Vulnerability Name:

CVE-2007-2868 (CCN-34605)

Assigned:2007-05-31
Published:2007-05-31
Updated:2018-10-16
Summary:Multiple vulnerabilities in the JavaScript engine for Mozilla Firefox 1.5.x before 1.5.0.12 and 2.x before 2.0.0.4, Thunderbird 1.5.x before 1.5.0.12 and 2.x before 2.0.0.4, and SeaMonkey 1.0.9 and 1.1.2 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via vectors that trigger memory corruption.
CVSS v3 Severity:9.0 Critical (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): High
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Changed
Impact Metrics:Confidentiality (C): High
Integrity (I): High
Availibility (A): High
CVSS v2 Severity:9.3 High (CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C)
6.9 Medium (Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Medium
Authentication (Au): None
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
7.6 High (CCN CVSS v2 Vector: AV:N/AC:H/Au:N/C:C/I:C/A:C)
5.6 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:H/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): High
Athentication (Au): None
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
Vulnerability Type:CWE-94
Vulnerability Consequences:Gain Access
References:Source: MITRE
Type: CNA
CVE-2007-2868

Source: FEDORA
Type: UNKNOWN
FEDORA-2007-308

Source: FEDORA
Type: UNKNOWN
FEDORA-2007-309

Source: HP
Type: UNKNOWN
HPSBUX02153

Source: HP
Type: UNKNOWN
HPSBUX02156

Source: CCN
Type: DSA 1305-1
New icedove packages fix several vulnerabilities

Source: CCN
Type: DSA 1308-1
New iceweasel packages fix several vulnerabilities

Source: OSVDB
Type: UNKNOWN
35138

Source: CCN
Type: RHSA-2007-0400
Critical: firefox security update

Source: CCN
Type: RHSA-2007-0401
Critical: thunderbird security update

Source: CCN
Type: RHSA-2007-0402
Critical: seamonkey security update

Source: SECUNIA
Type: Vendor Advisory
24406

Source: SECUNIA
Type: Vendor Advisory
24456

Source: CCN
Type: SA25469
Mozilla Firefox Multiple Vulnerabilities

Source: SECUNIA
Type: Vendor Advisory
25469

Source: SECUNIA
Type: Vendor Advisory
25476

Source: CCN
Type: SA25488
Mozilla SeaMonkey Multiple Vulnerabilities

Source: SECUNIA
Type: Vendor Advisory
25488

Source: CCN
Type: SA25489
Mozilla Thunderbird Memory Corruption Vulnerability

Source: SECUNIA
Type: Vendor Advisory
25489

Source: SECUNIA
Type: Vendor Advisory
25490

Source: SECUNIA
Type: Vendor Advisory
25491

Source: SECUNIA
Type: Vendor Advisory
25492

Source: SECUNIA
Type: Vendor Advisory
25496

Source: SECUNIA
Type: Vendor Advisory
25533

Source: SECUNIA
Type: Vendor Advisory
25534

Source: SECUNIA
Type: Vendor Advisory
25559

Source: SECUNIA
Type: Vendor Advisory
25635

Source: SECUNIA
Type: Vendor Advisory
25644

Source: SECUNIA
Type: Vendor Advisory
25647

Source: SECUNIA
Type: Vendor Advisory
25664

Source: SECUNIA
Type: Vendor Advisory
25685

Source: SECUNIA
Type: Vendor Advisory
25750

Source: SECUNIA
Type: UNKNOWN
25858

Source: CCN
Type: SA27427
Sun Solaris Mozilla JavaScript Engine Multiple Vulnerabilities

Source: SECUNIA
Type: UNKNOWN
27427

Source: SECUNIA
Type: UNKNOWN
28363

Source: GENTOO
Type: UNKNOWN
GLSA-200706-06

Source: CCN
Type: SECTRACK ID: 1018151
Mozilla Firefox Bugs in Layout and Javascript Engines May Let Remote Users Execute Arbitrary Code

Source: CCN
Type: SECTRACK ID: 1018152
Mozilla Thunderbird Bugs in Javascript Engines May Let Remote Users Execute Arbitrary Code

Source: CCN
Type: SECTRACK ID: 1018153
Mozilla Seamonkey Bugs in Layout and Javascript Engines May Let Remote Users Execute Arbitrary Code

Source: SLACKWARE
Type: UNKNOWN
SSA:2007-066-04

Source: SLACKWARE
Type: UNKNOWN
SSA:2007-152-02

Source: CCN
Type: Sun Alert ID: 103125
Multiple Security Vulnerabilities in JavaScript Engine in Mozilla 1.7 for Solaris 8, 9 and 10

Source: SUNALERT
Type: UNKNOWN
103125

Source: CCN
Type: Sun Alert ID: 201505
Multiple Security Vulnerabilities in JavaScript Engine in Mozilla 1.7 for Solaris 8, 9 and 10

Source: SUNALERT
Type: UNKNOWN
201505

Source: CCN
Type: ASA-2007-218
thunderbird security update (RHSA-2007-0401)

Source: CCN
Type: ASA-2007-291
Firefox security update (RHSA-2007-0400)

Source: CCN
Type: ASA-2007-295
SeaMonkey security update (RHSA-2007-0402)

Source: CCN
Type: ASA-2007-469
Multiple Security Vulnerabilities in JavaScript Engine in Mozilla 1.7 for Solaris 8 9 and 10 (Sun 103125)

Source: CCN
Type: ASA-2008-008
Multiple Security Vulnerabilities in Firefox and Thunderbird for Solaris 10 May Allow Execution of Arbitrary Code and Access to Unauthorized Data (Sun 103177)

Source: DEBIAN
Type: UNKNOWN
DSA-1300

Source: DEBIAN
Type: UNKNOWN
DSA-1305

Source: DEBIAN
Type: UNKNOWN
DSA-1306

Source: DEBIAN
Type: UNKNOWN
DSA-1308

Source: DEBIAN
Type: DSA-1300
iceape -- several vulnerabilities

Source: DEBIAN
Type: DSA-1305
icedove -- several vulnerabilities

Source: DEBIAN
Type: DSA-1306
xulrunner -- several vulnerabilities

Source: DEBIAN
Type: DSA-1308
iceweasel -- several vulnerabilities

Source: CCN
Type: GLSA-200706-06
Mozilla products: Multiple vulnerabilities

Source: CCN
Type: US-CERT VU#609956
Mozilla products vulnerable to memory corruption in the JavaScript engine

Source: CERT-VN
Type: US Government Resource
VU#609956

Source: MANDRIVA
Type: UNKNOWN
MDKSA-2007:119

Source: MANDRIVA
Type: UNKNOWN
MDKSA-2007:120

Source: MANDRIVA
Type: UNKNOWN
MDKSA-2007:131

Source: CCN
Type: MFSA 2007-12
Crashes with evidence of memory corruption (rv:1.8.0.12/1.8.1.4)

Source: CONFIRM
Type: Vendor Advisory
http://www.mozilla.org/security/announce/2007/mfsa2007-12.html

Source: CCN
Type: MFSA 2007-32
File input focus stealing vulnerability

Source: SUSE
Type: UNKNOWN
SUSE-SA:2007:036

Source: CCN
Type: OSVDB ID: 35138
Mozilla Multiple Products JavaScript Engine Unspecified Memory Corruption

Source: REDHAT
Type: UNKNOWN
RHSA-2007:0400

Source: REDHAT
Type: UNKNOWN
RHSA-2007:0401

Source: REDHAT
Type: UNKNOWN
RHSA-2007:0402

Source: BUGTRAQ
Type: UNKNOWN
20070531 FLEA-2007-0023-1: firefox

Source: BUGTRAQ
Type: UNKNOWN
20070620 FLEA-2007-0027-1: thunderbird

Source: BID
Type: UNKNOWN
24242

Source: CCN
Type: BID-24242
Mozilla Products Multiple Remote Vulnerabilities

Source: SECTRACK
Type: UNKNOWN
1018151

Source: SECTRACK
Type: UNKNOWN
1018152

Source: SECTRACK
Type: UNKNOWN
1018153

Source: CCN
Type: USN-468-1
Firefox vulnerabilities

Source: UBUNTU
Type: UNKNOWN
USN-468-1

Source: CCN
Type: USN-469-1
Thunderbird vulnerabilities

Source: UBUNTU
Type: UNKNOWN
USN-469-1

Source: CCN
Type: USN-469-2
Enigmail regression

Source: CERT
Type: US Government Resource
TA07-151A

Source: VUPEN
Type: UNKNOWN
ADV-2007-1994

Source: VUPEN
Type: UNKNOWN
ADV-2007-3632

Source: VUPEN
Type: UNKNOWN
ADV-2008-0082

Source: XF
Type: UNKNOWN
mozilla-javascripteng-code-execution(34605)

Source: XF
Type: UNKNOWN
mozilla-javascripteng-code-execution(34605)

Source: CONFIRM
Type: UNKNOWN
https://issues.rpath.com/browse/RPL-1424

Source: OVAL
Type: UNKNOWN
oval:org.mitre.oval:def:10711

Source: SUSE
Type: SUSE-SA:2007:036
Mozilla security updates

Vulnerable Configuration:Configuration 1:
  • cpe:/a:mozilla:firefox:1.5:*:*:*:*:*:*:*
  • OR cpe:/a:mozilla:firefox:1.5.0.1:*:*:*:*:*:*:*
  • OR cpe:/a:mozilla:firefox:1.5.0.2:*:*:*:*:*:*:*
  • OR cpe:/a:mozilla:firefox:1.5.0.3:*:*:*:*:*:*:*
  • OR cpe:/a:mozilla:firefox:1.5.0.4:*:*:*:*:*:*:*
  • OR cpe:/a:mozilla:firefox:1.5.0.5:*:*:*:*:*:*:*
  • OR cpe:/a:mozilla:firefox:1.5.0.6:*:*:*:*:*:*:*
  • OR cpe:/a:mozilla:firefox:1.5.0.7:*:*:*:*:*:*:*
  • OR cpe:/a:mozilla:firefox:1.5.0.8:*:*:*:*:*:*:*
  • OR cpe:/a:mozilla:firefox:1.5.0.9:*:*:*:*:*:*:*
  • OR cpe:/a:mozilla:firefox:1.5.0.10:*:*:*:*:*:*:*
  • OR cpe:/a:mozilla:firefox:1.5.0.11:*:*:*:*:*:*:*
  • OR cpe:/a:mozilla:firefox:2.0:*:*:*:*:*:*:*
  • OR cpe:/a:mozilla:firefox:2.0.0.1:*:*:*:*:*:*:*
  • OR cpe:/a:mozilla:firefox:2.0.0.2:*:*:*:*:*:*:*
  • OR cpe:/a:mozilla:firefox:2.0.0.3:*:*:*:*:*:*:*
  • OR cpe:/a:mozilla:seamonkey:1.0.9:*:*:*:*:*:*:*
  • OR cpe:/a:mozilla:seamonkey:1.1.2:*:*:*:*:*:*:*
  • OR cpe:/a:mozilla:thunderbird:1.5:-:*:*:*:*:*:*
  • OR cpe:/a:mozilla:thunderbird:1.5.0.1:*:*:*:*:*:*:*
  • OR cpe:/a:mozilla:thunderbird:1.5.0.2:*:*:*:*:*:*:*
  • OR cpe:/a:mozilla:thunderbird:1.5.0.3:*:*:*:*:*:*:*
  • OR cpe:/a:mozilla:thunderbird:1.5.0.4:*:*:*:*:*:*:*
  • OR cpe:/a:mozilla:thunderbird:1.5.0.6:*:*:*:*:*:*:*
  • OR cpe:/a:mozilla:thunderbird:1.5.0.7:*:*:*:*:*:*:*
  • OR cpe:/a:mozilla:thunderbird:1.5.0.8:*:*:*:*:*:*:*
  • OR cpe:/a:mozilla:thunderbird:1.5.0.9:*:*:*:*:*:*:*
  • OR cpe:/a:mozilla:thunderbird:1.5.0.10:*:*:*:*:*:*:*
  • OR cpe:/a:mozilla:thunderbird:1.5.0.11:*:*:*:*:*:*:*
  • OR cpe:/a:mozilla:thunderbird:2.0.0.0:*:*:*:*:*:*:*
  • OR cpe:/a:mozilla:thunderbird:2.0.0.1:*:*:*:*:*:*:*
  • OR cpe:/a:mozilla:thunderbird:2.0.0.2:*:*:*:*:*:*:*
  • OR cpe:/a:mozilla:thunderbird:2.0.0.3:*:*:*:*:*:*:*

  • Configuration RedHat 1:
  • cpe:/o:redhat:enterprise_linux:4:*:*:*:*:*:*:*

  • Configuration RedHat 2:
  • cpe:/o:redhat:enterprise_linux:4::as:*:*:*:*:*

  • Configuration RedHat 3:
  • cpe:/o:redhat:enterprise_linux:4::desktop:*:*:*:*:*

  • Configuration RedHat 4:
  • cpe:/o:redhat:enterprise_linux:4::es:*:*:*:*:*

  • Configuration RedHat 5:
  • cpe:/o:redhat:enterprise_linux:4::ws:*:*:*:*:*

  • Configuration RedHat 6:
  • cpe:/o:redhat:enterprise_linux:5:*:*:*:*:*:*:*

  • Configuration RedHat 7:
  • cpe:/o:redhat:enterprise_linux:5::client:*:*:*:*:*

  • Configuration RedHat 8:
  • cpe:/o:redhat:enterprise_linux:5::client_workstation:*:*:*:*:*

  • Configuration RedHat 9:
  • cpe:/o:redhat:enterprise_linux:5::server:*:*:*:*:*

  • Configuration RedHat 10:
  • cpe:/a:redhat:rhel_productivity:5:*:*:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/a:mozilla:firefox:2.0:*:*:*:*:*:*:*
  • OR cpe:/a:mozilla:firefox:1.5:*:*:*:*:*:*:*
  • OR cpe:/a:mozilla:thunderbird:1.5:-:*:*:*:*:*:*
  • OR cpe:/a:mozilla:firefox:1.5.0.2:*:*:*:*:*:*:*
  • OR cpe:/a:mozilla:firefox:1.5.0.3:*:*:*:*:*:*:*
  • OR cpe:/a:mozilla:firefox:1.5.0.4:*:*:*:*:*:*:*
  • OR cpe:/a:mozilla:firefox:1.5.0.6:*:*:*:*:*:*:*
  • OR cpe:/a:mozilla:firefox:1.5.0.7:*:*:*:*:*:*:*
  • OR cpe:/a:mozilla:thunderbird:1.5.0.7:*:*:*:*:*:*:*
  • OR cpe:/a:mozilla:thunderbird:1.5.0.9:*:*:*:*:*:*:*
  • OR cpe:/a:mozilla:firefox:1.5.0.9:*:*:*:*:*:*:*
  • OR cpe:/a:mozilla:firefox:2.0.0.1:*:*:*:*:*:*:*
  • OR cpe:/a:mozilla:firefox:2.0.0.2:*:*:*:*:*:*:*
  • OR cpe:/a:mozilla:firefox:2.0.0.3:*:*:*:*:*:*:*
  • OR cpe:/a:mozilla:thunderbird:1.5.0.10:*:*:*:*:*:*:*
  • OR cpe:/a:mozilla:thunderbird:1.5.0.11:*:*:*:*:*:*:*
  • OR cpe:/a:mozilla:thunderbird:1.5.0.6:*:*:*:*:*:*:*
  • OR cpe:/a:mozilla:thunderbird:1.5.0.8:*:*:*:*:*:*:*
  • OR cpe:/a:mozilla:thunderbird:1.5.0.4:*:*:*:*:*:*:*
  • OR cpe:/a:mozilla:thunderbird:1.5.0.3:*:*:*:*:*:*:*
  • OR cpe:/a:mozilla:thunderbird:1.5.0.2:*:*:*:*:*:*:*
  • OR cpe:/a:mozilla:thunderbird:1.5.0.1:*:*:*:*:*:*:*
  • OR cpe:/a:mozilla:thunderbird:2.0.0.3:*:*:*:*:*:*:*
  • OR cpe:/a:mozilla:thunderbird:2.0.0.2:*:*:*:*:*:*:*
  • OR cpe:/a:mozilla:thunderbird:2.0.0.1:*:*:*:*:*:*:*
  • OR cpe:/a:mozilla:seamonkey:1.1.2:*:*:*:*:*:*:*
  • OR cpe:/a:mozilla:thunderbird:2.0.0.0:*:*:*:*:*:*:*
  • OR cpe:/a:mozilla:seamonkey:1.0.9:*:*:*:*:*:*:*
  • OR cpe:/a:mozilla:firefox:1.5.0.1:*:*:*:*:*:*:*
  • OR cpe:/a:mozilla:firefox:1.5.0.10:*:*:*:*:*:*:*
  • OR cpe:/a:mozilla:firefox:1.5.0.11:*:*:*:*:*:*:*
  • OR cpe:/a:mozilla:firefox:1.5.0.5:*:*:*:*:*:*:*
  • OR cpe:/a:mozilla:firefox:1.5.0.8:*:*:*:*:*:*:*
  • AND
  • cpe:/o:sun:solaris:8::x86:*:*:*:*:*
  • OR cpe:/o:gentoo:linux:*:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:2.1:*:as:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:2.1:*:es:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:2.1:*:ws:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:3::ws:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:3::es:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:3::as:*:*:*:*:*
  • OR cpe:/o:sun:solaris:8::sparc:*:*:*:*:*
  • OR cpe:/o:sun:solaris:9::x86:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:3::desktop:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:3.0:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:4::as:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:4::desktop:*:*:*:*:*
  • OR cpe:/o:novell:linux_desktop:9:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:4::es:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:4::ws:*:*:*:*:*
  • OR cpe:/a:novell:open_enterprise_server:*:*:*:*:*:*:*:*
  • OR cpe:/o:sun:solaris:10::sparc:*:*:*:*:*
  • OR cpe:/o:sun:solaris:10::x86:*:*:*:*:*
  • OR cpe:/o:redhat:linux_advanced_workstation:2.1::itanium:*:*:*:*:*
  • OR cpe:/o:canonical:ubuntu:6.06::lts:*:*:*:*:*
  • OR cpe:/o:novell:suse_linux_enterprise_server:10:sp2:itanium_ia64:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:2007:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:2007::x86_64:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:4.0:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:4.0::x86_64:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:3.0::x86_64:*:*:*:*:*
  • OR cpe:/o:turbolinux:turbolinux:fuji:*:*:*:*:*:*:*
  • OR cpe:/o:turbolinux:turbolinux:*:*:personal:*:*:*:*:*
  • OR cpe:/o:turbolinux:turbolinux:*:*:home:*:*:*:*:*
  • OR cpe:/o:turbolinux:turbolinux:*:*:multimedia:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:5:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:5:*:client_workstation:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:2007.1:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:2008.0::x86-64:*:*:*:*:*
  • OR cpe:/o:debian:debian_linux:4.0:*:*:*:*:*:*:*
  • OR cpe:/o:canonical:ubuntu:7.04:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:5:*:server:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:5:*:client:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:2007.1::x86-64:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:4.5.z::as:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:4.5.z::es:*:*:*:*:*
  • OR cpe:/a:novell:open_enterprise_server:*:*:*:*:*:*:*:*
  • OR cpe:/o:opensuse:opensuse:10.2:*:*:*:*:*:*:*
  • OR cpe:/o:sun:solaris:9::sparc:*:*:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:org.opensuse.security:def:20072868
    V
    CVE-2007-2868
    2015-11-16
    oval:org.mitre.oval:def:20321
    P
    DSA-1305-1 icedove - several vulnerabilities
    2014-06-23
    oval:org.mitre.oval:def:18785
    P
    DSA-1300-1 iceape
    2014-06-23
    oval:org.mitre.oval:def:18918
    P
    DSA-1306-1 xulrunner
    2014-06-23
    oval:org.mitre.oval:def:18949
    P
    DSA-1308-1 iceweasel - several vulnerabilities
    2014-06-23
    oval:org.mitre.oval:def:22347
    P
    ELSA-2007:0400: firefox security update (Critical)
    2014-05-26
    oval:org.mitre.oval:def:22350
    P
    ELSA-2007:0401: thunderbird security update (Critical)
    2014-05-26
    oval:org.mitre.oval:def:10711
    V
    Multiple vulnerabilities in the JavaScript engine for Mozilla Firefox 1.5.x before 1.5.0.12 and 2.x before 2.0.0.4, Thunderbird 1.5.x before 1.5.0.12 and 2.x before 2.0.0.4, and SeaMonkey 1.0.9 and 1.1.2 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via vectors that trigger memory corruption.
    2013-04-29
    oval:org.debian:def:1308
    V
    several vulnerabilities
    2007-06-14
    oval:org.debian:def:1305
    V
    several vulnerabilities
    2007-06-13
    oval:org.debian:def:1306
    V
    several vulnerabilities
    2007-06-12
    oval:org.debian:def:1300
    V
    several vulnerabilities
    2007-06-07
    oval:com.redhat.rhsa:def:20070400
    P
    RHSA-2007:0400: firefox security update (Critical)
    2007-05-31
    oval:com.redhat.rhsa:def:20070401
    P
    RHSA-2007:0401: thunderbird security update (Critical)
    2007-05-31
    oval:com.redhat.rhsa:def:20070402
    P
    RHSA-2007:0402: seamonkey security update (Critical)
    2007-05-31
    BACK
    mozilla firefox 1.5
    mozilla firefox 1.5.0.1
