Linux Security
Linux Security
Linux Security

Debian: iceape fix several vulnerabilities DSA-1506-1

Date 24 Feb 2008
Posted By LinuxSecurity Advisories
Several remote vulnerabilities have been discovered in the Iceape internet suite, an unbranded version of the Seamonkey Internet Suite. The Common Vulnerabilities and Exposures project identifies the following problems: Jesse Ruderman, Kai Engert, Martijn Wargers, Mats Palmgren and Paul Nickerson discovered crashes in the layout engine, which might allow the execution of arbitrary code.
- ------------------------------------------------------------------------
Debian Security Advisory DSA-1506-1                  This email address is being protected from spambots. You need JavaScript enabled to view it.                       Moritz Muehlenhoff
February 24, 2008           
- ------------------------------------------------------------------------

Package        : iceape
Vulnerability  : several
Problem-Type   : remote
Debian-specific: no
CVE ID         : CVE-2008-0412 CVE-2008-0413 CVE-2008-0414 CVE-2008-0415
                 CVE-2008-0417 CVE-2008-0418 CVE-2008-0419 CVE-2008-0591
                 CVE-2008-0592 CVE-2008-0593 CVE-2008-0594

Several remote vulnerabilities have been discovered in the Iceape internet
suite, an unbranded version of the Seamonkey Internet Suite. The Common
Vulnerabilities and Exposures project identifies the following problems:


    Jesse Ruderman, Kai Engert, Martijn Wargers, Mats Palmgren and Paul
    Nickerson discovered crashes in the layout engine, which might allow
    the execution of arbitrary code.


    Carsten Book, Wesley Garland, Igor Bukanov, "moz_bug_r_a4", "shutdown",
    Philip Taylor and "tgirmann" discovered crashes in the Javascript
    engine, which might allow the execution of arbitrary code.


    "hong" and Gregory Fleisher discovered that file input focus
    vulnerabilities in the file upload control could allow information
    disclosure of local files.


    "moz_bug_r_a4" and Boris Zbarsky discovered discovered several
    vulnerabilities in Javascript handling, which could allow
    privilege escalation.


    Justin Dolske discovered that the password storage machanism could
    be abused by malicious web sites to corrupt existing saved passwords.


    Gerry Eisenhaur and "moz_bug_r_a4" discovered that a directory
    traversal vulnerability in chrome: URI handling could lead to
    information disclosure.


    David Bloom discovered a race condition in the image handling of
    designMode elements, which can lead to information disclosure or
    potentially the execution of arbitrary code.


    Michal Zalewski discovered that timers protecting security-sensitive
    dialogs (which disable dialog elements until a timeout is reached)
    could be bypassed by window focus changes through Javascript.


    It was discovered that malformed content declarations of saved
    attachments could prevent a user in the opening local files
    with a ".txt" file name, resulting in minor denial of service.


    Martin Straka discovered that insecure stylesheet handling during
    redirects could lead to information disclosure.


