https://access.redhat.com/security/cve/cve-2009-1563
https://access.redhat.com/security/cve/cve-2009-3274
https://access.redhat.com/security/cve/cve-2009-3375
https://access.redhat.com/security/cve/cve-2009-3376
https://access.redhat.com/security/cve/cve-2009-3380
https://access.redhat.com/security/cve/cve-2009-3384
Severity: Critical
ID: 42288
File Name: redhat-RHSA-2009-1531.nasl
Version: 1.25
Type: local
Agent: unix
Family: Red Hat Local Security Checks
Published: 10/28/2009
Updated: 1/14/2021
Supported Sensors: Agentless Assessment, Continuous Assessment, Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus Agent, Nessus
Risk Factor: Medium
Score: 6.7
Risk Factor: Critical
Base Score: 10
Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C
CPE: p-cpe:/a:redhat:enterprise_linux:seamonkey-js-debugger, p-cpe:/a:redhat:enterprise_linux:seamonkey, p-cpe:/a:redhat:enterprise_linux:seamonkey-nspr, p-cpe:/a:redhat:enterprise_linux:seamonkey-dom-inspector, p-cpe:/a:redhat:enterprise_linux:seamonkey-devel, p-cpe:/a:redhat:enterprise_linux:seamonkey-mail, p-cpe:/a:redhat:enterprise_linux:seamonkey-chat, cpe:/o:redhat:enterprise_linux:3, cpe:/o:redhat:enterprise_linux:4, p-cpe:/a:redhat:enterprise_linux:seamonkey-nss-devel, p-cpe:/a:redhat:enterprise_linux:seamonkey-nspr-devel, cpe:/o:redhat:enterprise_linux:4.8, p-cpe:/a:redhat:enterprise_linux:seamonkey-nss
Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/cpu
Patch Publication Date: 10/27/2009
Vulnerability Publication Date: 9/21/2009
CVE: CVE-2009-0689, CVE-2009-3274, CVE-2009-3372, CVE-2009-3373, CVE-2009-3375, CVE-2009-3376, CVE-2009-3380, CVE-2009-3384, CVE-2009-3385