    mozilla firefox 1.5.0.2
    mozilla firefox 1.5.0.3
    mozilla firefox 1.5.0.4
    mozilla firefox 1.5.0.5
    mozilla firefox 1.5.0.6
    mozilla firefox 1.5.0.7
    mozilla firefox 1.5.0.8
    mozilla firefox 1.5.0.9
    mozilla firefox 1.5.0.10
    mozilla firefox 1.5.0.11
    mozilla firefox 2.0
    mozilla firefox 2.0.0.1
    mozilla firefox 2.0.0.2
    mozilla firefox 2.0.0.3
    mozilla seamonkey 1.0.9
    mozilla seamonkey 1.1.2
    mozilla thunderbird 1.5
    mozilla thunderbird 1.5.0.1
    mozilla thunderbird 1.5.0.2
    mozilla thunderbird 1.5.0.3
    mozilla thunderbird 1.5.0.4
    mozilla thunderbird 1.5.0.6
    mozilla thunderbird 1.5.0.7
    mozilla thunderbird 1.5.0.8
    mozilla thunderbird 1.5.0.9
    mozilla thunderbird 1.5.0.10
    mozilla thunderbird 1.5.0.11
    mozilla thunderbird 2.0.0.0
    mozilla thunderbird 2.0.0.1
    mozilla thunderbird 2.0.0.2
    mozilla thunderbird 2.0.0.3
    mozilla firefox 2.0
    mozilla firefox 1.5
    mozilla thunderbird 1.5
    mozilla firefox 1.5.0.2
    mozilla firefox 1.5.0.3
    mozilla firefox 1.5.0.4
    mozilla firefox 1.5.0.6
    mozilla firefox 1.5.0.7
    mozilla thunderbird 1.5.0.7
    mozilla thunderbird 1.5.0.9
    mozilla firefox 1.5.0.9
    mozilla firefox 2.0.0.1
    mozilla firefox 2.0.0.2
    mozilla firefox 2.0.0.3
    mozilla thunderbird 1.5.0.10
    mozilla thunderbird 1.5.0.11
    mozilla thunderbird 1.5.0.6
    mozilla thunderbird 1.5.0.8
    mozilla thunderbird 1.5.0.4
    mozilla thunderbird 1.5.0.3
    mozilla thunderbird 1.5.0.2
    mozilla thunderbird 1.5.0.1
    mozilla thunderbird 2.0.0.3
    mozilla thunderbird 2.0.0.2
    mozilla thunderbird 2.0.0.1
    mozilla seamonkey 1.1.2
    mozilla thunderbird 2.0.0.0
    mozilla seamonkey 1.0.9
    mozilla firefox 1.5.0.1
    mozilla firefox 1.5.0.10
    mozilla firefox 1.5.0.11
    mozilla firefox 1.5.0.5
    mozilla firefox 1.5.0.8
    sun solaris 8
    gentoo linux *
    redhat enterprise linux 2.1
    redhat enterprise linux 2.1
    redhat enterprise linux 2.1
    redhat enterprise linux 3
    redhat enterprise linux 3
    redhat enterprise linux 3
    sun solaris 8
    sun solaris 9
    redhat enterprise linux 3
    mandrakesoft mandrake linux corporate server 3.0
    redhat enterprise linux 4
    redhat enterprise linux 4
    novell linux desktop 9
    redhat enterprise linux 4
    redhat enterprise linux 4
    novell open enterprise server *
    sun solaris 10
    sun solaris 10
    redhat linux advanced workstation 2.1
    canonical ubuntu 6.06
    novell suse linux enterprise server 10 sp2
    mandrakesoft mandrake linux 2007
    mandrakesoft mandrake linux 2007
    mandrakesoft mandrake linux corporate server 4.0
    mandrakesoft mandrake linux corporate server 4.0
    mandrakesoft mandrake linux corporate server 3.0
    turbolinux turbolinux fuji
    turbolinux turbolinux personal *
    turbolinux turbolinux home *
    turbolinux turbolinux multimedia *
    redhat enterprise linux desktop 5.0
    redhat enterprise linux 5
    redhat enterprise linux 5
    mandrakesoft mandrake linux 2007.1
    mandrakesoft mandrake linux 2008.0
    debian debian linux 4.0
    canonical ubuntu 7.04
    redhat enterprise linux 5
    redhat enterprise linux 5
    mandrakesoft mandrake linux 2007.1
    redhat enterprise linux 4.5.z
    redhat enterprise linux 4.5.z
    novell open enterprise server *
    novell opensuse 10.2
    sun solaris 9