.9-71.el4.s390",
"4ES:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-mail-0:1.0.9-71.el4.i386",
"4ES:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-mail-0:1.0.9-71.el4.s390",
"4ES:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-mail-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-0:1.0.9-71.el4.i386",
"4WS:seamonkey-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-0:1.0.9-71.el4.s390",
"4WS:seamonkey-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-0:1.0.9-71.el4.src",
"4WS:seamonkey-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-chat-0:1.0.9-71.el4.i386",
"4WS:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-chat-0:1.0.9-71.el4.s390",
"4WS:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-devel-0:1.0.9-71.el4.i386",
"4WS:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-devel-0:1.0.9-71.el4.s390",
"4WS:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-mail-0:1.0.9-71.el4.i386",
"4WS:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-mail-0:1.0.9-71.el4.s390",
"4WS:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-mail-0:1.0.9-71.el4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "Mozilla Multiple dangling pointer vulnerabilities (MFSA 2011-23)"
},
{
"cve": "CVE-2011-0085",
"discovery_date": "2011-06-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "714581"
}
],
"notes": [
{
"category": "description",
"text": "Use-after-free vulnerability in the nsXULCommandDispatcher function in Mozilla Firefox before 3.6.18, Thunderbird before 3.1.11, and SeaMonkey through 2.0.14 allows remote attackers to execute arbitrary code via a crafted XUL document that dequeues the current command updater.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Mozilla Multiple dangling pointer vulnerabilities (MFSA 2011-23)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS:seamonkey-0:1.0.9-71.el4.i386",
"4AS:seamonkey-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-0:1.0.9-71.el4.s390",
"4AS:seamonkey-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-0:1.0.9-71.el4.src",
"4AS:seamonkey-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-chat-0:1.0.9-71.el4.i386",
"4AS:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-chat-0:1.0.9-71.el4.s390",
"4AS:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-devel-0:1.0.9-71.el4.i386",
"4AS:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-devel-0:1.0.9-71.el4.s390",
"4AS:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-mail-0:1.0.9-71.el4.i386",
"4AS:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-mail-0:1.0.9-71.el4.s390",
"4AS:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-mail-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-0:1.0.9-71.el4.src",
"4Desktop:seamonkey-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-0:1.0.9-71.el4.i386",
"4ES:seamonkey-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-0:1.0.9-71.el4.s390",
"4ES:seamonkey-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-0:1.0.9-71.el4.src",
"4ES:seamonkey-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-chat-0:1.0.9-71.el4.i386",
"4ES:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-chat-0:1.0.9-71.el4.s390",
"4ES:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-devel-0:1.0.9-71.el4.i386",
"4ES:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-devel-0:1.0.9-71.el4.s390",
"4ES:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-mail-0:1.0.9-71.el4.i386",
"4ES:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-mail-0:1.0.9-71.el4.s390",
"4ES:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-mail-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-0:1.0.9-71.el4.i386",
"4WS:seamonkey-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-0:1.0.9-71.el4.s390",
"4WS:seamonkey-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-0:1.0.9-71.el4.src",
"4WS:seamonkey-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-chat-0:1.0.9-71.el4.i386",
"4WS:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-chat-0:1.0.9-71.el4.s390",
"4WS:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-devel-0:1.0.9-71.el4.i386",
"4WS:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-devel-0:1.0.9-71.el4.s390",
"4WS:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-mail-0:1.0.9-71.el4.i386",
"4WS:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-mail-0:1.0.9-71.el4.s390",
"4WS:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-mail-0:1.0.9-71.el4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-0085"
},
{
"category": "external",
"summary": "RHBZ#714581",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=714581"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-0085",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0085"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-0085",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-0085"
}
],
"release_date": "2011-06-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-06-21T22:42:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"4AS:seamonkey-0:1.0.9-71.el4.i386",
"4AS:seamonkey-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-0:1.0.9-71.el4.s390",
"4AS:seamonkey-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-0:1.0.9-71.el4.src",
"4AS:seamonkey-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-chat-0:1.0.9-71.el4.i386",
"4AS:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-chat-0:1.0.9-71.el4.s390",
"4AS:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-devel-0:1.0.9-71.el4.i386",
"4AS:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-devel-0:1.0.9-71.el4.s390",
"4AS:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-mail-0:1.0.9-71.el4.i386",
"4AS:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-mail-0:1.0.9-71.el4.s390",
"4AS:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-mail-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-0:1.0.9-71.el4.src",
"4Desktop:seamonkey-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-0:1.0.9-71.el4.i386",
"4ES:seamonkey-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-0:1.0.9-71.el4.s390",
"4ES:seamonkey-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-0:1.0.9-71.el4.src",
"4ES:seamonkey-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-chat-0:1.0.9-71.el4.i386",
"4ES:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-chat-0:1.0.9-71.el4.s390",
"4ES:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-devel-0:1.0.9-71.el4.i386",
"4ES:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-devel-0:1.0.9-71.el4.s390",
"4ES:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-mail-0:1.0.9-71.el4.i386",
"4ES:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-mail-0:1.0.9-71.el4.s390",
"4ES:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-mail-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-0:1.0.9-71.el4.i386",
"4WS:seamonkey-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-0:1.0.9-71.el4.s390",
"4WS:seamonkey-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-0:1.0.9-71.el4.src",
"4WS:seamonkey-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-chat-0:1.0.9-71.el4.i386",
"4WS:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-chat-0:1.0.9-71.el4.s390",
"4WS:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-devel-0:1.0.9-71.el4.i386",
"4WS:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-devel-0:1.0.9-71.el4.s390",
"4WS:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-mail-0:1.0.9-71.el4.i386",
"4WS:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-mail-0:1.0.9-71.el4.s390",
"4WS:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-mail-0:1.0.9-71.el4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:0888"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS:seamonkey-0:1.0.9-71.el4.i386",
"4AS:seamonkey-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-0:1.0.9-71.el4.s390",
"4AS:seamonkey-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-0:1.0.9-71.el4.src",
"4AS:seamonkey-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-chat-0:1.0.9-71.el4.i386",
"4AS:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-chat-0:1.0.9-71.el4.s390",
"4AS:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-devel-0:1.0.9-71.el4.i386",
"4AS:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-devel-0:1.0.9-71.el4.s390",
"4AS:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-mail-0:1.0.9-71.el4.i386",
"4AS:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-mail-0:1.0.9-71.el4.s390",
"4AS:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-mail-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-0:1.0.9-71.el4.src",
"4Desktop:seamonkey-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-0:1.0.9-71.el4.i386",
"4ES:seamonkey-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-0:1.0.9-71.el4.s390",
"4ES:seamonkey-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-0:1.0.9-71.el4.src",
"4ES:seamonkey-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-chat-0:1.0.9-71.el4.i386",
"4ES:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-chat-0:1.0.9-71.el4.s390",
"4ES:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-devel-0:1.0.9-71.el4.i386",
"4ES:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-devel-0:1.0.9-71.el4.s390",
"4ES:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-mail-0:1.0.9-71.el4.i386",
"4ES:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-mail-0:1.0.9-71.el4.s390",
"4ES:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-mail-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-0:1.0.9-71.el4.i386",
"4WS:seamonkey-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-0:1.0.9-71.el4.s390",
"4WS:seamonkey-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-0:1.0.9-71.el4.src",
"4WS:seamonkey-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-chat-0:1.0.9-71.el4.i386",
"4WS:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-chat-0:1.0.9-71.el4.s390",
"4WS:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-devel-0:1.0.9-71.el4.i386",
"4WS:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-devel-0:1.0.9-71.el4.s390",
"4WS:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-mail-0:1.0.9-71.el4.i386",
"4WS:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-mail-0:1.0.9-71.el4.s390",
"4WS:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-mail-0:1.0.9-71.el4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "Mozilla Multiple dangling pointer vulnerabilities (MFSA 2011-23)"
},
{
"cve": "CVE-2011-2362",
"discovery_date": "2011-06-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "714583"
}
],
"notes": [
{
"category": "description",
"text": "Mozilla Firefox before 3.6.18, Thunderbird before 3.1.11, and SeaMonkey through 2.0.14 do not distinguish between cookies for two domain names that differ only in a trailing dot, which allows remote web servers to bypass the Same Origin Policy via Set-Cookie headers.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Mozilla Cookie isolation error (MFSA 2011-24)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS:seamonkey-0:1.0.9-71.el4.i386",
"4AS:seamonkey-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-0:1.0.9-71.el4.s390",
"4AS:seamonkey-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-0:1.0.9-71.el4.src",
"4AS:seamonkey-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-chat-0:1.0.9-71.el4.i386",
"4AS:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-chat-0:1.0.9-71.el4.s390",
"4AS:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-devel-0:1.0.9-71.el4.i386",
"4AS:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-devel-0:1.0.9-71.el4.s390",
"4AS:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-mail-0:1.0.9-71.el4.i386",
"4AS:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-mail-0:1.0.9-71.el4.s390",
"4AS:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-mail-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-0:1.0.9-71.el4.src",
"4Desktop:seamonkey-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-0:1.0.9-71.el4.i386",
"4ES:seamonkey-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-0:1.0.9-71.el4.s390",
"4ES:seamonkey-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-0:1.0.9-71.el4.src",
"4ES:seamonkey-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-chat-0:1.0.9-71.el4.i386",
"4ES:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-chat-0:1.0.9-71.el4.s390",
"4ES:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-devel-0:1.0.9-71.el4.i386",
"4ES:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-devel-0:1.0.9-71.el4.s390",
"4ES:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-mail-0:1.0.9-71.el4.i386",
"4ES:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-mail-0:1.0.9-71.el4.s390",
"4ES:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-mail-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-0:1.0.9-71.el4.i386",
"4WS:seamonkey-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-0:1.0.9-71.el4.s390",
"4WS:seamonkey-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-0:1.0.9-71.el4.src",
"4WS:seamonkey-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-chat-0:1.0.9-71.el4.i386",
"4WS:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-chat-0:1.0.9-71.el4.s390",
"4WS:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-devel-0:1.0.9-71.el4.i386",
"4WS:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-devel-0:1.0.9-71.el4.s390",
"4WS:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-mail-0:1.0.9-71.el4.i386",
"4WS:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-mail-0:1.0.9-71.el4.s390",
"4WS:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-mail-0:1.0.9-71.el4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-2362"
},
{
"category": "external",
"summary": "RHBZ#714583",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=714583"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-2362",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2362"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-2362",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-2362"
}
],
"release_date": "2011-06-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-06-21T22:42:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"4AS:seamonkey-0:1.0.9-71.el4.i386",
"4AS:seamonkey-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-0:1.0.9-71.el4.s390",
"4AS:seamonkey-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-0:1.0.9-71.el4.src",
"4AS:seamonkey-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-chat-0:1.0.9-71.el4.i386",
"4AS:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-chat-0:1.0.9-71.el4.s390",
"4AS:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-devel-0:1.0.9-71.el4.i386",
"4AS:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-devel-0:1.0.9-71.el4.s390",
"4AS:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-mail-0:1.0.9-71.el4.i386",
"4AS:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-mail-0:1.0.9-71.el4.s390",
"4AS:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-mail-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-0:1.0.9-71.el4.src",
"4Desktop:seamonkey-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-0:1.0.9-71.el4.i386",
"4ES:seamonkey-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-0:1.0.9-71.el4.s390",
"4ES:seamonkey-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-0:1.0.9-71.el4.src",
"4ES:seamonkey-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-chat-0:1.0.9-71.el4.i386",
"4ES:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-chat-0:1.0.9-71.el4.s390",
"4ES:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-devel-0:1.0.9-71.el4.i386",
"4ES:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-devel-0:1.0.9-71.el4.s390",
"4ES:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-mail-0:1.0.9-71.el4.i386",
"4ES:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-mail-0:1.0.9-71.el4.s390",
"4ES:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-mail-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-0:1.0.9-71.el4.i386",
"4WS:seamonkey-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-0:1.0.9-71.el4.s390",
"4WS:seamonkey-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-0:1.0.9-71.el4.src",
"4WS:seamonkey-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-chat-0:1.0.9-71.el4.i386",
"4WS:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-chat-0:1.0.9-71.el4.s390",
"4WS:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-devel-0:1.0.9-71.el4.i386",
"4WS:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-devel-0:1.0.9-71.el4.s390",
"4WS:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-mail-0:1.0.9-71.el4.i386",
"4WS:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-mail-0:1.0.9-71.el4.s390",
"4WS:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-mail-0:1.0.9-71.el4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:0888"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.1,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS:seamonkey-0:1.0.9-71.el4.i386",
"4AS:seamonkey-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-0:1.0.9-71.el4.s390",
"4AS:seamonkey-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-0:1.0.9-71.el4.src",
"4AS:seamonkey-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-chat-0:1.0.9-71.el4.i386",
"4AS:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-chat-0:1.0.9-71.el4.s390",
"4AS:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-devel-0:1.0.9-71.el4.i386",
"4AS:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-devel-0:1.0.9-71.el4.s390",
"4AS:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-mail-0:1.0.9-71.el4.i386",
"4AS:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-mail-0:1.0.9-71.el4.s390",
"4AS:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-mail-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-0:1.0.9-71.el4.src",
"4Desktop:seamonkey-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-0:1.0.9-71.el4.i386",
"4ES:seamonkey-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-0:1.0.9-71.el4.s390",
"4ES:seamonkey-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-0:1.0.9-71.el4.src",
"4ES:seamonkey-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-chat-0:1.0.9-71.el4.i386",
"4ES:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-chat-0:1.0.9-71.el4.s390",
"4ES:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-devel-0:1.0.9-71.el4.i386",
"4ES:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-devel-0:1.0.9-71.el4.s390",
"4ES:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-mail-0:1.0.9-71.el4.i386",
"4ES:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-mail-0:1.0.9-71.el4.s390",
"4ES:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-mail-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-0:1.0.9-71.el4.i386",
"4WS:seamonkey-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-0:1.0.9-71.el4.s390",
"4WS:seamonkey-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-0:1.0.9-71.el4.src",
"4WS:seamonkey-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-chat-0:1.0.9-71.el4.i386",
"4WS:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-chat-0:1.0.9-71.el4.s390",
"4WS:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-devel-0:1.0.9-71.el4.i386",
"4WS:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-devel-0:1.0.9-71.el4.s390",
"4WS:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-mail-0:1.0.9-71.el4.i386",
"4WS:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-mail-0:1.0.9-71.el4.s390",
"4WS:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-mail-0:1.0.9-71.el4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "Mozilla Cookie isolation error (MFSA 2011-24)"
},
{
"cve": "CVE-2011-2363",
"discovery_date": "2011-06-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "714581"
}
],
"notes": [
{
"category": "description",
"text": "Use-after-free vulnerability in the nsSVGPointList::AppendElement function in the implementation of SVG element lists in Mozilla Firefox before 3.6.18, Thunderbird before 3.1.11, and SeaMonkey through 2.0.14 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via vectors involving a user-supplied callback.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Mozilla Multiple dangling pointer vulnerabilities (MFSA 2011-23)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS:seamonkey-0:1.0.9-71.el4.i386",
"4AS:seamonkey-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-0:1.0.9-71.el4.s390",
"4AS:seamonkey-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-0:1.0.9-71.el4.src",
"4AS:seamonkey-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-chat-0:1.0.9-71.el4.i386",
"4AS:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-chat-0:1.0.9-71.el4.s390",
"4AS:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-devel-0:1.0.9-71.el4.i386",
"4AS:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-devel-0:1.0.9-71.el4.s390",
"4AS:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-mail-0:1.0.9-71.el4.i386",
"4AS:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-mail-0:1.0.9-71.el4.s390",
"4AS:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-mail-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-0:1.0.9-71.el4.src",
"4Desktop:seamonkey-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-0:1.0.9-71.el4.i386",
"4ES:seamonkey-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-0:1.0.9-71.el4.s390",
"4ES:seamonkey-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-0:1.0.9-71.el4.src",
"4ES:seamonkey-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-chat-0:1.0.9-71.el4.i386",
"4ES:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-chat-0:1.0.9-71.el4.s390",
"4ES:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-devel-0:1.0.9-71.el4.i386",
"4ES:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-devel-0:1.0.9-71.el4.s390",
"4ES:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-mail-0:1.0.9-71.el4.i386",
"4ES:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-mail-0:1.0.9-71.el4.s390",
"4ES:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-mail-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-0:1.0.9-71.el4.i386",
"4WS:seamonkey-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-0:1.0.9-71.el4.s390",
"4WS:seamonkey-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-0:1.0.9-71.el4.src",
"4WS:seamonkey-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-chat-0:1.0.9-71.el4.i386",
"4WS:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-chat-0:1.0.9-71.el4.s390",
"4WS:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-devel-0:1.0.9-71.el4.i386",
"4WS:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-devel-0:1.0.9-71.el4.s390",
"4WS:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-mail-0:1.0.9-71.el4.i386",
"4WS:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-mail-0:1.0.9-71.el4.s390",
"4WS:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-mail-0:1.0.9-71.el4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-2363"
},
{
"category": "external",
"summary": "RHBZ#714581",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=714581"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-2363",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2363"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-2363",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-2363"
}
],
"release_date": "2011-06-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-06-21T22:42:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"4AS:seamonkey-0:1.0.9-71.el4.i386",
"4AS:seamonkey-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-0:1.0.9-71.el4.s390",
"4AS:seamonkey-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-0:1.0.9-71.el4.src",
"4AS:seamonkey-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-chat-0:1.0.9-71.el4.i386",
"4AS:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-chat-0:1.0.9-71.el4.s390",
"4AS:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-devel-0:1.0.9-71.el4.i386",
"4AS:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-devel-0:1.0.9-71.el4.s390",
"4AS:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-mail-0:1.0.9-71.el4.i386",
"4AS:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-mail-0:1.0.9-71.el4.s390",
"4AS:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-mail-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-0:1.0.9-71.el4.src",
"4Desktop:seamonkey-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-0:1.0.9-71.el4.i386",
"4ES:seamonkey-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-0:1.0.9-71.el4.s390",
"4ES:seamonkey-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-0:1.0.9-71.el4.src",
"4ES:seamonkey-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-chat-0:1.0.9-71.el4.i386",
"4ES:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-chat-0:1.0.9-71.el4.s390",
"4ES:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-devel-0:1.0.9-71.el4.i386",
"4ES:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-devel-0:1.0.9-71.el4.s390",
"4ES:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-mail-0:1.0.9-71.el4.i386",
"4ES:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-mail-0:1.0.9-71.el4.s390",
"4ES:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-mail-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-0:1.0.9-71.el4.i386",
"4WS:seamonkey-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-0:1.0.9-71.el4.s390",
"4WS:seamonkey-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-0:1.0.9-71.el4.src",
"4WS:seamonkey-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-chat-0:1.0.9-71.el4.i386",
"4WS:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-chat-0:1.0.9-71.el4.s390",
"4WS:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-devel-0:1.0.9-71.el4.i386",
"4WS:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-devel-0:1.0.9-71.el4.s390",
"4WS:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-mail-0:1.0.9-71.el4.i386",
"4WS:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-mail-0:1.0.9-71.el4.s390",
"4WS:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-mail-0:1.0.9-71.el4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:0888"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS:seamonkey-0:1.0.9-71.el4.i386",
"4AS:seamonkey-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-0:1.0.9-71.el4.s390",
"4AS:seamonkey-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-0:1.0.9-71.el4.src",
"4AS:seamonkey-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-chat-0:1.0.9-71.el4.i386",
"4AS:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-chat-0:1.0.9-71.el4.s390",
"4AS:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-devel-0:1.0.9-71.el4.i386",
"4AS:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-devel-0:1.0.9-71.el4.s390",
"4AS:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-mail-0:1.0.9-71.el4.i386",
"4AS:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-mail-0:1.0.9-71.el4.s390",
"4AS:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-mail-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-0:1.0.9-71.el4.src",
"4Desktop:seamonkey-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-0:1.0.9-71.el4.i386",
"4ES:seamonkey-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-0:1.0.9-71.el4.s390",
"4ES:seamonkey-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-0:1.0.9-71.el4.src",
"4ES:seamonkey-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-chat-0:1.0.9-71.el4.i386",
"4ES:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-chat-0:1.0.9-71.el4.s390",
"4ES:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-devel-0:1.0.9-71.el4.i386",
"4ES:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-devel-0:1.0.9-71.el4.s390",
"4ES:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-mail-0:1.0.9-71.el4.i386",
"4ES:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-mail-0:1.0.9-71.el4.s390",
"4ES:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-mail-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-0:1.0.9-71.el4.i386",
"4WS:seamonkey-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-0:1.0.9-71.el4.s390",
"4WS:seamonkey-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-0:1.0.9-71.el4.src",
"4WS:seamonkey-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-chat-0:1.0.9-71.el4.i386",
"4WS:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-chat-0:1.0.9-71.el4.s390",
"4WS:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-devel-0:1.0.9-71.el4.i386",
"4WS:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-devel-0:1.0.9-71.el4.s390",
"4WS:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-mail-0:1.0.9-71.el4.i386",
"4WS:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-mail-0:1.0.9-71.el4.s390",
"4WS:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-mail-0:1.0.9-71.el4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "Mozilla Multiple dangling pointer vulnerabilities (MFSA 2011-23)"
},
{
"cve": "CVE-2011-2364",
"discovery_date": "2011-06-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "714576"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the browser engine in Mozilla Firefox 3.6.x before 3.6.18 and Thunderbird before 3.1.11 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors, a different vulnerability than CVE-2011-2365.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Mozilla Miscellaneous memory safety hazards (MFSA 2011-19)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS:seamonkey-0:1.0.9-71.el4.i386",
"4AS:seamonkey-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-0:1.0.9-71.el4.s390",
"4AS:seamonkey-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-0:1.0.9-71.el4.src",
"4AS:seamonkey-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-chat-0:1.0.9-71.el4.i386",
"4AS:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-chat-0:1.0.9-71.el4.s390",
"4AS:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-devel-0:1.0.9-71.el4.i386",
"4AS:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-devel-0:1.0.9-71.el4.s390",
"4AS:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-mail-0:1.0.9-71.el4.i386",
"4AS:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-mail-0:1.0.9-71.el4.s390",
"4AS:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-mail-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-0:1.0.9-71.el4.src",
"4Desktop:seamonkey-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-0:1.0.9-71.el4.i386",
"4ES:seamonkey-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-0:1.0.9-71.el4.s390",
"4ES:seamonkey-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-0:1.0.9-71.el4.src",
"4ES:seamonkey-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-chat-0:1.0.9-71.el4.i386",
"4ES:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-chat-0:1.0.9-71.el4.s390",
"4ES:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-devel-0:1.0.9-71.el4.i386",
"4ES:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-devel-0:1.0.9-71.el4.s390",
"4ES:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-mail-0:1.0.9-71.el4.i386",
"4ES:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-mail-0:1.0.9-71.el4.s390",
"4ES:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-mail-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-0:1.0.9-71.el4.i386",
"4WS:seamonkey-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-0:1.0.9-71.el4.s390",
"4WS:seamonkey-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-0:1.0.9-71.el4.src",
"4WS:seamonkey-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-chat-0:1.0.9-71.el4.i386",
"4WS:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-chat-0:1.0.9-71.el4.s390",
"4WS:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-devel-0:1.0.9-71.el4.i386",
"4WS:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-devel-0:1.0.9-71.el4.s390",
"4WS:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-mail-0:1.0.9-71.el4.i386",
"4WS:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-mail-0:1.0.9-71.el4.s390",
"4WS:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-mail-0:1.0.9-71.el4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-2364"
},
{
"category": "external",
"summary": "RHBZ#714576",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=714576"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-2364",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2364"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-2364",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-2364"
}
],
"release_date": "2011-06-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-06-21T22:42:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"4AS:seamonkey-0:1.0.9-71.el4.i386",
"4AS:seamonkey-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-0:1.0.9-71.el4.s390",
"4AS:seamonkey-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-0:1.0.9-71.el4.src",
"4AS:seamonkey-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-chat-0:1.0.9-71.el4.i386",
"4AS:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-chat-0:1.0.9-71.el4.s390",
"4AS:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-devel-0:1.0.9-71.el4.i386",
"4AS:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-devel-0:1.0.9-71.el4.s390",
"4AS:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-mail-0:1.0.9-71.el4.i386",
"4AS:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-mail-0:1.0.9-71.el4.s390",
"4AS:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-mail-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-0:1.0.9-71.el4.src",
"4Desktop:seamonkey-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-0:1.0.9-71.el4.i386",
"4ES:seamonkey-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-0:1.0.9-71.el4.s390",
"4ES:seamonkey-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-0:1.0.9-71.el4.src",
"4ES:seamonkey-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-chat-0:1.0.9-71.el4.i386",
"4ES:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-chat-0:1.0.9-71.el4.s390",
"4ES:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-devel-0:1.0.9-71.el4.i386",
"4ES:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-devel-0:1.0.9-71.el4.s390",
"4ES:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-mail-0:1.0.9-71.el4.i386",
"4ES:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-mail-0:1.0.9-71.el4.s390",
"4ES:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-mail-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-0:1.0.9-71.el4.i386",
"4WS:seamonkey-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-0:1.0.9-71.el4.s390",
"4WS:seamonkey-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-0:1.0.9-71.el4.src",
"4WS:seamonkey-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-chat-0:1.0.9-71.el4.i386",
"4WS:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-chat-0:1.0.9-71.el4.s390",
"4WS:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-devel-0:1.0.9-71.el4.i386",
"4WS:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-devel-0:1.0.9-71.el4.s390",
"4WS:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-mail-0:1.0.9-71.el4.i386",
"4WS:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-mail-0:1.0.9-71.el4.s390",
"4WS:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-mail-0:1.0.9-71.el4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:0888"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS:seamonkey-0:1.0.9-71.el4.i386",
"4AS:seamonkey-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-0:1.0.9-71.el4.s390",
"4AS:seamonkey-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-0:1.0.9-71.el4.src",
"4AS:seamonkey-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-chat-0:1.0.9-71.el4.i386",
"4AS:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-chat-0:1.0.9-71.el4.s390",
"4AS:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-devel-0:1.0.9-71.el4.i386",
"4AS:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-devel-0:1.0.9-71.el4.s390",
"4AS:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-mail-0:1.0.9-71.el4.i386",
"4AS:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-mail-0:1.0.9-71.el4.s390",
"4AS:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-mail-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-0:1.0.9-71.el4.src",
"4Desktop:seamonkey-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-0:1.0.9-71.el4.i386",
"4ES:seamonkey-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-0:1.0.9-71.el4.s390",
"4ES:seamonkey-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-0:1.0.9-71.el4.src",
"4ES:seamonkey-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-chat-0:1.0.9-71.el4.i386",
"4ES:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-chat-0:1.0.9-71.el4.s390",
"4ES:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-devel-0:1.0.9-71.el4.i386",
"4ES:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-devel-0:1.0.9-71.el4.s390",
"4ES:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-mail-0:1.0.9-71.el4.i386",
"4ES:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-mail-0:1.0.9-71.el4.s390",
"4ES:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-mail-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-0:1.0.9-71.el4.i386",
"4WS:seamonkey-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-0:1.0.9-71.el4.s390",
"4WS:seamonkey-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-0:1.0.9-71.el4.src",
"4WS:seamonkey-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-chat-0:1.0.9-71.el4.i386",
"4WS:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-chat-0:1.0.9-71.el4.s390",
"4WS:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-devel-0:1.0.9-71.el4.i386",
"4WS:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-devel-0:1.0.9-71.el4.s390",
"4WS:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-mail-0:1.0.9-71.el4.i386",
"4WS:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-mail-0:1.0.9-71.el4.s390",
"4WS:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-mail-0:1.0.9-71.el4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "Mozilla Miscellaneous memory safety hazards (MFSA 2011-19)"
},
{
"cve": "CVE-2011-2365",
"discovery_date": "2011-06-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "714576"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the browser engine in Mozilla Firefox 3.6.x before 3.6.18 and Thunderbird before 3.1.11 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors, a different vulnerability than CVE-2011-2364.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Mozilla Miscellaneous memory safety hazards (MFSA 2011-19)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS:seamonkey-0:1.0.9-71.el4.i386",
"4AS:seamonkey-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-0:1.0.9-71.el4.s390",
"4AS:seamonkey-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-0:1.0.9-71.el4.src",
"4AS:seamonkey-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-chat-0:1.0.9-71.el4.i386",
"4AS:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-chat-0:1.0.9-71.el4.s390",
"4AS:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-devel-0:1.0.9-71.el4.i386",
"4AS:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-devel-0:1.0.9-71.el4.s390",
"4AS:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-mail-0:1.0.9-71.el4.i386",
"4AS:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-mail-0:1.0.9-71.el4.s390",
"4AS:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-mail-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-0:1.0.9-71.el4.src",
"4Desktop:seamonkey-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-0:1.0.9-71.el4.i386",
"4ES:seamonkey-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-0:1.0.9-71.el4.s390",
"4ES:seamonkey-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-0:1.0.9-71.el4.src",
"4ES:seamonkey-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-chat-0:1.0.9-71.el4.i386",
"4ES:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-chat-0:1.0.9-71.el4.s390",
"4ES:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-devel-0:1.0.9-71.el4.i386",
"4ES:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-devel-0:1.0.9-71.el4.s390",
"4ES:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-mail-0:1.0.9-71.el4.i386",
"4ES:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-mail-0:1.0.9-71.el4.s390",
"4ES:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-mail-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-0:1.0.9-71.el4.i386",
"4WS:seamonkey-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-0:1.0.9-71.el4.s390",
"4WS:seamonkey-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-0:1.0.9-71.el4.src",
"4WS:seamonkey-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-chat-0:1.0.9-71.el4.i386",
"4WS:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-chat-0:1.0.9-71.el4.s390",
"4WS:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-devel-0:1.0.9-71.el4.i386",
"4WS:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-devel-0:1.0.9-71.el4.s390",
"4WS:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-mail-0:1.0.9-71.el4.i386",
"4WS:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-mail-0:1.0.9-71.el4.s390",
"4WS:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-mail-0:1.0.9-71.el4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-2365"
},
{
"category": "external",
"summary": "RHBZ#714576",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=714576"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-2365",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2365"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-2365",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-2365"
}
],
"release_date": "2011-06-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-06-21T22:42:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"4AS:seamonkey-0:1.0.9-71.el4.i386",
"4AS:seamonkey-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-0:1.0.9-71.el4.s390",
"4AS:seamonkey-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-0:1.0.9-71.el4.src",
"4AS:seamonkey-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-chat-0:1.0.9-71.el4.i386",
"4AS:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-chat-0:1.0.9-71.el4.s390",
"4AS:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-devel-0:1.0.9-71.el4.i386",
"4AS:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-devel-0:1.0.9-71.el4.s390",
"4AS:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-mail-0:1.0.9-71.el4.i386",
"4AS:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-mail-0:1.0.9-71.el4.s390",
"4AS:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-mail-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-0:1.0.9-71.el4.src",
"4Desktop:seamonkey-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-0:1.0.9-71.el4.i386",
"4ES:seamonkey-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-0:1.0.9-71.el4.s390",
"4ES:seamonkey-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-0:1.0.9-71.el4.src",
"4ES:seamonkey-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-chat-0:1.0.9-71.el4.i386",
"4ES:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-chat-0:1.0.9-71.el4.s390",
"4ES:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-devel-0:1.0.9-71.el4.i386",
"4ES:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-devel-0:1.0.9-71.el4.s390",
"4ES:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-mail-0:1.0.9-71.el4.i386",
"4ES:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-mail-0:1.0.9-71.el4.s390",
"4ES:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-mail-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-0:1.0.9-71.el4.i386",
"4WS:seamonkey-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-0:1.0.9-71.el4.s390",
"4WS:seamonkey-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-0:1.0.9-71.el4.src",
"4WS:seamonkey-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-chat-0:1.0.9-71.el4.i386",
"4WS:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-chat-0:1.0.9-71.el4.s390",
"4WS:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-devel-0:1.0.9-71.el4.i386",
"4WS:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-devel-0:1.0.9-71.el4.s390",
"4WS:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-mail-0:1.0.9-71.el4.i386",
"4WS:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-mail-0:1.0.9-71.el4.s390",
"4WS:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-mail-0:1.0.9-71.el4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:0888"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS:seamonkey-0:1.0.9-71.el4.i386",
"4AS:seamonkey-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-0:1.0.9-71.el4.s390",
"4AS:seamonkey-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-0:1.0.9-71.el4.src",
"4AS:seamonkey-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-chat-0:1.0.9-71.el4.i386",
"4AS:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-chat-0:1.0.9-71.el4.s390",
"4AS:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-devel-0:1.0.9-71.el4.i386",
"4AS:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-devel-0:1.0.9-71.el4.s390",
"4AS:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-mail-0:1.0.9-71.el4.i386",
"4AS:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-mail-0:1.0.9-71.el4.s390",
"4AS:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-mail-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-0:1.0.9-71.el4.src",
"4Desktop:seamonkey-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-0:1.0.9-71.el4.i386",
"4ES:seamonkey-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-0:1.0.9-71.el4.s390",
"4ES:seamonkey-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-0:1.0.9-71.el4.src",
"4ES:seamonkey-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-chat-0:1.0.9-71.el4.i386",
"4ES:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-chat-0:1.0.9-71.el4.s390",
"4ES:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-devel-0:1.0.9-71.el4.i386",
"4ES:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-devel-0:1.0.9-71.el4.s390",
"4ES:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-mail-0:1.0.9-71.el4.i386",
"4ES:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-mail-0:1.0.9-71.el4.s390",
"4ES:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-mail-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-0:1.0.9-71.el4.i386",
"4WS:seamonkey-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-0:1.0.9-71.el4.s390",
"4WS:seamonkey-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-0:1.0.9-71.el4.src",
"4WS:seamonkey-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-chat-0:1.0.9-71.el4.i386",
"4WS:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-chat-0:1.0.9-71.el4.s390",
"4WS:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-devel-0:1.0.9-71.el4.i386",
"4WS:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-devel-0:1.0.9-71.el4.s390",
"4WS:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-mail-0:1.0.9-71.el4.i386",
"4WS:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-mail-0:1.0.9-71.el4.s390",
"4WS:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-mail-0:1.0.9-71.el4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "Mozilla Miscellaneous memory safety hazards (MFSA 2011-19)"
},
{
"cve": "CVE-2011-2371",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"discovery_date": "2011-06-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "714580"
}
],
"notes": [
{
"category": "description",
"text": "Integer overflow in the Array.reduceRight method in Mozilla Firefox before 3.6.18 and 4.x through 4.0.1, Thunderbird before 3.1.11, and SeaMonkey through 2.0.14 allows remote attackers to execute arbitrary code via vectors involving a long JavaScript Array object.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Mozilla Integer overflow and arbitrary code execution (MFSA 2011-22)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS:seamonkey-0:1.0.9-71.el4.i386",
"4AS:seamonkey-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-0:1.0.9-71.el4.s390",
"4AS:seamonkey-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-0:1.0.9-71.el4.src",
"4AS:seamonkey-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-chat-0:1.0.9-71.el4.i386",
"4AS:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-chat-0:1.0.9-71.el4.s390",
"4AS:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-devel-0:1.0.9-71.el4.i386",
"4AS:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-devel-0:1.0.9-71.el4.s390",
"4AS:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-mail-0:1.0.9-71.el4.i386",
"4AS:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-mail-0:1.0.9-71.el4.s390",
"4AS:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-mail-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-0:1.0.9-71.el4.src",
"4Desktop:seamonkey-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-0:1.0.9-71.el4.i386",
"4ES:seamonkey-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-0:1.0.9-71.el4.s390",
"4ES:seamonkey-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-0:1.0.9-71.el4.src",
"4ES:seamonkey-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-chat-0:1.0.9-71.el4.i386",
"4ES:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-chat-0:1.0.9-71.el4.s390",
"4ES:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-devel-0:1.0.9-71.el4.i386",
"4ES:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-devel-0:1.0.9-71.el4.s390",
"4ES:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-mail-0:1.0.9-71.el4.i386",
"4ES:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-mail-0:1.0.9-71.el4.s390",
"4ES:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-mail-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-0:1.0.9-71.el4.i386",
"4WS:seamonkey-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-0:1.0.9-71.el4.s390",
"4WS:seamonkey-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-0:1.0.9-71.el4.src",
"4WS:seamonkey-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-chat-0:1.0.9-71.el4.i386",
"4WS:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-chat-0:1.0.9-71.el4.s390",
"4WS:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-devel-0:1.0.9-71.el4.i386",
"4WS:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-devel-0:1.0.9-71.el4.s390",
"4WS:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-mail-0:1.0.9-71.el4.i386",
"4WS:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-mail-0:1.0.9-71.el4.s390",
"4WS:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-mail-0:1.0.9-71.el4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-2371"
},
{
"category": "external",
"summary": "RHBZ#714580",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=714580"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-2371",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2371"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-2371",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-2371"
}
],
"release_date": "2011-06-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-06-21T22:42:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"4AS:seamonkey-0:1.0.9-71.el4.i386",
"4AS:seamonkey-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-0:1.0.9-71.el4.s390",
"4AS:seamonkey-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-0:1.0.9-71.el4.src",
"4AS:seamonkey-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-chat-0:1.0.9-71.el4.i386",
"4AS:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-chat-0:1.0.9-71.el4.s390",
"4AS:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-devel-0:1.0.9-71.el4.i386",
"4AS:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-devel-0:1.0.9-71.el4.s390",
"4AS:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-mail-0:1.0.9-71.el4.i386",
"4AS:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-mail-0:1.0.9-71.el4.s390",
"4AS:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-mail-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-0:1.0.9-71.el4.src",
"4Desktop:seamonkey-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-0:1.0.9-71.el4.i386",
"4ES:seamonkey-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-0:1.0.9-71.el4.s390",
"4ES:seamonkey-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-0:1.0.9-71.el4.src",
"4ES:seamonkey-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-chat-0:1.0.9-71.el4.i386",
"4ES:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-chat-0:1.0.9-71.el4.s390",
"4ES:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-devel-0:1.0.9-71.el4.i386",
"4ES:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-devel-0:1.0.9-71.el4.s390",
"4ES:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-mail-0:1.0.9-71.el4.i386",
"4ES:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-mail-0:1.0.9-71.el4.s390",
"4ES:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-mail-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-0:1.0.9-71.el4.i386",
"4WS:seamonkey-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-0:1.0.9-71.el4.s390",
"4WS:seamonkey-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-0:1.0.9-71.el4.src",
"4WS:seamonkey-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-chat-0:1.0.9-71.el4.i386",
"4WS:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-chat-0:1.0.9-71.el4.s390",
"4WS:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-devel-0:1.0.9-71.el4.i386",
"4WS:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-devel-0:1.0.9-71.el4.s390",
"4WS:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-mail-0:1.0.9-71.el4.i386",
"4WS:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-mail-0:1.0.9-71.el4.s390",
"4WS:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-mail-0:1.0.9-71.el4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:0888"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS:seamonkey-0:1.0.9-71.el4.i386",
"4AS:seamonkey-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-0:1.0.9-71.el4.s390",
"4AS:seamonkey-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-0:1.0.9-71.el4.src",
"4AS:seamonkey-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-chat-0:1.0.9-71.el4.i386",
"4AS:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-chat-0:1.0.9-71.el4.s390",
"4AS:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-devel-0:1.0.9-71.el4.i386",
"4AS:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-devel-0:1.0.9-71.el4.s390",
"4AS:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-mail-0:1.0.9-71.el4.i386",
"4AS:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-mail-0:1.0.9-71.el4.s390",
"4AS:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-mail-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-0:1.0.9-71.el4.src",
"4Desktop:seamonkey-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-0:1.0.9-71.el4.i386",
"4ES:seamonkey-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-0:1.0.9-71.el4.s390",
"4ES:seamonkey-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-0:1.0.9-71.el4.src",
"4ES:seamonkey-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-chat-0:1.0.9-71.el4.i386",
"4ES:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-chat-0:1.0.9-71.el4.s390",
"4ES:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-devel-0:1.0.9-71.el4.i386",
"4ES:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-devel-0:1.0.9-71.el4.s390",
"4ES:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-mail-0:1.0.9-71.el4.i386",
"4ES:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-mail-0:1.0.9-71.el4.s390",
"4ES:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-mail-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-0:1.0.9-71.el4.i386",
"4WS:seamonkey-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-0:1.0.9-71.el4.s390",
"4WS:seamonkey-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-0:1.0.9-71.el4.src",
"4WS:seamonkey-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-chat-0:1.0.9-71.el4.i386",
"4WS:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-chat-0:1.0.9-71.el4.s390",
"4WS:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-devel-0:1.0.9-71.el4.i386",
"4WS:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-devel-0:1.0.9-71.el4.s390",
"4WS:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-mail-0:1.0.9-71.el4.i386",
"4WS:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-mail-0:1.0.9-71.el4.s390",
"4WS:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-mail-0:1.0.9-71.el4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "Mozilla Integer overflow and arbitrary code execution (MFSA 2011-22)"
},
{
"cve": "CVE-2011-2373",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2011-06-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "714577"
}
],
"notes": [
{
"category": "description",
"text": "Use-after-free vulnerability in Mozilla Firefox before 3.6.18 and 4.x through 4.0.1, Thunderbird before 3.1.11, and SeaMonkey through 2.0.14, when JavaScript is disabled, allows remote attackers to execute arbitrary code via a crafted XUL document.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Mozilla Use-after-free vulnerability when viewing XUL document with script disabled (MFSA 2011-20)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS:seamonkey-0:1.0.9-71.el4.i386",
"4AS:seamonkey-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-0:1.0.9-71.el4.s390",
"4AS:seamonkey-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-0:1.0.9-71.el4.src",
"4AS:seamonkey-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-chat-0:1.0.9-71.el4.i386",
"4AS:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-chat-0:1.0.9-71.el4.s390",
"4AS:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-devel-0:1.0.9-71.el4.i386",
"4AS:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-devel-0:1.0.9-71.el4.s390",
"4AS:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-mail-0:1.0.9-71.el4.i386",
"4AS:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-mail-0:1.0.9-71.el4.s390",
"4AS:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-mail-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-0:1.0.9-71.el4.src",
"4Desktop:seamonkey-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-0:1.0.9-71.el4.i386",
"4ES:seamonkey-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-0:1.0.9-71.el4.s390",
"4ES:seamonkey-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-0:1.0.9-71.el4.src",
"4ES:seamonkey-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-chat-0:1.0.9-71.el4.i386",
"4ES:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-chat-0:1.0.9-71.el4.s390",
"4ES:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-devel-0:1.0.9-71.el4.i386",
"4ES:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-devel-0:1.0.9-71.el4.s390",
"4ES:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-mail-0:1.0.9-71.el4.i386",
"4ES:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-mail-0:1.0.9-71.el4.s390",
"4ES:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-mail-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-0:1.0.9-71.el4.i386",
"4WS:seamonkey-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-0:1.0.9-71.el4.s390",
"4WS:seamonkey-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-0:1.0.9-71.el4.src",
"4WS:seamonkey-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-chat-0:1.0.9-71.el4.i386",
"4WS:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-chat-0:1.0.9-71.el4.s390",
"4WS:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-devel-0:1.0.9-71.el4.i386",
"4WS:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-devel-0:1.0.9-71.el4.s390",
"4WS:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-mail-0:1.0.9-71.el4.i386",
"4WS:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-mail-0:1.0.9-71.el4.s390",
"4WS:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-mail-0:1.0.9-71.el4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-2373"
},
{
"category": "external",
"summary": "RHBZ#714577",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=714577"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-2373",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2373"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-2373",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-2373"
}
],
"release_date": "2011-06-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-06-21T22:42:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"4AS:seamonkey-0:1.0.9-71.el4.i386",
"4AS:seamonkey-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-0:1.0.9-71.el4.s390",
"4AS:seamonkey-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-0:1.0.9-71.el4.src",
"4AS:seamonkey-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-chat-0:1.0.9-71.el4.i386",
"4AS:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-chat-0:1.0.9-71.el4.s390",
"4AS:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-devel-0:1.0.9-71.el4.i386",
"4AS:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-devel-0:1.0.9-71.el4.s390",
"4AS:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-mail-0:1.0.9-71.el4.i386",
"4AS:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-mail-0:1.0.9-71.el4.s390",
"4AS:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-mail-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-0:1.0.9-71.el4.src",
"4Desktop:seamonkey-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-0:1.0.9-71.el4.i386",
"4ES:seamonkey-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-0:1.0.9-71.el4.s390",
"4ES:seamonkey-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-0:1.0.9-71.el4.src",
"4ES:seamonkey-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-chat-0:1.0.9-71.el4.i386",
"4ES:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-chat-0:1.0.9-71.el4.s390",
"4ES:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-devel-0:1.0.9-71.el4.i386",
"4ES:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-devel-0:1.0.9-71.el4.s390",
"4ES:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-mail-0:1.0.9-71.el4.i386",
"4ES:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-mail-0:1.0.9-71.el4.s390",
"4ES:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-mail-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-0:1.0.9-71.el4.i386",
"4WS:seamonkey-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-0:1.0.9-71.el4.s390",
"4WS:seamonkey-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-0:1.0.9-71.el4.src",
"4WS:seamonkey-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-chat-0:1.0.9-71.el4.i386",
"4WS:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-chat-0:1.0.9-71.el4.s390",
"4WS:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-devel-0:1.0.9-71.el4.i386",
"4WS:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-devel-0:1.0.9-71.el4.s390",
"4WS:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-mail-0:1.0.9-71.el4.i386",
"4WS:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-mail-0:1.0.9-71.el4.s390",
"4WS:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-mail-0:1.0.9-71.el4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:0888"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS:seamonkey-0:1.0.9-71.el4.i386",
"4AS:seamonkey-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-0:1.0.9-71.el4.s390",
"4AS:seamonkey-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-0:1.0.9-71.el4.src",
"4AS:seamonkey-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-chat-0:1.0.9-71.el4.i386",
"4AS:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-chat-0:1.0.9-71.el4.s390",
"4AS:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-devel-0:1.0.9-71.el4.i386",
"4AS:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-devel-0:1.0.9-71.el4.s390",
"4AS:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-mail-0:1.0.9-71.el4.i386",
"4AS:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-mail-0:1.0.9-71.el4.s390",
"4AS:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-mail-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-0:1.0.9-71.el4.src",
"4Desktop:seamonkey-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-0:1.0.9-71.el4.i386",
"4ES:seamonkey-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-0:1.0.9-71.el4.s390",
"4ES:seamonkey-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-0:1.0.9-71.el4.src",
"4ES:seamonkey-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-chat-0:1.0.9-71.el4.i386",
"4ES:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-chat-0:1.0.9-71.el4.s390",
"4ES:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-devel-0:1.0.9-71.el4.i386",
"4ES:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-devel-0:1.0.9-71.el4.s390",
"4ES:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-mail-0:1.0.9-71.el4.i386",
"4ES:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-mail-0:1.0.9-71.el4.s390",
"4ES:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-mail-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-0:1.0.9-71.el4.i386",
"4WS:seamonkey-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-0:1.0.9-71.el4.s390",
"4WS:seamonkey-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-0:1.0.9-71.el4.src",
"4WS:seamonkey-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-chat-0:1.0.9-71.el4.i386",
"4WS:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-chat-0:1.0.9-71.el4.s390",
"4WS:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-devel-0:1.0.9-71.el4.i386",
"4WS:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-devel-0:1.0.9-71.el4.s390",
"4WS:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-mail-0:1.0.9-71.el4.i386",
"4WS:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-mail-0:1.0.9-71.el4.s390",
"4WS:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-mail-0:1.0.9-71.el4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "Mozilla Use-after-free vulnerability when viewing XUL document with script disabled (MFSA 2011-20)"
},
{
"cve": "CVE-2011-2374",
"discovery_date": "2011-06-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "714576"
}
],
"notes": [
{
"category": "description",
"text": "Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 3.6.18 and 4.x through 4.0.1, and Thunderbird before 3.1.11, allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Mozilla Miscellaneous memory safety hazards (MFSA 2011-19)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS:seamonkey-0:1.0.9-71.el4.i386",
"4AS:seamonkey-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-0:1.0.9-71.el4.s390",
"4AS:seamonkey-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-0:1.0.9-71.el4.src",
"4AS:seamonkey-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-chat-0:1.0.9-71.el4.i386",
"4AS:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-chat-0:1.0.9-71.el4.s390",
"4AS:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-devel-0:1.0.9-71.el4.i386",
"4AS:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-devel-0:1.0.9-71.el4.s390",
"4AS:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-mail-0:1.0.9-71.el4.i386",
"4AS:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-mail-0:1.0.9-71.el4.s390",
"4AS:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-mail-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-0:1.0.9-71.el4.src",
"4Desktop:seamonkey-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-0:1.0.9-71.el4.i386",
"4ES:seamonkey-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-0:1.0.9-71.el4.s390",
"4ES:seamonkey-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-0:1.0.9-71.el4.src",
"4ES:seamonkey-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-chat-0:1.0.9-71.el4.i386",
"4ES:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-chat-0:1.0.9-71.el4.s390",
"4ES:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-devel-0:1.0.9-71.el4.i386",
"4ES:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-devel-0:1.0.9-71.el4.s390",
"4ES:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-mail-0:1.0.9-71.el4.i386",
"4ES:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-mail-0:1.0.9-71.el4.s390",
"4ES:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-mail-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-0:1.0.9-71.el4.i386",
"4WS:seamonkey-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-0:1.0.9-71.el4.s390",
"4WS:seamonkey-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-0:1.0.9-71.el4.src",
"4WS:seamonkey-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-chat-0:1.0.9-71.el4.i386",
"4WS:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-chat-0:1.0.9-71.el4.s390",
"4WS:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-devel-0:1.0.9-71.el4.i386",
"4WS:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-devel-0:1.0.9-71.el4.s390",
"4WS:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-mail-0:1.0.9-71.el4.i386",
"4WS:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-mail-0:1.0.9-71.el4.s390",
"4WS:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-mail-0:1.0.9-71.el4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-2374"
},
{
"category": "external",
"summary": "RHBZ#714576",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=714576"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-2374",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2374"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-2374",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-2374"
}
],
"release_date": "2011-06-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-06-21T22:42:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"4AS:seamonkey-0:1.0.9-71.el4.i386",
"4AS:seamonkey-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-0:1.0.9-71.el4.s390",
"4AS:seamonkey-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-0:1.0.9-71.el4.src",
"4AS:seamonkey-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-chat-0:1.0.9-71.el4.i386",
"4AS:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-chat-0:1.0.9-71.el4.s390",
"4AS:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-devel-0:1.0.9-71.el4.i386",
"4AS:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-devel-0:1.0.9-71.el4.s390",
"4AS:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-mail-0:1.0.9-71.el4.i386",
"4AS:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-mail-0:1.0.9-71.el4.s390",
"4AS:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-mail-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-0:1.0.9-71.el4.src",
"4Desktop:seamonkey-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-0:1.0.9-71.el4.i386",
"4ES:seamonkey-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-0:1.0.9-71.el4.s390",
"4ES:seamonkey-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-0:1.0.9-71.el4.src",
"4ES:seamonkey-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-chat-0:1.0.9-71.el4.i386",
"4ES:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-chat-0:1.0.9-71.el4.s390",
"4ES:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-devel-0:1.0.9-71.el4.i386",
"4ES:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-devel-0:1.0.9-71.el4.s390",
"4ES:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-mail-0:1.0.9-71.el4.i386",
"4ES:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-mail-0:1.0.9-71.el4.s390",
"4ES:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-mail-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-0:1.0.9-71.el4.i386",
"4WS:seamonkey-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-0:1.0.9-71.el4.s390",
"4WS:seamonkey-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-0:1.0.9-71.el4.src",
"4WS:seamonkey-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-chat-0:1.0.9-71.el4.i386",
"4WS:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-chat-0:1.0.9-71.el4.s390",
"4WS:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-devel-0:1.0.9-71.el4.i386",
"4WS:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-devel-0:1.0.9-71.el4.s390",
"4WS:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-mail-0:1.0.9-71.el4.i386",
"4WS:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-mail-0:1.0.9-71.el4.s390",
"4WS:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-mail-0:1.0.9-71.el4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:0888"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS:seamonkey-0:1.0.9-71.el4.i386",
"4AS:seamonkey-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-0:1.0.9-71.el4.s390",
"4AS:seamonkey-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-0:1.0.9-71.el4.src",
"4AS:seamonkey-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-chat-0:1.0.9-71.el4.i386",
"4AS:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-chat-0:1.0.9-71.el4.s390",
"4AS:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-devel-0:1.0.9-71.el4.i386",
"4AS:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-devel-0:1.0.9-71.el4.s390",
"4AS:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-mail-0:1.0.9-71.el4.i386",
"4AS:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-mail-0:1.0.9-71.el4.s390",
"4AS:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-mail-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-0:1.0.9-71.el4.src",
"4Desktop:seamonkey-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-0:1.0.9-71.el4.i386",
"4ES:seamonkey-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-0:1.0.9-71.el4.s390",
"4ES:seamonkey-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-0:1.0.9-71.el4.src",
"4ES:seamonkey-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-chat-0:1.0.9-71.el4.i386",
"4ES:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-chat-0:1.0.9-71.el4.s390",
"4ES:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-devel-0:1.0.9-71.el4.i386",
"4ES:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-devel-0:1.0.9-71.el4.s390",
"4ES:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-mail-0:1.0.9-71.el4.i386",
"4ES:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-mail-0:1.0.9-71.el4.s390",
"4ES:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-mail-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-0:1.0.9-71.el4.i386",
"4WS:seamonkey-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-0:1.0.9-71.el4.s390",
"4WS:seamonkey-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-0:1.0.9-71.el4.src",
"4WS:seamonkey-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-chat-0:1.0.9-71.el4.i386",
"4WS:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-chat-0:1.0.9-71.el4.s390",
"4WS:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-devel-0:1.0.9-71.el4.i386",
"4WS:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-devel-0:1.0.9-71.el4.s390",
"4WS:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-mail-0:1.0.9-71.el4.i386",
"4WS:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-mail-0:1.0.9-71.el4.s390",
"4WS:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-mail-0:1.0.9-71.el4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "Mozilla Miscellaneous memory safety hazards (MFSA 2011-19)"
},
{
"cve": "CVE-2011-2375",
"discovery_date": "2011-06-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "714576"
}
],
"notes": [
{
"category": "description",
"text": "Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 5.0 and Thunderbird through 3.1.11 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Mozilla Miscellaneous memory safety hazards (MFSA 2011-19)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS:seamonkey-0:1.0.9-71.el4.i386",
"4AS:seamonkey-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-0:1.0.9-71.el4.s390",
"4AS:seamonkey-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-0:1.0.9-71.el4.src",
"4AS:seamonkey-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-chat-0:1.0.9-71.el4.i386",
"4AS:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-chat-0:1.0.9-71.el4.s390",
"4AS:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-devel-0:1.0.9-71.el4.i386",
"4AS:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-devel-0:1.0.9-71.el4.s390",
"4AS:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-mail-0:1.0.9-71.el4.i386",
"4AS:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-mail-0:1.0.9-71.el4.s390",
"4AS:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-mail-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-0:1.0.9-71.el4.src",
"4Desktop:seamonkey-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-0:1.0.9-71.el4.i386",
"4ES:seamonkey-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-0:1.0.9-71.el4.s390",
"4ES:seamonkey-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-0:1.0.9-71.el4.src",
"4ES:seamonkey-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-chat-0:1.0.9-71.el4.i386",
"4ES:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-chat-0:1.0.9-71.el4.s390",
"4ES:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-devel-0:1.0.9-71.el4.i386",
"4ES:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-devel-0:1.0.9-71.el4.s390",
"4ES:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-mail-0:1.0.9-71.el4.i386",
"4ES:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-mail-0:1.0.9-71.el4.s390",
"4ES:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-mail-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-0:1.0.9-71.el4.i386",
"4WS:seamonkey-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-0:1.0.9-71.el4.s390",
"4WS:seamonkey-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-0:1.0.9-71.el4.src",
"4WS:seamonkey-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-chat-0:1.0.9-71.el4.i386",
"4WS:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-chat-0:1.0.9-71.el4.s390",
"4WS:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-devel-0:1.0.9-71.el4.i386",
"4WS:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-devel-0:1.0.9-71.el4.s390",
"4WS:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-mail-0:1.0.9-71.el4.i386",
"4WS:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-mail-0:1.0.9-71.el4.s390",
"4WS:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-mail-0:1.0.9-71.el4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-2375"
},
{
"category": "external",
"summary": "RHBZ#714576",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=714576"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-2375",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2375"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-2375",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-2375"
}
],
"release_date": "2011-06-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-06-21T22:42:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"4AS:seamonkey-0:1.0.9-71.el4.i386",
"4AS:seamonkey-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-0:1.0.9-71.el4.s390",
"4AS:seamonkey-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-0:1.0.9-71.el4.src",
"4AS:seamonkey-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-chat-0:1.0.9-71.el4.i386",
"4AS:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-chat-0:1.0.9-71.el4.s390",
"4AS:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-devel-0:1.0.9-71.el4.i386",
"4AS:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-devel-0:1.0.9-71.el4.s390",
"4AS:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-mail-0:1.0.9-71.el4.i386",
"4AS:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-mail-0:1.0.9-71.el4.s390",
"4AS:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-mail-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-0:1.0.9-71.el4.src",
"4Desktop:seamonkey-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-0:1.0.9-71.el4.i386",
"4ES:seamonkey-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-0:1.0.9-71.el4.s390",
"4ES:seamonkey-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-0:1.0.9-71.el4.src",
"4ES:seamonkey-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-chat-0:1.0.9-71.el4.i386",
"4ES:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-chat-0:1.0.9-71.el4.s390",
"4ES:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-devel-0:1.0.9-71.el4.i386",
"4ES:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-devel-0:1.0.9-71.el4.s390",
"4ES:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-mail-0:1.0.9-71.el4.i386",
"4ES:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-mail-0:1.0.9-71.el4.s390",
"4ES:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-mail-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-0:1.0.9-71.el4.i386",
"4WS:seamonkey-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-0:1.0.9-71.el4.s390",
"4WS:seamonkey-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-0:1.0.9-71.el4.src",
"4WS:seamonkey-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-chat-0:1.0.9-71.el4.i386",
"4WS:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-chat-0:1.0.9-71.el4.s390",
"4WS:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-devel-0:1.0.9-71.el4.i386",
"4WS:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-devel-0:1.0.9-71.el4.s390",
"4WS:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-mail-0:1.0.9-71.el4.i386",
"4WS:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-mail-0:1.0.9-71.el4.s390",
"4WS:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-mail-0:1.0.9-71.el4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:0888"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS:seamonkey-0:1.0.9-71.el4.i386",
"4AS:seamonkey-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-0:1.0.9-71.el4.s390",
"4AS:seamonkey-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-0:1.0.9-71.el4.src",
"4AS:seamonkey-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-chat-0:1.0.9-71.el4.i386",
"4AS:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-chat-0:1.0.9-71.el4.s390",
"4AS:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-devel-0:1.0.9-71.el4.i386",
"4AS:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-devel-0:1.0.9-71.el4.s390",
"4AS:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-mail-0:1.0.9-71.el4.i386",
"4AS:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-mail-0:1.0.9-71.el4.s390",
"4AS:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-mail-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-0:1.0.9-71.el4.src",
"4Desktop:seamonkey-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-0:1.0.9-71.el4.i386",
"4ES:seamonkey-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-0:1.0.9-71.el4.s390",
"4ES:seamonkey-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-0:1.0.9-71.el4.src",
"4ES:seamonkey-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-chat-0:1.0.9-71.el4.i386",
"4ES:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-chat-0:1.0.9-71.el4.s390",
"4ES:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-devel-0:1.0.9-71.el4.i386",
"4ES:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-devel-0:1.0.9-71.el4.s390",
"4ES:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-mail-0:1.0.9-71.el4.i386",
"4ES:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-mail-0:1.0.9-71.el4.s390",
"4ES:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-mail-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-0:1.0.9-71.el4.i386",
"4WS:seamonkey-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-0:1.0.9-71.el4.s390",
"4WS:seamonkey-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-0:1.0.9-71.el4.src",
"4WS:seamonkey-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-chat-0:1.0.9-71.el4.i386",
"4WS:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-chat-0:1.0.9-71.el4.s390",
"4WS:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-devel-0:1.0.9-71.el4.i386",
"4WS:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-devel-0:1.0.9-71.el4.s390",
"4WS:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-mail-0:1.0.9-71.el4.i386",
"4WS:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-mail-0:1.0.9-71.el4.s390",
"4WS:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-mail-0:1.0.9-71.el4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "Mozilla Miscellaneous memory safety hazards (MFSA 2011-19)"
},
{
"cve": "CVE-2011-2376",
"discovery_date": "2011-06-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "714576"
}
],
"notes": [
{
"category": "description",
"text": "Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 3.6.18 and Thunderbird before 3.1.11 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Mozilla Miscellaneous memory safety hazards (MFSA 2011-19)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS:seamonkey-0:1.0.9-71.el4.i386",
"4AS:seamonkey-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-0:1.0.9-71.el4.s390",
"4AS:seamonkey-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-0:1.0.9-71.el4.src",
"4AS:seamonkey-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-chat-0:1.0.9-71.el4.i386",
"4AS:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-chat-0:1.0.9-71.el4.s390",
"4AS:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-devel-0:1.0.9-71.el4.i386",
"4AS:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-devel-0:1.0.9-71.el4.s390",
"4AS:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-mail-0:1.0.9-71.el4.i386",
"4AS:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-mail-0:1.0.9-71.el4.s390",
"4AS:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-mail-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-0:1.0.9-71.el4.src",
"4Desktop:seamonkey-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-0:1.0.9-71.el4.i386",
"4ES:seamonkey-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-0:1.0.9-71.el4.s390",
"4ES:seamonkey-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-0:1.0.9-71.el4.src",
"4ES:seamonkey-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-chat-0:1.0.9-71.el4.i386",
"4ES:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-chat-0:1.0.9-71.el4.s390",
"4ES:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-devel-0:1.0.9-71.el4.i386",
"4ES:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-devel-0:1.0.9-71.el4.s390",
"4ES:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-mail-0:1.0.9-71.el4.i386",
"4ES:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-mail-0:1.0.9-71.el4.s390",
"4ES:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-mail-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-0:1.0.9-71.el4.i386",
"4WS:seamonkey-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-0:1.0.9-71.el4.s390",
"4WS:seamonkey-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-0:1.0.9-71.el4.src",
"4WS:seamonkey-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-chat-0:1.0.9-71.el4.i386",
"4WS:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-chat-0:1.0.9-71.el4.s390",
"4WS:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-devel-0:1.0.9-71.el4.i386",
"4WS:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-devel-0:1.0.9-71.el4.s390",
"4WS:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-mail-0:1.0.9-71.el4.i386",
"4WS:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-mail-0:1.0.9-71.el4.s390",
"4WS:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-mail-0:1.0.9-71.el4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-2376"
},
{
"category": "external",
"summary": "RHBZ#714576",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=714576"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-2376",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2376"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-2376",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-2376"
}
],
"release_date": "2011-06-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-06-21T22:42:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"4AS:seamonkey-0:1.0.9-71.el4.i386",
"4AS:seamonkey-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-0:1.0.9-71.el4.s390",
"4AS:seamonkey-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-0:1.0.9-71.el4.src",
"4AS:seamonkey-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-chat-0:1.0.9-71.el4.i386",
"4AS:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-chat-0:1.0.9-71.el4.s390",
"4AS:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-devel-0:1.0.9-71.el4.i386",
"4AS:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-devel-0:1.0.9-71.el4.s390",
"4AS:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-mail-0:1.0.9-71.el4.i386",
"4AS:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-mail-0:1.0.9-71.el4.s390",
"4AS:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-mail-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-0:1.0.9-71.el4.src",
"4Desktop:seamonkey-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-0:1.0.9-71.el4.i386",
"4ES:seamonkey-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-0:1.0.9-71.el4.s390",
"4ES:seamonkey-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-0:1.0.9-71.el4.src",
"4ES:seamonkey-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-chat-0:1.0.9-71.el4.i386",
"4ES:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-chat-0:1.0.9-71.el4.s390",
"4ES:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-devel-0:1.0.9-71.el4.i386",
"4ES:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-devel-0:1.0.9-71.el4.s390",
"4ES:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-mail-0:1.0.9-71.el4.i386",
"4ES:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-mail-0:1.0.9-71.el4.s390",
"4ES:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-mail-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-0:1.0.9-71.el4.i386",
"4WS:seamonkey-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-0:1.0.9-71.el4.s390",
"4WS:seamonkey-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-0:1.0.9-71.el4.src",
"4WS:seamonkey-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-chat-0:1.0.9-71.el4.i386",
"4WS:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-chat-0:1.0.9-71.el4.s390",
"4WS:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-devel-0:1.0.9-71.el4.i386",
"4WS:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-devel-0:1.0.9-71.el4.s390",
"4WS:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-mail-0:1.0.9-71.el4.i386",
"4WS:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-mail-0:1.0.9-71.el4.s390",
"4WS:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-mail-0:1.0.9-71.el4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:0888"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS:seamonkey-0:1.0.9-71.el4.i386",
"4AS:seamonkey-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-0:1.0.9-71.el4.s390",
"4AS:seamonkey-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-0:1.0.9-71.el4.src",
"4AS:seamonkey-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-chat-0:1.0.9-71.el4.i386",
"4AS:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-chat-0:1.0.9-71.el4.s390",
"4AS:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-devel-0:1.0.9-71.el4.i386",
"4AS:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-devel-0:1.0.9-71.el4.s390",
"4AS:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-mail-0:1.0.9-71.el4.i386",
"4AS:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-mail-0:1.0.9-71.el4.s390",
"4AS:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-mail-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-0:1.0.9-71.el4.src",
"4Desktop:seamonkey-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-0:1.0.9-71.el4.i386",
"4ES:seamonkey-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-0:1.0.9-71.el4.s390",
"4ES:seamonkey-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-0:1.0.9-71.el4.src",
"4ES:seamonkey-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-chat-0:1.0.9-71.el4.i386",
"4ES:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-chat-0:1.0.9-71.el4.s390",
"4ES:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-devel-0:1.0.9-71.el4.i386",
"4ES:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-devel-0:1.0.9-71.el4.s390",
"4ES:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-mail-0:1.0.9-71.el4.i386",
"4ES:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-mail-0:1.0.9-71.el4.s390",
"4ES:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-mail-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-0:1.0.9-71.el4.i386",
"4WS:seamonkey-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-0:1.0.9-71.el4.s390",
"4WS:seamonkey-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-0:1.0.9-71.el4.src",
"4WS:seamonkey-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-chat-0:1.0.9-71.el4.i386",
"4WS:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-chat-0:1.0.9-71.el4.s390",
"4WS:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-devel-0:1.0.9-71.el4.i386",
"4WS:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-devel-0:1.0.9-71.el4.s390",
"4WS:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-mail-0:1.0.9-71.el4.i386",
"4WS:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-mail-0:1.0.9-71.el4.s390",
"4WS:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-mail-0:1.0.9-71.el4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "Mozilla Miscellaneous memory safety hazards (MFSA 2011-19)"
},
{
"cve": "CVE-2011-2377",
"discovery_date": "2011-06-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "714929"
}
],
"notes": [
{
"category": "description",
"text": "Mozilla Firefox before 3.6.18 and 4.x through 4.0.1, Thunderbird before 3.1.11, and SeaMonkey through 2.0.14 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via a multipart/x-mixed-replace image.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Mozilla Crash caused by corrupted JPEG image (MFSA 2011-21)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS:seamonkey-0:1.0.9-71.el4.i386",
"4AS:seamonkey-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-0:1.0.9-71.el4.s390",
"4AS:seamonkey-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-0:1.0.9-71.el4.src",
"4AS:seamonkey-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-chat-0:1.0.9-71.el4.i386",
"4AS:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-chat-0:1.0.9-71.el4.s390",
"4AS:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-devel-0:1.0.9-71.el4.i386",
"4AS:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-devel-0:1.0.9-71.el4.s390",
"4AS:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-mail-0:1.0.9-71.el4.i386",
"4AS:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-mail-0:1.0.9-71.el4.s390",
"4AS:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-mail-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-0:1.0.9-71.el4.src",
"4Desktop:seamonkey-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-0:1.0.9-71.el4.i386",
"4ES:seamonkey-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-0:1.0.9-71.el4.s390",
"4ES:seamonkey-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-0:1.0.9-71.el4.src",
"4ES:seamonkey-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-chat-0:1.0.9-71.el4.i386",
"4ES:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-chat-0:1.0.9-71.el4.s390",
"4ES:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-devel-0:1.0.9-71.el4.i386",
"4ES:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-devel-0:1.0.9-71.el4.s390",
"4ES:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-mail-0:1.0.9-71.el4.i386",
"4ES:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-mail-0:1.0.9-71.el4.s390",
"4ES:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-mail-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-0:1.0.9-71.el4.i386",
"4WS:seamonkey-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-0:1.0.9-71.el4.s390",
"4WS:seamonkey-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-0:1.0.9-71.el4.src",
"4WS:seamonkey-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-chat-0:1.0.9-71.el4.i386",
"4WS:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-chat-0:1.0.9-71.el4.s390",
"4WS:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-devel-0:1.0.9-71.el4.i386",
"4WS:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-devel-0:1.0.9-71.el4.s390",
"4WS:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-mail-0:1.0.9-71.el4.i386",
"4WS:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-mail-0:1.0.9-71.el4.s390",
"4WS:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-mail-0:1.0.9-71.el4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-2377"
},
{
"category": "external",
"summary": "RHBZ#714929",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=714929"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-2377",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2377"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-2377",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-2377"
}
],
"release_date": "2011-06-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-06-21T22:42:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"4AS:seamonkey-0:1.0.9-71.el4.i386",
"4AS:seamonkey-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-0:1.0.9-71.el4.s390",
"4AS:seamonkey-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-0:1.0.9-71.el4.src",
"4AS:seamonkey-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-chat-0:1.0.9-71.el4.i386",
"4AS:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-chat-0:1.0.9-71.el4.s390",
"4AS:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-devel-0:1.0.9-71.el4.i386",
"4AS:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-devel-0:1.0.9-71.el4.s390",
"4AS:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-mail-0:1.0.9-71.el4.i386",
"4AS:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-mail-0:1.0.9-71.el4.s390",
"4AS:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-mail-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-0:1.0.9-71.el4.src",
"4Desktop:seamonkey-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-0:1.0.9-71.el4.i386",
"4ES:seamonkey-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-0:1.0.9-71.el4.s390",
"4ES:seamonkey-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-0:1.0.9-71.el4.src",
"4ES:seamonkey-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-chat-0:1.0.9-71.el4.i386",
"4ES:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-chat-0:1.0.9-71.el4.s390",
"4ES:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-devel-0:1.0.9-71.el4.i386",
"4ES:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-devel-0:1.0.9-71.el4.s390",
"4ES:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-mail-0:1.0.9-71.el4.i386",
"4ES:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-mail-0:1.0.9-71.el4.s390",
"4ES:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-mail-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-0:1.0.9-71.el4.i386",
"4WS:seamonkey-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-0:1.0.9-71.el4.s390",
"4WS:seamonkey-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-0:1.0.9-71.el4.src",
"4WS:seamonkey-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-chat-0:1.0.9-71.el4.i386",
"4WS:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-chat-0:1.0.9-71.el4.s390",
"4WS:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-devel-0:1.0.9-71.el4.i386",
"4WS:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-devel-0:1.0.9-71.el4.s390",
"4WS:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-mail-0:1.0.9-71.el4.i386",
"4WS:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-mail-0:1.0.9-71.el4.s390",
"4WS:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-mail-0:1.0.9-71.el4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:0888"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS:seamonkey-0:1.0.9-71.el4.i386",
"4AS:seamonkey-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-0:1.0.9-71.el4.s390",
"4AS:seamonkey-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-0:1.0.9-71.el4.src",
"4AS:seamonkey-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-chat-0:1.0.9-71.el4.i386",
"4AS:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-chat-0:1.0.9-71.el4.s390",
"4AS:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-devel-0:1.0.9-71.el4.i386",
"4AS:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-devel-0:1.0.9-71.el4.s390",
"4AS:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-mail-0:1.0.9-71.el4.i386",
"4AS:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-mail-0:1.0.9-71.el4.s390",
"4AS:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-mail-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-0:1.0.9-71.el4.src",
"4Desktop:seamonkey-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-0:1.0.9-71.el4.i386",
"4ES:seamonkey-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-0:1.0.9-71.el4.s390",
"4ES:seamonkey-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-0:1.0.9-71.el4.src",
"4ES:seamonkey-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-chat-0:1.0.9-71.el4.i386",
"4ES:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-chat-0:1.0.9-71.el4.s390",
"4ES:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-devel-0:1.0.9-71.el4.i386",
"4ES:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-devel-0:1.0.9-71.el4.s390",
"4ES:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-mail-0:1.0.9-71.el4.i386",
"4ES:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-mail-0:1.0.9-71.el4.s390",
"4ES:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-mail-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-0:1.0.9-71.el4.i386",
"4WS:seamonkey-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-0:1.0.9-71.el4.s390",
"4WS:seamonkey-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-0:1.0.9-71.el4.src",
"4WS:seamonkey-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-chat-0:1.0.9-71.el4.i386",
"4WS:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-chat-0:1.0.9-71.el4.s390",
"4WS:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-devel-0:1.0.9-71.el4.i386",
"4WS:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-devel-0:1.0.9-71.el4.s390",
"4WS:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-mail-0:1.0.9-71.el4.i386",
"4WS:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-mail-0:1.0.9-71.el4.s390",
"4WS:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-mail-0:1.0.9-71.el4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "Mozilla Crash caused by corrupted JPEG image (MFSA 2011-21)"
},
{
"cve": "CVE-2011-2605",
"discovery_date": "2011-06-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "714576"
}
],
"notes": [
{
"category": "description",
"text": "CRLF injection vulnerability in the nsCookieService::SetCookieStringInternal function in netwerk/cookie/nsCookieService.cpp in Mozilla Firefox before 3.6.18 and 4.x through 4.0.1, and Thunderbird before 3.1.11, allows remote attackers to bypass intended access restrictions via a string containing a \\n (newline) character, which is not properly handled in a JavaScript \"document.cookie =\" expression, a different vulnerability than CVE-2011-2374.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Mozilla Miscellaneous memory safety hazards (MFSA 2011-19)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS:seamonkey-0:1.0.9-71.el4.i386",
"4AS:seamonkey-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-0:1.0.9-71.el4.s390",
"4AS:seamonkey-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-0:1.0.9-71.el4.src",
"4AS:seamonkey-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-chat-0:1.0.9-71.el4.i386",
"4AS:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-chat-0:1.0.9-71.el4.s390",
"4AS:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-devel-0:1.0.9-71.el4.i386",
"4AS:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-devel-0:1.0.9-71.el4.s390",
"4AS:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-mail-0:1.0.9-71.el4.i386",
"4AS:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-mail-0:1.0.9-71.el4.s390",
"4AS:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-mail-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-0:1.0.9-71.el4.src",
"4Desktop:seamonkey-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-0:1.0.9-71.el4.i386",
"4ES:seamonkey-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-0:1.0.9-71.el4.s390",
"4ES:seamonkey-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-0:1.0.9-71.el4.src",
"4ES:seamonkey-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-chat-0:1.0.9-71.el4.i386",
"4ES:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-chat-0:1.0.9-71.el4.s390",
"4ES:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-devel-0:1.0.9-71.el4.i386",
"4ES:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-devel-0:1.0.9-71.el4.s390",
"4ES:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-mail-0:1.0.9-71.el4.i386",
"4ES:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-mail-0:1.0.9-71.el4.s390",
"4ES:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-mail-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-0:1.0.9-71.el4.i386",
"4WS:seamonkey-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-0:1.0.9-71.el4.s390",
"4WS:seamonkey-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-0:1.0.9-71.el4.src",
"4WS:seamonkey-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-chat-0:1.0.9-71.el4.i386",
"4WS:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-chat-0:1.0.9-71.el4.s390",
"4WS:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-devel-0:1.0.9-71.el4.i386",
"4WS:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-devel-0:1.0.9-71.el4.s390",
"4WS:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-mail-0:1.0.9-71.el4.i386",
"4WS:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-mail-0:1.0.9-71.el4.s390",
"4WS:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-mail-0:1.0.9-71.el4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-2605"
},
{
"category": "external",
"summary": "RHBZ#714576",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=714576"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-2605",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2605"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-2605",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-2605"
}
],
"release_date": "2011-06-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-06-21T22:42:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"4AS:seamonkey-0:1.0.9-71.el4.i386",
"4AS:seamonkey-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-0:1.0.9-71.el4.s390",
"4AS:seamonkey-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-0:1.0.9-71.el4.src",
"4AS:seamonkey-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-chat-0:1.0.9-71.el4.i386",
"4AS:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-chat-0:1.0.9-71.el4.s390",
"4AS:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-devel-0:1.0.9-71.el4.i386",
"4AS:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-devel-0:1.0.9-71.el4.s390",
"4AS:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-mail-0:1.0.9-71.el4.i386",
"4AS:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-mail-0:1.0.9-71.el4.s390",
"4AS:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-mail-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-0:1.0.9-71.el4.src",
"4Desktop:seamonkey-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-0:1.0.9-71.el4.i386",
"4ES:seamonkey-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-0:1.0.9-71.el4.s390",
"4ES:seamonkey-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-0:1.0.9-71.el4.src",
"4ES:seamonkey-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-chat-0:1.0.9-71.el4.i386",
"4ES:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-chat-0:1.0.9-71.el4.s390",
"4ES:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-devel-0:1.0.9-71.el4.i386",
"4ES:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-devel-0:1.0.9-71.el4.s390",
"4ES:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-mail-0:1.0.9-71.el4.i386",
"4ES:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-mail-0:1.0.9-71.el4.s390",
"4ES:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-mail-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-0:1.0.9-71.el4.i386",
"4WS:seamonkey-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-0:1.0.9-71.el4.s390",
"4WS:seamonkey-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-0:1.0.9-71.el4.src",
"4WS:seamonkey-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-chat-0:1.0.9-71.el4.i386",
"4WS:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-chat-0:1.0.9-71.el4.s390",
"4WS:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-devel-0:1.0.9-71.el4.i386",
"4WS:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-devel-0:1.0.9-71.el4.s390",
"4WS:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-mail-0:1.0.9-71.el4.i386",
"4WS:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-mail-0:1.0.9-71.el4.s390",
"4WS:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-mail-0:1.0.9-71.el4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:0888"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS:seamonkey-0:1.0.9-71.el4.i386",
"4AS:seamonkey-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-0:1.0.9-71.el4.s390",
"4AS:seamonkey-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-0:1.0.9-71.el4.src",
"4AS:seamonkey-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-chat-0:1.0.9-71.el4.i386",
"4AS:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-chat-0:1.0.9-71.el4.s390",
"4AS:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-devel-0:1.0.9-71.el4.i386",
"4AS:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-devel-0:1.0.9-71.el4.s390",
"4AS:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-mail-0:1.0.9-71.el4.i386",
"4AS:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-mail-0:1.0.9-71.el4.s390",
"4AS:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-mail-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-0:1.0.9-71.el4.src",
"4Desktop:seamonkey-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-0:1.0.9-71.el4.i386",
"4ES:seamonkey-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-0:1.0.9-71.el4.s390",
"4ES:seamonkey-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-0:1.0.9-71.el4.src",
"4ES:seamonkey-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-chat-0:1.0.9-71.el4.i386",
"4ES:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-chat-0:1.0.9-71.el4.s390",
"4ES:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-devel-0:1.0.9-71.el4.i386",
"4ES:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-devel-0:1.0.9-71.el4.s390",
"4ES:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-mail-0:1.0.9-71.el4.i386",
"4ES:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-mail-0:1.0.9-71.el4.s390",
"4ES:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-mail-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-0:1.0.9-71.el4.i386",
"4WS:seamonkey-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-0:1.0.9-71.el4.s390",
"4WS:seamonkey-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-0:1.0.9-71.el4.src",
"4WS:seamonkey-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-chat-0:1.0.9-71.el4.i386",
"4WS:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-chat-0:1.0.9-71.el4.s390",
"4WS:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-devel-0:1.0.9-71.el4.i386",
"4WS:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-devel-0:1.0.9-71.el4.s390",
"4WS:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-mail-0:1.0.9-71.el4.i386",
"4WS:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-mail-0:1.0.9-71.el4.s390",
"4WS:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-mail-0:1.0.9-71.el4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "Mozilla Miscellaneous memory safety hazards (MFSA 2011-19)"
}
]
}
RHSA-2011_0887
Vulnerability from csaf_redhat - Published: 2011-06-21 22:25 - Updated: 2024-12-01 11:54Use-after-free vulnerability in the nsSVGPathSegList::ReplaceItem function in the implementation of SVG element lists in Mozilla Firefox before 3.6.18, Thunderbird before 3.1.11, and SeaMonkey through 2.0.14 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via vectors involving a user-supplied callback.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS:thunderbird-0:1.5.0.12-39.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-0:1.5.0.12-39.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-0:1.5.0.12-39.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-0:1.5.0.12-39.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-0:1.5.0.12-39.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-0:1.5.0.12-39.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-0:1.5.0.12-39.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-0:1.5.0.12-39.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-0:1.5.0.12-39.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-0:1.5.0.12-39.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-0:1.5.0.12-39.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-0:1.5.0.12-39.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-0:1.5.0.12-39.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-0:1.5.0.12-39.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-0:1.5.0.12-39.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-0:1.5.0.12-39.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-0:1.5.0.12-39.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-0:1.5.0.12-39.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-0:1.5.0.12-39.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-0:1.5.0.12-39.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-0:1.5.0.12-39.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-0:1.5.0.12-39.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-0:1.5.0.12-39.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-0:1.5.0.12-39.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-0:1.5.0.12-39.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-0:1.5.0.12-39.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-0:1.5.0.12-39.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-0:1.5.0.12-39.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:thunderbird-0:2.0.0.24-18.el5_6.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:thunderbird-0:2.0.0.24-18.el5_6.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:thunderbird-0:2.0.0.24-18.el5_6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.x86_64 | — |
Vendor Fix
fix
|
Use-after-free vulnerability in the nsXULCommandDispatcher function in Mozilla Firefox before 3.6.18, Thunderbird before 3.1.11, and SeaMonkey through 2.0.14 allows remote attackers to execute arbitrary code via a crafted XUL document that dequeues the current command updater.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS:thunderbird-0:1.5.0.12-39.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-0:1.5.0.12-39.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-0:1.5.0.12-39.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-0:1.5.0.12-39.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-0:1.5.0.12-39.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-0:1.5.0.12-39.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-0:1.5.0.12-39.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-0:1.5.0.12-39.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-0:1.5.0.12-39.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-0:1.5.0.12-39.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-0:1.5.0.12-39.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-0:1.5.0.12-39.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-0:1.5.0.12-39.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-0:1.5.0.12-39.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-0:1.5.0.12-39.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-0:1.5.0.12-39.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-0:1.5.0.12-39.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-0:1.5.0.12-39.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-0:1.5.0.12-39.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-0:1.5.0.12-39.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-0:1.5.0.12-39.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-0:1.5.0.12-39.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-0:1.5.0.12-39.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-0:1.5.0.12-39.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-0:1.5.0.12-39.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-0:1.5.0.12-39.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-0:1.5.0.12-39.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-0:1.5.0.12-39.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:thunderbird-0:2.0.0.24-18.el5_6.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:thunderbird-0:2.0.0.24-18.el5_6.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:thunderbird-0:2.0.0.24-18.el5_6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.x86_64 | — |
Vendor Fix
fix
|
Mozilla Firefox before 3.6.18, Thunderbird before 3.1.11, and SeaMonkey through 2.0.14 do not distinguish between cookies for two domain names that differ only in a trailing dot, which allows remote web servers to bypass the Same Origin Policy via Set-Cookie headers.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS:thunderbird-0:1.5.0.12-39.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-0:1.5.0.12-39.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-0:1.5.0.12-39.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-0:1.5.0.12-39.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-0:1.5.0.12-39.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-0:1.5.0.12-39.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-0:1.5.0.12-39.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-0:1.5.0.12-39.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-0:1.5.0.12-39.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-0:1.5.0.12-39.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-0:1.5.0.12-39.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-0:1.5.0.12-39.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-0:1.5.0.12-39.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-0:1.5.0.12-39.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-0:1.5.0.12-39.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-0:1.5.0.12-39.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-0:1.5.0.12-39.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-0:1.5.0.12-39.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-0:1.5.0.12-39.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-0:1.5.0.12-39.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-0:1.5.0.12-39.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-0:1.5.0.12-39.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-0:1.5.0.12-39.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-0:1.5.0.12-39.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-0:1.5.0.12-39.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-0:1.5.0.12-39.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-0:1.5.0.12-39.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-0:1.5.0.12-39.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:thunderbird-0:2.0.0.24-18.el5_6.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:thunderbird-0:2.0.0.24-18.el5_6.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:thunderbird-0:2.0.0.24-18.el5_6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.x86_64 | — |
Vendor Fix
fix
|
Use-after-free vulnerability in the nsSVGPointList::AppendElement function in the implementation of SVG element lists in Mozilla Firefox before 3.6.18, Thunderbird before 3.1.11, and SeaMonkey through 2.0.14 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via vectors involving a user-supplied callback.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS:thunderbird-0:1.5.0.12-39.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-0:1.5.0.12-39.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-0:1.5.0.12-39.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-0:1.5.0.12-39.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-0:1.5.0.12-39.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-0:1.5.0.12-39.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-0:1.5.0.12-39.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-0:1.5.0.12-39.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-0:1.5.0.12-39.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-0:1.5.0.12-39.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-0:1.5.0.12-39.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-0:1.5.0.12-39.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-0:1.5.0.12-39.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-0:1.5.0.12-39.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-0:1.5.0.12-39.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-0:1.5.0.12-39.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-0:1.5.0.12-39.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-0:1.5.0.12-39.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-0:1.5.0.12-39.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-0:1.5.0.12-39.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-0:1.5.0.12-39.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-0:1.5.0.12-39.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-0:1.5.0.12-39.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-0:1.5.0.12-39.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-0:1.5.0.12-39.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-0:1.5.0.12-39.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-0:1.5.0.12-39.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-0:1.5.0.12-39.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:thunderbird-0:2.0.0.24-18.el5_6.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:thunderbird-0:2.0.0.24-18.el5_6.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:thunderbird-0:2.0.0.24-18.el5_6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.x86_64 | — |
Vendor Fix
fix
|
Unspecified vulnerability in the browser engine in Mozilla Firefox 3.6.x before 3.6.18 and Thunderbird before 3.1.11 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors, a different vulnerability than CVE-2011-2365.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS:thunderbird-0:1.5.0.12-39.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-0:1.5.0.12-39.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-0:1.5.0.12-39.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-0:1.5.0.12-39.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-0:1.5.0.12-39.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-0:1.5.0.12-39.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-0:1.5.0.12-39.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-0:1.5.0.12-39.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-0:1.5.0.12-39.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-0:1.5.0.12-39.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-0:1.5.0.12-39.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-0:1.5.0.12-39.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-0:1.5.0.12-39.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-0:1.5.0.12-39.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-0:1.5.0.12-39.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-0:1.5.0.12-39.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-0:1.5.0.12-39.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-0:1.5.0.12-39.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-0:1.5.0.12-39.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-0:1.5.0.12-39.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-0:1.5.0.12-39.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-0:1.5.0.12-39.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-0:1.5.0.12-39.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-0:1.5.0.12-39.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-0:1.5.0.12-39.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-0:1.5.0.12-39.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-0:1.5.0.12-39.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-0:1.5.0.12-39.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:thunderbird-0:2.0.0.24-18.el5_6.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:thunderbird-0:2.0.0.24-18.el5_6.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:thunderbird-0:2.0.0.24-18.el5_6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.x86_64 | — |
Vendor Fix
fix
|
Unspecified vulnerability in the browser engine in Mozilla Firefox 3.6.x before 3.6.18 and Thunderbird before 3.1.11 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors, a different vulnerability than CVE-2011-2364.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS:thunderbird-0:1.5.0.12-39.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-0:1.5.0.12-39.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-0:1.5.0.12-39.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-0:1.5.0.12-39.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-0:1.5.0.12-39.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-0:1.5.0.12-39.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-0:1.5.0.12-39.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-0:1.5.0.12-39.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-0:1.5.0.12-39.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-0:1.5.0.12-39.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-0:1.5.0.12-39.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-0:1.5.0.12-39.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-0:1.5.0.12-39.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-0:1.5.0.12-39.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-0:1.5.0.12-39.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-0:1.5.0.12-39.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-0:1.5.0.12-39.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-0:1.5.0.12-39.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-0:1.5.0.12-39.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-0:1.5.0.12-39.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-0:1.5.0.12-39.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-0:1.5.0.12-39.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-0:1.5.0.12-39.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-0:1.5.0.12-39.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-0:1.5.0.12-39.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-0:1.5.0.12-39.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-0:1.5.0.12-39.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-0:1.5.0.12-39.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:thunderbird-0:2.0.0.24-18.el5_6.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:thunderbird-0:2.0.0.24-18.el5_6.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:thunderbird-0:2.0.0.24-18.el5_6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.x86_64 | — |
Vendor Fix
fix
|
Integer overflow in the Array.reduceRight method in Mozilla Firefox before 3.6.18 and 4.x through 4.0.1, Thunderbird before 3.1.11, and SeaMonkey through 2.0.14 allows remote attackers to execute arbitrary code via vectors involving a long JavaScript Array object.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS:thunderbird-0:1.5.0.12-39.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-0:1.5.0.12-39.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-0:1.5.0.12-39.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-0:1.5.0.12-39.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-0:1.5.0.12-39.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-0:1.5.0.12-39.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-0:1.5.0.12-39.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-0:1.5.0.12-39.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-0:1.5.0.12-39.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-0:1.5.0.12-39.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-0:1.5.0.12-39.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-0:1.5.0.12-39.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-0:1.5.0.12-39.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-0:1.5.0.12-39.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-0:1.5.0.12-39.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-0:1.5.0.12-39.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-0:1.5.0.12-39.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-0:1.5.0.12-39.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-0:1.5.0.12-39.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-0:1.5.0.12-39.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-0:1.5.0.12-39.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-0:1.5.0.12-39.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-0:1.5.0.12-39.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-0:1.5.0.12-39.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-0:1.5.0.12-39.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-0:1.5.0.12-39.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-0:1.5.0.12-39.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-0:1.5.0.12-39.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:thunderbird-0:2.0.0.24-18.el5_6.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:thunderbird-0:2.0.0.24-18.el5_6.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:thunderbird-0:2.0.0.24-18.el5_6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.x86_64 | — |
Vendor Fix
fix
|
Use-after-free vulnerability in Mozilla Firefox before 3.6.18 and 4.x through 4.0.1, Thunderbird before 3.1.11, and SeaMonkey through 2.0.14, when JavaScript is disabled, allows remote attackers to execute arbitrary code via a crafted XUL document.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS:thunderbird-0:1.5.0.12-39.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-0:1.5.0.12-39.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-0:1.5.0.12-39.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-0:1.5.0.12-39.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-0:1.5.0.12-39.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-0:1.5.0.12-39.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-0:1.5.0.12-39.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-0:1.5.0.12-39.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-0:1.5.0.12-39.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-0:1.5.0.12-39.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-0:1.5.0.12-39.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-0:1.5.0.12-39.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-0:1.5.0.12-39.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-0:1.5.0.12-39.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-0:1.5.0.12-39.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-0:1.5.0.12-39.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-0:1.5.0.12-39.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-0:1.5.0.12-39.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-0:1.5.0.12-39.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-0:1.5.0.12-39.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-0:1.5.0.12-39.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-0:1.5.0.12-39.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-0:1.5.0.12-39.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-0:1.5.0.12-39.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-0:1.5.0.12-39.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-0:1.5.0.12-39.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-0:1.5.0.12-39.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-0:1.5.0.12-39.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:thunderbird-0:2.0.0.24-18.el5_6.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:thunderbird-0:2.0.0.24-18.el5_6.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:thunderbird-0:2.0.0.24-18.el5_6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.x86_64 | — |
Vendor Fix
fix
|
Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 3.6.18 and 4.x through 4.0.1, and Thunderbird before 3.1.11, allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS:thunderbird-0:1.5.0.12-39.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-0:1.5.0.12-39.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-0:1.5.0.12-39.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-0:1.5.0.12-39.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-0:1.5.0.12-39.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-0:1.5.0.12-39.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-0:1.5.0.12-39.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-0:1.5.0.12-39.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-0:1.5.0.12-39.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-0:1.5.0.12-39.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-0:1.5.0.12-39.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-0:1.5.0.12-39.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-0:1.5.0.12-39.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-0:1.5.0.12-39.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-0:1.5.0.12-39.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-0:1.5.0.12-39.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-0:1.5.0.12-39.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-0:1.5.0.12-39.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-0:1.5.0.12-39.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-0:1.5.0.12-39.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-0:1.5.0.12-39.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-0:1.5.0.12-39.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-0:1.5.0.12-39.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-0:1.5.0.12-39.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-0:1.5.0.12-39.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-0:1.5.0.12-39.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-0:1.5.0.12-39.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-0:1.5.0.12-39.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:thunderbird-0:2.0.0.24-18.el5_6.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:thunderbird-0:2.0.0.24-18.el5_6.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:thunderbird-0:2.0.0.24-18.el5_6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.x86_64 | — |
Vendor Fix
fix
|
Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 5.0 and Thunderbird through 3.1.11 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS:thunderbird-0:1.5.0.12-39.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-0:1.5.0.12-39.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-0:1.5.0.12-39.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-0:1.5.0.12-39.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-0:1.5.0.12-39.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-0:1.5.0.12-39.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-0:1.5.0.12-39.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-0:1.5.0.12-39.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-0:1.5.0.12-39.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-0:1.5.0.12-39.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-0:1.5.0.12-39.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-0:1.5.0.12-39.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-0:1.5.0.12-39.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-0:1.5.0.12-39.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-0:1.5.0.12-39.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-0:1.5.0.12-39.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-0:1.5.0.12-39.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-0:1.5.0.12-39.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-0:1.5.0.12-39.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-0:1.5.0.12-39.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-0:1.5.0.12-39.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-0:1.5.0.12-39.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-0:1.5.0.12-39.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-0:1.5.0.12-39.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-0:1.5.0.12-39.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-0:1.5.0.12-39.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-0:1.5.0.12-39.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-0:1.5.0.12-39.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:thunderbird-0:2.0.0.24-18.el5_6.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:thunderbird-0:2.0.0.24-18.el5_6.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:thunderbird-0:2.0.0.24-18.el5_6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.x86_64 | — |
Vendor Fix
fix
|
Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 3.6.18 and Thunderbird before 3.1.11 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS:thunderbird-0:1.5.0.12-39.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-0:1.5.0.12-39.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-0:1.5.0.12-39.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-0:1.5.0.12-39.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-0:1.5.0.12-39.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-0:1.5.0.12-39.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-0:1.5.0.12-39.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-0:1.5.0.12-39.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-0:1.5.0.12-39.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-0:1.5.0.12-39.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-0:1.5.0.12-39.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-0:1.5.0.12-39.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-0:1.5.0.12-39.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-0:1.5.0.12-39.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-0:1.5.0.12-39.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-0:1.5.0.12-39.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-0:1.5.0.12-39.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-0:1.5.0.12-39.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-0:1.5.0.12-39.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-0:1.5.0.12-39.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-0:1.5.0.12-39.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-0:1.5.0.12-39.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-0:1.5.0.12-39.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-0:1.5.0.12-39.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-0:1.5.0.12-39.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-0:1.5.0.12-39.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-0:1.5.0.12-39.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-0:1.5.0.12-39.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:thunderbird-0:2.0.0.24-18.el5_6.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:thunderbird-0:2.0.0.24-18.el5_6.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:thunderbird-0:2.0.0.24-18.el5_6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.x86_64 | — |
Vendor Fix
fix
|
Mozilla Firefox before 3.6.18 and 4.x through 4.0.1, Thunderbird before 3.1.11, and SeaMonkey through 2.0.14 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via a multipart/x-mixed-replace image.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS:thunderbird-0:1.5.0.12-39.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-0:1.5.0.12-39.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-0:1.5.0.12-39.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-0:1.5.0.12-39.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-0:1.5.0.12-39.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-0:1.5.0.12-39.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-0:1.5.0.12-39.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-0:1.5.0.12-39.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-0:1.5.0.12-39.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-0:1.5.0.12-39.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-0:1.5.0.12-39.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-0:1.5.0.12-39.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-0:1.5.0.12-39.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-0:1.5.0.12-39.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-0:1.5.0.12-39.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-0:1.5.0.12-39.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-0:1.5.0.12-39.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-0:1.5.0.12-39.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-0:1.5.0.12-39.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-0:1.5.0.12-39.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-0:1.5.0.12-39.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-0:1.5.0.12-39.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-0:1.5.0.12-39.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-0:1.5.0.12-39.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-0:1.5.0.12-39.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-0:1.5.0.12-39.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-0:1.5.0.12-39.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-0:1.5.0.12-39.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:thunderbird-0:2.0.0.24-18.el5_6.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:thunderbird-0:2.0.0.24-18.el5_6.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:thunderbird-0:2.0.0.24-18.el5_6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.x86_64 | — |
