Language:
https://access.redhat.com/security/cve/cve-2011-0083
https://access.redhat.com/security/cve/cve-2011-0085
https://access.redhat.com/security/cve/cve-2011-2362
https://access.redhat.com/security/cve/cve-2011-2363
https://access.redhat.com/security/cve/cve-2011-2364
https://access.redhat.com/security/cve/cve-2011-2365
https://access.redhat.com/security/cve/cve-2011-2371
https://access.redhat.com/security/cve/cve-2011-2373
https://access.redhat.com/security/cve/cve-2011-2374
https://access.redhat.com/security/cve/cve-2011-2375
https://access.redhat.com/security/cve/cve-2011-2376
https://access.redhat.com/security/cve/cve-2011-2377
Severity: Critical
ID: 55401
File Name: redhat-RHSA-2011-0888.nasl
Version: 1.22
Type: local
Agent: unix
Family: Red Hat Local Security Checks
Published: 6/22/2011
Updated: 1/14/2021
Supported Sensors: Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus Agent, Agentless Assessment, Frictionless Assessment Agent, Nessus
Risk Factor: Critical
Score: 9.6
Risk Factor: Critical
Base Score: 10
Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C
CPE: p-cpe:/a:redhat:enterprise_linux:seamonkey, p-cpe:/a:redhat:enterprise_linux:seamonkey-chat, p-cpe:/a:redhat:enterprise_linux:seamonkey-devel, p-cpe:/a:redhat:enterprise_linux:seamonkey-dom-inspector, p-cpe:/a:redhat:enterprise_linux:seamonkey-js-debugger, p-cpe:/a:redhat:enterprise_linux:seamonkey-mail, cpe:/o:redhat:enterprise_linux:4, cpe:/o:redhat:enterprise_linux:4.8
Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/cpu
Exploit Available: true
Exploit Ease: Exploits are available
Patch Publication Date: 6/21/2011
Vulnerability Publication Date: 6/30/2011
CANVAS (CANVAS)
Metasploit (Mozilla Firefox Array.reduceRight() Integer Overflow)
CVE: CVE-2011-0083, CVE-2011-0085, CVE-2011-2362, CVE-2011-2363, CVE-2011-2364, CVE-2011-2365, CVE-2011-2371, CVE-2011-2373, CVE-2011-2374, CVE-2011-2375, CVE-2011-2376, CVE-2011-2377, CVE-2011-2605
RHSA: 2011:0888