https://access.redhat.com/security/cve/cve-2009-0652
https://access.redhat.com/security/cve/cve-2009-1303
https://access.redhat.com/security/cve/cve-2009-1305
https://access.redhat.com/security/cve/cve-2009-1306
https://access.redhat.com/security/cve/cve-2009-1307
https://access.redhat.com/security/cve/cve-2009-1309
https://access.redhat.com/security/cve/cve-2009-1311
Severity: Medium
ID: 36214
File Name: redhat-RHSA-2009-0437.nasl
Version: 1.33
Type: local
Agent: unix
Family: Red Hat Local Security Checks
Published: 4/22/2009
Updated: 1/14/2021
Supported Sensors: Agentless Assessment, Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus Agent, Nessus
Risk Factor: Medium
Score: 6.6
Risk Factor: Medium
Base Score: 6.8
Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P
CPE: p-cpe:/a:redhat:enterprise_linux:seamonkey, p-cpe:/a:redhat:enterprise_linux:seamonkey-chat, p-cpe:/a:redhat:enterprise_linux:seamonkey-devel, p-cpe:/a:redhat:enterprise_linux:seamonkey-dom-inspector, p-cpe:/a:redhat:enterprise_linux:seamonkey-js-debugger, p-cpe:/a:redhat:enterprise_linux:seamonkey-mail, p-cpe:/a:redhat:enterprise_linux:seamonkey-nspr, p-cpe:/a:redhat:enterprise_linux:seamonkey-nspr-devel, p-cpe:/a:redhat:enterprise_linux:seamonkey-nss, p-cpe:/a:redhat:enterprise_linux:seamonkey-nss-devel, cpe:/o:redhat:enterprise_linux:2.1, cpe:/o:redhat:enterprise_linux:3, cpe:/o:redhat:enterprise_linux:4, cpe:/o:redhat:enterprise_linux:4.7
Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/cpu
Exploit Available: true
Exploit Ease: Exploits are available
Patch Publication Date: 4/21/2009
Vulnerability Publication Date: 2/20/2009
CVE: CVE-2009-0652, CVE-2009-1303, CVE-2009-1305, CVE-2009-1306, CVE-2009-1307, CVE-2009-1309, CVE-2009-1311, CVE-2009-1312