Vendor Fix
fix
|
CRLF injection vulnerability in the nsCookieService::SetCookieStringInternal function in netwerk/cookie/nsCookieService.cpp in Mozilla Firefox before 3.6.18 and 4.x through 4.0.1, and Thunderbird before 3.1.11, allows remote attackers to bypass intended access restrictions via a string containing a \n (newline) character, which is not properly handled in a JavaScript "document.cookie =" expression, a different vulnerability than CVE-2011-2374.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS:thunderbird-0:1.5.0.12-39.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-0:1.5.0.12-39.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-0:1.5.0.12-39.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-0:1.5.0.12-39.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-0:1.5.0.12-39.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-0:1.5.0.12-39.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-0:1.5.0.12-39.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-0:1.5.0.12-39.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-0:1.5.0.12-39.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-0:1.5.0.12-39.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-0:1.5.0.12-39.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-0:1.5.0.12-39.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-0:1.5.0.12-39.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-0:1.5.0.12-39.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-0:1.5.0.12-39.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-0:1.5.0.12-39.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-0:1.5.0.12-39.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-0:1.5.0.12-39.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-0:1.5.0.12-39.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-0:1.5.0.12-39.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-0:1.5.0.12-39.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-0:1.5.0.12-39.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-0:1.5.0.12-39.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-0:1.5.0.12-39.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-0:1.5.0.12-39.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-0:1.5.0.12-39.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-0:1.5.0.12-39.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-0:1.5.0.12-39.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:thunderbird-0:2.0.0.24-18.el5_6.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:thunderbird-0:2.0.0.24-18.el5_6.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:thunderbird-0:2.0.0.24-18.el5_6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.x86_64 | — |
Vendor Fix
fix
|
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Critical"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An updated thunderbird package that fixes several security issues is now\navailable for Red Hat Enterprise Linux 4 and 5.\n\nThe Red Hat Security Response Team has rated this update as having critical\nsecurity impact. Common Vulnerability Scoring System (CVSS) base scores,\nwhich give detailed severity ratings, are available for each vulnerability\nfrom the CVE links in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Mozilla Thunderbird is a standalone mail and newsgroup client.\n\nA flaw was found in the way Thunderbird handled malformed JPEG images. An\nHTML mail message containing a malicious JPEG image could cause Thunderbird\nto crash or, potentially, execute arbitrary code with the privileges of the\nuser running Thunderbird. (CVE-2011-2377)\n\nMultiple dangling pointer flaws were found in Thunderbird. Malicious HTML\ncontent could cause Thunderbird to crash or, potentially, execute arbitrary\ncode with the privileges of the user running Thunderbird. (CVE-2011-0083,\nCVE-2011-0085, CVE-2011-2363)\n\nSeveral flaws were found in the processing of malformed HTML content.\nMalicious HTML content could cause Thunderbird to crash or, potentially,\nexecute arbitrary code with the privileges of the user running Thunderbird.\n(CVE-2011-2364, CVE-2011-2365, CVE-2011-2374, CVE-2011-2375, CVE-2011-2376)\n\nAn integer overflow flaw was found in the way Thunderbird handled\nJavaScript Array objects. Malicious content could cause Thunderbird to\nexecute JavaScript with the privileges of the user running Thunderbird.\n(CVE-2011-2371)\n\nA use-after-free flaw was found in the way Thunderbird handled malformed\nJavaScript. Malicious content could cause Thunderbird to execute JavaScript\nwith the privileges of the user running Thunderbird. (CVE-2011-2373)\n\nIt was found that Thunderbird could treat two separate cookies (for web\ncontent) as interchangeable if both were for the same domain name but one\nof those domain names had a trailing \".\" character. This violates the\nsame-origin policy and could possibly lead to data being leaked to the\nwrong domain. (CVE-2011-2362)\n\nAll Thunderbird users should upgrade to this updated package, which\nresolves these issues. All running instances of Thunderbird must be\nrestarted for the update to take effect.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2011:0887",
"url": "https://access.redhat.com/errata/RHSA-2011:0887"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#critical",
"url": "https://access.redhat.com/security/updates/classification/#critical"
},
{
"category": "external",
"summary": "714576",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=714576"
},
{
"category": "external",
"summary": "714577",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=714577"
},
{
"category": "external",
"summary": "714580",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=714580"
},
{
"category": "external",
"summary": "714581",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=714581"
},
{
"category": "external",
"summary": "714583",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=714583"
},
{
"category": "external",
"summary": "714929",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=714929"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2011/rhsa-2011_0887.json"
}
],
"title": "Red Hat Security Advisory: thunderbird security update",
"tracking": {
"current_release_date": "2024-12-01T11:54:10+00:00",
"generator": {
"date": "2024-12-01T11:54:10+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2011:0887",
"initial_release_date": "2011-06-21T22:25:00+00:00",
"revision_history": [
{
"date": "2011-06-21T22:25:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2011-06-21T18:28:35+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-12-01T11:54:10+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AS version 4",
"product": {
"name": "Red Hat Enterprise Linux AS version 4",
"product_id": "4AS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:4::as"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop version 4",
"product": {
"name": "Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:4::desktop"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ES version 4",
"product": {
"name": "Red Hat Enterprise Linux ES version 4",
"product_id": "4ES",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:4::es"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux WS version 4",
"product": {
"name": "Red Hat Enterprise Linux WS version 4",
"product_id": "4WS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:4::ws"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Optional Productivity Applications (v. 5 server)",
"product": {
"name": "Red Hat Enterprise Linux Optional Productivity Applications (v. 5 server)",
"product_id": "5Server-DPAS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_productivity:5"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop (v. 5 client)",
"product": {
"name": "Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:5::client"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"product": {
"name": "thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"product_id": "thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/thunderbird-debuginfo@1.5.0.12-39.el4?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "thunderbird-0:1.5.0.12-39.el4.ia64",
"product": {
"name": "thunderbird-0:1.5.0.12-39.el4.ia64",
"product_id": "thunderbird-0:1.5.0.12-39.el4.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/thunderbird@1.5.0.12-39.el4?arch=ia64"
}
}
}
],
"category": "architecture",
"name": "ia64"
},
{
"branches": [
{
"category": "product_version",
"name": "thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"product": {
"name": "thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"product_id": "thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/thunderbird-debuginfo@1.5.0.12-39.el4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "thunderbird-0:1.5.0.12-39.el4.x86_64",
"product": {
"name": "thunderbird-0:1.5.0.12-39.el4.x86_64",
"product_id": "thunderbird-0:1.5.0.12-39.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/thunderbird@1.5.0.12-39.el4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "thunderbird-0:2.0.0.24-18.el5_6.x86_64",
"product": {
"name": "thunderbird-0:2.0.0.24-18.el5_6.x86_64",
"product_id": "thunderbird-0:2.0.0.24-18.el5_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/thunderbird@2.0.0.24-18.el5_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "thunderbird-debuginfo-0:2.0.0.24-18.el5_6.x86_64",
"product": {
"name": "thunderbird-debuginfo-0:2.0.0.24-18.el5_6.x86_64",
"product_id": "thunderbird-debuginfo-0:2.0.0.24-18.el5_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/thunderbird-debuginfo@2.0.0.24-18.el5_6?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"product": {
"name": "thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"product_id": "thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/thunderbird-debuginfo@1.5.0.12-39.el4?arch=i386"
}
}
},
{
"category": "product_version",
"name": "thunderbird-0:1.5.0.12-39.el4.i386",
"product": {
"name": "thunderbird-0:1.5.0.12-39.el4.i386",
"product_id": "thunderbird-0:1.5.0.12-39.el4.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/thunderbird@1.5.0.12-39.el4?arch=i386"
}
}
},
{
"category": "product_version",
"name": "thunderbird-0:2.0.0.24-18.el5_6.i386",
"product": {
"name": "thunderbird-0:2.0.0.24-18.el5_6.i386",
"product_id": "thunderbird-0:2.0.0.24-18.el5_6.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/thunderbird@2.0.0.24-18.el5_6?arch=i386"
}
}
},
{
"category": "product_version",
"name": "thunderbird-debuginfo-0:2.0.0.24-18.el5_6.i386",
"product": {
"name": "thunderbird-debuginfo-0:2.0.0.24-18.el5_6.i386",
"product_id": "thunderbird-debuginfo-0:2.0.0.24-18.el5_6.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/thunderbird-debuginfo@2.0.0.24-18.el5_6?arch=i386"
}
}
}
],
"category": "architecture",
"name": "i386"
},
{
"branches": [
{
"category": "product_version",
"name": "thunderbird-0:1.5.0.12-39.el4.src",
"product": {
"name": "thunderbird-0:1.5.0.12-39.el4.src",
"product_id": "thunderbird-0:1.5.0.12-39.el4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/thunderbird@1.5.0.12-39.el4?arch=src"
}
}
},
{
"category": "product_version",
"name": "thunderbird-0:2.0.0.24-18.el5_6.src",
"product": {
"name": "thunderbird-0:2.0.0.24-18.el5_6.src",
"product_id": "thunderbird-0:2.0.0.24-18.el5_6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/thunderbird@2.0.0.24-18.el5_6?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"product": {
"name": "thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"product_id": "thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/thunderbird-debuginfo@1.5.0.12-39.el4?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "thunderbird-0:1.5.0.12-39.el4.ppc",
"product": {
"name": "thunderbird-0:1.5.0.12-39.el4.ppc",
"product_id": "thunderbird-0:1.5.0.12-39.el4.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/thunderbird@1.5.0.12-39.el4?arch=ppc"
}
}
}
],
"category": "architecture",
"name": "ppc"
},
{
"branches": [
{
"category": "product_version",
"name": "thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"product": {
"name": "thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"product_id": "thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/thunderbird-debuginfo@1.5.0.12-39.el4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "thunderbird-0:1.5.0.12-39.el4.s390x",
"product": {
"name": "thunderbird-0:1.5.0.12-39.el4.s390x",
"product_id": "thunderbird-0:1.5.0.12-39.el4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/thunderbird@1.5.0.12-39.el4?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"product": {
"name": "thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"product_id": "thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/thunderbird-debuginfo@1.5.0.12-39.el4?arch=s390"
}
}
},
{
"category": "product_version",
"name": "thunderbird-0:1.5.0.12-39.el4.s390",
"product": {
"name": "thunderbird-0:1.5.0.12-39.el4.s390",
"product_id": "thunderbird-0:1.5.0.12-39.el4.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/thunderbird@1.5.0.12-39.el4?arch=s390"
}
}
}
],
"category": "architecture",
"name": "s390"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-0:1.5.0.12-39.el4.i386 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:thunderbird-0:1.5.0.12-39.el4.i386"
},
"product_reference": "thunderbird-0:1.5.0.12-39.el4.i386",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-0:1.5.0.12-39.el4.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:thunderbird-0:1.5.0.12-39.el4.ia64"
},
"product_reference": "thunderbird-0:1.5.0.12-39.el4.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-0:1.5.0.12-39.el4.ppc as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:thunderbird-0:1.5.0.12-39.el4.ppc"
},
"product_reference": "thunderbird-0:1.5.0.12-39.el4.ppc",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-0:1.5.0.12-39.el4.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:thunderbird-0:1.5.0.12-39.el4.s390"
},
"product_reference": "thunderbird-0:1.5.0.12-39.el4.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-0:1.5.0.12-39.el4.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:thunderbird-0:1.5.0.12-39.el4.s390x"
},
"product_reference": "thunderbird-0:1.5.0.12-39.el4.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-0:1.5.0.12-39.el4.src as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:thunderbird-0:1.5.0.12-39.el4.src"
},
"product_reference": "thunderbird-0:1.5.0.12-39.el4.src",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-0:1.5.0.12-39.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:thunderbird-0:1.5.0.12-39.el4.x86_64"
},
"product_reference": "thunderbird-0:1.5.0.12-39.el4.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-debuginfo-0:1.5.0.12-39.el4.i386 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386"
},
"product_reference": "thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64"
},
"product_reference": "thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc"
},
"product_reference": "thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-debuginfo-0:1.5.0.12-39.el4.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390"
},
"product_reference": "thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x"
},
"product_reference": "thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64"
},
"product_reference": "thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-0:1.5.0.12-39.el4.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:thunderbird-0:1.5.0.12-39.el4.i386"
},
"product_reference": "thunderbird-0:1.5.0.12-39.el4.i386",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-0:1.5.0.12-39.el4.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:thunderbird-0:1.5.0.12-39.el4.ia64"
},
"product_reference": "thunderbird-0:1.5.0.12-39.el4.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-0:1.5.0.12-39.el4.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:thunderbird-0:1.5.0.12-39.el4.ppc"
},
"product_reference": "thunderbird-0:1.5.0.12-39.el4.ppc",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-0:1.5.0.12-39.el4.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:thunderbird-0:1.5.0.12-39.el4.s390"
},
"product_reference": "thunderbird-0:1.5.0.12-39.el4.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-0:1.5.0.12-39.el4.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:thunderbird-0:1.5.0.12-39.el4.s390x"
},
"product_reference": "thunderbird-0:1.5.0.12-39.el4.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-0:1.5.0.12-39.el4.src as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:thunderbird-0:1.5.0.12-39.el4.src"
},
"product_reference": "thunderbird-0:1.5.0.12-39.el4.src",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-0:1.5.0.12-39.el4.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:thunderbird-0:1.5.0.12-39.el4.x86_64"
},
"product_reference": "thunderbird-0:1.5.0.12-39.el4.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-debuginfo-0:1.5.0.12-39.el4.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386"
},
"product_reference": "thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64"
},
"product_reference": "thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc"
},
"product_reference": "thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-debuginfo-0:1.5.0.12-39.el4.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390"
},
"product_reference": "thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x"
},
"product_reference": "thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64"
},
"product_reference": "thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-0:1.5.0.12-39.el4.i386 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:thunderbird-0:1.5.0.12-39.el4.i386"
},
"product_reference": "thunderbird-0:1.5.0.12-39.el4.i386",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-0:1.5.0.12-39.el4.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:thunderbird-0:1.5.0.12-39.el4.ia64"
},
"product_reference": "thunderbird-0:1.5.0.12-39.el4.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-0:1.5.0.12-39.el4.ppc as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:thunderbird-0:1.5.0.12-39.el4.ppc"
},
"product_reference": "thunderbird-0:1.5.0.12-39.el4.ppc",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-0:1.5.0.12-39.el4.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:thunderbird-0:1.5.0.12-39.el4.s390"
},
"product_reference": "thunderbird-0:1.5.0.12-39.el4.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-0:1.5.0.12-39.el4.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:thunderbird-0:1.5.0.12-39.el4.s390x"
},
"product_reference": "thunderbird-0:1.5.0.12-39.el4.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-0:1.5.0.12-39.el4.src as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:thunderbird-0:1.5.0.12-39.el4.src"
},
"product_reference": "thunderbird-0:1.5.0.12-39.el4.src",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-0:1.5.0.12-39.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:thunderbird-0:1.5.0.12-39.el4.x86_64"
},
"product_reference": "thunderbird-0:1.5.0.12-39.el4.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-debuginfo-0:1.5.0.12-39.el4.i386 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386"
},
"product_reference": "thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64"
},
"product_reference": "thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc"
},
"product_reference": "thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-debuginfo-0:1.5.0.12-39.el4.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390"
},
"product_reference": "thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x"
},
"product_reference": "thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64"
},
"product_reference": "thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-0:1.5.0.12-39.el4.i386 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:thunderbird-0:1.5.0.12-39.el4.i386"
},
"product_reference": "thunderbird-0:1.5.0.12-39.el4.i386",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-0:1.5.0.12-39.el4.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:thunderbird-0:1.5.0.12-39.el4.ia64"
},
"product_reference": "thunderbird-0:1.5.0.12-39.el4.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-0:1.5.0.12-39.el4.ppc as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:thunderbird-0:1.5.0.12-39.el4.ppc"
},
"product_reference": "thunderbird-0:1.5.0.12-39.el4.ppc",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-0:1.5.0.12-39.el4.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:thunderbird-0:1.5.0.12-39.el4.s390"
},
"product_reference": "thunderbird-0:1.5.0.12-39.el4.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-0:1.5.0.12-39.el4.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:thunderbird-0:1.5.0.12-39.el4.s390x"
},
"product_reference": "thunderbird-0:1.5.0.12-39.el4.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-0:1.5.0.12-39.el4.src as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:thunderbird-0:1.5.0.12-39.el4.src"
},
"product_reference": "thunderbird-0:1.5.0.12-39.el4.src",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-0:1.5.0.12-39.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:thunderbird-0:1.5.0.12-39.el4.x86_64"
},
"product_reference": "thunderbird-0:1.5.0.12-39.el4.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-debuginfo-0:1.5.0.12-39.el4.i386 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386"
},
"product_reference": "thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64"
},
"product_reference": "thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc"
},
"product_reference": "thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-debuginfo-0:1.5.0.12-39.el4.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390"
},
"product_reference": "thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x"
},
"product_reference": "thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64"
},
"product_reference": "thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-0:2.0.0.24-18.el5_6.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:thunderbird-0:2.0.0.24-18.el5_6.i386"
},
"product_reference": "thunderbird-0:2.0.0.24-18.el5_6.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-0:2.0.0.24-18.el5_6.src as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:thunderbird-0:2.0.0.24-18.el5_6.src"
},
"product_reference": "thunderbird-0:2.0.0.24-18.el5_6.src",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-0:2.0.0.24-18.el5_6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:thunderbird-0:2.0.0.24-18.el5_6.x86_64"
},
"product_reference": "thunderbird-0:2.0.0.24-18.el5_6.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-debuginfo-0:2.0.0.24-18.el5_6.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.i386"
},
"product_reference": "thunderbird-debuginfo-0:2.0.0.24-18.el5_6.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-debuginfo-0:2.0.0.24-18.el5_6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.x86_64"
},
"product_reference": "thunderbird-debuginfo-0:2.0.0.24-18.el5_6.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-0:2.0.0.24-18.el5_6.i386 as a component of Red Hat Enterprise Linux Optional Productivity Applications (v. 5 server)",
"product_id": "5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.i386"
},
"product_reference": "thunderbird-0:2.0.0.24-18.el5_6.i386",
"relates_to_product_reference": "5Server-DPAS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-0:2.0.0.24-18.el5_6.src as a component of Red Hat Enterprise Linux Optional Productivity Applications (v. 5 server)",
"product_id": "5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.src"
},
"product_reference": "thunderbird-0:2.0.0.24-18.el5_6.src",
"relates_to_product_reference": "5Server-DPAS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-0:2.0.0.24-18.el5_6.x86_64 as a component of Red Hat Enterprise Linux Optional Productivity Applications (v. 5 server)",
"product_id": "5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.x86_64"
},
"product_reference": "thunderbird-0:2.0.0.24-18.el5_6.x86_64",
"relates_to_product_reference": "5Server-DPAS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-debuginfo-0:2.0.0.24-18.el5_6.i386 as a component of Red Hat Enterprise Linux Optional Productivity Applications (v. 5 server)",
"product_id": "5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.i386"
},
"product_reference": "thunderbird-debuginfo-0:2.0.0.24-18.el5_6.i386",
"relates_to_product_reference": "5Server-DPAS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-debuginfo-0:2.0.0.24-18.el5_6.x86_64 as a component of Red Hat Enterprise Linux Optional Productivity Applications (v. 5 server)",
"product_id": "5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.x86_64"
},
"product_reference": "thunderbird-debuginfo-0:2.0.0.24-18.el5_6.x86_64",
"relates_to_product_reference": "5Server-DPAS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2011-0083",
"discovery_date": "2011-06-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "714581"
}
],
"notes": [
{
"category": "description",
"text": "Use-after-free vulnerability in the nsSVGPathSegList::ReplaceItem function in the implementation of SVG element lists in Mozilla Firefox before 3.6.18, Thunderbird before 3.1.11, and SeaMonkey through 2.0.14 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via vectors involving a user-supplied callback.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Mozilla Multiple dangling pointer vulnerabilities (MFSA 2011-23)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS:thunderbird-0:1.5.0.12-39.el4.i386",
"4AS:thunderbird-0:1.5.0.12-39.el4.ia64",
"4AS:thunderbird-0:1.5.0.12-39.el4.ppc",
"4AS:thunderbird-0:1.5.0.12-39.el4.s390",
"4AS:thunderbird-0:1.5.0.12-39.el4.s390x",
"4AS:thunderbird-0:1.5.0.12-39.el4.src",
"4AS:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.i386",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.ia64",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.ppc",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.s390",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.s390x",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.src",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"4ES:thunderbird-0:1.5.0.12-39.el4.i386",
"4ES:thunderbird-0:1.5.0.12-39.el4.ia64",
"4ES:thunderbird-0:1.5.0.12-39.el4.ppc",
"4ES:thunderbird-0:1.5.0.12-39.el4.s390",
"4ES:thunderbird-0:1.5.0.12-39.el4.s390x",
"4ES:thunderbird-0:1.5.0.12-39.el4.src",
"4ES:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"4WS:thunderbird-0:1.5.0.12-39.el4.i386",
"4WS:thunderbird-0:1.5.0.12-39.el4.ia64",
"4WS:thunderbird-0:1.5.0.12-39.el4.ppc",
"4WS:thunderbird-0:1.5.0.12-39.el4.s390",
"4WS:thunderbird-0:1.5.0.12-39.el4.s390x",
"4WS:thunderbird-0:1.5.0.12-39.el4.src",
"4WS:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"5Client:thunderbird-0:2.0.0.24-18.el5_6.i386",
"5Client:thunderbird-0:2.0.0.24-18.el5_6.src",
"5Client:thunderbird-0:2.0.0.24-18.el5_6.x86_64",
"5Client:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.i386",
"5Client:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.x86_64",
"5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.i386",
"5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.src",
"5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.x86_64",
"5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.i386",
"5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-0083"
},
{
"category": "external",
"summary": "RHBZ#714581",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=714581"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-0083",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0083"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-0083",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-0083"
}
],
"release_date": "2011-06-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-06-21T22:25:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"4AS:thunderbird-0:1.5.0.12-39.el4.i386",
"4AS:thunderbird-0:1.5.0.12-39.el4.ia64",
"4AS:thunderbird-0:1.5.0.12-39.el4.ppc",
"4AS:thunderbird-0:1.5.0.12-39.el4.s390",
"4AS:thunderbird-0:1.5.0.12-39.el4.s390x",
"4AS:thunderbird-0:1.5.0.12-39.el4.src",
"4AS:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.i386",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.ia64",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.ppc",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.s390",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.s390x",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.src",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"4ES:thunderbird-0:1.5.0.12-39.el4.i386",
"4ES:thunderbird-0:1.5.0.12-39.el4.ia64",
"4ES:thunderbird-0:1.5.0.12-39.el4.ppc",
"4ES:thunderbird-0:1.5.0.12-39.el4.s390",
"4ES:thunderbird-0:1.5.0.12-39.el4.s390x",
"4ES:thunderbird-0:1.5.0.12-39.el4.src",
"4ES:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"4WS:thunderbird-0:1.5.0.12-39.el4.i386",
"4WS:thunderbird-0:1.5.0.12-39.el4.ia64",
"4WS:thunderbird-0:1.5.0.12-39.el4.ppc",
"4WS:thunderbird-0:1.5.0.12-39.el4.s390",
"4WS:thunderbird-0:1.5.0.12-39.el4.s390x",
"4WS:thunderbird-0:1.5.0.12-39.el4.src",
"4WS:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"5Client:thunderbird-0:2.0.0.24-18.el5_6.i386",
"5Client:thunderbird-0:2.0.0.24-18.el5_6.src",
"5Client:thunderbird-0:2.0.0.24-18.el5_6.x86_64",
"5Client:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.i386",
"5Client:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.x86_64",
"5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.i386",
"5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.src",
"5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.x86_64",
"5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.i386",
"5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:0887"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS:thunderbird-0:1.5.0.12-39.el4.i386",
"4AS:thunderbird-0:1.5.0.12-39.el4.ia64",
"4AS:thunderbird-0:1.5.0.12-39.el4.ppc",
"4AS:thunderbird-0:1.5.0.12-39.el4.s390",
"4AS:thunderbird-0:1.5.0.12-39.el4.s390x",
"4AS:thunderbird-0:1.5.0.12-39.el4.src",
"4AS:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.i386",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.ia64",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.ppc",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.s390",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.s390x",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.src",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"4ES:thunderbird-0:1.5.0.12-39.el4.i386",
"4ES:thunderbird-0:1.5.0.12-39.el4.ia64",
"4ES:thunderbird-0:1.5.0.12-39.el4.ppc",
"4ES:thunderbird-0:1.5.0.12-39.el4.s390",
"4ES:thunderbird-0:1.5.0.12-39.el4.s390x",
"4ES:thunderbird-0:1.5.0.12-39.el4.src",
"4ES:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"4WS:thunderbird-0:1.5.0.12-39.el4.i386",
"4WS:thunderbird-0:1.5.0.12-39.el4.ia64",
"4WS:thunderbird-0:1.5.0.12-39.el4.ppc",
"4WS:thunderbird-0:1.5.0.12-39.el4.s390",
"4WS:thunderbird-0:1.5.0.12-39.el4.s390x",
"4WS:thunderbird-0:1.5.0.12-39.el4.src",
"4WS:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"5Client:thunderbird-0:2.0.0.24-18.el5_6.i386",
"5Client:thunderbird-0:2.0.0.24-18.el5_6.src",
"5Client:thunderbird-0:2.0.0.24-18.el5_6.x86_64",
"5Client:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.i386",
"5Client:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.x86_64",
"5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.i386",
"5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.src",
"5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.x86_64",
"5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.i386",
"5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "Mozilla Multiple dangling pointer vulnerabilities (MFSA 2011-23)"
},
{
"cve": "CVE-2011-0085",
"discovery_date": "2011-06-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "714581"
}
],
"notes": [
{
"category": "description",
"text": "Use-after-free vulnerability in the nsXULCommandDispatcher function in Mozilla Firefox before 3.6.18, Thunderbird before 3.1.11, and SeaMonkey through 2.0.14 allows remote attackers to execute arbitrary code via a crafted XUL document that dequeues the current command updater.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Mozilla Multiple dangling pointer vulnerabilities (MFSA 2011-23)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS:thunderbird-0:1.5.0.12-39.el4.i386",
"4AS:thunderbird-0:1.5.0.12-39.el4.ia64",
"4AS:thunderbird-0:1.5.0.12-39.el4.ppc",
"4AS:thunderbird-0:1.5.0.12-39.el4.s390",
"4AS:thunderbird-0:1.5.0.12-39.el4.s390x",
"4AS:thunderbird-0:1.5.0.12-39.el4.src",
"4AS:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.i386",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.ia64",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.ppc",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.s390",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.s390x",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.src",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"4ES:thunderbird-0:1.5.0.12-39.el4.i386",
"4ES:thunderbird-0:1.5.0.12-39.el4.ia64",
"4ES:thunderbird-0:1.5.0.12-39.el4.ppc",
"4ES:thunderbird-0:1.5.0.12-39.el4.s390",
"4ES:thunderbird-0:1.5.0.12-39.el4.s390x",
"4ES:thunderbird-0:1.5.0.12-39.el4.src",
"4ES:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"4WS:thunderbird-0:1.5.0.12-39.el4.i386",
"4WS:thunderbird-0:1.5.0.12-39.el4.ia64",
"4WS:thunderbird-0:1.5.0.12-39.el4.ppc",
"4WS:thunderbird-0:1.5.0.12-39.el4.s390",
"4WS:thunderbird-0:1.5.0.12-39.el4.s390x",
"4WS:thunderbird-0:1.5.0.12-39.el4.src",
"4WS:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"5Client:thunderbird-0:2.0.0.24-18.el5_6.i386",
"5Client:thunderbird-0:2.0.0.24-18.el5_6.src",
"5Client:thunderbird-0:2.0.0.24-18.el5_6.x86_64",
"5Client:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.i386",
"5Client:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.x86_64",
"5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.i386",
"5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.src",
"5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.x86_64",
"5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.i386",
"5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-0085"
},
{
"category": "external",
"summary": "RHBZ#714581",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=714581"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-0085",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0085"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-0085",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-0085"
}
],
"release_date": "2011-06-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-06-21T22:25:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"4AS:thunderbird-0:1.5.0.12-39.el4.i386",
"4AS:thunderbird-0:1.5.0.12-39.el4.ia64",
"4AS:thunderbird-0:1.5.0.12-39.el4.ppc",
"4AS:thunderbird-0:1.5.0.12-39.el4.s390",
"4AS:thunderbird-0:1.5.0.12-39.el4.s390x",
"4AS:thunderbird-0:1.5.0.12-39.el4.src",
"4AS:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.i386",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.ia64",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.ppc",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.s390",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.s390x",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.src",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"4ES:thunderbird-0:1.5.0.12-39.el4.i386",
"4ES:thunderbird-0:1.5.0.12-39.el4.ia64",
"4ES:thunderbird-0:1.5.0.12-39.el4.ppc",
"4ES:thunderbird-0:1.5.0.12-39.el4.s390",
"4ES:thunderbird-0:1.5.0.12-39.el4.s390x",
"4ES:thunderbird-0:1.5.0.12-39.el4.src",
"4ES:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"4WS:thunderbird-0:1.5.0.12-39.el4.i386",
"4WS:thunderbird-0:1.5.0.12-39.el4.ia64",
"4WS:thunderbird-0:1.5.0.12-39.el4.ppc",
"4WS:thunderbird-0:1.5.0.12-39.el4.s390",
"4WS:thunderbird-0:1.5.0.12-39.el4.s390x",
"4WS:thunderbird-0:1.5.0.12-39.el4.src",
"4WS:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"5Client:thunderbird-0:2.0.0.24-18.el5_6.i386",
"5Client:thunderbird-0:2.0.0.24-18.el5_6.src",
"5Client:thunderbird-0:2.0.0.24-18.el5_6.x86_64",
"5Client:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.i386",
"5Client:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.x86_64",
"5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.i386",
"5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.src",
"5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.x86_64",
"5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.i386",
"5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:0887"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS:thunderbird-0:1.5.0.12-39.el4.i386",
"4AS:thunderbird-0:1.5.0.12-39.el4.ia64",
"4AS:thunderbird-0:1.5.0.12-39.el4.ppc",
"4AS:thunderbird-0:1.5.0.12-39.el4.s390",
"4AS:thunderbird-0:1.5.0.12-39.el4.s390x",
"4AS:thunderbird-0:1.5.0.12-39.el4.src",
"4AS:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.i386",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.ia64",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.ppc",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.s390",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.s390x",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.src",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"4ES:thunderbird-0:1.5.0.12-39.el4.i386",
"4ES:thunderbird-0:1.5.0.12-39.el4.ia64",
"4ES:thunderbird-0:1.5.0.12-39.el4.ppc",
"4ES:thunderbird-0:1.5.0.12-39.el4.s390",
"4ES:thunderbird-0:1.5.0.12-39.el4.s390x",
"4ES:thunderbird-0:1.5.0.12-39.el4.src",
"4ES:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"4WS:thunderbird-0:1.5.0.12-39.el4.i386",
"4WS:thunderbird-0:1.5.0.12-39.el4.ia64",
"4WS:thunderbird-0:1.5.0.12-39.el4.ppc",
"4WS:thunderbird-0:1.5.0.12-39.el4.s390",
"4WS:thunderbird-0:1.5.0.12-39.el4.s390x",
"4WS:thunderbird-0:1.5.0.12-39.el4.src",
"4WS:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"5Client:thunderbird-0:2.0.0.24-18.el5_6.i386",
"5Client:thunderbird-0:2.0.0.24-18.el5_6.src",
"5Client:thunderbird-0:2.0.0.24-18.el5_6.x86_64",
"5Client:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.i386",
"5Client:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.x86_64",
"5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.i386",
"5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.src",
"5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.x86_64",
"5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.i386",
"5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "Mozilla Multiple dangling pointer vulnerabilities (MFSA 2011-23)"
},
{
"cve": "CVE-2011-2362",
"discovery_date": "2011-06-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "714583"
}
],
"notes": [
{
"category": "description",
"text": "Mozilla Firefox before 3.6.18, Thunderbird before 3.1.11, and SeaMonkey through 2.0.14 do not distinguish between cookies for two domain names that differ only in a trailing dot, which allows remote web servers to bypass the Same Origin Policy via Set-Cookie headers.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Mozilla Cookie isolation error (MFSA 2011-24)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS:thunderbird-0:1.5.0.12-39.el4.i386",
"4AS:thunderbird-0:1.5.0.12-39.el4.ia64",
"4AS:thunderbird-0:1.5.0.12-39.el4.ppc",
"4AS:thunderbird-0:1.5.0.12-39.el4.s390",
"4AS:thunderbird-0:1.5.0.12-39.el4.s390x",
"4AS:thunderbird-0:1.5.0.12-39.el4.src",
"4AS:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.i386",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.ia64",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.ppc",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.s390",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.s390x",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.src",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"4ES:thunderbird-0:1.5.0.12-39.el4.i386",
"4ES:thunderbird-0:1.5.0.12-39.el4.ia64",
"4ES:thunderbird-0:1.5.0.12-39.el4.ppc",
"4ES:thunderbird-0:1.5.0.12-39.el4.s390",
"4ES:thunderbird-0:1.5.0.12-39.el4.s390x",
"4ES:thunderbird-0:1.5.0.12-39.el4.src",
"4ES:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"4WS:thunderbird-0:1.5.0.12-39.el4.i386",
"4WS:thunderbird-0:1.5.0.12-39.el4.ia64",
"4WS:thunderbird-0:1.5.0.12-39.el4.ppc",
"4WS:thunderbird-0:1.5.0.12-39.el4.s390",
"4WS:thunderbird-0:1.5.0.12-39.el4.s390x",
"4WS:thunderbird-0:1.5.0.12-39.el4.src",
"4WS:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"5Client:thunderbird-0:2.0.0.24-18.el5_6.i386",
"5Client:thunderbird-0:2.0.0.24-18.el5_6.src",
"5Client:thunderbird-0:2.0.0.24-18.el5_6.x86_64",
"5Client:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.i386",
"5Client:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.x86_64",
"5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.i386",
"5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.src",
"5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.x86_64",
"5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.i386",
"5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-2362"
},
{
"category": "external",
"summary": "RHBZ#714583",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=714583"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-2362",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2362"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-2362",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-2362"
}
],
"release_date": "2011-06-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-06-21T22:25:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"4AS:thunderbird-0:1.5.0.12-39.el4.i386",
"4AS:thunderbird-0:1.5.0.12-39.el4.ia64",
"4AS:thunderbird-0:1.5.0.12-39.el4.ppc",
"4AS:thunderbird-0:1.5.0.12-39.el4.s390",
"4AS:thunderbird-0:1.5.0.12-39.el4.s390x",
"4AS:thunderbird-0:1.5.0.12-39.el4.src",
"4AS:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.i386",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.ia64",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.ppc",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.s390",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.s390x",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.src",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"4ES:thunderbird-0:1.5.0.12-39.el4.i386",
"4ES:thunderbird-0:1.5.0.12-39.el4.ia64",
"4ES:thunderbird-0:1.5.0.12-39.el4.ppc",
"4ES:thunderbird-0:1.5.0.12-39.el4.s390",
"4ES:thunderbird-0:1.5.0.12-39.el4.s390x",
"4ES:thunderbird-0:1.5.0.12-39.el4.src",
"4ES:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"4WS:thunderbird-0:1.5.0.12-39.el4.i386",
"4WS:thunderbird-0:1.5.0.12-39.el4.ia64",
"4WS:thunderbird-0:1.5.0.12-39.el4.ppc",
"4WS:thunderbird-0:1.5.0.12-39.el4.s390",
"4WS:thunderbird-0:1.5.0.12-39.el4.s390x",
"4WS:thunderbird-0:1.5.0.12-39.el4.src",
"4WS:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"5Client:thunderbird-0:2.0.0.24-18.el5_6.i386",
"5Client:thunderbird-0:2.0.0.24-18.el5_6.src",
"5Client:thunderbird-0:2.0.0.24-18.el5_6.x86_64",
"5Client:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.i386",
"5Client:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.x86_64",
"5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.i386",
"5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.src",
"5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.x86_64",
"5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.i386",
"5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:0887"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.1,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS:thunderbird-0:1.5.0.12-39.el4.i386",
"4AS:thunderbird-0:1.5.0.12-39.el4.ia64",
"4AS:thunderbird-0:1.5.0.12-39.el4.ppc",
"4AS:thunderbird-0:1.5.0.12-39.el4.s390",
"4AS:thunderbird-0:1.5.0.12-39.el4.s390x",
"4AS:thunderbird-0:1.5.0.12-39.el4.src",
"4AS:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.i386",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.ia64",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.ppc",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.s390",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.s390x",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.src",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"4ES:thunderbird-0:1.5.0.12-39.el4.i386",
"4ES:thunderbird-0:1.5.0.12-39.el4.ia64",
"4ES:thunderbird-0:1.5.0.12-39.el4.ppc",
"4ES:thunderbird-0:1.5.0.12-39.el4.s390",
"4ES:thunderbird-0:1.5.0.12-39.el4.s390x",
"4ES:thunderbird-0:1.5.0.12-39.el4.src",
"4ES:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"4WS:thunderbird-0:1.5.0.12-39.el4.i386",
"4WS:thunderbird-0:1.5.0.12-39.el4.ia64",
"4WS:thunderbird-0:1.5.0.12-39.el4.ppc",
"4WS:thunderbird-0:1.5.0.12-39.el4.s390",
"4WS:thunderbird-0:1.5.0.12-39.el4.s390x",
"4WS:thunderbird-0:1.5.0.12-39.el4.src",
"4WS:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"5Client:thunderbird-0:2.0.0.24-18.el5_6.i386",
"5Client:thunderbird-0:2.0.0.24-18.el5_6.src",
"5Client:thunderbird-0:2.0.0.24-18.el5_6.x86_64",
"5Client:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.i386",
"5Client:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.x86_64",
"5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.i386",
"5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.src",
"5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.x86_64",
"5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.i386",
"5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "Mozilla Cookie isolation error (MFSA 2011-24)"
},
{
"cve": "CVE-2011-2363",
"discovery_date": "2011-06-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "714581"
}
],
"notes": [
{
"category": "description",
"text": "Use-after-free vulnerability in the nsSVGPointList::AppendElement function in the implementation of SVG element lists in Mozilla Firefox before 3.6.18, Thunderbird before 3.1.11, and SeaMonkey through 2.0.14 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via vectors involving a user-supplied callback.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Mozilla Multiple dangling pointer vulnerabilities (MFSA 2011-23)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS:thunderbird-0:1.5.0.12-39.el4.i386",
"4AS:thunderbird-0:1.5.0.12-39.el4.ia64",
"4AS:thunderbird-0:1.5.0.12-39.el4.ppc",
"4AS:thunderbird-0:1.5.0.12-39.el4.s390",
"4AS:thunderbird-0:1.5.0.12-39.el4.s390x",
"4AS:thunderbird-0:1.5.0.12-39.el4.src",
"4AS:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.i386",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.ia64",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.ppc",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.s390",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.s390x",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.src",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"4ES:thunderbird-0:1.5.0.12-39.el4.i386",
"4ES:thunderbird-0:1.5.0.12-39.el4.ia64",
"4ES:thunderbird-0:1.5.0.12-39.el4.ppc",
"4ES:thunderbird-0:1.5.0.12-39.el4.s390",
"4ES:thunderbird-0:1.5.0.12-39.el4.s390x",
"4ES:thunderbird-0:1.5.0.12-39.el4.src",
"4ES:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"4WS:thunderbird-0:1.5.0.12-39.el4.i386",
"4WS:thunderbird-0:1.5.0.12-39.el4.ia64",
"4WS:thunderbird-0:1.5.0.12-39.el4.ppc",
"4WS:thunderbird-0:1.5.0.12-39.el4.s390",
"4WS:thunderbird-0:1.5.0.12-39.el4.s390x",
"4WS:thunderbird-0:1.5.0.12-39.el4.src",
"4WS:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"5Client:thunderbird-0:2.0.0.24-18.el5_6.i386",
"5Client:thunderbird-0:2.0.0.24-18.el5_6.src",
"5Client:thunderbird-0:2.0.0.24-18.el5_6.x86_64",
"5Client:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.i386",
"5Client:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.x86_64",
"5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.i386",
"5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.src",
"5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.x86_64",
"5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.i386",
"5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-2363"
},
{
"category": "external",
"summary": "RHBZ#714581",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=714581"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-2363",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2363"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-2363",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-2363"
}
],
"release_date": "2011-06-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-06-21T22:25:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"4AS:thunderbird-0:1.5.0.12-39.el4.i386",
"4AS:thunderbird-0:1.5.0.12-39.el4.ia64",
"4AS:thunderbird-0:1.5.0.12-39.el4.ppc",
"4AS:thunderbird-0:1.5.0.12-39.el4.s390",
"4AS:thunderbird-0:1.5.0.12-39.el4.s390x",
"4AS:thunderbird-0:1.5.0.12-39.el4.src",
"4AS:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.i386",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.ia64",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.ppc",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.s390",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.s390x",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.src",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"4ES:thunderbird-0:1.5.0.12-39.el4.i386",
"4ES:thunderbird-0:1.5.0.12-39.el4.ia64",
"4ES:thunderbird-0:1.5.0.12-39.el4.ppc",
"4ES:thunderbird-0:1.5.0.12-39.el4.s390",
"4ES:thunderbird-0:1.5.0.12-39.el4.s390x",
"4ES:thunderbird-0:1.5.0.12-39.el4.src",
"4ES:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"4WS:thunderbird-0:1.5.0.12-39.el4.i386",
"4WS:thunderbird-0:1.5.0.12-39.el4.ia64",
"4WS:thunderbird-0:1.5.0.12-39.el4.ppc",
"4WS:thunderbird-0:1.5.0.12-39.el4.s390",
"4WS:thunderbird-0:1.5.0.12-39.el4.s390x",
"4WS:thunderbird-0:1.5.0.12-39.el4.src",
"4WS:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"5Client:thunderbird-0:2.0.0.24-18.el5_6.i386",
"5Client:thunderbird-0:2.0.0.24-18.el5_6.src",
"5Client:thunderbird-0:2.0.0.24-18.el5_6.x86_64",
"5Client:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.i386",
"5Client:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.x86_64",
"5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.i386",
"5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.src",
"5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.x86_64",
"5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.i386",
"5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:0887"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS:thunderbird-0:1.5.0.12-39.el4.i386",
"4AS:thunderbird-0:1.5.0.12-39.el4.ia64",
"4AS:thunderbird-0:1.5.0.12-39.el4.ppc",
"4AS:thunderbird-0:1.5.0.12-39.el4.s390",
"4AS:thunderbird-0:1.5.0.12-39.el4.s390x",
"4AS:thunderbird-0:1.5.0.12-39.el4.src",
"4AS:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.i386",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.ia64",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.ppc",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.s390",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.s390x",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.src",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"4ES:thunderbird-0:1.5.0.12-39.el4.i386",
"4ES:thunderbird-0:1.5.0.12-39.el4.ia64",
"4ES:thunderbird-0:1.5.0.12-39.el4.ppc",
"4ES:thunderbird-0:1.5.0.12-39.el4.s390",
"4ES:thunderbird-0:1.5.0.12-39.el4.s390x",
"4ES:thunderbird-0:1.5.0.12-39.el4.src",
"4ES:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"4WS:thunderbird-0:1.5.0.12-39.el4.i386",
"4WS:thunderbird-0:1.5.0.12-39.el4.ia64",
"4WS:thunderbird-0:1.5.0.12-39.el4.ppc",
"4WS:thunderbird-0:1.5.0.12-39.el4.s390",
"4WS:thunderbird-0:1.5.0.12-39.el4.s390x",
"4WS:thunderbird-0:1.5.0.12-39.el4.src",
"4WS:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"5Client:thunderbird-0:2.0.0.24-18.el5_6.i386",
"5Client:thunderbird-0:2.0.0.24-18.el5_6.src",
"5Client:thunderbird-0:2.0.0.24-18.el5_6.x86_64",
"5Client:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.i386",
"5Client:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.x86_64",
"5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.i386",
"5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.src",
"5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.x86_64",
"5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.i386",
"5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "Mozilla Multiple dangling pointer vulnerabilities (MFSA 2011-23)"
},
{
"cve": "CVE-2011-2364",
"discovery_date": "2011-06-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "714576"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the browser engine in Mozilla Firefox 3.6.x before 3.6.18 and Thunderbird before 3.1.11 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors, a different vulnerability than CVE-2011-2365.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Mozilla Miscellaneous memory safety hazards (MFSA 2011-19)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS:thunderbird-0:1.5.0.12-39.el4.i386",
"4AS:thunderbird-0:1.5.0.12-39.el4.ia64",
"4AS:thunderbird-0:1.5.0.12-39.el4.ppc",
"4AS:thunderbird-0:1.5.0.12-39.el4.s390",
"4AS:thunderbird-0:1.5.0.12-39.el4.s390x",
"4AS:thunderbird-0:1.5.0.12-39.el4.src",
"4AS:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.i386",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.ia64",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.ppc",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.s390",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.s390x",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.src",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"4ES:thunderbird-0:1.5.0.12-39.el4.i386",
"4ES:thunderbird-0:1.5.0.12-39.el4.ia64",
"4ES:thunderbird-0:1.5.0.12-39.el4.ppc",
"4ES:thunderbird-0:1.5.0.12-39.el4.s390",
"4ES:thunderbird-0:1.5.0.12-39.el4.s390x",
"4ES:thunderbird-0:1.5.0.12-39.el4.src",
"4ES:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"4WS:thunderbird-0:1.5.0.12-39.el4.i386",
"4WS:thunderbird-0:1.5.0.12-39.el4.ia64",
"4WS:thunderbird-0:1.5.0.12-39.el4.ppc",
"4WS:thunderbird-0:1.5.0.12-39.el4.s390",
"4WS:thunderbird-0:1.5.0.12-39.el4.s390x",
"4WS:thunderbird-0:1.5.0.12-39.el4.src",
"4WS:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"5Client:thunderbird-0:2.0.0.24-18.el5_6.i386",
"5Client:thunderbird-0:2.0.0.24-18.el5_6.src",
"5Client:thunderbird-0:2.0.0.24-18.el5_6.x86_64",
"5Client:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.i386",
"5Client:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.x86_64",
"5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.i386",
"5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.src",
"5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.x86_64",
"5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.i386",
"5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-2364"
},
{
"category": "external",
"summary": "RHBZ#714576",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=714576"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-2364",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2364"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-2364",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-2364"
}
],
"release_date": "2011-06-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-06-21T22:25:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"4AS:thunderbird-0:1.5.0.12-39.el4.i386",
"4AS:thunderbird-0:1.5.0.12-39.el4.ia64",
"4AS:thunderbird-0:1.5.0.12-39.el4.ppc",
"4AS:thunderbird-0:1.5.0.12-39.el4.s390",
"4AS:thunderbird-0:1.5.0.12-39.el4.s390x",
"4AS:thunderbird-0:1.5.0.12-39.el4.src",
"4AS:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.i386",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.ia64",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.ppc",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.s390",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.s390x",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.src",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"4ES:thunderbird-0:1.5.0.12-39.el4.i386",
"4ES:thunderbird-0:1.5.0.12-39.el4.ia64",
"4ES:thunderbird-0:1.5.0.12-39.el4.ppc",
"4ES:thunderbird-0:1.5.0.12-39.el4.s390",
"4ES:thunderbird-0:1.5.0.12-39.el4.s390x",
"4ES:thunderbird-0:1.5.0.12-39.el4.src",
"4ES:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"4WS:thunderbird-0:1.5.0.12-39.el4.i386",
"4WS:thunderbird-0:1.5.0.12-39.el4.ia64",
"4WS:thunderbird-0:1.5.0.12-39.el4.ppc",
"4WS:thunderbird-0:1.5.0.12-39.el4.s390",
"4WS:thunderbird-0:1.5.0.12-39.el4.s390x",
"4WS:thunderbird-0:1.5.0.12-39.el4.src",
"4WS:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"5Client:thunderbird-0:2.0.0.24-18.el5_6.i386",
"5Client:thunderbird-0:2.0.0.24-18.el5_6.src",
"5Client:thunderbird-0:2.0.0.24-18.el5_6.x86_64",
"5Client:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.i386",
"5Client:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.x86_64",
"5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.i386",
"5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.src",
"5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.x86_64",
"5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.i386",
"5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:0887"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS:thunderbird-0:1.5.0.12-39.el4.i386",
"4AS:thunderbird-0:1.5.0.12-39.el4.ia64",
"4AS:thunderbird-0:1.5.0.12-39.el4.ppc",
"4AS:thunderbird-0:1.5.0.12-39.el4.s390",
"4AS:thunderbird-0:1.5.0.12-39.el4.s390x",
"4AS:thunderbird-0:1.5.0.12-39.el4.src",
"4AS:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.i386",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.ia64",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.ppc",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.s390",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.s390x",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.src",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"4ES:thunderbird-0:1.5.0.12-39.el4.i386",
"4ES:thunderbird-0:1.5.0.12-39.el4.ia64",
"4ES:thunderbird-0:1.5.0.12-39.el4.ppc",
"4ES:thunderbird-0:1.5.0.12-39.el4.s390",
"4ES:thunderbird-0:1.5.0.12-39.el4.s390x",
"4ES:thunderbird-0:1.5.0.12-39.el4.src",
"4ES:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"4WS:thunderbird-0:1.5.0.12-39.el4.i386",
"4WS:thunderbird-0:1.5.0.12-39.el4.ia64",
"4WS:thunderbird-0:1.5.0.12-39.el4.ppc",
"4WS:thunderbird-0:1.5.0.12-39.el4.s390",
"4WS:thunderbird-0:1.5.0.12-39.el4.s390x",
"4WS:thunderbird-0:1.5.0.12-39.el4.src",
"4WS:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"5Client:thunderbird-0:2.0.0.24-18.el5_6.i386",
"5Client:thunderbird-0:2.0.0.24-18.el5_6.src",
"5Client:thunderbird-0:2.0.0.24-18.el5_6.x86_64",
"5Client:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.i386",
"5Client:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.x86_64",
"5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.i386",
"5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.src",
"5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.x86_64",
"5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.i386",
"5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "Mozilla Miscellaneous memory safety hazards (MFSA 2011-19)"
},
{
"cve": "CVE-2011-2365",
"discovery_date": "2011-06-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "714576"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the browser engine in Mozilla Firefox 3.6.x before 3.6.18 and Thunderbird before 3.1.11 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors, a different vulnerability than CVE-2011-2364.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Mozilla Miscellaneous memory safety hazards (MFSA 2011-19)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS:thunderbird-0:1.5.0.12-39.el4.i386",
"4AS:thunderbird-0:1.5.0.12-39.el4.ia64",
"4AS:thunderbird-0:1.5.0.12-39.el4.ppc",
"4AS:thunderbird-0:1.5.0.12-39.el4.s390",
"4AS:thunderbird-0:1.5.0.12-39.el4.s390x",
"4AS:thunderbird-0:1.5.0.12-39.el4.src",
"4AS:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.i386",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.ia64",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.ppc",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.s390",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.s390x",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.src",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"4ES:thunderbird-0:1.5.0.12-39.el4.i386",
"4ES:thunderbird-0:1.5.0.12-39.el4.ia64",
"4ES:thunderbird-0:1.5.0.12-39.el4.ppc",
"4ES:thunderbird-0:1.5.0.12-39.el4.s390",
"4ES:thunderbird-0:1.5.0.12-39.el4.s390x",
"4ES:thunderbird-0:1.5.0.12-39.el4.src",
"4ES:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"4WS:thunderbird-0:1.5.0.12-39.el4.i386",
"4WS:thunderbird-0:1.5.0.12-39.el4.ia64",
"4WS:thunderbird-0:1.5.0.12-39.el4.ppc",
"4WS:thunderbird-0:1.5.0.12-39.el4.s390",
"4WS:thunderbird-0:1.5.0.12-39.el4.s390x",
"4WS:thunderbird-0:1.5.0.12-39.el4.src",
"4WS:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"5Client:thunderbird-0:2.0.0.24-18.el5_6.i386",
"5Client:thunderbird-0:2.0.0.24-18.el5_6.src",
"5Client:thunderbird-0:2.0.0.24-18.el5_6.x86_64",
"5Client:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.i386",
"5Client:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.x86_64",
"5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.i386",
"5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.src",
"5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.x86_64",
"5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.i386",
"5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-2365"
},
{
"category": "external",
"summary": "RHBZ#714576",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=714576"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-2365",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2365"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-2365",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-2365"
}
],
"release_date": "2011-06-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-06-21T22:25:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"4AS:thunderbird-0:1.5.0.12-39.el4.i386",
"4AS:thunderbird-0:1.5.0.12-39.el4.ia64",
"4AS:thunderbird-0:1.5.0.12-39.el4.ppc",
"4AS:thunderbird-0:1.5.0.12-39.el4.s390",
"4AS:thunderbird-0:1.5.0.12-39.el4.s390x",
"4AS:thunderbird-0:1.5.0.12-39.el4.src",
"4AS:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.i386",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.ia64",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.ppc",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.s390",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.s390x",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.src",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"4ES:thunderbird-0:1.5.0.12-39.el4.i386",
"4ES:thunderbird-0:1.5.0.12-39.el4.ia64",
"4ES:thunderbird-0:1.5.0.12-39.el4.ppc",
"4ES:thunderbird-0:1.5.0.12-39.el4.s390",
"4ES:thunderbird-0:1.5.0.12-39.el4.s390x",
"4ES:thunderbird-0:1.5.0.12-39.el4.src",
"4ES:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"4WS:thunderbird-0:1.5.0.12-39.el4.i386",
"4WS:thunderbird-0:1.5.0.12-39.el4.ia64",
"4WS:thunderbird-0:1.5.0.12-39.el4.ppc",
"4WS:thunderbird-0:1.5.0.12-39.el4.s390",
"4WS:thunderbird-0:1.5.0.12-39.el4.s390x",
"4WS:thunderbird-0:1.5.0.12-39.el4.src",
"4WS:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"5Client:thunderbird-0:2.0.0.24-18.el5_6.i386",
"5Client:thunderbird-0:2.0.0.24-18.el5_6.src",
"5Client:thunderbird-0:2.0.0.24-18.el5_6.x86_64",
"5Client:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.i386",
"5Client:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.x86_64",
"5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.i386",
"5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.src",
"5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.x86_64",
"5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.i386",
"5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:0887"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS:thunderbird-0:1.5.0.12-39.el4.i386",
"4AS:thunderbird-0:1.5.0.12-39.el4.ia64",
"4AS:thunderbird-0:1.5.0.12-39.el4.ppc",
"4AS:thunderbird-0:1.5.0.12-39.el4.s390",
"4AS:thunderbird-0:1.5.0.12-39.el4.s390x",
"4AS:thunderbird-0:1.5.0.12-39.el4.src",
"4AS:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.i386",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.ia64",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.ppc",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.s390",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.s390x",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.src",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"4ES:thunderbird-0:1.5.0.12-39.el4.i386",
"4ES:thunderbird-0:1.5.0.12-39.el4.ia64",
"4ES:thunderbird-0:1.5.0.12-39.el4.ppc",
"4ES:thunderbird-0:1.5.0.12-39.el4.s390",
"4ES:thunderbird-0:1.5.0.12-39.el4.s390x",
"4ES:thunderbird-0:1.5.0.12-39.el4.src",
"4ES:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"4WS:thunderbird-0:1.5.0.12-39.el4.i386",
"4WS:thunderbird-0:1.5.0.12-39.el4.ia64",
"4WS:thunderbird-0:1.5.0.12-39.el4.ppc",
"4WS:thunderbird-0:1.5.0.12-39.el4.s390",
"4WS:thunderbird-0:1.5.0.12-39.el4.s390x",
"4WS:thunderbird-0:1.5.0.12-39.el4.src",
"4WS:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"5Client:thunderbird-0:2.0.0.24-18.el5_6.i386",
"5Client:thunderbird-0:2.0.0.24-18.el5_6.src",
"5Client:thunderbird-0:2.0.0.24-18.el5_6.x86_64",
"5Client:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.i386",
"5Client:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.x86_64",
"5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.i386",
"5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.src",
"5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.x86_64",
"5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.i386",
"5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "Mozilla Miscellaneous memory safety hazards (MFSA 2011-19)"
},
{
"cve": "CVE-2011-2371",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"discovery_date": "2011-06-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "714580"
}
],
"notes": [
{
"category": "description",
"text": "Integer overflow in the Array.reduceRight method in Mozilla Firefox before 3.6.18 and 4.x through 4.0.1, Thunderbird before 3.1.11, and SeaMonkey through 2.0.14 allows remote attackers to execute arbitrary code via vectors involving a long JavaScript Array object.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Mozilla Integer overflow and arbitrary code execution (MFSA 2011-22)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS:thunderbird-0:1.5.0.12-39.el4.i386",
"4AS:thunderbird-0:1.5.0.12-39.el4.ia64",
"4AS:thunderbird-0:1.5.0.12-39.el4.ppc",
"4AS:thunderbird-0:1.5.0.12-39.el4.s390",
"4AS:thunderbird-0:1.5.0.12-39.el4.s390x",
"4AS:thunderbird-0:1.5.0.12-39.el4.src",
"4AS:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.i386",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.ia64",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.ppc",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.s390",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.s390x",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.src",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"4ES:thunderbird-0:1.5.0.12-39.el4.i386",
"4ES:thunderbird-0:1.5.0.12-39.el4.ia64",
"4ES:thunderbird-0:1.5.0.12-39.el4.ppc",
"4ES:thunderbird-0:1.5.0.12-39.el4.s390",
"4ES:thunderbird-0:1.5.0.12-39.el4.s390x",
"4ES:thunderbird-0:1.5.0.12-39.el4.src",
"4ES:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"4WS:thunderbird-0:1.5.0.12-39.el4.i386",
"4WS:thunderbird-0:1.5.0.12-39.el4.ia64",
"4WS:thunderbird-0:1.5.0.12-39.el4.ppc",
"4WS:thunderbird-0:1.5.0.12-39.el4.s390",
"4WS:thunderbird-0:1.5.0.12-39.el4.s390x",
"4WS:thunderbird-0:1.5.0.12-39.el4.src",
"4WS:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"5Client:thunderbird-0:2.0.0.24-18.el5_6.i386",
"5Client:thunderbird-0:2.0.0.24-18.el5_6.src",
"5Client:thunderbird-0:2.0.0.24-18.el5_6.x86_64",
"5Client:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.i386",
"5Client:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.x86_64",
"5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.i386",
"5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.src",
"5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.x86_64",
"5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.i386",
"5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-2371"
},
{
"category": "external",
"summary": "RHBZ#714580",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=714580"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-2371",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2371"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-2371",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-2371"
}
],
"release_date": "2011-06-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-06-21T22:25:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"4AS:thunderbird-0:1.5.0.12-39.el4.i386",
"4AS:thunderbird-0:1.5.0.12-39.el4.ia64",
"4AS:thunderbird-0:1.5.0.12-39.el4.ppc",
"4AS:thunderbird-0:1.5.0.12-39.el4.s390",
"4AS:thunderbird-0:1.5.0.12-39.el4.s390x",
"4AS:thunderbird-0:1.5.0.12-39.el4.src",
"4AS:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.i386",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.ia64",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.ppc",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.s390",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.s390x",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.src",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"4ES:thunderbird-0:1.5.0.12-39.el4.i386",
"4ES:thunderbird-0:1.5.0.12-39.el4.ia64",
"4ES:thunderbird-0:1.5.0.12-39.el4.ppc",
"4ES:thunderbird-0:1.5.0.12-39.el4.s390",
"4ES:thunderbird-0:1.5.0.12-39.el4.s390x",
"4ES:thunderbird-0:1.5.0.12-39.el4.src",
"4ES:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"4WS:thunderbird-0:1.5.0.12-39.el4.i386",
"4WS:thunderbird-0:1.5.0.12-39.el4.ia64",
"4WS:thunderbird-0:1.5.0.12-39.el4.ppc",
"4WS:thunderbird-0:1.5.0.12-39.el4.s390",
"4WS:thunderbird-0:1.5.0.12-39.el4.s390x",
"4WS:thunderbird-0:1.5.0.12-39.el4.src",
"4WS:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"5Client:thunderbird-0:2.0.0.24-18.el5_6.i386",
"5Client:thunderbird-0:2.0.0.24-18.el5_6.src",
"5Client:thunderbird-0:2.0.0.24-18.el5_6.x86_64",
"5Client:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.i386",
"5Client:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.x86_64",
"5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.i386",
"5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.src",
"5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.x86_64",
"5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.i386",
"5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:0887"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS:thunderbird-0:1.5.0.12-39.el4.i386",
"4AS:thunderbird-0:1.5.0.12-39.el4.ia64",
"4AS:thunderbird-0:1.5.0.12-39.el4.ppc",
"4AS:thunderbird-0:1.5.0.12-39.el4.s390",
"4AS:thunderbird-0:1.5.0.12-39.el4.s390x",
"4AS:thunderbird-0:1.5.0.12-39.el4.src",
"4AS:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.i386",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.ia64",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.ppc",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.s390",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.s390x",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.src",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"4ES:thunderbird-0:1.5.0.12-39.el4.i386",
"4ES:thunderbird-0:1.5.0.12-39.el4.ia64",
"4ES:thunderbird-0:1.5.0.12-39.el4.ppc",
"4ES:thunderbird-0:1.5.0.12-39.el4.s390",
"4ES:thunderbird-0:1.5.0.12-39.el4.s390x",
"4ES:thunderbird-0:1.5.0.12-39.el4.src",
"4ES:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"4WS:thunderbird-0:1.5.0.12-39.el4.i386",
"4WS:thunderbird-0:1.5.0.12-39.el4.ia64",
"4WS:thunderbird-0:1.5.0.12-39.el4.ppc",
"4WS:thunderbird-0:1.5.0.12-39.el4.s390",
"4WS:thunderbird-0:1.5.0.12-39.el4.s390x",
"4WS:thunderbird-0:1.5.0.12-39.el4.src",
"4WS:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"5Client:thunderbird-0:2.0.0.24-18.el5_6.i386",
"5Client:thunderbird-0:2.0.0.24-18.el5_6.src",
"5Client:thunderbird-0:2.0.0.24-18.el5_6.x86_64",
"5Client:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.i386",
"5Client:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.x86_64",
"5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.i386",
"5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.src",
"5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.x86_64",
"5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.i386",
"5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "Mozilla Integer overflow and arbitrary code execution (MFSA 2011-22)"
},
{
"cve": "CVE-2011-2373",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2011-06-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "714577"
}
],
"notes": [
{
"category": "description",
"text": "Use-after-free vulnerability in Mozilla Firefox before 3.6.18 and 4.x through 4.0.1, Thunderbird before 3.1.11, and SeaMonkey through 2.0.14, when JavaScript is disabled, allows remote attackers to execute arbitrary code via a crafted XUL document.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Mozilla Use-after-free vulnerability when viewing XUL document with script disabled (MFSA 2011-20)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS:thunderbird-0:1.5.0.12-39.el4.i386",
"4AS:thunderbird-0:1.5.0.12-39.el4.ia64",
"4AS:thunderbird-0:1.5.0.12-39.el4.ppc",
"4AS:thunderbird-0:1.5.0.12-39.el4.s390",
"4AS:thunderbird-0:1.5.0.12-39.el4.s390x",
"4AS:thunderbird-0:1.5.0.12-39.el4.src",
"4AS:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.i386",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.ia64",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.ppc",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.s390",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.s390x",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.src",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"4ES:thunderbird-0:1.5.0.12-39.el4.i386",
"4ES:thunderbird-0:1.5.0.12-39.el4.ia64",
"4ES:thunderbird-0:1.5.0.12-39.el4.ppc",
"4ES:thunderbird-0:1.5.0.12-39.el4.s390",
"4ES:thunderbird-0:1.5.0.12-39.el4.s390x",
"4ES:thunderbird-0:1.5.0.12-39.el4.src",
"4ES:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"4WS:thunderbird-0:1.5.0.12-39.el4.i386",
"4WS:thunderbird-0:1.5.0.12-39.el4.ia64",
"4WS:thunderbird-0:1.5.0.12-39.el4.ppc",
"4WS:thunderbird-0:1.5.0.12-39.el4.s390",
"4WS:thunderbird-0:1.5.0.12-39.el4.s390x",
"4WS:thunderbird-0:1.5.0.12-39.el4.src",
"4WS:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"5Client:thunderbird-0:2.0.0.24-18.el5_6.i386",
"5Client:thunderbird-0:2.0.0.24-18.el5_6.src",
"5Client:thunderbird-0:2.0.0.24-18.el5_6.x86_64",
"5Client:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.i386",
"5Client:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.x86_64",
"5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.i386",
"5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.src",
"5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.x86_64",
"5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.i386",
"5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-2373"
},
{
"category": "external",
"summary": "RHBZ#714577",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=714577"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-2373",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2373"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-2373",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-2373"
}
],
"release_date": "2011-06-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-06-21T22:25:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"4AS:thunderbird-0:1.5.0.12-39.el4.i386",
"4AS:thunderbird-0:1.5.0.12-39.el4.ia64",
"4AS:thunderbird-0:1.5.0.12-39.el4.ppc",
"4AS:thunderbird-0:1.5.0.12-39.el4.s390",
"4AS:thunderbird-0:1.5.0.12-39.el4.s390x",
"4AS:thunderbird-0:1.5.0.12-39.el4.src",
"4AS:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.i386",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.ia64",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.ppc",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.s390",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.s390x",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.src",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"4ES:thunderbird-0:1.5.0.12-39.el4.i386",
"4ES:thunderbird-0:1.5.0.12-39.el4.ia64",
"4ES:thunderbird-0:1.5.0.12-39.el4.ppc",
"4ES:thunderbird-0:1.5.0.12-39.el4.s390",
"4ES:thunderbird-0:1.5.0.12-39.el4.s390x",
"4ES:thunderbird-0:1.5.0.12-39.el4.src",
"4ES:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"4WS:thunderbird-0:1.5.0.12-39.el4.i386",
"4WS:thunderbird-0:1.5.0.12-39.el4.ia64",
"4WS:thunderbird-0:1.5.0.12-39.el4.ppc",
"4WS:thunderbird-0:1.5.0.12-39.el4.s390",
"4WS:thunderbird-0:1.5.0.12-39.el4.s390x",
"4WS:thunderbird-0:1.5.0.12-39.el4.src",
"4WS:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"5Client:thunderbird-0:2.0.0.24-18.el5_6.i386",
"5Client:thunderbird-0:2.0.0.24-18.el5_6.src",
"5Client:thunderbird-0:2.0.0.24-18.el5_6.x86_64",
"5Client:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.i386",
"5Client:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.x86_64",
"5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.i386",
"5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.src",
"5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.x86_64",
"5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.i386",
"5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:0887"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS:thunderbird-0:1.5.0.12-39.el4.i386",
"4AS:thunderbird-0:1.5.0.12-39.el4.ia64",
"4AS:thunderbird-0:1.5.0.12-39.el4.ppc",
"4AS:thunderbird-0:1.5.0.12-39.el4.s390",
"4AS:thunderbird-0:1.5.0.12-39.el4.s390x",
"4AS:thunderbird-0:1.5.0.12-39.el4.src",
"4AS:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.i386",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.ia64",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.ppc",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.s390",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.s390x",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.src",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"4ES:thunderbird-0:1.5.0.12-39.el4.i386",
"4ES:thunderbird-0:1.5.0.12-39.el4.ia64",
"4ES:thunderbird-0:1.5.0.12-39.el4.ppc",
"4ES:thunderbird-0:1.5.0.12-39.el4.s390",
"4ES:thunderbird-0:1.5.0.12-39.el4.s390x",
"4ES:thunderbird-0:1.5.0.12-39.el4.src",
"4ES:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"4WS:thunderbird-0:1.5.0.12-39.el4.i386",
"4WS:thunderbird-0:1.5.0.12-39.el4.ia64",
"4WS:thunderbird-0:1.5.0.12-39.el4.ppc",
"4WS:thunderbird-0:1.5.0.12-39.el4.s390",
"4WS:thunderbird-0:1.5.0.12-39.el4.s390x",
"4WS:thunderbird-0:1.5.0.12-39.el4.src",
"4WS:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"5Client:thunderbird-0:2.0.0.24-18.el5_6.i386",
"5Client:thunderbird-0:2.0.0.24-18.el5_6.src",
"5Client:thunderbird-0:2.0.0.24-18.el5_6.x86_64",
"5Client:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.i386",
"5Client:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.x86_64",
"5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.i386",
"5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.src",
"5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.x86_64",
"5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.i386",
"5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "Mozilla Use-after-free vulnerability when viewing XUL document with script disabled (MFSA 2011-20)"
},
{
"cve": "CVE-2011-2374",
"discovery_date": "2011-06-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "714576"
}
],
"notes": [
{
"category": "description",
"text": "Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 3.6.18 and 4.x through 4.0.1, and Thunderbird before 3.1.11, allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Mozilla Miscellaneous memory safety hazards (MFSA 2011-19)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS:thunderbird-0:1.5.0.12-39.el4.i386",
"4AS:thunderbird-0:1.5.0.12-39.el4.ia64",
"4AS:thunderbird-0:1.5.0.12-39.el4.ppc",
"4AS:thunderbird-0:1.5.0.12-39.el4.s390",
"4AS:thunderbird-0:1.5.0.12-39.el4.s390x",
"4AS:thunderbird-0:1.5.0.12-39.el4.src",
"4AS:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.i386",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.ia64",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.ppc",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.s390",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.s390x",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.src",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"4ES:thunderbird-0:1.5.0.12-39.el4.i386",
"4ES:thunderbird-0:1.5.0.12-39.el4.ia64",
"4ES:thunderbird-0:1.5.0.12-39.el4.ppc",
"4ES:thunderbird-0:1.5.0.12-39.el4.s390",
"4ES:thunderbird-0:1.5.0.12-39.el4.s390x",
"4ES:thunderbird-0:1.5.0.12-39.el4.src",
"4ES:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"4WS:thunderbird-0:1.5.0.12-39.el4.i386",
"4WS:thunderbird-0:1.5.0.12-39.el4.ia64",
"4WS:thunderbird-0:1.5.0.12-39.el4.ppc",
"4WS:thunderbird-0:1.5.0.12-39.el4.s390",
"4WS:thunderbird-0:1.5.0.12-39.el4.s390x",
"4WS:thunderbird-0:1.5.0.12-39.el4.src",
"4WS:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"5Client:thunderbird-0:2.0.0.24-18.el5_6.i386",
"5Client:thunderbird-0:2.0.0.24-18.el5_6.src",
"5Client:thunderbird-0:2.0.0.24-18.el5_6.x86_64",
"5Client:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.i386",
"5Client:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.x86_64",
"5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.i386",
"5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.src",
"5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.x86_64",
"5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.i386",
"5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-2374"
},
{
"category": "external",
"summary": "RHBZ#714576",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=714576"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-2374",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2374"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-2374",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-2374"
}
],
"release_date": "2011-06-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-06-21T22:25:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"4AS:thunderbird-0:1.5.0.12-39.el4.i386",
"4AS:thunderbird-0:1.5.0.12-39.el4.ia64",
"4AS:thunderbird-0:1.5.0.12-39.el4.ppc",
"4AS:thunderbird-0:1.5.0.12-39.el4.s390",
"4AS:thunderbird-0:1.5.0.12-39.el4.s390x",
"4AS:thunderbird-0:1.5.0.12-39.el4.src",
"4AS:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.i386",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.ia64",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.ppc",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.s390",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.s390x",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.src",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"4ES:thunderbird-0:1.5.0.12-39.el4.i386",
"4ES:thunderbird-0:1.5.0.12-39.el4.ia64",
"4ES:thunderbird-0:1.5.0.12-39.el4.ppc",
"4ES:thunderbird-0:1.5.0.12-39.el4.s390",
"4ES:thunderbird-0:1.5.0.12-39.el4.s390x",
"4ES:thunderbird-0:1.5.0.12-39.el4.src",
"4ES:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"4WS:thunderbird-0:1.5.0.12-39.el4.i386",
"4WS:thunderbird-0:1.5.0.12-39.el4.ia64",
"4WS:thunderbird-0:1.5.0.12-39.el4.ppc",
"4WS:thunderbird-0:1.5.0.12-39.el4.s390",
"4WS:thunderbird-0:1.5.0.12-39.el4.s390x",
"4WS:thunderbird-0:1.5.0.12-39.el4.src",
"4WS:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"5Client:thunderbird-0:2.0.0.24-18.el5_6.i386",
"5Client:thunderbird-0:2.0.0.24-18.el5_6.src",
"5Client:thunderbird-0:2.0.0.24-18.el5_6.x86_64",
"5Client:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.i386",
"5Client:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.x86_64",
"5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.i386",
"5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.src",
"5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.x86_64",
"5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.i386",
"5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:0887"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS:thunderbird-0:1.5.0.12-39.el4.i386",
"4AS:thunderbird-0:1.5.0.12-39.el4.ia64",
"4AS:thunderbird-0:1.5.0.12-39.el4.ppc",
"4AS:thunderbird-0:1.5.0.12-39.el4.s390",
"4AS:thunderbird-0:1.5.0.12-39.el4.s390x",
"4AS:thunderbird-0:1.5.0.12-39.el4.src",
"4AS:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.i386",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.ia64",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.ppc",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.s390",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.s390x",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.src",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"4ES:thunderbird-0:1.5.0.12-39.el4.i386",
"4ES:thunderbird-0:1.5.0.12-39.el4.ia64",
"4ES:thunderbird-0:1.5.0.12-39.el4.ppc",
"4ES:thunderbird-0:1.5.0.12-39.el4.s390",
"4ES:thunderbird-0:1.5.0.12-39.el4.s390x",
"4ES:thunderbird-0:1.5.0.12-39.el4.src",
"4ES:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"4WS:thunderbird-0:1.5.0.12-39.el4.i386",
"4WS:thunderbird-0:1.5.0.12-39.el4.ia64",
"4WS:thunderbird-0:1.5.0.12-39.el4.ppc",
"4WS:thunderbird-0:1.5.0.12-39.el4.s390",
"4WS:thunderbird-0:1.5.0.12-39.el4.s390x",
"4WS:thunderbird-0:1.5.0.12-39.el4.src",
"4WS:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"5Client:thunderbird-0:2.0.0.24-18.el5_6.i386",
"5Client:thunderbird-0:2.0.0.24-18.el5_6.src",
"5Client:thunderbird-0:2.0.0.24-18.el5_6.x86_64",
"5Client:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.i386",
"5Client:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.x86_64",
"5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.i386",
"5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.src",
"5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.x86_64",
"5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.i386",
"5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "Mozilla Miscellaneous memory safety hazards (MFSA 2011-19)"
},
{
"cve": "CVE-2011-2375",
"discovery_date": "2011-06-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "714576"
}
],
"notes": [
{
"category": "description",
"text": "Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 5.0 and Thunderbird through 3.1.11 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Mozilla Miscellaneous memory safety hazards (MFSA 2011-19)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS:thunderbird-0:1.5.0.12-39.el4.i386",
"4AS:thunderbird-0:1.5.0.12-39.el4.ia64",
"4AS:thunderbird-0:1.5.0.12-39.el4.ppc",
"4AS:thunderbird-0:1.5.0.12-39.el4.s390",
"4AS:thunderbird-0:1.5.0.12-39.el4.s390x",
"4AS:thunderbird-0:1.5.0.12-39.el4.src",
"4AS:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.i386",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.ia64",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.ppc",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.s390",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.s390x",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.src",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"4ES:thunderbird-0:1.5.0.12-39.el4.i386",
"4ES:thunderbird-0:1.5.0.12-39.el4.ia64",
"4ES:thunderbird-0:1.5.0.12-39.el4.ppc",
"4ES:thunderbird-0:1.5.0.12-39.el4.s390",
"4ES:thunderbird-0:1.5.0.12-39.el4.s390x",
"4ES:thunderbird-0:1.5.0.12-39.el4.src",
"4ES:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"4WS:thunderbird-0:1.5.0.12-39.el4.i386",
"4WS:thunderbird-0:1.5.0.12-39.el4.ia64",
"4WS:thunderbird-0:1.5.0.12-39.el4.ppc",
"4WS:thunderbird-0:1.5.0.12-39.el4.s390",
"4WS:thunderbird-0:1.5.0.12-39.el4.s390x",
"4WS:thunderbird-0:1.5.0.12-39.el4.src",
"4WS:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"5Client:thunderbird-0:2.0.0.24-18.el5_6.i386",
"5Client:thunderbird-0:2.0.0.24-18.el5_6.src",
"5Client:thunderbird-0:2.0.0.24-18.el5_6.x86_64",
"5Client:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.i386",
"5Client:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.x86_64",
"5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.i386",
"5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.src",
"5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.x86_64",
"5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.i386",
"5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-2375"
},
{
"category": "external",
"summary": "RHBZ#714576",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=714576"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-2375",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2375"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-2375",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-2375"
}
],
"release_date": "2011-06-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-06-21T22:25:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"4AS:thunderbird-0:1.5.0.12-39.el4.i386",
"4AS:thunderbird-0:1.5.0.12-39.el4.ia64",
"4AS:thunderbird-0:1.5.0.12-39.el4.ppc",
"4AS:thunderbird-0:1.5.0.12-39.el4.s390",
"4AS:thunderbird-0:1.5.0.12-39.el4.s390x",
"4AS:thunderbird-0:1.5.0.12-39.el4.src",
"4AS:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.i386",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.ia64",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.ppc",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.s390",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.s390x",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.src",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"4ES:thunderbird-0:1.5.0.12-39.el4.i386",
"4ES:thunderbird-0:1.5.0.12-39.el4.ia64",
"4ES:thunderbird-0:1.5.0.12-39.el4.ppc",
"4ES:thunderbird-0:1.5.0.12-39.el4.s390",
"4ES:thunderbird-0:1.5.0.12-39.el4.s390x",
"4ES:thunderbird-0:1.5.0.12-39.el4.src",
"4ES:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"4WS:thunderbird-0:1.5.0.12-39.el4.i386",
"4WS:thunderbird-0:1.5.0.12-39.el4.ia64",
"4WS:thunderbird-0:1.5.0.12-39.el4.ppc",
"4WS:thunderbird-0:1.5.0.12-39.el4.s390",
"4WS:thunderbird-0:1.5.0.12-39.el4.s390x",
"4WS:thunderbird-0:1.5.0.12-39.el4.src",
"4WS:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"5Client:thunderbird-0:2.0.0.24-18.el5_6.i386",
"5Client:thunderbird-0:2.0.0.24-18.el5_6.src",
"5Client:thunderbird-0:2.0.0.24-18.el5_6.x86_64",
"5Client:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.i386",
"5Client:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.x86_64",
"5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.i386",
"5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.src",
"5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.x86_64",
"5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.i386",
"5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:0887"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS:thunderbird-0:1.5.0.12-39.el4.i386",
"4AS:thunderbird-0:1.5.0.12-39.el4.ia64",
"4AS:thunderbird-0:1.5.0.12-39.el4.ppc",
"4AS:thunderbird-0:1.5.0.12-39.el4.s390",
"4AS:thunderbird-0:1.5.0.12-39.el4.s390x",
"4AS:thunderbird-0:1.5.0.12-39.el4.src",
"4AS:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.i386",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.ia64",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.ppc",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.s390",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.s390x",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.src",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"4ES:thunderbird-0:1.5.0.12-39.el4.i386",
"4ES:thunderbird-0:1.5.0.12-39.el4.ia64",
"4ES:thunderbird-0:1.5.0.12-39.el4.ppc",
"4ES:thunderbird-0:1.5.0.12-39.el4.s390",
"4ES:thunderbird-0:1.5.0.12-39.el4.s390x",
"4ES:thunderbird-0:1.5.0.12-39.el4.src",
"4ES:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"4WS:thunderbird-0:1.5.0.12-39.el4.i386",
"4WS:thunderbird-0:1.5.0.12-39.el4.ia64",
"4WS:thunderbird-0:1.5.0.12-39.el4.ppc",
"4WS:thunderbird-0:1.5.0.12-39.el4.s390",
"4WS:thunderbird-0:1.5.0.12-39.el4.s390x",
"4WS:thunderbird-0:1.5.0.12-39.el4.src",
"4WS:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"5Client:thunderbird-0:2.0.0.24-18.el5_6.i386",
"5Client:thunderbird-0:2.0.0.24-18.el5_6.src",
"5Client:thunderbird-0:2.0.0.24-18.el5_6.x86_64",
"5Client:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.i386",
"5Client:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.x86_64",
"5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.i386",
"5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.src",
"5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.x86_64",
"5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.i386",
"5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "Mozilla Miscellaneous memory safety hazards (MFSA 2011-19)"
},
{
"cve": "CVE-2011-2376",
"discovery_date": "2011-06-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "714576"
}
],
"notes": [
{
"category": "description",
"text": "Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 3.6.18 and Thunderbird before 3.1.11 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Mozilla Miscellaneous memory safety hazards (MFSA 2011-19)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS:thunderbird-0:1.5.0.12-39.el4.i386",
"4AS:thunderbird-0:1.5.0.12-39.el4.ia64",
"4AS:thunderbird-0:1.5.0.12-39.el4.ppc",
"4AS:thunderbird-0:1.5.0.12-39.el4.s390",
"4AS:thunderbird-0:1.5.0.12-39.el4.s390x",
"4AS:thunderbird-0:1.5.0.12-39.el4.src",
"4AS:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.i386",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.ia64",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.ppc",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.s390",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.s390x",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.src",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"4ES:thunderbird-0:1.5.0.12-39.el4.i386",
"4ES:thunderbird-0:1.5.0.12-39.el4.ia64",
"4ES:thunderbird-0:1.5.0.12-39.el4.ppc",
"4ES:thunderbird-0:1.5.0.12-39.el4.s390",
"4ES:thunderbird-0:1.5.0.12-39.el4.s390x",
"4ES:thunderbird-0:1.5.0.12-39.el4.src",
"4ES:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"4WS:thunderbird-0:1.5.0.12-39.el4.i386",
"4WS:thunderbird-0:1.5.0.12-39.el4.ia64",
"4WS:thunderbird-0:1.5.0.12-39.el4.ppc",
"4WS:thunderbird-0:1.5.0.12-39.el4.s390",
"4WS:thunderbird-0:1.5.0.12-39.el4.s390x",
"4WS:thunderbird-0:1.5.0.12-39.el4.src",
"4WS:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"5Client:thunderbird-0:2.0.0.24-18.el5_6.i386",
"5Client:thunderbird-0:2.0.0.24-18.el5_6.src",
"5Client:thunderbird-0:2.0.0.24-18.el5_6.x86_64",
"5Client:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.i386",
"5Client:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.x86_64",
"5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.i386",
"5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.src",
"5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.x86_64",
"5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.i386",
"5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-2376"
},
{
"category": "external",
"summary": "RHBZ#714576",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=714576"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-2376",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2376"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-2376",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-2376"
}
],
"release_date": "2011-06-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-06-21T22:25:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"4AS:thunderbird-0:1.5.0.12-39.el4.i386",
"4AS:thunderbird-0:1.5.0.12-39.el4.ia64",
"4AS:thunderbird-0:1.5.0.12-39.el4.ppc",
"4AS:thunderbird-0:1.5.0.12-39.el4.s390",
"4AS:thunderbird-0:1.5.0.12-39.el4.s390x",
"4AS:thunderbird-0:1.5.0.12-39.el4.src",
"4AS:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.i386",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.ia64",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.ppc",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.s390",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.s390x",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.src",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"4ES:thunderbird-0:1.5.0.12-39.el4.i386",
"4ES:thunderbird-0:1.5.0.12-39.el4.ia64",
"4ES:thunderbird-0:1.5.0.12-39.el4.ppc",
"4ES:thunderbird-0:1.5.0.12-39.el4.s390",
"4ES:thunderbird-0:1.5.0.12-39.el4.s390x",
"4ES:thunderbird-0:1.5.0.12-39.el4.src",
"4ES:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"4WS:thunderbird-0:1.5.0.12-39.el4.i386",
"4WS:thunderbird-0:1.5.0.12-39.el4.ia64",
"4WS:thunderbird-0:1.5.0.12-39.el4.ppc",
"4WS:thunderbird-0:1.5.0.12-39.el4.s390",
"4WS:thunderbird-0:1.5.0.12-39.el4.s390x",
"4WS:thunderbird-0:1.5.0.12-39.el4.src",
"4WS:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"5Client:thunderbird-0:2.0.0.24-18.el5_6.i386",
"5Client:thunderbird-0:2.0.0.24-18.el5_6.src",
"5Client:thunderbird-0:2.0.0.24-18.el5_6.x86_64",
"5Client:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.i386",
"5Client:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.x86_64",
"5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.i386",
"5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.src",
"5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.x86_64",
"5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.i386",
"5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:0887"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS:thunderbird-0:1.5.0.12-39.el4.i386",
"4AS:thunderbird-0:1.5.0.12-39.el4.ia64",
"4AS:thunderbird-0:1.5.0.12-39.el4.ppc",
"4AS:thunderbird-0:1.5.0.12-39.el4.s390",
"4AS:thunderbird-0:1.5.0.12-39.el4.s390x",
"4AS:thunderbird-0:1.5.0.12-39.el4.src",
"4AS:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.i386",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.ia64",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.ppc",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.s390",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.s390x",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.src",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"4ES:thunderbird-0:1.5.0.12-39.el4.i386",
"4ES:thunderbird-0:1.5.0.12-39.el4.ia64",
"4ES:thunderbird-0:1.5.0.12-39.el4.ppc",
"4ES:thunderbird-0:1.5.0.12-39.el4.s390",
"4ES:thunderbird-0:1.5.0.12-39.el4.s390x",
"4ES:thunderbird-0:1.5.0.12-39.el4.src",
"4ES:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"4WS:thunderbird-0:1.5.0.12-39.el4.i386",
"4WS:thunderbird-0:1.5.0.12-39.el4.ia64",
"4WS:thunderbird-0:1.5.0.12-39.el4.ppc",
"4WS:thunderbird-0:1.5.0.12-39.el4.s390",
"4WS:thunderbird-0:1.5.0.12-39.el4.s390x",
"4WS:thunderbird-0:1.5.0.12-39.el4.src",
"4WS:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"5Client:thunderbird-0:2.0.0.24-18.el5_6.i386",
"5Client:thunderbird-0:2.0.0.24-18.el5_6.src",
"5Client:thunderbird-0:2.0.0.24-18.el5_6.x86_64",
"5Client:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.i386",
"5Client:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.x86_64",
"5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.i386",
"5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.src",
"5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.x86_64",
"5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.i386",
"5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "Mozilla Miscellaneous memory safety hazards (MFSA 2011-19)"
},
{
"cve": "CVE-2011-2377",
"discovery_date": "2011-06-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "714929"
}
],
"notes": [
{
"category": "description",
"text": "Mozilla Firefox before 3.6.18 and 4.x through 4.0.1, Thunderbird before 3.1.11, and SeaMonkey through 2.0.14 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via a multipart/x-mixed-replace image.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Mozilla Crash caused by corrupted JPEG image (MFSA 2011-21)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS:thunderbird-0:1.5.0.12-39.el4.i386",
"4AS:thunderbird-0:1.5.0.12-39.el4.ia64",
"4AS:thunderbird-0:1.5.0.12-39.el4.ppc",
"4AS:thunderbird-0:1.5.0.12-39.el4.s390",
"4AS:thunderbird-0:1.5.0.12-39.el4.s390x",
"4AS:thunderbird-0:1.5.0.12-39.el4.src",
"4AS:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.i386",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.ia64",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.ppc",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.s390",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.s390x",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.src",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"4ES:thunderbird-0:1.5.0.12-39.el4.i386",
"4ES:thunderbird-0:1.5.0.12-39.el4.ia64",
"4ES:thunderbird-0:1.5.0.12-39.el4.ppc",
"4ES:thunderbird-0:1.5.0.12-39.el4.s390",
"4ES:thunderbird-0:1.5.0.12-39.el4.s390x",
"4ES:thunderbird-0:1.5.0.12-39.el4.src",
"4ES:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"4WS:thunderbird-0:1.5.0.12-39.el4.i386",
"4WS:thunderbird-0:1.5.0.12-39.el4.ia64",
"4WS:thunderbird-0:1.5.0.12-39.el4.ppc",
"4WS:thunderbird-0:1.5.0.12-39.el4.s390",
"4WS:thunderbird-0:1.5.0.12-39.el4.s390x",
"4WS:thunderbird-0:1.5.0.12-39.el4.src",
"4WS:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"5Client:thunderbird-0:2.0.0.24-18.el5_6.i386",
"5Client:thunderbird-0:2.0.0.24-18.el5_6.src",
"5Client:thunderbird-0:2.0.0.24-18.el5_6.x86_64",
"5Client:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.i386",
"5Client:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.x86_64",
"5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.i386",
"5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.src",
"5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.x86_64",
"5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.i386",
"5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-2377"
},
{
"category": "external",
"summary": "RHBZ#714929",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=714929"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-2377",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2377"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-2377",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-2377"
}
],
"release_date": "2011-06-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-06-21T22:25:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"4AS:thunderbird-0:1.5.0.12-39.el4.i386",
"4AS:thunderbird-0:1.5.0.12-39.el4.ia64",
"4AS:thunderbird-0:1.5.0.12-39.el4.ppc",
"4AS:thunderbird-0:1.5.0.12-39.el4.s390",
"4AS:thunderbird-0:1.5.0.12-39.el4.s390x",
"4AS:thunderbird-0:1.5.0.12-39.el4.src",
"4AS:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.i386",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.ia64",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.ppc",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.s390",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.s390x",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.src",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"4ES:thunderbird-0:1.5.0.12-39.el4.i386",
"4ES:thunderbird-0:1.5.0.12-39.el4.ia64",
"4ES:thunderbird-0:1.5.0.12-39.el4.ppc",
"4ES:thunderbird-0:1.5.0.12-39.el4.s390",
"4ES:thunderbird-0:1.5.0.12-39.el4.s390x",
"4ES:thunderbird-0:1.5.0.12-39.el4.src",
"4ES:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"4WS:thunderbird-0:1.5.0.12-39.el4.i386",
"4WS:thunderbird-0:1.5.0.12-39.el4.ia64",
"4WS:thunderbird-0:1.5.0.12-39.el4.ppc",
"4WS:thunderbird-0:1.5.0.12-39.el4.s390",
"4WS:thunderbird-0:1.5.0.12-39.el4.s390x",
"4WS:thunderbird-0:1.5.0.12-39.el4.src",
"4WS:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"5Client:thunderbird-0:2.0.0.24-18.el5_6.i386",
"5Client:thunderbird-0:2.0.0.24-18.el5_6.src",
"5Client:thunderbird-0:2.0.0.24-18.el5_6.x86_64",
"5Client:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.i386",
"5Client:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.x86_64",
"5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.i386",
"5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.src",
"5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.x86_64",
"5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.i386",
"5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:0887"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS:thunderbird-0:1.5.0.12-39.el4.i386",
"4AS:thunderbird-0:1.5.0.12-39.el4.ia64",
"4AS:thunderbird-0:1.5.0.12-39.el4.ppc",
"4AS:thunderbird-0:1.5.0.12-39.el4.s390",
"4AS:thunderbird-0:1.5.0.12-39.el4.s390x",
"4AS:thunderbird-0:1.5.0.12-39.el4.src",
"4AS:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.i386",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.ia64",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.ppc",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.s390",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.s390x",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.src",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"4ES:thunderbird-0:1.5.0.12-39.el4.i386",
"4ES:thunderbird-0:1.5.0.12-39.el4.ia64",
"4ES:thunderbird-0:1.5.0.12-39.el4.ppc",
"4ES:thunderbird-0:1.5.0.12-39.el4.s390",
"4ES:thunderbird-0:1.5.0.12-39.el4.s390x",
"4ES:thunderbird-0:1.5.0.12-39.el4.src",
"4ES:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"4WS:thunderbird-0:1.5.0.12-39.el4.i386",
"4WS:thunderbird-0:1.5.0.12-39.el4.ia64",
"4WS:thunderbird-0:1.5.0.12-39.el4.ppc",
"4WS:thunderbird-0:1.5.0.12-39.el4.s390",
"4WS:thunderbird-0:1.5.0.12-39.el4.s390x",
"4WS:thunderbird-0:1.5.0.12-39.el4.src",
"4WS:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"5Client:thunderbird-0:2.0.0.24-18.el5_6.i386",
"5Client:thunderbird-0:2.0.0.24-18.el5_6.src",
"5Client:thunderbird-0:2.0.0.24-18.el5_6.x86_64",
"5Client:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.i386",
"5Client:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.x86_64",
"5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.i386",
"5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.src",
"5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.x86_64",
"5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.i386",
"5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "Mozilla Crash caused by corrupted JPEG image (MFSA 2011-21)"
},
{
"cve": "CVE-2011-2605",
"discovery_date": "2011-06-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "714576"
}
],
"notes": [
{
"category": "description",
"text": "CRLF injection vulnerability in the nsCookieService::SetCookieStringInternal function in netwerk/cookie/nsCookieService.cpp in Mozilla Firefox before 3.6.18 and 4.x through 4.0.1, and Thunderbird before 3.1.11, allows remote attackers to bypass intended access restrictions via a string containing a \\n (newline) character, which is not properly handled in a JavaScript \"document.cookie =\" expression, a different vulnerability than CVE-2011-2374.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Mozilla Miscellaneous memory safety hazards (MFSA 2011-19)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS:thunderbird-0:1.5.0.12-39.el4.i386",
"4AS:thunderbird-0:1.5.0.12-39.el4.ia64",
"4AS:thunderbird-0:1.5.0.12-39.el4.ppc",
"4AS:thunderbird-0:1.5.0.12-39.el4.s390",
"4AS:thunderbird-0:1.5.0.12-39.el4.s390x",
"4AS:thunderbird-0:1.5.0.12-39.el4.src",
"4AS:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.i386",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.ia64",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.ppc",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.s390",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.s390x",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.src",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"4ES:thunderbird-0:1.5.0.12-39.el4.i386",
"4ES:thunderbird-0:1.5.0.12-39.el4.ia64",
"4ES:thunderbird-0:1.5.0.12-39.el4.ppc",
"4ES:thunderbird-0:1.5.0.12-39.el4.s390",
"4ES:thunderbird-0:1.5.0.12-39.el4.s390x",
"4ES:thunderbird-0:1.5.0.12-39.el4.src",
"4ES:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"4WS:thunderbird-0:1.5.0.12-39.el4.i386",
"4WS:thunderbird-0:1.5.0.12-39.el4.ia64",
"4WS:thunderbird-0:1.5.0.12-39.el4.ppc",
"4WS:thunderbird-0:1.5.0.12-39.el4.s390",
"4WS:thunderbird-0:1.5.0.12-39.el4.s390x",
"4WS:thunderbird-0:1.5.0.12-39.el4.src",
"4WS:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"5Client:thunderbird-0:2.0.0.24-18.el5_6.i386",
"5Client:thunderbird-0:2.0.0.24-18.el5_6.src",
"5Client:thunderbird-0:2.0.0.24-18.el5_6.x86_64",
"5Client:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.i386",
"5Client:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.x86_64",
"5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.i386",
"5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.src",
"5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.x86_64",
"5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.i386",
"5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-2605"
},
{
"category": "external",
"summary": "RHBZ#714576",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=714576"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-2605",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2605"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-2605",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-2605"
}
],
"release_date": "2011-06-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-06-21T22:25:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"4AS:thunderbird-0:1.5.0.12-39.el4.i386",
"4AS:thunderbird-0:1.5.0.12-39.el4.ia64",
"4AS:thunderbird-0:1.5.0.12-39.el4.ppc",
"4AS:thunderbird-0:1.5.0.12-39.el4.s390",
"4AS:thunderbird-0:1.5.0.12-39.el4.s390x",
"4AS:thunderbird-0:1.5.0.12-39.el4.src",
"4AS:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.i386",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.ia64",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.ppc",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.s390",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.s390x",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.src",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"4ES:thunderbird-0:1.5.0.12-39.el4.i386",
"4ES:thunderbird-0:1.5.0.12-39.el4.ia64",
"4ES:thunderbird-0:1.5.0.12-39.el4.ppc",
"4ES:thunderbird-0:1.5.0.12-39.el4.s390",
"4ES:thunderbird-0:1.5.0.12-39.el4.s390x",
"4ES:thunderbird-0:1.5.0.12-39.el4.src",
"4ES:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"4WS:thunderbird-0:1.5.0.12-39.el4.i386",
"4WS:thunderbird-0:1.5.0.12-39.el4.ia64",
"4WS:thunderbird-0:1.5.0.12-39.el4.ppc",
"4WS:thunderbird-0:1.5.0.12-39.el4.s390",
"4WS:thunderbird-0:1.5.0.12-39.el4.s390x",
"4WS:thunderbird-0:1.5.0.12-39.el4.src",
"4WS:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"5Client:thunderbird-0:2.0.0.24-18.el5_6.i386",
"5Client:thunderbird-0:2.0.0.24-18.el5_6.src",
"5Client:thunderbird-0:2.0.0.24-18.el5_6.x86_64",
"5Client:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.i386",
"5Client:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.x86_64",
"5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.i386",
"5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.src",
"5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.x86_64",
"5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.i386",
"5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:0887"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS:thunderbird-0:1.5.0.12-39.el4.i386",
"4AS:thunderbird-0:1.5.0.12-39.el4.ia64",
"4AS:thunderbird-0:1.5.0.12-39.el4.ppc",
"4AS:thunderbird-0:1.5.0.12-39.el4.s390",
"4AS:thunderbird-0:1.5.0.12-39.el4.s390x",
"4AS:thunderbird-0:1.5.0.12-39.el4.src",
"4AS:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.i386",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.ia64",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.ppc",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.s390",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.s390x",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.src",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"4ES:thunderbird-0:1.5.0.12-39.el4.i386",
"4ES:thunderbird-0:1.5.0.12-39.el4.ia64",
"4ES:thunderbird-0:1.5.0.12-39.el4.ppc",
"4ES:thunderbird-0:1.5.0.12-39.el4.s390",
"4ES:thunderbird-0:1.5.0.12-39.el4.s390x",
"4ES:thunderbird-0:1.5.0.12-39.el4.src",
"4ES:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"4WS:thunderbird-0:1.5.0.12-39.el4.i386",
"4WS:thunderbird-0:1.5.0.12-39.el4.ia64",
"4WS:thunderbird-0:1.5.0.12-39.el4.ppc",
"4WS:thunderbird-0:1.5.0.12-39.el4.s390",
"4WS:thunderbird-0:1.5.0.12-39.el4.s390x",
"4WS:thunderbird-0:1.5.0.12-39.el4.src",
"4WS:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"5Client:thunderbird-0:2.0.0.24-18.el5_6.i386",
"5Client:thunderbird-0:2.0.0.24-18.el5_6.src",
"5Client:thunderbird-0:2.0.0.24-18.el5_6.x86_64",
"5Client:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.i386",
"5Client:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.x86_64",
"5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.i386",
"5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.src",
"5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.x86_64",
"5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.i386",
"5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "Mozilla Miscellaneous memory safety hazards (MFSA 2011-19)"
}
]
}
RHSA-2011:0888
Vulnerability from csaf_redhat - Published: 2011-06-21 22:42 - Updated: 2026-01-13 22:11Use-after-free vulnerability in the nsSVGPathSegList::ReplaceItem function in the implementation of SVG element lists in Mozilla Firefox before 3.6.18, Thunderbird before 3.1.11, and SeaMonkey through 2.0.14 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via vectors involving a user-supplied callback.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS:seamonkey-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-0:1.0.9-71.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-chat-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-chat-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-chat-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-chat-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-chat-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-chat-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-debuginfo-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-debuginfo-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-debuginfo-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-debuginfo-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-debuginfo-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-devel-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-devel-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-devel-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-devel-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-devel-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-devel-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-js-debugger-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-js-debugger-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-js-debugger-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-js-debugger-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-js-debugger-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-mail-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-mail-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-mail-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-mail-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-mail-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-mail-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-0:1.0.9-71.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-chat-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-chat-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-chat-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-chat-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-chat-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-chat-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-devel-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-devel-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-devel-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-devel-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-devel-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-devel-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-mail-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-mail-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-mail-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-mail-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-mail-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-mail-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-0:1.0.9-71.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-chat-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-chat-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-chat-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-chat-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-chat-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-chat-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-debuginfo-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-debuginfo-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-debuginfo-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-debuginfo-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-debuginfo-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-devel-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-devel-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-devel-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-devel-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-devel-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-devel-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-js-debugger-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-js-debugger-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-js-debugger-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-js-debugger-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-js-debugger-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-mail-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-mail-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-mail-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-mail-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-mail-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-mail-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-0:1.0.9-71.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-chat-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-chat-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-chat-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-chat-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-chat-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-chat-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-debuginfo-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-debuginfo-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-debuginfo-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-debuginfo-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-debuginfo-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-devel-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-devel-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-devel-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-devel-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-devel-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-devel-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-js-debugger-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-js-debugger-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-js-debugger-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-js-debugger-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-js-debugger-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-mail-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-mail-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-mail-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-mail-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-mail-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-mail-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
Use-after-free vulnerability in the nsXULCommandDispatcher function in Mozilla Firefox before 3.6.18, Thunderbird before 3.1.11, and SeaMonkey through 2.0.14 allows remote attackers to execute arbitrary code via a crafted XUL document that dequeues the current command updater.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS:seamonkey-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-0:1.0.9-71.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-chat-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-chat-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-chat-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-chat-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-chat-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-chat-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-debuginfo-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-debuginfo-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-debuginfo-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-debuginfo-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-debuginfo-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-devel-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-devel-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-devel-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-devel-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-devel-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-devel-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-js-debugger-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-js-debugger-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-js-debugger-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-js-debugger-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-js-debugger-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-mail-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-mail-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-mail-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-mail-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-mail-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-mail-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-0:1.0.9-71.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-chat-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-chat-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-chat-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-chat-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-chat-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-chat-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-devel-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-devel-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-devel-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-devel-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-devel-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-devel-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-mail-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-mail-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-mail-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-mail-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-mail-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-mail-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-0:1.0.9-71.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-chat-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-chat-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-chat-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-chat-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-chat-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-chat-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-debuginfo-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-debuginfo-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-debuginfo-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-debuginfo-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-debuginfo-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-devel-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-devel-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-devel-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-devel-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-devel-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-devel-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-js-debugger-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-js-debugger-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-js-debugger-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-js-debugger-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-js-debugger-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-mail-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-mail-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-mail-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-mail-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-mail-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-mail-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-0:1.0.9-71.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-chat-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-chat-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-chat-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-chat-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-chat-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-chat-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-debuginfo-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-debuginfo-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-debuginfo-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-debuginfo-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-debuginfo-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-devel-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-devel-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-devel-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-devel-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-devel-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-devel-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-js-debugger-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-js-debugger-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-js-debugger-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-js-debugger-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-js-debugger-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-mail-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-mail-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-mail-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-mail-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-mail-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-mail-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
Mozilla Firefox before 3.6.18, Thunderbird before 3.1.11, and SeaMonkey through 2.0.14 do not distinguish between cookies for two domain names that differ only in a trailing dot, which allows remote web servers to bypass the Same Origin Policy via Set-Cookie headers.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS:seamonkey-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-0:1.0.9-71.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-chat-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-chat-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-chat-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-chat-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-chat-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-chat-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-debuginfo-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-debuginfo-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-debuginfo-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-debuginfo-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-debuginfo-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-devel-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-devel-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-devel-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-devel-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-devel-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-devel-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-js-debugger-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-js-debugger-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-js-debugger-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-js-debugger-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-js-debugger-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-mail-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-mail-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-mail-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-mail-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-mail-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-mail-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-0:1.0.9-71.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-chat-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-chat-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-chat-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-chat-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-chat-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-chat-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-devel-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-devel-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-devel-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-devel-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-devel-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-devel-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-mail-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-mail-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-mail-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-mail-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-mail-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-mail-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-0:1.0.9-71.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-chat-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-chat-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-chat-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-chat-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-chat-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-chat-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-debuginfo-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-debuginfo-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-debuginfo-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-debuginfo-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-debuginfo-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-devel-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-devel-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-devel-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-devel-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-devel-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-devel-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-js-debugger-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-js-debugger-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-js-debugger-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-js-debugger-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-js-debugger-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-mail-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-mail-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-mail-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-mail-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-mail-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-mail-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-0:1.0.9-71.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-chat-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-chat-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-chat-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-chat-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-chat-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-chat-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-debuginfo-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-debuginfo-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-debuginfo-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-debuginfo-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-debuginfo-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-devel-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-devel-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-devel-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-devel-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-devel-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-devel-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-js-debugger-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-js-debugger-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-js-debugger-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-js-debugger-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-js-debugger-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-mail-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-mail-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-mail-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-mail-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-mail-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-mail-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
Use-after-free vulnerability in the nsSVGPointList::AppendElement function in the implementation of SVG element lists in Mozilla Firefox before 3.6.18, Thunderbird before 3.1.11, and SeaMonkey through 2.0.14 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via vectors involving a user-supplied callback.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS:seamonkey-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-0:1.0.9-71.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-chat-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-chat-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-chat-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-chat-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-chat-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-chat-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-debuginfo-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-debuginfo-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-debuginfo-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-debuginfo-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-debuginfo-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-devel-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-devel-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-devel-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-devel-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-devel-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-devel-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-js-debugger-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-js-debugger-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-js-debugger-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-js-debugger-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-js-debugger-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-mail-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-mail-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-mail-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-mail-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-mail-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-mail-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-0:1.0.9-71.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-chat-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-chat-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-chat-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-chat-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-chat-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-chat-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-devel-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-devel-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-devel-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-devel-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-devel-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-devel-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-mail-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-mail-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-mail-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-mail-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-mail-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-mail-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-0:1.0.9-71.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-chat-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-chat-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-chat-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-chat-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-chat-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-chat-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-debuginfo-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-debuginfo-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-debuginfo-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-debuginfo-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-debuginfo-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-devel-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-devel-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-devel-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-devel-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-devel-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-devel-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-js-debugger-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-js-debugger-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-js-debugger-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-js-debugger-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-js-debugger-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-mail-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-mail-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-mail-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-mail-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-mail-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-mail-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-0:1.0.9-71.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-chat-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-chat-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-chat-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-chat-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-chat-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-chat-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-debuginfo-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-debuginfo-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-debuginfo-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-debuginfo-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-debuginfo-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-devel-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-devel-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-devel-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-devel-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-devel-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-devel-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-js-debugger-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-js-debugger-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-js-debugger-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-js-debugger-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-js-debugger-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-mail-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-mail-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-mail-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-mail-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-mail-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-mail-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
Unspecified vulnerability in the browser engine in Mozilla Firefox 3.6.x before 3.6.18 and Thunderbird before 3.1.11 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors, a different vulnerability than CVE-2011-2365.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS:seamonkey-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-0:1.0.9-71.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-chat-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-chat-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-chat-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-chat-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-chat-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-chat-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-debuginfo-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-debuginfo-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-debuginfo-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-debuginfo-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-debuginfo-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-devel-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-devel-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-devel-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-devel-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-devel-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-devel-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-js-debugger-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-js-debugger-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-js-debugger-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-js-debugger-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-js-debugger-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-mail-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-mail-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-mail-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-mail-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-mail-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-mail-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-0:1.0.9-71.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-chat-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-chat-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-chat-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-chat-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-chat-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-chat-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-devel-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-devel-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-devel-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-devel-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-devel-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-devel-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-mail-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-mail-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-mail-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-mail-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-mail-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-mail-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-0:1.0.9-71.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-chat-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-chat-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-chat-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-chat-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-chat-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-chat-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-debuginfo-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-debuginfo-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-debuginfo-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-debuginfo-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-debuginfo-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-devel-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-devel-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-devel-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-devel-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-devel-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-devel-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-js-debugger-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-js-debugger-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-js-debugger-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-js-debugger-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-js-debugger-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-mail-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-mail-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-mail-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-mail-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-mail-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-mail-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-0:1.0.9-71.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-chat-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-chat-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-chat-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-chat-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-chat-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-chat-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-debuginfo-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-debuginfo-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-debuginfo-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-debuginfo-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-debuginfo-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-devel-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-devel-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-devel-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-devel-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-devel-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-devel-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-js-debugger-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-js-debugger-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-js-debugger-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-js-debugger-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-js-debugger-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-mail-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-mail-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-mail-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-mail-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-mail-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-mail-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
Unspecified vulnerability in the browser engine in Mozilla Firefox 3.6.x before 3.6.18 and Thunderbird before 3.1.11 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors, a different vulnerability than CVE-2011-2364.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS:seamonkey-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-0:1.0.9-71.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-chat-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-chat-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-chat-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-chat-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-chat-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-chat-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-debuginfo-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-debuginfo-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-debuginfo-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-debuginfo-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-debuginfo-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-devel-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-devel-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-devel-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-devel-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-devel-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-devel-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-js-debugger-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-js-debugger-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-js-debugger-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-js-debugger-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-js-debugger-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-mail-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-mail-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-mail-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-mail-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-mail-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-mail-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-0:1.0.9-71.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-chat-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-chat-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-chat-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-chat-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-chat-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-chat-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-devel-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-devel-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-devel-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-devel-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-devel-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-devel-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-mail-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-mail-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-mail-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-mail-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-mail-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-mail-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-0:1.0.9-71.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-chat-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-chat-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-chat-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-chat-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-chat-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-chat-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-debuginfo-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-debuginfo-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-debuginfo-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-debuginfo-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-debuginfo-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-devel-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-devel-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-devel-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-devel-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-devel-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-devel-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-js-debugger-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-js-debugger-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-js-debugger-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-js-debugger-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-js-debugger-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-mail-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-mail-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-mail-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-mail-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-mail-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-mail-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-0:1.0.9-71.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-chat-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-chat-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-chat-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-chat-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-chat-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-chat-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-debuginfo-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-debuginfo-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-debuginfo-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-debuginfo-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-debuginfo-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-devel-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-devel-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-devel-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-devel-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-devel-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-devel-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-js-debugger-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-js-debugger-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-js-debugger-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-js-debugger-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-js-debugger-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-mail-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-mail-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-mail-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-mail-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-mail-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-mail-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
Integer overflow in the Array.reduceRight method in Mozilla Firefox before 3.6.18 and 4.x through 4.0.1, Thunderbird before 3.1.11, and SeaMonkey through 2.0.14 allows remote attackers to execute arbitrary code via vectors involving a long JavaScript Array object.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS:seamonkey-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-0:1.0.9-71.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-chat-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-chat-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-chat-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-chat-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-chat-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-chat-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-debuginfo-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-debuginfo-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-debuginfo-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-debuginfo-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-debuginfo-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-devel-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-devel-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-devel-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-devel-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-devel-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-devel-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-js-debugger-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-js-debugger-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-js-debugger-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-js-debugger-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-js-debugger-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-mail-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-mail-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-mail-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-mail-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-mail-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-mail-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-0:1.0.9-71.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-chat-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-chat-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-chat-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-chat-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-chat-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-chat-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-devel-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-devel-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-devel-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-devel-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-devel-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-devel-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-mail-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-mail-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-mail-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-mail-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-mail-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-mail-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-0:1.0.9-71.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-chat-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-chat-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-chat-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-chat-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-chat-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-chat-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-debuginfo-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-debuginfo-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-debuginfo-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-debuginfo-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-debuginfo-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-devel-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-devel-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-devel-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-devel-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-devel-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-devel-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-js-debugger-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-js-debugger-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-js-debugger-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-js-debugger-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-js-debugger-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-mail-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-mail-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-mail-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-mail-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-mail-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-mail-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-0:1.0.9-71.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-chat-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-chat-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-chat-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-chat-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-chat-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-chat-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-debuginfo-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-debuginfo-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-debuginfo-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-debuginfo-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-debuginfo-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-devel-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-devel-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-devel-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-devel-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-devel-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-devel-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-js-debugger-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-js-debugger-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-js-debugger-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-js-debugger-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-js-debugger-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-mail-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-mail-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-mail-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-mail-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-mail-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-mail-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
Use-after-free vulnerability in Mozilla Firefox before 3.6.18 and 4.x through 4.0.1, Thunderbird before 3.1.11, and SeaMonkey through 2.0.14, when JavaScript is disabled, allows remote attackers to execute arbitrary code via a crafted XUL document.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS:seamonkey-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-0:1.0.9-71.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-chat-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-chat-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-chat-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-chat-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-chat-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-chat-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-debuginfo-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-debuginfo-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-debuginfo-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-debuginfo-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-debuginfo-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-devel-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-devel-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-devel-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-devel-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-devel-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-devel-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-js-debugger-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-js-debugger-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-js-debugger-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-js-debugger-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-js-debugger-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-mail-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-mail-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-mail-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-mail-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-mail-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-mail-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-0:1.0.9-71.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-chat-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-chat-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-chat-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-chat-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-chat-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-chat-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-devel-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-devel-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-devel-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-devel-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-devel-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-devel-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-mail-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-mail-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-mail-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-mail-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-mail-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-mail-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-0:1.0.9-71.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-chat-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-chat-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-chat-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-chat-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-chat-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-chat-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-debuginfo-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-debuginfo-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-debuginfo-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-debuginfo-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-debuginfo-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-devel-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-devel-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-devel-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-devel-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-devel-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-devel-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-js-debugger-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-js-debugger-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-js-debugger-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-js-debugger-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-js-debugger-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-mail-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-mail-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-mail-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-mail-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-mail-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-mail-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-0:1.0.9-71.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-chat-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-chat-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-chat-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-chat-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-chat-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-chat-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-debuginfo-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-debuginfo-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-debuginfo-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-debuginfo-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-debuginfo-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-devel-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-devel-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-devel-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-devel-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-devel-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-devel-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-js-debugger-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-js-debugger-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-js-debugger-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-js-debugger-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-js-debugger-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-mail-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-mail-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-mail-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-mail-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-mail-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-mail-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 3.6.18 and 4.x through 4.0.1, and Thunderbird before 3.1.11, allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS:seamonkey-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-0:1.0.9-71.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-chat-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-chat-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-chat-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-chat-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-chat-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-chat-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-debuginfo-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-debuginfo-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-debuginfo-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-debuginfo-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-debuginfo-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-devel-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-devel-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-devel-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-devel-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-devel-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-devel-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-js-debugger-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-js-debugger-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-js-debugger-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-js-debugger-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-js-debugger-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-mail-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-mail-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-mail-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-mail-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-mail-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-mail-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-0:1.0.9-71.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-chat-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-chat-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-chat-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-chat-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-chat-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-chat-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-devel-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-devel-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-devel-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-devel-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-devel-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-devel-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-mail-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-mail-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-mail-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-mail-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-mail-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-mail-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-0:1.0.9-71.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-chat-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-chat-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-chat-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-chat-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-chat-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-chat-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-debuginfo-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-debuginfo-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-debuginfo-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-debuginfo-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-debuginfo-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-devel-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-devel-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-devel-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-devel-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-devel-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-devel-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-js-debugger-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-js-debugger-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-js-debugger-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-js-debugger-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-js-debugger-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-mail-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-mail-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-mail-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-mail-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-mail-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-mail-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-0:1.0.9-71.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-chat-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-chat-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-chat-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-chat-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-chat-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-chat-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-debuginfo-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-debuginfo-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-debuginfo-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-debuginfo-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-debuginfo-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-devel-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-devel-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-devel-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-devel-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-devel-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-devel-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-js-debugger-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-js-debugger-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-js-debugger-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-js-debugger-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-js-debugger-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-mail-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-mail-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-mail-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-mail-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-mail-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-mail-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 5.0 and Thunderbird through 3.1.11 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS:seamonkey-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-0:1.0.9-71.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-chat-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-chat-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-chat-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-chat-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-chat-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-chat-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-debuginfo-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-debuginfo-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-debuginfo-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-debuginfo-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-debuginfo-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-devel-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-devel-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-devel-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-devel-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-devel-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-devel-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-js-debugger-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-js-debugger-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-js-debugger-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-js-debugger-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-js-debugger-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-mail-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-mail-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-mail-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-mail-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-mail-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-mail-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-0:1.0.9-71.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-chat-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-chat-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-chat-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-chat-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-chat-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-chat-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-devel-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-devel-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-devel-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-devel-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-devel-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-devel-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-mail-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-mail-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-mail-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-mail-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-mail-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-mail-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-0:1.0.9-71.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-chat-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-chat-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-chat-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-chat-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-chat-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-chat-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-debuginfo-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-debuginfo-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-debuginfo-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-debuginfo-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-debuginfo-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-devel-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-devel-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-devel-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-devel-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-devel-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-devel-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-js-debugger-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-js-debugger-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-js-debugger-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-js-debugger-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-js-debugger-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-mail-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-mail-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-mail-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-mail-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-mail-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-mail-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-0:1.0.9-71.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-chat-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-chat-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-chat-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-chat-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-chat-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-chat-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-debuginfo-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-debuginfo-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-debuginfo-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-debuginfo-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-debuginfo-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-devel-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-devel-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-devel-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-devel-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-devel-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-devel-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-js-debugger-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-js-debugger-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-js-debugger-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-js-debugger-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-js-debugger-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-mail-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-mail-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-mail-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-mail-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-mail-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-mail-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 3.6.18 and Thunderbird before 3.1.11 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS:seamonkey-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-0:1.0.9-71.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-chat-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-chat-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-chat-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-chat-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-chat-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-chat-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-debuginfo-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-debuginfo-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-debuginfo-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-debuginfo-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-debuginfo-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-devel-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-devel-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-devel-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-devel-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-devel-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-devel-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-js-debugger-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-js-debugger-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-js-debugger-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-js-debugger-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-js-debugger-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-mail-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-mail-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-mail-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-mail-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-mail-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-mail-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-0:1.0.9-71.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-chat-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-chat-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-chat-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-chat-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-chat-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-chat-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-devel-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-devel-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-devel-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-devel-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-devel-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-devel-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-mail-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-mail-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-mail-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-mail-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-mail-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-mail-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-0:1.0.9-71.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-chat-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-chat-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-chat-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-chat-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-chat-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-chat-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-debuginfo-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-debuginfo-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-debuginfo-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-debuginfo-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-debuginfo-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-devel-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-devel-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-devel-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-devel-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-devel-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-devel-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-js-debugger-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-js-debugger-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-js-debugger-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-js-debugger-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-js-debugger-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-mail-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-mail-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-mail-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-mail-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-mail-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-mail-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-0:1.0.9-71.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-chat-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-chat-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-chat-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-chat-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-chat-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-chat-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-debuginfo-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-debuginfo-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-debuginfo-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-debuginfo-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-debuginfo-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-devel-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-devel-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-devel-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-devel-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-devel-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-devel-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-js-debugger-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-js-debugger-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-js-debugger-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-js-debugger-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-js-debugger-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-mail-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-mail-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-mail-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-mail-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-mail-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-mail-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
Mozilla Firefox before 3.6.18 and 4.x through 4.0.1, Thunderbird before 3.1.11, and SeaMonkey through 2.0.14 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via a multipart/x-mixed-replace image.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS:seamonkey-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-0:1.0.9-71.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-chat-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-chat-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-chat-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-chat-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-chat-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-chat-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-debuginfo-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-debuginfo-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-debuginfo-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-debuginfo-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-debuginfo-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-devel-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-devel-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-devel-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-devel-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-devel-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-devel-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-js-debugger-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-js-debugger-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-js-debugger-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-js-debugger-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-js-debugger-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-mail-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-mail-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-mail-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-mail-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-mail-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-mail-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-0:1.0.9-71.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-chat-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-chat-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-chat-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-chat-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-chat-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-chat-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-devel-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-devel-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-devel-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-devel-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-devel-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-devel-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-mail-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-mail-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-mail-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-mail-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-mail-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-mail-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-0:1.0.9-71.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-chat-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-chat-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-chat-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-chat-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-chat-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-chat-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-debuginfo-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-debuginfo-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-debuginfo-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-debuginfo-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-debuginfo-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-devel-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-devel-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-devel-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-devel-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-devel-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-devel-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-js-debugger-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-js-debugger-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-js-debugger-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-js-debugger-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-js-debugger-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-mail-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-mail-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-mail-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-mail-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-mail-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-mail-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-0:1.0.9-71.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-chat-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-chat-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-chat-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-chat-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-chat-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-chat-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-debuginfo-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-debuginfo-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-debuginfo-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-debuginfo-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-debuginfo-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-devel-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-devel-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-devel-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-devel-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-devel-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-devel-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-js-debugger-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-js-debugger-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-js-debugger-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-js-debugger-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-js-debugger-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-mail-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-mail-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-mail-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-mail-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-mail-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-mail-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
CRLF injection vulnerability in the nsCookieService::SetCookieStringInternal function in netwerk/cookie/nsCookieService.cpp in Mozilla Firefox before 3.6.18 and 4.x through 4.0.1, and Thunderbird before 3.1.11, allows remote attackers to bypass intended access restrictions via a string containing a \n (newline) character, which is not properly handled in a JavaScript "document.cookie =" expression, a different vulnerability than CVE-2011-2374.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS:seamonkey-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-0:1.0.9-71.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-chat-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-chat-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-chat-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-chat-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-chat-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-chat-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-debuginfo-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-debuginfo-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-debuginfo-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-debuginfo-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-debuginfo-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-devel-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-devel-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-devel-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-devel-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-devel-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-devel-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-js-debugger-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-js-debugger-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-js-debugger-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-js-debugger-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-js-debugger-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-mail-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-mail-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-mail-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-mail-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-mail-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:seamonkey-mail-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-0:1.0.9-71.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-chat-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-chat-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-chat-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-chat-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-chat-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-chat-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-devel-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-devel-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-devel-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-devel-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-devel-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-devel-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-mail-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-mail-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-mail-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-mail-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-mail-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:seamonkey-mail-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-0:1.0.9-71.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-chat-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-chat-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-chat-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-chat-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-chat-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-chat-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-debuginfo-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-debuginfo-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-debuginfo-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-debuginfo-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-debuginfo-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-devel-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-devel-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-devel-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-devel-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-devel-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-devel-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-js-debugger-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-js-debugger-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-js-debugger-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-js-debugger-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-js-debugger-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-mail-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-mail-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-mail-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-mail-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-mail-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:seamonkey-mail-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-0:1.0.9-71.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-chat-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-chat-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-chat-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-chat-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-chat-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-chat-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-debuginfo-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-debuginfo-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-debuginfo-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-debuginfo-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-debuginfo-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-devel-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-devel-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-devel-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-devel-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-devel-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-devel-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-js-debugger-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-js-debugger-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-js-debugger-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-js-debugger-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-js-debugger-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-mail-0:1.0.9-71.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-mail-0:1.0.9-71.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-mail-0:1.0.9-71.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-mail-0:1.0.9-71.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-mail-0:1.0.9-71.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:seamonkey-mail-0:1.0.9-71.el4.x86_64 | — |
Vendor Fix
fix
|
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Critical"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated seamonkey packages that fix several security issues are now\navailable for Red Hat Enterprise Linux 4.\n\nThe Red Hat Security Response Team has rated this update as having critical\nsecurity impact. Common Vulnerability Scoring System (CVSS) base scores,\nwhich give detailed severity ratings, are available for each vulnerability\nfrom the CVE links in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "SeaMonkey is an open source web browser, email and newsgroup client, IRC\nchat client, and HTML editor.\n\nA flaw was found in the way SeaMonkey handled malformed JPEG images. A\nwebsite containing a malicious JPEG image could cause SeaMonkey to crash\nor, potentially, execute arbitrary code with the privileges of the user\nrunning SeaMonkey. (CVE-2011-2377)\n\nMultiple dangling pointer flaws were found in SeaMonkey. A web page\ncontaining malicious content could cause SeaMonkey to crash or,\npotentially, execute arbitrary code with the privileges of the user running\nSeaMonkey. (CVE-2011-0083, CVE-2011-0085, CVE-2011-2363)\n\nSeveral flaws were found in the processing of malformed web content. A web\npage containing malicious content could cause SeaMonkey to crash or,\npotentially, execute arbitrary code with the privileges of the user running\nSeaMonkey. (CVE-2011-2364, CVE-2011-2365, CVE-2011-2374, CVE-2011-2375,\nCVE-2011-2376)\n\nAn integer overflow flaw was found in the way SeaMonkey handled JavaScript\nArray objects. A website containing malicious JavaScript could cause\nSeaMonkey to execute that JavaScript with the privileges of the user\nrunning SeaMonkey. (CVE-2011-2371)\n\nA use-after-free flaw was found in the way SeaMonkey handled malformed\nJavaScript. A website containing malicious JavaScript could cause SeaMonkey\nto execute that JavaScript with the privileges of the user running\nSeaMonkey. (CVE-2011-2373)\n\nIt was found that SeaMonkey could treat two separate cookies as\ninterchangeable if both were for the same domain name but one of those\ndomain names had a trailing \".\" character. This violates the same-origin\npolicy and could possibly lead to data being leaked to the wrong domain.\n(CVE-2011-2362)\n\nAll SeaMonkey users should upgrade to these updated packages, which correct\nthese issues. After installing the update, SeaMonkey must be restarted for\nthe changes to take effect.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2011:0888",
"url": "https://access.redhat.com/errata/RHSA-2011:0888"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#critical",
"url": "https://access.redhat.com/security/updates/classification/#critical"
},
{
"category": "external",
"summary": "714576",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=714576"
},
{
"category": "external",
"summary": "714577",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=714577"
},
{
"category": "external",
"summary": "714580",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=714580"
},
{
"category": "external",
"summary": "714581",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=714581"
},
{
"category": "external",
"summary": "714583",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=714583"
},
{
"category": "external",
"summary": "714929",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=714929"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2011/rhsa-2011_0888.json"
}
],
"title": "Red Hat Security Advisory: seamonkey security update",
"tracking": {
"current_release_date": "2026-01-13T22:11:27+00:00",
"generator": {
"date": "2026-01-13T22:11:27+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.15"
}
},
"id": "RHSA-2011:0888",
"initial_release_date": "2011-06-21T22:42:00+00:00",
"revision_history": [
{
"date": "2011-06-21T22:42:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2011-06-21T18:50:01+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-01-13T22:11:27+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AS version 4",
"product": {
"name": "Red Hat Enterprise Linux AS version 4",
"product_id": "4AS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:4::as"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop version 4",
"product": {
"name": "Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:4::desktop"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ES version 4",
"product": {
"name": "Red Hat Enterprise Linux ES version 4",
"product_id": "4ES",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:4::es"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux WS version 4",
"product": {
"name": "Red Hat Enterprise Linux WS version 4",
"product_id": "4WS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:4::ws"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "seamonkey-mail-0:1.0.9-71.el4.ia64",
"product": {
"name": "seamonkey-mail-0:1.0.9-71.el4.ia64",
"product_id": "seamonkey-mail-0:1.0.9-71.el4.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-mail@1.0.9-71.el4?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "seamonkey-chat-0:1.0.9-71.el4.ia64",
"product": {
"name": "seamonkey-chat-0:1.0.9-71.el4.ia64",
"product_id": "seamonkey-chat-0:1.0.9-71.el4.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-chat@1.0.9-71.el4?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "seamonkey-devel-0:1.0.9-71.el4.ia64",
"product": {
"name": "seamonkey-devel-0:1.0.9-71.el4.ia64",
"product_id": "seamonkey-devel-0:1.0.9-71.el4.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-devel@1.0.9-71.el4?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "seamonkey-0:1.0.9-71.el4.ia64",
"product": {
"name": "seamonkey-0:1.0.9-71.el4.ia64",
"product_id": "seamonkey-0:1.0.9-71.el4.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey@1.0.9-71.el4?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"product": {
"name": "seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"product_id": "seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-js-debugger@1.0.9-71.el4?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"product": {
"name": "seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"product_id": "seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-dom-inspector@1.0.9-71.el4?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"product": {
"name": "seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"product_id": "seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-debuginfo@1.0.9-71.el4?arch=ia64"
}
}
}
],
"category": "architecture",
"name": "ia64"
},
{
"branches": [
{
"category": "product_version",
"name": "seamonkey-mail-0:1.0.9-71.el4.x86_64",
"product": {
"name": "seamonkey-mail-0:1.0.9-71.el4.x86_64",
"product_id": "seamonkey-mail-0:1.0.9-71.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-mail@1.0.9-71.el4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "seamonkey-chat-0:1.0.9-71.el4.x86_64",
"product": {
"name": "seamonkey-chat-0:1.0.9-71.el4.x86_64",
"product_id": "seamonkey-chat-0:1.0.9-71.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-chat@1.0.9-71.el4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "seamonkey-devel-0:1.0.9-71.el4.x86_64",
"product": {
"name": "seamonkey-devel-0:1.0.9-71.el4.x86_64",
"product_id": "seamonkey-devel-0:1.0.9-71.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-devel@1.0.9-71.el4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "seamonkey-0:1.0.9-71.el4.x86_64",
"product": {
"name": "seamonkey-0:1.0.9-71.el4.x86_64",
"product_id": "seamonkey-0:1.0.9-71.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey@1.0.9-71.el4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"product": {
"name": "seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"product_id": "seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-js-debugger@1.0.9-71.el4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"product": {
"name": "seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"product_id": "seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-dom-inspector@1.0.9-71.el4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"product": {
"name": "seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"product_id": "seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-debuginfo@1.0.9-71.el4?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "seamonkey-mail-0:1.0.9-71.el4.i386",
"product": {
"name": "seamonkey-mail-0:1.0.9-71.el4.i386",
"product_id": "seamonkey-mail-0:1.0.9-71.el4.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-mail@1.0.9-71.el4?arch=i386"
}
}
},
{
"category": "product_version",
"name": "seamonkey-chat-0:1.0.9-71.el4.i386",
"product": {
"name": "seamonkey-chat-0:1.0.9-71.el4.i386",
"product_id": "seamonkey-chat-0:1.0.9-71.el4.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-chat@1.0.9-71.el4?arch=i386"
}
}
},
{
"category": "product_version",
"name": "seamonkey-devel-0:1.0.9-71.el4.i386",
"product": {
"name": "seamonkey-devel-0:1.0.9-71.el4.i386",
"product_id": "seamonkey-devel-0:1.0.9-71.el4.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-devel@1.0.9-71.el4?arch=i386"
}
}
},
{
"category": "product_version",
"name": "seamonkey-0:1.0.9-71.el4.i386",
"product": {
"name": "seamonkey-0:1.0.9-71.el4.i386",
"product_id": "seamonkey-0:1.0.9-71.el4.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey@1.0.9-71.el4?arch=i386"
}
}
},
{
"category": "product_version",
"name": "seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"product": {
"name": "seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"product_id": "seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-js-debugger@1.0.9-71.el4?arch=i386"
}
}
},
{
"category": "product_version",
"name": "seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"product": {
"name": "seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"product_id": "seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-dom-inspector@1.0.9-71.el4?arch=i386"
}
}
},
{
"category": "product_version",
"name": "seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"product": {
"name": "seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"product_id": "seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-debuginfo@1.0.9-71.el4?arch=i386"
}
}
}
],
"category": "architecture",
"name": "i386"
},
{
"branches": [
{
"category": "product_version",
"name": "seamonkey-0:1.0.9-71.el4.src",
"product": {
"name": "seamonkey-0:1.0.9-71.el4.src",
"product_id": "seamonkey-0:1.0.9-71.el4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey@1.0.9-71.el4?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "seamonkey-mail-0:1.0.9-71.el4.ppc",
"product": {
"name": "seamonkey-mail-0:1.0.9-71.el4.ppc",
"product_id": "seamonkey-mail-0:1.0.9-71.el4.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-mail@1.0.9-71.el4?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "seamonkey-chat-0:1.0.9-71.el4.ppc",
"product": {
"name": "seamonkey-chat-0:1.0.9-71.el4.ppc",
"product_id": "seamonkey-chat-0:1.0.9-71.el4.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-chat@1.0.9-71.el4?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "seamonkey-devel-0:1.0.9-71.el4.ppc",
"product": {
"name": "seamonkey-devel-0:1.0.9-71.el4.ppc",
"product_id": "seamonkey-devel-0:1.0.9-71.el4.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-devel@1.0.9-71.el4?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "seamonkey-0:1.0.9-71.el4.ppc",
"product": {
"name": "seamonkey-0:1.0.9-71.el4.ppc",
"product_id": "seamonkey-0:1.0.9-71.el4.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey@1.0.9-71.el4?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"product": {
"name": "seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"product_id": "seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-js-debugger@1.0.9-71.el4?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"product": {
"name": "seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"product_id": "seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-dom-inspector@1.0.9-71.el4?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"product": {
"name": "seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"product_id": "seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-debuginfo@1.0.9-71.el4?arch=ppc"
}
}
}
],
"category": "architecture",
"name": "ppc"
},
{
"branches": [
{
"category": "product_version",
"name": "seamonkey-mail-0:1.0.9-71.el4.s390x",
"product": {
"name": "seamonkey-mail-0:1.0.9-71.el4.s390x",
"product_id": "seamonkey-mail-0:1.0.9-71.el4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-mail@1.0.9-71.el4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "seamonkey-chat-0:1.0.9-71.el4.s390x",
"product": {
"name": "seamonkey-chat-0:1.0.9-71.el4.s390x",
"product_id": "seamonkey-chat-0:1.0.9-71.el4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-chat@1.0.9-71.el4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "seamonkey-devel-0:1.0.9-71.el4.s390x",
"product": {
"name": "seamonkey-devel-0:1.0.9-71.el4.s390x",
"product_id": "seamonkey-devel-0:1.0.9-71.el4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-devel@1.0.9-71.el4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "seamonkey-0:1.0.9-71.el4.s390x",
"product": {
"name": "seamonkey-0:1.0.9-71.el4.s390x",
"product_id": "seamonkey-0:1.0.9-71.el4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey@1.0.9-71.el4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"product": {
"name": "seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"product_id": "seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-js-debugger@1.0.9-71.el4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"product": {
"name": "seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"product_id": "seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-dom-inspector@1.0.9-71.el4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"product": {
"name": "seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"product_id": "seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-debuginfo@1.0.9-71.el4?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "seamonkey-mail-0:1.0.9-71.el4.s390",
"product": {
"name": "seamonkey-mail-0:1.0.9-71.el4.s390",
"product_id": "seamonkey-mail-0:1.0.9-71.el4.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-mail@1.0.9-71.el4?arch=s390"
}
}
},
{
"category": "product_version",
"name": "seamonkey-chat-0:1.0.9-71.el4.s390",
"product": {
"name": "seamonkey-chat-0:1.0.9-71.el4.s390",
"product_id": "seamonkey-chat-0:1.0.9-71.el4.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-chat@1.0.9-71.el4?arch=s390"
}
}
},
{
"category": "product_version",
"name": "seamonkey-devel-0:1.0.9-71.el4.s390",
"product": {
"name": "seamonkey-devel-0:1.0.9-71.el4.s390",
"product_id": "seamonkey-devel-0:1.0.9-71.el4.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-devel@1.0.9-71.el4?arch=s390"
}
}
},
{
"category": "product_version",
"name": "seamonkey-0:1.0.9-71.el4.s390",
"product": {
"name": "seamonkey-0:1.0.9-71.el4.s390",
"product_id": "seamonkey-0:1.0.9-71.el4.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey@1.0.9-71.el4?arch=s390"
}
}
},
{
"category": "product_version",
"name": "seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"product": {
"name": "seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"product_id": "seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-js-debugger@1.0.9-71.el4?arch=s390"
}
}
},
{
"category": "product_version",
"name": "seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"product": {
"name": "seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"product_id": "seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-dom-inspector@1.0.9-71.el4?arch=s390"
}
}
},
{
"category": "product_version",
"name": "seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"product": {
"name": "seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"product_id": "seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-debuginfo@1.0.9-71.el4?arch=s390"
}
}
}
],
"category": "architecture",
"name": "s390"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-0:1.0.9-71.el4.i386 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:seamonkey-0:1.0.9-71.el4.i386"
},
"product_reference": "seamonkey-0:1.0.9-71.el4.i386",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-0:1.0.9-71.el4.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:seamonkey-0:1.0.9-71.el4.ia64"
},
"product_reference": "seamonkey-0:1.0.9-71.el4.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-0:1.0.9-71.el4.ppc as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:seamonkey-0:1.0.9-71.el4.ppc"
},
"product_reference": "seamonkey-0:1.0.9-71.el4.ppc",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-0:1.0.9-71.el4.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:seamonkey-0:1.0.9-71.el4.s390"
},
"product_reference": "seamonkey-0:1.0.9-71.el4.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-0:1.0.9-71.el4.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:seamonkey-0:1.0.9-71.el4.s390x"
},
"product_reference": "seamonkey-0:1.0.9-71.el4.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-0:1.0.9-71.el4.src as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:seamonkey-0:1.0.9-71.el4.src"
},
"product_reference": "seamonkey-0:1.0.9-71.el4.src",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-0:1.0.9-71.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:seamonkey-0:1.0.9-71.el4.x86_64"
},
"product_reference": "seamonkey-0:1.0.9-71.el4.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-chat-0:1.0.9-71.el4.i386 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:seamonkey-chat-0:1.0.9-71.el4.i386"
},
"product_reference": "seamonkey-chat-0:1.0.9-71.el4.i386",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-chat-0:1.0.9-71.el4.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:seamonkey-chat-0:1.0.9-71.el4.ia64"
},
"product_reference": "seamonkey-chat-0:1.0.9-71.el4.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-chat-0:1.0.9-71.el4.ppc as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:seamonkey-chat-0:1.0.9-71.el4.ppc"
},
"product_reference": "seamonkey-chat-0:1.0.9-71.el4.ppc",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-chat-0:1.0.9-71.el4.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:seamonkey-chat-0:1.0.9-71.el4.s390"
},
"product_reference": "seamonkey-chat-0:1.0.9-71.el4.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-chat-0:1.0.9-71.el4.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:seamonkey-chat-0:1.0.9-71.el4.s390x"
},
"product_reference": "seamonkey-chat-0:1.0.9-71.el4.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-chat-0:1.0.9-71.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:seamonkey-chat-0:1.0.9-71.el4.x86_64"
},
"product_reference": "seamonkey-chat-0:1.0.9-71.el4.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-debuginfo-0:1.0.9-71.el4.i386 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:seamonkey-debuginfo-0:1.0.9-71.el4.i386"
},
"product_reference": "seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-debuginfo-0:1.0.9-71.el4.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:seamonkey-debuginfo-0:1.0.9-71.el4.ia64"
},
"product_reference": "seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-debuginfo-0:1.0.9-71.el4.ppc as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:seamonkey-debuginfo-0:1.0.9-71.el4.ppc"
},
"product_reference": "seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-debuginfo-0:1.0.9-71.el4.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:seamonkey-debuginfo-0:1.0.9-71.el4.s390"
},
"product_reference": "seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-debuginfo-0:1.0.9-71.el4.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:seamonkey-debuginfo-0:1.0.9-71.el4.s390x"
},
"product_reference": "seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-debuginfo-0:1.0.9-71.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64"
},
"product_reference": "seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-devel-0:1.0.9-71.el4.i386 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:seamonkey-devel-0:1.0.9-71.el4.i386"
},
"product_reference": "seamonkey-devel-0:1.0.9-71.el4.i386",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-devel-0:1.0.9-71.el4.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:seamonkey-devel-0:1.0.9-71.el4.ia64"
},
"product_reference": "seamonkey-devel-0:1.0.9-71.el4.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-devel-0:1.0.9-71.el4.ppc as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:seamonkey-devel-0:1.0.9-71.el4.ppc"
},
"product_reference": "seamonkey-devel-0:1.0.9-71.el4.ppc",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-devel-0:1.0.9-71.el4.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:seamonkey-devel-0:1.0.9-71.el4.s390"
},
"product_reference": "seamonkey-devel-0:1.0.9-71.el4.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-devel-0:1.0.9-71.el4.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:seamonkey-devel-0:1.0.9-71.el4.s390x"
},
"product_reference": "seamonkey-devel-0:1.0.9-71.el4.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-devel-0:1.0.9-71.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:seamonkey-devel-0:1.0.9-71.el4.x86_64"
},
"product_reference": "seamonkey-devel-0:1.0.9-71.el4.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-dom-inspector-0:1.0.9-71.el4.i386 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.i386"
},
"product_reference": "seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-dom-inspector-0:1.0.9-71.el4.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64"
},
"product_reference": "seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-dom-inspector-0:1.0.9-71.el4.ppc as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc"
},
"product_reference": "seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-dom-inspector-0:1.0.9-71.el4.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390"
},
"product_reference": "seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-dom-inspector-0:1.0.9-71.el4.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x"
},
"product_reference": "seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64"
},
"product_reference": "seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-js-debugger-0:1.0.9-71.el4.i386 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:seamonkey-js-debugger-0:1.0.9-71.el4.i386"
},
"product_reference": "seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-js-debugger-0:1.0.9-71.el4.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:seamonkey-js-debugger-0:1.0.9-71.el4.ia64"
},
"product_reference": "seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-js-debugger-0:1.0.9-71.el4.ppc as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:seamonkey-js-debugger-0:1.0.9-71.el4.ppc"
},
"product_reference": "seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-js-debugger-0:1.0.9-71.el4.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:seamonkey-js-debugger-0:1.0.9-71.el4.s390"
},
"product_reference": "seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-js-debugger-0:1.0.9-71.el4.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:seamonkey-js-debugger-0:1.0.9-71.el4.s390x"
},
"product_reference": "seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-js-debugger-0:1.0.9-71.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64"
},
"product_reference": "seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-mail-0:1.0.9-71.el4.i386 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:seamonkey-mail-0:1.0.9-71.el4.i386"
},
"product_reference": "seamonkey-mail-0:1.0.9-71.el4.i386",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-mail-0:1.0.9-71.el4.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:seamonkey-mail-0:1.0.9-71.el4.ia64"
},
"product_reference": "seamonkey-mail-0:1.0.9-71.el4.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-mail-0:1.0.9-71.el4.ppc as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:seamonkey-mail-0:1.0.9-71.el4.ppc"
},
"product_reference": "seamonkey-mail-0:1.0.9-71.el4.ppc",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-mail-0:1.0.9-71.el4.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:seamonkey-mail-0:1.0.9-71.el4.s390"
},
"product_reference": "seamonkey-mail-0:1.0.9-71.el4.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-mail-0:1.0.9-71.el4.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:seamonkey-mail-0:1.0.9-71.el4.s390x"
},
"product_reference": "seamonkey-mail-0:1.0.9-71.el4.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-mail-0:1.0.9-71.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:seamonkey-mail-0:1.0.9-71.el4.x86_64"
},
"product_reference": "seamonkey-mail-0:1.0.9-71.el4.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-0:1.0.9-71.el4.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:seamonkey-0:1.0.9-71.el4.i386"
},
"product_reference": "seamonkey-0:1.0.9-71.el4.i386",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-0:1.0.9-71.el4.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:seamonkey-0:1.0.9-71.el4.ia64"
},
"product_reference": "seamonkey-0:1.0.9-71.el4.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-0:1.0.9-71.el4.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:seamonkey-0:1.0.9-71.el4.ppc"
},
"product_reference": "seamonkey-0:1.0.9-71.el4.ppc",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-0:1.0.9-71.el4.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:seamonkey-0:1.0.9-71.el4.s390"
},
"product_reference": "seamonkey-0:1.0.9-71.el4.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-0:1.0.9-71.el4.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:seamonkey-0:1.0.9-71.el4.s390x"
},
"product_reference": "seamonkey-0:1.0.9-71.el4.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-0:1.0.9-71.el4.src as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:seamonkey-0:1.0.9-71.el4.src"
},
"product_reference": "seamonkey-0:1.0.9-71.el4.src",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-0:1.0.9-71.el4.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:seamonkey-0:1.0.9-71.el4.x86_64"
},
"product_reference": "seamonkey-0:1.0.9-71.el4.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-chat-0:1.0.9-71.el4.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:seamonkey-chat-0:1.0.9-71.el4.i386"
},
"product_reference": "seamonkey-chat-0:1.0.9-71.el4.i386",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-chat-0:1.0.9-71.el4.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:seamonkey-chat-0:1.0.9-71.el4.ia64"
},
"product_reference": "seamonkey-chat-0:1.0.9-71.el4.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-chat-0:1.0.9-71.el4.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:seamonkey-chat-0:1.0.9-71.el4.ppc"
},
"product_reference": "seamonkey-chat-0:1.0.9-71.el4.ppc",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-chat-0:1.0.9-71.el4.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:seamonkey-chat-0:1.0.9-71.el4.s390"
},
"product_reference": "seamonkey-chat-0:1.0.9-71.el4.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-chat-0:1.0.9-71.el4.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:seamonkey-chat-0:1.0.9-71.el4.s390x"
},
"product_reference": "seamonkey-chat-0:1.0.9-71.el4.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-chat-0:1.0.9-71.el4.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:seamonkey-chat-0:1.0.9-71.el4.x86_64"
},
"product_reference": "seamonkey-chat-0:1.0.9-71.el4.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-debuginfo-0:1.0.9-71.el4.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.i386"
},
"product_reference": "seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-debuginfo-0:1.0.9-71.el4.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.ia64"
},
"product_reference": "seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-debuginfo-0:1.0.9-71.el4.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.ppc"
},
"product_reference": "seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-debuginfo-0:1.0.9-71.el4.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.s390"
},
"product_reference": "seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-debuginfo-0:1.0.9-71.el4.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.s390x"
},
"product_reference": "seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-debuginfo-0:1.0.9-71.el4.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64"
},
"product_reference": "seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-devel-0:1.0.9-71.el4.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:seamonkey-devel-0:1.0.9-71.el4.i386"
},
"product_reference": "seamonkey-devel-0:1.0.9-71.el4.i386",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-devel-0:1.0.9-71.el4.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:seamonkey-devel-0:1.0.9-71.el4.ia64"
},
"product_reference": "seamonkey-devel-0:1.0.9-71.el4.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-devel-0:1.0.9-71.el4.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:seamonkey-devel-0:1.0.9-71.el4.ppc"
},
"product_reference": "seamonkey-devel-0:1.0.9-71.el4.ppc",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-devel-0:1.0.9-71.el4.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:seamonkey-devel-0:1.0.9-71.el4.s390"
},
"product_reference": "seamonkey-devel-0:1.0.9-71.el4.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-devel-0:1.0.9-71.el4.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:seamonkey-devel-0:1.0.9-71.el4.s390x"
},
"product_reference": "seamonkey-devel-0:1.0.9-71.el4.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-devel-0:1.0.9-71.el4.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:seamonkey-devel-0:1.0.9-71.el4.x86_64"
},
"product_reference": "seamonkey-devel-0:1.0.9-71.el4.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-dom-inspector-0:1.0.9-71.el4.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.i386"
},
"product_reference": "seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-dom-inspector-0:1.0.9-71.el4.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64"
},
"product_reference": "seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-dom-inspector-0:1.0.9-71.el4.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc"
},
"product_reference": "seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-dom-inspector-0:1.0.9-71.el4.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.s390"
},
"product_reference": "seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-dom-inspector-0:1.0.9-71.el4.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x"
},
"product_reference": "seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64"
},
"product_reference": "seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-js-debugger-0:1.0.9-71.el4.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.i386"
},
"product_reference": "seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-js-debugger-0:1.0.9-71.el4.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.ia64"
},
"product_reference": "seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-js-debugger-0:1.0.9-71.el4.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.ppc"
},
"product_reference": "seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-js-debugger-0:1.0.9-71.el4.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.s390"
},
"product_reference": "seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-js-debugger-0:1.0.9-71.el4.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.s390x"
},
"product_reference": "seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-js-debugger-0:1.0.9-71.el4.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64"
},
"product_reference": "seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-mail-0:1.0.9-71.el4.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:seamonkey-mail-0:1.0.9-71.el4.i386"
},
"product_reference": "seamonkey-mail-0:1.0.9-71.el4.i386",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-mail-0:1.0.9-71.el4.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:seamonkey-mail-0:1.0.9-71.el4.ia64"
},
"product_reference": "seamonkey-mail-0:1.0.9-71.el4.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-mail-0:1.0.9-71.el4.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:seamonkey-mail-0:1.0.9-71.el4.ppc"
},
"product_reference": "seamonkey-mail-0:1.0.9-71.el4.ppc",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-mail-0:1.0.9-71.el4.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:seamonkey-mail-0:1.0.9-71.el4.s390"
},
"product_reference": "seamonkey-mail-0:1.0.9-71.el4.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-mail-0:1.0.9-71.el4.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:seamonkey-mail-0:1.0.9-71.el4.s390x"
},
"product_reference": "seamonkey-mail-0:1.0.9-71.el4.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-mail-0:1.0.9-71.el4.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:seamonkey-mail-0:1.0.9-71.el4.x86_64"
},
"product_reference": "seamonkey-mail-0:1.0.9-71.el4.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-0:1.0.9-71.el4.i386 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:seamonkey-0:1.0.9-71.el4.i386"
},
"product_reference": "seamonkey-0:1.0.9-71.el4.i386",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-0:1.0.9-71.el4.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:seamonkey-0:1.0.9-71.el4.ia64"
},
"product_reference": "seamonkey-0:1.0.9-71.el4.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-0:1.0.9-71.el4.ppc as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:seamonkey-0:1.0.9-71.el4.ppc"
},
"product_reference": "seamonkey-0:1.0.9-71.el4.ppc",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-0:1.0.9-71.el4.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:seamonkey-0:1.0.9-71.el4.s390"
},
"product_reference": "seamonkey-0:1.0.9-71.el4.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-0:1.0.9-71.el4.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:seamonkey-0:1.0.9-71.el4.s390x"
},
"product_reference": "seamonkey-0:1.0.9-71.el4.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-0:1.0.9-71.el4.src as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:seamonkey-0:1.0.9-71.el4.src"
},
"product_reference": "seamonkey-0:1.0.9-71.el4.src",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-0:1.0.9-71.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:seamonkey-0:1.0.9-71.el4.x86_64"
},
"product_reference": "seamonkey-0:1.0.9-71.el4.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-chat-0:1.0.9-71.el4.i386 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:seamonkey-chat-0:1.0.9-71.el4.i386"
},
"product_reference": "seamonkey-chat-0:1.0.9-71.el4.i386",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-chat-0:1.0.9-71.el4.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:seamonkey-chat-0:1.0.9-71.el4.ia64"
},
"product_reference": "seamonkey-chat-0:1.0.9-71.el4.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-chat-0:1.0.9-71.el4.ppc as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:seamonkey-chat-0:1.0.9-71.el4.ppc"
},
"product_reference": "seamonkey-chat-0:1.0.9-71.el4.ppc",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-chat-0:1.0.9-71.el4.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:seamonkey-chat-0:1.0.9-71.el4.s390"
},
"product_reference": "seamonkey-chat-0:1.0.9-71.el4.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-chat-0:1.0.9-71.el4.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:seamonkey-chat-0:1.0.9-71.el4.s390x"
},
"product_reference": "seamonkey-chat-0:1.0.9-71.el4.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-chat-0:1.0.9-71.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:seamonkey-chat-0:1.0.9-71.el4.x86_64"
},
"product_reference": "seamonkey-chat-0:1.0.9-71.el4.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-debuginfo-0:1.0.9-71.el4.i386 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:seamonkey-debuginfo-0:1.0.9-71.el4.i386"
},
"product_reference": "seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-debuginfo-0:1.0.9-71.el4.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:seamonkey-debuginfo-0:1.0.9-71.el4.ia64"
},
"product_reference": "seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-debuginfo-0:1.0.9-71.el4.ppc as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:seamonkey-debuginfo-0:1.0.9-71.el4.ppc"
},
"product_reference": "seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-debuginfo-0:1.0.9-71.el4.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:seamonkey-debuginfo-0:1.0.9-71.el4.s390"
},
"product_reference": "seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-debuginfo-0:1.0.9-71.el4.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:seamonkey-debuginfo-0:1.0.9-71.el4.s390x"
},
"product_reference": "seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-debuginfo-0:1.0.9-71.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64"
},
"product_reference": "seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-devel-0:1.0.9-71.el4.i386 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:seamonkey-devel-0:1.0.9-71.el4.i386"
},
"product_reference": "seamonkey-devel-0:1.0.9-71.el4.i386",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-devel-0:1.0.9-71.el4.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:seamonkey-devel-0:1.0.9-71.el4.ia64"
},
"product_reference": "seamonkey-devel-0:1.0.9-71.el4.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-devel-0:1.0.9-71.el4.ppc as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:seamonkey-devel-0:1.0.9-71.el4.ppc"
},
"product_reference": "seamonkey-devel-0:1.0.9-71.el4.ppc",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-devel-0:1.0.9-71.el4.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:seamonkey-devel-0:1.0.9-71.el4.s390"
},
"product_reference": "seamonkey-devel-0:1.0.9-71.el4.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-devel-0:1.0.9-71.el4.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:seamonkey-devel-0:1.0.9-71.el4.s390x"
},
"product_reference": "seamonkey-devel-0:1.0.9-71.el4.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-devel-0:1.0.9-71.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:seamonkey-devel-0:1.0.9-71.el4.x86_64"
},
"product_reference": "seamonkey-devel-0:1.0.9-71.el4.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-dom-inspector-0:1.0.9-71.el4.i386 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.i386"
},
"product_reference": "seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-dom-inspector-0:1.0.9-71.el4.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64"
},
"product_reference": "seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-dom-inspector-0:1.0.9-71.el4.ppc as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc"
},
"product_reference": "seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-dom-inspector-0:1.0.9-71.el4.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.s390"
},
"product_reference": "seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-dom-inspector-0:1.0.9-71.el4.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x"
},
"product_reference": "seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64"
},
"product_reference": "seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-js-debugger-0:1.0.9-71.el4.i386 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:seamonkey-js-debugger-0:1.0.9-71.el4.i386"
},
"product_reference": "seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-js-debugger-0:1.0.9-71.el4.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:seamonkey-js-debugger-0:1.0.9-71.el4.ia64"
},
"product_reference": "seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-js-debugger-0:1.0.9-71.el4.ppc as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:seamonkey-js-debugger-0:1.0.9-71.el4.ppc"
},
"product_reference": "seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-js-debugger-0:1.0.9-71.el4.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:seamonkey-js-debugger-0:1.0.9-71.el4.s390"
},
"product_reference": "seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-js-debugger-0:1.0.9-71.el4.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:seamonkey-js-debugger-0:1.0.9-71.el4.s390x"
},
"product_reference": "seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-js-debugger-0:1.0.9-71.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64"
},
"product_reference": "seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-mail-0:1.0.9-71.el4.i386 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:seamonkey-mail-0:1.0.9-71.el4.i386"
},
"product_reference": "seamonkey-mail-0:1.0.9-71.el4.i386",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-mail-0:1.0.9-71.el4.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:seamonkey-mail-0:1.0.9-71.el4.ia64"
},
"product_reference": "seamonkey-mail-0:1.0.9-71.el4.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-mail-0:1.0.9-71.el4.ppc as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:seamonkey-mail-0:1.0.9-71.el4.ppc"
},
"product_reference": "seamonkey-mail-0:1.0.9-71.el4.ppc",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-mail-0:1.0.9-71.el4.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:seamonkey-mail-0:1.0.9-71.el4.s390"
},
"product_reference": "seamonkey-mail-0:1.0.9-71.el4.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-mail-0:1.0.9-71.el4.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:seamonkey-mail-0:1.0.9-71.el4.s390x"
},
"product_reference": "seamonkey-mail-0:1.0.9-71.el4.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-mail-0:1.0.9-71.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:seamonkey-mail-0:1.0.9-71.el4.x86_64"
},
"product_reference": "seamonkey-mail-0:1.0.9-71.el4.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-0:1.0.9-71.el4.i386 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:seamonkey-0:1.0.9-71.el4.i386"
},
"product_reference": "seamonkey-0:1.0.9-71.el4.i386",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-0:1.0.9-71.el4.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:seamonkey-0:1.0.9-71.el4.ia64"
},
"product_reference": "seamonkey-0:1.0.9-71.el4.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-0:1.0.9-71.el4.ppc as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:seamonkey-0:1.0.9-71.el4.ppc"
},
"product_reference": "seamonkey-0:1.0.9-71.el4.ppc",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-0:1.0.9-71.el4.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:seamonkey-0:1.0.9-71.el4.s390"
},
"product_reference": "seamonkey-0:1.0.9-71.el4.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-0:1.0.9-71.el4.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:seamonkey-0:1.0.9-71.el4.s390x"
},
"product_reference": "seamonkey-0:1.0.9-71.el4.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-0:1.0.9-71.el4.src as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:seamonkey-0:1.0.9-71.el4.src"
},
"product_reference": "seamonkey-0:1.0.9-71.el4.src",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-0:1.0.9-71.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:seamonkey-0:1.0.9-71.el4.x86_64"
},
"product_reference": "seamonkey-0:1.0.9-71.el4.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-chat-0:1.0.9-71.el4.i386 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:seamonkey-chat-0:1.0.9-71.el4.i386"
},
"product_reference": "seamonkey-chat-0:1.0.9-71.el4.i386",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-chat-0:1.0.9-71.el4.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:seamonkey-chat-0:1.0.9-71.el4.ia64"
},
"product_reference": "seamonkey-chat-0:1.0.9-71.el4.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-chat-0:1.0.9-71.el4.ppc as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:seamonkey-chat-0:1.0.9-71.el4.ppc"
},
"product_reference": "seamonkey-chat-0:1.0.9-71.el4.ppc",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-chat-0:1.0.9-71.el4.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:seamonkey-chat-0:1.0.9-71.el4.s390"
},
"product_reference": "seamonkey-chat-0:1.0.9-71.el4.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-chat-0:1.0.9-71.el4.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:seamonkey-chat-0:1.0.9-71.el4.s390x"
},
"product_reference": "seamonkey-chat-0:1.0.9-71.el4.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-chat-0:1.0.9-71.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:seamonkey-chat-0:1.0.9-71.el4.x86_64"
},
"product_reference": "seamonkey-chat-0:1.0.9-71.el4.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-debuginfo-0:1.0.9-71.el4.i386 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:seamonkey-debuginfo-0:1.0.9-71.el4.i386"
},
"product_reference": "seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-debuginfo-0:1.0.9-71.el4.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:seamonkey-debuginfo-0:1.0.9-71.el4.ia64"
},
"product_reference": "seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-debuginfo-0:1.0.9-71.el4.ppc as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:seamonkey-debuginfo-0:1.0.9-71.el4.ppc"
},
"product_reference": "seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-debuginfo-0:1.0.9-71.el4.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:seamonkey-debuginfo-0:1.0.9-71.el4.s390"
},
"product_reference": "seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-debuginfo-0:1.0.9-71.el4.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:seamonkey-debuginfo-0:1.0.9-71.el4.s390x"
},
"product_reference": "seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-debuginfo-0:1.0.9-71.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64"
},
"product_reference": "seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-devel-0:1.0.9-71.el4.i386 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:seamonkey-devel-0:1.0.9-71.el4.i386"
},
"product_reference": "seamonkey-devel-0:1.0.9-71.el4.i386",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-devel-0:1.0.9-71.el4.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:seamonkey-devel-0:1.0.9-71.el4.ia64"
},
"product_reference": "seamonkey-devel-0:1.0.9-71.el4.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-devel-0:1.0.9-71.el4.ppc as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:seamonkey-devel-0:1.0.9-71.el4.ppc"
},
"product_reference": "seamonkey-devel-0:1.0.9-71.el4.ppc",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-devel-0:1.0.9-71.el4.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:seamonkey-devel-0:1.0.9-71.el4.s390"
},
"product_reference": "seamonkey-devel-0:1.0.9-71.el4.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-devel-0:1.0.9-71.el4.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:seamonkey-devel-0:1.0.9-71.el4.s390x"
},
"product_reference": "seamonkey-devel-0:1.0.9-71.el4.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-devel-0:1.0.9-71.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:seamonkey-devel-0:1.0.9-71.el4.x86_64"
},
"product_reference": "seamonkey-devel-0:1.0.9-71.el4.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-dom-inspector-0:1.0.9-71.el4.i386 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.i386"
},
"product_reference": "seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-dom-inspector-0:1.0.9-71.el4.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64"
},
"product_reference": "seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-dom-inspector-0:1.0.9-71.el4.ppc as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc"
},
"product_reference": "seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-dom-inspector-0:1.0.9-71.el4.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390"
},
"product_reference": "seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-dom-inspector-0:1.0.9-71.el4.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x"
},
"product_reference": "seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64"
},
"product_reference": "seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-js-debugger-0:1.0.9-71.el4.i386 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:seamonkey-js-debugger-0:1.0.9-71.el4.i386"
},
"product_reference": "seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-js-debugger-0:1.0.9-71.el4.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:seamonkey-js-debugger-0:1.0.9-71.el4.ia64"
},
"product_reference": "seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-js-debugger-0:1.0.9-71.el4.ppc as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:seamonkey-js-debugger-0:1.0.9-71.el4.ppc"
},
"product_reference": "seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-js-debugger-0:1.0.9-71.el4.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:seamonkey-js-debugger-0:1.0.9-71.el4.s390"
},
"product_reference": "seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-js-debugger-0:1.0.9-71.el4.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:seamonkey-js-debugger-0:1.0.9-71.el4.s390x"
},
"product_reference": "seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-js-debugger-0:1.0.9-71.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64"
},
"product_reference": "seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-mail-0:1.0.9-71.el4.i386 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:seamonkey-mail-0:1.0.9-71.el4.i386"
},
"product_reference": "seamonkey-mail-0:1.0.9-71.el4.i386",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-mail-0:1.0.9-71.el4.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:seamonkey-mail-0:1.0.9-71.el4.ia64"
},
"product_reference": "seamonkey-mail-0:1.0.9-71.el4.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-mail-0:1.0.9-71.el4.ppc as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:seamonkey-mail-0:1.0.9-71.el4.ppc"
},
"product_reference": "seamonkey-mail-0:1.0.9-71.el4.ppc",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-mail-0:1.0.9-71.el4.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:seamonkey-mail-0:1.0.9-71.el4.s390"
},
"product_reference": "seamonkey-mail-0:1.0.9-71.el4.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-mail-0:1.0.9-71.el4.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:seamonkey-mail-0:1.0.9-71.el4.s390x"
},
"product_reference": "seamonkey-mail-0:1.0.9-71.el4.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-mail-0:1.0.9-71.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:seamonkey-mail-0:1.0.9-71.el4.x86_64"
},
"product_reference": "seamonkey-mail-0:1.0.9-71.el4.x86_64",
"relates_to_product_reference": "4WS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2011-0083",
"discovery_date": "2011-06-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "714581"
}
],
"notes": [
{
"category": "description",
"text": "Use-after-free vulnerability in the nsSVGPathSegList::ReplaceItem function in the implementation of SVG element lists in Mozilla Firefox before 3.6.18, Thunderbird before 3.1.11, and SeaMonkey through 2.0.14 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via vectors involving a user-supplied callback.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Mozilla Multiple dangling pointer vulnerabilities (MFSA 2011-23)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS:seamonkey-0:1.0.9-71.el4.i386",
"4AS:seamonkey-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-0:1.0.9-71.el4.s390",
"4AS:seamonkey-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-0:1.0.9-71.el4.src",
"4AS:seamonkey-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-chat-0:1.0.9-71.el4.i386",
"4AS:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-chat-0:1.0.9-71.el4.s390",
"4AS:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-devel-0:1.0.9-71.el4.i386",
"4AS:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-devel-0:1.0.9-71.el4.s390",
"4AS:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-mail-0:1.0.9-71.el4.i386",
"4AS:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-mail-0:1.0.9-71.el4.s390",
"4AS:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-mail-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-0:1.0.9-71.el4.src",
"4Desktop:seamonkey-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-0:1.0.9-71.el4.i386",
"4ES:seamonkey-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-0:1.0.9-71.el4.s390",
"4ES:seamonkey-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-0:1.0.9-71.el4.src",
"4ES:seamonkey-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-chat-0:1.0.9-71.el4.i386",
"4ES:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-chat-0:1.0.9-71.el4.s390",
"4ES:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-devel-0:1.0.9-71.el4.i386",
"4ES:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-devel-0:1.0.9-71.el4.s390",
"4ES:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-mail-0:1.0.9-71.el4.i386",
"4ES:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-mail-0:1.0.9-71.el4.s390",
"4ES:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-mail-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-0:1.0.9-71.el4.i386",
"4WS:seamonkey-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-0:1.0.9-71.el4.s390",
"4WS:seamonkey-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-0:1.0.9-71.el4.src",
"4WS:seamonkey-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-chat-0:1.0.9-71.el4.i386",
"4WS:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-chat-0:1.0.9-71.el4.s390",
"4WS:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-devel-0:1.0.9-71.el4.i386",
"4WS:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-devel-0:1.0.9-71.el4.s390",
"4WS:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-mail-0:1.0.9-71.el4.i386",
"4WS:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-mail-0:1.0.9-71.el4.s390",
"4WS:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-mail-0:1.0.9-71.el4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-0083"
},
{
"category": "external",
"summary": "RHBZ#714581",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=714581"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-0083",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0083"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-0083",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-0083"
}
],
"release_date": "2011-06-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-06-21T22:42:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"4AS:seamonkey-0:1.0.9-71.el4.i386",
"4AS:seamonkey-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-0:1.0.9-71.el4.s390",
"4AS:seamonkey-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-0:1.0.9-71.el4.src",
"4AS:seamonkey-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-chat-0:1.0.9-71.el4.i386",
"4AS:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-chat-0:1.0.9-71.el4.s390",
"4AS:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-devel-0:1.0.9-71.el4.i386",
"4AS:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-devel-0:1.0.9-71.el4.s390",
"4AS:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-mail-0:1.0.9-71.el4.i386",
"4AS:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-mail-0:1.0.9-71.el4.s390",
"4AS:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-mail-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-0:1.0.9-71.el4.src",
"4Desktop:seamonkey-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-0:1.0.9-71.el4.i386",
"4ES:seamonkey-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-0:1.0.9-71.el4.s390",
"4ES:seamonkey-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-0:1.0.9-71.el4.src",
"4ES:seamonkey-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-chat-0:1.0.9-71.el4.i386",
"4ES:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-chat-0:1.0.9-71.el4.s390",
"4ES:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-devel-0:1.0.9-71.el4.i386",
"4ES:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-devel-0:1.0.9-71.el4.s390",
"4ES:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-mail-0:1.0.9-71.el4.i386",
"4ES:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-mail-0:1.0.9-71.el4.s390",
"4ES:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-mail-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-0:1.0.9-71.el4.i386",
"4WS:seamonkey-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-0:1.0.9-71.el4.s390",
"4WS:seamonkey-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-0:1.0.9-71.el4.src",
"4WS:seamonkey-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-chat-0:1.0.9-71.el4.i386",
"4WS:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-chat-0:1.0.9-71.el4.s390",
"4WS:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-devel-0:1.0.9-71.el4.i386",
"4WS:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-devel-0:1.0.9-71.el4.s390",
"4WS:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-mail-0:1.0.9-71.el4.i386",
"4WS:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-mail-0:1.0.9-71.el4.s390",
"4WS:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-mail-0:1.0.9-71.el4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:0888"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS:seamonkey-0:1.0.9-71.el4.i386",
"4AS:seamonkey-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-0:1.0.9-71.el4.s390",
"4AS:seamonkey-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-0:1.0.9-71.el4.src",
"4AS:seamonkey-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-chat-0:1.0.9-71.el4.i386",
"4AS:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-chat-0:1.0.9-71.el4.s390",
"4AS:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-devel-0:1.0.9-71.el4.i386",
"4AS:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-devel-0:1.0.9-71.el4.s390",
"4AS:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-mail-0:1.0.9-71.el4.i386",
"4AS:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-mail-0:1.0.9-71.el4.s390",
"4AS:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-mail-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-0:1.0.9-71.el4.src",
"4Desktop:seamonkey-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-0:1.0.9-71.el4.i386",
"4ES:seamonkey-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-0:1.0.9-71.el4.s390",
"4ES:seamonkey-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-0:1.0.9-71.el4.src",
"4ES:seamonkey-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-chat-0:1.0.9-71.el4.i386",
"4ES:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-chat-0:1.0.9-71.el4.s390",
"4ES:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-devel-0:1.0.9-71.el4.i386",
"4ES:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-devel-0:1.0.9-71.el4.s390",
"4ES:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-mail-0:1.0.9-71.el4.i386",
"4ES:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-mail-0:1.0.9-71.el4.s390",
"4ES:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-mail-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-0:1.0.9-71.el4.i386",
"4WS:seamonkey-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-0:1.0.9-71.el4.s390",
"4WS:seamonkey-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-0:1.0.9-71.el4.src",
"4WS:seamonkey-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-chat-0:1.0.9-71.el4.i386",
"4WS:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-chat-0:1.0.9-71.el4.s390",
"4WS:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-devel-0:1.0.9-71.el4.i386",
"4WS:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-devel-0:1.0.9-71.el4.s390",
"4WS:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-mail-0:1.0.9-71.el4.i386",
"4WS:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-mail-0:1.0.9-71.el4.s390",
"4WS:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-mail-0:1.0.9-71.el4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "Mozilla Multiple dangling pointer vulnerabilities (MFSA 2011-23)"
},
{
"cve": "CVE-2011-0085",
"discovery_date": "2011-06-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "714581"
}
],
"notes": [
{
"category": "description",
"text": "Use-after-free vulnerability in the nsXULCommandDispatcher function in Mozilla Firefox before 3.6.18, Thunderbird before 3.1.11, and SeaMonkey through 2.0.14 allows remote attackers to execute arbitrary code via a crafted XUL document that dequeues the current command updater.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Mozilla Multiple dangling pointer vulnerabilities (MFSA 2011-23)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS:seamonkey-0:1.0.9-71.el4.i386",
"4AS:seamonkey-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-0:1.0.9-71.el4.s390",
"4AS:seamonkey-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-0:1.0.9-71.el4.src",
"4AS:seamonkey-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-chat-0:1.0.9-71.el4.i386",
"4AS:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-chat-0:1.0.9-71.el4.s390",
"4AS:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-devel-0:1.0.9-71.el4.i386",
"4AS:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-devel-0:1.0.9-71.el4.s390",
"4AS:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-mail-0:1.0.9-71.el4.i386",
"4AS:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-mail-0:1.0.9-71.el4.s390",
"4AS:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-mail-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-0:1.0.9-71.el4.src",
"4Desktop:seamonkey-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-0:1.0.9-71.el4.i386",
"4ES:seamonkey-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-0:1.0.9-71.el4.s390",
"4ES:seamonkey-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-0:1.0.9-71.el4.src",
"4ES:seamonkey-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-chat-0:1.0.9-71.el4.i386",
"4ES:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-chat-0:1.0.9-71.el4.s390",
"4ES:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-devel-0:1.0.9-71.el4.i386",
"4ES:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-devel-0:1.0.9-71.el4.s390",
"4ES:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-mail-0:1.0.9-71.el4.i386",
"4ES:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-mail-0:1.0.9-71.el4.s390",
"4ES:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-mail-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-0:1.0.9-71.el4.i386",
"4WS:seamonkey-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-0:1.0.9-71.el4.s390",
"4WS:seamonkey-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-0:1.0.9-71.el4.src",
"4WS:seamonkey-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-chat-0:1.0.9-71.el4.i386",
"4WS:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-chat-0:1.0.9-71.el4.s390",
"4WS:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-devel-0:1.0.9-71.el4.i386",
"4WS:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-devel-0:1.0.9-71.el4.s390",
"4WS:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-mail-0:1.0.9-71.el4.i386",
"4WS:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-mail-0:1.0.9-71.el4.s390",
"4WS:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-mail-0:1.0.9-71.el4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-0085"
},
{
"category": "external",
"summary": "RHBZ#714581",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=714581"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-0085",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0085"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-0085",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-0085"
}
],
"release_date": "2011-06-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-06-21T22:42:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"4AS:seamonkey-0:1.0.9-71.el4.i386",
"4AS:seamonkey-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-0:1.0.9-71.el4.s390",
"4AS:seamonkey-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-0:1.0.9-71.el4.src",
"4AS:seamonkey-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-chat-0:1.0.9-71.el4.i386",
"4AS:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-chat-0:1.0.9-71.el4.s390",
"4AS:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-devel-0:1.0.9-71.el4.i386",
"4AS:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-devel-0:1.0.9-71.el4.s390",
"4AS:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-mail-0:1.0.9-71.el4.i386",
"4AS:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-mail-0:1.0.9-71.el4.s390",
"4AS:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-mail-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-0:1.0.9-71.el4.src",
"4Desktop:seamonkey-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-0:1.0.9-71.el4.i386",
"4ES:seamonkey-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-0:1.0.9-71.el4.s390",
"4ES:seamonkey-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-0:1.0.9-71.el4.src",
"4ES:seamonkey-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-chat-0:1.0.9-71.el4.i386",
"4ES:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-chat-0:1.0.9-71.el4.s390",
"4ES:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-devel-0:1.0.9-71.el4.i386",
"4ES:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-devel-0:1.0.9-71.el4.s390",
"4ES:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-mail-0:1.0.9-71.el4.i386",
"4ES:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-mail-0:1.0.9-71.el4.s390",
"4ES:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-mail-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-0:1.0.9-71.el4.i386",
"4WS:seamonkey-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-0:1.0.9-71.el4.s390",
"4WS:seamonkey-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-0:1.0.9-71.el4.src",
"4WS:seamonkey-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-chat-0:1.0.9-71.el4.i386",
"4WS:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-chat-0:1.0.9-71.el4.s390",
"4WS:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-devel-0:1.0.9-71.el4.i386",
"4WS:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-devel-0:1.0.9-71.el4.s390",
"4WS:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-mail-0:1.0.9-71.el4.i386",
"4WS:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-mail-0:1.0.9-71.el4.s390",
"4WS:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-mail-0:1.0.9-71.el4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:0888"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS:seamonkey-0:1.0.9-71.el4.i386",
"4AS:seamonkey-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-0:1.0.9-71.el4.s390",
"4AS:seamonkey-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-0:1.0.9-71.el4.src",
"4AS:seamonkey-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-chat-0:1.0.9-71.el4.i386",
"4AS:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-chat-0:1.0.9-71.el4.s390",
"4AS:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-devel-0:1.0.9-71.el4.i386",
"4AS:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-devel-0:1.0.9-71.el4.s390",
"4AS:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-mail-0:1.0.9-71.el4.i386",
"4AS:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-mail-0:1.0.9-71.el4.s390",
"4AS:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-mail-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-0:1.0.9-71.el4.src",
"4Desktop:seamonkey-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-0:1.0.9-71.el4.i386",
"4ES:seamonkey-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-0:1.0.9-71.el4.s390",
"4ES:seamonkey-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-0:1.0.9-71.el4.src",
"4ES:seamonkey-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-chat-0:1.0.9-71.el4.i386",
"4ES:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-chat-0:1.0.9-71.el4.s390",
"4ES:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-devel-0:1.0.9-71.el4.i386",
"4ES:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-devel-0:1.0.9-71.el4.s390",
"4ES:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-mail-0:1.0.9-71.el4.i386",
"4ES:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-mail-0:1.0.9-71.el4.s390",
"4ES:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-mail-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-0:1.0.9-71.el4.i386",
"4WS:seamonkey-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-0:1.0.9-71.el4.s390",
"4WS:seamonkey-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-0:1.0.9-71.el4.src",
"4WS:seamonkey-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-chat-0:1.0.9-71.el4.i386",
"4WS:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-chat-0:1.0.9-71.el4.s390",
"4WS:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-devel-0:1.0.9-71.el4.i386",
"4WS:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-devel-0:1.0.9-71.el4.s390",
"4WS:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-mail-0:1.0.9-71.el4.i386",
"4WS:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-mail-0:1.0.9-71.el4.s390",
"4WS:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-mail-0:1.0.9-71.el4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "Mozilla Multiple dangling pointer vulnerabilities (MFSA 2011-23)"
},
{
"cve": "CVE-2011-2362",
"discovery_date": "2011-06-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "714583"
}
],
"notes": [
{
"category": "description",
"text": "Mozilla Firefox before 3.6.18, Thunderbird before 3.1.11, and SeaMonkey through 2.0.14 do not distinguish between cookies for two domain names that differ only in a trailing dot, which allows remote web servers to bypass the Same Origin Policy via Set-Cookie headers.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Mozilla Cookie isolation error (MFSA 2011-24)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS:seamonkey-0:1.0.9-71.el4.i386",
"4AS:seamonkey-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-0:1.0.9-71.el4.s390",
"4AS:seamonkey-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-0:1.0.9-71.el4.src",
"4AS:seamonkey-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-chat-0:1.0.9-71.el4.i386",
"4AS:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-chat-0:1.0.9-71.el4.s390",
"4AS:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-devel-0:1.0.9-71.el4.i386",
"4AS:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-devel-0:1.0.9-71.el4.s390",
"4AS:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-mail-0:1.0.9-71.el4.i386",
"4AS:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-mail-0:1.0.9-71.el4.s390",
"4AS:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-mail-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-0:1.0.9-71.el4.src",
"4Desktop:seamonkey-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-0:1.0.9-71.el4.i386",
"4ES:seamonkey-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-0:1.0.9-71.el4.s390",
"4ES:seamonkey-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-0:1.0.9-71.el4.src",
"4ES:seamonkey-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-chat-0:1.0.9-71.el4.i386",
"4ES:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-chat-0:1.0.9-71.el4.s390",
"4ES:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-devel-0:1.0.9-71.el4.i386",
"4ES:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-devel-0:1.0.9-71.el4.s390",
"4ES:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-mail-0:1.0.9-71.el4.i386",
"4ES:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-mail-0:1.0.9-71.el4.s390",
"4ES:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-mail-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-0:1.0.9-71.el4.i386",
"4WS:seamonkey-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-0:1.0.9-71.el4.s390",
"4WS:seamonkey-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-0:1.0.9-71.el4.src",
"4WS:seamonkey-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-chat-0:1.0.9-71.el4.i386",
"4WS:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-chat-0:1.0.9-71.el4.s390",
"4WS:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-devel-0:1.0.9-71.el4.i386",
"4WS:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-devel-0:1.0.9-71.el4.s390",
"4WS:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-mail-0:1.0.9-71.el4.i386",
"4WS:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-mail-0:1.0.9-71.el4.s390",
"4WS:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-mail-0:1.0.9-71.el4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-2362"
},
{
"category": "external",
"summary": "RHBZ#714583",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=714583"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-2362",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2362"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-2362",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-2362"
}
],
"release_date": "2011-06-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-06-21T22:42:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"4AS:seamonkey-0:1.0.9-71.el4.i386",
"4AS:seamonkey-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-0:1.0.9-71.el4.s390",
"4AS:seamonkey-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-0:1.0.9-71.el4.src",
"4AS:seamonkey-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-chat-0:1.0.9-71.el4.i386",
"4AS:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-chat-0:1.0.9-71.el4.s390",
"4AS:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-devel-0:1.0.9-71.el4.i386",
"4AS:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-devel-0:1.0.9-71.el4.s390",
"4AS:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-mail-0:1.0.9-71.el4.i386",
"4AS:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-mail-0:1.0.9-71.el4.s390",
"4AS:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-mail-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-0:1.0.9-71.el4.src",
"4Desktop:seamonkey-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-0:1.0.9-71.el4.i386",
"4ES:seamonkey-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-0:1.0.9-71.el4.s390",
"4ES:seamonkey-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-0:1.0.9-71.el4.src",
"4ES:seamonkey-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-chat-0:1.0.9-71.el4.i386",
"4ES:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-chat-0:1.0.9-71.el4.s390",
"4ES:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-devel-0:1.0.9-71.el4.i386",
"4ES:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-devel-0:1.0.9-71.el4.s390",
"4ES:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-mail-0:1.0.9-71.el4.i386",
"4ES:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-mail-0:1.0.9-71.el4.s390",
"4ES:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-mail-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-0:1.0.9-71.el4.i386",
"4WS:seamonkey-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-0:1.0.9-71.el4.s390",
"4WS:seamonkey-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-0:1.0.9-71.el4.src",
"4WS:seamonkey-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-chat-0:1.0.9-71.el4.i386",
"4WS:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-chat-0:1.0.9-71.el4.s390",
"4WS:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-devel-0:1.0.9-71.el4.i386",
"4WS:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-devel-0:1.0.9-71.el4.s390",
"4WS:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-mail-0:1.0.9-71.el4.i386",
"4WS:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-mail-0:1.0.9-71.el4.s390",
"4WS:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-mail-0:1.0.9-71.el4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:0888"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.1,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS:seamonkey-0:1.0.9-71.el4.i386",
"4AS:seamonkey-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-0:1.0.9-71.el4.s390",
"4AS:seamonkey-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-0:1.0.9-71.el4.src",
"4AS:seamonkey-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-chat-0:1.0.9-71.el4.i386",
"4AS:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-chat-0:1.0.9-71.el4.s390",
"4AS:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-devel-0:1.0.9-71.el4.i386",
"4AS:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-devel-0:1.0.9-71.el4.s390",
"4AS:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-mail-0:1.0.9-71.el4.i386",
"4AS:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-mail-0:1.0.9-71.el4.s390",
"4AS:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-mail-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-0:1.0.9-71.el4.src",
"4Desktop:seamonkey-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-0:1.0.9-71.el4.i386",
"4ES:seamonkey-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-0:1.0.9-71.el4.s390",
"4ES:seamonkey-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-0:1.0.9-71.el4.src",
"4ES:seamonkey-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-chat-0:1.0.9-71.el4.i386",
"4ES:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-chat-0:1.0.9-71.el4.s390",
"4ES:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-devel-0:1.0.9-71.el4.i386",
"4ES:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-devel-0:1.0.9-71.el4.s390",
"4ES:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-mail-0:1.0.9-71.el4.i386",
"4ES:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-mail-0:1.0.9-71.el4.s390",
"4ES:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-mail-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-0:1.0.9-71.el4.i386",
"4WS:seamonkey-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-0:1.0.9-71.el4.s390",
"4WS:seamonkey-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-0:1.0.9-71.el4.src",
"4WS:seamonkey-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-chat-0:1.0.9-71.el4.i386",
"4WS:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-chat-0:1.0.9-71.el4.s390",
"4WS:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-devel-0:1.0.9-71.el4.i386",
"4WS:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-devel-0:1.0.9-71.el4.s390",
"4WS:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-mail-0:1.0.9-71.el4.i386",
"4WS:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-mail-0:1.0.9-71.el4.s390",
"4WS:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-mail-0:1.0.9-71.el4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "Mozilla Cookie isolation error (MFSA 2011-24)"
},
{
"cve": "CVE-2011-2363",
"discovery_date": "2011-06-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "714581"
}
],
"notes": [
{
"category": "description",
"text": "Use-after-free vulnerability in the nsSVGPointList::AppendElement function in the implementation of SVG element lists in Mozilla Firefox before 3.6.18, Thunderbird before 3.1.11, and SeaMonkey through 2.0.14 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via vectors involving a user-supplied callback.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Mozilla Multiple dangling pointer vulnerabilities (MFSA 2011-23)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS:seamonkey-0:1.0.9-71.el4.i386",
"4AS:seamonkey-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-0:1.0.9-71.el4.s390",
"4AS:seamonkey-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-0:1.0.9-71.el4.src",
"4AS:seamonkey-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-chat-0:1.0.9-71.el4.i386",
"4AS:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-chat-0:1.0.9-71.el4.s390",
"4AS:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-devel-0:1.0.9-71.el4.i386",
"4AS:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-devel-0:1.0.9-71.el4.s390",
"4AS:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-mail-0:1.0.9-71.el4.i386",
"4AS:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-mail-0:1.0.9-71.el4.s390",
"4AS:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-mail-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-0:1.0.9-71.el4.src",
"4Desktop:seamonkey-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-0:1.0.9-71.el4.i386",
"4ES:seamonkey-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-0:1.0.9-71.el4.s390",
"4ES:seamonkey-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-0:1.0.9-71.el4.src",
"4ES:seamonkey-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-chat-0:1.0.9-71.el4.i386",
"4ES:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-chat-0:1.0.9-71.el4.s390",
"4ES:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-devel-0:1.0.9-71.el4.i386",
"4ES:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-devel-0:1.0.9-71.el4.s390",
"4ES:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-mail-0:1.0.9-71.el4.i386",
"4ES:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-mail-0:1.0.9-71.el4.s390",
"4ES:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-mail-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-0:1.0.9-71.el4.i386",
"4WS:seamonkey-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-0:1.0.9-71.el4.s390",
"4WS:seamonkey-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-0:1.0.9-71.el4.src",
"4WS:seamonkey-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-chat-0:1.0.9-71.el4.i386",
"4WS:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-chat-0:1.0.9-71.el4.s390",
"4WS:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-devel-0:1.0.9-71.el4.i386",
"4WS:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-devel-0:1.0.9-71.el4.s390",
"4WS:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-mail-0:1.0.9-71.el4.i386",
"4WS:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-mail-0:1.0.9-71.el4.s390",
"4WS:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-mail-0:1.0.9-71.el4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-2363"
},
{
"category": "external",
"summary": "RHBZ#714581",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=714581"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-2363",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2363"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-2363",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-2363"
}
],
"release_date": "2011-06-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-06-21T22:42:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"4AS:seamonkey-0:1.0.9-71.el4.i386",
"4AS:seamonkey-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-0:1.0.9-71.el4.s390",
"4AS:seamonkey-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-0:1.0.9-71.el4.src",
"4AS:seamonkey-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-chat-0:1.0.9-71.el4.i386",
"4AS:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-chat-0:1.0.9-71.el4.s390",
"4AS:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-devel-0:1.0.9-71.el4.i386",
"4AS:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-devel-0:1.0.9-71.el4.s390",
"4AS:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-mail-0:1.0.9-71.el4.i386",
"4AS:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-mail-0:1.0.9-71.el4.s390",
"4AS:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-mail-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-0:1.0.9-71.el4.src",
"4Desktop:seamonkey-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-0:1.0.9-71.el4.i386",
"4ES:seamonkey-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-0:1.0.9-71.el4.s390",
"4ES:seamonkey-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-0:1.0.9-71.el4.src",
"4ES:seamonkey-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-chat-0:1.0.9-71.el4.i386",
"4ES:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-chat-0:1.0.9-71.el4.s390",
"4ES:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-devel-0:1.0.9-71.el4.i386",
"4ES:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-devel-0:1.0.9-71.el4.s390",
"4ES:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-mail-0:1.0.9-71.el4.i386",
"4ES:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-mail-0:1.0.9-71.el4.s390",
"4ES:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-mail-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-0:1.0.9-71.el4.i386",
"4WS:seamonkey-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-0:1.0.9-71.el4.s390",
"4WS:seamonkey-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-0:1.0.9-71.el4.src",
"4WS:seamonkey-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-chat-0:1.0.9-71.el4.i386",
"4WS:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-chat-0:1.0.9-71.el4.s390",
"4WS:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-devel-0:1.0.9-71.el4.i386",
"4WS:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-devel-0:1.0.9-71.el4.s390",
"4WS:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-mail-0:1.0.9-71.el4.i386",
"4WS:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-mail-0:1.0.9-71.el4.s390",
"4WS:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-mail-0:1.0.9-71.el4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:0888"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS:seamonkey-0:1.0.9-71.el4.i386",
"4AS:seamonkey-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-0:1.0.9-71.el4.s390",
"4AS:seamonkey-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-0:1.0.9-71.el4.src",
"4AS:seamonkey-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-chat-0:1.0.9-71.el4.i386",
"4AS:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-chat-0:1.0.9-71.el4.s390",
"4AS:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-devel-0:1.0.9-71.el4.i386",
"4AS:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-devel-0:1.0.9-71.el4.s390",
"4AS:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-mail-0:1.0.9-71.el4.i386",
"4AS:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-mail-0:1.0.9-71.el4.s390",
"4AS:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-mail-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-0:1.0.9-71.el4.src",
"4Desktop:seamonkey-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-0:1.0.9-71.el4.i386",
"4ES:seamonkey-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-0:1.0.9-71.el4.s390",
"4ES:seamonkey-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-0:1.0.9-71.el4.src",
"4ES:seamonkey-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-chat-0:1.0.9-71.el4.i386",
"4ES:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-chat-0:1.0.9-71.el4.s390",
"4ES:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-devel-0:1.0.9-71.el4.i386",
"4ES:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-devel-0:1.0.9-71.el4.s390",
"4ES:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-mail-0:1.0.9-71.el4.i386",
"4ES:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-mail-0:1.0.9-71.el4.s390",
"4ES:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-mail-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-0:1.0.9-71.el4.i386",
"4WS:seamonkey-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-0:1.0.9-71.el4.s390",
"4WS:seamonkey-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-0:1.0.9-71.el4.src",
"4WS:seamonkey-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-chat-0:1.0.9-71.el4.i386",
"4WS:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-chat-0:1.0.9-71.el4.s390",
"4WS:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-devel-0:1.0.9-71.el4.i386",
"4WS:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-devel-0:1.0.9-71.el4.s390",
"4WS:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-mail-0:1.0.9-71.el4.i386",
"4WS:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-mail-0:1.0.9-71.el4.s390",
"4WS:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-mail-0:1.0.9-71.el4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "Mozilla Multiple dangling pointer vulnerabilities (MFSA 2011-23)"
},
{
"cve": "CVE-2011-2364",
"discovery_date": "2011-06-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "714576"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the browser engine in Mozilla Firefox 3.6.x before 3.6.18 and Thunderbird before 3.1.11 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors, a different vulnerability than CVE-2011-2365.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Mozilla Miscellaneous memory safety hazards (MFSA 2011-19)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS:seamonkey-0:1.0.9-71.el4.i386",
"4AS:seamonkey-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-0:1.0.9-71.el4.s390",
"4AS:seamonkey-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-0:1.0.9-71.el4.src",
"4AS:seamonkey-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-chat-0:1.0.9-71.el4.i386",
"4AS:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-chat-0:1.0.9-71.el4.s390",
"4AS:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-devel-0:1.0.9-71.el4.i386",
"4AS:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-devel-0:1.0.9-71.el4.s390",
"4AS:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-mail-0:1.0.9-71.el4.i386",
"4AS:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-mail-0:1.0.9-71.el4.s390",
"4AS:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-mail-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-0:1.0.9-71.el4.src",
"4Desktop:seamonkey-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-0:1.0.9-71.el4.i386",
"4ES:seamonkey-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-0:1.0.9-71.el4.s390",
"4ES:seamonkey-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-0:1.0.9-71.el4.src",
"4ES:seamonkey-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-chat-0:1.0.9-71.el4.i386",
"4ES:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-chat-0:1.0.9-71.el4.s390",
"4ES:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-devel-0:1.0.9-71.el4.i386",
"4ES:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-devel-0:1.0.9-71.el4.s390",
"4ES:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-mail-0:1.0.9-71.el4.i386",
"4ES:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-mail-0:1.0.9-71.el4.s390",
"4ES:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-mail-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-0:1.0.9-71.el4.i386",
"4WS:seamonkey-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-0:1.0.9-71.el4.s390",
"4WS:seamonkey-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-0:1.0.9-71.el4.src",
"4WS:seamonkey-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-chat-0:1.0.9-71.el4.i386",
"4WS:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-chat-0:1.0.9-71.el4.s390",
"4WS:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-devel-0:1.0.9-71.el4.i386",
"4WS:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-devel-0:1.0.9-71.el4.s390",
"4WS:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-mail-0:1.0.9-71.el4.i386",
"4WS:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-mail-0:1.0.9-71.el4.s390",
"4WS:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-mail-0:1.0.9-71.el4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-2364"
},
{
"category": "external",
"summary": "RHBZ#714576",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=714576"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-2364",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2364"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-2364",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-2364"
}
],
"release_date": "2011-06-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-06-21T22:42:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"4AS:seamonkey-0:1.0.9-71.el4.i386",
"4AS:seamonkey-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-0:1.0.9-71.el4.s390",
"4AS:seamonkey-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-0:1.0.9-71.el4.src",
"4AS:seamonkey-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-chat-0:1.0.9-71.el4.i386",
"4AS:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-chat-0:1.0.9-71.el4.s390",
"4AS:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-devel-0:1.0.9-71.el4.i386",
"4AS:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-devel-0:1.0.9-71.el4.s390",
"4AS:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-mail-0:1.0.9-71.el4.i386",
"4AS:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-mail-0:1.0.9-71.el4.s390",
"4AS:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-mail-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-0:1.0.9-71.el4.src",
"4Desktop:seamonkey-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-0:1.0.9-71.el4.i386",
"4ES:seamonkey-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-0:1.0.9-71.el4.s390",
"4ES:seamonkey-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-0:1.0.9-71.el4.src",
"4ES:seamonkey-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-chat-0:1.0.9-71.el4.i386",
"4ES:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-chat-0:1.0.9-71.el4.s390",
"4ES:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-devel-0:1.0.9-71.el4.i386",
"4ES:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-devel-0:1.0.9-71.el4.s390",
"4ES:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-mail-0:1.0.9-71.el4.i386",
"4ES:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-mail-0:1.0.9-71.el4.s390",
"4ES:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-mail-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-0:1.0.9-71.el4.i386",
"4WS:seamonkey-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-0:1.0.9-71.el4.s390",
"4WS:seamonkey-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-0:1.0.9-71.el4.src",
"4WS:seamonkey-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-chat-0:1.0.9-71.el4.i386",
"4WS:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-chat-0:1.0.9-71.el4.s390",
"4WS:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-devel-0:1.0.9-71.el4.i386",
"4WS:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-devel-0:1.0.9-71.el4.s390",
"4WS:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-mail-0:1.0.9-71.el4.i386",
"4WS:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-mail-0:1.0.9-71.el4.s390",
"4WS:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-mail-0:1.0.9-71.el4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:0888"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS:seamonkey-0:1.0.9-71.el4.i386",
"4AS:seamonkey-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-0:1.0.9-71.el4.s390",
"4AS:seamonkey-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-0:1.0.9-71.el4.src",
"4AS:seamonkey-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-chat-0:1.0.9-71.el4.i386",
"4AS:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-chat-0:1.0.9-71.el4.s390",
"4AS:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-devel-0:1.0.9-71.el4.i386",
"4AS:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-devel-0:1.0.9-71.el4.s390",
"4AS:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-mail-0:1.0.9-71.el4.i386",
"4AS:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-mail-0:1.0.9-71.el4.s390",
"4AS:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-mail-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-0:1.0.9-71.el4.src",
"4Desktop:seamonkey-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-0:1.0.9-71.el4.i386",
"4ES:seamonkey-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-0:1.0.9-71.el4.s390",
"4ES:seamonkey-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-0:1.0.9-71.el4.src",
"4ES:seamonkey-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-chat-0:1.0.9-71.el4.i386",
"4ES:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-chat-0:1.0.9-71.el4.s390",
"4ES:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-devel-0:1.0.9-71.el4.i386",
"4ES:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-devel-0:1.0.9-71.el4.s390",
"4ES:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-mail-0:1.0.9-71.el4.i386",
"4ES:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-mail-0:1.0.9-71.el4.s390",
"4ES:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-mail-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-0:1.0.9-71.el4.i386",
"4WS:seamonkey-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-0:1.0.9-71.el4.s390",
"4WS:seamonkey-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-0:1.0.9-71.el4.src",
"4WS:seamonkey-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-chat-0:1.0.9-71.el4.i386",
"4WS:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-chat-0:1.0.9-71.el4.s390",
"4WS:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-devel-0:1.0.9-71.el4.i386",
"4WS:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-devel-0:1.0.9-71.el4.s390",
"4WS:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-mail-0:1.0.9-71.el4.i386",
"4WS:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-mail-0:1.0.9-71.el4.s390",
"4WS:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-mail-0:1.0.9-71.el4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "Mozilla Miscellaneous memory safety hazards (MFSA 2011-19)"
},
{
"cve": "CVE-2011-2365",
"discovery_date": "2011-06-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "714576"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the browser engine in Mozilla Firefox 3.6.x before 3.6.18 and Thunderbird before 3.1.11 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors, a different vulnerability than CVE-2011-2364.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Mozilla Miscellaneous memory safety hazards (MFSA 2011-19)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS:seamonkey-0:1.0.9-71.el4.i386",
"4AS:seamonkey-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-0:1.0.9-71.el4.s390",
"4AS:seamonkey-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-0:1.0.9-71.el4.src",
"4AS:seamonkey-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-chat-0:1.0.9-71.el4.i386",
"4AS:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-chat-0:1.0.9-71.el4.s390",
"4AS:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-devel-0:1.0.9-71.el4.i386",
"4AS:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-devel-0:1.0.9-71.el4.s390",
"4AS:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-mail-0:1.0.9-71.el4.i386",
"4AS:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-mail-0:1.0.9-71.el4.s390",
"4AS:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-mail-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-0:1.0.9-71.el4.src",
"4Desktop:seamonkey-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-0:1.0.9-71.el4.i386",
"4ES:seamonkey-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-0:1.0.9-71.el4.s390",
"4ES:seamonkey-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-0:1.0.9-71.el4.src",
"4ES:seamonkey-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-chat-0:1.0.9-71.el4.i386",
"4ES:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-chat-0:1.0.9-71.el4.s390",
"4ES:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-devel-0:1.0.9-71.el4.i386",
"4ES:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-devel-0:1.0.9-71.el4.s390",
"4ES:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-mail-0:1.0.9-71.el4.i386",
"4ES:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-mail-0:1.0.9-71.el4.s390",
"4ES:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-mail-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-0:1.0.9-71.el4.i386",
"4WS:seamonkey-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-0:1.0.9-71.el4.s390",
"4WS:seamonkey-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-0:1.0.9-71.el4.src",
"4WS:seamonkey-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-chat-0:1.0.9-71.el4.i386",
"4WS:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-chat-0:1.0.9-71.el4.s390",
"4WS:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-devel-0:1.0.9-71.el4.i386",
"4WS:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-devel-0:1.0.9-71.el4.s390",
"4WS:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-mail-0:1.0.9-71.el4.i386",
"4WS:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-mail-0:1.0.9-71.el4.s390",
"4WS:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-mail-0:1.0.9-71.el4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-2365"
},
{
"category": "external",
"summary": "RHBZ#714576",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=714576"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-2365",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2365"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-2365",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-2365"
}
],
"release_date": "2011-06-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-06-21T22:42:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"4AS:seamonkey-0:1.0.9-71.el4.i386",
"4AS:seamonkey-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-0:1.0.9-71.el4.s390",
"4AS:seamonkey-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-0:1.0.9-71.el4.src",
"4AS:seamonkey-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-chat-0:1.0.9-71.el4.i386",
"4AS:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-chat-0:1.0.9-71.el4.s390",
"4AS:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-devel-0:1.0.9-71.el4.i386",
"4AS:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-devel-0:1.0.9-71.el4.s390",
"4AS:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-mail-0:1.0.9-71.el4.i386",
"4AS:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-mail-0:1.0.9-71.el4.s390",
"4AS:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-mail-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-0:1.0.9-71.el4.src",
"4Desktop:seamonkey-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-0:1.0.9-71.el4.i386",
"4ES:seamonkey-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-0:1.0.9-71.el4.s390",
"4ES:seamonkey-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-0:1.0.9-71.el4.src",
"4ES:seamonkey-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-chat-0:1.0.9-71.el4.i386",
"4ES:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-chat-0:1.0.9-71.el4.s390",
"4ES:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-devel-0:1.0.9-71.el4.i386",
"4ES:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-devel-0:1.0.9-71.el4.s390",
"4ES:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-mail-0:1.0.9-71.el4.i386",
"4ES:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-mail-0:1.0.9-71.el4.s390",
"4ES:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-mail-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-0:1.0.9-71.el4.i386",
"4WS:seamonkey-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-0:1.0.9-71.el4.s390",
"4WS:seamonkey-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-0:1.0.9-71.el4.src",
"4WS:seamonkey-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-chat-0:1.0.9-71.el4.i386",
"4WS:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-chat-0:1.0.9-71.el4.s390",
"4WS:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-devel-0:1.0.9-71.el4.i386",
"4WS:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-devel-0:1.0.9-71.el4.s390",
"4WS:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-mail-0:1.0.9-71.el4.i386",
"4WS:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-mail-0:1.0.9-71.el4.s390",
"4WS:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-mail-0:1.0.9-71.el4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:0888"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS:seamonkey-0:1.0.9-71.el4.i386",
"4AS:seamonkey-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-0:1.0.9-71.el4.s390",
"4AS:seamonkey-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-0:1.0.9-71.el4.src",
"4AS:seamonkey-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-chat-0:1.0.9-71.el4.i386",
"4AS:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-chat-0:1.0.9-71.el4.s390",
"4AS:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-devel-0:1.0.9-71.el4.i386",
"4AS:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-devel-0:1.0.9-71.el4.s390",
"4AS:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-mail-0:1.0.9-71.el4.i386",
"4AS:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-mail-0:1.0.9-71.el4.s390",
"4AS:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-mail-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-0:1.0.9-71.el4.src",
"4Desktop:seamonkey-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-0:1.0.9-71.el4.i386",
"4ES:seamonkey-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-0:1.0.9-71.el4.s390",
"4ES:seamonkey-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-0:1.0.9-71.el4.src",
"4ES:seamonkey-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-chat-0:1.0.9-71.el4.i386",
"4ES:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-chat-0:1.0.9-71.el4.s390",
"4ES:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-devel-0:1.0.9-71.el4.i386",
"4ES:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-devel-0:1.0.9-71.el4.s390",
"4ES:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-mail-0:1.0.9-71.el4.i386",
"4ES:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-mail-0:1.0.9-71.el4.s390",
"4ES:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-mail-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-0:1.0.9-71.el4.i386",
"4WS:seamonkey-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-0:1.0.9-71.el4.s390",
"4WS:seamonkey-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-0:1.0.9-71.el4.src",
"4WS:seamonkey-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-chat-0:1.0.9-71.el4.i386",
"4WS:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-chat-0:1.0.9-71.el4.s390",
"4WS:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-devel-0:1.0.9-71.el4.i386",
"4WS:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-devel-0:1.0.9-71.el4.s390",
"4WS:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-mail-0:1.0.9-71.el4.i386",
"4WS:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-mail-0:1.0.9-71.el4.s390",
"4WS:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-mail-0:1.0.9-71.el4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "Mozilla Miscellaneous memory safety hazards (MFSA 2011-19)"
},
{
"cve": "CVE-2011-2371",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"discovery_date": "2011-06-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "714580"
}
],
"notes": [
{
"category": "description",
"text": "Integer overflow in the Array.reduceRight method in Mozilla Firefox before 3.6.18 and 4.x through 4.0.1, Thunderbird before 3.1.11, and SeaMonkey through 2.0.14 allows remote attackers to execute arbitrary code via vectors involving a long JavaScript Array object.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Mozilla Integer overflow and arbitrary code execution (MFSA 2011-22)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS:seamonkey-0:1.0.9-71.el4.i386",
"4AS:seamonkey-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-0:1.0.9-71.el4.s390",
"4AS:seamonkey-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-0:1.0.9-71.el4.src",
"4AS:seamonkey-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-chat-0:1.0.9-71.el4.i386",
"4AS:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-chat-0:1.0.9-71.el4.s390",
"4AS:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-devel-0:1.0.9-71.el4.i386",
"4AS:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-devel-0:1.0.9-71.el4.s390",
"4AS:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-mail-0:1.0.9-71.el4.i386",
"4AS:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-mail-0:1.0.9-71.el4.s390",
"4AS:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-mail-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-0:1.0.9-71.el4.src",
"4Desktop:seamonkey-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-0:1.0.9-71.el4.i386",
"4ES:seamonkey-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-0:1.0.9-71.el4.s390",
"4ES:seamonkey-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-0:1.0.9-71.el4.src",
"4ES:seamonkey-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-chat-0:1.0.9-71.el4.i386",
"4ES:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-chat-0:1.0.9-71.el4.s390",
"4ES:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-devel-0:1.0.9-71.el4.i386",
"4ES:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-devel-0:1.0.9-71.el4.s390",
"4ES:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-mail-0:1.0.9-71.el4.i386",
"4ES:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-mail-0:1.0.9-71.el4.s390",
"4ES:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-mail-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-0:1.0.9-71.el4.i386",
"4WS:seamonkey-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-0:1.0.9-71.el4.s390",
"4WS:seamonkey-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-0:1.0.9-71.el4.src",
"4WS:seamonkey-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-chat-0:1.0.9-71.el4.i386",
"4WS:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-chat-0:1.0.9-71.el4.s390",
"4WS:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-devel-0:1.0.9-71.el4.i386",
"4WS:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-devel-0:1.0.9-71.el4.s390",
"4WS:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-mail-0:1.0.9-71.el4.i386",
"4WS:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-mail-0:1.0.9-71.el4.s390",
"4WS:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-mail-0:1.0.9-71.el4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-2371"
},
{
"category": "external",
"summary": "RHBZ#714580",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=714580"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-2371",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2371"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-2371",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-2371"
}
],
"release_date": "2011-06-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-06-21T22:42:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"4AS:seamonkey-0:1.0.9-71.el4.i386",
"4AS:seamonkey-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-0:1.0.9-71.el4.s390",
"4AS:seamonkey-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-0:1.0.9-71.el4.src",
"4AS:seamonkey-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-chat-0:1.0.9-71.el4.i386",
"4AS:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-chat-0:1.0.9-71.el4.s390",
"4AS:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-devel-0:1.0.9-71.el4.i386",
"4AS:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-devel-0:1.0.9-71.el4.s390",
"4AS:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-mail-0:1.0.9-71.el4.i386",
"4AS:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-mail-0:1.0.9-71.el4.s390",
"4AS:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-mail-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-0:1.0.9-71.el4.src",
"4Desktop:seamonkey-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-0:1.0.9-71.el4.i386",
"4ES:seamonkey-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-0:1.0.9-71.el4.s390",
"4ES:seamonkey-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-0:1.0.9-71.el4.src",
"4ES:seamonkey-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-chat-0:1.0.9-71.el4.i386",
"4ES:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-chat-0:1.0.9-71.el4.s390",
"4ES:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-devel-0:1.0.9-71.el4.i386",
"4ES:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-devel-0:1.0.9-71.el4.s390",
"4ES:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-mail-0:1.0.9-71.el4.i386",
"4ES:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-mail-0:1.0.9-71.el4.s390",
"4ES:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-mail-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-0:1.0.9-71.el4.i386",
"4WS:seamonkey-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-0:1.0.9-71.el4.s390",
"4WS:seamonkey-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-0:1.0.9-71.el4.src",
"4WS:seamonkey-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-chat-0:1.0.9-71.el4.i386",
"4WS:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-chat-0:1.0.9-71.el4.s390",
"4WS:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-devel-0:1.0.9-71.el4.i386",
"4WS:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-devel-0:1.0.9-71.el4.s390",
"4WS:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-mail-0:1.0.9-71.el4.i386",
"4WS:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-mail-0:1.0.9-71.el4.s390",
"4WS:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-mail-0:1.0.9-71.el4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:0888"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS:seamonkey-0:1.0.9-71.el4.i386",
"4AS:seamonkey-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-0:1.0.9-71.el4.s390",
"4AS:seamonkey-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-0:1.0.9-71.el4.src",
"4AS:seamonkey-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-chat-0:1.0.9-71.el4.i386",
"4AS:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-chat-0:1.0.9-71.el4.s390",
"4AS:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-devel-0:1.0.9-71.el4.i386",
"4AS:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-devel-0:1.0.9-71.el4.s390",
"4AS:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-mail-0:1.0.9-71.el4.i386",
"4AS:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-mail-0:1.0.9-71.el4.s390",
"4AS:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-mail-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-0:1.0.9-71.el4.src",
"4Desktop:seamonkey-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-0:1.0.9-71.el4.i386",
"4ES:seamonkey-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-0:1.0.9-71.el4.s390",
"4ES:seamonkey-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-0:1.0.9-71.el4.src",
"4ES:seamonkey-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-chat-0:1.0.9-71.el4.i386",
"4ES:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-chat-0:1.0.9-71.el4.s390",
"4ES:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-devel-0:1.0.9-71.el4.i386",
"4ES:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-devel-0:1.0.9-71.el4.s390",
"4ES:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-mail-0:1.0.9-71.el4.i386",
"4ES:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-mail-0:1.0.9-71.el4.s390",
"4ES:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-mail-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-0:1.0.9-71.el4.i386",
"4WS:seamonkey-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-0:1.0.9-71.el4.s390",
"4WS:seamonkey-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-0:1.0.9-71.el4.src",
"4WS:seamonkey-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-chat-0:1.0.9-71.el4.i386",
"4WS:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-chat-0:1.0.9-71.el4.s390",
"4WS:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-devel-0:1.0.9-71.el4.i386",
"4WS:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-devel-0:1.0.9-71.el4.s390",
"4WS:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-mail-0:1.0.9-71.el4.i386",
"4WS:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-mail-0:1.0.9-71.el4.s390",
"4WS:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-mail-0:1.0.9-71.el4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "Mozilla Integer overflow and arbitrary code execution (MFSA 2011-22)"
},
{
"cve": "CVE-2011-2373",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2011-06-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "714577"
}
],
"notes": [
{
"category": "description",
"text": "Use-after-free vulnerability in Mozilla Firefox before 3.6.18 and 4.x through 4.0.1, Thunderbird before 3.1.11, and SeaMonkey through 2.0.14, when JavaScript is disabled, allows remote attackers to execute arbitrary code via a crafted XUL document.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Mozilla Use-after-free vulnerability when viewing XUL document with script disabled (MFSA 2011-20)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS:seamonkey-0:1.0.9-71.el4.i386",
"4AS:seamonkey-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-0:1.0.9-71.el4.s390",
"4AS:seamonkey-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-0:1.0.9-71.el4.src",
"4AS:seamonkey-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-chat-0:1.0.9-71.el4.i386",
"4AS:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-chat-0:1.0.9-71.el4.s390",
"4AS:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-devel-0:1.0.9-71.el4.i386",
"4AS:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-devel-0:1.0.9-71.el4.s390",
"4AS:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-mail-0:1.0.9-71.el4.i386",
"4AS:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-mail-0:1.0.9-71.el4.s390",
"4AS:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-mail-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-0:1.0.9-71.el4.src",
"4Desktop:seamonkey-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-0:1.0.9-71.el4.i386",
"4ES:seamonkey-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-0:1.0.9-71.el4.s390",
"4ES:seamonkey-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-0:1.0.9-71.el4.src",
"4ES:seamonkey-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-chat-0:1.0.9-71.el4.i386",
"4ES:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-chat-0:1.0.9-71.el4.s390",
"4ES:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-devel-0:1.0.9-71.el4.i386",
"4ES:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-devel-0:1.0.9-71.el4.s390",
"4ES:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-mail-0:1.0.9-71.el4.i386",
"4ES:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-mail-0:1.0.9-71.el4.s390",
"4ES:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-mail-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-0:1.0.9-71.el4.i386",
"4WS:seamonkey-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-0:1.0.9-71.el4.s390",
"4WS:seamonkey-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-0:1.0.9-71.el4.src",
"4WS:seamonkey-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-chat-0:1.0.9-71.el4.i386",
"4WS:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-chat-0:1.0.9-71.el4.s390",
"4WS:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-devel-0:1.0.9-71.el4.i386",
"4WS:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-devel-0:1.0.9-71.el4.s390",
"4WS:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-mail-0:1.0.9-71.el4.i386",
"4WS:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-mail-0:1.0.9-71.el4.s390",
"4WS:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-mail-0:1.0.9-71.el4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-2373"
},
{
"category": "external",
"summary": "RHBZ#714577",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=714577"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-2373",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2373"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-2373",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-2373"
}
],
"release_date": "2011-06-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-06-21T22:42:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"4AS:seamonkey-0:1.0.9-71.el4.i386",
"4AS:seamonkey-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-0:1.0.9-71.el4.s390",
"4AS:seamonkey-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-0:1.0.9-71.el4.src",
"4AS:seamonkey-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-chat-0:1.0.9-71.el4.i386",
"4AS:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-chat-0:1.0.9-71.el4.s390",
"4AS:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-devel-0:1.0.9-71.el4.i386",
"4AS:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-devel-0:1.0.9-71.el4.s390",
"4AS:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-mail-0:1.0.9-71.el4.i386",
"4AS:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-mail-0:1.0.9-71.el4.s390",
"4AS:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-mail-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-0:1.0.9-71.el4.src",
"4Desktop:seamonkey-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-0:1.0.9-71.el4.i386",
"4ES:seamonkey-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-0:1.0.9-71.el4.s390",
"4ES:seamonkey-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-0:1.0.9-71.el4.src",
"4ES:seamonkey-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-chat-0:1.0.9-71.el4.i386",
"4ES:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-chat-0:1.0.9-71.el4.s390",
"4ES:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-devel-0:1.0.9-71.el4.i386",
"4ES:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-devel-0:1.0.9-71.el4.s390",
"4ES:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-mail-0:1.0.9-71.el4.i386",
"4ES:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-mail-0:1.0.9-71.el4.s390",
"4ES:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-mail-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-0:1.0.9-71.el4.i386",
"4WS:seamonkey-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-0:1.0.9-71.el4.s390",
"4WS:seamonkey-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-0:1.0.9-71.el4.src",
"4WS:seamonkey-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-chat-0:1.0.9-71.el4.i386",
"4WS:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-chat-0:1.0.9-71.el4.s390",
"4WS:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-devel-0:1.0.9-71.el4.i386",
"4WS:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-devel-0:1.0.9-71.el4.s390",
"4WS:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-mail-0:1.0.9-71.el4.i386",
"4WS:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-mail-0:1.0.9-71.el4.s390",
"4WS:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-mail-0:1.0.9-71.el4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:0888"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS:seamonkey-0:1.0.9-71.el4.i386",
"4AS:seamonkey-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-0:1.0.9-71.el4.s390",
"4AS:seamonkey-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-0:1.0.9-71.el4.src",
"4AS:seamonkey-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-chat-0:1.0.9-71.el4.i386",
"4AS:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-chat-0:1.0.9-71.el4.s390",
"4AS:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-devel-0:1.0.9-71.el4.i386",
"4AS:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-devel-0:1.0.9-71.el4.s390",
"4AS:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-mail-0:1.0.9-71.el4.i386",
"4AS:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-mail-0:1.0.9-71.el4.s390",
"4AS:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-mail-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-0:1.0.9-71.el4.src",
"4Desktop:seamonkey-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-0:1.0.9-71.el4.i386",
"4ES:seamonkey-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-0:1.0.9-71.el4.s390",
"4ES:seamonkey-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-0:1.0.9-71.el4.src",
"4ES:seamonkey-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-chat-0:1.0.9-71.el4.i386",
"4ES:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-chat-0:1.0.9-71.el4.s390",
"4ES:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-devel-0:1.0.9-71.el4.i386",
"4ES:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-devel-0:1.0.9-71.el4.s390",
"4ES:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-mail-0:1.0.9-71.el4.i386",
"4ES:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-mail-0:1.0.9-71.el4.s390",
"4ES:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-mail-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-0:1.0.9-71.el4.i386",
"4WS:seamonkey-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-0:1.0.9-71.el4.s390",
"4WS:seamonkey-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-0:1.0.9-71.el4.src",
"4WS:seamonkey-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-chat-0:1.0.9-71.el4.i386",
"4WS:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-chat-0:1.0.9-71.el4.s390",
"4WS:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-devel-0:1.0.9-71.el4.i386",
"4WS:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-devel-0:1.0.9-71.el4.s390",
"4WS:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-mail-0:1.0.9-71.el4.i386",
"4WS:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-mail-0:1.0.9-71.el4.s390",
"4WS:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-mail-0:1.0.9-71.el4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "Mozilla Use-after-free vulnerability when viewing XUL document with script disabled (MFSA 2011-20)"
},
{
"cve": "CVE-2011-2374",
"discovery_date": "2011-06-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "714576"
}
],
"notes": [
{
"category": "description",
"text": "Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 3.6.18 and 4.x through 4.0.1, and Thunderbird before 3.1.11, allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Mozilla Miscellaneous memory safety hazards (MFSA 2011-19)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS:seamonkey-0:1.0.9-71.el4.i386",
"4AS:seamonkey-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-0:1.0.9-71.el4.s390",
"4AS:seamonkey-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-0:1.0.9-71.el4.src",
"4AS:seamonkey-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-chat-0:1.0.9-71.el4.i386",
"4AS:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-chat-0:1.0.9-71.el4.s390",
"4AS:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-devel-0:1.0.9-71.el4.i386",
"4AS:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-devel-0:1.0.9-71.el4.s390",
"4AS:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-mail-0:1.0.9-71.el4.i386",
"4AS:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-mail-0:1.0.9-71.el4.s390",
"4AS:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-mail-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-0:1.0.9-71.el4.src",
"4Desktop:seamonkey-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-0:1.0.9-71.el4.i386",
"4ES:seamonkey-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-0:1.0.9-71.el4.s390",
"4ES:seamonkey-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-0:1.0.9-71.el4.src",
"4ES:seamonkey-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-chat-0:1.0.9-71.el4.i386",
"4ES:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-chat-0:1.0.9-71.el4.s390",
"4ES:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-devel-0:1.0.9-71.el4.i386",
"4ES:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-devel-0:1.0.9-71.el4.s390",
"4ES:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-mail-0:1.0.9-71.el4.i386",
"4ES:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-mail-0:1.0.9-71.el4.s390",
"4ES:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-mail-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-0:1.0.9-71.el4.i386",
"4WS:seamonkey-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-0:1.0.9-71.el4.s390",
"4WS:seamonkey-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-0:1.0.9-71.el4.src",
"4WS:seamonkey-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-chat-0:1.0.9-71.el4.i386",
"4WS:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-chat-0:1.0.9-71.el4.s390",
"4WS:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-devel-0:1.0.9-71.el4.i386",
"4WS:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-devel-0:1.0.9-71.el4.s390",
"4WS:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-mail-0:1.0.9-71.el4.i386",
"4WS:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-mail-0:1.0.9-71.el4.s390",
"4WS:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-mail-0:1.0.9-71.el4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-2374"
},
{
"category": "external",
"summary": "RHBZ#714576",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=714576"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-2374",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2374"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-2374",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-2374"
}
],
"release_date": "2011-06-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-06-21T22:42:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"4AS:seamonkey-0:1.0.9-71.el4.i386",
"4AS:seamonkey-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-0:1.0.9-71.el4.s390",
"4AS:seamonkey-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-0:1.0.9-71.el4.src",
"4AS:seamonkey-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-chat-0:1.0.9-71.el4.i386",
"4AS:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-chat-0:1.0.9-71.el4.s390",
"4AS:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-devel-0:1.0.9-71.el4.i386",
"4AS:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-devel-0:1.0.9-71.el4.s390",
"4AS:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-mail-0:1.0.9-71.el4.i386",
"4AS:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-mail-0:1.0.9-71.el4.s390",
"4AS:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-mail-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-0:1.0.9-71.el4.src",
"4Desktop:seamonkey-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-0:1.0.9-71.el4.i386",
"4ES:seamonkey-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-0:1.0.9-71.el4.s390",
"4ES:seamonkey-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-0:1.0.9-71.el4.src",
"4ES:seamonkey-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-chat-0:1.0.9-71.el4.i386",
"4ES:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-chat-0:1.0.9-71.el4.s390",
"4ES:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-devel-0:1.0.9-71.el4.i386",
"4ES:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-devel-0:1.0.9-71.el4.s390",
"4ES:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-mail-0:1.0.9-71.el4.i386",
"4ES:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-mail-0:1.0.9-71.el4.s390",
"4ES:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-mail-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-0:1.0.9-71.el4.i386",
"4WS:seamonkey-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-0:1.0.9-71.el4.s390",
"4WS:seamonkey-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-0:1.0.9-71.el4.src",
"4WS:seamonkey-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-chat-0:1.0.9-71.el4.i386",
"4WS:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-chat-0:1.0.9-71.el4.s390",
"4WS:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-devel-0:1.0.9-71.el4.i386",
"4WS:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-devel-0:1.0.9-71.el4.s390",
"4WS:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-mail-0:1.0.9-71.el4.i386",
"4WS:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-mail-0:1.0.9-71.el4.s390",
"4WS:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-mail-0:1.0.9-71.el4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:0888"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS:seamonkey-0:1.0.9-71.el4.i386",
"4AS:seamonkey-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-0:1.0.9-71.el4.s390",
"4AS:seamonkey-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-0:1.0.9-71.el4.src",
"4AS:seamonkey-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-chat-0:1.0.9-71.el4.i386",
"4AS:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-chat-0:1.0.9-71.el4.s390",
"4AS:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-devel-0:1.0.9-71.el4.i386",
"4AS:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-devel-0:1.0.9-71.el4.s390",
"4AS:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-mail-0:1.0.9-71.el4.i386",
"4AS:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-mail-0:1.0.9-71.el4.s390",
"4AS:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-mail-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-0:1.0.9-71.el4.src",
"4Desktop:seamonkey-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-0:1.0.9-71.el4.i386",
"4ES:seamonkey-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-0:1.0.9-71.el4.s390",
"4ES:seamonkey-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-0:1.0.9-71.el4.src",
"4ES:seamonkey-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-chat-0:1.0.9-71.el4.i386",
"4ES:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-chat-0:1.0.9-71.el4.s390",
"4ES:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-devel-0:1.0.9-71.el4.i386",
"4ES:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-devel-0:1.0.9-71.el4.s390",
"4ES:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-mail-0:1.0.9-71.el4.i386",
"4ES:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-mail-0:1.0.9-71.el4.s390",
"4ES:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-mail-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-0:1.0.9-71.el4.i386",
"4WS:seamonkey-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-0:1.0.9-71.el4.s390",
"4WS:seamonkey-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-0:1.0.9-71.el4.src",
"4WS:seamonkey-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-chat-0:1.0.9-71.el4.i386",
"4WS:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-chat-0:1.0.9-71.el4.s390",
"4WS:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-devel-0:1.0.9-71.el4.i386",
"4WS:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-devel-0:1.0.9-71.el4.s390",
"4WS:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-mail-0:1.0.9-71.el4.i386",
"4WS:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-mail-0:1.0.9-71.el4.s390",
"4WS:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-mail-0:1.0.9-71.el4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "Mozilla Miscellaneous memory safety hazards (MFSA 2011-19)"
},
{
"cve": "CVE-2011-2375",
"discovery_date": "2011-06-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "714576"
}
],
"notes": [
{
"category": "description",
"text": "Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 5.0 and Thunderbird through 3.1.11 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Mozilla Miscellaneous memory safety hazards (MFSA 2011-19)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS:seamonkey-0:1.0.9-71.el4.i386",
"4AS:seamonkey-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-0:1.0.9-71.el4.s390",
"4AS:seamonkey-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-0:1.0.9-71.el4.src",
"4AS:seamonkey-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-chat-0:1.0.9-71.el4.i386",
"4AS:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-chat-0:1.0.9-71.el4.s390",
"4AS:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-devel-0:1.0.9-71.el4.i386",
"4AS:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-devel-0:1.0.9-71.el4.s390",
"4AS:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-mail-0:1.0.9-71.el4.i386",
"4AS:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-mail-0:1.0.9-71.el4.s390",
"4AS:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-mail-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-0:1.0.9-71.el4.src",
"4Desktop:seamonkey-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-0:1.0.9-71.el4.i386",
"4ES:seamonkey-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-0:1.0.9-71.el4.s390",
"4ES:seamonkey-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-0:1.0.9-71.el4.src",
"4ES:seamonkey-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-chat-0:1.0.9-71.el4.i386",
"4ES:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-chat-0:1.0.9-71.el4.s390",
"4ES:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-devel-0:1.0.9-71.el4.i386",
"4ES:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-devel-0:1.0.9-71.el4.s390",
"4ES:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-mail-0:1.0.9-71.el4.i386",
"4ES:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-mail-0:1.0.9-71.el4.s390",
"4ES:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-mail-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-0:1.0.9-71.el4.i386",
"4WS:seamonkey-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-0:1.0.9-71.el4.s390",
"4WS:seamonkey-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-0:1.0.9-71.el4.src",
"4WS:seamonkey-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-chat-0:1.0.9-71.el4.i386",
"4WS:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-chat-0:1.0.9-71.el4.s390",
"4WS:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-devel-0:1.0.9-71.el4.i386",
"4WS:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-devel-0:1.0.9-71.el4.s390",
"4WS:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-mail-0:1.0.9-71.el4.i386",
"4WS:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-mail-0:1.0.9-71.el4.s390",
"4WS:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-mail-0:1.0.9-71.el4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-2375"
},
{
"category": "external",
"summary": "RHBZ#714576",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=714576"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-2375",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2375"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-2375",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-2375"
}
],
"release_date": "2011-06-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-06-21T22:42:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"4AS:seamonkey-0:1.0.9-71.el4.i386",
"4AS:seamonkey-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-0:1.0.9-71.el4.s390",
"4AS:seamonkey-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-0:1.0.9-71.el4.src",
"4AS:seamonkey-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-chat-0:1.0.9-71.el4.i386",
"4AS:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-chat-0:1.0.9-71.el4.s390",
"4AS:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-devel-0:1.0.9-71.el4.i386",
"4AS:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-devel-0:1.0.9-71.el4.s390",
"4AS:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-mail-0:1.0.9-71.el4.i386",
"4AS:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-mail-0:1.0.9-71.el4.s390",
"4AS:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-mail-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-0:1.0.9-71.el4.src",
"4Desktop:seamonkey-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-0:1.0.9-71.el4.i386",
"4ES:seamonkey-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-0:1.0.9-71.el4.s390",
"4ES:seamonkey-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-0:1.0.9-71.el4.src",
"4ES:seamonkey-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-chat-0:1.0.9-71.el4.i386",
"4ES:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-chat-0:1.0.9-71.el4.s390",
"4ES:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-devel-0:1.0.9-71.el4.i386",
"4ES:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-devel-0:1.0.9-71.el4.s390",
"4ES:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-mail-0:1.0.9-71.el4.i386",
"4ES:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-mail-0:1.0.9-71.el4.s390",
"4ES:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-mail-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-0:1.0.9-71.el4.i386",
"4WS:seamonkey-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-0:1.0.9-71.el4.s390",
"4WS:seamonkey-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-0:1.0.9-71.el4.src",
"4WS:seamonkey-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-chat-0:1.0.9-71.el4.i386",
"4WS:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-chat-0:1.0.9-71.el4.s390",
"4WS:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-devel-0:1.0.9-71.el4.i386",
"4WS:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-devel-0:1.0.9-71.el4.s390",
"4WS:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-mail-0:1.0.9-71.el4.i386",
"4WS:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-mail-0:1.0.9-71.el4.s390",
"4WS:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-mail-0:1.0.9-71.el4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:0888"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS:seamonkey-0:1.0.9-71.el4.i386",
"4AS:seamonkey-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-0:1.0.9-71.el4.s390",
"4AS:seamonkey-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-0:1.0.9-71.el4.src",
"4AS:seamonkey-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-chat-0:1.0.9-71.el4.i386",
"4AS:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-chat-0:1.0.9-71.el4.s390",
"4AS:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-devel-0:1.0.9-71.el4.i386",
"4AS:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-devel-0:1.0.9-71.el4.s390",
"4AS:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-mail-0:1.0.9-71.el4.i386",
"4AS:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-mail-0:1.0.9-71.el4.s390",
"4AS:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-mail-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-0:1.0.9-71.el4.src",
"4Desktop:seamonkey-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-0:1.0.9-71.el4.i386",
"4ES:seamonkey-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-0:1.0.9-71.el4.s390",
"4ES:seamonkey-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-0:1.0.9-71.el4.src",
"4ES:seamonkey-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-chat-0:1.0.9-71.el4.i386",
"4ES:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-chat-0:1.0.9-71.el4.s390",
"4ES:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-devel-0:1.0.9-71.el4.i386",
"4ES:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-devel-0:1.0.9-71.el4.s390",
"4ES:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-mail-0:1.0.9-71.el4.i386",
"4ES:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-mail-0:1.0.9-71.el4.s390",
"4ES:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-mail-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-0:1.0.9-71.el4.i386",
"4WS:seamonkey-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-0:1.0.9-71.el4.s390",
"4WS:seamonkey-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-0:1.0.9-71.el4.src",
"4WS:seamonkey-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-chat-0:1.0.9-71.el4.i386",
"4WS:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-chat-0:1.0.9-71.el4.s390",
"4WS:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-devel-0:1.0.9-71.el4.i386",
"4WS:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-devel-0:1.0.9-71.el4.s390",
"4WS:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-mail-0:1.0.9-71.el4.i386",
"4WS:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-mail-0:1.0.9-71.el4.s390",
"4WS:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-mail-0:1.0.9-71.el4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "Mozilla Miscellaneous memory safety hazards (MFSA 2011-19)"
},
{
"cve": "CVE-2011-2376",
"discovery_date": "2011-06-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "714576"
}
],
"notes": [
{
"category": "description",
"text": "Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 3.6.18 and Thunderbird before 3.1.11 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Mozilla Miscellaneous memory safety hazards (MFSA 2011-19)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS:seamonkey-0:1.0.9-71.el4.i386",
"4AS:seamonkey-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-0:1.0.9-71.el4.s390",
"4AS:seamonkey-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-0:1.0.9-71.el4.src",
"4AS:seamonkey-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-chat-0:1.0.9-71.el4.i386",
"4AS:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-chat-0:1.0.9-71.el4.s390",
"4AS:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-devel-0:1.0.9-71.el4.i386",
"4AS:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-devel-0:1.0.9-71.el4.s390",
"4AS:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-mail-0:1.0.9-71.el4.i386",
"4AS:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-mail-0:1.0.9-71.el4.s390",
"4AS:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-mail-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-0:1.0.9-71.el4.src",
"4Desktop:seamonkey-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-0:1.0.9-71.el4.i386",
"4ES:seamonkey-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-0:1.0.9-71.el4.s390",
"4ES:seamonkey-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-0:1.0.9-71.el4.src",
"4ES:seamonkey-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-chat-0:1.0.9-71.el4.i386",
"4ES:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-chat-0:1.0.9-71.el4.s390",
"4ES:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-devel-0:1.0.9-71.el4.i386",
"4ES:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-devel-0:1.0.9-71.el4.s390",
"4ES:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-mail-0:1.0.9-71.el4.i386",
"4ES:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-mail-0:1.0.9-71.el4.s390",
"4ES:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-mail-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-0:1.0.9-71.el4.i386",
"4WS:seamonkey-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-0:1.0.9-71.el4.s390",
"4WS:seamonkey-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-0:1.0.9-71.el4.src",
"4WS:seamonkey-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-chat-0:1.0.9-71.el4.i386",
"4WS:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-chat-0:1.0.9-71.el4.s390",
"4WS:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-devel-0:1.0.9-71.el4.i386",
"4WS:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-devel-0:1.0.9-71.el4.s390",
"4WS:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-mail-0:1.0.9-71.el4.i386",
"4WS:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-mail-0:1.0.9-71.el4.s390",
"4WS:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-mail-0:1.0.9-71.el4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-2376"
},
{
"category": "external",
"summary": "RHBZ#714576",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=714576"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-2376",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2376"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-2376",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-2376"
}
],
"release_date": "2011-06-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-06-21T22:42:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"4AS:seamonkey-0:1.0.9-71.el4.i386",
"4AS:seamonkey-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-0:1.0.9-71.el4.s390",
"4AS:seamonkey-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-0:1.0.9-71.el4.src",
"4AS:seamonkey-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-chat-0:1.0.9-71.el4.i386",
"4AS:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-chat-0:1.0.9-71.el4.s390",
"4AS:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-devel-0:1.0.9-71.el4.i386",
"4AS:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-devel-0:1.0.9-71.el4.s390",
"4AS:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-mail-0:1.0.9-71.el4.i386",
"4AS:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-mail-0:1.0.9-71.el4.s390",
"4AS:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-mail-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-0:1.0.9-71.el4.src",
"4Desktop:seamonkey-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-0:1.0.9-71.el4.i386",
"4ES:seamonkey-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-0:1.0.9-71.el4.s390",
"4ES:seamonkey-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-0:1.0.9-71.el4.src",
"4ES:seamonkey-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-chat-0:1.0.9-71.el4.i386",
"4ES:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-chat-0:1.0.9-71.el4.s390",
"4ES:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-devel-0:1.0.9-71.el4.i386",
"4ES:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-devel-0:1.0.9-71.el4.s390",
"4ES:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-mail-0:1.0.9-71.el4.i386",
"4ES:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-mail-0:1.0.9-71.el4.s390",
"4ES:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-mail-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-0:1.0.9-71.el4.i386",
"4WS:seamonkey-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-0:1.0.9-71.el4.s390",
"4WS:seamonkey-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-0:1.0.9-71.el4.src",
"4WS:seamonkey-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-chat-0:1.0.9-71.el4.i386",
"4WS:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-chat-0:1.0.9-71.el4.s390",
"4WS:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-devel-0:1.0.9-71.el4.i386",
"4WS:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-devel-0:1.0.9-71.el4.s390",
"4WS:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-mail-0:1.0.9-71.el4.i386",
"4WS:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-mail-0:1.0.9-71.el4.s390",
"4WS:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-mail-0:1.0.9-71.el4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:0888"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS:seamonkey-0:1.0.9-71.el4.i386",
"4AS:seamonkey-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-0:1.0.9-71.el4.s390",
"4AS:seamonkey-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-0:1.0.9-71.el4.src",
"4AS:seamonkey-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-chat-0:1.0.9-71.el4.i386",
"4AS:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-chat-0:1.0.9-71.el4.s390",
"4AS:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-devel-0:1.0.9-71.el4.i386",
"4AS:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-devel-0:1.0.9-71.el4.s390",
"4AS:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-mail-0:1.0.9-71.el4.i386",
"4AS:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-mail-0:1.0.9-71.el4.s390",
"4AS:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-mail-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-0:1.0.9-71.el4.src",
"4Desktop:seamonkey-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-0:1.0.9-71.el4.i386",
"4ES:seamonkey-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-0:1.0.9-71.el4.s390",
"4ES:seamonkey-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-0:1.0.9-71.el4.src",
"4ES:seamonkey-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-chat-0:1.0.9-71.el4.i386",
"4ES:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-chat-0:1.0.9-71.el4.s390",
"4ES:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-devel-0:1.0.9-71.el4.i386",
"4ES:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-devel-0:1.0.9-71.el4.s390",
"4ES:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-mail-0:1.0.9-71.el4.i386",
"4ES:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-mail-0:1.0.9-71.el4.s390",
"4ES:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-mail-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-0:1.0.9-71.el4.i386",
"4WS:seamonkey-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-0:1.0.9-71.el4.s390",
"4WS:seamonkey-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-0:1.0.9-71.el4.src",
"4WS:seamonkey-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-chat-0:1.0.9-71.el4.i386",
"4WS:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-chat-0:1.0.9-71.el4.s390",
"4WS:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-devel-0:1.0.9-71.el4.i386",
"4WS:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-devel-0:1.0.9-71.el4.s390",
"4WS:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-mail-0:1.0.9-71.el4.i386",
"4WS:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-mail-0:1.0.9-71.el4.s390",
"4WS:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-mail-0:1.0.9-71.el4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "Mozilla Miscellaneous memory safety hazards (MFSA 2011-19)"
},
{
"cve": "CVE-2011-2377",
"discovery_date": "2011-06-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "714929"
}
],
"notes": [
{
"category": "description",
"text": "Mozilla Firefox before 3.6.18 and 4.x through 4.0.1, Thunderbird before 3.1.11, and SeaMonkey through 2.0.14 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via a multipart/x-mixed-replace image.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Mozilla Crash caused by corrupted JPEG image (MFSA 2011-21)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS:seamonkey-0:1.0.9-71.el4.i386",
"4AS:seamonkey-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-0:1.0.9-71.el4.s390",
"4AS:seamonkey-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-0:1.0.9-71.el4.src",
"4AS:seamonkey-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-chat-0:1.0.9-71.el4.i386",
"4AS:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-chat-0:1.0.9-71.el4.s390",
"4AS:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-devel-0:1.0.9-71.el4.i386",
"4AS:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-devel-0:1.0.9-71.el4.s390",
"4AS:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-mail-0:1.0.9-71.el4.i386",
"4AS:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-mail-0:1.0.9-71.el4.s390",
"4AS:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-mail-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-0:1.0.9-71.el4.src",
"4Desktop:seamonkey-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-0:1.0.9-71.el4.i386",
"4ES:seamonkey-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-0:1.0.9-71.el4.s390",
"4ES:seamonkey-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-0:1.0.9-71.el4.src",
"4ES:seamonkey-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-chat-0:1.0.9-71.el4.i386",
"4ES:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-chat-0:1.0.9-71.el4.s390",
"4ES:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-devel-0:1.0.9-71.el4.i386",
"4ES:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-devel-0:1.0.9-71.el4.s390",
"4ES:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-mail-0:1.0.9-71.el4.i386",
"4ES:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-mail-0:1.0.9-71.el4.s390",
"4ES:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-mail-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-0:1.0.9-71.el4.i386",
"4WS:seamonkey-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-0:1.0.9-71.el4.s390",
"4WS:seamonkey-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-0:1.0.9-71.el4.src",
"4WS:seamonkey-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-chat-0:1.0.9-71.el4.i386",
"4WS:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-chat-0:1.0.9-71.el4.s390",
"4WS:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-devel-0:1.0.9-71.el4.i386",
"4WS:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-devel-0:1.0.9-71.el4.s390",
"4WS:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-mail-0:1.0.9-71.el4.i386",
"4WS:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-mail-0:1.0.9-71.el4.s390",
"4WS:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-mail-0:1.0.9-71.el4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-2377"
},
{
"category": "external",
"summary": "RHBZ#714929",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=714929"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-2377",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2377"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-2377",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-2377"
}
],
"release_date": "2011-06-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-06-21T22:42:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"4AS:seamonkey-0:1.0.9-71.el4.i386",
"4AS:seamonkey-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-0:1.0.9-71.el4.s390",
"4AS:seamonkey-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-0:1.0.9-71.el4.src",
"4AS:seamonkey-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-chat-0:1.0.9-71.el4.i386",
"4AS:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-chat-0:1.0.9-71.el4.s390",
"4AS:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-devel-0:1.0.9-71.el4.i386",
"4AS:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-devel-0:1.0.9-71.el4.s390",
"4AS:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-mail-0:1.0.9-71.el4.i386",
"4AS:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-mail-0:1.0.9-71.el4.s390",
"4AS:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-mail-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-0:1.0.9-71.el4.src",
"4Desktop:seamonkey-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-0:1.0.9-71.el4.i386",
"4ES:seamonkey-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-0:1.0.9-71.el4.s390",
"4ES:seamonkey-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-0:1.0.9-71.el4.src",
"4ES:seamonkey-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-chat-0:1.0.9-71.el4.i386",
"4ES:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-chat-0:1.0.9-71.el4.s390",
"4ES:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-devel-0:1.0.9-71.el4.i386",
"4ES:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-devel-0:1.0.9-71.el4.s390",
"4ES:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-mail-0:1.0.9-71.el4.i386",
"4ES:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-mail-0:1.0.9-71.el4.s390",
"4ES:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-mail-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-0:1.0.9-71.el4.i386",
"4WS:seamonkey-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-0:1.0.9-71.el4.s390",
"4WS:seamonkey-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-0:1.0.9-71.el4.src",
"4WS:seamonkey-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-chat-0:1.0.9-71.el4.i386",
"4WS:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-chat-0:1.0.9-71.el4.s390",
"4WS:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-devel-0:1.0.9-71.el4.i386",
"4WS:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-devel-0:1.0.9-71.el4.s390",
"4WS:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-mail-0:1.0.9-71.el4.i386",
"4WS:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-mail-0:1.0.9-71.el4.s390",
"4WS:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-mail-0:1.0.9-71.el4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:0888"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS:seamonkey-0:1.0.9-71.el4.i386",
"4AS:seamonkey-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-0:1.0.9-71.el4.s390",
"4AS:seamonkey-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-0:1.0.9-71.el4.src",
"4AS:seamonkey-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-chat-0:1.0.9-71.el4.i386",
"4AS:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-chat-0:1.0.9-71.el4.s390",
"4AS:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-devel-0:1.0.9-71.el4.i386",
"4AS:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-devel-0:1.0.9-71.el4.s390",
"4AS:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-mail-0:1.0.9-71.el4.i386",
"4AS:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-mail-0:1.0.9-71.el4.s390",
"4AS:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-mail-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-0:1.0.9-71.el4.src",
"4Desktop:seamonkey-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-0:1.0.9-71.el4.i386",
"4ES:seamonkey-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-0:1.0.9-71.el4.s390",
"4ES:seamonkey-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-0:1.0.9-71.el4.src",
"4ES:seamonkey-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-chat-0:1.0.9-71.el4.i386",
"4ES:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-chat-0:1.0.9-71.el4.s390",
"4ES:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-devel-0:1.0.9-71.el4.i386",
"4ES:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-devel-0:1.0.9-71.el4.s390",
"4ES:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-mail-0:1.0.9-71.el4.i386",
"4ES:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-mail-0:1.0.9-71.el4.s390",
"4ES:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-mail-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-0:1.0.9-71.el4.i386",
"4WS:seamonkey-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-0:1.0.9-71.el4.s390",
"4WS:seamonkey-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-0:1.0.9-71.el4.src",
"4WS:seamonkey-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-chat-0:1.0.9-71.el4.i386",
"4WS:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-chat-0:1.0.9-71.el4.s390",
"4WS:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-devel-0:1.0.9-71.el4.i386",
"4WS:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-devel-0:1.0.9-71.el4.s390",
"4WS:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-mail-0:1.0.9-71.el4.i386",
"4WS:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-mail-0:1.0.9-71.el4.s390",
"4WS:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-mail-0:1.0.9-71.el4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "Mozilla Crash caused by corrupted JPEG image (MFSA 2011-21)"
},
{
"cve": "CVE-2011-2605",
"discovery_date": "2011-06-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "714576"
}
],
"notes": [
{
"category": "description",
"text": "CRLF injection vulnerability in the nsCookieService::SetCookieStringInternal function in netwerk/cookie/nsCookieService.cpp in Mozilla Firefox before 3.6.18 and 4.x through 4.0.1, and Thunderbird before 3.1.11, allows remote attackers to bypass intended access restrictions via a string containing a \\n (newline) character, which is not properly handled in a JavaScript \"document.cookie =\" expression, a different vulnerability than CVE-2011-2374.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Mozilla Miscellaneous memory safety hazards (MFSA 2011-19)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS:seamonkey-0:1.0.9-71.el4.i386",
"4AS:seamonkey-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-0:1.0.9-71.el4.s390",
"4AS:seamonkey-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-0:1.0.9-71.el4.src",
"4AS:seamonkey-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-chat-0:1.0.9-71.el4.i386",
"4AS:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-chat-0:1.0.9-71.el4.s390",
"4AS:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-devel-0:1.0.9-71.el4.i386",
"4AS:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-devel-0:1.0.9-71.el4.s390",
"4AS:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-mail-0:1.0.9-71.el4.i386",
"4AS:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-mail-0:1.0.9-71.el4.s390",
"4AS:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-mail-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-0:1.0.9-71.el4.src",
"4Desktop:seamonkey-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-0:1.0.9-71.el4.i386",
"4ES:seamonkey-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-0:1.0.9-71.el4.s390",
"4ES:seamonkey-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-0:1.0.9-71.el4.src",
"4ES:seamonkey-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-chat-0:1.0.9-71.el4.i386",
"4ES:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-chat-0:1.0.9-71.el4.s390",
"4ES:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-devel-0:1.0.9-71.el4.i386",
"4ES:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-devel-0:1.0.9-71.el4.s390",
"4ES:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-mail-0:1.0.9-71.el4.i386",
"4ES:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-mail-0:1.0.9-71.el4.s390",
"4ES:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-mail-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-0:1.0.9-71.el4.i386",
"4WS:seamonkey-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-0:1.0.9-71.el4.s390",
"4WS:seamonkey-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-0:1.0.9-71.el4.src",
"4WS:seamonkey-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-chat-0:1.0.9-71.el4.i386",
"4WS:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-chat-0:1.0.9-71.el4.s390",
"4WS:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-devel-0:1.0.9-71.el4.i386",
"4WS:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-devel-0:1.0.9-71.el4.s390",
"4WS:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-mail-0:1.0.9-71.el4.i386",
"4WS:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-mail-0:1.0.9-71.el4.s390",
"4WS:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-mail-0:1.0.9-71.el4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-2605"
},
{
"category": "external",
"summary": "RHBZ#714576",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=714576"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-2605",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2605"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-2605",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-2605"
}
],
"release_date": "2011-06-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-06-21T22:42:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"4AS:seamonkey-0:1.0.9-71.el4.i386",
"4AS:seamonkey-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-0:1.0.9-71.el4.s390",
"4AS:seamonkey-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-0:1.0.9-71.el4.src",
"4AS:seamonkey-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-chat-0:1.0.9-71.el4.i386",
"4AS:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-chat-0:1.0.9-71.el4.s390",
"4AS:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-devel-0:1.0.9-71.el4.i386",
"4AS:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-devel-0:1.0.9-71.el4.s390",
"4AS:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-mail-0:1.0.9-71.el4.i386",
"4AS:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-mail-0:1.0.9-71.el4.s390",
"4AS:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-mail-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-0:1.0.9-71.el4.src",
"4Desktop:seamonkey-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-0:1.0.9-71.el4.i386",
"4ES:seamonkey-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-0:1.0.9-71.el4.s390",
"4ES:seamonkey-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-0:1.0.9-71.el4.src",
"4ES:seamonkey-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-chat-0:1.0.9-71.el4.i386",
"4ES:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-chat-0:1.0.9-71.el4.s390",
"4ES:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-devel-0:1.0.9-71.el4.i386",
"4ES:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-devel-0:1.0.9-71.el4.s390",
"4ES:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-mail-0:1.0.9-71.el4.i386",
"4ES:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-mail-0:1.0.9-71.el4.s390",
"4ES:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-mail-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-0:1.0.9-71.el4.i386",
"4WS:seamonkey-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-0:1.0.9-71.el4.s390",
"4WS:seamonkey-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-0:1.0.9-71.el4.src",
"4WS:seamonkey-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-chat-0:1.0.9-71.el4.i386",
"4WS:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-chat-0:1.0.9-71.el4.s390",
"4WS:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-devel-0:1.0.9-71.el4.i386",
"4WS:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-devel-0:1.0.9-71.el4.s390",
"4WS:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-mail-0:1.0.9-71.el4.i386",
"4WS:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-mail-0:1.0.9-71.el4.s390",
"4WS:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-mail-0:1.0.9-71.el4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:0888"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS:seamonkey-0:1.0.9-71.el4.i386",
"4AS:seamonkey-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-0:1.0.9-71.el4.s390",
"4AS:seamonkey-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-0:1.0.9-71.el4.src",
"4AS:seamonkey-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-chat-0:1.0.9-71.el4.i386",
"4AS:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-chat-0:1.0.9-71.el4.s390",
"4AS:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-devel-0:1.0.9-71.el4.i386",
"4AS:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-devel-0:1.0.9-71.el4.s390",
"4AS:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4AS:seamonkey-mail-0:1.0.9-71.el4.i386",
"4AS:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4AS:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4AS:seamonkey-mail-0:1.0.9-71.el4.s390",
"4AS:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4AS:seamonkey-mail-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-0:1.0.9-71.el4.src",
"4Desktop:seamonkey-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.i386",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.s390",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4Desktop:seamonkey-mail-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-0:1.0.9-71.el4.i386",
"4ES:seamonkey-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-0:1.0.9-71.el4.s390",
"4ES:seamonkey-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-0:1.0.9-71.el4.src",
"4ES:seamonkey-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-chat-0:1.0.9-71.el4.i386",
"4ES:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-chat-0:1.0.9-71.el4.s390",
"4ES:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-devel-0:1.0.9-71.el4.i386",
"4ES:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-devel-0:1.0.9-71.el4.s390",
"4ES:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4ES:seamonkey-mail-0:1.0.9-71.el4.i386",
"4ES:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4ES:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4ES:seamonkey-mail-0:1.0.9-71.el4.s390",
"4ES:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4ES:seamonkey-mail-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-0:1.0.9-71.el4.i386",
"4WS:seamonkey-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-0:1.0.9-71.el4.s390",
"4WS:seamonkey-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-0:1.0.9-71.el4.src",
"4WS:seamonkey-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-chat-0:1.0.9-71.el4.i386",
"4WS:seamonkey-chat-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-chat-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-chat-0:1.0.9-71.el4.s390",
"4WS:seamonkey-chat-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-chat-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.i386",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.s390",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-debuginfo-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-devel-0:1.0.9-71.el4.i386",
"4WS:seamonkey-devel-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-devel-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-devel-0:1.0.9-71.el4.s390",
"4WS:seamonkey-devel-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-devel-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.i386",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-dom-inspector-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.i386",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.s390",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-js-debugger-0:1.0.9-71.el4.x86_64",
"4WS:seamonkey-mail-0:1.0.9-71.el4.i386",
"4WS:seamonkey-mail-0:1.0.9-71.el4.ia64",
"4WS:seamonkey-mail-0:1.0.9-71.el4.ppc",
"4WS:seamonkey-mail-0:1.0.9-71.el4.s390",
"4WS:seamonkey-mail-0:1.0.9-71.el4.s390x",
"4WS:seamonkey-mail-0:1.0.9-71.el4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "Mozilla Miscellaneous memory safety hazards (MFSA 2011-19)"
}
]
}
RHSA-2011_0886
Vulnerability from csaf_redhat - Published: 2011-06-21 22:30 - Updated: 2024-12-01 11:54Use-after-free vulnerability in the nsSVGPathSegList::ReplaceItem function in the implementation of SVG element lists in Mozilla Firefox before 3.6.18, Thunderbird before 3.1.11, and SeaMonkey through 2.0.14 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via vectors involving a user-supplied callback.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.x86_64 | — |
Vendor Fix
fix
|
Use-after-free vulnerability in the nsXULCommandDispatcher function in Mozilla Firefox before 3.6.18, Thunderbird before 3.1.11, and SeaMonkey through 2.0.14 allows remote attackers to execute arbitrary code via a crafted XUL document that dequeues the current command updater.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.x86_64 | — |
Vendor Fix
fix
|
Mozilla Firefox before 3.6.18, Thunderbird before 3.1.11, and SeaMonkey through 2.0.14 do not distinguish between cookies for two domain names that differ only in a trailing dot, which allows remote web servers to bypass the Same Origin Policy via Set-Cookie headers.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.x86_64 | — |
Vendor Fix
fix
|
Use-after-free vulnerability in the nsSVGPointList::AppendElement function in the implementation of SVG element lists in Mozilla Firefox before 3.6.18, Thunderbird before 3.1.11, and SeaMonkey through 2.0.14 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via vectors involving a user-supplied callback.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.x86_64 | — |
Vendor Fix
fix
|
Unspecified vulnerability in the browser engine in Mozilla Firefox 3.6.x before 3.6.18 and Thunderbird before 3.1.11 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors, a different vulnerability than CVE-2011-2365.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.x86_64 | — |
Vendor Fix
fix
|
Unspecified vulnerability in the browser engine in Mozilla Firefox 3.6.x before 3.6.18 and Thunderbird before 3.1.11 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors, a different vulnerability than CVE-2011-2364.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.x86_64 | — |
Vendor Fix
fix
|
Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 3.6.18 and 4.x through 4.0.1, and Thunderbird before 3.1.11, allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.x86_64 | — |
Vendor Fix
fix
|
Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 5.0 and Thunderbird through 3.1.11 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.x86_64 | — |
Vendor Fix
fix
|
Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 3.6.18 and Thunderbird before 3.1.11 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.x86_64 | — |
Vendor Fix
fix
|
Mozilla Firefox before 3.6.18 and 4.x through 4.0.1, Thunderbird before 3.1.11, and SeaMonkey through 2.0.14 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via a multipart/x-mixed-replace image.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.x86_64 | — |
Vendor Fix
fix
|
CRLF injection vulnerability in the nsCookieService::SetCookieStringInternal function in netwerk/cookie/nsCookieService.cpp in Mozilla Firefox before 3.6.18 and 4.x through 4.0.1, and Thunderbird before 3.1.11, allows remote attackers to bypass intended access restrictions via a string containing a \n (newline) character, which is not properly handled in a JavaScript "document.cookie =" expression, a different vulnerability than CVE-2011-2374.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.x86_64 | — |
Vendor Fix
fix
|
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Critical"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An updated thunderbird package that fixes several security issues is now\navailable for Red Hat Enterprise Linux 6.\n\nThe Red Hat Security Response Team has rated this update as having critical\nsecurity impact. Common Vulnerability Scoring System (CVSS) base scores,\nwhich give detailed severity ratings, are available for each vulnerability\nfrom the CVE links in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Mozilla Thunderbird is a standalone mail and newsgroup client.\n\nA flaw was found in the way Thunderbird handled malformed JPEG images. An\nHTML mail message containing a malicious JPEG image could cause Thunderbird\nto crash or, potentially, execute arbitrary code with the privileges of the\nuser running Thunderbird. (CVE-2011-2377)\n\nMultiple dangling pointer flaws were found in Thunderbird. Malicious HTML\ncontent could cause Thunderbird to crash or, potentially, execute arbitrary\ncode with the privileges of the user running Thunderbird. (CVE-2011-0083,\nCVE-2011-0085, CVE-2011-2363)\n\nSeveral flaws were found in the processing of malformed HTML content.\nMalicious HTML content could cause Thunderbird to crash or, potentially,\nexecute arbitrary code with the privileges of the user running Thunderbird.\n(CVE-2011-2364, CVE-2011-2365, CVE-2011-2374, CVE-2011-2375, CVE-2011-2376)\n\nIt was found that Thunderbird could treat two separate cookies (for web\ncontent) as interchangeable if both were for the same domain name but one\nof those domain names had a trailing \".\" character. This violates the\nsame-origin policy and could possibly lead to data being leaked to the\nwrong domain. (CVE-2011-2362)\n\nAll Thunderbird users should upgrade to this updated package, which\nresolves these issues. All running instances of Thunderbird must be\nrestarted for the update to take effect.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2011:0886",
"url": "https://access.redhat.com/errata/RHSA-2011:0886"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#critical",
"url": "https://access.redhat.com/security/updates/classification/#critical"
},
{
"category": "external",
"summary": "714576",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=714576"
},
{
"category": "external",
"summary": "714581",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=714581"
},
{
"category": "external",
"summary": "714583",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=714583"
},
{
"category": "external",
"summary": "714929",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=714929"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2011/rhsa-2011_0886.json"
}
],
"title": "Red Hat Security Advisory: thunderbird security update",
"tracking": {
"current_release_date": "2024-12-01T11:54:05+00:00",
"generator": {
"date": "2024-12-01T11:54:05+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2011:0886",
"initial_release_date": "2011-06-21T22:30:00+00:00",
"revision_history": [
{
"date": "2011-06-21T22:30:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2011-06-21T18:39:08+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-12-01T11:54:05+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "thunderbird-0:3.1.11-2.el6_1.i686",
"product": {
"name": "thunderbird-0:3.1.11-2.el6_1.i686",
"product_id": "thunderbird-0:3.1.11-2.el6_1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/thunderbird@3.1.11-2.el6_1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "thunderbird-debuginfo-0:3.1.11-2.el6_1.i686",
"product": {
"name": "thunderbird-debuginfo-0:3.1.11-2.el6_1.i686",
"product_id": "thunderbird-debuginfo-0:3.1.11-2.el6_1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/thunderbird-debuginfo@3.1.11-2.el6_1?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "thunderbird-0:3.1.11-2.el6_1.ppc64",
"product": {
"name": "thunderbird-0:3.1.11-2.el6_1.ppc64",
"product_id": "thunderbird-0:3.1.11-2.el6_1.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/thunderbird@3.1.11-2.el6_1?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "thunderbird-debuginfo-0:3.1.11-2.el6_1.ppc64",
"product": {
"name": "thunderbird-debuginfo-0:3.1.11-2.el6_1.ppc64",
"product_id": "thunderbird-debuginfo-0:3.1.11-2.el6_1.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/thunderbird-debuginfo@3.1.11-2.el6_1?arch=ppc64"
}
}
}
],
"category": "architecture",
"name": "ppc64"
},
{
"branches": [
{
"category": "product_version",
"name": "thunderbird-0:3.1.11-2.el6_1.src",
"product": {
"name": "thunderbird-0:3.1.11-2.el6_1.src",
"product_id": "thunderbird-0:3.1.11-2.el6_1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/thunderbird@3.1.11-2.el6_1?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "thunderbird-0:3.1.11-2.el6_1.s390x",
"product": {
"name": "thunderbird-0:3.1.11-2.el6_1.s390x",
"product_id": "thunderbird-0:3.1.11-2.el6_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/thunderbird@3.1.11-2.el6_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "thunderbird-debuginfo-0:3.1.11-2.el6_1.s390x",
"product": {
"name": "thunderbird-debuginfo-0:3.1.11-2.el6_1.s390x",
"product_id": "thunderbird-debuginfo-0:3.1.11-2.el6_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/thunderbird-debuginfo@3.1.11-2.el6_1?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "thunderbird-0:3.1.11-2.el6_1.x86_64",
"product": {
"name": "thunderbird-0:3.1.11-2.el6_1.x86_64",
"product_id": "thunderbird-0:3.1.11-2.el6_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/thunderbird@3.1.11-2.el6_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "thunderbird-debuginfo-0:3.1.11-2.el6_1.x86_64",
"product": {
"name": "thunderbird-debuginfo-0:3.1.11-2.el6_1.x86_64",
"product_id": "thunderbird-debuginfo-0:3.1.11-2.el6_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/thunderbird-debuginfo@3.1.11-2.el6_1?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-0:3.1.11-2.el6_1.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.i686"
},
"product_reference": "thunderbird-0:3.1.11-2.el6_1.i686",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-0:3.1.11-2.el6_1.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.ppc64"
},
"product_reference": "thunderbird-0:3.1.11-2.el6_1.ppc64",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-0:3.1.11-2.el6_1.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.s390x"
},
"product_reference": "thunderbird-0:3.1.11-2.el6_1.s390x",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-0:3.1.11-2.el6_1.src as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.src"
},
"product_reference": "thunderbird-0:3.1.11-2.el6_1.src",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-0:3.1.11-2.el6_1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.x86_64"
},
"product_reference": "thunderbird-0:3.1.11-2.el6_1.x86_64",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-debuginfo-0:3.1.11-2.el6_1.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.i686"
},
"product_reference": "thunderbird-debuginfo-0:3.1.11-2.el6_1.i686",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-debuginfo-0:3.1.11-2.el6_1.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.ppc64"
},
"product_reference": "thunderbird-debuginfo-0:3.1.11-2.el6_1.ppc64",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-debuginfo-0:3.1.11-2.el6_1.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.s390x"
},
"product_reference": "thunderbird-debuginfo-0:3.1.11-2.el6_1.s390x",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-debuginfo-0:3.1.11-2.el6_1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.x86_64"
},
"product_reference": "thunderbird-debuginfo-0:3.1.11-2.el6_1.x86_64",
"relates_to_product_reference": "6Server-optional-6.1.z"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2011-0083",
"discovery_date": "2011-06-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "714581"
}
],
"notes": [
{
"category": "description",
"text": "Use-after-free vulnerability in the nsSVGPathSegList::ReplaceItem function in the implementation of SVG element lists in Mozilla Firefox before 3.6.18, Thunderbird before 3.1.11, and SeaMonkey through 2.0.14 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via vectors involving a user-supplied callback.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Mozilla Multiple dangling pointer vulnerabilities (MFSA 2011-23)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.i686",
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.ppc64",
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.s390x",
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.src",
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.x86_64",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.i686",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.ppc64",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.s390x",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-0083"
},
{
"category": "external",
"summary": "RHBZ#714581",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=714581"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-0083",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0083"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-0083",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-0083"
}
],
"release_date": "2011-06-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-06-21T22:30:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.i686",
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.ppc64",
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.s390x",
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.src",
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.x86_64",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.i686",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.ppc64",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.s390x",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:0886"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.i686",
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.ppc64",
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.s390x",
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.src",
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.x86_64",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.i686",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.ppc64",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.s390x",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "Mozilla Multiple dangling pointer vulnerabilities (MFSA 2011-23)"
},
{
"cve": "CVE-2011-0085",
"discovery_date": "2011-06-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "714581"
}
],
"notes": [
{
"category": "description",
"text": "Use-after-free vulnerability in the nsXULCommandDispatcher function in Mozilla Firefox before 3.6.18, Thunderbird before 3.1.11, and SeaMonkey through 2.0.14 allows remote attackers to execute arbitrary code via a crafted XUL document that dequeues the current command updater.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Mozilla Multiple dangling pointer vulnerabilities (MFSA 2011-23)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.i686",
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.ppc64",
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.s390x",
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.src",
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.x86_64",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.i686",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.ppc64",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.s390x",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-0085"
},
{
"category": "external",
"summary": "RHBZ#714581",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=714581"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-0085",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0085"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-0085",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-0085"
}
],
"release_date": "2011-06-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-06-21T22:30:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.i686",
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.ppc64",
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.s390x",
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.src",
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.x86_64",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.i686",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.ppc64",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.s390x",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:0886"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.i686",
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.ppc64",
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.s390x",
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.src",
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.x86_64",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.i686",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.ppc64",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.s390x",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "Mozilla Multiple dangling pointer vulnerabilities (MFSA 2011-23)"
},
{
"cve": "CVE-2011-2362",
"discovery_date": "2011-06-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "714583"
}
],
"notes": [
{
"category": "description",
"text": "Mozilla Firefox before 3.6.18, Thunderbird before 3.1.11, and SeaMonkey through 2.0.14 do not distinguish between cookies for two domain names that differ only in a trailing dot, which allows remote web servers to bypass the Same Origin Policy via Set-Cookie headers.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Mozilla Cookie isolation error (MFSA 2011-24)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.i686",
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.ppc64",
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.s390x",
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.src",
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.x86_64",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.i686",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.ppc64",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.s390x",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-2362"
},
{
"category": "external",
"summary": "RHBZ#714583",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=714583"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-2362",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2362"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-2362",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-2362"
}
],
"release_date": "2011-06-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-06-21T22:30:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.i686",
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.ppc64",
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.s390x",
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.src",
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.x86_64",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.i686",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.ppc64",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.s390x",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:0886"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.1,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.i686",
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.ppc64",
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.s390x",
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.src",
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.x86_64",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.i686",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.ppc64",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.s390x",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "Mozilla Cookie isolation error (MFSA 2011-24)"
},
{
"cve": "CVE-2011-2363",
"discovery_date": "2011-06-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "714581"
}
],
"notes": [
{
"category": "description",
"text": "Use-after-free vulnerability in the nsSVGPointList::AppendElement function in the implementation of SVG element lists in Mozilla Firefox before 3.6.18, Thunderbird before 3.1.11, and SeaMonkey through 2.0.14 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via vectors involving a user-supplied callback.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Mozilla Multiple dangling pointer vulnerabilities (MFSA 2011-23)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.i686",
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.ppc64",
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.s390x",
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.src",
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.x86_64",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.i686",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.ppc64",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.s390x",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-2363"
},
{
"category": "external",
"summary": "RHBZ#714581",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=714581"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-2363",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2363"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-2363",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-2363"
}
],
"release_date": "2011-06-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-06-21T22:30:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.i686",
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.ppc64",
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.s390x",
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.src",
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.x86_64",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.i686",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.ppc64",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.s390x",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:0886"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.i686",
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.ppc64",
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.s390x",
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.src",
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.x86_64",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.i686",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.ppc64",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.s390x",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "Mozilla Multiple dangling pointer vulnerabilities (MFSA 2011-23)"
},
{
"cve": "CVE-2011-2364",
"discovery_date": "2011-06-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "714576"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the browser engine in Mozilla Firefox 3.6.x before 3.6.18 and Thunderbird before 3.1.11 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors, a different vulnerability than CVE-2011-2365.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Mozilla Miscellaneous memory safety hazards (MFSA 2011-19)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.i686",
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.ppc64",
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.s390x",
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.src",
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.x86_64",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.i686",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.ppc64",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.s390x",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-2364"
},
{
"category": "external",
"summary": "RHBZ#714576",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=714576"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-2364",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2364"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-2364",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-2364"
}
],
"release_date": "2011-06-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-06-21T22:30:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.i686",
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.ppc64",
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.s390x",
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.src",
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.x86_64",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.i686",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.ppc64",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.s390x",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:0886"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.i686",
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.ppc64",
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.s390x",
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.src",
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.x86_64",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.i686",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.ppc64",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.s390x",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "Mozilla Miscellaneous memory safety hazards (MFSA 2011-19)"
},
{
"cve": "CVE-2011-2365",
"discovery_date": "2011-06-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "714576"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the browser engine in Mozilla Firefox 3.6.x before 3.6.18 and Thunderbird before 3.1.11 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors, a different vulnerability than CVE-2011-2364.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Mozilla Miscellaneous memory safety hazards (MFSA 2011-19)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.i686",
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.ppc64",
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.s390x",
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.src",
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.x86_64",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.i686",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.ppc64",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.s390x",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-2365"
},
{
"category": "external",
"summary": "RHBZ#714576",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=714576"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-2365",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2365"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-2365",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-2365"
}
],
"release_date": "2011-06-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-06-21T22:30:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.i686",
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.ppc64",
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.s390x",
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.src",
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.x86_64",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.i686",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.ppc64",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.s390x",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:0886"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.i686",
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.ppc64",
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.s390x",
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.src",
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.x86_64",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.i686",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.ppc64",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.s390x",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "Mozilla Miscellaneous memory safety hazards (MFSA 2011-19)"
},
{
"cve": "CVE-2011-2374",
"discovery_date": "2011-06-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "714576"
}
],
"notes": [
{
"category": "description",
"text": "Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 3.6.18 and 4.x through 4.0.1, and Thunderbird before 3.1.11, allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Mozilla Miscellaneous memory safety hazards (MFSA 2011-19)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.i686",
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.ppc64",
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.s390x",
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.src",
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.x86_64",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.i686",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.ppc64",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.s390x",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-2374"
},
{
"category": "external",
"summary": "RHBZ#714576",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=714576"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-2374",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2374"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-2374",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-2374"
}
],
"release_date": "2011-06-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-06-21T22:30:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.i686",
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.ppc64",
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.s390x",
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.src",
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.x86_64",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.i686",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.ppc64",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.s390x",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:0886"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.i686",
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.ppc64",
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.s390x",
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.src",
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.x86_64",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.i686",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.ppc64",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.s390x",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "Mozilla Miscellaneous memory safety hazards (MFSA 2011-19)"
},
{
"cve": "CVE-2011-2375",
"discovery_date": "2011-06-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "714576"
}
],
"notes": [
{
"category": "description",
"text": "Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 5.0 and Thunderbird through 3.1.11 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Mozilla Miscellaneous memory safety hazards (MFSA 2011-19)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.i686",
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.ppc64",
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.s390x",
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.src",
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.x86_64",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.i686",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.ppc64",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.s390x",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-2375"
},
{
"category": "external",
"summary": "RHBZ#714576",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=714576"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-2375",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2375"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-2375",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-2375"
}
],
"release_date": "2011-06-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-06-21T22:30:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.i686",
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.ppc64",
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.s390x",
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.src",
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.x86_64",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.i686",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.ppc64",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.s390x",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:0886"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.i686",
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.ppc64",
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.s390x",
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.src",
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.x86_64",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.i686",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.ppc64",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.s390x",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "Mozilla Miscellaneous memory safety hazards (MFSA 2011-19)"
},
{
"cve": "CVE-2011-2376",
"discovery_date": "2011-06-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "714576"
}
],
"notes": [
{
"category": "description",
"text": "Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 3.6.18 and Thunderbird before 3.1.11 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Mozilla Miscellaneous memory safety hazards (MFSA 2011-19)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.i686",
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.ppc64",
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.s390x",
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.src",
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.x86_64",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.i686",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.ppc64",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.s390x",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-2376"
},
{
"category": "external",
"summary": "RHBZ#714576",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=714576"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-2376",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2376"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-2376",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-2376"
}
],
"release_date": "2011-06-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-06-21T22:30:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.i686",
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.ppc64",
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.s390x",
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.src",
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.x86_64",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.i686",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.ppc64",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.s390x",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:0886"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.i686",
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.ppc64",
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.s390x",
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.src",
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.x86_64",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.i686",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.ppc64",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.s390x",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "Mozilla Miscellaneous memory safety hazards (MFSA 2011-19)"
},
{
"cve": "CVE-2011-2377",
"discovery_date": "2011-06-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "714929"
}
],
"notes": [
{
"category": "description",
"text": "Mozilla Firefox before 3.6.18 and 4.x through 4.0.1, Thunderbird before 3.1.11, and SeaMonkey through 2.0.14 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via a multipart/x-mixed-replace image.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Mozilla Crash caused by corrupted JPEG image (MFSA 2011-21)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.i686",
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.ppc64",
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.s390x",
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.src",
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.x86_64",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.i686",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.ppc64",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.s390x",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-2377"
},
{
"category": "external",
"summary": "RHBZ#714929",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=714929"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-2377",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2377"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-2377",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-2377"
}
],
"release_date": "2011-06-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-06-21T22:30:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.i686",
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.ppc64",
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.s390x",
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.src",
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.x86_64",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.i686",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.ppc64",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.s390x",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:0886"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.i686",
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.ppc64",
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.s390x",
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.src",
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.x86_64",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.i686",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.ppc64",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.s390x",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "Mozilla Crash caused by corrupted JPEG image (MFSA 2011-21)"
},
{
"cve": "CVE-2011-2605",
"discovery_date": "2011-06-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "714576"
}
],
"notes": [
{
"category": "description",
"text": "CRLF injection vulnerability in the nsCookieService::SetCookieStringInternal function in netwerk/cookie/nsCookieService.cpp in Mozilla Firefox before 3.6.18 and 4.x through 4.0.1, and Thunderbird before 3.1.11, allows remote attackers to bypass intended access restrictions via a string containing a \\n (newline) character, which is not properly handled in a JavaScript \"document.cookie =\" expression, a different vulnerability than CVE-2011-2374.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Mozilla Miscellaneous memory safety hazards (MFSA 2011-19)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.i686",
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.ppc64",
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.s390x",
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.src",
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.x86_64",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.i686",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.ppc64",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.s390x",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-2605"
},
{
"category": "external",
"summary": "RHBZ#714576",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=714576"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-2605",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2605"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-2605",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-2605"
}
],
"release_date": "2011-06-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-06-21T22:30:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.i686",
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.ppc64",
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.s390x",
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.src",
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.x86_64",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.i686",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.ppc64",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.s390x",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:0886"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.i686",
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.ppc64",
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.s390x",
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.src",
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.x86_64",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.i686",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.ppc64",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.s390x",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "Mozilla Miscellaneous memory safety hazards (MFSA 2011-19)"
}
]
}
RHSA-2011_0885
Vulnerability from csaf_redhat - Published: 2011-06-21 22:39 - Updated: 2024-12-01 11:54Use-after-free vulnerability in the nsSVGPathSegList::ReplaceItem function in the implementation of SVG element lists in Mozilla Firefox before 3.6.18, Thunderbird before 3.1.11, and SeaMonkey through 2.0.14 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via vectors involving a user-supplied callback.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS:firefox-0:3.6.18-2.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-0:3.6.18-2.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-0:3.6.18-2.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-0:3.6.18-2.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-0:3.6.18-2.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-0:3.6.18-2.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-0:3.6.18-2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-debuginfo-0:3.6.18-2.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-debuginfo-0:3.6.18-2.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-debuginfo-0:3.6.18-2.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-debuginfo-0:3.6.18-2.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-debuginfo-0:3.6.18-2.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-debuginfo-0:3.6.18-2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-0:3.6.18-2.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-0:3.6.18-2.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-0:3.6.18-2.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-0:3.6.18-2.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-0:3.6.18-2.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-0:3.6.18-2.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-0:3.6.18-2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-debuginfo-0:3.6.18-2.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-debuginfo-0:3.6.18-2.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-debuginfo-0:3.6.18-2.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-debuginfo-0:3.6.18-2.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-debuginfo-0:3.6.18-2.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-debuginfo-0:3.6.18-2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-0:3.6.18-2.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-0:3.6.18-2.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-0:3.6.18-2.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-0:3.6.18-2.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-0:3.6.18-2.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-0:3.6.18-2.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-0:3.6.18-2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-debuginfo-0:3.6.18-2.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-debuginfo-0:3.6.18-2.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-debuginfo-0:3.6.18-2.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-debuginfo-0:3.6.18-2.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-debuginfo-0:3.6.18-2.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-debuginfo-0:3.6.18-2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-0:3.6.18-2.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-0:3.6.18-2.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-0:3.6.18-2.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-0:3.6.18-2.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-0:3.6.18-2.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-0:3.6.18-2.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-0:3.6.18-2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-debuginfo-0:3.6.18-2.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-debuginfo-0:3.6.18-2.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-debuginfo-0:3.6.18-2.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-debuginfo-0:3.6.18-2.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-debuginfo-0:3.6.18-2.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-debuginfo-0:3.6.18-2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-0:3.6.18-1.el6_1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-0:3.6.18-1.el6_1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-0:3.6.18-1.el6_1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-0:3.6.18-1.el6_1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-0:3.6.18-1.el6_1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-0:3.6.18-1.el6_1.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-0:3.6.18-1.el6_1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.x86_64 | — |
Vendor Fix
fix
|
Use-after-free vulnerability in the nsXULCommandDispatcher function in Mozilla Firefox before 3.6.18, Thunderbird before 3.1.11, and SeaMonkey through 2.0.14 allows remote attackers to execute arbitrary code via a crafted XUL document that dequeues the current command updater.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS:firefox-0:3.6.18-2.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-0:3.6.18-2.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-0:3.6.18-2.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-0:3.6.18-2.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-0:3.6.18-2.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-0:3.6.18-2.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-0:3.6.18-2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-debuginfo-0:3.6.18-2.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-debuginfo-0:3.6.18-2.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-debuginfo-0:3.6.18-2.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-debuginfo-0:3.6.18-2.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-debuginfo-0:3.6.18-2.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-debuginfo-0:3.6.18-2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-0:3.6.18-2.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-0:3.6.18-2.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-0:3.6.18-2.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-0:3.6.18-2.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-0:3.6.18-2.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-0:3.6.18-2.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-0:3.6.18-2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-debuginfo-0:3.6.18-2.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-debuginfo-0:3.6.18-2.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-debuginfo-0:3.6.18-2.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-debuginfo-0:3.6.18-2.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-debuginfo-0:3.6.18-2.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-debuginfo-0:3.6.18-2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-0:3.6.18-2.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-0:3.6.18-2.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-0:3.6.18-2.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-0:3.6.18-2.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-0:3.6.18-2.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-0:3.6.18-2.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-0:3.6.18-2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-debuginfo-0:3.6.18-2.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-debuginfo-0:3.6.18-2.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-debuginfo-0:3.6.18-2.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-debuginfo-0:3.6.18-2.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-debuginfo-0:3.6.18-2.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-debuginfo-0:3.6.18-2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-0:3.6.18-2.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-0:3.6.18-2.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-0:3.6.18-2.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-0:3.6.18-2.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-0:3.6.18-2.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-0:3.6.18-2.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-0:3.6.18-2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-debuginfo-0:3.6.18-2.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-debuginfo-0:3.6.18-2.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-debuginfo-0:3.6.18-2.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-debuginfo-0:3.6.18-2.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-debuginfo-0:3.6.18-2.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-debuginfo-0:3.6.18-2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-0:3.6.18-1.el6_1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-0:3.6.18-1.el6_1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-0:3.6.18-1.el6_1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-0:3.6.18-1.el6_1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-0:3.6.18-1.el6_1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-0:3.6.18-1.el6_1.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-0:3.6.18-1.el6_1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.x86_64 | — |
Vendor Fix
fix
|
Mozilla Firefox before 3.6.18, Thunderbird before 3.1.11, and SeaMonkey through 2.0.14 do not distinguish between cookies for two domain names that differ only in a trailing dot, which allows remote web servers to bypass the Same Origin Policy via Set-Cookie headers.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS:firefox-0:3.6.18-2.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-0:3.6.18-2.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-0:3.6.18-2.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-0:3.6.18-2.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-0:3.6.18-2.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-0:3.6.18-2.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-0:3.6.18-2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-debuginfo-0:3.6.18-2.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-debuginfo-0:3.6.18-2.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-debuginfo-0:3.6.18-2.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-debuginfo-0:3.6.18-2.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-debuginfo-0:3.6.18-2.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-debuginfo-0:3.6.18-2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-0:3.6.18-2.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-0:3.6.18-2.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-0:3.6.18-2.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-0:3.6.18-2.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-0:3.6.18-2.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-0:3.6.18-2.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-0:3.6.18-2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-debuginfo-0:3.6.18-2.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-debuginfo-0:3.6.18-2.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-debuginfo-0:3.6.18-2.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-debuginfo-0:3.6.18-2.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-debuginfo-0:3.6.18-2.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-debuginfo-0:3.6.18-2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-0:3.6.18-2.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-0:3.6.18-2.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-0:3.6.18-2.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-0:3.6.18-2.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-0:3.6.18-2.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-0:3.6.18-2.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-0:3.6.18-2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-debuginfo-0:3.6.18-2.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-debuginfo-0:3.6.18-2.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-debuginfo-0:3.6.18-2.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-debuginfo-0:3.6.18-2.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-debuginfo-0:3.6.18-2.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-debuginfo-0:3.6.18-2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-0:3.6.18-2.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-0:3.6.18-2.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-0:3.6.18-2.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-0:3.6.18-2.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-0:3.6.18-2.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-0:3.6.18-2.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-0:3.6.18-2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-debuginfo-0:3.6.18-2.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-debuginfo-0:3.6.18-2.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-debuginfo-0:3.6.18-2.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-debuginfo-0:3.6.18-2.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-debuginfo-0:3.6.18-2.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-debuginfo-0:3.6.18-2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-0:3.6.18-1.el6_1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-0:3.6.18-1.el6_1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-0:3.6.18-1.el6_1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-0:3.6.18-1.el6_1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-0:3.6.18-1.el6_1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-0:3.6.18-1.el6_1.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-0:3.6.18-1.el6_1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.x86_64 | — |
Vendor Fix
fix
|
Use-after-free vulnerability in the nsSVGPointList::AppendElement function in the implementation of SVG element lists in Mozilla Firefox before 3.6.18, Thunderbird before 3.1.11, and SeaMonkey through 2.0.14 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via vectors involving a user-supplied callback.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS:firefox-0:3.6.18-2.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-0:3.6.18-2.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-0:3.6.18-2.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-0:3.6.18-2.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-0:3.6.18-2.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-0:3.6.18-2.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-0:3.6.18-2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-debuginfo-0:3.6.18-2.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-debuginfo-0:3.6.18-2.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-debuginfo-0:3.6.18-2.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-debuginfo-0:3.6.18-2.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-debuginfo-0:3.6.18-2.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-debuginfo-0:3.6.18-2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-0:3.6.18-2.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-0:3.6.18-2.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-0:3.6.18-2.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-0:3.6.18-2.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-0:3.6.18-2.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-0:3.6.18-2.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-0:3.6.18-2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-debuginfo-0:3.6.18-2.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-debuginfo-0:3.6.18-2.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-debuginfo-0:3.6.18-2.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-debuginfo-0:3.6.18-2.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-debuginfo-0:3.6.18-2.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-debuginfo-0:3.6.18-2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-0:3.6.18-2.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-0:3.6.18-2.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-0:3.6.18-2.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-0:3.6.18-2.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-0:3.6.18-2.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-0:3.6.18-2.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-0:3.6.18-2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-debuginfo-0:3.6.18-2.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-debuginfo-0:3.6.18-2.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-debuginfo-0:3.6.18-2.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-debuginfo-0:3.6.18-2.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-debuginfo-0:3.6.18-2.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-debuginfo-0:3.6.18-2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-0:3.6.18-2.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-0:3.6.18-2.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-0:3.6.18-2.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-0:3.6.18-2.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-0:3.6.18-2.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-0:3.6.18-2.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-0:3.6.18-2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-debuginfo-0:3.6.18-2.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-debuginfo-0:3.6.18-2.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-debuginfo-0:3.6.18-2.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-debuginfo-0:3.6.18-2.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-debuginfo-0:3.6.18-2.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-debuginfo-0:3.6.18-2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-0:3.6.18-1.el6_1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-0:3.6.18-1.el6_1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-0:3.6.18-1.el6_1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-0:3.6.18-1.el6_1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-0:3.6.18-1.el6_1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-0:3.6.18-1.el6_1.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-0:3.6.18-1.el6_1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.x86_64 | — |
Vendor Fix
fix
|
Unspecified vulnerability in the browser engine in Mozilla Firefox 3.6.x before 3.6.18 and Thunderbird before 3.1.11 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors, a different vulnerability than CVE-2011-2365.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS:firefox-0:3.6.18-2.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-0:3.6.18-2.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-0:3.6.18-2.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-0:3.6.18-2.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-0:3.6.18-2.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-0:3.6.18-2.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-0:3.6.18-2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-debuginfo-0:3.6.18-2.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-debuginfo-0:3.6.18-2.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-debuginfo-0:3.6.18-2.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-debuginfo-0:3.6.18-2.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-debuginfo-0:3.6.18-2.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-debuginfo-0:3.6.18-2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-0:3.6.18-2.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-0:3.6.18-2.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-0:3.6.18-2.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-0:3.6.18-2.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-0:3.6.18-2.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-0:3.6.18-2.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-0:3.6.18-2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-debuginfo-0:3.6.18-2.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-debuginfo-0:3.6.18-2.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-debuginfo-0:3.6.18-2.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-debuginfo-0:3.6.18-2.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-debuginfo-0:3.6.18-2.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-debuginfo-0:3.6.18-2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-0:3.6.18-2.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-0:3.6.18-2.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-0:3.6.18-2.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-0:3.6.18-2.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-0:3.6.18-2.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-0:3.6.18-2.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-0:3.6.18-2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-debuginfo-0:3.6.18-2.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-debuginfo-0:3.6.18-2.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-debuginfo-0:3.6.18-2.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-debuginfo-0:3.6.18-2.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-debuginfo-0:3.6.18-2.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-debuginfo-0:3.6.18-2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-0:3.6.18-2.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-0:3.6.18-2.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-0:3.6.18-2.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-0:3.6.18-2.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-0:3.6.18-2.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-0:3.6.18-2.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-0:3.6.18-2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-debuginfo-0:3.6.18-2.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-debuginfo-0:3.6.18-2.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-debuginfo-0:3.6.18-2.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-debuginfo-0:3.6.18-2.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-debuginfo-0:3.6.18-2.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-debuginfo-0:3.6.18-2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-0:3.6.18-1.el6_1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-0:3.6.18-1.el6_1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-0:3.6.18-1.el6_1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-0:3.6.18-1.el6_1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-0:3.6.18-1.el6_1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-0:3.6.18-1.el6_1.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-0:3.6.18-1.el6_1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.x86_64 | — |
Vendor Fix
fix
|
Unspecified vulnerability in the browser engine in Mozilla Firefox 3.6.x before 3.6.18 and Thunderbird before 3.1.11 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors, a different vulnerability than CVE-2011-2364.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS:firefox-0:3.6.18-2.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-0:3.6.18-2.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-0:3.6.18-2.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-0:3.6.18-2.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-0:3.6.18-2.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-0:3.6.18-2.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-0:3.6.18-2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-debuginfo-0:3.6.18-2.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-debuginfo-0:3.6.18-2.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-debuginfo-0:3.6.18-2.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-debuginfo-0:3.6.18-2.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-debuginfo-0:3.6.18-2.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-debuginfo-0:3.6.18-2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-0:3.6.18-2.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-0:3.6.18-2.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-0:3.6.18-2.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-0:3.6.18-2.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-0:3.6.18-2.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-0:3.6.18-2.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-0:3.6.18-2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-debuginfo-0:3.6.18-2.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-debuginfo-0:3.6.18-2.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-debuginfo-0:3.6.18-2.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-debuginfo-0:3.6.18-2.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-debuginfo-0:3.6.18-2.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-debuginfo-0:3.6.18-2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-0:3.6.18-2.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-0:3.6.18-2.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-0:3.6.18-2.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-0:3.6.18-2.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-0:3.6.18-2.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-0:3.6.18-2.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-0:3.6.18-2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-debuginfo-0:3.6.18-2.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-debuginfo-0:3.6.18-2.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-debuginfo-0:3.6.18-2.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-debuginfo-0:3.6.18-2.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-debuginfo-0:3.6.18-2.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-debuginfo-0:3.6.18-2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-0:3.6.18-2.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-0:3.6.18-2.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-0:3.6.18-2.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-0:3.6.18-2.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-0:3.6.18-2.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-0:3.6.18-2.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-0:3.6.18-2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-debuginfo-0:3.6.18-2.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-debuginfo-0:3.6.18-2.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-debuginfo-0:3.6.18-2.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-debuginfo-0:3.6.18-2.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-debuginfo-0:3.6.18-2.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-debuginfo-0:3.6.18-2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-0:3.6.18-1.el6_1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-0:3.6.18-1.el6_1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-0:3.6.18-1.el6_1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-0:3.6.18-1.el6_1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-0:3.6.18-1.el6_1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-0:3.6.18-1.el6_1.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-0:3.6.18-1.el6_1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.x86_64 | — |
Vendor Fix
fix
|
Integer overflow in the Array.reduceRight method in Mozilla Firefox before 3.6.18 and 4.x through 4.0.1, Thunderbird before 3.1.11, and SeaMonkey through 2.0.14 allows remote attackers to execute arbitrary code via vectors involving a long JavaScript Array object.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS:firefox-0:3.6.18-2.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-0:3.6.18-2.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-0:3.6.18-2.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-0:3.6.18-2.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-0:3.6.18-2.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-0:3.6.18-2.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-0:3.6.18-2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-debuginfo-0:3.6.18-2.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-debuginfo-0:3.6.18-2.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-debuginfo-0:3.6.18-2.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-debuginfo-0:3.6.18-2.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-debuginfo-0:3.6.18-2.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-debuginfo-0:3.6.18-2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-0:3.6.18-2.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-0:3.6.18-2.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-0:3.6.18-2.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-0:3.6.18-2.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-0:3.6.18-2.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-0:3.6.18-2.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-0:3.6.18-2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-debuginfo-0:3.6.18-2.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-debuginfo-0:3.6.18-2.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-debuginfo-0:3.6.18-2.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-debuginfo-0:3.6.18-2.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-debuginfo-0:3.6.18-2.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-debuginfo-0:3.6.18-2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-0:3.6.18-2.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-0:3.6.18-2.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-0:3.6.18-2.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-0:3.6.18-2.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-0:3.6.18-2.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-0:3.6.18-2.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-0:3.6.18-2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-debuginfo-0:3.6.18-2.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-debuginfo-0:3.6.18-2.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-debuginfo-0:3.6.18-2.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-debuginfo-0:3.6.18-2.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-debuginfo-0:3.6.18-2.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-debuginfo-0:3.6.18-2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-0:3.6.18-2.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-0:3.6.18-2.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-0:3.6.18-2.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-0:3.6.18-2.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-0:3.6.18-2.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-0:3.6.18-2.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-0:3.6.18-2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-debuginfo-0:3.6.18-2.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-debuginfo-0:3.6.18-2.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-debuginfo-0:3.6.18-2.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-debuginfo-0:3.6.18-2.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-debuginfo-0:3.6.18-2.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-debuginfo-0:3.6.18-2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-0:3.6.18-1.el6_1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-0:3.6.18-1.el6_1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-0:3.6.18-1.el6_1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-0:3.6.18-1.el6_1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-0:3.6.18-1.el6_1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-0:3.6.18-1.el6_1.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-0:3.6.18-1.el6_1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.x86_64 | — |
Vendor Fix
fix
|
Use-after-free vulnerability in Mozilla Firefox before 3.6.18 and 4.x through 4.0.1, Thunderbird before 3.1.11, and SeaMonkey through 2.0.14, when JavaScript is disabled, allows remote attackers to execute arbitrary code via a crafted XUL document.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS:firefox-0:3.6.18-2.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-0:3.6.18-2.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-0:3.6.18-2.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-0:3.6.18-2.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-0:3.6.18-2.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-0:3.6.18-2.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-0:3.6.18-2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-debuginfo-0:3.6.18-2.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-debuginfo-0:3.6.18-2.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-debuginfo-0:3.6.18-2.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-debuginfo-0:3.6.18-2.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-debuginfo-0:3.6.18-2.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-debuginfo-0:3.6.18-2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-0:3.6.18-2.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-0:3.6.18-2.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-0:3.6.18-2.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-0:3.6.18-2.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-0:3.6.18-2.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-0:3.6.18-2.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-0:3.6.18-2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-debuginfo-0:3.6.18-2.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-debuginfo-0:3.6.18-2.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-debuginfo-0:3.6.18-2.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-debuginfo-0:3.6.18-2.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-debuginfo-0:3.6.18-2.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-debuginfo-0:3.6.18-2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-0:3.6.18-2.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-0:3.6.18-2.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-0:3.6.18-2.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-0:3.6.18-2.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-0:3.6.18-2.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-0:3.6.18-2.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-0:3.6.18-2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-debuginfo-0:3.6.18-2.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-debuginfo-0:3.6.18-2.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-debuginfo-0:3.6.18-2.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-debuginfo-0:3.6.18-2.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-debuginfo-0:3.6.18-2.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-debuginfo-0:3.6.18-2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-0:3.6.18-2.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-0:3.6.18-2.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-0:3.6.18-2.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-0:3.6.18-2.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-0:3.6.18-2.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-0:3.6.18-2.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-0:3.6.18-2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-debuginfo-0:3.6.18-2.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-debuginfo-0:3.6.18-2.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-debuginfo-0:3.6.18-2.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-debuginfo-0:3.6.18-2.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-debuginfo-0:3.6.18-2.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-debuginfo-0:3.6.18-2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-0:3.6.18-1.el6_1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-0:3.6.18-1.el6_1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-0:3.6.18-1.el6_1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-0:3.6.18-1.el6_1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-0:3.6.18-1.el6_1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-0:3.6.18-1.el6_1.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-0:3.6.18-1.el6_1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.x86_64 | — |
Vendor Fix
fix
|
Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 3.6.18 and 4.x through 4.0.1, and Thunderbird before 3.1.11, allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS:firefox-0:3.6.18-2.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-0:3.6.18-2.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-0:3.6.18-2.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-0:3.6.18-2.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-0:3.6.18-2.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-0:3.6.18-2.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-0:3.6.18-2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-debuginfo-0:3.6.18-2.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-debuginfo-0:3.6.18-2.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-debuginfo-0:3.6.18-2.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-debuginfo-0:3.6.18-2.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-debuginfo-0:3.6.18-2.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-debuginfo-0:3.6.18-2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-0:3.6.18-2.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-0:3.6.18-2.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-0:3.6.18-2.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-0:3.6.18-2.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-0:3.6.18-2.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-0:3.6.18-2.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-0:3.6.18-2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-debuginfo-0:3.6.18-2.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-debuginfo-0:3.6.18-2.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-debuginfo-0:3.6.18-2.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-debuginfo-0:3.6.18-2.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-debuginfo-0:3.6.18-2.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-debuginfo-0:3.6.18-2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-0:3.6.18-2.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-0:3.6.18-2.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-0:3.6.18-2.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-0:3.6.18-2.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-0:3.6.18-2.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-0:3.6.18-2.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-0:3.6.18-2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-debuginfo-0:3.6.18-2.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-debuginfo-0:3.6.18-2.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-debuginfo-0:3.6.18-2.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-debuginfo-0:3.6.18-2.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-debuginfo-0:3.6.18-2.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-debuginfo-0:3.6.18-2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-0:3.6.18-2.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-0:3.6.18-2.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-0:3.6.18-2.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-0:3.6.18-2.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-0:3.6.18-2.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-0:3.6.18-2.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-0:3.6.18-2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-debuginfo-0:3.6.18-2.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-debuginfo-0:3.6.18-2.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-debuginfo-0:3.6.18-2.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-debuginfo-0:3.6.18-2.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-debuginfo-0:3.6.18-2.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-debuginfo-0:3.6.18-2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-0:3.6.18-1.el6_1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-0:3.6.18-1.el6_1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-0:3.6.18-1.el6_1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-0:3.6.18-1.el6_1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-0:3.6.18-1.el6_1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-0:3.6.18-1.el6_1.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-0:3.6.18-1.el6_1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.x86_64 | — |
Vendor Fix
fix
|
Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 5.0 and Thunderbird through 3.1.11 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS:firefox-0:3.6.18-2.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-0:3.6.18-2.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-0:3.6.18-2.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-0:3.6.18-2.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-0:3.6.18-2.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-0:3.6.18-2.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-0:3.6.18-2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-debuginfo-0:3.6.18-2.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-debuginfo-0:3.6.18-2.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-debuginfo-0:3.6.18-2.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-debuginfo-0:3.6.18-2.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-debuginfo-0:3.6.18-2.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-debuginfo-0:3.6.18-2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-0:3.6.18-2.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-0:3.6.18-2.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-0:3.6.18-2.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-0:3.6.18-2.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-0:3.6.18-2.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-0:3.6.18-2.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-0:3.6.18-2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-debuginfo-0:3.6.18-2.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-debuginfo-0:3.6.18-2.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-debuginfo-0:3.6.18-2.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-debuginfo-0:3.6.18-2.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-debuginfo-0:3.6.18-2.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-debuginfo-0:3.6.18-2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-0:3.6.18-2.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-0:3.6.18-2.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-0:3.6.18-2.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-0:3.6.18-2.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-0:3.6.18-2.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-0:3.6.18-2.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-0:3.6.18-2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-debuginfo-0:3.6.18-2.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-debuginfo-0:3.6.18-2.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-debuginfo-0:3.6.18-2.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-debuginfo-0:3.6.18-2.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-debuginfo-0:3.6.18-2.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-debuginfo-0:3.6.18-2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-0:3.6.18-2.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-0:3.6.18-2.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-0:3.6.18-2.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-0:3.6.18-2.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-0:3.6.18-2.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-0:3.6.18-2.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-0:3.6.18-2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-debuginfo-0:3.6.18-2.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-debuginfo-0:3.6.18-2.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-debuginfo-0:3.6.18-2.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-debuginfo-0:3.6.18-2.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-debuginfo-0:3.6.18-2.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-debuginfo-0:3.6.18-2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-0:3.6.18-1.el6_1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-0:3.6.18-1.el6_1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-0:3.6.18-1.el6_1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-0:3.6.18-1.el6_1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-0:3.6.18-1.el6_1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-0:3.6.18-1.el6_1.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-0:3.6.18-1.el6_1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.x86_64 | — |
Vendor Fix
fix
|
Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 3.6.18 and Thunderbird before 3.1.11 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS:firefox-0:3.6.18-2.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-0:3.6.18-2.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-0:3.6.18-2.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-0:3.6.18-2.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-0:3.6.18-2.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-0:3.6.18-2.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-0:3.6.18-2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-debuginfo-0:3.6.18-2.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-debuginfo-0:3.6.18-2.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-debuginfo-0:3.6.18-2.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-debuginfo-0:3.6.18-2.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-debuginfo-0:3.6.18-2.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-debuginfo-0:3.6.18-2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-0:3.6.18-2.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-0:3.6.18-2.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-0:3.6.18-2.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-0:3.6.18-2.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-0:3.6.18-2.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-0:3.6.18-2.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-0:3.6.18-2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-debuginfo-0:3.6.18-2.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-debuginfo-0:3.6.18-2.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-debuginfo-0:3.6.18-2.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-debuginfo-0:3.6.18-2.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-debuginfo-0:3.6.18-2.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-debuginfo-0:3.6.18-2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-0:3.6.18-2.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-0:3.6.18-2.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-0:3.6.18-2.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-0:3.6.18-2.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-0:3.6.18-2.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-0:3.6.18-2.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-0:3.6.18-2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-debuginfo-0:3.6.18-2.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-debuginfo-0:3.6.18-2.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-debuginfo-0:3.6.18-2.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-debuginfo-0:3.6.18-2.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-debuginfo-0:3.6.18-2.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-debuginfo-0:3.6.18-2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-0:3.6.18-2.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-0:3.6.18-2.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-0:3.6.18-2.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-0:3.6.18-2.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-0:3.6.18-2.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-0:3.6.18-2.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-0:3.6.18-2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-debuginfo-0:3.6.18-2.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-debuginfo-0:3.6.18-2.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-debuginfo-0:3.6.18-2.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-debuginfo-0:3.6.18-2.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-debuginfo-0:3.6.18-2.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-debuginfo-0:3.6.18-2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-0:3.6.18-1.el6_1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-0:3.6.18-1.el6_1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-0:3.6.18-1.el6_1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-0:3.6.18-1.el6_1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-0:3.6.18-1.el6_1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-0:3.6.18-1.el6_1.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-0:3.6.18-1.el6_1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.x86_64 | — |
Vendor Fix
fix
|
Mozilla Firefox before 3.6.18 and 4.x through 4.0.1, Thunderbird before 3.1.11, and SeaMonkey through 2.0.14 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via a multipart/x-mixed-replace image.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS:firefox-0:3.6.18-2.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-0:3.6.18-2.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-0:3.6.18-2.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-0:3.6.18-2.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-0:3.6.18-2.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-0:3.6.18-2.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-0:3.6.18-2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-debuginfo-0:3.6.18-2.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-debuginfo-0:3.6.18-2.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-debuginfo-0:3.6.18-2.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-debuginfo-0:3.6.18-2.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-debuginfo-0:3.6.18-2.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-debuginfo-0:3.6.18-2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-0:3.6.18-2.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-0:3.6.18-2.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-0:3.6.18-2.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-0:3.6.18-2.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-0:3.6.18-2.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-0:3.6.18-2.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-0:3.6.18-2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-debuginfo-0:3.6.18-2.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-debuginfo-0:3.6.18-2.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-debuginfo-0:3.6.18-2.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-debuginfo-0:3.6.18-2.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-debuginfo-0:3.6.18-2.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-debuginfo-0:3.6.18-2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-0:3.6.18-2.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-0:3.6.18-2.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-0:3.6.18-2.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-0:3.6.18-2.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-0:3.6.18-2.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-0:3.6.18-2.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-0:3.6.18-2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-debuginfo-0:3.6.18-2.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-debuginfo-0:3.6.18-2.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-debuginfo-0:3.6.18-2.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-debuginfo-0:3.6.18-2.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-debuginfo-0:3.6.18-2.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-debuginfo-0:3.6.18-2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-0:3.6.18-2.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-0:3.6.18-2.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-0:3.6.18-2.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-0:3.6.18-2.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-0:3.6.18-2.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-0:3.6.18-2.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-0:3.6.18-2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-debuginfo-0:3.6.18-2.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-debuginfo-0:3.6.18-2.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-debuginfo-0:3.6.18-2.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-debuginfo-0:3.6.18-2.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-debuginfo-0:3.6.18-2.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-debuginfo-0:3.6.18-2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-0:3.6.18-1.el6_1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-0:3.6.18-1.el6_1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-0:3.6.18-1.el6_1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-0:3.6.18-1.el6_1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-0:3.6.18-1.el6_1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-0:3.6.18-1.el6_1.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-0:3.6.18-1.el6_1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.x86_64 | — |
Vendor Fix
fix
|
CRLF injection vulnerability in the nsCookieService::SetCookieStringInternal function in netwerk/cookie/nsCookieService.cpp in Mozilla Firefox before 3.6.18 and 4.x through 4.0.1, and Thunderbird before 3.1.11, allows remote attackers to bypass intended access restrictions via a string containing a \n (newline) character, which is not properly handled in a JavaScript "document.cookie =" expression, a different vulnerability than CVE-2011-2374.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS:firefox-0:3.6.18-2.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-0:3.6.18-2.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-0:3.6.18-2.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-0:3.6.18-2.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-0:3.6.18-2.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-0:3.6.18-2.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-0:3.6.18-2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-debuginfo-0:3.6.18-2.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-debuginfo-0:3.6.18-2.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-debuginfo-0:3.6.18-2.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-debuginfo-0:3.6.18-2.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-debuginfo-0:3.6.18-2.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:firefox-debuginfo-0:3.6.18-2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-0:3.6.18-2.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-0:3.6.18-2.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-0:3.6.18-2.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-0:3.6.18-2.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-0:3.6.18-2.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-0:3.6.18-2.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-0:3.6.18-2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-debuginfo-0:3.6.18-2.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-debuginfo-0:3.6.18-2.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-debuginfo-0:3.6.18-2.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-debuginfo-0:3.6.18-2.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-debuginfo-0:3.6.18-2.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:firefox-debuginfo-0:3.6.18-2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-0:3.6.18-2.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-0:3.6.18-2.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-0:3.6.18-2.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-0:3.6.18-2.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-0:3.6.18-2.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-0:3.6.18-2.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-0:3.6.18-2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-debuginfo-0:3.6.18-2.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-debuginfo-0:3.6.18-2.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-debuginfo-0:3.6.18-2.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-debuginfo-0:3.6.18-2.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-debuginfo-0:3.6.18-2.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:firefox-debuginfo-0:3.6.18-2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-0:3.6.18-2.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-0:3.6.18-2.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-0:3.6.18-2.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-0:3.6.18-2.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-0:3.6.18-2.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-0:3.6.18-2.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-0:3.6.18-2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-debuginfo-0:3.6.18-2.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-debuginfo-0:3.6.18-2.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-debuginfo-0:3.6.18-2.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-debuginfo-0:3.6.18-2.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-debuginfo-0:3.6.18-2.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:firefox-debuginfo-0:3.6.18-2.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-0:3.6.18-1.el6_1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-0:3.6.18-1.el6_1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-0:3.6.18-1.el6_1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-0:3.6.18-1.el6_1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-0:3.6.18-1.el6_1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-0:3.6.18-1.el6_1.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-0:3.6.18-1.el6_1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.x86_64 | — |
Vendor Fix
fix
|
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Critical"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated firefox packages that fix several security issues and one bug are\nnow available for Red Hat Enterprise Linux 4, 5, and 6.\n\nThe Red Hat Security Response Team has rated this update as having critical\nsecurity impact. Common Vulnerability Scoring System (CVSS) base scores,\nwhich give detailed severity ratings, are available for each vulnerability\nfrom the CVE links in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Mozilla Firefox is an open source web browser. XULRunner provides the XUL\nRuntime environment for Mozilla Firefox.\n\nA flaw was found in the way Firefox handled malformed JPEG images. A\nwebsite containing a malicious JPEG image could cause Firefox to crash or,\npotentially, execute arbitrary code with the privileges of the user running\nFirefox. (CVE-2011-2377)\n\nMultiple dangling pointer flaws were found in Firefox. A web page\ncontaining malicious content could cause Firefox to crash or, potentially,\nexecute arbitrary code with the privileges of the user running Firefox.\n(CVE-2011-0083, CVE-2011-0085, CVE-2011-2363)\n\nSeveral flaws were found in the processing of malformed web content. A web\npage containing malicious content could cause Firefox to crash or,\npotentially, execute arbitrary code with the privileges of the user running\nFirefox. (CVE-2011-2364, CVE-2011-2365, CVE-2011-2374, CVE-2011-2375,\nCVE-2011-2376)\n\nAn integer overflow flaw was found in the way Firefox handled JavaScript\nArray objects. A website containing malicious JavaScript could cause\nFirefox to execute that JavaScript with the privileges of the user running\nFirefox. (CVE-2011-2371)\n\nA use-after-free flaw was found in the way Firefox handled malformed\nJavaScript. A website containing malicious JavaScript could cause Firefox\nto execute that JavaScript with the privileges of the user running Firefox.\n(CVE-2011-2373)\n\nIt was found that Firefox could treat two separate cookies as\ninterchangeable if both were for the same domain name but one of those\ndomain names had a trailing \".\" character. This violates the same-origin\npolicy and could possibly lead to data being leaked to the wrong domain.\n(CVE-2011-2362)\n\nFor technical details regarding these flaws, refer to the Mozilla security\nadvisories for Firefox 3.6.18. You can find a link to the Mozilla\nadvisories in the References section of this erratum.\n\nThis update also fixes the following bug:\n\n* With previous versions of Firefox on Red Hat Enterprise Linux 5, the\n\"background-repeat\" CSS (Cascading Style Sheets) property did not work\n(such images were not displayed and repeated as expected). (BZ#698313)\n\nAll Firefox users should upgrade to these updated packages, which contain\nFirefox version 3.6.18, which corrects these issues. After installing the\nupdate, Firefox must be restarted for the changes to take effect.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2011:0885",
"url": "https://access.redhat.com/errata/RHSA-2011:0885"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#critical",
"url": "https://access.redhat.com/security/updates/classification/#critical"
},
{
"category": "external",
"summary": "http://www.mozilla.org/security/known-vulnerabilities/firefox36.html#firefox3.6.18",
"url": "http://www.mozilla.org/security/known-vulnerabilities/firefox36.html#firefox3.6.18"
},
{
"category": "external",
"summary": "698313",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=698313"
},
{
"category": "external",
"summary": "714576",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=714576"
},
{
"category": "external",
"summary": "714577",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=714577"
},
{
"category": "external",
"summary": "714580",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=714580"
},
{
"category": "external",
"summary": "714581",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=714581"
},
{
"category": "external",
"summary": "714583",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=714583"
},
{
"category": "external",
"summary": "714929",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=714929"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2011/rhsa-2011_0885.json"
}
],
"title": "Red Hat Security Advisory: firefox security and bug fix update",
"tracking": {
"current_release_date": "2024-12-01T11:54:00+00:00",
"generator": {
"date": "2024-12-01T11:54:00+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2011:0885",
"initial_release_date": "2011-06-21T22:39:00+00:00",
"revision_history": [
{
"date": "2011-06-21T22:39:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2011-06-21T18:50:32+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-12-01T11:54:00+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux (v. 5.6.z server)",
"product": {
"name": "Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:5::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AS version 4",
"product": {
"name": "Red Hat Enterprise Linux AS version 4",
"product_id": "4AS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:4::as"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop version 4",
"product": {
"name": "Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:4::desktop"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ES version 4",
"product": {
"name": "Red Hat Enterprise Linux ES version 4",
"product_id": "4ES",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:4::es"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux WS version 4",
"product": {
"name": "Red Hat Enterprise Linux WS version 4",
"product_id": "4WS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:4::ws"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "firefox-0:3.6.18-1.el5_6.ia64",
"product": {
"name": "firefox-0:3.6.18-1.el5_6.ia64",
"product_id": "firefox-0:3.6.18-1.el5_6.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/firefox@3.6.18-1.el5_6?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "firefox-debuginfo-0:3.6.18-1.el5_6.ia64",
"product": {
"name": "firefox-debuginfo-0:3.6.18-1.el5_6.ia64",
"product_id": "firefox-debuginfo-0:3.6.18-1.el5_6.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/firefox-debuginfo@3.6.18-1.el5_6?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ia64",
"product": {
"name": "xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ia64",
"product_id": "xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xulrunner-debuginfo@1.9.2.18-2.el5_6?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "xulrunner-devel-0:1.9.2.18-2.el5_6.ia64",
"product": {
"name": "xulrunner-devel-0:1.9.2.18-2.el5_6.ia64",
"product_id": "xulrunner-devel-0:1.9.2.18-2.el5_6.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xulrunner-devel@1.9.2.18-2.el5_6?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "xulrunner-0:1.9.2.18-2.el5_6.ia64",
"product": {
"name": "xulrunner-0:1.9.2.18-2.el5_6.ia64",
"product_id": "xulrunner-0:1.9.2.18-2.el5_6.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xulrunner@1.9.2.18-2.el5_6?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "firefox-debuginfo-0:3.6.18-2.el4.ia64",
"product": {
"name": "firefox-debuginfo-0:3.6.18-2.el4.ia64",
"product_id": "firefox-debuginfo-0:3.6.18-2.el4.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/firefox-debuginfo@3.6.18-2.el4?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "firefox-0:3.6.18-2.el4.ia64",
"product": {
"name": "firefox-0:3.6.18-2.el4.ia64",
"product_id": "firefox-0:3.6.18-2.el4.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/firefox@3.6.18-2.el4?arch=ia64"
}
}
}
],
"category": "architecture",
"name": "ia64"
},
{
"branches": [
{
"category": "product_version",
"name": "firefox-0:3.6.18-1.el5_6.ppc",
"product": {
"name": "firefox-0:3.6.18-1.el5_6.ppc",
"product_id": "firefox-0:3.6.18-1.el5_6.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/firefox@3.6.18-1.el5_6?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "firefox-debuginfo-0:3.6.18-1.el5_6.ppc",
"product": {
"name": "firefox-debuginfo-0:3.6.18-1.el5_6.ppc",
"product_id": "firefox-debuginfo-0:3.6.18-1.el5_6.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/firefox-debuginfo@3.6.18-1.el5_6?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ppc",
"product": {
"name": "xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ppc",
"product_id": "xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xulrunner-debuginfo@1.9.2.18-2.el5_6?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "xulrunner-devel-0:1.9.2.18-2.el5_6.ppc",
"product": {
"name": "xulrunner-devel-0:1.9.2.18-2.el5_6.ppc",
"product_id": "xulrunner-devel-0:1.9.2.18-2.el5_6.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xulrunner-devel@1.9.2.18-2.el5_6?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "xulrunner-0:1.9.2.18-2.el5_6.ppc",
"product": {
"name": "xulrunner-0:1.9.2.18-2.el5_6.ppc",
"product_id": "xulrunner-0:1.9.2.18-2.el5_6.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xulrunner@1.9.2.18-2.el5_6?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "firefox-debuginfo-0:3.6.18-1.el6_1.ppc",
"product": {
"name": "firefox-debuginfo-0:3.6.18-1.el6_1.ppc",
"product_id": "firefox-debuginfo-0:3.6.18-1.el6_1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/firefox-debuginfo@3.6.18-1.el6_1?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "firefox-0:3.6.18-1.el6_1.ppc",
"product": {
"name": "firefox-0:3.6.18-1.el6_1.ppc",
"product_id": "firefox-0:3.6.18-1.el6_1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/firefox@3.6.18-1.el6_1?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "xulrunner-devel-0:1.9.2.18-2.el6_1.ppc",
"product": {
"name": "xulrunner-devel-0:1.9.2.18-2.el6_1.ppc",
"product_id": "xulrunner-devel-0:1.9.2.18-2.el6_1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xulrunner-devel@1.9.2.18-2.el6_1?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc",
"product": {
"name": "xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc",
"product_id": "xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xulrunner-debuginfo@1.9.2.18-2.el6_1?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "xulrunner-0:1.9.2.18-2.el6_1.ppc",
"product": {
"name": "xulrunner-0:1.9.2.18-2.el6_1.ppc",
"product_id": "xulrunner-0:1.9.2.18-2.el6_1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xulrunner@1.9.2.18-2.el6_1?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "firefox-debuginfo-0:3.6.18-2.el4.ppc",
"product": {
"name": "firefox-debuginfo-0:3.6.18-2.el4.ppc",
"product_id": "firefox-debuginfo-0:3.6.18-2.el4.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/firefox-debuginfo@3.6.18-2.el4?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "firefox-0:3.6.18-2.el4.ppc",
"product": {
"name": "firefox-0:3.6.18-2.el4.ppc",
"product_id": "firefox-0:3.6.18-2.el4.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/firefox@3.6.18-2.el4?arch=ppc"
}
}
}
],
"category": "architecture",
"name": "ppc"
},
{
"branches": [
{
"category": "product_version",
"name": "firefox-0:3.6.18-1.el5_6.src",
"product": {
"name": "firefox-0:3.6.18-1.el5_6.src",
"product_id": "firefox-0:3.6.18-1.el5_6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/firefox@3.6.18-1.el5_6?arch=src"
}
}
},
{
"category": "product_version",
"name": "xulrunner-0:1.9.2.18-2.el5_6.src",
"product": {
"name": "xulrunner-0:1.9.2.18-2.el5_6.src",
"product_id": "xulrunner-0:1.9.2.18-2.el5_6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xulrunner@1.9.2.18-2.el5_6?arch=src"
}
}
},
{
"category": "product_version",
"name": "firefox-0:3.6.18-1.el6_1.src",
"product": {
"name": "firefox-0:3.6.18-1.el6_1.src",
"product_id": "firefox-0:3.6.18-1.el6_1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/firefox@3.6.18-1.el6_1?arch=src"
}
}
},
{
"category": "product_version",
"name": "xulrunner-0:1.9.2.18-2.el6_1.src",
"product": {
"name": "xulrunner-0:1.9.2.18-2.el6_1.src",
"product_id": "xulrunner-0:1.9.2.18-2.el6_1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xulrunner@1.9.2.18-2.el6_1?arch=src"
}
}
},
{
"category": "product_version",
"name": "firefox-0:3.6.18-2.el4.src",
"product": {
"name": "firefox-0:3.6.18-2.el4.src",
"product_id": "firefox-0:3.6.18-2.el4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/firefox@3.6.18-2.el4?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "firefox-0:3.6.18-1.el5_6.s390x",
"product": {
"name": "firefox-0:3.6.18-1.el5_6.s390x",
"product_id": "firefox-0:3.6.18-1.el5_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/firefox@3.6.18-1.el5_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "firefox-debuginfo-0:3.6.18-1.el5_6.s390x",
"product": {
"name": "firefox-debuginfo-0:3.6.18-1.el5_6.s390x",
"product_id": "firefox-debuginfo-0:3.6.18-1.el5_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/firefox-debuginfo@3.6.18-1.el5_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "xulrunner-debuginfo-0:1.9.2.18-2.el5_6.s390x",
"product": {
"name": "xulrunner-debuginfo-0:1.9.2.18-2.el5_6.s390x",
"product_id": "xulrunner-debuginfo-0:1.9.2.18-2.el5_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xulrunner-debuginfo@1.9.2.18-2.el5_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "xulrunner-devel-0:1.9.2.18-2.el5_6.s390x",
"product": {
"name": "xulrunner-devel-0:1.9.2.18-2.el5_6.s390x",
"product_id": "xulrunner-devel-0:1.9.2.18-2.el5_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xulrunner-devel@1.9.2.18-2.el5_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "xulrunner-0:1.9.2.18-2.el5_6.s390x",
"product": {
"name": "xulrunner-0:1.9.2.18-2.el5_6.s390x",
"product_id": "xulrunner-0:1.9.2.18-2.el5_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xulrunner@1.9.2.18-2.el5_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "firefox-debuginfo-0:3.6.18-1.el6_1.s390x",
"product": {
"name": "firefox-debuginfo-0:3.6.18-1.el6_1.s390x",
"product_id": "firefox-debuginfo-0:3.6.18-1.el6_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/firefox-debuginfo@3.6.18-1.el6_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "firefox-0:3.6.18-1.el6_1.s390x",
"product": {
"name": "firefox-0:3.6.18-1.el6_1.s390x",
"product_id": "firefox-0:3.6.18-1.el6_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/firefox@3.6.18-1.el6_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "xulrunner-devel-0:1.9.2.18-2.el6_1.s390x",
"product": {
"name": "xulrunner-devel-0:1.9.2.18-2.el6_1.s390x",
"product_id": "xulrunner-devel-0:1.9.2.18-2.el6_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xulrunner-devel@1.9.2.18-2.el6_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390x",
"product": {
"name": "xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390x",
"product_id": "xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xulrunner-debuginfo@1.9.2.18-2.el6_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "xulrunner-0:1.9.2.18-2.el6_1.s390x",
"product": {
"name": "xulrunner-0:1.9.2.18-2.el6_1.s390x",
"product_id": "xulrunner-0:1.9.2.18-2.el6_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xulrunner@1.9.2.18-2.el6_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "firefox-debuginfo-0:3.6.18-2.el4.s390x",
"product": {
"name": "firefox-debuginfo-0:3.6.18-2.el4.s390x",
"product_id": "firefox-debuginfo-0:3.6.18-2.el4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/firefox-debuginfo@3.6.18-2.el4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "firefox-0:3.6.18-2.el4.s390x",
"product": {
"name": "firefox-0:3.6.18-2.el4.s390x",
"product_id": "firefox-0:3.6.18-2.el4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/firefox@3.6.18-2.el4?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "firefox-0:3.6.18-1.el5_6.s390",
"product": {
"name": "firefox-0:3.6.18-1.el5_6.s390",
"product_id": "firefox-0:3.6.18-1.el5_6.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/firefox@3.6.18-1.el5_6?arch=s390"
}
}
},
{
"category": "product_version",
"name": "firefox-debuginfo-0:3.6.18-1.el5_6.s390",
"product": {
"name": "firefox-debuginfo-0:3.6.18-1.el5_6.s390",
"product_id": "firefox-debuginfo-0:3.6.18-1.el5_6.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/firefox-debuginfo@3.6.18-1.el5_6?arch=s390"
}
}
},
{
"category": "product_version",
"name": "xulrunner-debuginfo-0:1.9.2.18-2.el5_6.s390",
"product": {
"name": "xulrunner-debuginfo-0:1.9.2.18-2.el5_6.s390",
"product_id": "xulrunner-debuginfo-0:1.9.2.18-2.el5_6.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xulrunner-debuginfo@1.9.2.18-2.el5_6?arch=s390"
}
}
},
{
"category": "product_version",
"name": "xulrunner-devel-0:1.9.2.18-2.el5_6.s390",
"product": {
"name": "xulrunner-devel-0:1.9.2.18-2.el5_6.s390",
"product_id": "xulrunner-devel-0:1.9.2.18-2.el5_6.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xulrunner-devel@1.9.2.18-2.el5_6?arch=s390"
}
}
},
{
"category": "product_version",
"name": "xulrunner-0:1.9.2.18-2.el5_6.s390",
"product": {
"name": "xulrunner-0:1.9.2.18-2.el5_6.s390",
"product_id": "xulrunner-0:1.9.2.18-2.el5_6.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xulrunner@1.9.2.18-2.el5_6?arch=s390"
}
}
},
{
"category": "product_version",
"name": "firefox-debuginfo-0:3.6.18-1.el6_1.s390",
"product": {
"name": "firefox-debuginfo-0:3.6.18-1.el6_1.s390",
"product_id": "firefox-debuginfo-0:3.6.18-1.el6_1.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/firefox-debuginfo@3.6.18-1.el6_1?arch=s390"
}
}
},
{
"category": "product_version",
"name": "firefox-0:3.6.18-1.el6_1.s390",
"product": {
"name": "firefox-0:3.6.18-1.el6_1.s390",
"product_id": "firefox-0:3.6.18-1.el6_1.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/firefox@3.6.18-1.el6_1?arch=s390"
}
}
},
{
"category": "product_version",
"name": "xulrunner-devel-0:1.9.2.18-2.el6_1.s390",
"product": {
"name": "xulrunner-devel-0:1.9.2.18-2.el6_1.s390",
"product_id": "xulrunner-devel-0:1.9.2.18-2.el6_1.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xulrunner-devel@1.9.2.18-2.el6_1?arch=s390"
}
}
},
{
"category": "product_version",
"name": "xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390",
"product": {
"name": "xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390",
"product_id": "xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xulrunner-debuginfo@1.9.2.18-2.el6_1?arch=s390"
}
}
},
{
"category": "product_version",
"name": "xulrunner-0:1.9.2.18-2.el6_1.s390",
"product": {
"name": "xulrunner-0:1.9.2.18-2.el6_1.s390",
"product_id": "xulrunner-0:1.9.2.18-2.el6_1.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xulrunner@1.9.2.18-2.el6_1?arch=s390"
}
}
},
{
"category": "product_version",
"name": "firefox-debuginfo-0:3.6.18-2.el4.s390",
"product": {
"name": "firefox-debuginfo-0:3.6.18-2.el4.s390",
"product_id": "firefox-debuginfo-0:3.6.18-2.el4.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/firefox-debuginfo@3.6.18-2.el4?arch=s390"
}
}
},
{
"category": "product_version",
"name": "firefox-0:3.6.18-2.el4.s390",
"product": {
"name": "firefox-0:3.6.18-2.el4.s390",
"product_id": "firefox-0:3.6.18-2.el4.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/firefox@3.6.18-2.el4?arch=s390"
}
}
}
],
"category": "architecture",
"name": "s390"
},
{
"branches": [
{
"category": "product_version",
"name": "firefox-0:3.6.18-1.el5_6.x86_64",
"product": {
"name": "firefox-0:3.6.18-1.el5_6.x86_64",
"product_id": "firefox-0:3.6.18-1.el5_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/firefox@3.6.18-1.el5_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "firefox-debuginfo-0:3.6.18-1.el5_6.x86_64",
"product": {
"name": "firefox-debuginfo-0:3.6.18-1.el5_6.x86_64",
"product_id": "firefox-debuginfo-0:3.6.18-1.el5_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/firefox-debuginfo@3.6.18-1.el5_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "xulrunner-debuginfo-0:1.9.2.18-2.el5_6.x86_64",
"product": {
"name": "xulrunner-debuginfo-0:1.9.2.18-2.el5_6.x86_64",
"product_id": "xulrunner-debuginfo-0:1.9.2.18-2.el5_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xulrunner-debuginfo@1.9.2.18-2.el5_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "xulrunner-devel-0:1.9.2.18-2.el5_6.x86_64",
"product": {
"name": "xulrunner-devel-0:1.9.2.18-2.el5_6.x86_64",
"product_id": "xulrunner-devel-0:1.9.2.18-2.el5_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xulrunner-devel@1.9.2.18-2.el5_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "xulrunner-0:1.9.2.18-2.el5_6.x86_64",
"product": {
"name": "xulrunner-0:1.9.2.18-2.el5_6.x86_64",
"product_id": "xulrunner-0:1.9.2.18-2.el5_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xulrunner@1.9.2.18-2.el5_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "firefox-debuginfo-0:3.6.18-1.el6_1.x86_64",
"product": {
"name": "firefox-debuginfo-0:3.6.18-1.el6_1.x86_64",
"product_id": "firefox-debuginfo-0:3.6.18-1.el6_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/firefox-debuginfo@3.6.18-1.el6_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "firefox-0:3.6.18-1.el6_1.x86_64",
"product": {
"name": "firefox-0:3.6.18-1.el6_1.x86_64",
"product_id": "firefox-0:3.6.18-1.el6_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/firefox@3.6.18-1.el6_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "xulrunner-devel-0:1.9.2.18-2.el6_1.x86_64",
"product": {
"name": "xulrunner-devel-0:1.9.2.18-2.el6_1.x86_64",
"product_id": "xulrunner-devel-0:1.9.2.18-2.el6_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xulrunner-devel@1.9.2.18-2.el6_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "xulrunner-debuginfo-0:1.9.2.18-2.el6_1.x86_64",
"product": {
"name": "xulrunner-debuginfo-0:1.9.2.18-2.el6_1.x86_64",
"product_id": "xulrunner-debuginfo-0:1.9.2.18-2.el6_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xulrunner-debuginfo@1.9.2.18-2.el6_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "xulrunner-0:1.9.2.18-2.el6_1.x86_64",
"product": {
"name": "xulrunner-0:1.9.2.18-2.el6_1.x86_64",
"product_id": "xulrunner-0:1.9.2.18-2.el6_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xulrunner@1.9.2.18-2.el6_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"product": {
"name": "firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"product_id": "firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/firefox-debuginfo@3.6.18-2.el4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "firefox-0:3.6.18-2.el4.x86_64",
"product": {
"name": "firefox-0:3.6.18-2.el4.x86_64",
"product_id": "firefox-0:3.6.18-2.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/firefox@3.6.18-2.el4?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "firefox-0:3.6.18-1.el5_6.i386",
"product": {
"name": "firefox-0:3.6.18-1.el5_6.i386",
"product_id": "firefox-0:3.6.18-1.el5_6.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/firefox@3.6.18-1.el5_6?arch=i386"
}
}
},
{
"category": "product_version",
"name": "firefox-debuginfo-0:3.6.18-1.el5_6.i386",
"product": {
"name": "firefox-debuginfo-0:3.6.18-1.el5_6.i386",
"product_id": "firefox-debuginfo-0:3.6.18-1.el5_6.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/firefox-debuginfo@3.6.18-1.el5_6?arch=i386"
}
}
},
{
"category": "product_version",
"name": "xulrunner-debuginfo-0:1.9.2.18-2.el5_6.i386",
"product": {
"name": "xulrunner-debuginfo-0:1.9.2.18-2.el5_6.i386",
"product_id": "xulrunner-debuginfo-0:1.9.2.18-2.el5_6.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xulrunner-debuginfo@1.9.2.18-2.el5_6?arch=i386"
}
}
},
{
"category": "product_version",
"name": "xulrunner-devel-0:1.9.2.18-2.el5_6.i386",
"product": {
"name": "xulrunner-devel-0:1.9.2.18-2.el5_6.i386",
"product_id": "xulrunner-devel-0:1.9.2.18-2.el5_6.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xulrunner-devel@1.9.2.18-2.el5_6?arch=i386"
}
}
},
{
"category": "product_version",
"name": "xulrunner-0:1.9.2.18-2.el5_6.i386",
"product": {
"name": "xulrunner-0:1.9.2.18-2.el5_6.i386",
"product_id": "xulrunner-0:1.9.2.18-2.el5_6.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xulrunner@1.9.2.18-2.el5_6?arch=i386"
}
}
},
{
"category": "product_version",
"name": "firefox-debuginfo-0:3.6.18-2.el4.i386",
"product": {
"name": "firefox-debuginfo-0:3.6.18-2.el4.i386",
"product_id": "firefox-debuginfo-0:3.6.18-2.el4.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/firefox-debuginfo@3.6.18-2.el4?arch=i386"
}
}
},
{
"category": "product_version",
"name": "firefox-0:3.6.18-2.el4.i386",
"product": {
"name": "firefox-0:3.6.18-2.el4.i386",
"product_id": "firefox-0:3.6.18-2.el4.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/firefox@3.6.18-2.el4?arch=i386"
}
}
}
],
"category": "architecture",
"name": "i386"
},
{
"branches": [
{
"category": "product_version",
"name": "xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ppc64",
"product": {
"name": "xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ppc64",
"product_id": "xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xulrunner-debuginfo@1.9.2.18-2.el5_6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "xulrunner-devel-0:1.9.2.18-2.el5_6.ppc64",
"product": {
"name": "xulrunner-devel-0:1.9.2.18-2.el5_6.ppc64",
"product_id": "xulrunner-devel-0:1.9.2.18-2.el5_6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xulrunner-devel@1.9.2.18-2.el5_6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "xulrunner-0:1.9.2.18-2.el5_6.ppc64",
"product": {
"name": "xulrunner-0:1.9.2.18-2.el5_6.ppc64",
"product_id": "xulrunner-0:1.9.2.18-2.el5_6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xulrunner@1.9.2.18-2.el5_6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "firefox-debuginfo-0:3.6.18-1.el6_1.ppc64",
"product": {
"name": "firefox-debuginfo-0:3.6.18-1.el6_1.ppc64",
"product_id": "firefox-debuginfo-0:3.6.18-1.el6_1.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/firefox-debuginfo@3.6.18-1.el6_1?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "firefox-0:3.6.18-1.el6_1.ppc64",
"product": {
"name": "firefox-0:3.6.18-1.el6_1.ppc64",
"product_id": "firefox-0:3.6.18-1.el6_1.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/firefox@3.6.18-1.el6_1?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "xulrunner-devel-0:1.9.2.18-2.el6_1.ppc64",
"product": {
"name": "xulrunner-devel-0:1.9.2.18-2.el6_1.ppc64",
"product_id": "xulrunner-devel-0:1.9.2.18-2.el6_1.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xulrunner-devel@1.9.2.18-2.el6_1?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc64",
"product": {
"name": "xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc64",
"product_id": "xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xulrunner-debuginfo@1.9.2.18-2.el6_1?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "xulrunner-0:1.9.2.18-2.el6_1.ppc64",
"product": {
"name": "xulrunner-0:1.9.2.18-2.el6_1.ppc64",
"product_id": "xulrunner-0:1.9.2.18-2.el6_1.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xulrunner@1.9.2.18-2.el6_1?arch=ppc64"
}
}
}
],
"category": "architecture",
"name": "ppc64"
},
{
"branches": [
{
"category": "product_version",
"name": "firefox-debuginfo-0:3.6.18-1.el6_1.i686",
"product": {
"name": "firefox-debuginfo-0:3.6.18-1.el6_1.i686",
"product_id": "firefox-debuginfo-0:3.6.18-1.el6_1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/firefox-debuginfo@3.6.18-1.el6_1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "firefox-0:3.6.18-1.el6_1.i686",
"product": {
"name": "firefox-0:3.6.18-1.el6_1.i686",
"product_id": "firefox-0:3.6.18-1.el6_1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/firefox@3.6.18-1.el6_1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "xulrunner-devel-0:1.9.2.18-2.el6_1.i686",
"product": {
"name": "xulrunner-devel-0:1.9.2.18-2.el6_1.i686",
"product_id": "xulrunner-devel-0:1.9.2.18-2.el6_1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xulrunner-devel@1.9.2.18-2.el6_1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "xulrunner-debuginfo-0:1.9.2.18-2.el6_1.i686",
"product": {
"name": "xulrunner-debuginfo-0:1.9.2.18-2.el6_1.i686",
"product_id": "xulrunner-debuginfo-0:1.9.2.18-2.el6_1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xulrunner-debuginfo@1.9.2.18-2.el6_1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "xulrunner-0:1.9.2.18-2.el6_1.i686",
"product": {
"name": "xulrunner-0:1.9.2.18-2.el6_1.i686",
"product_id": "xulrunner-0:1.9.2.18-2.el6_1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xulrunner@1.9.2.18-2.el6_1?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-0:3.6.18-2.el4.i386 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:firefox-0:3.6.18-2.el4.i386"
},
"product_reference": "firefox-0:3.6.18-2.el4.i386",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-0:3.6.18-2.el4.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:firefox-0:3.6.18-2.el4.ia64"
},
"product_reference": "firefox-0:3.6.18-2.el4.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-0:3.6.18-2.el4.ppc as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:firefox-0:3.6.18-2.el4.ppc"
},
"product_reference": "firefox-0:3.6.18-2.el4.ppc",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-0:3.6.18-2.el4.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:firefox-0:3.6.18-2.el4.s390"
},
"product_reference": "firefox-0:3.6.18-2.el4.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-0:3.6.18-2.el4.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:firefox-0:3.6.18-2.el4.s390x"
},
"product_reference": "firefox-0:3.6.18-2.el4.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-0:3.6.18-2.el4.src as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:firefox-0:3.6.18-2.el4.src"
},
"product_reference": "firefox-0:3.6.18-2.el4.src",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-0:3.6.18-2.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:firefox-0:3.6.18-2.el4.x86_64"
},
"product_reference": "firefox-0:3.6.18-2.el4.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-debuginfo-0:3.6.18-2.el4.i386 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:firefox-debuginfo-0:3.6.18-2.el4.i386"
},
"product_reference": "firefox-debuginfo-0:3.6.18-2.el4.i386",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-debuginfo-0:3.6.18-2.el4.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:firefox-debuginfo-0:3.6.18-2.el4.ia64"
},
"product_reference": "firefox-debuginfo-0:3.6.18-2.el4.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-debuginfo-0:3.6.18-2.el4.ppc as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:firefox-debuginfo-0:3.6.18-2.el4.ppc"
},
"product_reference": "firefox-debuginfo-0:3.6.18-2.el4.ppc",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-debuginfo-0:3.6.18-2.el4.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:firefox-debuginfo-0:3.6.18-2.el4.s390"
},
"product_reference": "firefox-debuginfo-0:3.6.18-2.el4.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-debuginfo-0:3.6.18-2.el4.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:firefox-debuginfo-0:3.6.18-2.el4.s390x"
},
"product_reference": "firefox-debuginfo-0:3.6.18-2.el4.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-debuginfo-0:3.6.18-2.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:firefox-debuginfo-0:3.6.18-2.el4.x86_64"
},
"product_reference": "firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-0:3.6.18-2.el4.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:firefox-0:3.6.18-2.el4.i386"
},
"product_reference": "firefox-0:3.6.18-2.el4.i386",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-0:3.6.18-2.el4.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:firefox-0:3.6.18-2.el4.ia64"
},
"product_reference": "firefox-0:3.6.18-2.el4.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-0:3.6.18-2.el4.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:firefox-0:3.6.18-2.el4.ppc"
},
"product_reference": "firefox-0:3.6.18-2.el4.ppc",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-0:3.6.18-2.el4.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:firefox-0:3.6.18-2.el4.s390"
},
"product_reference": "firefox-0:3.6.18-2.el4.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-0:3.6.18-2.el4.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:firefox-0:3.6.18-2.el4.s390x"
},
"product_reference": "firefox-0:3.6.18-2.el4.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-0:3.6.18-2.el4.src as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:firefox-0:3.6.18-2.el4.src"
},
"product_reference": "firefox-0:3.6.18-2.el4.src",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-0:3.6.18-2.el4.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:firefox-0:3.6.18-2.el4.x86_64"
},
"product_reference": "firefox-0:3.6.18-2.el4.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-debuginfo-0:3.6.18-2.el4.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:firefox-debuginfo-0:3.6.18-2.el4.i386"
},
"product_reference": "firefox-debuginfo-0:3.6.18-2.el4.i386",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-debuginfo-0:3.6.18-2.el4.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:firefox-debuginfo-0:3.6.18-2.el4.ia64"
},
"product_reference": "firefox-debuginfo-0:3.6.18-2.el4.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-debuginfo-0:3.6.18-2.el4.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:firefox-debuginfo-0:3.6.18-2.el4.ppc"
},
"product_reference": "firefox-debuginfo-0:3.6.18-2.el4.ppc",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-debuginfo-0:3.6.18-2.el4.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:firefox-debuginfo-0:3.6.18-2.el4.s390"
},
"product_reference": "firefox-debuginfo-0:3.6.18-2.el4.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-debuginfo-0:3.6.18-2.el4.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:firefox-debuginfo-0:3.6.18-2.el4.s390x"
},
"product_reference": "firefox-debuginfo-0:3.6.18-2.el4.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-debuginfo-0:3.6.18-2.el4.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:firefox-debuginfo-0:3.6.18-2.el4.x86_64"
},
"product_reference": "firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-0:3.6.18-2.el4.i386 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:firefox-0:3.6.18-2.el4.i386"
},
"product_reference": "firefox-0:3.6.18-2.el4.i386",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-0:3.6.18-2.el4.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:firefox-0:3.6.18-2.el4.ia64"
},
"product_reference": "firefox-0:3.6.18-2.el4.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-0:3.6.18-2.el4.ppc as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:firefox-0:3.6.18-2.el4.ppc"
},
"product_reference": "firefox-0:3.6.18-2.el4.ppc",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-0:3.6.18-2.el4.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:firefox-0:3.6.18-2.el4.s390"
},
"product_reference": "firefox-0:3.6.18-2.el4.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-0:3.6.18-2.el4.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:firefox-0:3.6.18-2.el4.s390x"
},
"product_reference": "firefox-0:3.6.18-2.el4.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-0:3.6.18-2.el4.src as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:firefox-0:3.6.18-2.el4.src"
},
"product_reference": "firefox-0:3.6.18-2.el4.src",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-0:3.6.18-2.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:firefox-0:3.6.18-2.el4.x86_64"
},
"product_reference": "firefox-0:3.6.18-2.el4.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-debuginfo-0:3.6.18-2.el4.i386 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:firefox-debuginfo-0:3.6.18-2.el4.i386"
},
"product_reference": "firefox-debuginfo-0:3.6.18-2.el4.i386",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-debuginfo-0:3.6.18-2.el4.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:firefox-debuginfo-0:3.6.18-2.el4.ia64"
},
"product_reference": "firefox-debuginfo-0:3.6.18-2.el4.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-debuginfo-0:3.6.18-2.el4.ppc as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:firefox-debuginfo-0:3.6.18-2.el4.ppc"
},
"product_reference": "firefox-debuginfo-0:3.6.18-2.el4.ppc",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-debuginfo-0:3.6.18-2.el4.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:firefox-debuginfo-0:3.6.18-2.el4.s390"
},
"product_reference": "firefox-debuginfo-0:3.6.18-2.el4.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-debuginfo-0:3.6.18-2.el4.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:firefox-debuginfo-0:3.6.18-2.el4.s390x"
},
"product_reference": "firefox-debuginfo-0:3.6.18-2.el4.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-debuginfo-0:3.6.18-2.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:firefox-debuginfo-0:3.6.18-2.el4.x86_64"
},
"product_reference": "firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-0:3.6.18-2.el4.i386 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:firefox-0:3.6.18-2.el4.i386"
},
"product_reference": "firefox-0:3.6.18-2.el4.i386",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-0:3.6.18-2.el4.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:firefox-0:3.6.18-2.el4.ia64"
},
"product_reference": "firefox-0:3.6.18-2.el4.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-0:3.6.18-2.el4.ppc as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:firefox-0:3.6.18-2.el4.ppc"
},
"product_reference": "firefox-0:3.6.18-2.el4.ppc",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-0:3.6.18-2.el4.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:firefox-0:3.6.18-2.el4.s390"
},
"product_reference": "firefox-0:3.6.18-2.el4.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-0:3.6.18-2.el4.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:firefox-0:3.6.18-2.el4.s390x"
},
"product_reference": "firefox-0:3.6.18-2.el4.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-0:3.6.18-2.el4.src as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:firefox-0:3.6.18-2.el4.src"
},
"product_reference": "firefox-0:3.6.18-2.el4.src",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-0:3.6.18-2.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:firefox-0:3.6.18-2.el4.x86_64"
},
"product_reference": "firefox-0:3.6.18-2.el4.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-debuginfo-0:3.6.18-2.el4.i386 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:firefox-debuginfo-0:3.6.18-2.el4.i386"
},
"product_reference": "firefox-debuginfo-0:3.6.18-2.el4.i386",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-debuginfo-0:3.6.18-2.el4.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:firefox-debuginfo-0:3.6.18-2.el4.ia64"
},
"product_reference": "firefox-debuginfo-0:3.6.18-2.el4.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-debuginfo-0:3.6.18-2.el4.ppc as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:firefox-debuginfo-0:3.6.18-2.el4.ppc"
},
"product_reference": "firefox-debuginfo-0:3.6.18-2.el4.ppc",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-debuginfo-0:3.6.18-2.el4.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:firefox-debuginfo-0:3.6.18-2.el4.s390"
},
"product_reference": "firefox-debuginfo-0:3.6.18-2.el4.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-debuginfo-0:3.6.18-2.el4.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:firefox-debuginfo-0:3.6.18-2.el4.s390x"
},
"product_reference": "firefox-debuginfo-0:3.6.18-2.el4.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-debuginfo-0:3.6.18-2.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:firefox-debuginfo-0:3.6.18-2.el4.x86_64"
},
"product_reference": "firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-0:3.6.18-1.el5_6.i386 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.i386"
},
"product_reference": "firefox-0:3.6.18-1.el5_6.i386",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-0:3.6.18-1.el5_6.ia64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.ia64"
},
"product_reference": "firefox-0:3.6.18-1.el5_6.ia64",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-0:3.6.18-1.el5_6.ppc as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.ppc"
},
"product_reference": "firefox-0:3.6.18-1.el5_6.ppc",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-0:3.6.18-1.el5_6.s390 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.s390"
},
"product_reference": "firefox-0:3.6.18-1.el5_6.s390",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-0:3.6.18-1.el5_6.s390x as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.s390x"
},
"product_reference": "firefox-0:3.6.18-1.el5_6.s390x",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-0:3.6.18-1.el5_6.src as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.src"
},
"product_reference": "firefox-0:3.6.18-1.el5_6.src",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-0:3.6.18-1.el5_6.x86_64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.x86_64"
},
"product_reference": "firefox-0:3.6.18-1.el5_6.x86_64",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-debuginfo-0:3.6.18-1.el5_6.i386 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.i386"
},
"product_reference": "firefox-debuginfo-0:3.6.18-1.el5_6.i386",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-debuginfo-0:3.6.18-1.el5_6.ia64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.ia64"
},
"product_reference": "firefox-debuginfo-0:3.6.18-1.el5_6.ia64",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-debuginfo-0:3.6.18-1.el5_6.ppc as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.ppc"
},
"product_reference": "firefox-debuginfo-0:3.6.18-1.el5_6.ppc",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-debuginfo-0:3.6.18-1.el5_6.s390 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.s390"
},
"product_reference": "firefox-debuginfo-0:3.6.18-1.el5_6.s390",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-debuginfo-0:3.6.18-1.el5_6.s390x as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.s390x"
},
"product_reference": "firefox-debuginfo-0:3.6.18-1.el5_6.s390x",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-debuginfo-0:3.6.18-1.el5_6.x86_64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.x86_64"
},
"product_reference": "firefox-debuginfo-0:3.6.18-1.el5_6.x86_64",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-0:1.9.2.18-2.el5_6.i386 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.i386"
},
"product_reference": "xulrunner-0:1.9.2.18-2.el5_6.i386",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-0:1.9.2.18-2.el5_6.ia64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ia64"
},
"product_reference": "xulrunner-0:1.9.2.18-2.el5_6.ia64",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-0:1.9.2.18-2.el5_6.ppc as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ppc"
},
"product_reference": "xulrunner-0:1.9.2.18-2.el5_6.ppc",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-0:1.9.2.18-2.el5_6.ppc64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ppc64"
},
"product_reference": "xulrunner-0:1.9.2.18-2.el5_6.ppc64",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-0:1.9.2.18-2.el5_6.s390 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.s390"
},
"product_reference": "xulrunner-0:1.9.2.18-2.el5_6.s390",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-0:1.9.2.18-2.el5_6.s390x as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.s390x"
},
"product_reference": "xulrunner-0:1.9.2.18-2.el5_6.s390x",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-0:1.9.2.18-2.el5_6.src as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.src"
},
"product_reference": "xulrunner-0:1.9.2.18-2.el5_6.src",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-0:1.9.2.18-2.el5_6.x86_64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.x86_64"
},
"product_reference": "xulrunner-0:1.9.2.18-2.el5_6.x86_64",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-debuginfo-0:1.9.2.18-2.el5_6.i386 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.i386"
},
"product_reference": "xulrunner-debuginfo-0:1.9.2.18-2.el5_6.i386",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ia64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ia64"
},
"product_reference": "xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ia64",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ppc as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ppc"
},
"product_reference": "xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ppc",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ppc64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ppc64"
},
"product_reference": "xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ppc64",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-debuginfo-0:1.9.2.18-2.el5_6.s390 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.s390"
},
"product_reference": "xulrunner-debuginfo-0:1.9.2.18-2.el5_6.s390",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-debuginfo-0:1.9.2.18-2.el5_6.s390x as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.s390x"
},
"product_reference": "xulrunner-debuginfo-0:1.9.2.18-2.el5_6.s390x",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-debuginfo-0:1.9.2.18-2.el5_6.x86_64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.x86_64"
},
"product_reference": "xulrunner-debuginfo-0:1.9.2.18-2.el5_6.x86_64",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-devel-0:1.9.2.18-2.el5_6.i386 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.i386"
},
"product_reference": "xulrunner-devel-0:1.9.2.18-2.el5_6.i386",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-devel-0:1.9.2.18-2.el5_6.ia64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ia64"
},
"product_reference": "xulrunner-devel-0:1.9.2.18-2.el5_6.ia64",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-devel-0:1.9.2.18-2.el5_6.ppc as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ppc"
},
"product_reference": "xulrunner-devel-0:1.9.2.18-2.el5_6.ppc",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-devel-0:1.9.2.18-2.el5_6.ppc64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ppc64"
},
"product_reference": "xulrunner-devel-0:1.9.2.18-2.el5_6.ppc64",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-devel-0:1.9.2.18-2.el5_6.s390 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.s390"
},
"product_reference": "xulrunner-devel-0:1.9.2.18-2.el5_6.s390",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-devel-0:1.9.2.18-2.el5_6.s390x as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.s390x"
},
"product_reference": "xulrunner-devel-0:1.9.2.18-2.el5_6.s390x",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-devel-0:1.9.2.18-2.el5_6.x86_64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.x86_64"
},
"product_reference": "xulrunner-devel-0:1.9.2.18-2.el5_6.x86_64",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-0:3.6.18-1.el6_1.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:firefox-0:3.6.18-1.el6_1.i686"
},
"product_reference": "firefox-0:3.6.18-1.el6_1.i686",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-0:3.6.18-1.el6_1.ppc as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:firefox-0:3.6.18-1.el6_1.ppc"
},
"product_reference": "firefox-0:3.6.18-1.el6_1.ppc",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-0:3.6.18-1.el6_1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:firefox-0:3.6.18-1.el6_1.ppc64"
},
"product_reference": "firefox-0:3.6.18-1.el6_1.ppc64",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-0:3.6.18-1.el6_1.s390 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:firefox-0:3.6.18-1.el6_1.s390"
},
"product_reference": "firefox-0:3.6.18-1.el6_1.s390",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-0:3.6.18-1.el6_1.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:firefox-0:3.6.18-1.el6_1.s390x"
},
"product_reference": "firefox-0:3.6.18-1.el6_1.s390x",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-0:3.6.18-1.el6_1.src as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:firefox-0:3.6.18-1.el6_1.src"
},
"product_reference": "firefox-0:3.6.18-1.el6_1.src",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-0:3.6.18-1.el6_1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:firefox-0:3.6.18-1.el6_1.x86_64"
},
"product_reference": "firefox-0:3.6.18-1.el6_1.x86_64",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-debuginfo-0:3.6.18-1.el6_1.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.i686"
},
"product_reference": "firefox-debuginfo-0:3.6.18-1.el6_1.i686",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-debuginfo-0:3.6.18-1.el6_1.ppc as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.ppc"
},
"product_reference": "firefox-debuginfo-0:3.6.18-1.el6_1.ppc",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-debuginfo-0:3.6.18-1.el6_1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.ppc64"
},
"product_reference": "firefox-debuginfo-0:3.6.18-1.el6_1.ppc64",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-debuginfo-0:3.6.18-1.el6_1.s390 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.s390"
},
"product_reference": "firefox-debuginfo-0:3.6.18-1.el6_1.s390",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-debuginfo-0:3.6.18-1.el6_1.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.s390x"
},
"product_reference": "firefox-debuginfo-0:3.6.18-1.el6_1.s390x",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-debuginfo-0:3.6.18-1.el6_1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.x86_64"
},
"product_reference": "firefox-debuginfo-0:3.6.18-1.el6_1.x86_64",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-0:1.9.2.18-2.el6_1.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.i686"
},
"product_reference": "xulrunner-0:1.9.2.18-2.el6_1.i686",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-0:1.9.2.18-2.el6_1.ppc as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc"
},
"product_reference": "xulrunner-0:1.9.2.18-2.el6_1.ppc",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-0:1.9.2.18-2.el6_1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc64"
},
"product_reference": "xulrunner-0:1.9.2.18-2.el6_1.ppc64",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-0:1.9.2.18-2.el6_1.s390 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390"
},
"product_reference": "xulrunner-0:1.9.2.18-2.el6_1.s390",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-0:1.9.2.18-2.el6_1.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390x"
},
"product_reference": "xulrunner-0:1.9.2.18-2.el6_1.s390x",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-0:1.9.2.18-2.el6_1.src as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.src"
},
"product_reference": "xulrunner-0:1.9.2.18-2.el6_1.src",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-0:1.9.2.18-2.el6_1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.x86_64"
},
"product_reference": "xulrunner-0:1.9.2.18-2.el6_1.x86_64",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-debuginfo-0:1.9.2.18-2.el6_1.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.i686"
},
"product_reference": "xulrunner-debuginfo-0:1.9.2.18-2.el6_1.i686",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc"
},
"product_reference": "xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc64"
},
"product_reference": "xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc64",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390"
},
"product_reference": "xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390x"
},
"product_reference": "xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390x",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-debuginfo-0:1.9.2.18-2.el6_1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.x86_64"
},
"product_reference": "xulrunner-debuginfo-0:1.9.2.18-2.el6_1.x86_64",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-devel-0:1.9.2.18-2.el6_1.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.i686"
},
"product_reference": "xulrunner-devel-0:1.9.2.18-2.el6_1.i686",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-devel-0:1.9.2.18-2.el6_1.ppc as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc"
},
"product_reference": "xulrunner-devel-0:1.9.2.18-2.el6_1.ppc",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-devel-0:1.9.2.18-2.el6_1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc64"
},
"product_reference": "xulrunner-devel-0:1.9.2.18-2.el6_1.ppc64",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-devel-0:1.9.2.18-2.el6_1.s390 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390"
},
"product_reference": "xulrunner-devel-0:1.9.2.18-2.el6_1.s390",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-devel-0:1.9.2.18-2.el6_1.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390x"
},
"product_reference": "xulrunner-devel-0:1.9.2.18-2.el6_1.s390x",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-devel-0:1.9.2.18-2.el6_1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.x86_64"
},
"product_reference": "xulrunner-devel-0:1.9.2.18-2.el6_1.x86_64",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-0:1.9.2.18-2.el6_1.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.i686"
},
"product_reference": "xulrunner-0:1.9.2.18-2.el6_1.i686",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-0:1.9.2.18-2.el6_1.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc"
},
"product_reference": "xulrunner-0:1.9.2.18-2.el6_1.ppc",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-0:1.9.2.18-2.el6_1.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc64"
},
"product_reference": "xulrunner-0:1.9.2.18-2.el6_1.ppc64",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-0:1.9.2.18-2.el6_1.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390"
},
"product_reference": "xulrunner-0:1.9.2.18-2.el6_1.s390",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-0:1.9.2.18-2.el6_1.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390x"
},
"product_reference": "xulrunner-0:1.9.2.18-2.el6_1.s390x",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-0:1.9.2.18-2.el6_1.src as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.src"
},
"product_reference": "xulrunner-0:1.9.2.18-2.el6_1.src",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-0:1.9.2.18-2.el6_1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.x86_64"
},
"product_reference": "xulrunner-0:1.9.2.18-2.el6_1.x86_64",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-debuginfo-0:1.9.2.18-2.el6_1.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.i686"
},
"product_reference": "xulrunner-debuginfo-0:1.9.2.18-2.el6_1.i686",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc"
},
"product_reference": "xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc64"
},
"product_reference": "xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc64",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390"
},
"product_reference": "xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390x"
},
"product_reference": "xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390x",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-debuginfo-0:1.9.2.18-2.el6_1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.x86_64"
},
"product_reference": "xulrunner-debuginfo-0:1.9.2.18-2.el6_1.x86_64",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-devel-0:1.9.2.18-2.el6_1.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.i686"
},
"product_reference": "xulrunner-devel-0:1.9.2.18-2.el6_1.i686",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-devel-0:1.9.2.18-2.el6_1.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc"
},
"product_reference": "xulrunner-devel-0:1.9.2.18-2.el6_1.ppc",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-devel-0:1.9.2.18-2.el6_1.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc64"
},
"product_reference": "xulrunner-devel-0:1.9.2.18-2.el6_1.ppc64",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-devel-0:1.9.2.18-2.el6_1.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390"
},
"product_reference": "xulrunner-devel-0:1.9.2.18-2.el6_1.s390",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-devel-0:1.9.2.18-2.el6_1.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390x"
},
"product_reference": "xulrunner-devel-0:1.9.2.18-2.el6_1.s390x",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-devel-0:1.9.2.18-2.el6_1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.x86_64"
},
"product_reference": "xulrunner-devel-0:1.9.2.18-2.el6_1.x86_64",
"relates_to_product_reference": "6Server-optional-6.1.z"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2011-0083",
"discovery_date": "2011-06-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "714581"
}
],
"notes": [
{
"category": "description",
"text": "Use-after-free vulnerability in the nsSVGPathSegList::ReplaceItem function in the implementation of SVG element lists in Mozilla Firefox before 3.6.18, Thunderbird before 3.1.11, and SeaMonkey through 2.0.14 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via vectors involving a user-supplied callback.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Mozilla Multiple dangling pointer vulnerabilities (MFSA 2011-23)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS:firefox-0:3.6.18-2.el4.i386",
"4AS:firefox-0:3.6.18-2.el4.ia64",
"4AS:firefox-0:3.6.18-2.el4.ppc",
"4AS:firefox-0:3.6.18-2.el4.s390",
"4AS:firefox-0:3.6.18-2.el4.s390x",
"4AS:firefox-0:3.6.18-2.el4.src",
"4AS:firefox-0:3.6.18-2.el4.x86_64",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"4Desktop:firefox-0:3.6.18-2.el4.i386",
"4Desktop:firefox-0:3.6.18-2.el4.ia64",
"4Desktop:firefox-0:3.6.18-2.el4.ppc",
"4Desktop:firefox-0:3.6.18-2.el4.s390",
"4Desktop:firefox-0:3.6.18-2.el4.s390x",
"4Desktop:firefox-0:3.6.18-2.el4.src",
"4Desktop:firefox-0:3.6.18-2.el4.x86_64",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"4ES:firefox-0:3.6.18-2.el4.i386",
"4ES:firefox-0:3.6.18-2.el4.ia64",
"4ES:firefox-0:3.6.18-2.el4.ppc",
"4ES:firefox-0:3.6.18-2.el4.s390",
"4ES:firefox-0:3.6.18-2.el4.s390x",
"4ES:firefox-0:3.6.18-2.el4.src",
"4ES:firefox-0:3.6.18-2.el4.x86_64",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"4WS:firefox-0:3.6.18-2.el4.i386",
"4WS:firefox-0:3.6.18-2.el4.ia64",
"4WS:firefox-0:3.6.18-2.el4.ppc",
"4WS:firefox-0:3.6.18-2.el4.s390",
"4WS:firefox-0:3.6.18-2.el4.s390x",
"4WS:firefox-0:3.6.18-2.el4.src",
"4WS:firefox-0:3.6.18-2.el4.x86_64",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.i386",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.ia64",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.ppc",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.s390",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.s390x",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.src",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.x86_64",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.i386",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.ia64",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.ppc",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.s390",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.s390x",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.x86_64",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.i386",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ia64",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ppc",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ppc64",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.s390",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.s390x",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.src",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.x86_64",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.i386",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ia64",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ppc",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ppc64",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.s390",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.s390x",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.x86_64",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.i386",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ia64",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ppc",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ppc64",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.s390",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.s390x",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.x86_64",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.i686",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.ppc",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.ppc64",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.s390",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.s390x",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.src",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.x86_64",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.i686",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.ppc",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.ppc64",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.s390",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.s390x",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.x86_64",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.i686",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc64",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390x",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.src",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.x86_64",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.i686",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc64",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390x",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.x86_64",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.i686",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc64",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390x",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.x86_64",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.i686",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc64",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390x",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.src",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.x86_64",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.i686",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc64",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390x",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.x86_64",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.i686",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc64",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390x",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-0083"
},
{
"category": "external",
"summary": "RHBZ#714581",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=714581"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-0083",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0083"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-0083",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-0083"
}
],
"release_date": "2011-06-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-06-21T22:39:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"4AS:firefox-0:3.6.18-2.el4.i386",
"4AS:firefox-0:3.6.18-2.el4.ia64",
"4AS:firefox-0:3.6.18-2.el4.ppc",
"4AS:firefox-0:3.6.18-2.el4.s390",
"4AS:firefox-0:3.6.18-2.el4.s390x",
"4AS:firefox-0:3.6.18-2.el4.src",
"4AS:firefox-0:3.6.18-2.el4.x86_64",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"4Desktop:firefox-0:3.6.18-2.el4.i386",
"4Desktop:firefox-0:3.6.18-2.el4.ia64",
"4Desktop:firefox-0:3.6.18-2.el4.ppc",
"4Desktop:firefox-0:3.6.18-2.el4.s390",
"4Desktop:firefox-0:3.6.18-2.el4.s390x",
"4Desktop:firefox-0:3.6.18-2.el4.src",
"4Desktop:firefox-0:3.6.18-2.el4.x86_64",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"4ES:firefox-0:3.6.18-2.el4.i386",
"4ES:firefox-0:3.6.18-2.el4.ia64",
"4ES:firefox-0:3.6.18-2.el4.ppc",
"4ES:firefox-0:3.6.18-2.el4.s390",
"4ES:firefox-0:3.6.18-2.el4.s390x",
"4ES:firefox-0:3.6.18-2.el4.src",
"4ES:firefox-0:3.6.18-2.el4.x86_64",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"4WS:firefox-0:3.6.18-2.el4.i386",
"4WS:firefox-0:3.6.18-2.el4.ia64",
"4WS:firefox-0:3.6.18-2.el4.ppc",
"4WS:firefox-0:3.6.18-2.el4.s390",
"4WS:firefox-0:3.6.18-2.el4.s390x",
"4WS:firefox-0:3.6.18-2.el4.src",
"4WS:firefox-0:3.6.18-2.el4.x86_64",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.i386",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.ia64",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.ppc",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.s390",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.s390x",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.src",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.x86_64",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.i386",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.ia64",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.ppc",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.s390",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.s390x",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.x86_64",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.i386",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ia64",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ppc",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ppc64",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.s390",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.s390x",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.src",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.x86_64",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.i386",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ia64",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ppc",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ppc64",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.s390",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.s390x",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.x86_64",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.i386",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ia64",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ppc",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ppc64",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.s390",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.s390x",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.x86_64",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.i686",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.ppc",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.ppc64",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.s390",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.s390x",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.src",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.x86_64",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.i686",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.ppc",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.ppc64",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.s390",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.s390x",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.x86_64",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.i686",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc64",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390x",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.src",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.x86_64",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.i686",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc64",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390x",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.x86_64",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.i686",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc64",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390x",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.x86_64",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.i686",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc64",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390x",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.src",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.x86_64",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.i686",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc64",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390x",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.x86_64",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.i686",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc64",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390x",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:0885"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS:firefox-0:3.6.18-2.el4.i386",
"4AS:firefox-0:3.6.18-2.el4.ia64",
"4AS:firefox-0:3.6.18-2.el4.ppc",
"4AS:firefox-0:3.6.18-2.el4.s390",
"4AS:firefox-0:3.6.18-2.el4.s390x",
"4AS:firefox-0:3.6.18-2.el4.src",
"4AS:firefox-0:3.6.18-2.el4.x86_64",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"4Desktop:firefox-0:3.6.18-2.el4.i386",
"4Desktop:firefox-0:3.6.18-2.el4.ia64",
"4Desktop:firefox-0:3.6.18-2.el4.ppc",
"4Desktop:firefox-0:3.6.18-2.el4.s390",
"4Desktop:firefox-0:3.6.18-2.el4.s390x",
"4Desktop:firefox-0:3.6.18-2.el4.src",
"4Desktop:firefox-0:3.6.18-2.el4.x86_64",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"4ES:firefox-0:3.6.18-2.el4.i386",
"4ES:firefox-0:3.6.18-2.el4.ia64",
"4ES:firefox-0:3.6.18-2.el4.ppc",
"4ES:firefox-0:3.6.18-2.el4.s390",
"4ES:firefox-0:3.6.18-2.el4.s390x",
"4ES:firefox-0:3.6.18-2.el4.src",
"4ES:firefox-0:3.6.18-2.el4.x86_64",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"4WS:firefox-0:3.6.18-2.el4.i386",
"4WS:firefox-0:3.6.18-2.el4.ia64",
"4WS:firefox-0:3.6.18-2.el4.ppc",
"4WS:firefox-0:3.6.18-2.el4.s390",
"4WS:firefox-0:3.6.18-2.el4.s390x",
"4WS:firefox-0:3.6.18-2.el4.src",
"4WS:firefox-0:3.6.18-2.el4.x86_64",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.i386",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.ia64",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.ppc",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.s390",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.s390x",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.src",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.x86_64",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.i386",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.ia64",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.ppc",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.s390",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.s390x",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.x86_64",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.i386",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ia64",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ppc",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ppc64",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.s390",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.s390x",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.src",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.x86_64",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.i386",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ia64",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ppc",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ppc64",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.s390",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.s390x",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.x86_64",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.i386",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ia64",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ppc",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ppc64",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.s390",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.s390x",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.x86_64",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.i686",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.ppc",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.ppc64",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.s390",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.s390x",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.src",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.x86_64",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.i686",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.ppc",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.ppc64",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.s390",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.s390x",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.x86_64",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.i686",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc64",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390x",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.src",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.x86_64",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.i686",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc64",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390x",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.x86_64",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.i686",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc64",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390x",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.x86_64",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.i686",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc64",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390x",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.src",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.x86_64",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.i686",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc64",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390x",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.x86_64",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.i686",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc64",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390x",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "Mozilla Multiple dangling pointer vulnerabilities (MFSA 2011-23)"
},
{
"cve": "CVE-2011-0085",
"discovery_date": "2011-06-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "714581"
}
],
"notes": [
{
"category": "description",
"text": "Use-after-free vulnerability in the nsXULCommandDispatcher function in Mozilla Firefox before 3.6.18, Thunderbird before 3.1.11, and SeaMonkey through 2.0.14 allows remote attackers to execute arbitrary code via a crafted XUL document that dequeues the current command updater.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Mozilla Multiple dangling pointer vulnerabilities (MFSA 2011-23)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS:firefox-0:3.6.18-2.el4.i386",
"4AS:firefox-0:3.6.18-2.el4.ia64",
"4AS:firefox-0:3.6.18-2.el4.ppc",
"4AS:firefox-0:3.6.18-2.el4.s390",
"4AS:firefox-0:3.6.18-2.el4.s390x",
"4AS:firefox-0:3.6.18-2.el4.src",
"4AS:firefox-0:3.6.18-2.el4.x86_64",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"4Desktop:firefox-0:3.6.18-2.el4.i386",
"4Desktop:firefox-0:3.6.18-2.el4.ia64",
"4Desktop:firefox-0:3.6.18-2.el4.ppc",
"4Desktop:firefox-0:3.6.18-2.el4.s390",
"4Desktop:firefox-0:3.6.18-2.el4.s390x",
"4Desktop:firefox-0:3.6.18-2.el4.src",
"4Desktop:firefox-0:3.6.18-2.el4.x86_64",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"4ES:firefox-0:3.6.18-2.el4.i386",
"4ES:firefox-0:3.6.18-2.el4.ia64",
"4ES:firefox-0:3.6.18-2.el4.ppc",
"4ES:firefox-0:3.6.18-2.el4.s390",
"4ES:firefox-0:3.6.18-2.el4.s390x",
"4ES:firefox-0:3.6.18-2.el4.src",
"4ES:firefox-0:3.6.18-2.el4.x86_64",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"4WS:firefox-0:3.6.18-2.el4.i386",
"4WS:firefox-0:3.6.18-2.el4.ia64",
"4WS:firefox-0:3.6.18-2.el4.ppc",
"4WS:firefox-0:3.6.18-2.el4.s390",
"4WS:firefox-0:3.6.18-2.el4.s390x",
"4WS:firefox-0:3.6.18-2.el4.src",
"4WS:firefox-0:3.6.18-2.el4.x86_64",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.i386",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.ia64",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.ppc",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.s390",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.s390x",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.src",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.x86_64",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.i386",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.ia64",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.ppc",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.s390",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.s390x",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.x86_64",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.i386",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ia64",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ppc",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ppc64",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.s390",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.s390x",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.src",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.x86_64",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.i386",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ia64",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ppc",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ppc64",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.s390",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.s390x",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.x86_64",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.i386",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ia64",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ppc",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ppc64",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.s390",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.s390x",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.x86_64",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.i686",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.ppc",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.ppc64",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.s390",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.s390x",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.src",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.x86_64",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.i686",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.ppc",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.ppc64",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.s390",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.s390x",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.x86_64",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.i686",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc64",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390x",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.src",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.x86_64",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.i686",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc64",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390x",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.x86_64",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.i686",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc64",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390x",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.x86_64",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.i686",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc64",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390x",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.src",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.x86_64",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.i686",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc64",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390x",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.x86_64",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.i686",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc64",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390x",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-0085"
},
{
"category": "external",
"summary": "RHBZ#714581",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=714581"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-0085",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0085"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-0085",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-0085"
}
],
"release_date": "2011-06-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-06-21T22:39:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"4AS:firefox-0:3.6.18-2.el4.i386",
"4AS:firefox-0:3.6.18-2.el4.ia64",
"4AS:firefox-0:3.6.18-2.el4.ppc",
"4AS:firefox-0:3.6.18-2.el4.s390",
"4AS:firefox-0:3.6.18-2.el4.s390x",
"4AS:firefox-0:3.6.18-2.el4.src",
"4AS:firefox-0:3.6.18-2.el4.x86_64",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"4Desktop:firefox-0:3.6.18-2.el4.i386",
"4Desktop:firefox-0:3.6.18-2.el4.ia64",
"4Desktop:firefox-0:3.6.18-2.el4.ppc",
"4Desktop:firefox-0:3.6.18-2.el4.s390",
"4Desktop:firefox-0:3.6.18-2.el4.s390x",
"4Desktop:firefox-0:3.6.18-2.el4.src",
"4Desktop:firefox-0:3.6.18-2.el4.x86_64",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"4ES:firefox-0:3.6.18-2.el4.i386",
"4ES:firefox-0:3.6.18-2.el4.ia64",
"4ES:firefox-0:3.6.18-2.el4.ppc",
"4ES:firefox-0:3.6.18-2.el4.s390",
"4ES:firefox-0:3.6.18-2.el4.s390x",
"4ES:firefox-0:3.6.18-2.el4.src",
"4ES:firefox-0:3.6.18-2.el4.x86_64",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"4WS:firefox-0:3.6.18-2.el4.i386",
"4WS:firefox-0:3.6.18-2.el4.ia64",
"4WS:firefox-0:3.6.18-2.el4.ppc",
"4WS:firefox-0:3.6.18-2.el4.s390",
"4WS:firefox-0:3.6.18-2.el4.s390x",
"4WS:firefox-0:3.6.18-2.el4.src",
"4WS:firefox-0:3.6.18-2.el4.x86_64",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.i386",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.ia64",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.ppc",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.s390",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.s390x",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.src",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.x86_64",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.i386",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.ia64",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.ppc",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.s390",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.s390x",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.x86_64",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.i386",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ia64",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ppc",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ppc64",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.s390",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.s390x",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.src",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.x86_64",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.i386",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ia64",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ppc",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ppc64",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.s390",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.s390x",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.x86_64",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.i386",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ia64",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ppc",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ppc64",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.s390",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.s390x",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.x86_64",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.i686",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.ppc",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.ppc64",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.s390",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.s390x",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.src",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.x86_64",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.i686",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.ppc",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.ppc64",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.s390",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.s390x",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.x86_64",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.i686",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc64",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390x",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.src",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.x86_64",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.i686",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc64",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390x",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.x86_64",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.i686",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc64",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390x",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.x86_64",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.i686",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc64",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390x",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.src",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.x86_64",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.i686",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc64",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390x",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.x86_64",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.i686",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc64",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390x",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:0885"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS:firefox-0:3.6.18-2.el4.i386",
"4AS:firefox-0:3.6.18-2.el4.ia64",
"4AS:firefox-0:3.6.18-2.el4.ppc",
"4AS:firefox-0:3.6.18-2.el4.s390",
"4AS:firefox-0:3.6.18-2.el4.s390x",
"4AS:firefox-0:3.6.18-2.el4.src",
"4AS:firefox-0:3.6.18-2.el4.x86_64",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"4Desktop:firefox-0:3.6.18-2.el4.i386",
"4Desktop:firefox-0:3.6.18-2.el4.ia64",
"4Desktop:firefox-0:3.6.18-2.el4.ppc",
"4Desktop:firefox-0:3.6.18-2.el4.s390",
"4Desktop:firefox-0:3.6.18-2.el4.s390x",
"4Desktop:firefox-0:3.6.18-2.el4.src",
"4Desktop:firefox-0:3.6.18-2.el4.x86_64",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"4ES:firefox-0:3.6.18-2.el4.i386",
"4ES:firefox-0:3.6.18-2.el4.ia64",
"4ES:firefox-0:3.6.18-2.el4.ppc",
"4ES:firefox-0:3.6.18-2.el4.s390",
"4ES:firefox-0:3.6.18-2.el4.s390x",
"4ES:firefox-0:3.6.18-2.el4.src",
"4ES:firefox-0:3.6.18-2.el4.x86_64",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"4WS:firefox-0:3.6.18-2.el4.i386",
"4WS:firefox-0:3.6.18-2.el4.ia64",
"4WS:firefox-0:3.6.18-2.el4.ppc",
"4WS:firefox-0:3.6.18-2.el4.s390",
"4WS:firefox-0:3.6.18-2.el4.s390x",
"4WS:firefox-0:3.6.18-2.el4.src",
"4WS:firefox-0:3.6.18-2.el4.x86_64",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.i386",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.ia64",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.ppc",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.s390",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.s390x",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.src",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.x86_64",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.i386",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.ia64",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.ppc",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.s390",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.s390x",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.x86_64",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.i386",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ia64",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ppc",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ppc64",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.s390",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.s390x",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.src",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.x86_64",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.i386",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ia64",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ppc",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ppc64",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.s390",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.s390x",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.x86_64",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.i386",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ia64",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ppc",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ppc64",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.s390",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.s390x",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.x86_64",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.i686",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.ppc",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.ppc64",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.s390",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.s390x",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.src",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.x86_64",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.i686",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.ppc",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.ppc64",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.s390",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.s390x",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.x86_64",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.i686",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc64",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390x",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.src",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.x86_64",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.i686",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc64",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390x",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.x86_64",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.i686",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc64",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390x",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.x86_64",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.i686",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc64",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390x",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.src",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.x86_64",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.i686",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc64",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390x",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.x86_64",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.i686",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc64",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390x",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "Mozilla Multiple dangling pointer vulnerabilities (MFSA 2011-23)"
},
{
"cve": "CVE-2011-2362",
"discovery_date": "2011-06-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "714583"
}
],
"notes": [
{
"category": "description",
"text": "Mozilla Firefox before 3.6.18, Thunderbird before 3.1.11, and SeaMonkey through 2.0.14 do not distinguish between cookies for two domain names that differ only in a trailing dot, which allows remote web servers to bypass the Same Origin Policy via Set-Cookie headers.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Mozilla Cookie isolation error (MFSA 2011-24)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS:firefox-0:3.6.18-2.el4.i386",
"4AS:firefox-0:3.6.18-2.el4.ia64",
"4AS:firefox-0:3.6.18-2.el4.ppc",
"4AS:firefox-0:3.6.18-2.el4.s390",
"4AS:firefox-0:3.6.18-2.el4.s390x",
"4AS:firefox-0:3.6.18-2.el4.src",
"4AS:firefox-0:3.6.18-2.el4.x86_64",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"4Desktop:firefox-0:3.6.18-2.el4.i386",
"4Desktop:firefox-0:3.6.18-2.el4.ia64",
"4Desktop:firefox-0:3.6.18-2.el4.ppc",
"4Desktop:firefox-0:3.6.18-2.el4.s390",
"4Desktop:firefox-0:3.6.18-2.el4.s390x",
"4Desktop:firefox-0:3.6.18-2.el4.src",
"4Desktop:firefox-0:3.6.18-2.el4.x86_64",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"4ES:firefox-0:3.6.18-2.el4.i386",
"4ES:firefox-0:3.6.18-2.el4.ia64",
"4ES:firefox-0:3.6.18-2.el4.ppc",
"4ES:firefox-0:3.6.18-2.el4.s390",
"4ES:firefox-0:3.6.18-2.el4.s390x",
"4ES:firefox-0:3.6.18-2.el4.src",
"4ES:firefox-0:3.6.18-2.el4.x86_64",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"4WS:firefox-0:3.6.18-2.el4.i386",
"4WS:firefox-0:3.6.18-2.el4.ia64",
"4WS:firefox-0:3.6.18-2.el4.ppc",
"4WS:firefox-0:3.6.18-2.el4.s390",
"4WS:firefox-0:3.6.18-2.el4.s390x",
"4WS:firefox-0:3.6.18-2.el4.src",
"4WS:firefox-0:3.6.18-2.el4.x86_64",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.i386",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.ia64",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.ppc",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.s390",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.s390x",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.src",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.x86_64",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.i386",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.ia64",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.ppc",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.s390",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.s390x",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.x86_64",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.i386",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ia64",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ppc",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ppc64",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.s390",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.s390x",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.src",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.x86_64",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.i386",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ia64",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ppc",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ppc64",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.s390",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.s390x",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.x86_64",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.i386",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ia64",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ppc",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ppc64",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.s390",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.s390x",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.x86_64",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.i686",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.ppc",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.ppc64",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.s390",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.s390x",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.src",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.x86_64",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.i686",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.ppc",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.ppc64",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.s390",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.s390x",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.x86_64",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.i686",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc64",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390x",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.src",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.x86_64",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.i686",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc64",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390x",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.x86_64",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.i686",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc64",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390x",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.x86_64",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.i686",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc64",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390x",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.src",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.x86_64",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.i686",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc64",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390x",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.x86_64",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.i686",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc64",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390x",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-2362"
},
{
"category": "external",
"summary": "RHBZ#714583",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=714583"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-2362",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2362"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-2362",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-2362"
}
],
"release_date": "2011-06-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-06-21T22:39:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"4AS:firefox-0:3.6.18-2.el4.i386",
"4AS:firefox-0:3.6.18-2.el4.ia64",
"4AS:firefox-0:3.6.18-2.el4.ppc",
"4AS:firefox-0:3.6.18-2.el4.s390",
"4AS:firefox-0:3.6.18-2.el4.s390x",
"4AS:firefox-0:3.6.18-2.el4.src",
"4AS:firefox-0:3.6.18-2.el4.x86_64",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"4Desktop:firefox-0:3.6.18-2.el4.i386",
"4Desktop:firefox-0:3.6.18-2.el4.ia64",
"4Desktop:firefox-0:3.6.18-2.el4.ppc",
"4Desktop:firefox-0:3.6.18-2.el4.s390",
"4Desktop:firefox-0:3.6.18-2.el4.s390x",
"4Desktop:firefox-0:3.6.18-2.el4.src",
"4Desktop:firefox-0:3.6.18-2.el4.x86_64",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"4ES:firefox-0:3.6.18-2.el4.i386",
"4ES:firefox-0:3.6.18-2.el4.ia64",
"4ES:firefox-0:3.6.18-2.el4.ppc",
"4ES:firefox-0:3.6.18-2.el4.s390",
"4ES:firefox-0:3.6.18-2.el4.s390x",
"4ES:firefox-0:3.6.18-2.el4.src",
"4ES:firefox-0:3.6.18-2.el4.x86_64",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"4WS:firefox-0:3.6.18-2.el4.i386",
"4WS:firefox-0:3.6.18-2.el4.ia64",
"4WS:firefox-0:3.6.18-2.el4.ppc",
"4WS:firefox-0:3.6.18-2.el4.s390",
"4WS:firefox-0:3.6.18-2.el4.s390x",
"4WS:firefox-0:3.6.18-2.el4.src",
"4WS:firefox-0:3.6.18-2.el4.x86_64",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.i386",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.ia64",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.ppc",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.s390",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.s390x",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.src",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.x86_64",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.i386",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.ia64",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.ppc",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.s390",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.s390x",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.x86_64",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.i386",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ia64",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ppc",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ppc64",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.s390",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.s390x",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.src",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.x86_64",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.i386",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ia64",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ppc",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ppc64",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.s390",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.s390x",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.x86_64",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.i386",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ia64",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ppc",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ppc64",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.s390",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.s390x",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.x86_64",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.i686",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.ppc",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.ppc64",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.s390",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.s390x",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.src",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.x86_64",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.i686",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.ppc",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.ppc64",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.s390",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.s390x",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.x86_64",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.i686",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc64",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390x",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.src",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.x86_64",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.i686",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc64",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390x",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.x86_64",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.i686",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc64",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390x",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.x86_64",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.i686",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc64",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390x",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.src",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.x86_64",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.i686",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc64",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390x",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.x86_64",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.i686",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc64",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390x",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:0885"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.1,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS:firefox-0:3.6.18-2.el4.i386",
"4AS:firefox-0:3.6.18-2.el4.ia64",
"4AS:firefox-0:3.6.18-2.el4.ppc",
"4AS:firefox-0:3.6.18-2.el4.s390",
"4AS:firefox-0:3.6.18-2.el4.s390x",
"4AS:firefox-0:3.6.18-2.el4.src",
"4AS:firefox-0:3.6.18-2.el4.x86_64",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"4Desktop:firefox-0:3.6.18-2.el4.i386",
"4Desktop:firefox-0:3.6.18-2.el4.ia64",
"4Desktop:firefox-0:3.6.18-2.el4.ppc",
"4Desktop:firefox-0:3.6.18-2.el4.s390",
"4Desktop:firefox-0:3.6.18-2.el4.s390x",
"4Desktop:firefox-0:3.6.18-2.el4.src",
"4Desktop:firefox-0:3.6.18-2.el4.x86_64",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"4ES:firefox-0:3.6.18-2.el4.i386",
"4ES:firefox-0:3.6.18-2.el4.ia64",
"4ES:firefox-0:3.6.18-2.el4.ppc",
"4ES:firefox-0:3.6.18-2.el4.s390",
"4ES:firefox-0:3.6.18-2.el4.s390x",
"4ES:firefox-0:3.6.18-2.el4.src",
"4ES:firefox-0:3.6.18-2.el4.x86_64",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"4WS:firefox-0:3.6.18-2.el4.i386",
"4WS:firefox-0:3.6.18-2.el4.ia64",
"4WS:firefox-0:3.6.18-2.el4.ppc",
"4WS:firefox-0:3.6.18-2.el4.s390",
"4WS:firefox-0:3.6.18-2.el4.s390x",
"4WS:firefox-0:3.6.18-2.el4.src",
"4WS:firefox-0:3.6.18-2.el4.x86_64",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.i386",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.ia64",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.ppc",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.s390",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.s390x",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.src",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.x86_64",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.i386",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.ia64",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.ppc",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.s390",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.s390x",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.x86_64",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.i386",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ia64",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ppc",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ppc64",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.s390",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.s390x",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.src",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.x86_64",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.i386",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ia64",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ppc",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ppc64",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.s390",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.s390x",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.x86_64",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.i386",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ia64",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ppc",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ppc64",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.s390",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.s390x",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.x86_64",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.i686",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.ppc",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.ppc64",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.s390",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.s390x",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.src",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.x86_64",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.i686",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.ppc",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.ppc64",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.s390",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.s390x",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.x86_64",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.i686",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc64",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390x",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.src",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.x86_64",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.i686",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc64",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390x",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.x86_64",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.i686",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc64",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390x",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.x86_64",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.i686",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc64",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390x",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.src",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.x86_64",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.i686",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc64",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390x",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.x86_64",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.i686",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc64",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390x",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "Mozilla Cookie isolation error (MFSA 2011-24)"
},
{
"cve": "CVE-2011-2363",
"discovery_date": "2011-06-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "714581"
}
],
"notes": [
{
"category": "description",
"text": "Use-after-free vulnerability in the nsSVGPointList::AppendElement function in the implementation of SVG element lists in Mozilla Firefox before 3.6.18, Thunderbird before 3.1.11, and SeaMonkey through 2.0.14 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via vectors involving a user-supplied callback.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Mozilla Multiple dangling pointer vulnerabilities (MFSA 2011-23)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS:firefox-0:3.6.18-2.el4.i386",
"4AS:firefox-0:3.6.18-2.el4.ia64",
"4AS:firefox-0:3.6.18-2.el4.ppc",
"4AS:firefox-0:3.6.18-2.el4.s390",
"4AS:firefox-0:3.6.18-2.el4.s390x",
"4AS:firefox-0:3.6.18-2.el4.src",
"4AS:firefox-0:3.6.18-2.el4.x86_64",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"4Desktop:firefox-0:3.6.18-2.el4.i386",
"4Desktop:firefox-0:3.6.18-2.el4.ia64",
"4Desktop:firefox-0:3.6.18-2.el4.ppc",
"4Desktop:firefox-0:3.6.18-2.el4.s390",
"4Desktop:firefox-0:3.6.18-2.el4.s390x",
"4Desktop:firefox-0:3.6.18-2.el4.src",
"4Desktop:firefox-0:3.6.18-2.el4.x86_64",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"4ES:firefox-0:3.6.18-2.el4.i386",
"4ES:firefox-0:3.6.18-2.el4.ia64",
"4ES:firefox-0:3.6.18-2.el4.ppc",
"4ES:firefox-0:3.6.18-2.el4.s390",
"4ES:firefox-0:3.6.18-2.el4.s390x",
"4ES:firefox-0:3.6.18-2.el4.src",
"4ES:firefox-0:3.6.18-2.el4.x86_64",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"4WS:firefox-0:3.6.18-2.el4.i386",
"4WS:firefox-0:3.6.18-2.el4.ia64",
"4WS:firefox-0:3.6.18-2.el4.ppc",
"4WS:firefox-0:3.6.18-2.el4.s390",
"4WS:firefox-0:3.6.18-2.el4.s390x",
"4WS:firefox-0:3.6.18-2.el4.src",
"4WS:firefox-0:3.6.18-2.el4.x86_64",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.i386",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.ia64",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.ppc",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.s390",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.s390x",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.src",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.x86_64",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.i386",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.ia64",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.ppc",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.s390",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.s390x",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.x86_64",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.i386",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ia64",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ppc",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ppc64",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.s390",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.s390x",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.src",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.x86_64",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.i386",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ia64",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ppc",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ppc64",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.s390",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.s390x",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.x86_64",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.i386",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ia64",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ppc",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ppc64",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.s390",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.s390x",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.x86_64",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.i686",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.ppc",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.ppc64",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.s390",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.s390x",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.src",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.x86_64",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.i686",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.ppc",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.ppc64",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.s390",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.s390x",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.x86_64",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.i686",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc64",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390x",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.src",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.x86_64",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.i686",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc64",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390x",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.x86_64",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.i686",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc64",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390x",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.x86_64",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.i686",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc64",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390x",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.src",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.x86_64",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.i686",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc64",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390x",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.x86_64",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.i686",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc64",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390x",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-2363"
},
{
"category": "external",
"summary": "RHBZ#714581",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=714581"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-2363",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2363"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-2363",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-2363"
}
],
"release_date": "2011-06-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-06-21T22:39:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"4AS:firefox-0:3.6.18-2.el4.i386",
"4AS:firefox-0:3.6.18-2.el4.ia64",
"4AS:firefox-0:3.6.18-2.el4.ppc",
"4AS:firefox-0:3.6.18-2.el4.s390",
"4AS:firefox-0:3.6.18-2.el4.s390x",
"4AS:firefox-0:3.6.18-2.el4.src",
"4AS:firefox-0:3.6.18-2.el4.x86_64",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"4Desktop:firefox-0:3.6.18-2.el4.i386",
"4Desktop:firefox-0:3.6.18-2.el4.ia64",
"4Desktop:firefox-0:3.6.18-2.el4.ppc",
"4Desktop:firefox-0:3.6.18-2.el4.s390",
"4Desktop:firefox-0:3.6.18-2.el4.s390x",
"4Desktop:firefox-0:3.6.18-2.el4.src",
"4Desktop:firefox-0:3.6.18-2.el4.x86_64",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"4ES:firefox-0:3.6.18-2.el4.i386",
"4ES:firefox-0:3.6.18-2.el4.ia64",
"4ES:firefox-0:3.6.18-2.el4.ppc",
"4ES:firefox-0:3.6.18-2.el4.s390",
"4ES:firefox-0:3.6.18-2.el4.s390x",
"4ES:firefox-0:3.6.18-2.el4.src",
"4ES:firefox-0:3.6.18-2.el4.x86_64",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"4WS:firefox-0:3.6.18-2.el4.i386",
"4WS:firefox-0:3.6.18-2.el4.ia64",
"4WS:firefox-0:3.6.18-2.el4.ppc",
"4WS:firefox-0:3.6.18-2.el4.s390",
"4WS:firefox-0:3.6.18-2.el4.s390x",
"4WS:firefox-0:3.6.18-2.el4.src",
"4WS:firefox-0:3.6.18-2.el4.x86_64",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.i386",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.ia64",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.ppc",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.s390",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.s390x",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.src",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.x86_64",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.i386",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.ia64",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.ppc",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.s390",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.s390x",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.x86_64",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.i386",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ia64",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ppc",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ppc64",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.s390",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.s390x",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.src",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.x86_64",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.i386",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ia64",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ppc",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ppc64",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.s390",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.s390x",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.x86_64",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.i386",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ia64",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ppc",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ppc64",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.s390",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.s390x",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.x86_64",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.i686",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.ppc",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.ppc64",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.s390",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.s390x",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.src",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.x86_64",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.i686",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.ppc",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.ppc64",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.s390",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.s390x",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.x86_64",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.i686",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc64",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390x",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.src",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.x86_64",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.i686",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc64",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390x",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.x86_64",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.i686",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc64",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390x",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.x86_64",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.i686",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc64",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390x",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.src",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.x86_64",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.i686",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc64",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390x",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.x86_64",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.i686",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc64",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390x",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:0885"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS:firefox-0:3.6.18-2.el4.i386",
"4AS:firefox-0:3.6.18-2.el4.ia64",
"4AS:firefox-0:3.6.18-2.el4.ppc",
"4AS:firefox-0:3.6.18-2.el4.s390",
"4AS:firefox-0:3.6.18-2.el4.s390x",
"4AS:firefox-0:3.6.18-2.el4.src",
"4AS:firefox-0:3.6.18-2.el4.x86_64",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"4Desktop:firefox-0:3.6.18-2.el4.i386",
"4Desktop:firefox-0:3.6.18-2.el4.ia64",
"4Desktop:firefox-0:3.6.18-2.el4.ppc",
"4Desktop:firefox-0:3.6.18-2.el4.s390",
"4Desktop:firefox-0:3.6.18-2.el4.s390x",
"4Desktop:firefox-0:3.6.18-2.el4.src",
"4Desktop:firefox-0:3.6.18-2.el4.x86_64",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"4ES:firefox-0:3.6.18-2.el4.i386",
"4ES:firefox-0:3.6.18-2.el4.ia64",
"4ES:firefox-0:3.6.18-2.el4.ppc",
"4ES:firefox-0:3.6.18-2.el4.s390",
"4ES:firefox-0:3.6.18-2.el4.s390x",
"4ES:firefox-0:3.6.18-2.el4.src",
"4ES:firefox-0:3.6.18-2.el4.x86_64",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"4WS:firefox-0:3.6.18-2.el4.i386",
"4WS:firefox-0:3.6.18-2.el4.ia64",
"4WS:firefox-0:3.6.18-2.el4.ppc",
"4WS:firefox-0:3.6.18-2.el4.s390",
"4WS:firefox-0:3.6.18-2.el4.s390x",
"4WS:firefox-0:3.6.18-2.el4.src",
"4WS:firefox-0:3.6.18-2.el4.x86_64",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.i386",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.ia64",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.ppc",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.s390",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.s390x",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.src",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.x86_64",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.i386",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.ia64",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.ppc",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.s390",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.s390x",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.x86_64",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.i386",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ia64",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ppc",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ppc64",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.s390",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.s390x",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.src",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.x86_64",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.i386",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ia64",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ppc",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ppc64",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.s390",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.s390x",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.x86_64",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.i386",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ia64",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ppc",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ppc64",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.s390",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.s390x",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.x86_64",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.i686",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.ppc",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.ppc64",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.s390",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.s390x",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.src",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.x86_64",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.i686",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.ppc",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.ppc64",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.s390",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.s390x",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.x86_64",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.i686",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc64",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390x",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.src",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.x86_64",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.i686",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc64",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390x",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.x86_64",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.i686",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc64",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390x",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.x86_64",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.i686",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc64",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390x",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.src",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.x86_64",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.i686",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc64",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390x",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.x86_64",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.i686",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc64",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390x",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "Mozilla Multiple dangling pointer vulnerabilities (MFSA 2011-23)"
},
{
"cve": "CVE-2011-2364",
"discovery_date": "2011-06-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "714576"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the browser engine in Mozilla Firefox 3.6.x before 3.6.18 and Thunderbird before 3.1.11 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors, a different vulnerability than CVE-2011-2365.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Mozilla Miscellaneous memory safety hazards (MFSA 2011-19)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS:firefox-0:3.6.18-2.el4.i386",
"4AS:firefox-0:3.6.18-2.el4.ia64",
"4AS:firefox-0:3.6.18-2.el4.ppc",
"4AS:firefox-0:3.6.18-2.el4.s390",
"4AS:firefox-0:3.6.18-2.el4.s390x",
"4AS:firefox-0:3.6.18-2.el4.src",
"4AS:firefox-0:3.6.18-2.el4.x86_64",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"4Desktop:firefox-0:3.6.18-2.el4.i386",
"4Desktop:firefox-0:3.6.18-2.el4.ia64",
"4Desktop:firefox-0:3.6.18-2.el4.ppc",
"4Desktop:firefox-0:3.6.18-2.el4.s390",
"4Desktop:firefox-0:3.6.18-2.el4.s390x",
"4Desktop:firefox-0:3.6.18-2.el4.src",
"4Desktop:firefox-0:3.6.18-2.el4.x86_64",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"4ES:firefox-0:3.6.18-2.el4.i386",
"4ES:firefox-0:3.6.18-2.el4.ia64",
"4ES:firefox-0:3.6.18-2.el4.ppc",
"4ES:firefox-0:3.6.18-2.el4.s390",
"4ES:firefox-0:3.6.18-2.el4.s390x",
"4ES:firefox-0:3.6.18-2.el4.src",
"4ES:firefox-0:3.6.18-2.el4.x86_64",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"4WS:firefox-0:3.6.18-2.el4.i386",
"4WS:firefox-0:3.6.18-2.el4.ia64",
"4WS:firefox-0:3.6.18-2.el4.ppc",
"4WS:firefox-0:3.6.18-2.el4.s390",
"4WS:firefox-0:3.6.18-2.el4.s390x",
"4WS:firefox-0:3.6.18-2.el4.src",
"4WS:firefox-0:3.6.18-2.el4.x86_64",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.i386",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.ia64",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.ppc",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.s390",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.s390x",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.src",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.x86_64",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.i386",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.ia64",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.ppc",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.s390",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.s390x",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.x86_64",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.i386",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ia64",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ppc",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ppc64",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.s390",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.s390x",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.src",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.x86_64",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.i386",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ia64",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ppc",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ppc64",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.s390",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.s390x",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.x86_64",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.i386",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ia64",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ppc",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ppc64",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.s390",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.s390x",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.x86_64",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.i686",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.ppc",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.ppc64",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.s390",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.s390x",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.src",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.x86_64",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.i686",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.ppc",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.ppc64",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.s390",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.s390x",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.x86_64",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.i686",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc64",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390x",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.src",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.x86_64",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.i686",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc64",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390x",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.x86_64",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.i686",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc64",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390x",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.x86_64",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.i686",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc64",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390x",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.src",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.x86_64",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.i686",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc64",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390x",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.x86_64",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.i686",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc64",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390x",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-2364"
},
{
"category": "external",
"summary": "RHBZ#714576",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=714576"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-2364",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2364"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-2364",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-2364"
}
],
"release_date": "2011-06-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-06-21T22:39:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"4AS:firefox-0:3.6.18-2.el4.i386",
"4AS:firefox-0:3.6.18-2.el4.ia64",
"4AS:firefox-0:3.6.18-2.el4.ppc",
"4AS:firefox-0:3.6.18-2.el4.s390",
"4AS:firefox-0:3.6.18-2.el4.s390x",
"4AS:firefox-0:3.6.18-2.el4.src",
"4AS:firefox-0:3.6.18-2.el4.x86_64",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"4Desktop:firefox-0:3.6.18-2.el4.i386",
"4Desktop:firefox-0:3.6.18-2.el4.ia64",
"4Desktop:firefox-0:3.6.18-2.el4.ppc",
"4Desktop:firefox-0:3.6.18-2.el4.s390",
"4Desktop:firefox-0:3.6.18-2.el4.s390x",
"4Desktop:firefox-0:3.6.18-2.el4.src",
"4Desktop:firefox-0:3.6.18-2.el4.x86_64",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"4ES:firefox-0:3.6.18-2.el4.i386",
"4ES:firefox-0:3.6.18-2.el4.ia64",
"4ES:firefox-0:3.6.18-2.el4.ppc",
"4ES:firefox-0:3.6.18-2.el4.s390",
"4ES:firefox-0:3.6.18-2.el4.s390x",
"4ES:firefox-0:3.6.18-2.el4.src",
"4ES:firefox-0:3.6.18-2.el4.x86_64",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"4WS:firefox-0:3.6.18-2.el4.i386",
"4WS:firefox-0:3.6.18-2.el4.ia64",
"4WS:firefox-0:3.6.18-2.el4.ppc",
"4WS:firefox-0:3.6.18-2.el4.s390",
"4WS:firefox-0:3.6.18-2.el4.s390x",
"4WS:firefox-0:3.6.18-2.el4.src",
"4WS:firefox-0:3.6.18-2.el4.x86_64",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.i386",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.ia64",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.ppc",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.s390",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.s390x",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.src",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.x86_64",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.i386",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.ia64",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.ppc",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.s390",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.s390x",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.x86_64",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.i386",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ia64",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ppc",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ppc64",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.s390",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.s390x",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.src",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.x86_64",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.i386",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ia64",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ppc",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ppc64",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.s390",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.s390x",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.x86_64",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.i386",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ia64",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ppc",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ppc64",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.s390",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.s390x",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.x86_64",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.i686",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.ppc",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.ppc64",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.s390",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.s390x",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.src",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.x86_64",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.i686",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.ppc",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.ppc64",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.s390",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.s390x",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.x86_64",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.i686",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc64",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390x",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.src",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.x86_64",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.i686",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc64",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390x",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.x86_64",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.i686",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc64",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390x",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.x86_64",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.i686",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc64",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390x",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.src",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.x86_64",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.i686",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc64",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390x",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.x86_64",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.i686",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc64",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390x",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:0885"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS:firefox-0:3.6.18-2.el4.i386",
"4AS:firefox-0:3.6.18-2.el4.ia64",
"4AS:firefox-0:3.6.18-2.el4.ppc",
"4AS:firefox-0:3.6.18-2.el4.s390",
"4AS:firefox-0:3.6.18-2.el4.s390x",
"4AS:firefox-0:3.6.18-2.el4.src",
"4AS:firefox-0:3.6.18-2.el4.x86_64",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"4Desktop:firefox-0:3.6.18-2.el4.i386",
"4Desktop:firefox-0:3.6.18-2.el4.ia64",
"4Desktop:firefox-0:3.6.18-2.el4.ppc",
"4Desktop:firefox-0:3.6.18-2.el4.s390",
"4Desktop:firefox-0:3.6.18-2.el4.s390x",
"4Desktop:firefox-0:3.6.18-2.el4.src",
"4Desktop:firefox-0:3.6.18-2.el4.x86_64",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"4ES:firefox-0:3.6.18-2.el4.i386",
"4ES:firefox-0:3.6.18-2.el4.ia64",
"4ES:firefox-0:3.6.18-2.el4.ppc",
"4ES:firefox-0:3.6.18-2.el4.s390",
"4ES:firefox-0:3.6.18-2.el4.s390x",
"4ES:firefox-0:3.6.18-2.el4.src",
"4ES:firefox-0:3.6.18-2.el4.x86_64",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"4WS:firefox-0:3.6.18-2.el4.i386",
"4WS:firefox-0:3.6.18-2.el4.ia64",
"4WS:firefox-0:3.6.18-2.el4.ppc",
"4WS:firefox-0:3.6.18-2.el4.s390",
"4WS:firefox-0:3.6.18-2.el4.s390x",
"4WS:firefox-0:3.6.18-2.el4.src",
"4WS:firefox-0:3.6.18-2.el4.x86_64",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.i386",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.ia64",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.ppc",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.s390",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.s390x",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.src",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.x86_64",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.i386",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.ia64",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.ppc",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.s390",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.s390x",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.x86_64",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.i386",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ia64",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ppc",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ppc64",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.s390",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.s390x",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.src",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.x86_64",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.i386",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ia64",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ppc",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ppc64",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.s390",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.s390x",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.x86_64",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.i386",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ia64",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ppc",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ppc64",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.s390",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.s390x",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.x86_64",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.i686",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.ppc",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.ppc64",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.s390",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.s390x",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.src",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.x86_64",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.i686",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.ppc",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.ppc64",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.s390",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.s390x",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.x86_64",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.i686",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc64",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390x",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.src",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.x86_64",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.i686",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc64",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390x",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.x86_64",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.i686",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc64",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390x",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.x86_64",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.i686",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc64",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390x",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.src",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.x86_64",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.i686",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc64",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390x",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.x86_64",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.i686",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc64",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390x",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "Mozilla Miscellaneous memory safety hazards (MFSA 2011-19)"
},
{
"cve": "CVE-2011-2365",
"discovery_date": "2011-06-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "714576"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the browser engine in Mozilla Firefox 3.6.x before 3.6.18 and Thunderbird before 3.1.11 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors, a different vulnerability than CVE-2011-2364.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Mozilla Miscellaneous memory safety hazards (MFSA 2011-19)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS:firefox-0:3.6.18-2.el4.i386",
"4AS:firefox-0:3.6.18-2.el4.ia64",
"4AS:firefox-0:3.6.18-2.el4.ppc",
"4AS:firefox-0:3.6.18-2.el4.s390",
"4AS:firefox-0:3.6.18-2.el4.s390x",
"4AS:firefox-0:3.6.18-2.el4.src",
"4AS:firefox-0:3.6.18-2.el4.x86_64",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"4Desktop:firefox-0:3.6.18-2.el4.i386",
"4Desktop:firefox-0:3.6.18-2.el4.ia64",
"4Desktop:firefox-0:3.6.18-2.el4.ppc",
"4Desktop:firefox-0:3.6.18-2.el4.s390",
"4Desktop:firefox-0:3.6.18-2.el4.s390x",
"4Desktop:firefox-0:3.6.18-2.el4.src",
"4Desktop:firefox-0:3.6.18-2.el4.x86_64",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"4ES:firefox-0:3.6.18-2.el4.i386",
"4ES:firefox-0:3.6.18-2.el4.ia64",
"4ES:firefox-0:3.6.18-2.el4.ppc",
"4ES:firefox-0:3.6.18-2.el4.s390",
"4ES:firefox-0:3.6.18-2.el4.s390x",
"4ES:firefox-0:3.6.18-2.el4.src",
"4ES:firefox-0:3.6.18-2.el4.x86_64",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"4WS:firefox-0:3.6.18-2.el4.i386",
"4WS:firefox-0:3.6.18-2.el4.ia64",
"4WS:firefox-0:3.6.18-2.el4.ppc",
"4WS:firefox-0:3.6.18-2.el4.s390",
"4WS:firefox-0:3.6.18-2.el4.s390x",
"4WS:firefox-0:3.6.18-2.el4.src",
"4WS:firefox-0:3.6.18-2.el4.x86_64",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.i386",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.ia64",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.ppc",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.s390",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.s390x",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.src",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.x86_64",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.i386",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.ia64",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.ppc",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.s390",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.s390x",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.x86_64",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.i386",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ia64",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ppc",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ppc64",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.s390",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.s390x",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.src",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.x86_64",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.i386",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ia64",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ppc",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ppc64",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.s390",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.s390x",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.x86_64",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.i386",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ia64",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ppc",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ppc64",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.s390",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.s390x",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.x86_64",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.i686",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.ppc",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.ppc64",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.s390",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.s390x",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.src",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.x86_64",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.i686",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.ppc",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.ppc64",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.s390",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.s390x",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.x86_64",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.i686",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc64",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390x",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.src",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.x86_64",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.i686",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc64",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390x",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.x86_64",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.i686",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc64",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390x",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.x86_64",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.i686",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc64",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390x",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.src",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.x86_64",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.i686",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc64",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390x",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.x86_64",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.i686",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc64",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390x",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-2365"
},
{
"category": "external",
"summary": "RHBZ#714576",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=714576"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-2365",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2365"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-2365",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-2365"
}
],
"release_date": "2011-06-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-06-21T22:39:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"4AS:firefox-0:3.6.18-2.el4.i386",
"4AS:firefox-0:3.6.18-2.el4.ia64",
"4AS:firefox-0:3.6.18-2.el4.ppc",
"4AS:firefox-0:3.6.18-2.el4.s390",
"4AS:firefox-0:3.6.18-2.el4.s390x",
"4AS:firefox-0:3.6.18-2.el4.src",
"4AS:firefox-0:3.6.18-2.el4.x86_64",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"4Desktop:firefox-0:3.6.18-2.el4.i386",
"4Desktop:firefox-0:3.6.18-2.el4.ia64",
"4Desktop:firefox-0:3.6.18-2.el4.ppc",
"4Desktop:firefox-0:3.6.18-2.el4.s390",
"4Desktop:firefox-0:3.6.18-2.el4.s390x",
"4Desktop:firefox-0:3.6.18-2.el4.src",
"4Desktop:firefox-0:3.6.18-2.el4.x86_64",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"4ES:firefox-0:3.6.18-2.el4.i386",
"4ES:firefox-0:3.6.18-2.el4.ia64",
"4ES:firefox-0:3.6.18-2.el4.ppc",
"4ES:firefox-0:3.6.18-2.el4.s390",
"4ES:firefox-0:3.6.18-2.el4.s390x",
"4ES:firefox-0:3.6.18-2.el4.src",
"4ES:firefox-0:3.6.18-2.el4.x86_64",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"4WS:firefox-0:3.6.18-2.el4.i386",
"4WS:firefox-0:3.6.18-2.el4.ia64",
"4WS:firefox-0:3.6.18-2.el4.ppc",
"4WS:firefox-0:3.6.18-2.el4.s390",
"4WS:firefox-0:3.6.18-2.el4.s390x",
"4WS:firefox-0:3.6.18-2.el4.src",
"4WS:firefox-0:3.6.18-2.el4.x86_64",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.i386",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.ia64",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.ppc",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.s390",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.s390x",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.src",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.x86_64",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.i386",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.ia64",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.ppc",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.s390",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.s390x",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.x86_64",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.i386",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ia64",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ppc",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ppc64",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.s390",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.s390x",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.src",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.x86_64",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.i386",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ia64",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ppc",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ppc64",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.s390",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.s390x",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.x86_64",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.i386",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ia64",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ppc",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ppc64",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.s390",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.s390x",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.x86_64",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.i686",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.ppc",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.ppc64",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.s390",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.s390x",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.src",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.x86_64",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.i686",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.ppc",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.ppc64",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.s390",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.s390x",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.x86_64",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.i686",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc64",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390x",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.src",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.x86_64",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.i686",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc64",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390x",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.x86_64",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.i686",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc64",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390x",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.x86_64",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.i686",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc64",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390x",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.src",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.x86_64",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.i686",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc64",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390x",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.x86_64",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.i686",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc64",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390x",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:0885"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS:firefox-0:3.6.18-2.el4.i386",
"4AS:firefox-0:3.6.18-2.el4.ia64",
"4AS:firefox-0:3.6.18-2.el4.ppc",
"4AS:firefox-0:3.6.18-2.el4.s390",
"4AS:firefox-0:3.6.18-2.el4.s390x",
"4AS:firefox-0:3.6.18-2.el4.src",
"4AS:firefox-0:3.6.18-2.el4.x86_64",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"4Desktop:firefox-0:3.6.18-2.el4.i386",
"4Desktop:firefox-0:3.6.18-2.el4.ia64",
"4Desktop:firefox-0:3.6.18-2.el4.ppc",
"4Desktop:firefox-0:3.6.18-2.el4.s390",
"4Desktop:firefox-0:3.6.18-2.el4.s390x",
"4Desktop:firefox-0:3.6.18-2.el4.src",
"4Desktop:firefox-0:3.6.18-2.el4.x86_64",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"4ES:firefox-0:3.6.18-2.el4.i386",
"4ES:firefox-0:3.6.18-2.el4.ia64",
"4ES:firefox-0:3.6.18-2.el4.ppc",
"4ES:firefox-0:3.6.18-2.el4.s390",
"4ES:firefox-0:3.6.18-2.el4.s390x",
"4ES:firefox-0:3.6.18-2.el4.src",
"4ES:firefox-0:3.6.18-2.el4.x86_64",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"4WS:firefox-0:3.6.18-2.el4.i386",
"4WS:firefox-0:3.6.18-2.el4.ia64",
"4WS:firefox-0:3.6.18-2.el4.ppc",
"4WS:firefox-0:3.6.18-2.el4.s390",
"4WS:firefox-0:3.6.18-2.el4.s390x",
"4WS:firefox-0:3.6.18-2.el4.src",
"4WS:firefox-0:3.6.18-2.el4.x86_64",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.i386",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.ia64",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.ppc",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.s390",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.s390x",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.src",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.x86_64",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.i386",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.ia64",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.ppc",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.s390",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.s390x",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.x86_64",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.i386",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ia64",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ppc",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ppc64",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.s390",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.s390x",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.src",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.x86_64",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.i386",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ia64",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ppc",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ppc64",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.s390",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.s390x",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.x86_64",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.i386",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ia64",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ppc",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ppc64",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.s390",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.s390x",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.x86_64",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.i686",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.ppc",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.ppc64",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.s390",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.s390x",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.src",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.x86_64",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.i686",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.ppc",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.ppc64",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.s390",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.s390x",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.x86_64",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.i686",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc64",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390x",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.src",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.x86_64",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.i686",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc64",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390x",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.x86_64",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.i686",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc64",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390x",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.x86_64",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.i686",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc64",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390x",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.src",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.x86_64",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.i686",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc64",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390x",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.x86_64",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.i686",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc64",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390x",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "Mozilla Miscellaneous memory safety hazards (MFSA 2011-19)"
},
{
"cve": "CVE-2011-2371",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"discovery_date": "2011-06-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "714580"
}
],
"notes": [
{
"category": "description",
"text": "Integer overflow in the Array.reduceRight method in Mozilla Firefox before 3.6.18 and 4.x through 4.0.1, Thunderbird before 3.1.11, and SeaMonkey through 2.0.14 allows remote attackers to execute arbitrary code via vectors involving a long JavaScript Array object.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Mozilla Integer overflow and arbitrary code execution (MFSA 2011-22)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS:firefox-0:3.6.18-2.el4.i386",
"4AS:firefox-0:3.6.18-2.el4.ia64",
"4AS:firefox-0:3.6.18-2.el4.ppc",
"4AS:firefox-0:3.6.18-2.el4.s390",
"4AS:firefox-0:3.6.18-2.el4.s390x",
"4AS:firefox-0:3.6.18-2.el4.src",
"4AS:firefox-0:3.6.18-2.el4.x86_64",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"4Desktop:firefox-0:3.6.18-2.el4.i386",
"4Desktop:firefox-0:3.6.18-2.el4.ia64",
"4Desktop:firefox-0:3.6.18-2.el4.ppc",
"4Desktop:firefox-0:3.6.18-2.el4.s390",
"4Desktop:firefox-0:3.6.18-2.el4.s390x",
"4Desktop:firefox-0:3.6.18-2.el4.src",
"4Desktop:firefox-0:3.6.18-2.el4.x86_64",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"4ES:firefox-0:3.6.18-2.el4.i386",
"4ES:firefox-0:3.6.18-2.el4.ia64",
"4ES:firefox-0:3.6.18-2.el4.ppc",
"4ES:firefox-0:3.6.18-2.el4.s390",
"4ES:firefox-0:3.6.18-2.el4.s390x",
"4ES:firefox-0:3.6.18-2.el4.src",
"4ES:firefox-0:3.6.18-2.el4.x86_64",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"4WS:firefox-0:3.6.18-2.el4.i386",
"4WS:firefox-0:3.6.18-2.el4.ia64",
"4WS:firefox-0:3.6.18-2.el4.ppc",
"4WS:firefox-0:3.6.18-2.el4.s390",
"4WS:firefox-0:3.6.18-2.el4.s390x",
"4WS:firefox-0:3.6.18-2.el4.src",
"4WS:firefox-0:3.6.18-2.el4.x86_64",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.i386",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.ia64",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.ppc",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.s390",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.s390x",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.src",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.x86_64",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.i386",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.ia64",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.ppc",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.s390",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.s390x",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.x86_64",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.i386",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ia64",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ppc",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ppc64",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.s390",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.s390x",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.src",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.x86_64",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.i386",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ia64",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ppc",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ppc64",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.s390",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.s390x",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.x86_64",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.i386",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ia64",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ppc",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ppc64",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.s390",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.s390x",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.x86_64",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.i686",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.ppc",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.ppc64",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.s390",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.s390x",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.src",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.x86_64",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.i686",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.ppc",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.ppc64",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.s390",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.s390x",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.x86_64",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.i686",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc64",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390x",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.src",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.x86_64",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.i686",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc64",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390x",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.x86_64",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.i686",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc64",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390x",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.x86_64",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.i686",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc64",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390x",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.src",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.x86_64",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.i686",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc64",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390x",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.x86_64",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.i686",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc64",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390x",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-2371"
},
{
"category": "external",
"summary": "RHBZ#714580",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=714580"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-2371",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2371"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-2371",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-2371"
}
],
"release_date": "2011-06-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-06-21T22:39:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"4AS:firefox-0:3.6.18-2.el4.i386",
"4AS:firefox-0:3.6.18-2.el4.ia64",
"4AS:firefox-0:3.6.18-2.el4.ppc",
"4AS:firefox-0:3.6.18-2.el4.s390",
"4AS:firefox-0:3.6.18-2.el4.s390x",
"4AS:firefox-0:3.6.18-2.el4.src",
"4AS:firefox-0:3.6.18-2.el4.x86_64",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"4Desktop:firefox-0:3.6.18-2.el4.i386",
"4Desktop:firefox-0:3.6.18-2.el4.ia64",
"4Desktop:firefox-0:3.6.18-2.el4.ppc",
"4Desktop:firefox-0:3.6.18-2.el4.s390",
"4Desktop:firefox-0:3.6.18-2.el4.s390x",
"4Desktop:firefox-0:3.6.18-2.el4.src",
"4Desktop:firefox-0:3.6.18-2.el4.x86_64",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"4ES:firefox-0:3.6.18-2.el4.i386",
"4ES:firefox-0:3.6.18-2.el4.ia64",
"4ES:firefox-0:3.6.18-2.el4.ppc",
"4ES:firefox-0:3.6.18-2.el4.s390",
"4ES:firefox-0:3.6.18-2.el4.s390x",
"4ES:firefox-0:3.6.18-2.el4.src",
"4ES:firefox-0:3.6.18-2.el4.x86_64",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"4WS:firefox-0:3.6.18-2.el4.i386",
"4WS:firefox-0:3.6.18-2.el4.ia64",
"4WS:firefox-0:3.6.18-2.el4.ppc",
"4WS:firefox-0:3.6.18-2.el4.s390",
"4WS:firefox-0:3.6.18-2.el4.s390x",
"4WS:firefox-0:3.6.18-2.el4.src",
"4WS:firefox-0:3.6.18-2.el4.x86_64",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.i386",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.ia64",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.ppc",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.s390",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.s390x",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.src",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.x86_64",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.i386",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.ia64",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.ppc",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.s390",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.s390x",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.x86_64",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.i386",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ia64",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ppc",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ppc64",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.s390",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.s390x",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.src",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.x86_64",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.i386",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ia64",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ppc",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ppc64",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.s390",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.s390x",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.x86_64",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.i386",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ia64",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ppc",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ppc64",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.s390",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.s390x",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.x86_64",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.i686",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.ppc",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.ppc64",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.s390",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.s390x",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.src",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.x86_64",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.i686",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.ppc",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.ppc64",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.s390",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.s390x",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.x86_64",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.i686",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc64",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390x",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.src",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.x86_64",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.i686",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc64",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390x",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.x86_64",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.i686",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc64",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390x",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.x86_64",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.i686",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc64",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390x",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.src",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.x86_64",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.i686",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc64",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390x",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.x86_64",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.i686",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc64",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390x",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:0885"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS:firefox-0:3.6.18-2.el4.i386",
"4AS:firefox-0:3.6.18-2.el4.ia64",
"4AS:firefox-0:3.6.18-2.el4.ppc",
"4AS:firefox-0:3.6.18-2.el4.s390",
"4AS:firefox-0:3.6.18-2.el4.s390x",
"4AS:firefox-0:3.6.18-2.el4.src",
"4AS:firefox-0:3.6.18-2.el4.x86_64",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"4Desktop:firefox-0:3.6.18-2.el4.i386",
"4Desktop:firefox-0:3.6.18-2.el4.ia64",
"4Desktop:firefox-0:3.6.18-2.el4.ppc",
"4Desktop:firefox-0:3.6.18-2.el4.s390",
"4Desktop:firefox-0:3.6.18-2.el4.s390x",
"4Desktop:firefox-0:3.6.18-2.el4.src",
"4Desktop:firefox-0:3.6.18-2.el4.x86_64",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"4ES:firefox-0:3.6.18-2.el4.i386",
"4ES:firefox-0:3.6.18-2.el4.ia64",
"4ES:firefox-0:3.6.18-2.el4.ppc",
"4ES:firefox-0:3.6.18-2.el4.s390",
"4ES:firefox-0:3.6.18-2.el4.s390x",
"4ES:firefox-0:3.6.18-2.el4.src",
"4ES:firefox-0:3.6.18-2.el4.x86_64",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"4WS:firefox-0:3.6.18-2.el4.i386",
"4WS:firefox-0:3.6.18-2.el4.ia64",
"4WS:firefox-0:3.6.18-2.el4.ppc",
"4WS:firefox-0:3.6.18-2.el4.s390",
"4WS:firefox-0:3.6.18-2.el4.s390x",
"4WS:firefox-0:3.6.18-2.el4.src",
"4WS:firefox-0:3.6.18-2.el4.x86_64",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.i386",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.ia64",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.ppc",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.s390",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.s390x",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.src",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.x86_64",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.i386",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.ia64",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.ppc",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.s390",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.s390x",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.x86_64",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.i386",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ia64",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ppc",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ppc64",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.s390",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.s390x",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.src",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.x86_64",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.i386",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ia64",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ppc",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ppc64",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.s390",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.s390x",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.x86_64",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.i386",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ia64",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ppc",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ppc64",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.s390",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.s390x",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.x86_64",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.i686",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.ppc",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.ppc64",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.s390",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.s390x",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.src",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.x86_64",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.i686",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.ppc",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.ppc64",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.s390",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.s390x",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.x86_64",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.i686",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc64",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390x",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.src",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.x86_64",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.i686",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc64",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390x",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.x86_64",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.i686",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc64",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390x",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.x86_64",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.i686",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc64",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390x",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.src",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.x86_64",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.i686",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc64",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390x",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.x86_64",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.i686",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc64",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390x",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "Mozilla Integer overflow and arbitrary code execution (MFSA 2011-22)"
},
{
"cve": "CVE-2011-2373",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2011-06-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "714577"
}
],
"notes": [
{
"category": "description",
"text": "Use-after-free vulnerability in Mozilla Firefox before 3.6.18 and 4.x through 4.0.1, Thunderbird before 3.1.11, and SeaMonkey through 2.0.14, when JavaScript is disabled, allows remote attackers to execute arbitrary code via a crafted XUL document.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Mozilla Use-after-free vulnerability when viewing XUL document with script disabled (MFSA 2011-20)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS:firefox-0:3.6.18-2.el4.i386",
"4AS:firefox-0:3.6.18-2.el4.ia64",
"4AS:firefox-0:3.6.18-2.el4.ppc",
"4AS:firefox-0:3.6.18-2.el4.s390",
"4AS:firefox-0:3.6.18-2.el4.s390x",
"4AS:firefox-0:3.6.18-2.el4.src",
"4AS:firefox-0:3.6.18-2.el4.x86_64",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"4Desktop:firefox-0:3.6.18-2.el4.i386",
"4Desktop:firefox-0:3.6.18-2.el4.ia64",
"4Desktop:firefox-0:3.6.18-2.el4.ppc",
"4Desktop:firefox-0:3.6.18-2.el4.s390",
"4Desktop:firefox-0:3.6.18-2.el4.s390x",
"4Desktop:firefox-0:3.6.18-2.el4.src",
"4Desktop:firefox-0:3.6.18-2.el4.x86_64",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"4ES:firefox-0:3.6.18-2.el4.i386",
"4ES:firefox-0:3.6.18-2.el4.ia64",
"4ES:firefox-0:3.6.18-2.el4.ppc",
"4ES:firefox-0:3.6.18-2.el4.s390",
"4ES:firefox-0:3.6.18-2.el4.s390x",
"4ES:firefox-0:3.6.18-2.el4.src",
"4ES:firefox-0:3.6.18-2.el4.x86_64",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"4WS:firefox-0:3.6.18-2.el4.i386",
"4WS:firefox-0:3.6.18-2.el4.ia64",
"4WS:firefox-0:3.6.18-2.el4.ppc",
"4WS:firefox-0:3.6.18-2.el4.s390",
"4WS:firefox-0:3.6.18-2.el4.s390x",
"4WS:firefox-0:3.6.18-2.el4.src",
"4WS:firefox-0:3.6.18-2.el4.x86_64",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.i386",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.ia64",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.ppc",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.s390",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.s390x",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.src",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.x86_64",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.i386",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.ia64",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.ppc",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.s390",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.s390x",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.x86_64",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.i386",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ia64",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ppc",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ppc64",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.s390",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.s390x",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.src",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.x86_64",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.i386",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ia64",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ppc",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ppc64",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.s390",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.s390x",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.x86_64",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.i386",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ia64",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ppc",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ppc64",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.s390",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.s390x",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.x86_64",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.i686",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.ppc",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.ppc64",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.s390",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.s390x",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.src",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.x86_64",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.i686",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.ppc",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.ppc64",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.s390",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.s390x",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.x86_64",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.i686",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc64",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390x",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.src",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.x86_64",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.i686",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc64",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390x",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.x86_64",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.i686",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc64",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390x",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.x86_64",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.i686",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc64",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390x",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.src",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.x86_64",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.i686",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc64",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390x",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.x86_64",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.i686",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc64",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390x",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-2373"
},
{
"category": "external",
"summary": "RHBZ#714577",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=714577"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-2373",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2373"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-2373",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-2373"
}
],
"release_date": "2011-06-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-06-21T22:39:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"4AS:firefox-0:3.6.18-2.el4.i386",
"4AS:firefox-0:3.6.18-2.el4.ia64",
"4AS:firefox-0:3.6.18-2.el4.ppc",
"4AS:firefox-0:3.6.18-2.el4.s390",
"4AS:firefox-0:3.6.18-2.el4.s390x",
"4AS:firefox-0:3.6.18-2.el4.src",
"4AS:firefox-0:3.6.18-2.el4.x86_64",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"4Desktop:firefox-0:3.6.18-2.el4.i386",
"4Desktop:firefox-0:3.6.18-2.el4.ia64",
"4Desktop:firefox-0:3.6.18-2.el4.ppc",
"4Desktop:firefox-0:3.6.18-2.el4.s390",
"4Desktop:firefox-0:3.6.18-2.el4.s390x",
"4Desktop:firefox-0:3.6.18-2.el4.src",
"4Desktop:firefox-0:3.6.18-2.el4.x86_64",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"4ES:firefox-0:3.6.18-2.el4.i386",
"4ES:firefox-0:3.6.18-2.el4.ia64",
"4ES:firefox-0:3.6.18-2.el4.ppc",
"4ES:firefox-0:3.6.18-2.el4.s390",
"4ES:firefox-0:3.6.18-2.el4.s390x",
"4ES:firefox-0:3.6.18-2.el4.src",
"4ES:firefox-0:3.6.18-2.el4.x86_64",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"4WS:firefox-0:3.6.18-2.el4.i386",
"4WS:firefox-0:3.6.18-2.el4.ia64",
"4WS:firefox-0:3.6.18-2.el4.ppc",
"4WS:firefox-0:3.6.18-2.el4.s390",
"4WS:firefox-0:3.6.18-2.el4.s390x",
"4WS:firefox-0:3.6.18-2.el4.src",
"4WS:firefox-0:3.6.18-2.el4.x86_64",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.i386",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.ia64",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.ppc",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.s390",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.s390x",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.src",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.x86_64",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.i386",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.ia64",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.ppc",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.s390",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.s390x",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.x86_64",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.i386",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ia64",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ppc",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ppc64",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.s390",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.s390x",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.src",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.x86_64",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.i386",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ia64",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ppc",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ppc64",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.s390",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.s390x",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.x86_64",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.i386",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ia64",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ppc",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ppc64",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.s390",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.s390x",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.x86_64",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.i686",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.ppc",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.ppc64",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.s390",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.s390x",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.src",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.x86_64",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.i686",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.ppc",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.ppc64",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.s390",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.s390x",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.x86_64",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.i686",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc64",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390x",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.src",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.x86_64",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.i686",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc64",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390x",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.x86_64",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.i686",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc64",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390x",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.x86_64",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.i686",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc64",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390x",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.src",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.x86_64",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.i686",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc64",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390x",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.x86_64",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.i686",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc64",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390x",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:0885"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS:firefox-0:3.6.18-2.el4.i386",
"4AS:firefox-0:3.6.18-2.el4.ia64",
"4AS:firefox-0:3.6.18-2.el4.ppc",
"4AS:firefox-0:3.6.18-2.el4.s390",
"4AS:firefox-0:3.6.18-2.el4.s390x",
"4AS:firefox-0:3.6.18-2.el4.src",
"4AS:firefox-0:3.6.18-2.el4.x86_64",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"4Desktop:firefox-0:3.6.18-2.el4.i386",
"4Desktop:firefox-0:3.6.18-2.el4.ia64",
"4Desktop:firefox-0:3.6.18-2.el4.ppc",
"4Desktop:firefox-0:3.6.18-2.el4.s390",
"4Desktop:firefox-0:3.6.18-2.el4.s390x",
"4Desktop:firefox-0:3.6.18-2.el4.src",
"4Desktop:firefox-0:3.6.18-2.el4.x86_64",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"4ES:firefox-0:3.6.18-2.el4.i386",
"4ES:firefox-0:3.6.18-2.el4.ia64",
"4ES:firefox-0:3.6.18-2.el4.ppc",
"4ES:firefox-0:3.6.18-2.el4.s390",
"4ES:firefox-0:3.6.18-2.el4.s390x",
"4ES:firefox-0:3.6.18-2.el4.src",
"4ES:firefox-0:3.6.18-2.el4.x86_64",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"4WS:firefox-0:3.6.18-2.el4.i386",
"4WS:firefox-0:3.6.18-2.el4.ia64",
"4WS:firefox-0:3.6.18-2.el4.ppc",
"4WS:firefox-0:3.6.18-2.el4.s390",
"4WS:firefox-0:3.6.18-2.el4.s390x",
"4WS:firefox-0:3.6.18-2.el4.src",
"4WS:firefox-0:3.6.18-2.el4.x86_64",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.i386",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.ia64",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.ppc",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.s390",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.s390x",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.src",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.x86_64",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.i386",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.ia64",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.ppc",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.s390",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.s390x",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.x86_64",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.i386",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ia64",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ppc",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ppc64",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.s390",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.s390x",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.src",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.x86_64",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.i386",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ia64",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ppc",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ppc64",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.s390",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.s390x",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.x86_64",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.i386",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ia64",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ppc",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ppc64",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.s390",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.s390x",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.x86_64",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.i686",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.ppc",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.ppc64",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.s390",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.s390x",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.src",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.x86_64",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.i686",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.ppc",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.ppc64",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.s390",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.s390x",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.x86_64",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.i686",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc64",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390x",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.src",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.x86_64",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.i686",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc64",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390x",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.x86_64",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.i686",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc64",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390x",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.x86_64",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.i686",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc64",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390x",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.src",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.x86_64",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.i686",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc64",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390x",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.x86_64",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.i686",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc64",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390x",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "Mozilla Use-after-free vulnerability when viewing XUL document with script disabled (MFSA 2011-20)"
},
{
"cve": "CVE-2011-2374",
"discovery_date": "2011-06-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "714576"
}
],
"notes": [
{
"category": "description",
"text": "Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 3.6.18 and 4.x through 4.0.1, and Thunderbird before 3.1.11, allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Mozilla Miscellaneous memory safety hazards (MFSA 2011-19)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS:firefox-0:3.6.18-2.el4.i386",
"4AS:firefox-0:3.6.18-2.el4.ia64",
"4AS:firefox-0:3.6.18-2.el4.ppc",
"4AS:firefox-0:3.6.18-2.el4.s390",
"4AS:firefox-0:3.6.18-2.el4.s390x",
"4AS:firefox-0:3.6.18-2.el4.src",
"4AS:firefox-0:3.6.18-2.el4.x86_64",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"4Desktop:firefox-0:3.6.18-2.el4.i386",
"4Desktop:firefox-0:3.6.18-2.el4.ia64",
"4Desktop:firefox-0:3.6.18-2.el4.ppc",
"4Desktop:firefox-0:3.6.18-2.el4.s390",
"4Desktop:firefox-0:3.6.18-2.el4.s390x",
"4Desktop:firefox-0:3.6.18-2.el4.src",
"4Desktop:firefox-0:3.6.18-2.el4.x86_64",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"4ES:firefox-0:3.6.18-2.el4.i386",
"4ES:firefox-0:3.6.18-2.el4.ia64",
"4ES:firefox-0:3.6.18-2.el4.ppc",
"4ES:firefox-0:3.6.18-2.el4.s390",
"4ES:firefox-0:3.6.18-2.el4.s390x",
"4ES:firefox-0:3.6.18-2.el4.src",
"4ES:firefox-0:3.6.18-2.el4.x86_64",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"4WS:firefox-0:3.6.18-2.el4.i386",
"4WS:firefox-0:3.6.18-2.el4.ia64",
"4WS:firefox-0:3.6.18-2.el4.ppc",
"4WS:firefox-0:3.6.18-2.el4.s390",
"4WS:firefox-0:3.6.18-2.el4.s390x",
"4WS:firefox-0:3.6.18-2.el4.src",
"4WS:firefox-0:3.6.18-2.el4.x86_64",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.i386",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.ia64",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.ppc",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.s390",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.s390x",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.src",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.x86_64",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.i386",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.ia64",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.ppc",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.s390",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.s390x",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.x86_64",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.i386",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ia64",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ppc",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ppc64",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.s390",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.s390x",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.src",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.x86_64",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.i386",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ia64",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ppc",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ppc64",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.s390",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.s390x",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.x86_64",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.i386",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ia64",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ppc",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ppc64",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.s390",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.s390x",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.x86_64",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.i686",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.ppc",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.ppc64",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.s390",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.s390x",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.src",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.x86_64",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.i686",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.ppc",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.ppc64",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.s390",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.s390x",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.x86_64",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.i686",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc64",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390x",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.src",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.x86_64",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.i686",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc64",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390x",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.x86_64",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.i686",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc64",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390x",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.x86_64",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.i686",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc64",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390x",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.src",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.x86_64",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.i686",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc64",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390x",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.x86_64",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.i686",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc64",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390x",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-2374"
},
{
"category": "external",
"summary": "RHBZ#714576",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=714576"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-2374",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2374"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-2374",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-2374"
}
],
"release_date": "2011-06-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-06-21T22:39:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"4AS:firefox-0:3.6.18-2.el4.i386",
"4AS:firefox-0:3.6.18-2.el4.ia64",
"4AS:firefox-0:3.6.18-2.el4.ppc",
"4AS:firefox-0:3.6.18-2.el4.s390",
"4AS:firefox-0:3.6.18-2.el4.s390x",
"4AS:firefox-0:3.6.18-2.el4.src",
"4AS:firefox-0:3.6.18-2.el4.x86_64",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"4Desktop:firefox-0:3.6.18-2.el4.i386",
"4Desktop:firefox-0:3.6.18-2.el4.ia64",
"4Desktop:firefox-0:3.6.18-2.el4.ppc",
"4Desktop:firefox-0:3.6.18-2.el4.s390",
"4Desktop:firefox-0:3.6.18-2.el4.s390x",
"4Desktop:firefox-0:3.6.18-2.el4.src",
"4Desktop:firefox-0:3.6.18-2.el4.x86_64",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"4ES:firefox-0:3.6.18-2.el4.i386",
"4ES:firefox-0:3.6.18-2.el4.ia64",
"4ES:firefox-0:3.6.18-2.el4.ppc",
"4ES:firefox-0:3.6.18-2.el4.s390",
"4ES:firefox-0:3.6.18-2.el4.s390x",
"4ES:firefox-0:3.6.18-2.el4.src",
"4ES:firefox-0:3.6.18-2.el4.x86_64",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"4WS:firefox-0:3.6.18-2.el4.i386",
"4WS:firefox-0:3.6.18-2.el4.ia64",
"4WS:firefox-0:3.6.18-2.el4.ppc",
"4WS:firefox-0:3.6.18-2.el4.s390",
"4WS:firefox-0:3.6.18-2.el4.s390x",
"4WS:firefox-0:3.6.18-2.el4.src",
"4WS:firefox-0:3.6.18-2.el4.x86_64",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.i386",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.ia64",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.ppc",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.s390",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.s390x",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.src",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.x86_64",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.i386",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.ia64",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.ppc",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.s390",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.s390x",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.x86_64",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.i386",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ia64",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ppc",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ppc64",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.s390",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.s390x",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.src",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.x86_64",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.i386",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ia64",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ppc",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ppc64",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.s390",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.s390x",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.x86_64",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.i386",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ia64",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ppc",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ppc64",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.s390",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.s390x",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.x86_64",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.i686",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.ppc",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.ppc64",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.s390",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.s390x",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.src",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.x86_64",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.i686",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.ppc",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.ppc64",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.s390",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.s390x",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.x86_64",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.i686",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc64",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390x",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.src",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.x86_64",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.i686",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc64",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390x",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.x86_64",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.i686",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc64",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390x",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.x86_64",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.i686",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc64",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390x",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.src",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.x86_64",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.i686",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc64",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390x",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.x86_64",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.i686",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc64",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390x",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:0885"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS:firefox-0:3.6.18-2.el4.i386",
"4AS:firefox-0:3.6.18-2.el4.ia64",
"4AS:firefox-0:3.6.18-2.el4.ppc",
"4AS:firefox-0:3.6.18-2.el4.s390",
"4AS:firefox-0:3.6.18-2.el4.s390x",
"4AS:firefox-0:3.6.18-2.el4.src",
"4AS:firefox-0:3.6.18-2.el4.x86_64",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"4Desktop:firefox-0:3.6.18-2.el4.i386",
"4Desktop:firefox-0:3.6.18-2.el4.ia64",
"4Desktop:firefox-0:3.6.18-2.el4.ppc",
"4Desktop:firefox-0:3.6.18-2.el4.s390",
"4Desktop:firefox-0:3.6.18-2.el4.s390x",
"4Desktop:firefox-0:3.6.18-2.el4.src",
"4Desktop:firefox-0:3.6.18-2.el4.x86_64",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"4ES:firefox-0:3.6.18-2.el4.i386",
"4ES:firefox-0:3.6.18-2.el4.ia64",
"4ES:firefox-0:3.6.18-2.el4.ppc",
"4ES:firefox-0:3.6.18-2.el4.s390",
"4ES:firefox-0:3.6.18-2.el4.s390x",
"4ES:firefox-0:3.6.18-2.el4.src",
"4ES:firefox-0:3.6.18-2.el4.x86_64",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"4WS:firefox-0:3.6.18-2.el4.i386",
"4WS:firefox-0:3.6.18-2.el4.ia64",
"4WS:firefox-0:3.6.18-2.el4.ppc",
"4WS:firefox-0:3.6.18-2.el4.s390",
"4WS:firefox-0:3.6.18-2.el4.s390x",
"4WS:firefox-0:3.6.18-2.el4.src",
"4WS:firefox-0:3.6.18-2.el4.x86_64",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.i386",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.ia64",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.ppc",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.s390",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.s390x",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.src",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.x86_64",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.i386",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.ia64",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.ppc",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.s390",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.s390x",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.x86_64",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.i386",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ia64",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ppc",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ppc64",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.s390",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.s390x",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.src",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.x86_64",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.i386",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ia64",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ppc",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ppc64",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.s390",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.s390x",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.x86_64",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.i386",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ia64",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ppc",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ppc64",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.s390",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.s390x",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.x86_64",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.i686",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.ppc",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.ppc64",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.s390",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.s390x",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.src",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.x86_64",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.i686",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.ppc",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.ppc64",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.s390",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.s390x",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.x86_64",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.i686",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc64",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390x",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.src",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.x86_64",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.i686",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc64",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390x",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.x86_64",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.i686",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc64",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390x",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.x86_64",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.i686",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc64",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390x",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.src",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.x86_64",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.i686",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc64",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390x",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.x86_64",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.i686",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc64",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390x",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "Mozilla Miscellaneous memory safety hazards (MFSA 2011-19)"
},
{
"cve": "CVE-2011-2375",
"discovery_date": "2011-06-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "714576"
}
],
"notes": [
{
"category": "description",
"text": "Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 5.0 and Thunderbird through 3.1.11 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Mozilla Miscellaneous memory safety hazards (MFSA 2011-19)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS:firefox-0:3.6.18-2.el4.i386",
"4AS:firefox-0:3.6.18-2.el4.ia64",
"4AS:firefox-0:3.6.18-2.el4.ppc",
"4AS:firefox-0:3.6.18-2.el4.s390",
"4AS:firefox-0:3.6.18-2.el4.s390x",
"4AS:firefox-0:3.6.18-2.el4.src",
"4AS:firefox-0:3.6.18-2.el4.x86_64",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"4Desktop:firefox-0:3.6.18-2.el4.i386",
"4Desktop:firefox-0:3.6.18-2.el4.ia64",
"4Desktop:firefox-0:3.6.18-2.el4.ppc",
"4Desktop:firefox-0:3.6.18-2.el4.s390",
"4Desktop:firefox-0:3.6.18-2.el4.s390x",
"4Desktop:firefox-0:3.6.18-2.el4.src",
"4Desktop:firefox-0:3.6.18-2.el4.x86_64",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"4ES:firefox-0:3.6.18-2.el4.i386",
"4ES:firefox-0:3.6.18-2.el4.ia64",
"4ES:firefox-0:3.6.18-2.el4.ppc",
"4ES:firefox-0:3.6.18-2.el4.s390",
"4ES:firefox-0:3.6.18-2.el4.s390x",
"4ES:firefox-0:3.6.18-2.el4.src",
"4ES:firefox-0:3.6.18-2.el4.x86_64",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"4WS:firefox-0:3.6.18-2.el4.i386",
"4WS:firefox-0:3.6.18-2.el4.ia64",
"4WS:firefox-0:3.6.18-2.el4.ppc",
"4WS:firefox-0:3.6.18-2.el4.s390",
"4WS:firefox-0:3.6.18-2.el4.s390x",
"4WS:firefox-0:3.6.18-2.el4.src",
"4WS:firefox-0:3.6.18-2.el4.x86_64",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.i386",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.ia64",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.ppc",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.s390",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.s390x",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.src",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.x86_64",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.i386",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.ia64",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.ppc",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.s390",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.s390x",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.x86_64",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.i386",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ia64",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ppc",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ppc64",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.s390",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.s390x",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.src",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.x86_64",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.i386",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ia64",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ppc",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ppc64",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.s390",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.s390x",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.x86_64",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.i386",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ia64",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ppc",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ppc64",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.s390",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.s390x",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.x86_64",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.i686",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.ppc",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.ppc64",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.s390",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.s390x",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.src",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.x86_64",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.i686",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.ppc",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.ppc64",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.s390",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.s390x",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.x86_64",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.i686",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc64",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390x",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.src",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.x86_64",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.i686",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc64",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390x",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.x86_64",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.i686",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc64",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390x",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.x86_64",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.i686",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc64",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390x",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.src",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.x86_64",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.i686",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc64",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390x",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.x86_64",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.i686",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc64",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390x",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-2375"
},
{
"category": "external",
"summary": "RHBZ#714576",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=714576"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-2375",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2375"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-2375",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-2375"
}
],
"release_date": "2011-06-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-06-21T22:39:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"4AS:firefox-0:3.6.18-2.el4.i386",
"4AS:firefox-0:3.6.18-2.el4.ia64",
"4AS:firefox-0:3.6.18-2.el4.ppc",
"4AS:firefox-0:3.6.18-2.el4.s390",
"4AS:firefox-0:3.6.18-2.el4.s390x",
"4AS:firefox-0:3.6.18-2.el4.src",
"4AS:firefox-0:3.6.18-2.el4.x86_64",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"4Desktop:firefox-0:3.6.18-2.el4.i386",
"4Desktop:firefox-0:3.6.18-2.el4.ia64",
"4Desktop:firefox-0:3.6.18-2.el4.ppc",
"4Desktop:firefox-0:3.6.18-2.el4.s390",
"4Desktop:firefox-0:3.6.18-2.el4.s390x",
"4Desktop:firefox-0:3.6.18-2.el4.src",
"4Desktop:firefox-0:3.6.18-2.el4.x86_64",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"4ES:firefox-0:3.6.18-2.el4.i386",
"4ES:firefox-0:3.6.18-2.el4.ia64",
"4ES:firefox-0:3.6.18-2.el4.ppc",
"4ES:firefox-0:3.6.18-2.el4.s390",
"4ES:firefox-0:3.6.18-2.el4.s390x",
"4ES:firefox-0:3.6.18-2.el4.src",
"4ES:firefox-0:3.6.18-2.el4.x86_64",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"4WS:firefox-0:3.6.18-2.el4.i386",
"4WS:firefox-0:3.6.18-2.el4.ia64",
"4WS:firefox-0:3.6.18-2.el4.ppc",
"4WS:firefox-0:3.6.18-2.el4.s390",
"4WS:firefox-0:3.6.18-2.el4.s390x",
"4WS:firefox-0:3.6.18-2.el4.src",
"4WS:firefox-0:3.6.18-2.el4.x86_64",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.i386",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.ia64",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.ppc",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.s390",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.s390x",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.src",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.x86_64",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.i386",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.ia64",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.ppc",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.s390",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.s390x",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.x86_64",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.i386",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ia64",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ppc",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ppc64",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.s390",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.s390x",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.src",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.x86_64",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.i386",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ia64",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ppc",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ppc64",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.s390",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.s390x",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.x86_64",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.i386",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ia64",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ppc",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ppc64",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.s390",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.s390x",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.x86_64",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.i686",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.ppc",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.ppc64",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.s390",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.s390x",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.src",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.x86_64",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.i686",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.ppc",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.ppc64",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.s390",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.s390x",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.x86_64",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.i686",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc64",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390x",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.src",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.x86_64",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.i686",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc64",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390x",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.x86_64",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.i686",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc64",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390x",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.x86_64",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.i686",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc64",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390x",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.src",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.x86_64",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.i686",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc64",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390x",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.x86_64",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.i686",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc64",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390x",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:0885"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS:firefox-0:3.6.18-2.el4.i386",
"4AS:firefox-0:3.6.18-2.el4.ia64",
"4AS:firefox-0:3.6.18-2.el4.ppc",
"4AS:firefox-0:3.6.18-2.el4.s390",
"4AS:firefox-0:3.6.18-2.el4.s390x",
"4AS:firefox-0:3.6.18-2.el4.src",
"4AS:firefox-0:3.6.18-2.el4.x86_64",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"4Desktop:firefox-0:3.6.18-2.el4.i386",
"4Desktop:firefox-0:3.6.18-2.el4.ia64",
"4Desktop:firefox-0:3.6.18-2.el4.ppc",
"4Desktop:firefox-0:3.6.18-2.el4.s390",
"4Desktop:firefox-0:3.6.18-2.el4.s390x",
"4Desktop:firefox-0:3.6.18-2.el4.src",
"4Desktop:firefox-0:3.6.18-2.el4.x86_64",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"4ES:firefox-0:3.6.18-2.el4.i386",
"4ES:firefox-0:3.6.18-2.el4.ia64",
"4ES:firefox-0:3.6.18-2.el4.ppc",
"4ES:firefox-0:3.6.18-2.el4.s390",
"4ES:firefox-0:3.6.18-2.el4.s390x",
"4ES:firefox-0:3.6.18-2.el4.src",
"4ES:firefox-0:3.6.18-2.el4.x86_64",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"4WS:firefox-0:3.6.18-2.el4.i386",
"4WS:firefox-0:3.6.18-2.el4.ia64",
"4WS:firefox-0:3.6.18-2.el4.ppc",
"4WS:firefox-0:3.6.18-2.el4.s390",
"4WS:firefox-0:3.6.18-2.el4.s390x",
"4WS:firefox-0:3.6.18-2.el4.src",
"4WS:firefox-0:3.6.18-2.el4.x86_64",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.i386",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.ia64",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.ppc",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.s390",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.s390x",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.src",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.x86_64",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.i386",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.ia64",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.ppc",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.s390",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.s390x",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.x86_64",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.i386",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ia64",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ppc",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ppc64",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.s390",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.s390x",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.src",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.x86_64",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.i386",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ia64",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ppc",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ppc64",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.s390",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.s390x",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.x86_64",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.i386",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ia64",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ppc",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ppc64",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.s390",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.s390x",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.x86_64",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.i686",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.ppc",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.ppc64",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.s390",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.s390x",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.src",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.x86_64",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.i686",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.ppc",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.ppc64",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.s390",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.s390x",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.x86_64",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.i686",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc64",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390x",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.src",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.x86_64",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.i686",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc64",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390x",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.x86_64",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.i686",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc64",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390x",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.x86_64",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.i686",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc64",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390x",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.src",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.x86_64",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.i686",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc64",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390x",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.x86_64",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.i686",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc64",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390x",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "Mozilla Miscellaneous memory safety hazards (MFSA 2011-19)"
},
{
"cve": "CVE-2011-2376",
"discovery_date": "2011-06-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "714576"
}
],
"notes": [
{
"category": "description",
"text": "Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 3.6.18 and Thunderbird before 3.1.11 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Mozilla Miscellaneous memory safety hazards (MFSA 2011-19)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS:firefox-0:3.6.18-2.el4.i386",
"4AS:firefox-0:3.6.18-2.el4.ia64",
"4AS:firefox-0:3.6.18-2.el4.ppc",
"4AS:firefox-0:3.6.18-2.el4.s390",
"4AS:firefox-0:3.6.18-2.el4.s390x",
"4AS:firefox-0:3.6.18-2.el4.src",
"4AS:firefox-0:3.6.18-2.el4.x86_64",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"4Desktop:firefox-0:3.6.18-2.el4.i386",
"4Desktop:firefox-0:3.6.18-2.el4.ia64",
"4Desktop:firefox-0:3.6.18-2.el4.ppc",
"4Desktop:firefox-0:3.6.18-2.el4.s390",
"4Desktop:firefox-0:3.6.18-2.el4.s390x",
"4Desktop:firefox-0:3.6.18-2.el4.src",
"4Desktop:firefox-0:3.6.18-2.el4.x86_64",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"4ES:firefox-0:3.6.18-2.el4.i386",
"4ES:firefox-0:3.6.18-2.el4.ia64",
"4ES:firefox-0:3.6.18-2.el4.ppc",
"4ES:firefox-0:3.6.18-2.el4.s390",
"4ES:firefox-0:3.6.18-2.el4.s390x",
"4ES:firefox-0:3.6.18-2.el4.src",
"4ES:firefox-0:3.6.18-2.el4.x86_64",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"4WS:firefox-0:3.6.18-2.el4.i386",
"4WS:firefox-0:3.6.18-2.el4.ia64",
"4WS:firefox-0:3.6.18-2.el4.ppc",
"4WS:firefox-0:3.6.18-2.el4.s390",
"4WS:firefox-0:3.6.18-2.el4.s390x",
"4WS:firefox-0:3.6.18-2.el4.src",
"4WS:firefox-0:3.6.18-2.el4.x86_64",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.i386",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.ia64",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.ppc",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.s390",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.s390x",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.src",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.x86_64",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.i386",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.ia64",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.ppc",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.s390",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.s390x",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.x86_64",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.i386",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ia64",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ppc",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ppc64",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.s390",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.s390x",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.src",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.x86_64",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.i386",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ia64",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ppc",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ppc64",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.s390",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.s390x",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.x86_64",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.i386",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ia64",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ppc",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ppc64",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.s390",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.s390x",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.x86_64",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.i686",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.ppc",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.ppc64",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.s390",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.s390x",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.src",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.x86_64",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.i686",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.ppc",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.ppc64",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.s390",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.s390x",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.x86_64",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.i686",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc64",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390x",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.src",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.x86_64",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.i686",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc64",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390x",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.x86_64",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.i686",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc64",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390x",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.x86_64",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.i686",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc64",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390x",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.src",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.x86_64",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.i686",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc64",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390x",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.x86_64",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.i686",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc64",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390x",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-2376"
},
{
"category": "external",
"summary": "RHBZ#714576",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=714576"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-2376",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2376"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-2376",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-2376"
}
],
"release_date": "2011-06-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-06-21T22:39:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"4AS:firefox-0:3.6.18-2.el4.i386",
"4AS:firefox-0:3.6.18-2.el4.ia64",
"4AS:firefox-0:3.6.18-2.el4.ppc",
"4AS:firefox-0:3.6.18-2.el4.s390",
"4AS:firefox-0:3.6.18-2.el4.s390x",
"4AS:firefox-0:3.6.18-2.el4.src",
"4AS:firefox-0:3.6.18-2.el4.x86_64",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"4Desktop:firefox-0:3.6.18-2.el4.i386",
"4Desktop:firefox-0:3.6.18-2.el4.ia64",
"4Desktop:firefox-0:3.6.18-2.el4.ppc",
"4Desktop:firefox-0:3.6.18-2.el4.s390",
"4Desktop:firefox-0:3.6.18-2.el4.s390x",
"4Desktop:firefox-0:3.6.18-2.el4.src",
"4Desktop:firefox-0:3.6.18-2.el4.x86_64",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"4ES:firefox-0:3.6.18-2.el4.i386",
"4ES:firefox-0:3.6.18-2.el4.ia64",
"4ES:firefox-0:3.6.18-2.el4.ppc",
"4ES:firefox-0:3.6.18-2.el4.s390",
"4ES:firefox-0:3.6.18-2.el4.s390x",
"4ES:firefox-0:3.6.18-2.el4.src",
"4ES:firefox-0:3.6.18-2.el4.x86_64",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"4WS:firefox-0:3.6.18-2.el4.i386",
"4WS:firefox-0:3.6.18-2.el4.ia64",
"4WS:firefox-0:3.6.18-2.el4.ppc",
"4WS:firefox-0:3.6.18-2.el4.s390",
"4WS:firefox-0:3.6.18-2.el4.s390x",
"4WS:firefox-0:3.6.18-2.el4.src",
"4WS:firefox-0:3.6.18-2.el4.x86_64",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.i386",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.ia64",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.ppc",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.s390",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.s390x",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.src",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.x86_64",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.i386",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.ia64",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.ppc",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.s390",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.s390x",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.x86_64",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.i386",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ia64",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ppc",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ppc64",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.s390",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.s390x",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.src",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.x86_64",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.i386",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ia64",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ppc",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ppc64",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.s390",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.s390x",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.x86_64",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.i386",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ia64",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ppc",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ppc64",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.s390",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.s390x",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.x86_64",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.i686",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.ppc",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.ppc64",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.s390",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.s390x",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.src",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.x86_64",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.i686",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.ppc",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.ppc64",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.s390",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.s390x",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.x86_64",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.i686",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc64",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390x",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.src",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.x86_64",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.i686",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc64",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390x",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.x86_64",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.i686",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc64",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390x",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.x86_64",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.i686",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc64",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390x",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.src",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.x86_64",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.i686",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc64",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390x",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.x86_64",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.i686",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc64",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390x",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:0885"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS:firefox-0:3.6.18-2.el4.i386",
"4AS:firefox-0:3.6.18-2.el4.ia64",
"4AS:firefox-0:3.6.18-2.el4.ppc",
"4AS:firefox-0:3.6.18-2.el4.s390",
"4AS:firefox-0:3.6.18-2.el4.s390x",
"4AS:firefox-0:3.6.18-2.el4.src",
"4AS:firefox-0:3.6.18-2.el4.x86_64",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"4Desktop:firefox-0:3.6.18-2.el4.i386",
"4Desktop:firefox-0:3.6.18-2.el4.ia64",
"4Desktop:firefox-0:3.6.18-2.el4.ppc",
"4Desktop:firefox-0:3.6.18-2.el4.s390",
"4Desktop:firefox-0:3.6.18-2.el4.s390x",
"4Desktop:firefox-0:3.6.18-2.el4.src",
"4Desktop:firefox-0:3.6.18-2.el4.x86_64",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"4ES:firefox-0:3.6.18-2.el4.i386",
"4ES:firefox-0:3.6.18-2.el4.ia64",
"4ES:firefox-0:3.6.18-2.el4.ppc",
"4ES:firefox-0:3.6.18-2.el4.s390",
"4ES:firefox-0:3.6.18-2.el4.s390x",
"4ES:firefox-0:3.6.18-2.el4.src",
"4ES:firefox-0:3.6.18-2.el4.x86_64",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"4WS:firefox-0:3.6.18-2.el4.i386",
"4WS:firefox-0:3.6.18-2.el4.ia64",
"4WS:firefox-0:3.6.18-2.el4.ppc",
"4WS:firefox-0:3.6.18-2.el4.s390",
"4WS:firefox-0:3.6.18-2.el4.s390x",
"4WS:firefox-0:3.6.18-2.el4.src",
"4WS:firefox-0:3.6.18-2.el4.x86_64",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.i386",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.ia64",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.ppc",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.s390",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.s390x",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.src",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.x86_64",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.i386",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.ia64",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.ppc",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.s390",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.s390x",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.x86_64",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.i386",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ia64",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ppc",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ppc64",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.s390",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.s390x",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.src",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.x86_64",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.i386",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ia64",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ppc",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ppc64",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.s390",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.s390x",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.x86_64",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.i386",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ia64",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ppc",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ppc64",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.s390",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.s390x",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.x86_64",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.i686",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.ppc",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.ppc64",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.s390",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.s390x",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.src",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.x86_64",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.i686",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.ppc",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.ppc64",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.s390",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.s390x",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.x86_64",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.i686",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc64",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390x",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.src",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.x86_64",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.i686",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc64",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390x",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.x86_64",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.i686",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc64",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390x",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.x86_64",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.i686",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc64",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390x",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.src",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.x86_64",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.i686",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc64",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390x",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.x86_64",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.i686",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc64",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390x",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "Mozilla Miscellaneous memory safety hazards (MFSA 2011-19)"
},
{
"cve": "CVE-2011-2377",
"discovery_date": "2011-06-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "714929"
}
],
"notes": [
{
"category": "description",
"text": "Mozilla Firefox before 3.6.18 and 4.x through 4.0.1, Thunderbird before 3.1.11, and SeaMonkey through 2.0.14 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via a multipart/x-mixed-replace image.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Mozilla Crash caused by corrupted JPEG image (MFSA 2011-21)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS:firefox-0:3.6.18-2.el4.i386",
"4AS:firefox-0:3.6.18-2.el4.ia64",
"4AS:firefox-0:3.6.18-2.el4.ppc",
"4AS:firefox-0:3.6.18-2.el4.s390",
"4AS:firefox-0:3.6.18-2.el4.s390x",
"4AS:firefox-0:3.6.18-2.el4.src",
"4AS:firefox-0:3.6.18-2.el4.x86_64",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"4Desktop:firefox-0:3.6.18-2.el4.i386",
"4Desktop:firefox-0:3.6.18-2.el4.ia64",
"4Desktop:firefox-0:3.6.18-2.el4.ppc",
"4Desktop:firefox-0:3.6.18-2.el4.s390",
"4Desktop:firefox-0:3.6.18-2.el4.s390x",
"4Desktop:firefox-0:3.6.18-2.el4.src",
"4Desktop:firefox-0:3.6.18-2.el4.x86_64",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"4ES:firefox-0:3.6.18-2.el4.i386",
"4ES:firefox-0:3.6.18-2.el4.ia64",
"4ES:firefox-0:3.6.18-2.el4.ppc",
"4ES:firefox-0:3.6.18-2.el4.s390",
"4ES:firefox-0:3.6.18-2.el4.s390x",
"4ES:firefox-0:3.6.18-2.el4.src",
"4ES:firefox-0:3.6.18-2.el4.x86_64",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"4WS:firefox-0:3.6.18-2.el4.i386",
"4WS:firefox-0:3.6.18-2.el4.ia64",
"4WS:firefox-0:3.6.18-2.el4.ppc",
"4WS:firefox-0:3.6.18-2.el4.s390",
"4WS:firefox-0:3.6.18-2.el4.s390x",
"4WS:firefox-0:3.6.18-2.el4.src",
"4WS:firefox-0:3.6.18-2.el4.x86_64",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.i386",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.ia64",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.ppc",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.s390",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.s390x",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.src",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.x86_64",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.i386",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.ia64",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.ppc",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.s390",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.s390x",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.x86_64",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.i386",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ia64",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ppc",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ppc64",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.s390",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.s390x",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.src",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.x86_64",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.i386",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ia64",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ppc",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ppc64",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.s390",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.s390x",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.x86_64",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.i386",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ia64",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ppc",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ppc64",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.s390",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.s390x",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.x86_64",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.i686",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.ppc",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.ppc64",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.s390",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.s390x",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.src",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.x86_64",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.i686",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.ppc",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.ppc64",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.s390",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.s390x",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.x86_64",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.i686",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc64",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390x",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.src",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.x86_64",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.i686",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc64",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390x",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.x86_64",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.i686",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc64",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390x",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.x86_64",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.i686",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc64",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390x",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.src",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.x86_64",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.i686",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc64",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390x",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.x86_64",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.i686",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc64",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390x",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-2377"
},
{
"category": "external",
"summary": "RHBZ#714929",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=714929"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-2377",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2377"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-2377",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-2377"
}
],
"release_date": "2011-06-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-06-21T22:39:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"4AS:firefox-0:3.6.18-2.el4.i386",
"4AS:firefox-0:3.6.18-2.el4.ia64",
"4AS:firefox-0:3.6.18-2.el4.ppc",
"4AS:firefox-0:3.6.18-2.el4.s390",
"4AS:firefox-0:3.6.18-2.el4.s390x",
"4AS:firefox-0:3.6.18-2.el4.src",
"4AS:firefox-0:3.6.18-2.el4.x86_64",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"4Desktop:firefox-0:3.6.18-2.el4.i386",
"4Desktop:firefox-0:3.6.18-2.el4.ia64",
"4Desktop:firefox-0:3.6.18-2.el4.ppc",
"4Desktop:firefox-0:3.6.18-2.el4.s390",
"4Desktop:firefox-0:3.6.18-2.el4.s390x",
"4Desktop:firefox-0:3.6.18-2.el4.src",
"4Desktop:firefox-0:3.6.18-2.el4.x86_64",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"4ES:firefox-0:3.6.18-2.el4.i386",
"4ES:firefox-0:3.6.18-2.el4.ia64",
"4ES:firefox-0:3.6.18-2.el4.ppc",
"4ES:firefox-0:3.6.18-2.el4.s390",
"4ES:firefox-0:3.6.18-2.el4.s390x",
"4ES:firefox-0:3.6.18-2.el4.src",
"4ES:firefox-0:3.6.18-2.el4.x86_64",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"4WS:firefox-0:3.6.18-2.el4.i386",
"4WS:firefox-0:3.6.18-2.el4.ia64",
"4WS:firefox-0:3.6.18-2.el4.ppc",
"4WS:firefox-0:3.6.18-2.el4.s390",
"4WS:firefox-0:3.6.18-2.el4.s390x",
"4WS:firefox-0:3.6.18-2.el4.src",
"4WS:firefox-0:3.6.18-2.el4.x86_64",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.i386",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.ia64",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.ppc",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.s390",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.s390x",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.src",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.x86_64",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.i386",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.ia64",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.ppc",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.s390",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.s390x",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.x86_64",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.i386",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ia64",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ppc",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ppc64",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.s390",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.s390x",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.src",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.x86_64",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.i386",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ia64",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ppc",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ppc64",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.s390",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.s390x",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.x86_64",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.i386",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ia64",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ppc",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ppc64",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.s390",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.s390x",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.x86_64",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.i686",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.ppc",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.ppc64",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.s390",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.s390x",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.src",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.x86_64",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.i686",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.ppc",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.ppc64",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.s390",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.s390x",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.x86_64",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.i686",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc64",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390x",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.src",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.x86_64",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.i686",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc64",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390x",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.x86_64",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.i686",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc64",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390x",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.x86_64",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.i686",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc64",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390x",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.src",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.x86_64",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.i686",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc64",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390x",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.x86_64",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.i686",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc64",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390x",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:0885"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS:firefox-0:3.6.18-2.el4.i386",
"4AS:firefox-0:3.6.18-2.el4.ia64",
"4AS:firefox-0:3.6.18-2.el4.ppc",
"4AS:firefox-0:3.6.18-2.el4.s390",
"4AS:firefox-0:3.6.18-2.el4.s390x",
"4AS:firefox-0:3.6.18-2.el4.src",
"4AS:firefox-0:3.6.18-2.el4.x86_64",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"4Desktop:firefox-0:3.6.18-2.el4.i386",
"4Desktop:firefox-0:3.6.18-2.el4.ia64",
"4Desktop:firefox-0:3.6.18-2.el4.ppc",
"4Desktop:firefox-0:3.6.18-2.el4.s390",
"4Desktop:firefox-0:3.6.18-2.el4.s390x",
"4Desktop:firefox-0:3.6.18-2.el4.src",
"4Desktop:firefox-0:3.6.18-2.el4.x86_64",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"4ES:firefox-0:3.6.18-2.el4.i386",
"4ES:firefox-0:3.6.18-2.el4.ia64",
"4ES:firefox-0:3.6.18-2.el4.ppc",
"4ES:firefox-0:3.6.18-2.el4.s390",
"4ES:firefox-0:3.6.18-2.el4.s390x",
"4ES:firefox-0:3.6.18-2.el4.src",
"4ES:firefox-0:3.6.18-2.el4.x86_64",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"4WS:firefox-0:3.6.18-2.el4.i386",
"4WS:firefox-0:3.6.18-2.el4.ia64",
"4WS:firefox-0:3.6.18-2.el4.ppc",
"4WS:firefox-0:3.6.18-2.el4.s390",
"4WS:firefox-0:3.6.18-2.el4.s390x",
"4WS:firefox-0:3.6.18-2.el4.src",
"4WS:firefox-0:3.6.18-2.el4.x86_64",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.i386",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.ia64",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.ppc",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.s390",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.s390x",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.src",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.x86_64",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.i386",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.ia64",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.ppc",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.s390",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.s390x",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.x86_64",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.i386",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ia64",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ppc",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ppc64",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.s390",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.s390x",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.src",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.x86_64",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.i386",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ia64",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ppc",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ppc64",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.s390",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.s390x",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.x86_64",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.i386",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ia64",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ppc",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ppc64",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.s390",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.s390x",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.x86_64",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.i686",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.ppc",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.ppc64",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.s390",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.s390x",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.src",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.x86_64",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.i686",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.ppc",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.ppc64",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.s390",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.s390x",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.x86_64",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.i686",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc64",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390x",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.src",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.x86_64",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.i686",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc64",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390x",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.x86_64",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.i686",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc64",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390x",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.x86_64",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.i686",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc64",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390x",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.src",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.x86_64",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.i686",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc64",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390x",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.x86_64",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.i686",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc64",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390x",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "Mozilla Crash caused by corrupted JPEG image (MFSA 2011-21)"
},
{
"cve": "CVE-2011-2605",
"discovery_date": "2011-06-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "714576"
}
],
"notes": [
{
"category": "description",
"text": "CRLF injection vulnerability in the nsCookieService::SetCookieStringInternal function in netwerk/cookie/nsCookieService.cpp in Mozilla Firefox before 3.6.18 and 4.x through 4.0.1, and Thunderbird before 3.1.11, allows remote attackers to bypass intended access restrictions via a string containing a \\n (newline) character, which is not properly handled in a JavaScript \"document.cookie =\" expression, a different vulnerability than CVE-2011-2374.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Mozilla Miscellaneous memory safety hazards (MFSA 2011-19)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS:firefox-0:3.6.18-2.el4.i386",
"4AS:firefox-0:3.6.18-2.el4.ia64",
"4AS:firefox-0:3.6.18-2.el4.ppc",
"4AS:firefox-0:3.6.18-2.el4.s390",
"4AS:firefox-0:3.6.18-2.el4.s390x",
"4AS:firefox-0:3.6.18-2.el4.src",
"4AS:firefox-0:3.6.18-2.el4.x86_64",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"4Desktop:firefox-0:3.6.18-2.el4.i386",
"4Desktop:firefox-0:3.6.18-2.el4.ia64",
"4Desktop:firefox-0:3.6.18-2.el4.ppc",
"4Desktop:firefox-0:3.6.18-2.el4.s390",
"4Desktop:firefox-0:3.6.18-2.el4.s390x",
"4Desktop:firefox-0:3.6.18-2.el4.src",
"4Desktop:firefox-0:3.6.18-2.el4.x86_64",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"4ES:firefox-0:3.6.18-2.el4.i386",
"4ES:firefox-0:3.6.18-2.el4.ia64",
"4ES:firefox-0:3.6.18-2.el4.ppc",
"4ES:firefox-0:3.6.18-2.el4.s390",
"4ES:firefox-0:3.6.18-2.el4.s390x",
"4ES:firefox-0:3.6.18-2.el4.src",
"4ES:firefox-0:3.6.18-2.el4.x86_64",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"4WS:firefox-0:3.6.18-2.el4.i386",
"4WS:firefox-0:3.6.18-2.el4.ia64",
"4WS:firefox-0:3.6.18-2.el4.ppc",
"4WS:firefox-0:3.6.18-2.el4.s390",
"4WS:firefox-0:3.6.18-2.el4.s390x",
"4WS:firefox-0:3.6.18-2.el4.src",
"4WS:firefox-0:3.6.18-2.el4.x86_64",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.i386",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.ia64",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.ppc",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.s390",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.s390x",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.src",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.x86_64",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.i386",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.ia64",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.ppc",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.s390",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.s390x",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.x86_64",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.i386",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ia64",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ppc",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ppc64",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.s390",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.s390x",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.src",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.x86_64",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.i386",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ia64",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ppc",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ppc64",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.s390",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.s390x",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.x86_64",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.i386",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ia64",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ppc",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ppc64",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.s390",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.s390x",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.x86_64",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.i686",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.ppc",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.ppc64",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.s390",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.s390x",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.src",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.x86_64",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.i686",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.ppc",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.ppc64",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.s390",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.s390x",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.x86_64",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.i686",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc64",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390x",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.src",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.x86_64",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.i686",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc64",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390x",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.x86_64",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.i686",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc64",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390x",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.x86_64",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.i686",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc64",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390x",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.src",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.x86_64",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.i686",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc64",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390x",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.x86_64",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.i686",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc64",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390x",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-2605"
},
{
"category": "external",
"summary": "RHBZ#714576",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=714576"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-2605",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2605"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-2605",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-2605"
}
],
"release_date": "2011-06-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-06-21T22:39:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"4AS:firefox-0:3.6.18-2.el4.i386",
"4AS:firefox-0:3.6.18-2.el4.ia64",
"4AS:firefox-0:3.6.18-2.el4.ppc",
"4AS:firefox-0:3.6.18-2.el4.s390",
"4AS:firefox-0:3.6.18-2.el4.s390x",
"4AS:firefox-0:3.6.18-2.el4.src",
"4AS:firefox-0:3.6.18-2.el4.x86_64",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"4Desktop:firefox-0:3.6.18-2.el4.i386",
"4Desktop:firefox-0:3.6.18-2.el4.ia64",
"4Desktop:firefox-0:3.6.18-2.el4.ppc",
"4Desktop:firefox-0:3.6.18-2.el4.s390",
"4Desktop:firefox-0:3.6.18-2.el4.s390x",
"4Desktop:firefox-0:3.6.18-2.el4.src",
"4Desktop:firefox-0:3.6.18-2.el4.x86_64",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"4ES:firefox-0:3.6.18-2.el4.i386",
"4ES:firefox-0:3.6.18-2.el4.ia64",
"4ES:firefox-0:3.6.18-2.el4.ppc",
"4ES:firefox-0:3.6.18-2.el4.s390",
"4ES:firefox-0:3.6.18-2.el4.s390x",
"4ES:firefox-0:3.6.18-2.el4.src",
"4ES:firefox-0:3.6.18-2.el4.x86_64",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"4WS:firefox-0:3.6.18-2.el4.i386",
"4WS:firefox-0:3.6.18-2.el4.ia64",
"4WS:firefox-0:3.6.18-2.el4.ppc",
"4WS:firefox-0:3.6.18-2.el4.s390",
"4WS:firefox-0:3.6.18-2.el4.s390x",
"4WS:firefox-0:3.6.18-2.el4.src",
"4WS:firefox-0:3.6.18-2.el4.x86_64",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.i386",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.ia64",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.ppc",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.s390",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.s390x",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.src",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.x86_64",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.i386",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.ia64",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.ppc",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.s390",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.s390x",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.x86_64",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.i386",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ia64",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ppc",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ppc64",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.s390",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.s390x",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.src",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.x86_64",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.i386",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ia64",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ppc",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ppc64",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.s390",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.s390x",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.x86_64",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.i386",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ia64",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ppc",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ppc64",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.s390",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.s390x",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.x86_64",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.i686",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.ppc",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.ppc64",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.s390",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.s390x",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.src",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.x86_64",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.i686",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.ppc",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.ppc64",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.s390",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.s390x",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.x86_64",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.i686",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc64",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390x",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.src",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.x86_64",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.i686",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc64",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390x",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.x86_64",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.i686",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc64",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390x",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.x86_64",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.i686",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc64",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390x",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.src",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.x86_64",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.i686",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc64",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390x",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.x86_64",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.i686",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc64",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390x",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:0885"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS:firefox-0:3.6.18-2.el4.i386",
"4AS:firefox-0:3.6.18-2.el4.ia64",
"4AS:firefox-0:3.6.18-2.el4.ppc",
"4AS:firefox-0:3.6.18-2.el4.s390",
"4AS:firefox-0:3.6.18-2.el4.s390x",
"4AS:firefox-0:3.6.18-2.el4.src",
"4AS:firefox-0:3.6.18-2.el4.x86_64",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4AS:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"4Desktop:firefox-0:3.6.18-2.el4.i386",
"4Desktop:firefox-0:3.6.18-2.el4.ia64",
"4Desktop:firefox-0:3.6.18-2.el4.ppc",
"4Desktop:firefox-0:3.6.18-2.el4.s390",
"4Desktop:firefox-0:3.6.18-2.el4.s390x",
"4Desktop:firefox-0:3.6.18-2.el4.src",
"4Desktop:firefox-0:3.6.18-2.el4.x86_64",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4Desktop:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"4ES:firefox-0:3.6.18-2.el4.i386",
"4ES:firefox-0:3.6.18-2.el4.ia64",
"4ES:firefox-0:3.6.18-2.el4.ppc",
"4ES:firefox-0:3.6.18-2.el4.s390",
"4ES:firefox-0:3.6.18-2.el4.s390x",
"4ES:firefox-0:3.6.18-2.el4.src",
"4ES:firefox-0:3.6.18-2.el4.x86_64",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4ES:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"4WS:firefox-0:3.6.18-2.el4.i386",
"4WS:firefox-0:3.6.18-2.el4.ia64",
"4WS:firefox-0:3.6.18-2.el4.ppc",
"4WS:firefox-0:3.6.18-2.el4.s390",
"4WS:firefox-0:3.6.18-2.el4.s390x",
"4WS:firefox-0:3.6.18-2.el4.src",
"4WS:firefox-0:3.6.18-2.el4.x86_64",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.i386",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.ia64",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.ppc",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.s390",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.s390x",
"4WS:firefox-debuginfo-0:3.6.18-2.el4.x86_64",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.i386",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.ia64",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.ppc",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.s390",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.s390x",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.src",
"5Server-5.6.Z:firefox-0:3.6.18-1.el5_6.x86_64",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.i386",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.ia64",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.ppc",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.s390",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.s390x",
"5Server-5.6.Z:firefox-debuginfo-0:3.6.18-1.el5_6.x86_64",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.i386",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ia64",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ppc",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.ppc64",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.s390",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.s390x",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.src",
"5Server-5.6.Z:xulrunner-0:1.9.2.18-2.el5_6.x86_64",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.i386",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ia64",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ppc",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.ppc64",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.s390",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.s390x",
"5Server-5.6.Z:xulrunner-debuginfo-0:1.9.2.18-2.el5_6.x86_64",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.i386",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ia64",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ppc",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.ppc64",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.s390",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.s390x",
"5Server-5.6.Z:xulrunner-devel-0:1.9.2.18-2.el5_6.x86_64",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.i686",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.ppc",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.ppc64",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.s390",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.s390x",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.src",
"6Server-6.1.z:firefox-0:3.6.18-1.el6_1.x86_64",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.i686",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.ppc",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.ppc64",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.s390",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.s390x",
"6Server-6.1.z:firefox-debuginfo-0:3.6.18-1.el6_1.x86_64",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.i686",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc64",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390x",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.src",
"6Server-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.x86_64",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.i686",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc64",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390x",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.x86_64",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.i686",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc64",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390x",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.x86_64",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.i686",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.ppc64",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.s390x",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.src",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.18-2.el6_1.x86_64",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.i686",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.ppc64",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.s390x",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.18-2.el6_1.x86_64",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.i686",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.ppc64",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.s390x",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.18-2.el6_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "Mozilla Miscellaneous memory safety hazards (MFSA 2011-19)"
}
]
}
RHSA-2011:0886
Vulnerability from csaf_redhat - Published: 2011-06-21 22:30 - Updated: 2026-01-13 22:28Use-after-free vulnerability in the nsSVGPathSegList::ReplaceItem function in the implementation of SVG element lists in Mozilla Firefox before 3.6.18, Thunderbird before 3.1.11, and SeaMonkey through 2.0.14 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via vectors involving a user-supplied callback.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.x86_64 | — |
Vendor Fix
fix
|
Use-after-free vulnerability in the nsXULCommandDispatcher function in Mozilla Firefox before 3.6.18, Thunderbird before 3.1.11, and SeaMonkey through 2.0.14 allows remote attackers to execute arbitrary code via a crafted XUL document that dequeues the current command updater.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.x86_64 | — |
Vendor Fix
fix
|
Mozilla Firefox before 3.6.18, Thunderbird before 3.1.11, and SeaMonkey through 2.0.14 do not distinguish between cookies for two domain names that differ only in a trailing dot, which allows remote web servers to bypass the Same Origin Policy via Set-Cookie headers.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.x86_64 | — |
Vendor Fix
fix
|
Use-after-free vulnerability in the nsSVGPointList::AppendElement function in the implementation of SVG element lists in Mozilla Firefox before 3.6.18, Thunderbird before 3.1.11, and SeaMonkey through 2.0.14 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via vectors involving a user-supplied callback.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.x86_64 | — |
Vendor Fix
fix
|
Unspecified vulnerability in the browser engine in Mozilla Firefox 3.6.x before 3.6.18 and Thunderbird before 3.1.11 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors, a different vulnerability than CVE-2011-2365.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.x86_64 | — |
Vendor Fix
fix
|
Unspecified vulnerability in the browser engine in Mozilla Firefox 3.6.x before 3.6.18 and Thunderbird before 3.1.11 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors, a different vulnerability than CVE-2011-2364.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.x86_64 | — |
Vendor Fix
fix
|
Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 3.6.18 and 4.x through 4.0.1, and Thunderbird before 3.1.11, allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.x86_64 | — |
Vendor Fix
fix
|
Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 5.0 and Thunderbird through 3.1.11 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.x86_64 | — |
Vendor Fix
fix
|
Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 3.6.18 and Thunderbird before 3.1.11 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.x86_64 | — |
Vendor Fix
fix
|
Mozilla Firefox before 3.6.18 and 4.x through 4.0.1, Thunderbird before 3.1.11, and SeaMonkey through 2.0.14 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via a multipart/x-mixed-replace image.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.x86_64 | — |
Vendor Fix
fix
|
CRLF injection vulnerability in the nsCookieService::SetCookieStringInternal function in netwerk/cookie/nsCookieService.cpp in Mozilla Firefox before 3.6.18 and 4.x through 4.0.1, and Thunderbird before 3.1.11, allows remote attackers to bypass intended access restrictions via a string containing a \n (newline) character, which is not properly handled in a JavaScript "document.cookie =" expression, a different vulnerability than CVE-2011-2374.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.x86_64 | — |
Vendor Fix
fix
|
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Critical"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An updated thunderbird package that fixes several security issues is now\navailable for Red Hat Enterprise Linux 6.\n\nThe Red Hat Security Response Team has rated this update as having critical\nsecurity impact. Common Vulnerability Scoring System (CVSS) base scores,\nwhich give detailed severity ratings, are available for each vulnerability\nfrom the CVE links in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Mozilla Thunderbird is a standalone mail and newsgroup client.\n\nA flaw was found in the way Thunderbird handled malformed JPEG images. An\nHTML mail message containing a malicious JPEG image could cause Thunderbird\nto crash or, potentially, execute arbitrary code with the privileges of the\nuser running Thunderbird. (CVE-2011-2377)\n\nMultiple dangling pointer flaws were found in Thunderbird. Malicious HTML\ncontent could cause Thunderbird to crash or, potentially, execute arbitrary\ncode with the privileges of the user running Thunderbird. (CVE-2011-0083,\nCVE-2011-0085, CVE-2011-2363)\n\nSeveral flaws were found in the processing of malformed HTML content.\nMalicious HTML content could cause Thunderbird to crash or, potentially,\nexecute arbitrary code with the privileges of the user running Thunderbird.\n(CVE-2011-2364, CVE-2011-2365, CVE-2011-2374, CVE-2011-2375, CVE-2011-2376)\n\nIt was found that Thunderbird could treat two separate cookies (for web\ncontent) as interchangeable if both were for the same domain name but one\nof those domain names had a trailing \".\" character. This violates the\nsame-origin policy and could possibly lead to data being leaked to the\nwrong domain. (CVE-2011-2362)\n\nAll Thunderbird users should upgrade to this updated package, which\nresolves these issues. All running instances of Thunderbird must be\nrestarted for the update to take effect.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2011:0886",
"url": "https://access.redhat.com/errata/RHSA-2011:0886"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#critical",
"url": "https://access.redhat.com/security/updates/classification/#critical"
},
{
"category": "external",
"summary": "714576",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=714576"
},
{
"category": "external",
"summary": "714581",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=714581"
},
{
"category": "external",
"summary": "714583",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=714583"
},
{
"category": "external",
"summary": "714929",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=714929"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2011/rhsa-2011_0886.json"
}
],
"title": "Red Hat Security Advisory: thunderbird security update",
"tracking": {
"current_release_date": "2026-01-13T22:28:58+00:00",
"generator": {
"date": "2026-01-13T22:28:58+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.15"
}
},
"id": "RHSA-2011:0886",
"initial_release_date": "2011-06-21T22:30:00+00:00",
"revision_history": [
{
"date": "2011-06-21T22:30:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2011-06-21T18:39:08+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-01-13T22:28:58+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "thunderbird-0:3.1.11-2.el6_1.i686",
"product": {
"name": "thunderbird-0:3.1.11-2.el6_1.i686",
"product_id": "thunderbird-0:3.1.11-2.el6_1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/thunderbird@3.1.11-2.el6_1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "thunderbird-debuginfo-0:3.1.11-2.el6_1.i686",
"product": {
"name": "thunderbird-debuginfo-0:3.1.11-2.el6_1.i686",
"product_id": "thunderbird-debuginfo-0:3.1.11-2.el6_1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/thunderbird-debuginfo@3.1.11-2.el6_1?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "thunderbird-0:3.1.11-2.el6_1.ppc64",
"product": {
"name": "thunderbird-0:3.1.11-2.el6_1.ppc64",
"product_id": "thunderbird-0:3.1.11-2.el6_1.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/thunderbird@3.1.11-2.el6_1?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "thunderbird-debuginfo-0:3.1.11-2.el6_1.ppc64",
"product": {
"name": "thunderbird-debuginfo-0:3.1.11-2.el6_1.ppc64",
"product_id": "thunderbird-debuginfo-0:3.1.11-2.el6_1.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/thunderbird-debuginfo@3.1.11-2.el6_1?arch=ppc64"
}
}
}
],
"category": "architecture",
"name": "ppc64"
},
{
"branches": [
{
"category": "product_version",
"name": "thunderbird-0:3.1.11-2.el6_1.src",
"product": {
"name": "thunderbird-0:3.1.11-2.el6_1.src",
"product_id": "thunderbird-0:3.1.11-2.el6_1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/thunderbird@3.1.11-2.el6_1?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "thunderbird-0:3.1.11-2.el6_1.s390x",
"product": {
"name": "thunderbird-0:3.1.11-2.el6_1.s390x",
"product_id": "thunderbird-0:3.1.11-2.el6_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/thunderbird@3.1.11-2.el6_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "thunderbird-debuginfo-0:3.1.11-2.el6_1.s390x",
"product": {
"name": "thunderbird-debuginfo-0:3.1.11-2.el6_1.s390x",
"product_id": "thunderbird-debuginfo-0:3.1.11-2.el6_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/thunderbird-debuginfo@3.1.11-2.el6_1?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "thunderbird-0:3.1.11-2.el6_1.x86_64",
"product": {
"name": "thunderbird-0:3.1.11-2.el6_1.x86_64",
"product_id": "thunderbird-0:3.1.11-2.el6_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/thunderbird@3.1.11-2.el6_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "thunderbird-debuginfo-0:3.1.11-2.el6_1.x86_64",
"product": {
"name": "thunderbird-debuginfo-0:3.1.11-2.el6_1.x86_64",
"product_id": "thunderbird-debuginfo-0:3.1.11-2.el6_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/thunderbird-debuginfo@3.1.11-2.el6_1?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-0:3.1.11-2.el6_1.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.i686"
},
"product_reference": "thunderbird-0:3.1.11-2.el6_1.i686",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-0:3.1.11-2.el6_1.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.ppc64"
},
"product_reference": "thunderbird-0:3.1.11-2.el6_1.ppc64",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-0:3.1.11-2.el6_1.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.s390x"
},
"product_reference": "thunderbird-0:3.1.11-2.el6_1.s390x",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-0:3.1.11-2.el6_1.src as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.src"
},
"product_reference": "thunderbird-0:3.1.11-2.el6_1.src",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-0:3.1.11-2.el6_1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.x86_64"
},
"product_reference": "thunderbird-0:3.1.11-2.el6_1.x86_64",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-debuginfo-0:3.1.11-2.el6_1.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.i686"
},
"product_reference": "thunderbird-debuginfo-0:3.1.11-2.el6_1.i686",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-debuginfo-0:3.1.11-2.el6_1.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.ppc64"
},
"product_reference": "thunderbird-debuginfo-0:3.1.11-2.el6_1.ppc64",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-debuginfo-0:3.1.11-2.el6_1.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.s390x"
},
"product_reference": "thunderbird-debuginfo-0:3.1.11-2.el6_1.s390x",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-debuginfo-0:3.1.11-2.el6_1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.x86_64"
},
"product_reference": "thunderbird-debuginfo-0:3.1.11-2.el6_1.x86_64",
"relates_to_product_reference": "6Server-optional-6.1.z"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2011-0083",
"discovery_date": "2011-06-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "714581"
}
],
"notes": [
{
"category": "description",
"text": "Use-after-free vulnerability in the nsSVGPathSegList::ReplaceItem function in the implementation of SVG element lists in Mozilla Firefox before 3.6.18, Thunderbird before 3.1.11, and SeaMonkey through 2.0.14 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via vectors involving a user-supplied callback.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Mozilla Multiple dangling pointer vulnerabilities (MFSA 2011-23)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.i686",
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.ppc64",
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.s390x",
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.src",
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.x86_64",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.i686",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.ppc64",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.s390x",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-0083"
},
{
"category": "external",
"summary": "RHBZ#714581",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=714581"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-0083",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0083"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-0083",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-0083"
}
],
"release_date": "2011-06-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-06-21T22:30:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.i686",
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.ppc64",
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.s390x",
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.src",
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.x86_64",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.i686",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.ppc64",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.s390x",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:0886"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.i686",
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.ppc64",
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.s390x",
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.src",
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.x86_64",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.i686",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.ppc64",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.s390x",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "Mozilla Multiple dangling pointer vulnerabilities (MFSA 2011-23)"
},
{
"cve": "CVE-2011-0085",
"discovery_date": "2011-06-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "714581"
}
],
"notes": [
{
"category": "description",
"text": "Use-after-free vulnerability in the nsXULCommandDispatcher function in Mozilla Firefox before 3.6.18, Thunderbird before 3.1.11, and SeaMonkey through 2.0.14 allows remote attackers to execute arbitrary code via a crafted XUL document that dequeues the current command updater.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Mozilla Multiple dangling pointer vulnerabilities (MFSA 2011-23)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.i686",
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.ppc64",
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.s390x",
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.src",
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.x86_64",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.i686",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.ppc64",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.s390x",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-0085"
},
{
"category": "external",
"summary": "RHBZ#714581",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=714581"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-0085",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0085"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-0085",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-0085"
}
],
"release_date": "2011-06-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-06-21T22:30:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.i686",
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.ppc64",
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.s390x",
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.src",
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.x86_64",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.i686",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.ppc64",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.s390x",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:0886"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.i686",
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.ppc64",
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.s390x",
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.src",
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.x86_64",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.i686",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.ppc64",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.s390x",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "Mozilla Multiple dangling pointer vulnerabilities (MFSA 2011-23)"
},
{
"cve": "CVE-2011-2362",
"discovery_date": "2011-06-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "714583"
}
],
"notes": [
{
"category": "description",
"text": "Mozilla Firefox before 3.6.18, Thunderbird before 3.1.11, and SeaMonkey through 2.0.14 do not distinguish between cookies for two domain names that differ only in a trailing dot, which allows remote web servers to bypass the Same Origin Policy via Set-Cookie headers.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Mozilla Cookie isolation error (MFSA 2011-24)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.i686",
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.ppc64",
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.s390x",
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.src",
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.x86_64",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.i686",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.ppc64",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.s390x",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-2362"
},
{
"category": "external",
"summary": "RHBZ#714583",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=714583"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-2362",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2362"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-2362",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-2362"
}
],
"release_date": "2011-06-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-06-21T22:30:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.i686",
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.ppc64",
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.s390x",
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.src",
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.x86_64",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.i686",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.ppc64",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.s390x",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:0886"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.1,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.i686",
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.ppc64",
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.s390x",
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.src",
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.x86_64",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.i686",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.ppc64",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.s390x",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "Mozilla Cookie isolation error (MFSA 2011-24)"
},
{
"cve": "CVE-2011-2363",
"discovery_date": "2011-06-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "714581"
}
],
"notes": [
{
"category": "description",
"text": "Use-after-free vulnerability in the nsSVGPointList::AppendElement function in the implementation of SVG element lists in Mozilla Firefox before 3.6.18, Thunderbird before 3.1.11, and SeaMonkey through 2.0.14 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via vectors involving a user-supplied callback.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Mozilla Multiple dangling pointer vulnerabilities (MFSA 2011-23)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.i686",
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.ppc64",
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.s390x",
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.src",
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.x86_64",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.i686",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.ppc64",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.s390x",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-2363"
},
{
"category": "external",
"summary": "RHBZ#714581",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=714581"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-2363",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2363"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-2363",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-2363"
}
],
"release_date": "2011-06-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-06-21T22:30:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.i686",
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.ppc64",
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.s390x",
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.src",
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.x86_64",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.i686",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.ppc64",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.s390x",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:0886"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.i686",
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.ppc64",
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.s390x",
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.src",
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.x86_64",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.i686",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.ppc64",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.s390x",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "Mozilla Multiple dangling pointer vulnerabilities (MFSA 2011-23)"
},
{
"cve": "CVE-2011-2364",
"discovery_date": "2011-06-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "714576"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the browser engine in Mozilla Firefox 3.6.x before 3.6.18 and Thunderbird before 3.1.11 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors, a different vulnerability than CVE-2011-2365.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Mozilla Miscellaneous memory safety hazards (MFSA 2011-19)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.i686",
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.ppc64",
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.s390x",
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.src",
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.x86_64",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.i686",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.ppc64",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.s390x",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-2364"
},
{
"category": "external",
"summary": "RHBZ#714576",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=714576"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-2364",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2364"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-2364",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-2364"
}
],
"release_date": "2011-06-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-06-21T22:30:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.i686",
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.ppc64",
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.s390x",
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.src",
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.x86_64",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.i686",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.ppc64",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.s390x",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:0886"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.i686",
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.ppc64",
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.s390x",
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.src",
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.x86_64",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.i686",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.ppc64",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.s390x",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "Mozilla Miscellaneous memory safety hazards (MFSA 2011-19)"
},
{
"cve": "CVE-2011-2365",
"discovery_date": "2011-06-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "714576"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the browser engine in Mozilla Firefox 3.6.x before 3.6.18 and Thunderbird before 3.1.11 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors, a different vulnerability than CVE-2011-2364.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Mozilla Miscellaneous memory safety hazards (MFSA 2011-19)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.i686",
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.ppc64",
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.s390x",
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.src",
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.x86_64",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.i686",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.ppc64",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.s390x",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-2365"
},
{
"category": "external",
"summary": "RHBZ#714576",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=714576"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-2365",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2365"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-2365",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-2365"
}
],
"release_date": "2011-06-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-06-21T22:30:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.i686",
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.ppc64",
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.s390x",
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.src",
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.x86_64",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.i686",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.ppc64",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.s390x",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:0886"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.i686",
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.ppc64",
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.s390x",
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.src",
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.x86_64",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.i686",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.ppc64",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.s390x",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "Mozilla Miscellaneous memory safety hazards (MFSA 2011-19)"
},
{
"cve": "CVE-2011-2374",
"discovery_date": "2011-06-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "714576"
}
],
"notes": [
{
"category": "description",
"text": "Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 3.6.18 and 4.x through 4.0.1, and Thunderbird before 3.1.11, allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Mozilla Miscellaneous memory safety hazards (MFSA 2011-19)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.i686",
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.ppc64",
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.s390x",
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.src",
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.x86_64",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.i686",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.ppc64",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.s390x",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-2374"
},
{
"category": "external",
"summary": "RHBZ#714576",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=714576"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-2374",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2374"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-2374",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-2374"
}
],
"release_date": "2011-06-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-06-21T22:30:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.i686",
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.ppc64",
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.s390x",
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.src",
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.x86_64",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.i686",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.ppc64",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.s390x",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:0886"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.i686",
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.ppc64",
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.s390x",
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.src",
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.x86_64",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.i686",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.ppc64",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.s390x",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "Mozilla Miscellaneous memory safety hazards (MFSA 2011-19)"
},
{
"cve": "CVE-2011-2375",
"discovery_date": "2011-06-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "714576"
}
],
"notes": [
{
"category": "description",
"text": "Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 5.0 and Thunderbird through 3.1.11 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Mozilla Miscellaneous memory safety hazards (MFSA 2011-19)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.i686",
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.ppc64",
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.s390x",
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.src",
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.x86_64",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.i686",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.ppc64",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.s390x",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-2375"
},
{
"category": "external",
"summary": "RHBZ#714576",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=714576"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-2375",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2375"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-2375",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-2375"
}
],
"release_date": "2011-06-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-06-21T22:30:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.i686",
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.ppc64",
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.s390x",
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.src",
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.x86_64",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.i686",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.ppc64",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.s390x",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:0886"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.i686",
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.ppc64",
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.s390x",
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.src",
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.x86_64",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.i686",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.ppc64",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.s390x",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "Mozilla Miscellaneous memory safety hazards (MFSA 2011-19)"
},
{
"cve": "CVE-2011-2376",
"discovery_date": "2011-06-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "714576"
}
],
"notes": [
{
"category": "description",
"text": "Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 3.6.18 and Thunderbird before 3.1.11 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Mozilla Miscellaneous memory safety hazards (MFSA 2011-19)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.i686",
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.ppc64",
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.s390x",
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.src",
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.x86_64",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.i686",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.ppc64",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.s390x",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-2376"
},
{
"category": "external",
"summary": "RHBZ#714576",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=714576"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-2376",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2376"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-2376",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-2376"
}
],
"release_date": "2011-06-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-06-21T22:30:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.i686",
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.ppc64",
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.s390x",
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.src",
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.x86_64",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.i686",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.ppc64",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.s390x",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:0886"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.i686",
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.ppc64",
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.s390x",
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.src",
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.x86_64",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.i686",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.ppc64",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.s390x",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "Mozilla Miscellaneous memory safety hazards (MFSA 2011-19)"
},
{
"cve": "CVE-2011-2377",
"discovery_date": "2011-06-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "714929"
}
],
"notes": [
{
"category": "description",
"text": "Mozilla Firefox before 3.6.18 and 4.x through 4.0.1, Thunderbird before 3.1.11, and SeaMonkey through 2.0.14 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via a multipart/x-mixed-replace image.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Mozilla Crash caused by corrupted JPEG image (MFSA 2011-21)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.i686",
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.ppc64",
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.s390x",
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.src",
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.x86_64",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.i686",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.ppc64",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.s390x",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-2377"
},
{
"category": "external",
"summary": "RHBZ#714929",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=714929"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-2377",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2377"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-2377",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-2377"
}
],
"release_date": "2011-06-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-06-21T22:30:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.i686",
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.ppc64",
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.s390x",
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.src",
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.x86_64",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.i686",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.ppc64",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.s390x",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:0886"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.i686",
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.ppc64",
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.s390x",
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.src",
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.x86_64",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.i686",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.ppc64",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.s390x",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "Mozilla Crash caused by corrupted JPEG image (MFSA 2011-21)"
},
{
"cve": "CVE-2011-2605",
"discovery_date": "2011-06-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "714576"
}
],
"notes": [
{
"category": "description",
"text": "CRLF injection vulnerability in the nsCookieService::SetCookieStringInternal function in netwerk/cookie/nsCookieService.cpp in Mozilla Firefox before 3.6.18 and 4.x through 4.0.1, and Thunderbird before 3.1.11, allows remote attackers to bypass intended access restrictions via a string containing a \\n (newline) character, which is not properly handled in a JavaScript \"document.cookie =\" expression, a different vulnerability than CVE-2011-2374.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Mozilla Miscellaneous memory safety hazards (MFSA 2011-19)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.i686",
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.ppc64",
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.s390x",
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.src",
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.x86_64",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.i686",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.ppc64",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.s390x",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-2605"
},
{
"category": "external",
"summary": "RHBZ#714576",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=714576"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-2605",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2605"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-2605",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-2605"
}
],
"release_date": "2011-06-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-06-21T22:30:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.i686",
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.ppc64",
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.s390x",
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.src",
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.x86_64",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.i686",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.ppc64",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.s390x",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:0886"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.i686",
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.ppc64",
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.s390x",
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.src",
"6Server-optional-6.1.z:thunderbird-0:3.1.11-2.el6_1.x86_64",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.i686",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.ppc64",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.s390x",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.11-2.el6_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "Mozilla Miscellaneous memory safety hazards (MFSA 2011-19)"
}
]
}
RHSA-2011:0887
Vulnerability from csaf_redhat - Published: 2011-06-21 22:25 - Updated: 2026-01-08 09:34Use-after-free vulnerability in the nsSVGPathSegList::ReplaceItem function in the implementation of SVG element lists in Mozilla Firefox before 3.6.18, Thunderbird before 3.1.11, and SeaMonkey through 2.0.14 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via vectors involving a user-supplied callback.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS:thunderbird-0:1.5.0.12-39.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-0:1.5.0.12-39.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-0:1.5.0.12-39.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-0:1.5.0.12-39.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-0:1.5.0.12-39.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-0:1.5.0.12-39.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-0:1.5.0.12-39.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-0:1.5.0.12-39.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-0:1.5.0.12-39.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-0:1.5.0.12-39.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-0:1.5.0.12-39.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-0:1.5.0.12-39.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-0:1.5.0.12-39.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-0:1.5.0.12-39.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-0:1.5.0.12-39.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-0:1.5.0.12-39.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-0:1.5.0.12-39.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-0:1.5.0.12-39.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-0:1.5.0.12-39.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-0:1.5.0.12-39.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-0:1.5.0.12-39.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-0:1.5.0.12-39.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-0:1.5.0.12-39.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-0:1.5.0.12-39.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-0:1.5.0.12-39.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-0:1.5.0.12-39.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-0:1.5.0.12-39.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-0:1.5.0.12-39.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:thunderbird-0:2.0.0.24-18.el5_6.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:thunderbird-0:2.0.0.24-18.el5_6.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:thunderbird-0:2.0.0.24-18.el5_6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.x86_64 | — |
Vendor Fix
fix
|
No description is available for this CVE.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS:thunderbird-0:1.5.0.12-39.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-0:1.5.0.12-39.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-0:1.5.0.12-39.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-0:1.5.0.12-39.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-0:1.5.0.12-39.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-0:1.5.0.12-39.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-0:1.5.0.12-39.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-0:1.5.0.12-39.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-0:1.5.0.12-39.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-0:1.5.0.12-39.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-0:1.5.0.12-39.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-0:1.5.0.12-39.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-0:1.5.0.12-39.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-0:1.5.0.12-39.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-0:1.5.0.12-39.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-0:1.5.0.12-39.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-0:1.5.0.12-39.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-0:1.5.0.12-39.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-0:1.5.0.12-39.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-0:1.5.0.12-39.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-0:1.5.0.12-39.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-0:1.5.0.12-39.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-0:1.5.0.12-39.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-0:1.5.0.12-39.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-0:1.5.0.12-39.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-0:1.5.0.12-39.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-0:1.5.0.12-39.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-0:1.5.0.12-39.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:thunderbird-0:2.0.0.24-18.el5_6.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:thunderbird-0:2.0.0.24-18.el5_6.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:thunderbird-0:2.0.0.24-18.el5_6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.x86_64 | — |
Vendor Fix
fix
|
Mozilla Firefox before 3.6.18, Thunderbird before 3.1.11, and SeaMonkey through 2.0.14 do not distinguish between cookies for two domain names that differ only in a trailing dot, which allows remote web servers to bypass the Same Origin Policy via Set-Cookie headers.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS:thunderbird-0:1.5.0.12-39.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-0:1.5.0.12-39.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-0:1.5.0.12-39.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-0:1.5.0.12-39.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-0:1.5.0.12-39.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-0:1.5.0.12-39.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-0:1.5.0.12-39.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-0:1.5.0.12-39.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-0:1.5.0.12-39.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-0:1.5.0.12-39.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-0:1.5.0.12-39.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-0:1.5.0.12-39.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-0:1.5.0.12-39.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-0:1.5.0.12-39.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-0:1.5.0.12-39.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-0:1.5.0.12-39.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-0:1.5.0.12-39.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-0:1.5.0.12-39.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-0:1.5.0.12-39.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-0:1.5.0.12-39.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-0:1.5.0.12-39.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-0:1.5.0.12-39.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-0:1.5.0.12-39.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-0:1.5.0.12-39.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-0:1.5.0.12-39.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-0:1.5.0.12-39.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-0:1.5.0.12-39.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-0:1.5.0.12-39.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:thunderbird-0:2.0.0.24-18.el5_6.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:thunderbird-0:2.0.0.24-18.el5_6.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:thunderbird-0:2.0.0.24-18.el5_6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.x86_64 | — |
Vendor Fix
fix
|
Use-after-free vulnerability in the nsSVGPointList::AppendElement function in the implementation of SVG element lists in Mozilla Firefox before 3.6.18, Thunderbird before 3.1.11, and SeaMonkey through 2.0.14 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via vectors involving a user-supplied callback.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS:thunderbird-0:1.5.0.12-39.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-0:1.5.0.12-39.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-0:1.5.0.12-39.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-0:1.5.0.12-39.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-0:1.5.0.12-39.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-0:1.5.0.12-39.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-0:1.5.0.12-39.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-0:1.5.0.12-39.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-0:1.5.0.12-39.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-0:1.5.0.12-39.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-0:1.5.0.12-39.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-0:1.5.0.12-39.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-0:1.5.0.12-39.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-0:1.5.0.12-39.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-0:1.5.0.12-39.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-0:1.5.0.12-39.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-0:1.5.0.12-39.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-0:1.5.0.12-39.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-0:1.5.0.12-39.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-0:1.5.0.12-39.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-0:1.5.0.12-39.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-0:1.5.0.12-39.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-0:1.5.0.12-39.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-0:1.5.0.12-39.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-0:1.5.0.12-39.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-0:1.5.0.12-39.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-0:1.5.0.12-39.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-0:1.5.0.12-39.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:thunderbird-0:2.0.0.24-18.el5_6.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:thunderbird-0:2.0.0.24-18.el5_6.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:thunderbird-0:2.0.0.24-18.el5_6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.x86_64 | — |
Vendor Fix
fix
|
Unspecified vulnerability in the browser engine in Mozilla Firefox 3.6.x before 3.6.18 and Thunderbird before 3.1.11 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors, a different vulnerability than CVE-2011-2365.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS:thunderbird-0:1.5.0.12-39.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-0:1.5.0.12-39.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-0:1.5.0.12-39.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-0:1.5.0.12-39.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-0:1.5.0.12-39.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-0:1.5.0.12-39.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-0:1.5.0.12-39.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-0:1.5.0.12-39.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-0:1.5.0.12-39.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-0:1.5.0.12-39.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-0:1.5.0.12-39.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-0:1.5.0.12-39.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-0:1.5.0.12-39.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-0:1.5.0.12-39.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-0:1.5.0.12-39.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-0:1.5.0.12-39.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-0:1.5.0.12-39.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-0:1.5.0.12-39.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-0:1.5.0.12-39.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-0:1.5.0.12-39.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-0:1.5.0.12-39.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-0:1.5.0.12-39.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-0:1.5.0.12-39.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-0:1.5.0.12-39.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-0:1.5.0.12-39.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-0:1.5.0.12-39.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-0:1.5.0.12-39.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-0:1.5.0.12-39.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:thunderbird-0:2.0.0.24-18.el5_6.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:thunderbird-0:2.0.0.24-18.el5_6.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:thunderbird-0:2.0.0.24-18.el5_6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.x86_64 | — |
Vendor Fix
fix
|
Unspecified vulnerability in the browser engine in Mozilla Firefox 3.6.x before 3.6.18 and Thunderbird before 3.1.11 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors, a different vulnerability than CVE-2011-2364.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS:thunderbird-0:1.5.0.12-39.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-0:1.5.0.12-39.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-0:1.5.0.12-39.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-0:1.5.0.12-39.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-0:1.5.0.12-39.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-0:1.5.0.12-39.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-0:1.5.0.12-39.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-0:1.5.0.12-39.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-0:1.5.0.12-39.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-0:1.5.0.12-39.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-0:1.5.0.12-39.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-0:1.5.0.12-39.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-0:1.5.0.12-39.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-0:1.5.0.12-39.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-0:1.5.0.12-39.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-0:1.5.0.12-39.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-0:1.5.0.12-39.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-0:1.5.0.12-39.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-0:1.5.0.12-39.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-0:1.5.0.12-39.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-0:1.5.0.12-39.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-0:1.5.0.12-39.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-0:1.5.0.12-39.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-0:1.5.0.12-39.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-0:1.5.0.12-39.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-0:1.5.0.12-39.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-0:1.5.0.12-39.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-0:1.5.0.12-39.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:thunderbird-0:2.0.0.24-18.el5_6.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:thunderbird-0:2.0.0.24-18.el5_6.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:thunderbird-0:2.0.0.24-18.el5_6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.x86_64 | — |
Vendor Fix
fix
|
Integer overflow in the Array.reduceRight method in Mozilla Firefox before 3.6.18 and 4.x through 4.0.1, Thunderbird before 3.1.11, and SeaMonkey through 2.0.14 allows remote attackers to execute arbitrary code via vectors involving a long JavaScript Array object.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS:thunderbird-0:1.5.0.12-39.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-0:1.5.0.12-39.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-0:1.5.0.12-39.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-0:1.5.0.12-39.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-0:1.5.0.12-39.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-0:1.5.0.12-39.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-0:1.5.0.12-39.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-0:1.5.0.12-39.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-0:1.5.0.12-39.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-0:1.5.0.12-39.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-0:1.5.0.12-39.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-0:1.5.0.12-39.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-0:1.5.0.12-39.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-0:1.5.0.12-39.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-0:1.5.0.12-39.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-0:1.5.0.12-39.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-0:1.5.0.12-39.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-0:1.5.0.12-39.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-0:1.5.0.12-39.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-0:1.5.0.12-39.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-0:1.5.0.12-39.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-0:1.5.0.12-39.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-0:1.5.0.12-39.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-0:1.5.0.12-39.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-0:1.5.0.12-39.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-0:1.5.0.12-39.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-0:1.5.0.12-39.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-0:1.5.0.12-39.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:thunderbird-0:2.0.0.24-18.el5_6.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:thunderbird-0:2.0.0.24-18.el5_6.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:thunderbird-0:2.0.0.24-18.el5_6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.x86_64 | — |
Vendor Fix
fix
|
Use-after-free vulnerability in Mozilla Firefox before 3.6.18 and 4.x through 4.0.1, Thunderbird before 3.1.11, and SeaMonkey through 2.0.14, when JavaScript is disabled, allows remote attackers to execute arbitrary code via a crafted XUL document.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS:thunderbird-0:1.5.0.12-39.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-0:1.5.0.12-39.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-0:1.5.0.12-39.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-0:1.5.0.12-39.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-0:1.5.0.12-39.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-0:1.5.0.12-39.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-0:1.5.0.12-39.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-0:1.5.0.12-39.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-0:1.5.0.12-39.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-0:1.5.0.12-39.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-0:1.5.0.12-39.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-0:1.5.0.12-39.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-0:1.5.0.12-39.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-0:1.5.0.12-39.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-0:1.5.0.12-39.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-0:1.5.0.12-39.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-0:1.5.0.12-39.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-0:1.5.0.12-39.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-0:1.5.0.12-39.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-0:1.5.0.12-39.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-0:1.5.0.12-39.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-0:1.5.0.12-39.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-0:1.5.0.12-39.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-0:1.5.0.12-39.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-0:1.5.0.12-39.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-0:1.5.0.12-39.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-0:1.5.0.12-39.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-0:1.5.0.12-39.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:thunderbird-0:2.0.0.24-18.el5_6.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:thunderbird-0:2.0.0.24-18.el5_6.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:thunderbird-0:2.0.0.24-18.el5_6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.x86_64 | — |
Vendor Fix
fix
|
Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 3.6.18 and 4.x through 4.0.1, and Thunderbird before 3.1.11, allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS:thunderbird-0:1.5.0.12-39.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-0:1.5.0.12-39.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-0:1.5.0.12-39.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-0:1.5.0.12-39.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-0:1.5.0.12-39.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-0:1.5.0.12-39.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-0:1.5.0.12-39.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-0:1.5.0.12-39.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-0:1.5.0.12-39.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-0:1.5.0.12-39.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-0:1.5.0.12-39.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-0:1.5.0.12-39.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-0:1.5.0.12-39.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-0:1.5.0.12-39.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-0:1.5.0.12-39.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-0:1.5.0.12-39.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-0:1.5.0.12-39.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-0:1.5.0.12-39.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-0:1.5.0.12-39.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-0:1.5.0.12-39.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-0:1.5.0.12-39.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-0:1.5.0.12-39.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-0:1.5.0.12-39.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-0:1.5.0.12-39.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-0:1.5.0.12-39.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-0:1.5.0.12-39.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-0:1.5.0.12-39.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-0:1.5.0.12-39.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:thunderbird-0:2.0.0.24-18.el5_6.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:thunderbird-0:2.0.0.24-18.el5_6.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:thunderbird-0:2.0.0.24-18.el5_6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.x86_64 | — |
Vendor Fix
fix
|
Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 5.0 and Thunderbird through 3.1.11 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS:thunderbird-0:1.5.0.12-39.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-0:1.5.0.12-39.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-0:1.5.0.12-39.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-0:1.5.0.12-39.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-0:1.5.0.12-39.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-0:1.5.0.12-39.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-0:1.5.0.12-39.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-0:1.5.0.12-39.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-0:1.5.0.12-39.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-0:1.5.0.12-39.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-0:1.5.0.12-39.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-0:1.5.0.12-39.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-0:1.5.0.12-39.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-0:1.5.0.12-39.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-0:1.5.0.12-39.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-0:1.5.0.12-39.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-0:1.5.0.12-39.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-0:1.5.0.12-39.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-0:1.5.0.12-39.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-0:1.5.0.12-39.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-0:1.5.0.12-39.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-0:1.5.0.12-39.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-0:1.5.0.12-39.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-0:1.5.0.12-39.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-0:1.5.0.12-39.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-0:1.5.0.12-39.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-0:1.5.0.12-39.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-0:1.5.0.12-39.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:thunderbird-0:2.0.0.24-18.el5_6.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:thunderbird-0:2.0.0.24-18.el5_6.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:thunderbird-0:2.0.0.24-18.el5_6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.x86_64 | — |
Vendor Fix
fix
|
Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 3.6.18 and Thunderbird before 3.1.11 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS:thunderbird-0:1.5.0.12-39.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-0:1.5.0.12-39.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-0:1.5.0.12-39.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-0:1.5.0.12-39.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-0:1.5.0.12-39.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-0:1.5.0.12-39.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-0:1.5.0.12-39.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-0:1.5.0.12-39.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-0:1.5.0.12-39.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-0:1.5.0.12-39.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-0:1.5.0.12-39.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-0:1.5.0.12-39.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-0:1.5.0.12-39.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-0:1.5.0.12-39.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-0:1.5.0.12-39.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-0:1.5.0.12-39.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-0:1.5.0.12-39.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-0:1.5.0.12-39.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-0:1.5.0.12-39.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-0:1.5.0.12-39.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-0:1.5.0.12-39.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-0:1.5.0.12-39.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-0:1.5.0.12-39.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-0:1.5.0.12-39.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-0:1.5.0.12-39.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-0:1.5.0.12-39.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-0:1.5.0.12-39.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-0:1.5.0.12-39.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:thunderbird-0:2.0.0.24-18.el5_6.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:thunderbird-0:2.0.0.24-18.el5_6.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:thunderbird-0:2.0.0.24-18.el5_6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.x86_64 | — |
Vendor Fix
fix
|
Mozilla Firefox before 3.6.18 and 4.x through 4.0.1, Thunderbird before 3.1.11, and SeaMonkey through 2.0.14 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via a multipart/x-mixed-replace image.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS:thunderbird-0:1.5.0.12-39.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-0:1.5.0.12-39.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-0:1.5.0.12-39.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-0:1.5.0.12-39.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-0:1.5.0.12-39.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-0:1.5.0.12-39.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-0:1.5.0.12-39.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-0:1.5.0.12-39.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-0:1.5.0.12-39.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-0:1.5.0.12-39.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-0:1.5.0.12-39.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-0:1.5.0.12-39.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-0:1.5.0.12-39.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-0:1.5.0.12-39.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-0:1.5.0.12-39.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-0:1.5.0.12-39.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-0:1.5.0.12-39.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-0:1.5.0.12-39.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-0:1.5.0.12-39.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-0:1.5.0.12-39.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-0:1.5.0.12-39.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-0:1.5.0.12-39.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-0:1.5.0.12-39.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-0:1.5.0.12-39.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-0:1.5.0.12-39.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-0:1.5.0.12-39.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-0:1.5.0.12-39.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-0:1.5.0.12-39.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:thunderbird-0:2.0.0.24-18.el5_6.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:thunderbird-0:2.0.0.24-18.el5_6.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:thunderbird-0:2.0.0.24-18.el5_6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.x86_64 | — |
Vendor Fix
fix
|
CRLF injection vulnerability in the nsCookieService::SetCookieStringInternal function in netwerk/cookie/nsCookieService.cpp in Mozilla Firefox before 3.6.18 and 4.x through 4.0.1, and Thunderbird before 3.1.11, allows remote attackers to bypass intended access restrictions via a string containing a \n (newline) character, which is not properly handled in a JavaScript "document.cookie =" expression, a different vulnerability than CVE-2011-2374.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS:thunderbird-0:1.5.0.12-39.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-0:1.5.0.12-39.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-0:1.5.0.12-39.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-0:1.5.0.12-39.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-0:1.5.0.12-39.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-0:1.5.0.12-39.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-0:1.5.0.12-39.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-0:1.5.0.12-39.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-0:1.5.0.12-39.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-0:1.5.0.12-39.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-0:1.5.0.12-39.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-0:1.5.0.12-39.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-0:1.5.0.12-39.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-0:1.5.0.12-39.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-0:1.5.0.12-39.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-0:1.5.0.12-39.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-0:1.5.0.12-39.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-0:1.5.0.12-39.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-0:1.5.0.12-39.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-0:1.5.0.12-39.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-0:1.5.0.12-39.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-0:1.5.0.12-39.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-0:1.5.0.12-39.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-0:1.5.0.12-39.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-0:1.5.0.12-39.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-0:1.5.0.12-39.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-0:1.5.0.12-39.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-0:1.5.0.12-39.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:thunderbird-0:2.0.0.24-18.el5_6.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:thunderbird-0:2.0.0.24-18.el5_6.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:thunderbird-0:2.0.0.24-18.el5_6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.x86_64 | — |
Vendor Fix
fix
|
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Critical"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An updated thunderbird package that fixes several security issues is now\navailable for Red Hat Enterprise Linux 4 and 5.\n\nThe Red Hat Security Response Team has rated this update as having critical\nsecurity impact. Common Vulnerability Scoring System (CVSS) base scores,\nwhich give detailed severity ratings, are available for each vulnerability\nfrom the CVE links in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Mozilla Thunderbird is a standalone mail and newsgroup client.\n\nA flaw was found in the way Thunderbird handled malformed JPEG images. An\nHTML mail message containing a malicious JPEG image could cause Thunderbird\nto crash or, potentially, execute arbitrary code with the privileges of the\nuser running Thunderbird. (CVE-2011-2377)\n\nMultiple dangling pointer flaws were found in Thunderbird. Malicious HTML\ncontent could cause Thunderbird to crash or, potentially, execute arbitrary\ncode with the privileges of the user running Thunderbird. (CVE-2011-0083,\nCVE-2011-0085, CVE-2011-2363)\n\nSeveral flaws were found in the processing of malformed HTML content.\nMalicious HTML content could cause Thunderbird to crash or, potentially,\nexecute arbitrary code with the privileges of the user running Thunderbird.\n(CVE-2011-2364, CVE-2011-2365, CVE-2011-2374, CVE-2011-2375, CVE-2011-2376)\n\nAn integer overflow flaw was found in the way Thunderbird handled\nJavaScript Array objects. Malicious content could cause Thunderbird to\nexecute JavaScript with the privileges of the user running Thunderbird.\n(CVE-2011-2371)\n\nA use-after-free flaw was found in the way Thunderbird handled malformed\nJavaScript. Malicious content could cause Thunderbird to execute JavaScript\nwith the privileges of the user running Thunderbird. (CVE-2011-2373)\n\nIt was found that Thunderbird could treat two separate cookies (for web\ncontent) as interchangeable if both were for the same domain name but one\nof those domain names had a trailing \".\" character. This violates the\nsame-origin policy and could possibly lead to data being leaked to the\nwrong domain. (CVE-2011-2362)\n\nAll Thunderbird users should upgrade to this updated package, which\nresolves these issues. All running instances of Thunderbird must be\nrestarted for the update to take effect.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2011:0887",
"url": "https://access.redhat.com/errata/RHSA-2011:0887"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#critical",
"url": "https://access.redhat.com/security/updates/classification/#critical"
},
{
"category": "external",
"summary": "714576",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=714576"
},
{
"category": "external",
"summary": "714577",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=714577"
},
{
"category": "external",
"summary": "714580",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=714580"
},
{
"category": "external",
"summary": "714581",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=714581"
},
{
"category": "external",
"summary": "714583",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=714583"
},
{
"category": "external",
"summary": "714929",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=714929"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2011/rhsa-2011_0887.json"
}
],
"title": "Red Hat Security Advisory: thunderbird security update",
"tracking": {
"current_release_date": "2026-01-08T09:34:40+00:00",
"generator": {
"date": "2026-01-08T09:34:40+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.14"
}
},
"id": "RHSA-2011:0887",
"initial_release_date": "2011-06-21T22:25:00+00:00",
"revision_history": [
{
"date": "2011-06-21T22:25:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2011-06-21T18:28:35+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-01-08T09:34:40+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AS version 4",
"product": {
"name": "Red Hat Enterprise Linux AS version 4",
"product_id": "4AS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:4::as"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop version 4",
"product": {
"name": "Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:4::desktop"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ES version 4",
"product": {
"name": "Red Hat Enterprise Linux ES version 4",
"product_id": "4ES",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:4::es"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux WS version 4",
"product": {
"name": "Red Hat Enterprise Linux WS version 4",
"product_id": "4WS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:4::ws"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Optional Productivity Applications (v. 5 server)",
"product": {
"name": "Red Hat Enterprise Linux Optional Productivity Applications (v. 5 server)",
"product_id": "5Server-DPAS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_productivity:5"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop (v. 5 client)",
"product": {
"name": "Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:5::client"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"product": {
"name": "thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"product_id": "thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/thunderbird-debuginfo@1.5.0.12-39.el4?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "thunderbird-0:1.5.0.12-39.el4.ia64",
"product": {
"name": "thunderbird-0:1.5.0.12-39.el4.ia64",
"product_id": "thunderbird-0:1.5.0.12-39.el4.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/thunderbird@1.5.0.12-39.el4?arch=ia64"
}
}
}
],
"category": "architecture",
"name": "ia64"
},
{
"branches": [
{
"category": "product_version",
"name": "thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"product": {
"name": "thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"product_id": "thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/thunderbird-debuginfo@1.5.0.12-39.el4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "thunderbird-0:1.5.0.12-39.el4.x86_64",
"product": {
"name": "thunderbird-0:1.5.0.12-39.el4.x86_64",
"product_id": "thunderbird-0:1.5.0.12-39.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/thunderbird@1.5.0.12-39.el4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "thunderbird-0:2.0.0.24-18.el5_6.x86_64",
"product": {
"name": "thunderbird-0:2.0.0.24-18.el5_6.x86_64",
"product_id": "thunderbird-0:2.0.0.24-18.el5_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/thunderbird@2.0.0.24-18.el5_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "thunderbird-debuginfo-0:2.0.0.24-18.el5_6.x86_64",
"product": {
"name": "thunderbird-debuginfo-0:2.0.0.24-18.el5_6.x86_64",
"product_id": "thunderbird-debuginfo-0:2.0.0.24-18.el5_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/thunderbird-debuginfo@2.0.0.24-18.el5_6?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"product": {
"name": "thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"product_id": "thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/thunderbird-debuginfo@1.5.0.12-39.el4?arch=i386"
}
}
},
{
"category": "product_version",
"name": "thunderbird-0:1.5.0.12-39.el4.i386",
"product": {
"name": "thunderbird-0:1.5.0.12-39.el4.i386",
"product_id": "thunderbird-0:1.5.0.12-39.el4.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/thunderbird@1.5.0.12-39.el4?arch=i386"
}
}
},
{
"category": "product_version",
"name": "thunderbird-0:2.0.0.24-18.el5_6.i386",
"product": {
"name": "thunderbird-0:2.0.0.24-18.el5_6.i386",
"product_id": "thunderbird-0:2.0.0.24-18.el5_6.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/thunderbird@2.0.0.24-18.el5_6?arch=i386"
}
}
},
{
"category": "product_version",
"name": "thunderbird-debuginfo-0:2.0.0.24-18.el5_6.i386",
"product": {
"name": "thunderbird-debuginfo-0:2.0.0.24-18.el5_6.i386",
"product_id": "thunderbird-debuginfo-0:2.0.0.24-18.el5_6.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/thunderbird-debuginfo@2.0.0.24-18.el5_6?arch=i386"
}
}
}
],
"category": "architecture",
"name": "i386"
},
{
"branches": [
{
"category": "product_version",
"name": "thunderbird-0:1.5.0.12-39.el4.src",
"product": {
"name": "thunderbird-0:1.5.0.12-39.el4.src",
"product_id": "thunderbird-0:1.5.0.12-39.el4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/thunderbird@1.5.0.12-39.el4?arch=src"
}
}
},
{
"category": "product_version",
"name": "thunderbird-0:2.0.0.24-18.el5_6.src",
"product": {
"name": "thunderbird-0:2.0.0.24-18.el5_6.src",
"product_id": "thunderbird-0:2.0.0.24-18.el5_6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/thunderbird@2.0.0.24-18.el5_6?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"product": {
"name": "thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"product_id": "thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/thunderbird-debuginfo@1.5.0.12-39.el4?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "thunderbird-0:1.5.0.12-39.el4.ppc",
"product": {
"name": "thunderbird-0:1.5.0.12-39.el4.ppc",
"product_id": "thunderbird-0:1.5.0.12-39.el4.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/thunderbird@1.5.0.12-39.el4?arch=ppc"
}
}
}
],
"category": "architecture",
"name": "ppc"
},
{
"branches": [
{
"category": "product_version",
"name": "thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"product": {
"name": "thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"product_id": "thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/thunderbird-debuginfo@1.5.0.12-39.el4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "thunderbird-0:1.5.0.12-39.el4.s390x",
"product": {
"name": "thunderbird-0:1.5.0.12-39.el4.s390x",
"product_id": "thunderbird-0:1.5.0.12-39.el4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/thunderbird@1.5.0.12-39.el4?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"product": {
"name": "thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"product_id": "thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/thunderbird-debuginfo@1.5.0.12-39.el4?arch=s390"
}
}
},
{
"category": "product_version",
"name": "thunderbird-0:1.5.0.12-39.el4.s390",
"product": {
"name": "thunderbird-0:1.5.0.12-39.el4.s390",
"product_id": "thunderbird-0:1.5.0.12-39.el4.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/thunderbird@1.5.0.12-39.el4?arch=s390"
}
}
}
],
"category": "architecture",
"name": "s390"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-0:1.5.0.12-39.el4.i386 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:thunderbird-0:1.5.0.12-39.el4.i386"
},
"product_reference": "thunderbird-0:1.5.0.12-39.el4.i386",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-0:1.5.0.12-39.el4.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:thunderbird-0:1.5.0.12-39.el4.ia64"
},
"product_reference": "thunderbird-0:1.5.0.12-39.el4.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-0:1.5.0.12-39.el4.ppc as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:thunderbird-0:1.5.0.12-39.el4.ppc"
},
"product_reference": "thunderbird-0:1.5.0.12-39.el4.ppc",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-0:1.5.0.12-39.el4.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:thunderbird-0:1.5.0.12-39.el4.s390"
},
"product_reference": "thunderbird-0:1.5.0.12-39.el4.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-0:1.5.0.12-39.el4.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:thunderbird-0:1.5.0.12-39.el4.s390x"
},
"product_reference": "thunderbird-0:1.5.0.12-39.el4.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-0:1.5.0.12-39.el4.src as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:thunderbird-0:1.5.0.12-39.el4.src"
},
"product_reference": "thunderbird-0:1.5.0.12-39.el4.src",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-0:1.5.0.12-39.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:thunderbird-0:1.5.0.12-39.el4.x86_64"
},
"product_reference": "thunderbird-0:1.5.0.12-39.el4.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-debuginfo-0:1.5.0.12-39.el4.i386 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386"
},
"product_reference": "thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64"
},
"product_reference": "thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc"
},
"product_reference": "thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-debuginfo-0:1.5.0.12-39.el4.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390"
},
"product_reference": "thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x"
},
"product_reference": "thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64"
},
"product_reference": "thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-0:1.5.0.12-39.el4.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:thunderbird-0:1.5.0.12-39.el4.i386"
},
"product_reference": "thunderbird-0:1.5.0.12-39.el4.i386",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-0:1.5.0.12-39.el4.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:thunderbird-0:1.5.0.12-39.el4.ia64"
},
"product_reference": "thunderbird-0:1.5.0.12-39.el4.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-0:1.5.0.12-39.el4.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:thunderbird-0:1.5.0.12-39.el4.ppc"
},
"product_reference": "thunderbird-0:1.5.0.12-39.el4.ppc",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-0:1.5.0.12-39.el4.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:thunderbird-0:1.5.0.12-39.el4.s390"
},
"product_reference": "thunderbird-0:1.5.0.12-39.el4.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-0:1.5.0.12-39.el4.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:thunderbird-0:1.5.0.12-39.el4.s390x"
},
"product_reference": "thunderbird-0:1.5.0.12-39.el4.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-0:1.5.0.12-39.el4.src as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:thunderbird-0:1.5.0.12-39.el4.src"
},
"product_reference": "thunderbird-0:1.5.0.12-39.el4.src",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-0:1.5.0.12-39.el4.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:thunderbird-0:1.5.0.12-39.el4.x86_64"
},
"product_reference": "thunderbird-0:1.5.0.12-39.el4.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-debuginfo-0:1.5.0.12-39.el4.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386"
},
"product_reference": "thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64"
},
"product_reference": "thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc"
},
"product_reference": "thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-debuginfo-0:1.5.0.12-39.el4.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390"
},
"product_reference": "thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x"
},
"product_reference": "thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64"
},
"product_reference": "thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-0:1.5.0.12-39.el4.i386 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:thunderbird-0:1.5.0.12-39.el4.i386"
},
"product_reference": "thunderbird-0:1.5.0.12-39.el4.i386",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-0:1.5.0.12-39.el4.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:thunderbird-0:1.5.0.12-39.el4.ia64"
},
"product_reference": "thunderbird-0:1.5.0.12-39.el4.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-0:1.5.0.12-39.el4.ppc as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:thunderbird-0:1.5.0.12-39.el4.ppc"
},
"product_reference": "thunderbird-0:1.5.0.12-39.el4.ppc",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-0:1.5.0.12-39.el4.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:thunderbird-0:1.5.0.12-39.el4.s390"
},
"product_reference": "thunderbird-0:1.5.0.12-39.el4.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-0:1.5.0.12-39.el4.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:thunderbird-0:1.5.0.12-39.el4.s390x"
},
"product_reference": "thunderbird-0:1.5.0.12-39.el4.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-0:1.5.0.12-39.el4.src as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:thunderbird-0:1.5.0.12-39.el4.src"
},
"product_reference": "thunderbird-0:1.5.0.12-39.el4.src",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-0:1.5.0.12-39.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:thunderbird-0:1.5.0.12-39.el4.x86_64"
},
"product_reference": "thunderbird-0:1.5.0.12-39.el4.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-debuginfo-0:1.5.0.12-39.el4.i386 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386"
},
"product_reference": "thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64"
},
"product_reference": "thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc"
},
"product_reference": "thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-debuginfo-0:1.5.0.12-39.el4.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390"
},
"product_reference": "thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x"
},
"product_reference": "thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64"
},
"product_reference": "thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-0:1.5.0.12-39.el4.i386 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:thunderbird-0:1.5.0.12-39.el4.i386"
},
"product_reference": "thunderbird-0:1.5.0.12-39.el4.i386",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-0:1.5.0.12-39.el4.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:thunderbird-0:1.5.0.12-39.el4.ia64"
},
"product_reference": "thunderbird-0:1.5.0.12-39.el4.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-0:1.5.0.12-39.el4.ppc as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:thunderbird-0:1.5.0.12-39.el4.ppc"
},
"product_reference": "thunderbird-0:1.5.0.12-39.el4.ppc",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-0:1.5.0.12-39.el4.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:thunderbird-0:1.5.0.12-39.el4.s390"
},
"product_reference": "thunderbird-0:1.5.0.12-39.el4.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-0:1.5.0.12-39.el4.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:thunderbird-0:1.5.0.12-39.el4.s390x"
},
"product_reference": "thunderbird-0:1.5.0.12-39.el4.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-0:1.5.0.12-39.el4.src as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:thunderbird-0:1.5.0.12-39.el4.src"
},
"product_reference": "thunderbird-0:1.5.0.12-39.el4.src",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-0:1.5.0.12-39.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:thunderbird-0:1.5.0.12-39.el4.x86_64"
},
"product_reference": "thunderbird-0:1.5.0.12-39.el4.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-debuginfo-0:1.5.0.12-39.el4.i386 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386"
},
"product_reference": "thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64"
},
"product_reference": "thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc"
},
"product_reference": "thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-debuginfo-0:1.5.0.12-39.el4.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390"
},
"product_reference": "thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x"
},
"product_reference": "thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64"
},
"product_reference": "thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-0:2.0.0.24-18.el5_6.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:thunderbird-0:2.0.0.24-18.el5_6.i386"
},
"product_reference": "thunderbird-0:2.0.0.24-18.el5_6.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-0:2.0.0.24-18.el5_6.src as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:thunderbird-0:2.0.0.24-18.el5_6.src"
},
"product_reference": "thunderbird-0:2.0.0.24-18.el5_6.src",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-0:2.0.0.24-18.el5_6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:thunderbird-0:2.0.0.24-18.el5_6.x86_64"
},
"product_reference": "thunderbird-0:2.0.0.24-18.el5_6.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-debuginfo-0:2.0.0.24-18.el5_6.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.i386"
},
"product_reference": "thunderbird-debuginfo-0:2.0.0.24-18.el5_6.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-debuginfo-0:2.0.0.24-18.el5_6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.x86_64"
},
"product_reference": "thunderbird-debuginfo-0:2.0.0.24-18.el5_6.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-0:2.0.0.24-18.el5_6.i386 as a component of Red Hat Enterprise Linux Optional Productivity Applications (v. 5 server)",
"product_id": "5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.i386"
},
"product_reference": "thunderbird-0:2.0.0.24-18.el5_6.i386",
"relates_to_product_reference": "5Server-DPAS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-0:2.0.0.24-18.el5_6.src as a component of Red Hat Enterprise Linux Optional Productivity Applications (v. 5 server)",
"product_id": "5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.src"
},
"product_reference": "thunderbird-0:2.0.0.24-18.el5_6.src",
"relates_to_product_reference": "5Server-DPAS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-0:2.0.0.24-18.el5_6.x86_64 as a component of Red Hat Enterprise Linux Optional Productivity Applications (v. 5 server)",
"product_id": "5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.x86_64"
},
"product_reference": "thunderbird-0:2.0.0.24-18.el5_6.x86_64",
"relates_to_product_reference": "5Server-DPAS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-debuginfo-0:2.0.0.24-18.el5_6.i386 as a component of Red Hat Enterprise Linux Optional Productivity Applications (v. 5 server)",
"product_id": "5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.i386"
},
"product_reference": "thunderbird-debuginfo-0:2.0.0.24-18.el5_6.i386",
"relates_to_product_reference": "5Server-DPAS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-debuginfo-0:2.0.0.24-18.el5_6.x86_64 as a component of Red Hat Enterprise Linux Optional Productivity Applications (v. 5 server)",
"product_id": "5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.x86_64"
},
"product_reference": "thunderbird-debuginfo-0:2.0.0.24-18.el5_6.x86_64",
"relates_to_product_reference": "5Server-DPAS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2011-0083",
"discovery_date": "2011-06-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "714581"
}
],
"notes": [
{
"category": "description",
"text": "Use-after-free vulnerability in the nsSVGPathSegList::ReplaceItem function in the implementation of SVG element lists in Mozilla Firefox before 3.6.18, Thunderbird before 3.1.11, and SeaMonkey through 2.0.14 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via vectors involving a user-supplied callback.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Mozilla Multiple dangling pointer vulnerabilities (MFSA 2011-23)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS:thunderbird-0:1.5.0.12-39.el4.i386",
"4AS:thunderbird-0:1.5.0.12-39.el4.ia64",
"4AS:thunderbird-0:1.5.0.12-39.el4.ppc",
"4AS:thunderbird-0:1.5.0.12-39.el4.s390",
"4AS:thunderbird-0:1.5.0.12-39.el4.s390x",
"4AS:thunderbird-0:1.5.0.12-39.el4.src",
"4AS:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.i386",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.ia64",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.ppc",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.s390",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.s390x",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.src",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"4ES:thunderbird-0:1.5.0.12-39.el4.i386",
"4ES:thunderbird-0:1.5.0.12-39.el4.ia64",
"4ES:thunderbird-0:1.5.0.12-39.el4.ppc",
"4ES:thunderbird-0:1.5.0.12-39.el4.s390",
"4ES:thunderbird-0:1.5.0.12-39.el4.s390x",
"4ES:thunderbird-0:1.5.0.12-39.el4.src",
"4ES:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"4WS:thunderbird-0:1.5.0.12-39.el4.i386",
"4WS:thunderbird-0:1.5.0.12-39.el4.ia64",
"4WS:thunderbird-0:1.5.0.12-39.el4.ppc",
"4WS:thunderbird-0:1.5.0.12-39.el4.s390",
"4WS:thunderbird-0:1.5.0.12-39.el4.s390x",
"4WS:thunderbird-0:1.5.0.12-39.el4.src",
"4WS:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"5Client:thunderbird-0:2.0.0.24-18.el5_6.i386",
"5Client:thunderbird-0:2.0.0.24-18.el5_6.src",
"5Client:thunderbird-0:2.0.0.24-18.el5_6.x86_64",
"5Client:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.i386",
"5Client:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.x86_64",
"5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.i386",
"5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.src",
"5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.x86_64",
"5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.i386",
"5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-0083"
},
{
"category": "external",
"summary": "RHBZ#714581",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=714581"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-0083",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0083"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-0083",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-0083"
}
],
"release_date": "2011-06-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-06-21T22:25:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"4AS:thunderbird-0:1.5.0.12-39.el4.i386",
"4AS:thunderbird-0:1.5.0.12-39.el4.ia64",
"4AS:thunderbird-0:1.5.0.12-39.el4.ppc",
"4AS:thunderbird-0:1.5.0.12-39.el4.s390",
"4AS:thunderbird-0:1.5.0.12-39.el4.s390x",
"4AS:thunderbird-0:1.5.0.12-39.el4.src",
"4AS:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.i386",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.ia64",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.ppc",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.s390",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.s390x",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.src",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"4ES:thunderbird-0:1.5.0.12-39.el4.i386",
"4ES:thunderbird-0:1.5.0.12-39.el4.ia64",
"4ES:thunderbird-0:1.5.0.12-39.el4.ppc",
"4ES:thunderbird-0:1.5.0.12-39.el4.s390",
"4ES:thunderbird-0:1.5.0.12-39.el4.s390x",
"4ES:thunderbird-0:1.5.0.12-39.el4.src",
"4ES:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"4WS:thunderbird-0:1.5.0.12-39.el4.i386",
"4WS:thunderbird-0:1.5.0.12-39.el4.ia64",
"4WS:thunderbird-0:1.5.0.12-39.el4.ppc",
"4WS:thunderbird-0:1.5.0.12-39.el4.s390",
"4WS:thunderbird-0:1.5.0.12-39.el4.s390x",
"4WS:thunderbird-0:1.5.0.12-39.el4.src",
"4WS:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"5Client:thunderbird-0:2.0.0.24-18.el5_6.i386",
"5Client:thunderbird-0:2.0.0.24-18.el5_6.src",
"5Client:thunderbird-0:2.0.0.24-18.el5_6.x86_64",
"5Client:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.i386",
"5Client:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.x86_64",
"5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.i386",
"5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.src",
"5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.x86_64",
"5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.i386",
"5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:0887"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS:thunderbird-0:1.5.0.12-39.el4.i386",
"4AS:thunderbird-0:1.5.0.12-39.el4.ia64",
"4AS:thunderbird-0:1.5.0.12-39.el4.ppc",
"4AS:thunderbird-0:1.5.0.12-39.el4.s390",
"4AS:thunderbird-0:1.5.0.12-39.el4.s390x",
"4AS:thunderbird-0:1.5.0.12-39.el4.src",
"4AS:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.i386",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.ia64",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.ppc",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.s390",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.s390x",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.src",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"4ES:thunderbird-0:1.5.0.12-39.el4.i386",
"4ES:thunderbird-0:1.5.0.12-39.el4.ia64",
"4ES:thunderbird-0:1.5.0.12-39.el4.ppc",
"4ES:thunderbird-0:1.5.0.12-39.el4.s390",
"4ES:thunderbird-0:1.5.0.12-39.el4.s390x",
"4ES:thunderbird-0:1.5.0.12-39.el4.src",
"4ES:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"4WS:thunderbird-0:1.5.0.12-39.el4.i386",
"4WS:thunderbird-0:1.5.0.12-39.el4.ia64",
"4WS:thunderbird-0:1.5.0.12-39.el4.ppc",
"4WS:thunderbird-0:1.5.0.12-39.el4.s390",
"4WS:thunderbird-0:1.5.0.12-39.el4.s390x",
"4WS:thunderbird-0:1.5.0.12-39.el4.src",
"4WS:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"5Client:thunderbird-0:2.0.0.24-18.el5_6.i386",
"5Client:thunderbird-0:2.0.0.24-18.el5_6.src",
"5Client:thunderbird-0:2.0.0.24-18.el5_6.x86_64",
"5Client:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.i386",
"5Client:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.x86_64",
"5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.i386",
"5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.src",
"5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.x86_64",
"5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.i386",
"5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "Mozilla Multiple dangling pointer vulnerabilities (MFSA 2011-23)"
},
{
"cve": "CVE-2011-0085",
"discovery_date": "2011-06-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "714581"
}
],
"notes": [
{
"category": "description",
"text": "No description is available for this CVE.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Mozilla Multiple dangling pointer vulnerabilities (MFSA 2011-23)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS:thunderbird-0:1.5.0.12-39.el4.i386",
"4AS:thunderbird-0:1.5.0.12-39.el4.ia64",
"4AS:thunderbird-0:1.5.0.12-39.el4.ppc",
"4AS:thunderbird-0:1.5.0.12-39.el4.s390",
"4AS:thunderbird-0:1.5.0.12-39.el4.s390x",
"4AS:thunderbird-0:1.5.0.12-39.el4.src",
"4AS:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.i386",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.ia64",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.ppc",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.s390",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.s390x",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.src",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"4ES:thunderbird-0:1.5.0.12-39.el4.i386",
"4ES:thunderbird-0:1.5.0.12-39.el4.ia64",
"4ES:thunderbird-0:1.5.0.12-39.el4.ppc",
"4ES:thunderbird-0:1.5.0.12-39.el4.s390",
"4ES:thunderbird-0:1.5.0.12-39.el4.s390x",
"4ES:thunderbird-0:1.5.0.12-39.el4.src",
"4ES:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"4WS:thunderbird-0:1.5.0.12-39.el4.i386",
"4WS:thunderbird-0:1.5.0.12-39.el4.ia64",
"4WS:thunderbird-0:1.5.0.12-39.el4.ppc",
"4WS:thunderbird-0:1.5.0.12-39.el4.s390",
"4WS:thunderbird-0:1.5.0.12-39.el4.s390x",
"4WS:thunderbird-0:1.5.0.12-39.el4.src",
"4WS:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"5Client:thunderbird-0:2.0.0.24-18.el5_6.i386",
"5Client:thunderbird-0:2.0.0.24-18.el5_6.src",
"5Client:thunderbird-0:2.0.0.24-18.el5_6.x86_64",
"5Client:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.i386",
"5Client:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.x86_64",
"5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.i386",
"5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.src",
"5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.x86_64",
"5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.i386",
"5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-0085"
},
{
"category": "external",
"summary": "RHBZ#714581",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=714581"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-0085",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0085"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-0085",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-0085"
}
],
"release_date": "2011-06-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-06-21T22:25:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"4AS:thunderbird-0:1.5.0.12-39.el4.i386",
"4AS:thunderbird-0:1.5.0.12-39.el4.ia64",
"4AS:thunderbird-0:1.5.0.12-39.el4.ppc",
"4AS:thunderbird-0:1.5.0.12-39.el4.s390",
"4AS:thunderbird-0:1.5.0.12-39.el4.s390x",
"4AS:thunderbird-0:1.5.0.12-39.el4.src",
"4AS:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.i386",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.ia64",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.ppc",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.s390",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.s390x",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.src",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"4ES:thunderbird-0:1.5.0.12-39.el4.i386",
"4ES:thunderbird-0:1.5.0.12-39.el4.ia64",
"4ES:thunderbird-0:1.5.0.12-39.el4.ppc",
"4ES:thunderbird-0:1.5.0.12-39.el4.s390",
"4ES:thunderbird-0:1.5.0.12-39.el4.s390x",
"4ES:thunderbird-0:1.5.0.12-39.el4.src",
"4ES:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"4WS:thunderbird-0:1.5.0.12-39.el4.i386",
"4WS:thunderbird-0:1.5.0.12-39.el4.ia64",
"4WS:thunderbird-0:1.5.0.12-39.el4.ppc",
"4WS:thunderbird-0:1.5.0.12-39.el4.s390",
"4WS:thunderbird-0:1.5.0.12-39.el4.s390x",
"4WS:thunderbird-0:1.5.0.12-39.el4.src",
"4WS:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"5Client:thunderbird-0:2.0.0.24-18.el5_6.i386",
"5Client:thunderbird-0:2.0.0.24-18.el5_6.src",
"5Client:thunderbird-0:2.0.0.24-18.el5_6.x86_64",
"5Client:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.i386",
"5Client:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.x86_64",
"5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.i386",
"5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.src",
"5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.x86_64",
"5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.i386",
"5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:0887"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS:thunderbird-0:1.5.0.12-39.el4.i386",
"4AS:thunderbird-0:1.5.0.12-39.el4.ia64",
"4AS:thunderbird-0:1.5.0.12-39.el4.ppc",
"4AS:thunderbird-0:1.5.0.12-39.el4.s390",
"4AS:thunderbird-0:1.5.0.12-39.el4.s390x",
"4AS:thunderbird-0:1.5.0.12-39.el4.src",
"4AS:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.i386",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.ia64",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.ppc",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.s390",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.s390x",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.src",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"4ES:thunderbird-0:1.5.0.12-39.el4.i386",
"4ES:thunderbird-0:1.5.0.12-39.el4.ia64",
"4ES:thunderbird-0:1.5.0.12-39.el4.ppc",
"4ES:thunderbird-0:1.5.0.12-39.el4.s390",
"4ES:thunderbird-0:1.5.0.12-39.el4.s390x",
"4ES:thunderbird-0:1.5.0.12-39.el4.src",
"4ES:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"4WS:thunderbird-0:1.5.0.12-39.el4.i386",
"4WS:thunderbird-0:1.5.0.12-39.el4.ia64",
"4WS:thunderbird-0:1.5.0.12-39.el4.ppc",
"4WS:thunderbird-0:1.5.0.12-39.el4.s390",
"4WS:thunderbird-0:1.5.0.12-39.el4.s390x",
"4WS:thunderbird-0:1.5.0.12-39.el4.src",
"4WS:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"5Client:thunderbird-0:2.0.0.24-18.el5_6.i386",
"5Client:thunderbird-0:2.0.0.24-18.el5_6.src",
"5Client:thunderbird-0:2.0.0.24-18.el5_6.x86_64",
"5Client:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.i386",
"5Client:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.x86_64",
"5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.i386",
"5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.src",
"5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.x86_64",
"5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.i386",
"5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "Mozilla Multiple dangling pointer vulnerabilities (MFSA 2011-23)"
},
{
"cve": "CVE-2011-2362",
"discovery_date": "2011-06-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "714583"
}
],
"notes": [
{
"category": "description",
"text": "Mozilla Firefox before 3.6.18, Thunderbird before 3.1.11, and SeaMonkey through 2.0.14 do not distinguish between cookies for two domain names that differ only in a trailing dot, which allows remote web servers to bypass the Same Origin Policy via Set-Cookie headers.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Mozilla Cookie isolation error (MFSA 2011-24)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS:thunderbird-0:1.5.0.12-39.el4.i386",
"4AS:thunderbird-0:1.5.0.12-39.el4.ia64",
"4AS:thunderbird-0:1.5.0.12-39.el4.ppc",
"4AS:thunderbird-0:1.5.0.12-39.el4.s390",
"4AS:thunderbird-0:1.5.0.12-39.el4.s390x",
"4AS:thunderbird-0:1.5.0.12-39.el4.src",
"4AS:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.i386",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.ia64",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.ppc",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.s390",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.s390x",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.src",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"4ES:thunderbird-0:1.5.0.12-39.el4.i386",
"4ES:thunderbird-0:1.5.0.12-39.el4.ia64",
"4ES:thunderbird-0:1.5.0.12-39.el4.ppc",
"4ES:thunderbird-0:1.5.0.12-39.el4.s390",
"4ES:thunderbird-0:1.5.0.12-39.el4.s390x",
"4ES:thunderbird-0:1.5.0.12-39.el4.src",
"4ES:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"4WS:thunderbird-0:1.5.0.12-39.el4.i386",
"4WS:thunderbird-0:1.5.0.12-39.el4.ia64",
"4WS:thunderbird-0:1.5.0.12-39.el4.ppc",
"4WS:thunderbird-0:1.5.0.12-39.el4.s390",
"4WS:thunderbird-0:1.5.0.12-39.el4.s390x",
"4WS:thunderbird-0:1.5.0.12-39.el4.src",
"4WS:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"5Client:thunderbird-0:2.0.0.24-18.el5_6.i386",
"5Client:thunderbird-0:2.0.0.24-18.el5_6.src",
"5Client:thunderbird-0:2.0.0.24-18.el5_6.x86_64",
"5Client:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.i386",
"5Client:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.x86_64",
"5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.i386",
"5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.src",
"5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.x86_64",
"5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.i386",
"5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-2362"
},
{
"category": "external",
"summary": "RHBZ#714583",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=714583"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-2362",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2362"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-2362",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-2362"
}
],
"release_date": "2011-06-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-06-21T22:25:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"4AS:thunderbird-0:1.5.0.12-39.el4.i386",
"4AS:thunderbird-0:1.5.0.12-39.el4.ia64",
"4AS:thunderbird-0:1.5.0.12-39.el4.ppc",
"4AS:thunderbird-0:1.5.0.12-39.el4.s390",
"4AS:thunderbird-0:1.5.0.12-39.el4.s390x",
"4AS:thunderbird-0:1.5.0.12-39.el4.src",
"4AS:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.i386",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.ia64",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.ppc",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.s390",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.s390x",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.src",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"4ES:thunderbird-0:1.5.0.12-39.el4.i386",
"4ES:thunderbird-0:1.5.0.12-39.el4.ia64",
"4ES:thunderbird-0:1.5.0.12-39.el4.ppc",
"4ES:thunderbird-0:1.5.0.12-39.el4.s390",
"4ES:thunderbird-0:1.5.0.12-39.el4.s390x",
"4ES:thunderbird-0:1.5.0.12-39.el4.src",
"4ES:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"4WS:thunderbird-0:1.5.0.12-39.el4.i386",
"4WS:thunderbird-0:1.5.0.12-39.el4.ia64",
"4WS:thunderbird-0:1.5.0.12-39.el4.ppc",
"4WS:thunderbird-0:1.5.0.12-39.el4.s390",
"4WS:thunderbird-0:1.5.0.12-39.el4.s390x",
"4WS:thunderbird-0:1.5.0.12-39.el4.src",
"4WS:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"5Client:thunderbird-0:2.0.0.24-18.el5_6.i386",
"5Client:thunderbird-0:2.0.0.24-18.el5_6.src",
"5Client:thunderbird-0:2.0.0.24-18.el5_6.x86_64",
"5Client:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.i386",
"5Client:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.x86_64",
"5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.i386",
"5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.src",
"5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.x86_64",
"5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.i386",
"5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:0887"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.1,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS:thunderbird-0:1.5.0.12-39.el4.i386",
"4AS:thunderbird-0:1.5.0.12-39.el4.ia64",
"4AS:thunderbird-0:1.5.0.12-39.el4.ppc",
"4AS:thunderbird-0:1.5.0.12-39.el4.s390",
"4AS:thunderbird-0:1.5.0.12-39.el4.s390x",
"4AS:thunderbird-0:1.5.0.12-39.el4.src",
"4AS:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.i386",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.ia64",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.ppc",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.s390",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.s390x",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.src",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"4ES:thunderbird-0:1.5.0.12-39.el4.i386",
"4ES:thunderbird-0:1.5.0.12-39.el4.ia64",
"4ES:thunderbird-0:1.5.0.12-39.el4.ppc",
"4ES:thunderbird-0:1.5.0.12-39.el4.s390",
"4ES:thunderbird-0:1.5.0.12-39.el4.s390x",
"4ES:thunderbird-0:1.5.0.12-39.el4.src",
"4ES:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"4WS:thunderbird-0:1.5.0.12-39.el4.i386",
"4WS:thunderbird-0:1.5.0.12-39.el4.ia64",
"4WS:thunderbird-0:1.5.0.12-39.el4.ppc",
"4WS:thunderbird-0:1.5.0.12-39.el4.s390",
"4WS:thunderbird-0:1.5.0.12-39.el4.s390x",
"4WS:thunderbird-0:1.5.0.12-39.el4.src",
"4WS:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"5Client:thunderbird-0:2.0.0.24-18.el5_6.i386",
"5Client:thunderbird-0:2.0.0.24-18.el5_6.src",
"5Client:thunderbird-0:2.0.0.24-18.el5_6.x86_64",
"5Client:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.i386",
"5Client:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.x86_64",
"5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.i386",
"5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.src",
"5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.x86_64",
"5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.i386",
"5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "Mozilla Cookie isolation error (MFSA 2011-24)"
},
{
"cve": "CVE-2011-2363",
"discovery_date": "2011-06-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "714581"
}
],
"notes": [
{
"category": "description",
"text": "Use-after-free vulnerability in the nsSVGPointList::AppendElement function in the implementation of SVG element lists in Mozilla Firefox before 3.6.18, Thunderbird before 3.1.11, and SeaMonkey through 2.0.14 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via vectors involving a user-supplied callback.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Mozilla Multiple dangling pointer vulnerabilities (MFSA 2011-23)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS:thunderbird-0:1.5.0.12-39.el4.i386",
"4AS:thunderbird-0:1.5.0.12-39.el4.ia64",
"4AS:thunderbird-0:1.5.0.12-39.el4.ppc",
"4AS:thunderbird-0:1.5.0.12-39.el4.s390",
"4AS:thunderbird-0:1.5.0.12-39.el4.s390x",
"4AS:thunderbird-0:1.5.0.12-39.el4.src",
"4AS:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.i386",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.ia64",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.ppc",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.s390",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.s390x",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.src",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"4ES:thunderbird-0:1.5.0.12-39.el4.i386",
"4ES:thunderbird-0:1.5.0.12-39.el4.ia64",
"4ES:thunderbird-0:1.5.0.12-39.el4.ppc",
"4ES:thunderbird-0:1.5.0.12-39.el4.s390",
"4ES:thunderbird-0:1.5.0.12-39.el4.s390x",
"4ES:thunderbird-0:1.5.0.12-39.el4.src",
"4ES:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"4WS:thunderbird-0:1.5.0.12-39.el4.i386",
"4WS:thunderbird-0:1.5.0.12-39.el4.ia64",
"4WS:thunderbird-0:1.5.0.12-39.el4.ppc",
"4WS:thunderbird-0:1.5.0.12-39.el4.s390",
"4WS:thunderbird-0:1.5.0.12-39.el4.s390x",
"4WS:thunderbird-0:1.5.0.12-39.el4.src",
"4WS:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"5Client:thunderbird-0:2.0.0.24-18.el5_6.i386",
"5Client:thunderbird-0:2.0.0.24-18.el5_6.src",
"5Client:thunderbird-0:2.0.0.24-18.el5_6.x86_64",
"5Client:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.i386",
"5Client:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.x86_64",
"5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.i386",
"5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.src",
"5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.x86_64",
"5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.i386",
"5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-2363"
},
{
"category": "external",
"summary": "RHBZ#714581",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=714581"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-2363",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2363"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-2363",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-2363"
}
],
"release_date": "2011-06-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-06-21T22:25:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"4AS:thunderbird-0:1.5.0.12-39.el4.i386",
"4AS:thunderbird-0:1.5.0.12-39.el4.ia64",
"4AS:thunderbird-0:1.5.0.12-39.el4.ppc",
"4AS:thunderbird-0:1.5.0.12-39.el4.s390",
"4AS:thunderbird-0:1.5.0.12-39.el4.s390x",
"4AS:thunderbird-0:1.5.0.12-39.el4.src",
"4AS:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.i386",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.ia64",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.ppc",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.s390",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.s390x",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.src",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"4ES:thunderbird-0:1.5.0.12-39.el4.i386",
"4ES:thunderbird-0:1.5.0.12-39.el4.ia64",
"4ES:thunderbird-0:1.5.0.12-39.el4.ppc",
"4ES:thunderbird-0:1.5.0.12-39.el4.s390",
"4ES:thunderbird-0:1.5.0.12-39.el4.s390x",
"4ES:thunderbird-0:1.5.0.12-39.el4.src",
"4ES:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"4WS:thunderbird-0:1.5.0.12-39.el4.i386",
"4WS:thunderbird-0:1.5.0.12-39.el4.ia64",
"4WS:thunderbird-0:1.5.0.12-39.el4.ppc",
"4WS:thunderbird-0:1.5.0.12-39.el4.s390",
"4WS:thunderbird-0:1.5.0.12-39.el4.s390x",
"4WS:thunderbird-0:1.5.0.12-39.el4.src",
"4WS:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"5Client:thunderbird-0:2.0.0.24-18.el5_6.i386",
"5Client:thunderbird-0:2.0.0.24-18.el5_6.src",
"5Client:thunderbird-0:2.0.0.24-18.el5_6.x86_64",
"5Client:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.i386",
"5Client:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.x86_64",
"5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.i386",
"5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.src",
"5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.x86_64",
"5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.i386",
"5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:0887"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS:thunderbird-0:1.5.0.12-39.el4.i386",
"4AS:thunderbird-0:1.5.0.12-39.el4.ia64",
"4AS:thunderbird-0:1.5.0.12-39.el4.ppc",
"4AS:thunderbird-0:1.5.0.12-39.el4.s390",
"4AS:thunderbird-0:1.5.0.12-39.el4.s390x",
"4AS:thunderbird-0:1.5.0.12-39.el4.src",
"4AS:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.i386",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.ia64",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.ppc",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.s390",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.s390x",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.src",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"4ES:thunderbird-0:1.5.0.12-39.el4.i386",
"4ES:thunderbird-0:1.5.0.12-39.el4.ia64",
"4ES:thunderbird-0:1.5.0.12-39.el4.ppc",
"4ES:thunderbird-0:1.5.0.12-39.el4.s390",
"4ES:thunderbird-0:1.5.0.12-39.el4.s390x",
"4ES:thunderbird-0:1.5.0.12-39.el4.src",
"4ES:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"4WS:thunderbird-0:1.5.0.12-39.el4.i386",
"4WS:thunderbird-0:1.5.0.12-39.el4.ia64",
"4WS:thunderbird-0:1.5.0.12-39.el4.ppc",
"4WS:thunderbird-0:1.5.0.12-39.el4.s390",
"4WS:thunderbird-0:1.5.0.12-39.el4.s390x",
"4WS:thunderbird-0:1.5.0.12-39.el4.src",
"4WS:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"5Client:thunderbird-0:2.0.0.24-18.el5_6.i386",
"5Client:thunderbird-0:2.0.0.24-18.el5_6.src",
"5Client:thunderbird-0:2.0.0.24-18.el5_6.x86_64",
"5Client:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.i386",
"5Client:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.x86_64",
"5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.i386",
"5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.src",
"5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.x86_64",
"5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.i386",
"5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "Mozilla Multiple dangling pointer vulnerabilities (MFSA 2011-23)"
},
{
"cve": "CVE-2011-2364",
"discovery_date": "2011-06-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "714576"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the browser engine in Mozilla Firefox 3.6.x before 3.6.18 and Thunderbird before 3.1.11 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors, a different vulnerability than CVE-2011-2365.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Mozilla Miscellaneous memory safety hazards (MFSA 2011-19)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS:thunderbird-0:1.5.0.12-39.el4.i386",
"4AS:thunderbird-0:1.5.0.12-39.el4.ia64",
"4AS:thunderbird-0:1.5.0.12-39.el4.ppc",
"4AS:thunderbird-0:1.5.0.12-39.el4.s390",
"4AS:thunderbird-0:1.5.0.12-39.el4.s390x",
"4AS:thunderbird-0:1.5.0.12-39.el4.src",
"4AS:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.i386",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.ia64",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.ppc",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.s390",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.s390x",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.src",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"4ES:thunderbird-0:1.5.0.12-39.el4.i386",
"4ES:thunderbird-0:1.5.0.12-39.el4.ia64",
"4ES:thunderbird-0:1.5.0.12-39.el4.ppc",
"4ES:thunderbird-0:1.5.0.12-39.el4.s390",
"4ES:thunderbird-0:1.5.0.12-39.el4.s390x",
"4ES:thunderbird-0:1.5.0.12-39.el4.src",
"4ES:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"4WS:thunderbird-0:1.5.0.12-39.el4.i386",
"4WS:thunderbird-0:1.5.0.12-39.el4.ia64",
"4WS:thunderbird-0:1.5.0.12-39.el4.ppc",
"4WS:thunderbird-0:1.5.0.12-39.el4.s390",
"4WS:thunderbird-0:1.5.0.12-39.el4.s390x",
"4WS:thunderbird-0:1.5.0.12-39.el4.src",
"4WS:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"5Client:thunderbird-0:2.0.0.24-18.el5_6.i386",
"5Client:thunderbird-0:2.0.0.24-18.el5_6.src",
"5Client:thunderbird-0:2.0.0.24-18.el5_6.x86_64",
"5Client:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.i386",
"5Client:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.x86_64",
"5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.i386",
"5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.src",
"5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.x86_64",
"5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.i386",
"5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-2364"
},
{
"category": "external",
"summary": "RHBZ#714576",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=714576"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-2364",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2364"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-2364",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-2364"
}
],
"release_date": "2011-06-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-06-21T22:25:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"4AS:thunderbird-0:1.5.0.12-39.el4.i386",
"4AS:thunderbird-0:1.5.0.12-39.el4.ia64",
"4AS:thunderbird-0:1.5.0.12-39.el4.ppc",
"4AS:thunderbird-0:1.5.0.12-39.el4.s390",
"4AS:thunderbird-0:1.5.0.12-39.el4.s390x",
"4AS:thunderbird-0:1.5.0.12-39.el4.src",
"4AS:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.i386",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.ia64",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.ppc",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.s390",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.s390x",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.src",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"4ES:thunderbird-0:1.5.0.12-39.el4.i386",
"4ES:thunderbird-0:1.5.0.12-39.el4.ia64",
"4ES:thunderbird-0:1.5.0.12-39.el4.ppc",
"4ES:thunderbird-0:1.5.0.12-39.el4.s390",
"4ES:thunderbird-0:1.5.0.12-39.el4.s390x",
"4ES:thunderbird-0:1.5.0.12-39.el4.src",
"4ES:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"4WS:thunderbird-0:1.5.0.12-39.el4.i386",
"4WS:thunderbird-0:1.5.0.12-39.el4.ia64",
"4WS:thunderbird-0:1.5.0.12-39.el4.ppc",
"4WS:thunderbird-0:1.5.0.12-39.el4.s390",
"4WS:thunderbird-0:1.5.0.12-39.el4.s390x",
"4WS:thunderbird-0:1.5.0.12-39.el4.src",
"4WS:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"5Client:thunderbird-0:2.0.0.24-18.el5_6.i386",
"5Client:thunderbird-0:2.0.0.24-18.el5_6.src",
"5Client:thunderbird-0:2.0.0.24-18.el5_6.x86_64",
"5Client:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.i386",
"5Client:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.x86_64",
"5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.i386",
"5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.src",
"5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.x86_64",
"5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.i386",
"5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:0887"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS:thunderbird-0:1.5.0.12-39.el4.i386",
"4AS:thunderbird-0:1.5.0.12-39.el4.ia64",
"4AS:thunderbird-0:1.5.0.12-39.el4.ppc",
"4AS:thunderbird-0:1.5.0.12-39.el4.s390",
"4AS:thunderbird-0:1.5.0.12-39.el4.s390x",
"4AS:thunderbird-0:1.5.0.12-39.el4.src",
"4AS:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.i386",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.ia64",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.ppc",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.s390",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.s390x",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.src",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"4ES:thunderbird-0:1.5.0.12-39.el4.i386",
"4ES:thunderbird-0:1.5.0.12-39.el4.ia64",
"4ES:thunderbird-0:1.5.0.12-39.el4.ppc",
"4ES:thunderbird-0:1.5.0.12-39.el4.s390",
"4ES:thunderbird-0:1.5.0.12-39.el4.s390x",
"4ES:thunderbird-0:1.5.0.12-39.el4.src",
"4ES:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"4WS:thunderbird-0:1.5.0.12-39.el4.i386",
"4WS:thunderbird-0:1.5.0.12-39.el4.ia64",
"4WS:thunderbird-0:1.5.0.12-39.el4.ppc",
"4WS:thunderbird-0:1.5.0.12-39.el4.s390",
"4WS:thunderbird-0:1.5.0.12-39.el4.s390x",
"4WS:thunderbird-0:1.5.0.12-39.el4.src",
"4WS:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"5Client:thunderbird-0:2.0.0.24-18.el5_6.i386",
"5Client:thunderbird-0:2.0.0.24-18.el5_6.src",
"5Client:thunderbird-0:2.0.0.24-18.el5_6.x86_64",
"5Client:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.i386",
"5Client:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.x86_64",
"5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.i386",
"5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.src",
"5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.x86_64",
"5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.i386",
"5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "Mozilla Miscellaneous memory safety hazards (MFSA 2011-19)"
},
{
"cve": "CVE-2011-2365",
"discovery_date": "2011-06-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "714576"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the browser engine in Mozilla Firefox 3.6.x before 3.6.18 and Thunderbird before 3.1.11 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors, a different vulnerability than CVE-2011-2364.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Mozilla Miscellaneous memory safety hazards (MFSA 2011-19)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS:thunderbird-0:1.5.0.12-39.el4.i386",
"4AS:thunderbird-0:1.5.0.12-39.el4.ia64",
"4AS:thunderbird-0:1.5.0.12-39.el4.ppc",
"4AS:thunderbird-0:1.5.0.12-39.el4.s390",
"4AS:thunderbird-0:1.5.0.12-39.el4.s390x",
"4AS:thunderbird-0:1.5.0.12-39.el4.src",
"4AS:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.i386",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.ia64",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.ppc",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.s390",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.s390x",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.src",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"4ES:thunderbird-0:1.5.0.12-39.el4.i386",
"4ES:thunderbird-0:1.5.0.12-39.el4.ia64",
"4ES:thunderbird-0:1.5.0.12-39.el4.ppc",
"4ES:thunderbird-0:1.5.0.12-39.el4.s390",
"4ES:thunderbird-0:1.5.0.12-39.el4.s390x",
"4ES:thunderbird-0:1.5.0.12-39.el4.src",
"4ES:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"4WS:thunderbird-0:1.5.0.12-39.el4.i386",
"4WS:thunderbird-0:1.5.0.12-39.el4.ia64",
"4WS:thunderbird-0:1.5.0.12-39.el4.ppc",
"4WS:thunderbird-0:1.5.0.12-39.el4.s390",
"4WS:thunderbird-0:1.5.0.12-39.el4.s390x",
"4WS:thunderbird-0:1.5.0.12-39.el4.src",
"4WS:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"5Client:thunderbird-0:2.0.0.24-18.el5_6.i386",
"5Client:thunderbird-0:2.0.0.24-18.el5_6.src",
"5Client:thunderbird-0:2.0.0.24-18.el5_6.x86_64",
"5Client:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.i386",
"5Client:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.x86_64",
"5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.i386",
"5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.src",
"5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.x86_64",
"5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.i386",
"5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-2365"
},
{
"category": "external",
"summary": "RHBZ#714576",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=714576"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-2365",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2365"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-2365",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-2365"
}
],
"release_date": "2011-06-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-06-21T22:25:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"4AS:thunderbird-0:1.5.0.12-39.el4.i386",
"4AS:thunderbird-0:1.5.0.12-39.el4.ia64",
"4AS:thunderbird-0:1.5.0.12-39.el4.ppc",
"4AS:thunderbird-0:1.5.0.12-39.el4.s390",
"4AS:thunderbird-0:1.5.0.12-39.el4.s390x",
"4AS:thunderbird-0:1.5.0.12-39.el4.src",
"4AS:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.i386",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.ia64",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.ppc",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.s390",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.s390x",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.src",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"4ES:thunderbird-0:1.5.0.12-39.el4.i386",
"4ES:thunderbird-0:1.5.0.12-39.el4.ia64",
"4ES:thunderbird-0:1.5.0.12-39.el4.ppc",
"4ES:thunderbird-0:1.5.0.12-39.el4.s390",
"4ES:thunderbird-0:1.5.0.12-39.el4.s390x",
"4ES:thunderbird-0:1.5.0.12-39.el4.src",
"4ES:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"4WS:thunderbird-0:1.5.0.12-39.el4.i386",
"4WS:thunderbird-0:1.5.0.12-39.el4.ia64",
"4WS:thunderbird-0:1.5.0.12-39.el4.ppc",
"4WS:thunderbird-0:1.5.0.12-39.el4.s390",
"4WS:thunderbird-0:1.5.0.12-39.el4.s390x",
"4WS:thunderbird-0:1.5.0.12-39.el4.src",
"4WS:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"5Client:thunderbird-0:2.0.0.24-18.el5_6.i386",
"5Client:thunderbird-0:2.0.0.24-18.el5_6.src",
"5Client:thunderbird-0:2.0.0.24-18.el5_6.x86_64",
"5Client:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.i386",
"5Client:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.x86_64",
"5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.i386",
"5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.src",
"5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.x86_64",
"5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.i386",
"5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:0887"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS:thunderbird-0:1.5.0.12-39.el4.i386",
"4AS:thunderbird-0:1.5.0.12-39.el4.ia64",
"4AS:thunderbird-0:1.5.0.12-39.el4.ppc",
"4AS:thunderbird-0:1.5.0.12-39.el4.s390",
"4AS:thunderbird-0:1.5.0.12-39.el4.s390x",
"4AS:thunderbird-0:1.5.0.12-39.el4.src",
"4AS:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.i386",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.ia64",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.ppc",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.s390",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.s390x",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.src",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"4ES:thunderbird-0:1.5.0.12-39.el4.i386",
"4ES:thunderbird-0:1.5.0.12-39.el4.ia64",
"4ES:thunderbird-0:1.5.0.12-39.el4.ppc",
"4ES:thunderbird-0:1.5.0.12-39.el4.s390",
"4ES:thunderbird-0:1.5.0.12-39.el4.s390x",
"4ES:thunderbird-0:1.5.0.12-39.el4.src",
"4ES:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"4WS:thunderbird-0:1.5.0.12-39.el4.i386",
"4WS:thunderbird-0:1.5.0.12-39.el4.ia64",
"4WS:thunderbird-0:1.5.0.12-39.el4.ppc",
"4WS:thunderbird-0:1.5.0.12-39.el4.s390",
"4WS:thunderbird-0:1.5.0.12-39.el4.s390x",
"4WS:thunderbird-0:1.5.0.12-39.el4.src",
"4WS:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"5Client:thunderbird-0:2.0.0.24-18.el5_6.i386",
"5Client:thunderbird-0:2.0.0.24-18.el5_6.src",
"5Client:thunderbird-0:2.0.0.24-18.el5_6.x86_64",
"5Client:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.i386",
"5Client:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.x86_64",
"5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.i386",
"5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.src",
"5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.x86_64",
"5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.i386",
"5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "Mozilla Miscellaneous memory safety hazards (MFSA 2011-19)"
},
{
"cve": "CVE-2011-2371",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"discovery_date": "2011-06-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "714580"
}
],
"notes": [
{
"category": "description",
"text": "Integer overflow in the Array.reduceRight method in Mozilla Firefox before 3.6.18 and 4.x through 4.0.1, Thunderbird before 3.1.11, and SeaMonkey through 2.0.14 allows remote attackers to execute arbitrary code via vectors involving a long JavaScript Array object.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Mozilla Integer overflow and arbitrary code execution (MFSA 2011-22)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS:thunderbird-0:1.5.0.12-39.el4.i386",
"4AS:thunderbird-0:1.5.0.12-39.el4.ia64",
"4AS:thunderbird-0:1.5.0.12-39.el4.ppc",
"4AS:thunderbird-0:1.5.0.12-39.el4.s390",
"4AS:thunderbird-0:1.5.0.12-39.el4.s390x",
"4AS:thunderbird-0:1.5.0.12-39.el4.src",
"4AS:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.i386",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.ia64",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.ppc",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.s390",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.s390x",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.src",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"4ES:thunderbird-0:1.5.0.12-39.el4.i386",
"4ES:thunderbird-0:1.5.0.12-39.el4.ia64",
"4ES:thunderbird-0:1.5.0.12-39.el4.ppc",
"4ES:thunderbird-0:1.5.0.12-39.el4.s390",
"4ES:thunderbird-0:1.5.0.12-39.el4.s390x",
"4ES:thunderbird-0:1.5.0.12-39.el4.src",
"4ES:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"4WS:thunderbird-0:1.5.0.12-39.el4.i386",
"4WS:thunderbird-0:1.5.0.12-39.el4.ia64",
"4WS:thunderbird-0:1.5.0.12-39.el4.ppc",
"4WS:thunderbird-0:1.5.0.12-39.el4.s390",
"4WS:thunderbird-0:1.5.0.12-39.el4.s390x",
"4WS:thunderbird-0:1.5.0.12-39.el4.src",
"4WS:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"5Client:thunderbird-0:2.0.0.24-18.el5_6.i386",
"5Client:thunderbird-0:2.0.0.24-18.el5_6.src",
"5Client:thunderbird-0:2.0.0.24-18.el5_6.x86_64",
"5Client:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.i386",
"5Client:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.x86_64",
"5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.i386",
"5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.src",
"5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.x86_64",
"5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.i386",
"5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-2371"
},
{
"category": "external",
"summary": "RHBZ#714580",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=714580"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-2371",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2371"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-2371",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-2371"
}
],
"release_date": "2011-06-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-06-21T22:25:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"4AS:thunderbird-0:1.5.0.12-39.el4.i386",
"4AS:thunderbird-0:1.5.0.12-39.el4.ia64",
"4AS:thunderbird-0:1.5.0.12-39.el4.ppc",
"4AS:thunderbird-0:1.5.0.12-39.el4.s390",
"4AS:thunderbird-0:1.5.0.12-39.el4.s390x",
"4AS:thunderbird-0:1.5.0.12-39.el4.src",
"4AS:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.i386",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.ia64",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.ppc",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.s390",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.s390x",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.src",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"4ES:thunderbird-0:1.5.0.12-39.el4.i386",
"4ES:thunderbird-0:1.5.0.12-39.el4.ia64",
"4ES:thunderbird-0:1.5.0.12-39.el4.ppc",
"4ES:thunderbird-0:1.5.0.12-39.el4.s390",
"4ES:thunderbird-0:1.5.0.12-39.el4.s390x",
"4ES:thunderbird-0:1.5.0.12-39.el4.src",
"4ES:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"4WS:thunderbird-0:1.5.0.12-39.el4.i386",
"4WS:thunderbird-0:1.5.0.12-39.el4.ia64",
"4WS:thunderbird-0:1.5.0.12-39.el4.ppc",
"4WS:thunderbird-0:1.5.0.12-39.el4.s390",
"4WS:thunderbird-0:1.5.0.12-39.el4.s390x",
"4WS:thunderbird-0:1.5.0.12-39.el4.src",
"4WS:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"5Client:thunderbird-0:2.0.0.24-18.el5_6.i386",
"5Client:thunderbird-0:2.0.0.24-18.el5_6.src",
"5Client:thunderbird-0:2.0.0.24-18.el5_6.x86_64",
"5Client:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.i386",
"5Client:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.x86_64",
"5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.i386",
"5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.src",
"5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.x86_64",
"5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.i386",
"5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:0887"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS:thunderbird-0:1.5.0.12-39.el4.i386",
"4AS:thunderbird-0:1.5.0.12-39.el4.ia64",
"4AS:thunderbird-0:1.5.0.12-39.el4.ppc",
"4AS:thunderbird-0:1.5.0.12-39.el4.s390",
"4AS:thunderbird-0:1.5.0.12-39.el4.s390x",
"4AS:thunderbird-0:1.5.0.12-39.el4.src",
"4AS:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.i386",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.ia64",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.ppc",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.s390",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.s390x",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.src",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"4ES:thunderbird-0:1.5.0.12-39.el4.i386",
"4ES:thunderbird-0:1.5.0.12-39.el4.ia64",
"4ES:thunderbird-0:1.5.0.12-39.el4.ppc",
"4ES:thunderbird-0:1.5.0.12-39.el4.s390",
"4ES:thunderbird-0:1.5.0.12-39.el4.s390x",
"4ES:thunderbird-0:1.5.0.12-39.el4.src",
"4ES:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"4WS:thunderbird-0:1.5.0.12-39.el4.i386",
"4WS:thunderbird-0:1.5.0.12-39.el4.ia64",
"4WS:thunderbird-0:1.5.0.12-39.el4.ppc",
"4WS:thunderbird-0:1.5.0.12-39.el4.s390",
"4WS:thunderbird-0:1.5.0.12-39.el4.s390x",
"4WS:thunderbird-0:1.5.0.12-39.el4.src",
"4WS:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"5Client:thunderbird-0:2.0.0.24-18.el5_6.i386",
"5Client:thunderbird-0:2.0.0.24-18.el5_6.src",
"5Client:thunderbird-0:2.0.0.24-18.el5_6.x86_64",
"5Client:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.i386",
"5Client:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.x86_64",
"5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.i386",
"5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.src",
"5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.x86_64",
"5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.i386",
"5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "Mozilla Integer overflow and arbitrary code execution (MFSA 2011-22)"
},
{
"cve": "CVE-2011-2373",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2011-06-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "714577"
}
],
"notes": [
{
"category": "description",
"text": "Use-after-free vulnerability in Mozilla Firefox before 3.6.18 and 4.x through 4.0.1, Thunderbird before 3.1.11, and SeaMonkey through 2.0.14, when JavaScript is disabled, allows remote attackers to execute arbitrary code via a crafted XUL document.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Mozilla Use-after-free vulnerability when viewing XUL document with script disabled (MFSA 2011-20)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS:thunderbird-0:1.5.0.12-39.el4.i386",
"4AS:thunderbird-0:1.5.0.12-39.el4.ia64",
"4AS:thunderbird-0:1.5.0.12-39.el4.ppc",
"4AS:thunderbird-0:1.5.0.12-39.el4.s390",
"4AS:thunderbird-0:1.5.0.12-39.el4.s390x",
"4AS:thunderbird-0:1.5.0.12-39.el4.src",
"4AS:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.i386",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.ia64",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.ppc",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.s390",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.s390x",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.src",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"4ES:thunderbird-0:1.5.0.12-39.el4.i386",
"4ES:thunderbird-0:1.5.0.12-39.el4.ia64",
"4ES:thunderbird-0:1.5.0.12-39.el4.ppc",
"4ES:thunderbird-0:1.5.0.12-39.el4.s390",
"4ES:thunderbird-0:1.5.0.12-39.el4.s390x",
"4ES:thunderbird-0:1.5.0.12-39.el4.src",
"4ES:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"4WS:thunderbird-0:1.5.0.12-39.el4.i386",
"4WS:thunderbird-0:1.5.0.12-39.el4.ia64",
"4WS:thunderbird-0:1.5.0.12-39.el4.ppc",
"4WS:thunderbird-0:1.5.0.12-39.el4.s390",
"4WS:thunderbird-0:1.5.0.12-39.el4.s390x",
"4WS:thunderbird-0:1.5.0.12-39.el4.src",
"4WS:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"5Client:thunderbird-0:2.0.0.24-18.el5_6.i386",
"5Client:thunderbird-0:2.0.0.24-18.el5_6.src",
"5Client:thunderbird-0:2.0.0.24-18.el5_6.x86_64",
"5Client:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.i386",
"5Client:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.x86_64",
"5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.i386",
"5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.src",
"5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.x86_64",
"5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.i386",
"5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-2373"
},
{
"category": "external",
"summary": "RHBZ#714577",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=714577"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-2373",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2373"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-2373",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-2373"
}
],
"release_date": "2011-06-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-06-21T22:25:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"4AS:thunderbird-0:1.5.0.12-39.el4.i386",
"4AS:thunderbird-0:1.5.0.12-39.el4.ia64",
"4AS:thunderbird-0:1.5.0.12-39.el4.ppc",
"4AS:thunderbird-0:1.5.0.12-39.el4.s390",
"4AS:thunderbird-0:1.5.0.12-39.el4.s390x",
"4AS:thunderbird-0:1.5.0.12-39.el4.src",
"4AS:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.i386",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.ia64",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.ppc",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.s390",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.s390x",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.src",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"4ES:thunderbird-0:1.5.0.12-39.el4.i386",
"4ES:thunderbird-0:1.5.0.12-39.el4.ia64",
"4ES:thunderbird-0:1.5.0.12-39.el4.ppc",
"4ES:thunderbird-0:1.5.0.12-39.el4.s390",
"4ES:thunderbird-0:1.5.0.12-39.el4.s390x",
"4ES:thunderbird-0:1.5.0.12-39.el4.src",
"4ES:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"4WS:thunderbird-0:1.5.0.12-39.el4.i386",
"4WS:thunderbird-0:1.5.0.12-39.el4.ia64",
"4WS:thunderbird-0:1.5.0.12-39.el4.ppc",
"4WS:thunderbird-0:1.5.0.12-39.el4.s390",
"4WS:thunderbird-0:1.5.0.12-39.el4.s390x",
"4WS:thunderbird-0:1.5.0.12-39.el4.src",
"4WS:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"5Client:thunderbird-0:2.0.0.24-18.el5_6.i386",
"5Client:thunderbird-0:2.0.0.24-18.el5_6.src",
"5Client:thunderbird-0:2.0.0.24-18.el5_6.x86_64",
"5Client:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.i386",
"5Client:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.x86_64",
"5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.i386",
"5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.src",
"5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.x86_64",
"5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.i386",
"5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:0887"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS:thunderbird-0:1.5.0.12-39.el4.i386",
"4AS:thunderbird-0:1.5.0.12-39.el4.ia64",
"4AS:thunderbird-0:1.5.0.12-39.el4.ppc",
"4AS:thunderbird-0:1.5.0.12-39.el4.s390",
"4AS:thunderbird-0:1.5.0.12-39.el4.s390x",
"4AS:thunderbird-0:1.5.0.12-39.el4.src",
"4AS:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.i386",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.ia64",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.ppc",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.s390",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.s390x",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.src",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"4ES:thunderbird-0:1.5.0.12-39.el4.i386",
"4ES:thunderbird-0:1.5.0.12-39.el4.ia64",
"4ES:thunderbird-0:1.5.0.12-39.el4.ppc",
"4ES:thunderbird-0:1.5.0.12-39.el4.s390",
"4ES:thunderbird-0:1.5.0.12-39.el4.s390x",
"4ES:thunderbird-0:1.5.0.12-39.el4.src",
"4ES:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"4WS:thunderbird-0:1.5.0.12-39.el4.i386",
"4WS:thunderbird-0:1.5.0.12-39.el4.ia64",
"4WS:thunderbird-0:1.5.0.12-39.el4.ppc",
"4WS:thunderbird-0:1.5.0.12-39.el4.s390",
"4WS:thunderbird-0:1.5.0.12-39.el4.s390x",
"4WS:thunderbird-0:1.5.0.12-39.el4.src",
"4WS:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"5Client:thunderbird-0:2.0.0.24-18.el5_6.i386",
"5Client:thunderbird-0:2.0.0.24-18.el5_6.src",
"5Client:thunderbird-0:2.0.0.24-18.el5_6.x86_64",
"5Client:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.i386",
"5Client:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.x86_64",
"5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.i386",
"5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.src",
"5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.x86_64",
"5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.i386",
"5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "Mozilla Use-after-free vulnerability when viewing XUL document with script disabled (MFSA 2011-20)"
},
{
"cve": "CVE-2011-2374",
"discovery_date": "2011-06-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "714576"
}
],
"notes": [
{
"category": "description",
"text": "Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 3.6.18 and 4.x through 4.0.1, and Thunderbird before 3.1.11, allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Mozilla Miscellaneous memory safety hazards (MFSA 2011-19)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS:thunderbird-0:1.5.0.12-39.el4.i386",
"4AS:thunderbird-0:1.5.0.12-39.el4.ia64",
"4AS:thunderbird-0:1.5.0.12-39.el4.ppc",
"4AS:thunderbird-0:1.5.0.12-39.el4.s390",
"4AS:thunderbird-0:1.5.0.12-39.el4.s390x",
"4AS:thunderbird-0:1.5.0.12-39.el4.src",
"4AS:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.i386",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.ia64",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.ppc",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.s390",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.s390x",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.src",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"4ES:thunderbird-0:1.5.0.12-39.el4.i386",
"4ES:thunderbird-0:1.5.0.12-39.el4.ia64",
"4ES:thunderbird-0:1.5.0.12-39.el4.ppc",
"4ES:thunderbird-0:1.5.0.12-39.el4.s390",
"4ES:thunderbird-0:1.5.0.12-39.el4.s390x",
"4ES:thunderbird-0:1.5.0.12-39.el4.src",
"4ES:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"4WS:thunderbird-0:1.5.0.12-39.el4.i386",
"4WS:thunderbird-0:1.5.0.12-39.el4.ia64",
"4WS:thunderbird-0:1.5.0.12-39.el4.ppc",
"4WS:thunderbird-0:1.5.0.12-39.el4.s390",
"4WS:thunderbird-0:1.5.0.12-39.el4.s390x",
"4WS:thunderbird-0:1.5.0.12-39.el4.src",
"4WS:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"5Client:thunderbird-0:2.0.0.24-18.el5_6.i386",
"5Client:thunderbird-0:2.0.0.24-18.el5_6.src",
"5Client:thunderbird-0:2.0.0.24-18.el5_6.x86_64",
"5Client:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.i386",
"5Client:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.x86_64",
"5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.i386",
"5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.src",
"5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.x86_64",
"5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.i386",
"5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-2374"
},
{
"category": "external",
"summary": "RHBZ#714576",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=714576"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-2374",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2374"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-2374",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-2374"
}
],
"release_date": "2011-06-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-06-21T22:25:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"4AS:thunderbird-0:1.5.0.12-39.el4.i386",
"4AS:thunderbird-0:1.5.0.12-39.el4.ia64",
"4AS:thunderbird-0:1.5.0.12-39.el4.ppc",
"4AS:thunderbird-0:1.5.0.12-39.el4.s390",
"4AS:thunderbird-0:1.5.0.12-39.el4.s390x",
"4AS:thunderbird-0:1.5.0.12-39.el4.src",
"4AS:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.i386",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.ia64",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.ppc",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.s390",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.s390x",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.src",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"4ES:thunderbird-0:1.5.0.12-39.el4.i386",
"4ES:thunderbird-0:1.5.0.12-39.el4.ia64",
"4ES:thunderbird-0:1.5.0.12-39.el4.ppc",
"4ES:thunderbird-0:1.5.0.12-39.el4.s390",
"4ES:thunderbird-0:1.5.0.12-39.el4.s390x",
"4ES:thunderbird-0:1.5.0.12-39.el4.src",
"4ES:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"4WS:thunderbird-0:1.5.0.12-39.el4.i386",
"4WS:thunderbird-0:1.5.0.12-39.el4.ia64",
"4WS:thunderbird-0:1.5.0.12-39.el4.ppc",
"4WS:thunderbird-0:1.5.0.12-39.el4.s390",
"4WS:thunderbird-0:1.5.0.12-39.el4.s390x",
"4WS:thunderbird-0:1.5.0.12-39.el4.src",
"4WS:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"5Client:thunderbird-0:2.0.0.24-18.el5_6.i386",
"5Client:thunderbird-0:2.0.0.24-18.el5_6.src",
"5Client:thunderbird-0:2.0.0.24-18.el5_6.x86_64",
"5Client:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.i386",
"5Client:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.x86_64",
"5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.i386",
"5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.src",
"5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.x86_64",
"5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.i386",
"5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:0887"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS:thunderbird-0:1.5.0.12-39.el4.i386",
"4AS:thunderbird-0:1.5.0.12-39.el4.ia64",
"4AS:thunderbird-0:1.5.0.12-39.el4.ppc",
"4AS:thunderbird-0:1.5.0.12-39.el4.s390",
"4AS:thunderbird-0:1.5.0.12-39.el4.s390x",
"4AS:thunderbird-0:1.5.0.12-39.el4.src",
"4AS:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.i386",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.ia64",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.ppc",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.s390",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.s390x",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.src",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"4ES:thunderbird-0:1.5.0.12-39.el4.i386",
"4ES:thunderbird-0:1.5.0.12-39.el4.ia64",
"4ES:thunderbird-0:1.5.0.12-39.el4.ppc",
"4ES:thunderbird-0:1.5.0.12-39.el4.s390",
"4ES:thunderbird-0:1.5.0.12-39.el4.s390x",
"4ES:thunderbird-0:1.5.0.12-39.el4.src",
"4ES:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"4WS:thunderbird-0:1.5.0.12-39.el4.i386",
"4WS:thunderbird-0:1.5.0.12-39.el4.ia64",
"4WS:thunderbird-0:1.5.0.12-39.el4.ppc",
"4WS:thunderbird-0:1.5.0.12-39.el4.s390",
"4WS:thunderbird-0:1.5.0.12-39.el4.s390x",
"4WS:thunderbird-0:1.5.0.12-39.el4.src",
"4WS:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"5Client:thunderbird-0:2.0.0.24-18.el5_6.i386",
"5Client:thunderbird-0:2.0.0.24-18.el5_6.src",
"5Client:thunderbird-0:2.0.0.24-18.el5_6.x86_64",
"5Client:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.i386",
"5Client:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.x86_64",
"5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.i386",
"5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.src",
"5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.x86_64",
"5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.i386",
"5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "Mozilla Miscellaneous memory safety hazards (MFSA 2011-19)"
},
{
"cve": "CVE-2011-2375",
"discovery_date": "2011-06-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "714576"
}
],
"notes": [
{
"category": "description",
"text": "Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 5.0 and Thunderbird through 3.1.11 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Mozilla Miscellaneous memory safety hazards (MFSA 2011-19)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS:thunderbird-0:1.5.0.12-39.el4.i386",
"4AS:thunderbird-0:1.5.0.12-39.el4.ia64",
"4AS:thunderbird-0:1.5.0.12-39.el4.ppc",
"4AS:thunderbird-0:1.5.0.12-39.el4.s390",
"4AS:thunderbird-0:1.5.0.12-39.el4.s390x",
"4AS:thunderbird-0:1.5.0.12-39.el4.src",
"4AS:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.i386",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.ia64",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.ppc",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.s390",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.s390x",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.src",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"4ES:thunderbird-0:1.5.0.12-39.el4.i386",
"4ES:thunderbird-0:1.5.0.12-39.el4.ia64",
"4ES:thunderbird-0:1.5.0.12-39.el4.ppc",
"4ES:thunderbird-0:1.5.0.12-39.el4.s390",
"4ES:thunderbird-0:1.5.0.12-39.el4.s390x",
"4ES:thunderbird-0:1.5.0.12-39.el4.src",
"4ES:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"4WS:thunderbird-0:1.5.0.12-39.el4.i386",
"4WS:thunderbird-0:1.5.0.12-39.el4.ia64",
"4WS:thunderbird-0:1.5.0.12-39.el4.ppc",
"4WS:thunderbird-0:1.5.0.12-39.el4.s390",
"4WS:thunderbird-0:1.5.0.12-39.el4.s390x",
"4WS:thunderbird-0:1.5.0.12-39.el4.src",
"4WS:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"5Client:thunderbird-0:2.0.0.24-18.el5_6.i386",
"5Client:thunderbird-0:2.0.0.24-18.el5_6.src",
"5Client:thunderbird-0:2.0.0.24-18.el5_6.x86_64",
"5Client:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.i386",
"5Client:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.x86_64",
"5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.i386",
"5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.src",
"5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.x86_64",
"5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.i386",
"5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-2375"
},
{
"category": "external",
"summary": "RHBZ#714576",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=714576"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-2375",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2375"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-2375",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-2375"
}
],
"release_date": "2011-06-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-06-21T22:25:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"4AS:thunderbird-0:1.5.0.12-39.el4.i386",
"4AS:thunderbird-0:1.5.0.12-39.el4.ia64",
"4AS:thunderbird-0:1.5.0.12-39.el4.ppc",
"4AS:thunderbird-0:1.5.0.12-39.el4.s390",
"4AS:thunderbird-0:1.5.0.12-39.el4.s390x",
"4AS:thunderbird-0:1.5.0.12-39.el4.src",
"4AS:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.i386",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.ia64",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.ppc",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.s390",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.s390x",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.src",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"4ES:thunderbird-0:1.5.0.12-39.el4.i386",
"4ES:thunderbird-0:1.5.0.12-39.el4.ia64",
"4ES:thunderbird-0:1.5.0.12-39.el4.ppc",
"4ES:thunderbird-0:1.5.0.12-39.el4.s390",
"4ES:thunderbird-0:1.5.0.12-39.el4.s390x",
"4ES:thunderbird-0:1.5.0.12-39.el4.src",
"4ES:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"4WS:thunderbird-0:1.5.0.12-39.el4.i386",
"4WS:thunderbird-0:1.5.0.12-39.el4.ia64",
"4WS:thunderbird-0:1.5.0.12-39.el4.ppc",
"4WS:thunderbird-0:1.5.0.12-39.el4.s390",
"4WS:thunderbird-0:1.5.0.12-39.el4.s390x",
"4WS:thunderbird-0:1.5.0.12-39.el4.src",
"4WS:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"5Client:thunderbird-0:2.0.0.24-18.el5_6.i386",
"5Client:thunderbird-0:2.0.0.24-18.el5_6.src",
"5Client:thunderbird-0:2.0.0.24-18.el5_6.x86_64",
"5Client:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.i386",
"5Client:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.x86_64",
"5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.i386",
"5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.src",
"5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.x86_64",
"5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.i386",
"5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:0887"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS:thunderbird-0:1.5.0.12-39.el4.i386",
"4AS:thunderbird-0:1.5.0.12-39.el4.ia64",
"4AS:thunderbird-0:1.5.0.12-39.el4.ppc",
"4AS:thunderbird-0:1.5.0.12-39.el4.s390",
"4AS:thunderbird-0:1.5.0.12-39.el4.s390x",
"4AS:thunderbird-0:1.5.0.12-39.el4.src",
"4AS:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.i386",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.ia64",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.ppc",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.s390",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.s390x",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.src",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"4ES:thunderbird-0:1.5.0.12-39.el4.i386",
"4ES:thunderbird-0:1.5.0.12-39.el4.ia64",
"4ES:thunderbird-0:1.5.0.12-39.el4.ppc",
"4ES:thunderbird-0:1.5.0.12-39.el4.s390",
"4ES:thunderbird-0:1.5.0.12-39.el4.s390x",
"4ES:thunderbird-0:1.5.0.12-39.el4.src",
"4ES:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"4WS:thunderbird-0:1.5.0.12-39.el4.i386",
"4WS:thunderbird-0:1.5.0.12-39.el4.ia64",
"4WS:thunderbird-0:1.5.0.12-39.el4.ppc",
"4WS:thunderbird-0:1.5.0.12-39.el4.s390",
"4WS:thunderbird-0:1.5.0.12-39.el4.s390x",
"4WS:thunderbird-0:1.5.0.12-39.el4.src",
"4WS:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"5Client:thunderbird-0:2.0.0.24-18.el5_6.i386",
"5Client:thunderbird-0:2.0.0.24-18.el5_6.src",
"5Client:thunderbird-0:2.0.0.24-18.el5_6.x86_64",
"5Client:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.i386",
"5Client:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.x86_64",
"5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.i386",
"5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.src",
"5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.x86_64",
"5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.i386",
"5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "Mozilla Miscellaneous memory safety hazards (MFSA 2011-19)"
},
{
"cve": "CVE-2011-2376",
"discovery_date": "2011-06-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "714576"
}
],
"notes": [
{
"category": "description",
"text": "Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 3.6.18 and Thunderbird before 3.1.11 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Mozilla Miscellaneous memory safety hazards (MFSA 2011-19)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS:thunderbird-0:1.5.0.12-39.el4.i386",
"4AS:thunderbird-0:1.5.0.12-39.el4.ia64",
"4AS:thunderbird-0:1.5.0.12-39.el4.ppc",
"4AS:thunderbird-0:1.5.0.12-39.el4.s390",
"4AS:thunderbird-0:1.5.0.12-39.el4.s390x",
"4AS:thunderbird-0:1.5.0.12-39.el4.src",
"4AS:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.i386",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.ia64",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.ppc",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.s390",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.s390x",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.src",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"4ES:thunderbird-0:1.5.0.12-39.el4.i386",
"4ES:thunderbird-0:1.5.0.12-39.el4.ia64",
"4ES:thunderbird-0:1.5.0.12-39.el4.ppc",
"4ES:thunderbird-0:1.5.0.12-39.el4.s390",
"4ES:thunderbird-0:1.5.0.12-39.el4.s390x",
"4ES:thunderbird-0:1.5.0.12-39.el4.src",
"4ES:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"4WS:thunderbird-0:1.5.0.12-39.el4.i386",
"4WS:thunderbird-0:1.5.0.12-39.el4.ia64",
"4WS:thunderbird-0:1.5.0.12-39.el4.ppc",
"4WS:thunderbird-0:1.5.0.12-39.el4.s390",
"4WS:thunderbird-0:1.5.0.12-39.el4.s390x",
"4WS:thunderbird-0:1.5.0.12-39.el4.src",
"4WS:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"5Client:thunderbird-0:2.0.0.24-18.el5_6.i386",
"5Client:thunderbird-0:2.0.0.24-18.el5_6.src",
"5Client:thunderbird-0:2.0.0.24-18.el5_6.x86_64",
"5Client:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.i386",
"5Client:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.x86_64",
"5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.i386",
"5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.src",
"5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.x86_64",
"5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.i386",
"5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-2376"
},
{
"category": "external",
"summary": "RHBZ#714576",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=714576"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-2376",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2376"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-2376",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-2376"
}
],
"release_date": "2011-06-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-06-21T22:25:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"4AS:thunderbird-0:1.5.0.12-39.el4.i386",
"4AS:thunderbird-0:1.5.0.12-39.el4.ia64",
"4AS:thunderbird-0:1.5.0.12-39.el4.ppc",
"4AS:thunderbird-0:1.5.0.12-39.el4.s390",
"4AS:thunderbird-0:1.5.0.12-39.el4.s390x",
"4AS:thunderbird-0:1.5.0.12-39.el4.src",
"4AS:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.i386",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.ia64",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.ppc",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.s390",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.s390x",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.src",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"4ES:thunderbird-0:1.5.0.12-39.el4.i386",
"4ES:thunderbird-0:1.5.0.12-39.el4.ia64",
"4ES:thunderbird-0:1.5.0.12-39.el4.ppc",
"4ES:thunderbird-0:1.5.0.12-39.el4.s390",
"4ES:thunderbird-0:1.5.0.12-39.el4.s390x",
"4ES:thunderbird-0:1.5.0.12-39.el4.src",
"4ES:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"4WS:thunderbird-0:1.5.0.12-39.el4.i386",
"4WS:thunderbird-0:1.5.0.12-39.el4.ia64",
"4WS:thunderbird-0:1.5.0.12-39.el4.ppc",
"4WS:thunderbird-0:1.5.0.12-39.el4.s390",
"4WS:thunderbird-0:1.5.0.12-39.el4.s390x",
"4WS:thunderbird-0:1.5.0.12-39.el4.src",
"4WS:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"5Client:thunderbird-0:2.0.0.24-18.el5_6.i386",
"5Client:thunderbird-0:2.0.0.24-18.el5_6.src",
"5Client:thunderbird-0:2.0.0.24-18.el5_6.x86_64",
"5Client:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.i386",
"5Client:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.x86_64",
"5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.i386",
"5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.src",
"5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.x86_64",
"5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.i386",
"5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:0887"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS:thunderbird-0:1.5.0.12-39.el4.i386",
"4AS:thunderbird-0:1.5.0.12-39.el4.ia64",
"4AS:thunderbird-0:1.5.0.12-39.el4.ppc",
"4AS:thunderbird-0:1.5.0.12-39.el4.s390",
"4AS:thunderbird-0:1.5.0.12-39.el4.s390x",
"4AS:thunderbird-0:1.5.0.12-39.el4.src",
"4AS:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.i386",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.ia64",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.ppc",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.s390",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.s390x",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.src",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"4ES:thunderbird-0:1.5.0.12-39.el4.i386",
"4ES:thunderbird-0:1.5.0.12-39.el4.ia64",
"4ES:thunderbird-0:1.5.0.12-39.el4.ppc",
"4ES:thunderbird-0:1.5.0.12-39.el4.s390",
"4ES:thunderbird-0:1.5.0.12-39.el4.s390x",
"4ES:thunderbird-0:1.5.0.12-39.el4.src",
"4ES:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"4WS:thunderbird-0:1.5.0.12-39.el4.i386",
"4WS:thunderbird-0:1.5.0.12-39.el4.ia64",
"4WS:thunderbird-0:1.5.0.12-39.el4.ppc",
"4WS:thunderbird-0:1.5.0.12-39.el4.s390",
"4WS:thunderbird-0:1.5.0.12-39.el4.s390x",
"4WS:thunderbird-0:1.5.0.12-39.el4.src",
"4WS:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"5Client:thunderbird-0:2.0.0.24-18.el5_6.i386",
"5Client:thunderbird-0:2.0.0.24-18.el5_6.src",
"5Client:thunderbird-0:2.0.0.24-18.el5_6.x86_64",
"5Client:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.i386",
"5Client:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.x86_64",
"5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.i386",
"5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.src",
"5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.x86_64",
"5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.i386",
"5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "Mozilla Miscellaneous memory safety hazards (MFSA 2011-19)"
},
{
"cve": "CVE-2011-2377",
"discovery_date": "2011-06-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "714929"
}
],
"notes": [
{
"category": "description",
"text": "Mozilla Firefox before 3.6.18 and 4.x through 4.0.1, Thunderbird before 3.1.11, and SeaMonkey through 2.0.14 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via a multipart/x-mixed-replace image.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Mozilla Crash caused by corrupted JPEG image (MFSA 2011-21)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS:thunderbird-0:1.5.0.12-39.el4.i386",
"4AS:thunderbird-0:1.5.0.12-39.el4.ia64",
"4AS:thunderbird-0:1.5.0.12-39.el4.ppc",
"4AS:thunderbird-0:1.5.0.12-39.el4.s390",
"4AS:thunderbird-0:1.5.0.12-39.el4.s390x",
"4AS:thunderbird-0:1.5.0.12-39.el4.src",
"4AS:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.i386",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.ia64",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.ppc",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.s390",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.s390x",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.src",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"4ES:thunderbird-0:1.5.0.12-39.el4.i386",
"4ES:thunderbird-0:1.5.0.12-39.el4.ia64",
"4ES:thunderbird-0:1.5.0.12-39.el4.ppc",
"4ES:thunderbird-0:1.5.0.12-39.el4.s390",
"4ES:thunderbird-0:1.5.0.12-39.el4.s390x",
"4ES:thunderbird-0:1.5.0.12-39.el4.src",
"4ES:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"4WS:thunderbird-0:1.5.0.12-39.el4.i386",
"4WS:thunderbird-0:1.5.0.12-39.el4.ia64",
"4WS:thunderbird-0:1.5.0.12-39.el4.ppc",
"4WS:thunderbird-0:1.5.0.12-39.el4.s390",
"4WS:thunderbird-0:1.5.0.12-39.el4.s390x",
"4WS:thunderbird-0:1.5.0.12-39.el4.src",
"4WS:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"5Client:thunderbird-0:2.0.0.24-18.el5_6.i386",
"5Client:thunderbird-0:2.0.0.24-18.el5_6.src",
"5Client:thunderbird-0:2.0.0.24-18.el5_6.x86_64",
"5Client:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.i386",
"5Client:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.x86_64",
"5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.i386",
"5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.src",
"5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.x86_64",
"5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.i386",
"5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-2377"
},
{
"category": "external",
"summary": "RHBZ#714929",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=714929"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-2377",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2377"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-2377",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-2377"
}
],
"release_date": "2011-06-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-06-21T22:25:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"4AS:thunderbird-0:1.5.0.12-39.el4.i386",
"4AS:thunderbird-0:1.5.0.12-39.el4.ia64",
"4AS:thunderbird-0:1.5.0.12-39.el4.ppc",
"4AS:thunderbird-0:1.5.0.12-39.el4.s390",
"4AS:thunderbird-0:1.5.0.12-39.el4.s390x",
"4AS:thunderbird-0:1.5.0.12-39.el4.src",
"4AS:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.i386",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.ia64",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.ppc",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.s390",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.s390x",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.src",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"4ES:thunderbird-0:1.5.0.12-39.el4.i386",
"4ES:thunderbird-0:1.5.0.12-39.el4.ia64",
"4ES:thunderbird-0:1.5.0.12-39.el4.ppc",
"4ES:thunderbird-0:1.5.0.12-39.el4.s390",
"4ES:thunderbird-0:1.5.0.12-39.el4.s390x",
"4ES:thunderbird-0:1.5.0.12-39.el4.src",
"4ES:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"4WS:thunderbird-0:1.5.0.12-39.el4.i386",
"4WS:thunderbird-0:1.5.0.12-39.el4.ia64",
"4WS:thunderbird-0:1.5.0.12-39.el4.ppc",
"4WS:thunderbird-0:1.5.0.12-39.el4.s390",
"4WS:thunderbird-0:1.5.0.12-39.el4.s390x",
"4WS:thunderbird-0:1.5.0.12-39.el4.src",
"4WS:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"5Client:thunderbird-0:2.0.0.24-18.el5_6.i386",
"5Client:thunderbird-0:2.0.0.24-18.el5_6.src",
"5Client:thunderbird-0:2.0.0.24-18.el5_6.x86_64",
"5Client:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.i386",
"5Client:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.x86_64",
"5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.i386",
"5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.src",
"5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.x86_64",
"5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.i386",
"5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:0887"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS:thunderbird-0:1.5.0.12-39.el4.i386",
"4AS:thunderbird-0:1.5.0.12-39.el4.ia64",
"4AS:thunderbird-0:1.5.0.12-39.el4.ppc",
"4AS:thunderbird-0:1.5.0.12-39.el4.s390",
"4AS:thunderbird-0:1.5.0.12-39.el4.s390x",
"4AS:thunderbird-0:1.5.0.12-39.el4.src",
"4AS:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.i386",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.ia64",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.ppc",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.s390",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.s390x",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.src",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"4ES:thunderbird-0:1.5.0.12-39.el4.i386",
"4ES:thunderbird-0:1.5.0.12-39.el4.ia64",
"4ES:thunderbird-0:1.5.0.12-39.el4.ppc",
"4ES:thunderbird-0:1.5.0.12-39.el4.s390",
"4ES:thunderbird-0:1.5.0.12-39.el4.s390x",
"4ES:thunderbird-0:1.5.0.12-39.el4.src",
"4ES:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"4WS:thunderbird-0:1.5.0.12-39.el4.i386",
"4WS:thunderbird-0:1.5.0.12-39.el4.ia64",
"4WS:thunderbird-0:1.5.0.12-39.el4.ppc",
"4WS:thunderbird-0:1.5.0.12-39.el4.s390",
"4WS:thunderbird-0:1.5.0.12-39.el4.s390x",
"4WS:thunderbird-0:1.5.0.12-39.el4.src",
"4WS:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"5Client:thunderbird-0:2.0.0.24-18.el5_6.i386",
"5Client:thunderbird-0:2.0.0.24-18.el5_6.src",
"5Client:thunderbird-0:2.0.0.24-18.el5_6.x86_64",
"5Client:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.i386",
"5Client:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.x86_64",
"5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.i386",
"5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.src",
"5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.x86_64",
"5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.i386",
"5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "Mozilla Crash caused by corrupted JPEG image (MFSA 2011-21)"
},
{
"cve": "CVE-2011-2605",
"discovery_date": "2011-06-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "714576"
}
],
"notes": [
{
"category": "description",
"text": "CRLF injection vulnerability in the nsCookieService::SetCookieStringInternal function in netwerk/cookie/nsCookieService.cpp in Mozilla Firefox before 3.6.18 and 4.x through 4.0.1, and Thunderbird before 3.1.11, allows remote attackers to bypass intended access restrictions via a string containing a \\n (newline) character, which is not properly handled in a JavaScript \"document.cookie =\" expression, a different vulnerability than CVE-2011-2374.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Mozilla Miscellaneous memory safety hazards (MFSA 2011-19)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS:thunderbird-0:1.5.0.12-39.el4.i386",
"4AS:thunderbird-0:1.5.0.12-39.el4.ia64",
"4AS:thunderbird-0:1.5.0.12-39.el4.ppc",
"4AS:thunderbird-0:1.5.0.12-39.el4.s390",
"4AS:thunderbird-0:1.5.0.12-39.el4.s390x",
"4AS:thunderbird-0:1.5.0.12-39.el4.src",
"4AS:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.i386",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.ia64",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.ppc",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.s390",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.s390x",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.src",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"4ES:thunderbird-0:1.5.0.12-39.el4.i386",
"4ES:thunderbird-0:1.5.0.12-39.el4.ia64",
"4ES:thunderbird-0:1.5.0.12-39.el4.ppc",
"4ES:thunderbird-0:1.5.0.12-39.el4.s390",
"4ES:thunderbird-0:1.5.0.12-39.el4.s390x",
"4ES:thunderbird-0:1.5.0.12-39.el4.src",
"4ES:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"4WS:thunderbird-0:1.5.0.12-39.el4.i386",
"4WS:thunderbird-0:1.5.0.12-39.el4.ia64",
"4WS:thunderbird-0:1.5.0.12-39.el4.ppc",
"4WS:thunderbird-0:1.5.0.12-39.el4.s390",
"4WS:thunderbird-0:1.5.0.12-39.el4.s390x",
"4WS:thunderbird-0:1.5.0.12-39.el4.src",
"4WS:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"5Client:thunderbird-0:2.0.0.24-18.el5_6.i386",
"5Client:thunderbird-0:2.0.0.24-18.el5_6.src",
"5Client:thunderbird-0:2.0.0.24-18.el5_6.x86_64",
"5Client:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.i386",
"5Client:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.x86_64",
"5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.i386",
"5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.src",
"5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.x86_64",
"5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.i386",
"5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-2605"
},
{
"category": "external",
"summary": "RHBZ#714576",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=714576"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-2605",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2605"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-2605",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-2605"
}
],
"release_date": "2011-06-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-06-21T22:25:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"4AS:thunderbird-0:1.5.0.12-39.el4.i386",
"4AS:thunderbird-0:1.5.0.12-39.el4.ia64",
"4AS:thunderbird-0:1.5.0.12-39.el4.ppc",
"4AS:thunderbird-0:1.5.0.12-39.el4.s390",
"4AS:thunderbird-0:1.5.0.12-39.el4.s390x",
"4AS:thunderbird-0:1.5.0.12-39.el4.src",
"4AS:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.i386",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.ia64",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.ppc",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.s390",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.s390x",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.src",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"4ES:thunderbird-0:1.5.0.12-39.el4.i386",
"4ES:thunderbird-0:1.5.0.12-39.el4.ia64",
"4ES:thunderbird-0:1.5.0.12-39.el4.ppc",
"4ES:thunderbird-0:1.5.0.12-39.el4.s390",
"4ES:thunderbird-0:1.5.0.12-39.el4.s390x",
"4ES:thunderbird-0:1.5.0.12-39.el4.src",
"4ES:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"4WS:thunderbird-0:1.5.0.12-39.el4.i386",
"4WS:thunderbird-0:1.5.0.12-39.el4.ia64",
"4WS:thunderbird-0:1.5.0.12-39.el4.ppc",
"4WS:thunderbird-0:1.5.0.12-39.el4.s390",
"4WS:thunderbird-0:1.5.0.12-39.el4.s390x",
"4WS:thunderbird-0:1.5.0.12-39.el4.src",
"4WS:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"5Client:thunderbird-0:2.0.0.24-18.el5_6.i386",
"5Client:thunderbird-0:2.0.0.24-18.el5_6.src",
"5Client:thunderbird-0:2.0.0.24-18.el5_6.x86_64",
"5Client:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.i386",
"5Client:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.x86_64",
"5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.i386",
"5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.src",
"5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.x86_64",
"5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.i386",
"5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:0887"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS:thunderbird-0:1.5.0.12-39.el4.i386",
"4AS:thunderbird-0:1.5.0.12-39.el4.ia64",
"4AS:thunderbird-0:1.5.0.12-39.el4.ppc",
"4AS:thunderbird-0:1.5.0.12-39.el4.s390",
"4AS:thunderbird-0:1.5.0.12-39.el4.s390x",
"4AS:thunderbird-0:1.5.0.12-39.el4.src",
"4AS:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4AS:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.i386",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.ia64",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.ppc",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.s390",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.s390x",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.src",
"4Desktop:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"4ES:thunderbird-0:1.5.0.12-39.el4.i386",
"4ES:thunderbird-0:1.5.0.12-39.el4.ia64",
"4ES:thunderbird-0:1.5.0.12-39.el4.ppc",
"4ES:thunderbird-0:1.5.0.12-39.el4.s390",
"4ES:thunderbird-0:1.5.0.12-39.el4.s390x",
"4ES:thunderbird-0:1.5.0.12-39.el4.src",
"4ES:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4ES:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"4WS:thunderbird-0:1.5.0.12-39.el4.i386",
"4WS:thunderbird-0:1.5.0.12-39.el4.ia64",
"4WS:thunderbird-0:1.5.0.12-39.el4.ppc",
"4WS:thunderbird-0:1.5.0.12-39.el4.s390",
"4WS:thunderbird-0:1.5.0.12-39.el4.s390x",
"4WS:thunderbird-0:1.5.0.12-39.el4.src",
"4WS:thunderbird-0:1.5.0.12-39.el4.x86_64",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.i386",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ia64",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.ppc",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.s390x",
"4WS:thunderbird-debuginfo-0:1.5.0.12-39.el4.x86_64",
"5Client:thunderbird-0:2.0.0.24-18.el5_6.i386",
"5Client:thunderbird-0:2.0.0.24-18.el5_6.src",
"5Client:thunderbird-0:2.0.0.24-18.el5_6.x86_64",
"5Client:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.i386",
"5Client:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.x86_64",
"5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.i386",
"5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.src",
"5Server-DPAS:thunderbird-0:2.0.0.24-18.el5_6.x86_64",
"5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.i386",
"5Server-DPAS:thunderbird-debuginfo-0:2.0.0.24-18.el5_6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "Mozilla Miscellaneous memory safety hazards (MFSA 2011-19)"
}
]
}
FKIE_CVE-2011-2605
Vulnerability from fkie_nvd - Published: 2011-06-30 16:55 - Updated: 2026-04-29 01:13{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9477355B-F98C-42FF-A2A6-C596DF2CE690",
"versionEndIncluding": "3.6.17",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "5A545A77-2198-4685-A87F-E0F2DAECECF6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:1.0:preview_release:*:*:*:*:*:*",
"matchCriteriaId": "438AACF8-006F-4522-853F-30DBBABD8C15",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:1.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "778FAE0C-A5CF-4B67-93A9-1A803E3E699F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:1.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "E7447185-7509-449D-8907-F30A42CF7EB5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:1.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "0EDBAC37-9D08-44D1-B279-BC6ACF126CAF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:1.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "3FFF89FA-2020-43CC-BACD-D66117B3DD26",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:1.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "834BB391-5EB5-43A8-980A-D305EDAE6FA7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:1.0.6:*:*:*:*:*:*:*",
"matchCriteriaId": "9A38AD88-BAA6-4FBE-885B-69E951BD1EFE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:1.0.7:*:*:*:*:*:*:*",
"matchCriteriaId": "B500EE6C-99DB-49A3-A1F1-AFFD7FE28068",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:1.0.8:*:*:*:*:*:*:*",
"matchCriteriaId": "4F2938F2-A801-45E5-8E06-BE03DE03C8A7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:1.5:*:*:*:*:*:*:*",
"matchCriteriaId": "ABB88E86-6E83-4A59-9266-8B98AA91774D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:1.5:beta1:*:*:*:*:*:*",
"matchCriteriaId": "E19ED1CA-DEBD-4786-BA7B-C122C7D2E5B7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:1.5:beta2:*:*:*:*:*:*",
"matchCriteriaId": "66BE50FE-EA21-4633-A181-CD35196DF06E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:1.5.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "7D6BF5B1-86D1-47FE-9D9C-735718F94874",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:1.5.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "84D15CE0-69DF-4EFD-801E-96A4D6AABEDB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:1.5.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "CEE203DE-6C0E-4FDE-9C3A-0E73430F17DA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:1.5.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "F2F38886-C25A-4C6B-93E7-36461405BA99",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:1.5.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "C65D2670-F37F-48CB-804A-D35BB1C27D9F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:1.5.0.6:*:*:*:*:*:*:*",
"matchCriteriaId": "DE8E5194-7B34-4802-BDA6-6A86EB5EDE05",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:1.5.0.7:*:*:*:*:*:*:*",
"matchCriteriaId": "FABA5F56-99F7-4F8F-9CC1-5B0B2EB72922",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:1.5.0.8:*:*:*:*:*:*:*",
"matchCriteriaId": "2917BD67-CE81-4B94-B241-D4A9DDA60319",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:1.5.0.9:*:*:*:*:*:*:*",
"matchCriteriaId": "A524A94E-F19B-42B9-AA8E-171751C339AA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:1.5.0.10:*:*:*:*:*:*:*",
"matchCriteriaId": "F71436CF-F756-44E0-8E69-6951F6B3E54A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:1.5.0.11:*:*:*:*:*:*:*",
"matchCriteriaId": "582EE839-B83F-4908-9780-D0C92DC44FD0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:1.5.0.12:*:*:*:*:*:*:*",
"matchCriteriaId": "824369CF-00A0-434E-94BC-71CA1317012C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:1.5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "BCB35099-B04E-4796-A25D-953329FE62F3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:1.5.2:*:*:*:*:*:*:*",
"matchCriteriaId": "5DBEBCFD-80D6-466A-BAEF-C75E65A3B12E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:1.5.3:*:*:*:*:*:*:*",
"matchCriteriaId": "C30ACBCA-4FA1-46DE-8F15-4830BC27E160",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:1.5.4:*:*:*:*:*:*:*",
"matchCriteriaId": "9453EF65-7C69-449E-BF7C-4FECFB56713E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:1.5.5:*:*:*:*:*:*:*",
"matchCriteriaId": "4AA75825-21CF-475B-8040-126A13FA2216",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:1.5.6:*:*:*:*:*:*:*",
"matchCriteriaId": "CA97C80E-17FA-4866-86CE-29886145ED80",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:1.5.7:*:*:*:*:*:*:*",
"matchCriteriaId": "7DE24BED-202E-416D-B5F2-8207D97B9939",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:1.5.8:*:*:*:*:*:*:*",
"matchCriteriaId": "04198E04-CE1D-4A5A-A20C-D1E135B45F94",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "3487FA64-BE04-42CA-861E-3DAC097D7D32",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:2.0.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "F3D956DC-C73B-439F-8D79-8239207CC76F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:2.0.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "57E2C7E7-56C0-466C-BB08-5EB43922C4F9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:2.0.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "462E135A-5616-46CC-A9C0-5A7A0526ACC6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:2.0.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "6121F9C1-F4DF-4AAB-9E51-AC1592AA5639",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:2.0.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "58D44634-A0B5-4F05-8983-B08D392EC742",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:2.0.0.6:*:*:*:*:*:*:*",
"matchCriteriaId": "EB3AC3D3-FDD7-489F-BDCF-BDB55DF33A8B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:2.0.0.7:*:*:*:*:*:*:*",
"matchCriteriaId": "4105171B-9C90-4ABF-B220-A35E7BA9EE40",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:2.0.0.8:*:*:*:*:*:*:*",
"matchCriteriaId": "20985549-DB24-4B69-9D40-208A47AE658E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:2.0.0.9:*:*:*:*:*:*:*",
"matchCriteriaId": "43A13026-416F-4308-8A1B-E989BD769E12",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:2.0.0.10:*:*:*:*:*:*:*",
"matchCriteriaId": "612B015E-9F96-4CE6-83E4-23848FD609E5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:2.0.0.11:*:*:*:*:*:*:*",
"matchCriteriaId": "1E391619-0967-43E1-8CBC-4D54F72A85C2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:2.0.0.12:*:*:*:*:*:*:*",
"matchCriteriaId": "0544D626-E269-4677-9B05-7DAB23BD103B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:2.0.0.13:*:*:*:*:*:*:*",
"matchCriteriaId": "C95F7B2C-80FC-4DF2-9680-F74634DCE3E6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:2.0.0.14:*:*:*:*:*:*:*",
"matchCriteriaId": "863C140E-DC15-4A88-AB8A-8AEF9F4B8164",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:2.0.0.15:*:*:*:*:*:*:*",
"matchCriteriaId": "38CD049A-5333-4FF7-AD34-6B74E19BADCB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:2.0.0.16:*:*:*:*:*:*:*",
"matchCriteriaId": "0066576D-D66A-4B59-B5C3-471EEBEE8B9A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:2.0.0.17:*:*:*:*:*:*:*",
"matchCriteriaId": "60ED6DAA-9194-4829-BC1A-00F04BE7930A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:2.0.0.18:*:*:*:*:*:*:*",
"matchCriteriaId": "13BEB9A6-EFD5-4793-9603-84DB84F1CF7D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:2.0.0.19:*:*:*:*:*:*:*",
"matchCriteriaId": "461163C6-4CA8-4BA9-95A1-136E612CBA6B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:2.0.0.20:*:*:*:*:*:*:*",
"matchCriteriaId": "275E9D96-1290-44AB-BF9B-E9E4A803F593",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "412DF091-7604-4110-87A0-3488116A97E5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:3.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "11E07FED-ABDB-4B0A-AB2E-4CBF1EAC4301",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:3.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "9A6558F1-9E0D-4107-909A-8EF4BC8A9C2F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:3.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "63DF3D65-C992-44CF-89B4-893526C6242E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:3.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "A9024117-2E8B-4240-9E21-CC501F3879B5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:3.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "FBC3CAD3-2F54-4E32-A0C9-0D826C45AC23",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:3.0.6:*:*:*:*:*:*:*",
"matchCriteriaId": "52624B41-AB34-40AD-8709-D9646B618AB0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:3.0.7:*:*:*:*:*:*:*",
"matchCriteriaId": "917E9856-9556-4FD6-A834-858F8837A6B4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:3.0.8:*:*:*:*:*:*:*",
"matchCriteriaId": "98BBD74D-930C-4D80-A91B-0D61347BAA63",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:3.0.9:*:*:*:*:*:*:*",
"matchCriteriaId": "FAF2E696-883D-4DE5-8B79-D8E5D9470253",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:3.0.10:*:*:*:*:*:*:*",
"matchCriteriaId": "94E04FD9-38E8-462D-82C2-729F7F7F0465",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:3.0.11:*:*:*:*:*:*:*",
"matchCriteriaId": "5888517E-3C57-4A0A-9895-EA4BCB0A0ED5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:3.0.12:*:*:*:*:*:*:*",
"matchCriteriaId": "0BB21291-B9F3-445E-A9E9-EA1822083DD3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:3.0.13:*:*:*:*:*:*:*",
"matchCriteriaId": "D595F649-ECBE-45E0-8AAD-BCBC65A654B9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:3.0.14:*:*:*:*:*:*:*",
"matchCriteriaId": "4FE6E920-9A4C-431B-89EA-683A22F15ACD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:3.0.15:*:*:*:*:*:*:*",
"matchCriteriaId": "18B6CC9F-6295-4598-B28B-0CA19D1D9F45",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:3.0.16:*:*:*:*:*:*:*",
"matchCriteriaId": "C9F0434D-C84F-49FD-9F44-66D3ACD7B601",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:3.0.17:*:*:*:*:*:*:*",
"matchCriteriaId": "F6AAB416-E865-4EEE-8FCB-A91253BEB52B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:3.5:*:*:*:*:*:*:*",
"matchCriteriaId": "76CD3BDF-A079-4EF3-ABDE-43CBDD08DB1F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:3.5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "031E8624-5161-43AF-AF19-6BAB5A94FDD8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:3.5.2:*:*:*:*:*:*:*",
"matchCriteriaId": "54186D4A-C6F0-44AD-94FB-73B4346ABB6B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:3.5.3:*:*:*:*:*:*:*",
"matchCriteriaId": "47E50AD9-BA35-4817-BD4D-5D678FC5A3C5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:3.5.4:*:*:*:*:*:*:*",
"matchCriteriaId": "DD09DE40-8C9B-41EA-B372-9E4E4830E8F4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:3.5.5:*:*:*:*:*:*:*",
"matchCriteriaId": "F223FB83-0EDB-4429-94B9-1AEEF314B73F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:3.5.6:*:*:*:*:*:*:*",
"matchCriteriaId": "BC6B977F-292F-4981-95A0-6065A3C487D5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:3.5.7:*:*:*:*:*:*:*",
"matchCriteriaId": "342226B9-2C0C-416C-81FE-19C49F03AA88",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:3.5.8:*:*:*:*:*:*:*",
"matchCriteriaId": "2A6A28E0-F67A-4275-B0D9-A02822E9EF7E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:3.5.9:*:*:*:*:*:*:*",
"matchCriteriaId": "ECAB4696-76F3-458C-B33B-D7F8690C60A0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:3.5.10:*:*:*:*:*:*:*",
"matchCriteriaId": "BBB444FD-15F3-4447-9EA8-1669779A5749",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:3.5.11:*:*:*:*:*:*:*",
"matchCriteriaId": "F92E2EF3-A612-476F-9D31-1EEC240C7EA7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:3.5.12:*:*:*:*:*:*:*",
"matchCriteriaId": "0F175D30-2416-4172-BF11-DA78D252D608",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:3.5.13:*:*:*:*:*:*:*",
"matchCriteriaId": "5DD3F168-3EF4-492E-BBAA-EACB1357C709",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:3.5.14:*:*:*:*:*:*:*",
"matchCriteriaId": "4B46BA97-2860-45E4-9FD3-F418A202E4F0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:3.5.15:*:*:*:*:*:*:*",
"matchCriteriaId": "B1C23289-38C3-4C62-8B27-249EAECC297E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:3.5.16:*:*:*:*:*:*:*",
"matchCriteriaId": "96B0C0CB-6B81-45F0-B71F-A09164501414",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:3.5.17:*:*:*:*:*:*:*",
"matchCriteriaId": "869D2763-D953-4532-9353-DC9045A7EF2A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:3.5.18:*:*:*:*:*:*:*",
"matchCriteriaId": "80082DA0-7E48-4F5F-A005-915151226C2E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:3.5.19:*:*:*:*:*:*:*",
"matchCriteriaId": "51925FD3-D730-4938-BE35-C5FDF57F8DD2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:3.6:*:*:*:*:*:*:*",
"matchCriteriaId": "F3782354-7EB7-49D2-B240-1871F6CB84C7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:3.6.2:*:*:*:*:*:*:*",
"matchCriteriaId": "30D47263-03AD-4060-91E3-90F997B3D174",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:3.6.3:*:*:*:*:*:*:*",
"matchCriteriaId": "AFD775DF-277E-4D5B-B980-B8E6E782467D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:3.6.4:*:*:*:*:*:*:*",
"matchCriteriaId": "C8587BFD-417D-42BE-A5F8-22FDC68FA9E6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:3.6.6:*:*:*:*:*:*:*",
"matchCriteriaId": "D7364FAB-EEE9-4064-A8AD-6547239F9AB3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:3.6.7:*:*:*:*:*:*:*",
"matchCriteriaId": "4C50485F-BC7B-4B70-A47B-1712E2DBAC5A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:3.6.8:*:*:*:*:*:*:*",
"matchCriteriaId": "51EE386B-0833-484E-A2AB-86B4470D4D45",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:3.6.9:*:*:*:*:*:*:*",
"matchCriteriaId": "C3EF1B4D-6556-4B3C-BDD0-6348A4D4A91D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:3.6.10:*:*:*:*:*:*:*",
"matchCriteriaId": "68C5C7CF-005B-42FC-B950-90303F0CC115",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:3.6.11:*:*:*:*:*:*:*",
"matchCriteriaId": "0B2FA2CF-7FE4-43B1-96A0-C14666EDBD7B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:3.6.12:*:*:*:*:*:*:*",
"matchCriteriaId": "30290F6D-55CA-47EB-8F41-7BBB745C7A34",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:3.6.13:*:*:*:*:*:*:*",
"matchCriteriaId": "F61F0607-14B0-49AD-B7E6-C4D75401C270",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:3.6.14:*:*:*:*:*:*:*",
"matchCriteriaId": "7FED863D-2898-4148-A9FB-73BFF9DE4396",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:3.6.15:*:*:*:*:*:*:*",
"matchCriteriaId": "779C1245-A6F9-41F5-B8D4-FAE506A23FD3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:3.6.16:*:*:*:*:*:*:*",
"matchCriteriaId": "9E7CFEE9-70D4-465F-9FB9-397E6B200FA3",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*",
"matchCriteriaId": "EDA95FA2-3563-4D8A-A96C-2514720B8CBD",
"versionEndIncluding": "3.1.10",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:thunderbird:0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "0618BD26-0EF5-4774-9131-B5ABD4CD302A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:thunderbird:0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "0D604DAE-DF63-413C-9F49-FFC8E84699F8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:thunderbird:0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "11DE6185-09F4-48E3-9742-F9D8030B5774",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:thunderbird:0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "B2E70864-E077-4CD6-A0E8-BC2C4C298A6A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:thunderbird:0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "61E565E5-286D-4A68-B085-5659DFE59A9C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:thunderbird:0.6:*:*:*:*:*:*:*",
"matchCriteriaId": "8E2A68B4-9101-4AC5-9E82-EEB5A5405541",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:thunderbird:0.7:*:*:*:*:*:*:*",
"matchCriteriaId": "EDA6C390-9BA7-4355-8C0A-CD68FF6AC236",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:thunderbird:0.7.1:*:*:*:*:*:*:*",
"matchCriteriaId": "0C75B125-E5BB-49A0-B12D-6CF40D8A5DB7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:thunderbird:0.7.2:*:*:*:*:*:*:*",
"matchCriteriaId": "70DDB53E-7A12-4A08-8999-DB68E6DF901E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:thunderbird:0.7.3:*:*:*:*:*:*:*",
"matchCriteriaId": "6514EDE8-7C78-4C72-A313-E0915D89E4EF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:thunderbird:0.8:*:*:*:*:*:*:*",
"matchCriteriaId": "5263F879-9B90-4582-B677-F133DEBE5259",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:thunderbird:0.9:*:*:*:*:*:*:*",
"matchCriteriaId": "C256B73C-9ABC-43D4-8C57-09161BC9F923",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:thunderbird:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "055D1044-9FC5-45AA-8407-649E96C5AFE3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:thunderbird:1.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "7C1C87A5-C14D-4A23-B865-3BB1FCDC8470",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:thunderbird:1.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "5C4DB0BB-BFD7-4E7A-B3EF-9C5422602216",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:thunderbird:1.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "F0D56153-E20A-46D8-859E-A51E5C03D674",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:thunderbird:1.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "2C51A6F4-F88F-4BF2-BF71-5DC48559C085",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:thunderbird:1.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "FFC390CB-774C-47BE-95C3-059943A9E645",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:thunderbird:1.0.6:*:*:*:*:*:*:*",
"matchCriteriaId": "B71DE7AC-553B-4524-8B33-5605518449EB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:thunderbird:1.0.7:*:*:*:*:*:*:*",
"matchCriteriaId": "72B02389-0DCD-45BC-A09F-CB6B75940616",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:thunderbird:1.0.8:*:*:*:*:*:*:*",
"matchCriteriaId": "41AE4644-2D23-43EA-ABDA-7BE60EFD1EFF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:thunderbird:1.5:*:*:*:*:*:*:*",
"matchCriteriaId": "4FB87608-0DF8-4729-95C5-CFA386AB3AC2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:thunderbird:1.5:beta2:*:*:*:*:*:*",
"matchCriteriaId": "1A406214-29E5-4E13-B2E1-1CF72F1E60BC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:thunderbird:1.5.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "E6C169DA-26BC-42EE-817B-2F0685069495",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:thunderbird:1.5.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "9C99BAF7-B48E-4402-B2BF-EB07235E402E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:thunderbird:1.5.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "C3F0C73F-291F-4A92-87B8-2269B5C1516D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:thunderbird:1.5.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "A0ADE8D7-B3C3-4490-9CD5-0263BBA75D28",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:thunderbird:1.5.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "C86FD617-E4FE-4F85-AAA4-4F968A9DEC9F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:thunderbird:1.5.0.6:*:*:*:*:*:*:*",
"matchCriteriaId": "938B1260-74A7-4CFF-8086-415DCC284430",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:thunderbird:1.5.0.7:*:*:*:*:*:*:*",
"matchCriteriaId": "E28672BA-E3C2-40C3-80E1-95B7CDD089E2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:thunderbird:1.5.0.8:*:*:*:*:*:*:*",
"matchCriteriaId": "9308147C-0A23-48BC-BFA9-A49B9D73014E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:thunderbird:1.5.0.9:*:*:*:*:*:*:*",
"matchCriteriaId": "E6654EC3-BED6-4D6D-9B7F-DF4CC8E464BB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:thunderbird:1.5.0.10:*:*:*:*:*:*:*",
"matchCriteriaId": "5CAD8DCC-DBB4-40EE-927C-7B0969700077",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:thunderbird:1.5.0.11:*:*:*:*:*:*:*",
"matchCriteriaId": "77F9CE47-E3AA-49D7-AEC9-447951AC31E5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:thunderbird:1.5.0.12:*:*:*:*:*:*:*",
"matchCriteriaId": "581615BB-C781-42CA-836E-0E0EAB8C4504",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:thunderbird:1.5.0.13:*:*:*:*:*:*:*",
"matchCriteriaId": "257F43FA-D22C-4BF0-A02E-261A54142BCB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:thunderbird:1.5.0.14:*:*:*:*:*:*:*",
"matchCriteriaId": "0C8D63F5-78D5-4F7B-B15A-2C15FC405E27",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:thunderbird:1.5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "84BC6D68-4ED4-43CF-A2EB-47BD15D11AE5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:thunderbird:1.5.2:*:*:*:*:*:*:*",
"matchCriteriaId": "3D291234-D64A-4E8A-A7CD-08BB980E1CD6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:thunderbird:1.7.1:*:*:*:*:*:*:*",
"matchCriteriaId": "BB1FC6D1-8D93-4D87-9D73-7C6C0F8D45C7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:thunderbird:1.7.3:*:*:*:*:*:*:*",
"matchCriteriaId": "0A3C27EC-5794-49C1-96E0-997E700B13DB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:thunderbird:2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "97BDCEEC-25FE-4763-AC63-BA6B4F25E0C1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:thunderbird:2.0.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "CFC60781-766B-4B9C-B68D-45D51C5E5D20",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:thunderbird:2.0.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "745C2CBA-4824-441B-A6BC-E80959C2E035",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:thunderbird:2.0.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "8C6A7D00-A203-4891-96CE-20C91FCBF048",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:thunderbird:2.0.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "0A8CB480-0595-4BC1-998E-3638E85DB367",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:thunderbird:2.0.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "AC7EAB8D-CA40-4C29-99DF-24FF1753BCF9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:thunderbird:2.0.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "5C9218A9-DA27-436A-AC93-F465FC14ECF3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:thunderbird:2.0.0.6:*:*:*:*:*:*:*",
"matchCriteriaId": "E66503D7-72CB-42A5-8C85-D9579EF2C0A5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:thunderbird:2.0.0.7:*:*:*:*:*:*:*",
"matchCriteriaId": "5CD7D204-3EBA-4D9E-B95A-86524B4C03D6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:thunderbird:2.0.0.8:*:*:*:*:*:*:*",
"matchCriteriaId": "1FBBF526-7A28-436B-9B01-EADE913602B6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:thunderbird:2.0.0.9:*:*:*:*:*:*:*",
"matchCriteriaId": "B373B409-0939-4707-99F1-95B121BFF7FC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:thunderbird:2.0.0.12:*:*:*:*:*:*:*",
"matchCriteriaId": "E80CA1DE-B920-4E28-BEFC-574148D19A0D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:thunderbird:2.0.0.14:*:*:*:*:*:*:*",
"matchCriteriaId": "4DCDAA51-4AA3-4EC4-B441-71FB3C3304F7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:thunderbird:2.0.0.16:*:*:*:*:*:*:*",
"matchCriteriaId": "D54ACD07-FAB7-4513-A707-18FAF7D565C2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:thunderbird:2.0.0.17:*:*:*:*:*:*:*",
"matchCriteriaId": "7260CE1F-501D-44FF-A3FA-2137CA01733B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:thunderbird:2.0.0.18:*:*:*:*:*:*:*",
"matchCriteriaId": "55D3DD1B-64DF-46C8-80A3-99D2E34B665F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:thunderbird:2.0.0.19:*:*:*:*:*:*:*",
"matchCriteriaId": "6DF479C3-95A0-414F-B47B-C94BE95713D1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:thunderbird:2.0.0.21:*:*:*:*:*:*:*",
"matchCriteriaId": "AC650D89-CEEC-4A90-B3B9-5F0ADCEFCBB9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:thunderbird:2.0.0.22:*:*:*:*:*:*:*",
"matchCriteriaId": "7C8C0115-94B1-4046-A599-E92DCFB936F1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:thunderbird:2.0.0.23:*:*:*:*:*:*:*",
"matchCriteriaId": "4033E532-7298-40DF-A582-22B7106035C7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:thunderbird:3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "AE19E377-CB55-4784-A003-5335D531AAF3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:thunderbird:3.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "4BF605F6-2A84-4DE5-AB62-282E9C46479B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:thunderbird:3.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "08F10B5E-0780-4756-919C-B0C00C673412",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:thunderbird:3.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "6D930F0F-DCC3-4905-A4B1-288F0CCC6975",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:thunderbird:3.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "CBA0F9D4-B68A-4018-BC4E-95B87A1A8489",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:thunderbird:3.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "61CCB291-B71B-40D3-8493-215003851BDB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:thunderbird:3.0.6:*:*:*:*:*:*:*",
"matchCriteriaId": "AFD1FE7A-B888-461D-93F3-B71C94B4AA56",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:thunderbird:3.0.7:*:*:*:*:*:*:*",
"matchCriteriaId": "E2727C9C-618D-4AEF-B7BE-8BE5935483F7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:thunderbird:3.0.8:*:*:*:*:*:*:*",
"matchCriteriaId": "95B21CE4-AF78-4D1B-A73E-84E83DB4A2C4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:thunderbird:3.0.9:*:*:*:*:*:*:*",
"matchCriteriaId": "48F3528F-4E43-4D91-957E-49C7DB2A135A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:thunderbird:3.0.10:*:*:*:*:*:*:*",
"matchCriteriaId": "4E7706B2-D0F0-4E37-B9B5-8DA72413382B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:thunderbird:3.0.11:*:*:*:*:*:*:*",
"matchCriteriaId": "2BEE78E5-D163-4764-B3BB-5BE270549F5D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:thunderbird:3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "58FC2EFB-CE85-4A65-A7B4-A0779F11B5BA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:thunderbird:3.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "27B9EA91-A461-42CE-9ED7-3805BD13A4B6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:thunderbird:3.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "8C48E432-8945-4918-B2A4-AD2E05A51633",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:thunderbird:3.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "2A95B301-A72B-4F95-A7D6-4B574E9D3BDA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:thunderbird:3.1.4:*:*:*:*:*:*:*",
"matchCriteriaId": "968C261F-A7D5-4EB6-BCFF-EE40DB5A11D9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:thunderbird:3.1.5:*:*:*:*:*:*:*",
"matchCriteriaId": "EB49CD91-C21E-4494-97CF-DDCFB38B2D92",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:thunderbird:3.1.6:*:*:*:*:*:*:*",
"matchCriteriaId": "5EC37D84-29B9-4F64-B72B-79A8B086A94A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:thunderbird:3.1.7:*:*:*:*:*:*:*",
"matchCriteriaId": "C59D0C61-28FB-4031-BFC3-CB0D82646337",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:thunderbird:3.1.8:*:*:*:*:*:*:*",
"matchCriteriaId": "C930EF12-CB52-4C67-944D-5FE5771B556C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:thunderbird:3.1.9:*:*:*:*:*:*:*",
"matchCriteriaId": "4131F65C-E08B-4F4F-8783-15092732E6DA",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:mozilla:firefox:4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "C69962C4-FA56-47F2-82A4-DFF4C19DAF3A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:4.0:beta1:*:*:*:*:*:*",
"matchCriteriaId": "B7BC1684-3634-4585-B7E6-8C8777E1DA0D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:4.0:beta10:*:*:*:*:*:*",
"matchCriteriaId": "A490D040-EF74-45C2-89ED-D88ADD222712",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:4.0:beta11:*:*:*:*:*:*",
"matchCriteriaId": "6CDA17D1-CD93-401E-860C-7C3291FEEB7E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:4.0:beta12:*:*:*:*:*:*",
"matchCriteriaId": "6F72FDE3-54E0-48E4-9015-1B8A36DB1EC3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:4.0:beta2:*:*:*:*:*:*",
"matchCriteriaId": "4062C901-3828-415B-A6C3-EDD0E7B20C0E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:4.0:beta3:*:*:*:*:*:*",
"matchCriteriaId": "CC0D8730-7034-4AD6-9B05-F8BAFB0145EF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:4.0:beta4:*:*:*:*:*:*",
"matchCriteriaId": "857AFB05-F0C1-4061-9680-9561D68C908F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:4.0:beta5:*:*:*:*:*:*",
"matchCriteriaId": "EC37EBAF-C979-4ACC-ACA9-BDC2AECCB0D7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:4.0:beta6:*:*:*:*:*:*",
"matchCriteriaId": "80801CD8-EEAF-4BC4-9085-DCCC6CF73076",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:4.0:beta7:*:*:*:*:*:*",
"matchCriteriaId": "FAF4C78A-5093-4871-AF69-A8E8FD7E1AAE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:4.0:beta8:*:*:*:*:*:*",
"matchCriteriaId": "560AD4C7-89D2-4323-BBCC-A89EEB6832CB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:4.0:beta9:*:*:*:*:*:*",
"matchCriteriaId": "6B389CBC-4F6C-4C17-A87B-A6DD92703A10",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:4.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "DDFBA043-91BC-4FB5-A34D-FCE1A9C65A88",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "CRLF injection vulnerability in the nsCookieService::SetCookieStringInternal function in netwerk/cookie/nsCookieService.cpp in Mozilla Firefox before 3.6.18 and 4.x through 4.0.1, and Thunderbird before 3.1.11, allows remote attackers to bypass intended access restrictions via a string containing a \\n (newline) character, which is not properly handled in a JavaScript \"document.cookie =\" expression, a different vulnerability than CVE-2011-2374."
},
{
"lang": "es",
"value": "Inyecci\u00f3n CRLF en la funci\u00f3n nsCookieService::SetCookieStringInternal en netwerk/cookie/nsCookieService.cpp de Mozilla Firefox antes de v3.6.18 y v4.x hasta 4.0.1 y Thunderbird antes de v3.1.11, permite a atacantes remotos evitar las restricciones de acceso a trav\u00e9s de una cadena que contiene un car\u00e1cter \\n (nueva l\u00ednea) , que no se maneja en una expresion \"document.cookie =\" de JavaScript es una vulnerabilidad diferente a CVE-2011-2374."
}
],
"id": "CVE-2011-2605",
"lastModified": "2026-04-29T01:13:23.040",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
]
},
"published": "2011-06-30T16:55:05.550",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://www.mozilla.org/security/announce/2011/mfsa2011-19.html"
},
{
"source": "cve@mitre.org",
"url": "http://www.redhat.com/support/errata/RHSA-2011-0885.html"
},
{
"source": "cve@mitre.org",
"url": "http://www.redhat.com/support/errata/RHSA-2011-0886.html"
},
{
"source": "cve@mitre.org",
"url": "http://www.redhat.com/support/errata/RHSA-2011-0887.html"
},
{
"source": "cve@mitre.org",
"url": "http://www.redhat.com/support/errata/RHSA-2011-0888.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch"
],
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=643051"
},
{
"source": "cve@mitre.org",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14401"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://www.mozilla.org/security/announce/2011/mfsa2011-19.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.redhat.com/support/errata/RHSA-2011-0885.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.redhat.com/support/errata/RHSA-2011-0886.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.redhat.com/support/errata/RHSA-2011-0887.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.redhat.com/support/errata/RHSA-2011-0888.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
],
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=643051"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14401"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-94"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
GHSA-M4CH-8PC5-RPX2
Vulnerability from github – Published: 2022-05-17 01:00 – Updated: 2022-05-17 01:00CRLF injection vulnerability in the nsCookieService::SetCookieStringInternal function in netwerk/cookie/nsCookieService.cpp in Mozilla Firefox before 3.6.18 and 4.x through 4.0.1, and Thunderbird before 3.1.11, allows remote attackers to bypass intended access restrictions via a string containing a \n (newline) character, which is not properly handled in a JavaScript "document.cookie =" expression, a different vulnerability than CVE-2011-2374.
{
"affected": [],
"aliases": [
"CVE-2011-2605"
],
"database_specific": {
"cwe_ids": [
"CWE-94"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2011-06-30T16:55:00Z",
"severity": "MODERATE"
},
"details": "CRLF injection vulnerability in the nsCookieService::SetCookieStringInternal function in netwerk/cookie/nsCookieService.cpp in Mozilla Firefox before 3.6.18 and 4.x through 4.0.1, and Thunderbird before 3.1.11, allows remote attackers to bypass intended access restrictions via a string containing a \\n (newline) character, which is not properly handled in a JavaScript \"document.cookie =\" expression, a different vulnerability than CVE-2011-2374.",
"id": "GHSA-m4ch-8pc5-rpx2",
"modified": "2022-05-17T01:00:59Z",
"published": "2022-05-17T01:00:59Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-2605"
},
{
"type": "WEB",
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=643051"
},
{
"type": "WEB",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14401"
},
{
"type": "WEB",
"url": "http://www.mozilla.org/security/announce/2011/mfsa2011-19.html"
},
{
"type": "WEB",
"url": "http://www.redhat.com/support/errata/RHSA-2011-0885.html"
},
{
"type": "WEB",
"url": "http://www.redhat.com/support/errata/RHSA-2011-0886.html"
},
{
"type": "WEB",
"url": "http://www.redhat.com/support/errata/RHSA-2011-0887.html"
},
{
"type": "WEB",
"url": "http://www.redhat.com/support/errata/RHSA-2011-0888.html"
}
],
"schema_version": "1.4.0",
"severity": []
}
Sightings
| Author | Source | Type | Date | Other |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.