Linux Security
    Linux Security
    Linux Security

    Debian: iceape fix several vulnerabilities DSA-1300-1

    Date 07 Jun 2007
    Posted By LinuxSecurity Advisories
    Several remote vulnerabilities have been discovered in the Iceape internet suite, an unbranded version of the Seamonkey Internet Suite. The Common Vulnerabilities and Exposures project identifies the following problem and others. Nicolas Derouet discovered that Iceape performs insufficient validation of cookies, which could lead to denial of service.
    - --------------------------------------------------------------------------
    Debian Security Advisory DSA 1300-1                    This email address is being protected from spambots. You need JavaScript enabled to view it.                         Moritz Muehlenhoff
    June 7th, 2007                
    - --------------------------------------------------------------------------
    Package        : iceape
    Vulnerability  : several
    Problem-Type   : remote
    Debian-specific: no
    CVE ID         : CVE-2007-1362 CVE-2007-1558 CVE-2007-2867 CVE-2007-2868 CVE-2007-2870 CVE-2007-2871
    Several remote vulnerabilities have been discovered in the Iceape internet
    suite, an unbranded version of the Seamonkey Internet Suite. The Common
    Vulnerabilities and Exposures project identifies the following problems:
        Nicolas Derouet discovered that Iceape performs insufficient 
        validation of cookies, which could lead to denial of service.
        Gatan Leurent discovered a cryptographical weakness in APOP
        authentication, which reduces the required efforts for an MITM attack
        to intercept a password. The update enforces stricter validation, which
        prevents this attack.
        Boris Zbarsky, Eli Friedman, Georgi Guninski, Jesse Ruderman, Martijn
        Wargers and Olli Pettay discovered crashes in the layout engine, which
        might allow the execution of arbitrary code.
        Brendan Eich, Igor Bukanov, Jesse Ruderman, moz_bug_r_a4 and Wladimir Palant
        discovered crashes in the javascript engine, which might allow the execution of
        arbitrary code.
        "moz_bug_r_a4" discovered that adding an event listener through the
         addEventListener() function allows cross-site scripting.
        Chris Thomas discovered that XUL popups can can be abused for spoofing or
        phishing attacks.
    Fixes for the oldstable distribution (sarge) are not available. While there
    will be another round of security updates for Mozilla products, Debian doesn't
    have the ressources to backport further security fixes to the old Mozilla
    products. You're strongly encouraged to upgrade to stable as soon as possible.
    For the stable distribution (etch) these problems have been fixed in version
    1.0.9-0etch1. A build for the arm architecture is not yet available, it will
    be provided later.
    The unstable distribution (sid) will be fixed soon.
    We recommend that you upgrade your iceape packages.
    Upgrade Instructions
    - --------------------
    wget url
            will fetch the file for you
    dpkg -i file.deb
            will install the referenced file.
    If you are using the apt-get package manager, use the line for
    sources.list as given below:
    apt-get update
            will update the internal database
    apt-get upgrade
            will install corrected packages
    You may use an automated update by adding the resources from the
