CERT mailing list archives

Current Activity - Mozilla Releases Multiple Updates


From: Current Activity <us-cert () us-cert gov>
Date: Wed, 18 Jul 2012 13:53:24 -0400

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

US-CERT Current Activity

Mozilla Releases Multiple Updates

Original release date: Wednesday, July 18, 2012 at 12:21 pm
Last revised: Wednesday, July 18, 2012 at 12:21 pm


The Mozilla Foundation has released updates for the following products
to address multiple vulnerabilities:

 * Firefox 14
 * Firefox ESR 10.0.6
 * Thunderbird 14
 * Thunderbird ESR 10.0.6
 * SeaMonkey 2.11



These vulnerabilities may allow an attacker to execute arbitrary code,
cause a denial-of-service condition, disclose sensitive information,
operate with elevated privileges, bypass security restrictions, or
perform a cross-site scripting attack.

US-CERT encourages users and administrators to review the Mozilla
Foundation Advisory for Firefox 14, Firefox ESR 10.0.6, Thunderbird 14,
Thunderbird ESR 10.0.6, and SeaMonkey 2.11 and apply any necessary
updates to help mitigate the risk.

Relevant Url(s):
<http://www.mozilla.org/security/known-vulnerabilities/firefox.html>

<http://www.mozilla.org/security/known-vulnerabilities/firefoxESR.html>

<http://www.mozilla.org/security/known-vulnerabilities/seamonkey.html>

<http://www.mozilla.org/security/known-vulnerabilities/thunderbirdESR.html>

<http://www.mozilla.org/security/known-vulnerabilities/thunderbird.html>


____________________________________________________________________

   Produced by US-CERT, a government organization.
____________________________________________________________________

This product is provided subject to this Notification:
http://www.us-cert.gov/privacy/notification.html

Privacy & Use policy:
http://www.us-cert.gov/privacy/

This document can also be found at
http://www.us-cert.gov/current/#mozilla_releases_multiple_updates2

For instructions on subscribing to or unsubscribing from this
mailing list, visit http://www.us-cert.gov/cas/signup.html

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.5 (GNU/Linux)

iQEVAwUBUAb4DHdnhE8Qi3ZhAQInowf/RbMEDtc+i3Dxph6ogGG68O0v8XvWaeIo
3km85F2nkz0nt1OZUExCYIUrV1+fIuFHJcV4gIUKrwBJpcLkrCXkpbpsd0x/zEt6
NBncdKbZId+XlsjS9VODC/MCcypxWr3muOzYRINSM4ox8E32hm8Zb+q/oVvtyJ6t
NuIZzDrLO1LF2e3jpimTeFanlcKfAPFv2inMr2qcxR7jMbJt20K1glqvV2K5l3pk
tnUCxV84mwJgyyBxa9Nc1gJu6y3EhblV0qYWyHvIxPEChvnIZRBgD1M2LEYuT8Gt
4DeXNe39DoiNlFMbgcL1Z3dLKuQCvR2c393gYKuhIGlJY9yPuzHXkA==
=drYW
-----END PGP SIGNATURE-----


Current thread: