-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- -------------------------------------------------------------------------
Debian Security Advisory DSA-2556-1                   security@debian.org
http://www.debian.org/security/                                Nico Golde
October 07, 2012                       http://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : icedove
Vulnerability  : several
Problem type   : remote
Debian-specific: no
CVE ID         : CVE-2012-1970 CVE-2012-1972 CVE-2012-1973 CVE-2012-1974
                 CVE-2012-1975 CVE-2012-1976 CVE-2012-3959 CVE-2012-3962
                 CVE-2012-3969 CVE-2012-3972 CVE-2012-3978

Several vulnerabilities were discovered in Icedove, Debian's version
of the Mozilla Thunderbird mail and news client.

This includes several instances of use-after-free and buffer overflow
issues.  The reported vulnerabilities could lead to the execution of
arbitrary code, and additionally to the bypass of content-loading
restrictions via the location object.

For the stable distribution (squeeze), this problem has been fixed in
version 3.0.11-1+squeeze13.

For the testing distribution (wheezy), this problem has been fixed in
version 10.0.7-1.

For the unstable distribution (sid), this problem has been fixed in
version 10.0.7-1.


We recommend that you upgrade your icedove packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: http://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org

Debian: DSA-2556-1: icedove security update

October 7, 2012
Several vulnerabilities were discovered in Icedove, Debian's version of the Mozilla Thunderbird mail and news client

Summary

Several vulnerabilities were discovered in Icedove, Debian's version
of the Mozilla Thunderbird mail and news client.

This includes several instances of use-after-free and buffer overflow
issues. The reported vulnerabilities could lead to the execution of
arbitrary code, and additionally to the bypass of content-loading
restrictions via the location object.

For the stable distribution (squeeze), this problem has been fixed in
version 3.0.11-1+squeeze13.

For the testing distribution (wheezy), this problem has been fixed in
version 10.0.7-1.

For the unstable distribution (sid), this problem has been fixed in
version 10.0.7-1.


We recommend that you upgrade your icedove packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: http://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org


Severity
Package : icedove
Vulnerability : several
Problem type : remote
Debian-specific: no
CVE ID : CVE-2012-1970 CVE-2012-1972 CVE-2012-1973 CVE-2012-1974
CVE-2012-1975 CVE-2012-1976 CVE-2012-3959 CVE-2012-3962
CVE-2012-3969 CVE-2012-3972 CVE-2012-3978

Related News