    footer to the proper configuration.
    Debian GNU/Linux 4.0 alias etch
    - -------------------------------
      Source archives:
          Size/MD5 checksum:     1403 fac51ae60382306a1f5937d393cad9b8
          Size/MD5 checksum:   265235 f0632d0ab1011723516b42ddc3fbf077
          Size/MD5 checksum: 42936008 f3f2409c45e5e48124159f71c3f305db
      Architecture independent components:
          Size/MD5 checksum:   278514 abeb91d6d747fbd2a2dc4c53a0c1b730
          Size/MD5 checksum:  3655228 aeaa72117bdef3db570d175294003567
          Size/MD5 checksum:    27642 2c103331d2f75caab26dc5c5c5b53db5
          Size/MD5 checksum:    27172 6461173091e780104247676063370dd4
          Size/MD5 checksum:    26244 3a26fad0fccac9cb3f0a3826eaba0398
          Size/MD5 checksum:    26258 6c114441ed304d22a68626e641714a32
          Size/MD5 checksum:    26380 36e2977fd80cdf0e5132d3e5d3d7566f
          Size/MD5 checksum:    26280 4f803f93ba3146cf3568a8255d7ff1ce
          Size/MD5 checksum:    26276 fc04a5e05749f469061437aebce7e25c
          Size/MD5 checksum:    26266 b14a9f36ebf0b29133dd6d136d74b1d4
          Size/MD5 checksum:    26248 ffa152a5ad9a647f7b6c7b509542b6c4
          Size/MD5 checksum:    26240 ef0a008c5d7c4d832dde3bb10fa06ef1
      Alpha architecture:
          Size/MD5 checksum: 12865430 8418f1985dc4615ef0507f14c06ab65a
          Size/MD5 checksum:   625182 0a1b310be2bd861d5686b03b9ac1ad4a
          Size/MD5 checksum: 60530626 66a769a586e4bce6abfcae5f31abd779
          Size/MD5 checksum:   196750 364d4c0c512880760c200dcc796100cc
          Size/MD5 checksum:    52960 1c12d82410100d48a17ec75c4fc0c0d4
          Size/MD5 checksum:  2281764 4955a49cf9ef25f24ffd37768864564d
      AMD64 architecture:
          Size/MD5 checksum: 11647006 a84a6860787ef130576e7fb11f8eabec
          Size/MD5 checksum:   608506 1bf656a5edc44eb320997a42a1fad33c
          Size/MD5 checksum: 59537150 2ed3859e18f3bab0b6b48e6d91e653c3
          Size/MD5 checksum:   193924 7b741afe2710da66e2306f681a8323a5
          Size/MD5 checksum:    52456 c762266f74dd5db459d4b40763c70d10
          Size/MD5 checksum:  2090278 1fff0ff3907d8990df3874a295ab795b
      HP Precision architecture:
          Size/MD5 checksum: 12941432 53b838fbda55ae87993a2be1bb8787f6
          Size/MD5 checksum:   614398 15b391e088060d1065354384af4dd688
          Size/MD5 checksum: 60391748 e26a56439db9415ae0226c4fa28c2e79
          Size/MD5 checksum:   196962 cb87bee865d7f77a525d3e75707c50a0
          Size/MD5 checksum:    53538 93a72fdb9dacbf0f690a6c20222842a5
          Size/MD5 checksum:  2338650 4e68071e6271350ad331f6f387328450
      Intel IA-32 architecture:
          Size/MD5 checksum: 10454294 da901720379e4b1bad94459ba8053687
          Size/MD5 checksum:   587850 ec7ad19e450d2490ff3ebd1b50bf4096
          Size/MD5 checksum: 58613040 7ffa59d625d92dd2975c8df5ffe773c7
          Size/MD5 checksum:   188602 970dba31c02d4fecf9418f4d2e783dff
          Size/MD5 checksum:    47562 a8435ff7e0e9256fd18dba5563a52f61
          Size/MD5 checksum:  1889432 af7c62e7b76245ca48a8253beb9d450d
      Intel IA-64 architecture:
          Size/MD5 checksum: 15756760 95de0b7bb5cd9b7f4f9f30b6eb0880cd
          Size/MD5 checksum:   660486 7903f3f9c0dc33d2a603d67ec1796d4f
          Size/MD5 checksum: 59810372 007d904791cfd676855b88dcb837f8ee
          Size/MD5 checksum:   203602 e6ec5ad7093347c8bae4a4bf5232ba98
          Size/MD5 checksum:    61072 976efb7973f37f1dea1304d65aeaac3f
          Size/MD5 checksum:  2815398 1e2078b5d7adab616fa3f5dc16bee183
      Big endian MIPS architecture:
          Size/MD5 checksum: 11102688 a2332134ba7eca56ea9d2fd2300d38fd
          Size/MD5 checksum:   598284 8db74e82ba6915c61ad634cd2997c34e
          Size/MD5 checksum: 61397714 de6b3f48f35ad453900025ec3de34baf
          Size/MD5 checksum:   190580 089d2bfc82e5bbccd28e2d39d63ff3e5
          Size/MD5 checksum:    49058 fba4238a8887be242521fc1b13329a68
          Size/MD5 checksum:  1955378 a5e472ed92e8be52cee996d111210732
      Little endian MIPS architecture:
          Size/MD5 checksum: 10890126 da61a2407cb332806ef54f30c6683055
          Size/MD5 checksum:   594906 6da11b3f0e5da40aac23e8fcea295405
          Size/MD5 checksum: 59749198 d336210141b28e1e54c351d7da403e76
          Size/MD5 checksum:   190102 a5619388f97802a39a7ebd8e72930581
          Size/MD5 checksum:    48856 85ccbe07938b1b0bd7c2bb6f5116b1e5
          Size/MD5 checksum:  1940148 1f5dd8c10e94e3362ef3ce6abca7665c
      PowerPC architecture:
          Size/MD5 checksum: 11286956 52990bdec220bab9968d859c79e8cbe8
          Size/MD5 checksum:   595182 6f9393fc2c13eea7e281a57b6955cd05
          Size/MD5 checksum: 61536458 981f8b40052ab8a3d78fbd7a90acedf7
          Size/MD5 checksum:   190982 d7e50ff547bf3a4f7633ab5dd56c8e9e
          Size/MD5 checksum:    48376 9409001d405fdbf55a9825ee3f60cf85
          Size/MD5 checksum:  2005444 0b699049484cc571b7516efc43afd6ad
      IBM S/390 architecture:
          Size/MD5 checksum: 12266856 9014128ea5980d3ee1c6203883ec3d42
          Size/MD5 checksum:   610568 1f7d3b6e02bca35cac33df9083ec5809
          Size/MD5 checksum: 60291956 fb54cc2a913940344cd70799511ac524
          Size/MD5 checksum:   195766 9a53913dc7c84a73b32aa438f51e5c36
          Size/MD5 checksum:    53044 2b8eeeeacfdc9fbbf891103af7b97e08
          Size/MD5 checksum:  2184358 c233670f97859a3e1e18ae168cd4a1c6
      Sun Sparc architecture:
          Size/MD5 checksum: 10634168 95edbd8c95e760fef36e0ca194fc1c23
          Size/MD5 checksum:   584234 50ca6c5a2b8031467cf7e77aba71f9d8
          Size/MD5 checksum: 58430974 883810feeb6d0e95df3cbe98899e3103
          Size/MD5 checksum:   188526 4b3615b67bda657d68b2922a6a1dffe8
          Size/MD5 checksum:    47082 4089406c7cefccf3692c8d4dba2119a7
          Size/MD5 checksum:  1894500 9a1ce67eca6cfbc42c2394783ed10234
      These files will probably be moved into the stable distribution on
      its next update.
    - ---------------------------------------------------------------------------------
    For apt-get: deb stable/updates main
    For dpkg-ftp: dists/stable/updates/main
    Mailing list: This email address is being protected from spambots. You need JavaScript enabled to view it.

    LinuxSecurity Poll

    Which is the best secure Linux distro for pentesting?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    [{"id":"174","title":"Kali Linux","votes":"20","type":"x","order":"1","pct":62.5,"resources":[]},{"id":"175","title":"Parrot OS","votes":"11","type":"x","order":"2","pct":34.38,"resources":[]},{"id":"176","title":"BlackArch Linux","votes":"1","type":"x","order":"3","pct":3.13,"resources":[]}] ["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"] ["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"] 350

    Please vote first in order to view vote results.


    bottom 200

    Please enable / Bitte aktiviere JavaScript!
    Veuillez activer / Por favor activa el Javascript![ ? ]

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.