On 12/16/2008 12:09 PM, Robert Kaiser wrote:
> Hi all,
> 
> Today, the SeaMonkey project released a new version of its all-in-one 
> internet suite. SeaMonkey 1.1.14 closes several security vulnerabilities 
> and fixes several smaller problems found in previous versions. With 
> that, SeaMonkey stays at the same level of security as its sibling 
> Firefox 2, which is issuing updates for the same problems this week as well.
> 
> The SeaMonkey team urges users of older SeaMonkey versions, including 
> the SeaMonkey 1.0.x series, which no longer receives security updates, 
> to upgrade. Additionally, the team continues to strongly urge people 
> still using the old Mozilla Suite or Netscape 4, 6 or 7 to upgrade to 
> the new SeaMonkey 1.1.14 version. All these older software packages 
> suffer from a large and steadily increasing number of security 
> vulnerabilities because they are no longer being maintained. SeaMonkey 
> 1.1.14 is a modern, drop-in replacement, providing the same familiar 
> suite functionality with additional features and fully up to date security.
> 
> SeaMonkey 1.1.14 is available for free download from the open source 
> project's website at www.seamonkey-project.org.
> 
> Full news article:
> http://www.seamonkey-project.org/news#2008-12-16
> 
> Downloads for all available platforms and languages:
> http://www.seamonkey-project.org/releases/#1.1.14
> 
> Release notes:
> http://www.seamonkey-project.org/releases/seamonkey1.1.14/
> 
> Greetings,
> 
> Robert Kaiser
> SeaMonkey Council member

<http://www.mozilla.org/security/known-vulnerabilities/seamonkey11.html#seamonkey1.1.14>

Shouldn't:

Fixed in SeaMonkey 1.1.13
MFSA 2008-68 XSS and JavaScript privilege escalation
MFSA 2008-67 Escaped null characters ignored by CSS parser
MFSA 2008-66 Errors parsing URLs with leading whitespace and control
characters
MFSA 2008-65 Cross-domain data theft via script redirect error message
MFSA 2008-64 XMLHttpRequest 302 response disclosure
MFSA 2008-61 Information stealing via loadBindingDocument
MFSA 2008-60 Crashes with evidence of memory corruption
(rv:1.9.0.5/1.8.1.19)

Read:
Fixed in SeaMonkey 1.1.14
MFSA 2008-68 XSS and JavaScript privilege escalation
MFSA 2008-67 Escaped null characters ignored by CSS parser
MFSA 2008-66 Errors parsing URLs with leading whitespace and control
characters
MFSA 2008-65 Cross-domain data theft via script redirect error message
MFSA 2008-64 XMLHttpRequest 302 response disclosure
MFSA 2008-61 Information stealing via loadBindingDocument
MFSA 2008-60 Crashes with evidence of memory corruption
(rv:1.9.0.5/1.8.1.19)
_______________________________________________
support-seamonkey mailing list
support-seamonkey@lists.mozilla.org
https://lists.mozilla.org/listinfo/support-seamonkey

Reply via email to