    Emil Ljungdahl and Lars-Olof Moilanen discovered that phishing
    protections could be bypassed with 
elements. For the stable distribution (etch), these problems have been fixed in version 1.0.12~pre080131b-0etch1. The Mozilla releases from the old stable distribution (sarge) are no longer supported with security updates. We recommend that you upgrade your iceape packages. Upgrade instructions - -------------------- wget url will fetch the file for you dpkg -i file.deb will install the referenced file. If you are using the apt-get package manager, use the line for sources.list as given below: apt-get update will update the internal database apt-get upgrade will install corrected packages You may use an automated update by adding the resources from the footer to the proper configuration. Debian 4.0 (stable) - ------------------- Stable updates are available for alpha, amd64, arm, hppa, i386, ia64, mips, mipsel, powerpc, s390 and sparc. Source archives: Size/MD5 checksum: 43535826 39071cd311888d73254336b782109776 Size/MD5 checksum: 1439 eaee68845cb7d4660609f6c47ac01666 Size/MD5 checksum: 269895 fb6e3c3d3bc4a94773c1b4921fdb42d6 Architecture independent packages: Size/MD5 checksum: 27208 91bbb99fad75c41e2df1170749014288 Size/MD5 checksum: 27210 0233d457074aa58542b8662c2a54c48a Size/MD5 checksum: 27244 51f7e38462c1f39e0c662e4b58eca43a Size/MD5 checksum: 281870 1e8faf69c0bbf186f1a6c1d199646ce6 Size/MD5 checksum: 3927248 df30ff32e825d5ceb1630025a7d0ef88 Size/MD5 checksum: 27248 2b1e9711c1e80b9651b88e3dc19d4b76 Size/MD5 checksum: 28614 20c852fc8104981654bd6227a0602375 Size/MD5 checksum: 27232 97c0a7e4b71cc083c711086dd160322a Size/MD5 checksum: 27348 ad7233b5d98e1557cdc190d9cf6746df Size/MD5 checksum: 27236 8ae02d5d250866771250e19e5bb967bb Size/MD5 checksum: 27220 6035bbc507f4fc30a0564aa18c5a3a98 Size/MD5 checksum: 28186 4997ba36f2c9aacf25eb9c41bf104d6f alpha architecture (DEC Alpha) Size/MD5 checksum: 197832 c2be45e20e6834b19969e125925622a1 Size/MD5 checksum: 60612536 5fbbf1f26498f361c0aadc0535bdee92 Size/MD5 checksum: 53952 ef80eea66f161134bc52d0cdbf985f51 Size/MD5 checksum: 626136 542e77b2a6ad52a40d29ecafa76c15a7 Size/MD5 checksum: 2282858 e915238d369b469d5911e10d92be0e99 Size/MD5 checksum: 12884578 9b5912dc643b38e5d3120d34d8685f16 amd64 architecture (AMD x86_64 (AMD64)) Size/MD5 checksum: 59608524 146775d1bd21250e027006f9dbf90d6f Size/MD5 checksum: 613832 6cb81b62325770fd1e2590908d0afda7 Size/MD5 checksum: 195048 2ccb3800e4edcd8510d707a9ac4a5d7e Size/MD5 checksum: 11687282 2fc3db14be5dd03b082497ab6f9ffc36 Size/MD5 checksum: 53366 8789d8dd06e30ce580ab37e94ec1d44b Size/MD5 checksum: 2099654 99aef23fe234563ce99f3d8ce89b02d2 arm architecture (ARM) Size/MD5 checksum: 1916734 bdda1babe619d6f11429f1fb813fc347 Size/MD5 checksum: 10421094 4cf350729bfeff5f0a6edba041e72be7 Size/MD5 checksum: 58769074 99504f3ad7121ed31583e3c77c3086e2 Size/MD5 checksum: 586096 4c1e372a14bcbe1ec4b3046be24ced89 Size/MD5 checksum: 186930 33820091037a0e30e4271e8c8c462ff9 Size/MD5 checksum: 47526 5244fa8a247df56a3f14c364107dc5b8 hppa architecture (HP PA RISC) Size/MD5 checksum: 60480238 50ee40317fd63bd0c7d04022e21f8f76 Size/MD5 checksum: 2340460 70af4c1cfbd089e6a2ad548d1553093b Size/MD5 checksum: 12958476 f2acc587b4c985c6ea939ed1bba53de9 Size/MD5 checksum: 615240 7e3158df6d488c6b0bfe7827cfce37ed Size/MD5 checksum: 54444 c7ddb1f77645cd60689dbb7a5c4b2768 Size/MD5 checksum: 198108 967170dcf4a4a1d6687d2d0b55edaec8 i386 architecture (Intel ia32) Size/MD5 checksum: 1891212 ba923a32b2a34a9299cb4d5a8bad2d77 Size/MD5 checksum: 10469782 994f4b0fd8e4bd9af76fe013c7123bdc Size/MD5 checksum: 588886 5856c66a12bf5a984668743b8b366cee Size/MD5 checksum: 189766 ee9064d51a33a035b7a46de44d80249d Size/MD5 checksum: 58697388 299a8786d15d0abb99d7fc6fe4b87b7f Size/MD5 checksum: 48438 de1f808e760ee3ca502efb8276875fbf ia64 architecture (Intel ia64) Size/MD5 checksum: 661876 a673cbf8efb0be476d2cd23dc514704a Size/MD5 checksum: 61898 cccd1556f5ee674a2c2f6ddf71522b39 Size/MD5 checksum: 59883340 f6ee758cb0b235682f20e2e22edd870a Size/MD5 checksum: 2817080 c0adbe387222eedf4d5cf7eff91a4657 Size/MD5 checksum: 204694 8aa8c681d136482bd2cda6563eacbfb9 Size/MD5 checksum: 15783590 960303c76c2be69aad2e4b7bfe4f542e mips architecture (MIPS (Big Endian)) Size/MD5 checksum: 61481346 66bc2a72517409d5334bc0ba40be51fd Size/MD5 checksum: 599404 ff50ca675b598da75eb7f3ab08d34ee6 Size/MD5 checksum: 11154048 bd1cb7c5bc7136fd644eb9c87e7181b7 Size/MD5 checksum: 1959202 7eb50924f7400d84008edffd0e9d6413 Size/MD5 checksum: 49884 80c1be2a4afb6ce7bf9fc785901704dd Size/MD5 checksum: 190950 006169fb68cb210f51fe52090be5050e mipsel architecture (MIPS (Little Endian)) Size/MD5 checksum: 49768 42593decc9887241317c87567f8223b1 Size/MD5 checksum: 191194 78f3b008208527bf214ed516e85b13f3 Size/MD5 checksum: 59840612 0118b96a4f8d82286b8d5ccc946b6c0d Size/MD5 checksum: 10905670 9874cc963f87d284d927d467eafc8c2f Size/MD5 checksum: 595920 3024870501878bf13254165af3ac9686 Size/MD5 checksum: 1942002 130b8ab791ae8591e22d9635362bf202 powerpc architecture (PowerPC) Size/MD5 checksum: 49232 e526eb3de3861503a826593f582f2932 Size/MD5 checksum: 596206 da0aa1d500d126ef390da42e3b3bc973 Size/MD5 checksum: 192018 6278d2517e0d32b3e5c42aa2f0010aef Size/MD5 checksum: 61613310 b6b25ed7a498f98c3908efb7bd185e0a Size/MD5 checksum: 2006468 3253d618628235a609417783309079aa Size/MD5 checksum: 11304736 186491b14177328e4cdcc2c0599bee48 s390 architecture (IBM S/390) Size/MD5 checksum: 53962 937cb4b85e25812c189fde886a9ae8b8 Size/MD5 checksum: 196854 e838b4c9820b202ba25da00adca529e8 Size/MD5 checksum: 12282708 04c09a3bbbe96035301ffa3fa427d2e2 Size/MD5 checksum: 60369160 80e463d3e1abe4c6f2e44084c0af1cc6 Size/MD5 checksum: 611658 d51e50f35fa7f644e68719bd3c3e1cde Size/MD5 checksum: 2185818 4b702edba4ac2c7e85a22f499250fd40 sparc architecture (Sun SPARC/UltraSPARC) Size/MD5 checksum: 1895872 2eb1f20b00c11d4f4330016aaa827d55 Size/MD5 checksum: 10652974 8ea3ab5df7323a302c0b9441222fb407 Size/MD5 checksum: 58513948 a455a4a30f354129f5ab3441fcb422af Size/MD5 checksum: 585296 a57295461949681a7628c2c0aa603ccb Size/MD5 checksum: 48038 5cba2cf78058d6dd4609cb895961298d Size/MD5 checksum: 189644 bdc3c7725fed05757a888de08a4fa959 These files will probably be moved into the stable distribution on its next update. - --------------------------------------------------------------------------------- For apt-get: deb stable/updates main For dpkg-ftp: dists/stable/updates/main Mailing list: This email address is being protected from spambots. You need JavaScript enabled to view it.


LinuxSecurity Poll

How frequently do you patch/update your system?

No answer selected. Please try again.
Please select either existing option or enter your own, however not both.
Please select minimum 0 answer(s) and maximum 3 answer(s).
[{"id":"179","title":"As soon as patches\/updates are released - I track advisories for my distro(s) diligently","votes":"42","type":"x","order":"1","pct":84,"resources":[]},{"id":"180","title":"Every so often, when I think of it","votes":"4","type":"x","order":"2","pct":8,"resources":[]},{"id":"181","title":"Hardly ever","votes":"4","type":"x","order":"3","pct":8,"resources":[]}] ["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"] ["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"] 350

Please vote first in order to view vote results.



bottom 200

Please enable / Bitte aktiviere JavaScript!
Veuillez activer / Por favor activa el Javascript![ ? ]

We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.