CERT mailing list archives

Current Activity - Mozilla Releases Multiple Updates


From: Current Activity <us-cert () us-cert gov>
Date: Wed, 3 Apr 2013 13:16:56 -0400

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

National Cyber Awareness System
Mozilla Releases Multiple Updates


Original release date: April 03, 2013

The Mozilla Foundation has released updates to address multiple
vulnerabilities. These vulnerabilities could allow an attacker to
initiate a cross-site scripting attack or obtain sensitive information,
enable privilege escalation or execute arbitrary code, or cause a
denial-of-service condition.

Updates to the following products are available:
 * Firefox 20
 * Firefox ESR 17.0.5
 * Thunderbird 17.0.5
 * Thunderbird ESR 17.0.5
 * SeaMonkey 2.17

US-CERT encourages users and administrators to review the Mozilla
Foundation Advisories for Firefox 20, Firefox ESR 17.0.5, Thunderbird
17.0.5, Thunderbird ESR 17.0.5, and SeaMonkey 2.17 and apply any
necessary updates to help mitigate the risk.

Relevant URL(s):
<http://www.mozilla.org/security/known-vulnerabilities/firefox.html>

<http://www.mozilla.org/security/known-vulnerabilities/firefoxESR.html>

<http://www.mozilla.org/security/known-vulnerabilities/seamonkey.html>

<http://www.mozilla.org/security/known-vulnerabilities/thunderbirdESR.html>

<http://www.mozilla.org/security/known-vulnerabilities/thunderbird.html>

____________________________________________________________________

   Produced by US-CERT, a government organization.
____________________________________________________________________

This product is provided subject to this Notification:
http://www.us-cert.gov/privacy/notification/

Privacy & Use policy:
http://www.us-cert.gov/privacy/

This document can also be found at
http://www.us-cert.gov/ncas/current-activity/2013/04/03/Mozilla-Releases-Multiple-Updates

For instructions on subscribing to or unsubscribing from this
mailing list, visit http://www.us-cert.gov/mailing-lists-and-feeds/

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.5 (GNU/Linux)

iQEVAwUBUVxj/HdnhE8Qi3ZhAQLd4Qf/UninZ0Wh6C2kWJMpwrGRvFE4GfFb/M1w
D62L2EiJ2Z7phz3NCCKPAq0PI2wVf36aG8i5OzBOHSthRpRQKGwXiMOH9HbcsK5W
fMPfCneBCJQNZCyp9wmS8PBhj1QIUF6rfeNETCw6z/M2Vp42090gCaxU8fz1R1MI
OR6vUNXq/PQtAITBtFays7Tm//LDriYVG/eQxQRFgPxolNkb/zL4CbU/jRSGF+sz
MLaKH+ORh5tDaC7cfKqwo49IbGaa1zHDxGcz+zZzUerN2tUy7FSEPdIiOpFPm3pm
glUj16tVyp7GYrNKHkUr2AFRr7Xsxf3PnfwmQGOpfpEqjXVFy1ESsw==
=HgF9
-----END PGP SIGNATURE-----


Current thread: