Debian: New icedove packages fix several vulnerabilities

    Date 19 Oct 2007
    Posted By LinuxSecurity Advisories
    Several remote vulnerabilities have been discovered in the Icedove mail client, an unbranded version of the Thunderbird client. The Common Vulnerabilities and Exposures project identifies the following problems...
    - --------------------------------------------------------------------------
    Debian Security Advisory DSA 1391-1                    This email address is being protected from spambots. You need JavaScript enabled to view it.                         Moritz Muehlenhoff
    October 19th, 2007            
    - --------------------------------------------------------------------------
    Package        : icedove
    Vulnerability  : several
    Problem-Type   : remote
    Debian-specific: no
    CVE ID         : CVE-2007-3734 CVE-2007-3735 CVE-2007-3844 CVE-2007-3845 CVE-2007-5339 CVE-2007-5340
    Several remote vulnerabilities have been discovered in the Icedove mail client,
    an unbranded version of the Thunderbird client. The Common Vulnerabilities and
    Exposures project identifies the following problems:
        Bernd Mielke, Boris Zbarsky, David Baron, Daniel Veditz, Jesse Ruderman,
        Lukas Loehrer, Martijn Wargers, Mats Palmgren, Olli Pettay, Paul
        Nickerson and Vladimir Sukhoy discovered crashes in the layout engine,
        which might allow the execution of arbitrary code.
        Asaf Romano, Jesse Ruderman and Igor Bukanov discovered crashes in the
        javascript engine, which might allow the execution of arbitrary code.
        "moz_bug_r_a4" discovered that a regression in the handling of
        "about:blank" windows used by addons may lead to an attacker being
        able to modify the content of web sites.
        Jesper Johansson discovered that missing sanitising of double-quotes
        and spaces in URIs passed to external programs may allow an attacker
        to pass arbitrary arguments to the helper program if the user is
        tricked into opening a malformed web page.
        L. David Baron, Boris Zbarsky, Georgi Guninski, Paul Nickerson, Olli Pettay,
        Jesse Ruderman, Vladimir Sukhoy, Daniel Veditz, and Martijn Wargers discovered
        crashes in the layout engine, which might allow the execution of arbitrary code.
        Igor Bukanov, Eli Friedman, and Jesse Ruderman discovered crashes in the
        Javascript engine, which might allow the execution of arbitrary code. Generally,
        enabling Javascript in Icedove is not recommended.
    The Mozilla products in the oldstable distribution (sarge) are no longer
    supported with security updates.
    For the stable distribution (etch) these problems have been fixed in version Builds for hppa will be provided later.
    The unstable distribution (sid) will be fixed soon.
    We recommend that you upgrade your icedove packages.
    Upgrade Instructions
    - --------------------
    wget url
            will fetch the file for you
    dpkg -i file.deb
            will install the referenced file.
    If you are using the apt-get package manager, use the line for
    sources.list as given below:
    apt-get update
            will update the internal database
    apt-get upgrade
            will install corrected packages
    You may use an automated update by adding the resources from the
    footer to the proper configuration.
    Debian GNU/Linux 4.0 alias etch
    - -------------------------------
      Source archives:
          Size/MD5 checksum:     1934 5037f765746ad92c73e0e95ab4988272
          Size/MD5 checksum:   639834 43c96d5fcdf34ebb5c069dc4378a965b
          Size/MD5 checksum: 34229032 9cc1dca6142d6b1044e78026b53968c1
      Architecture independent components:
          Size/MD5 checksum:    28682 b7f1a7e3ea1149a9767539be1c19acbb
          Size/MD5 checksum:    28694 53bb2afe9384039094219bb14da3727a
          Size/MD5 checksum:    28698 6df3bdfb10692d1057b64c49c8f93a5a
          Size/MD5 checksum:    28670 7d12e5160a91e489bc481c5a05024776
          Size/MD5 checksum:    28668 d0a07a5a35dda48ed3a521596ec3b620
          Size/MD5 checksum:    28674 96dc6c4e9629612f7f7fa5ba8276bb4e
          Size/MD5 checksum:    28684 2195e5213a818c01569199922f943178
          Size/MD5 checksum:    28678 eadcb03b9cf28fdad9e0555e83c697a6
          Size/MD5 checksum:    28696 b0c1366f5a530674ec66b578db206bde
          Size/MD5 checksum:    28654 2090a750ed666d208905b82d684668d3
      Alpha architecture:
          Size/MD5 checksum: 13477820 f3a6a6e49d63ff96469075b51ec00e53
          Size/MD5 checksum: 52380964 ba66fa325d9ee5a81a41bf475c4dca6e
          Size/MD5 checksum:  3958088 b590d691047b14234e06d86b2d499b8b
          Size/MD5 checksum:    52226 f87b9fc43fe204e7601f04af40f74a65
          Size/MD5 checksum:   200550 4efd9b2fac6f4ded2b6a77ef4c836508
          Size/MD5 checksum:    64440 fac79a2479f022d8360f4546f3eee0c2
      AMD64 architecture:
          Size/MD5 checksum: 12169764 dfc903a949bba53bd63f40fdc184e8e3
          Size/MD5 checksum: 51475050 acef2a67aed70c9600d94b57863b77b7
          Size/MD5 checksum:  3676870 e76acc39db8446c406acca7887be7f43
          Size/MD5 checksum:    52070 4da21cca0d9fcb2194c0c87af58a0a47
          Size/MD5 checksum:   195718 24993c2fe872d47802ffb85aa216c3c1
          Size/MD5 checksum:    61152 daeca534072d6b581b8dda7157944925
      ARM architecture:
          Size/MD5 checksum: 10887054 e17f25f197173789364e181a6cd23f61
          Size/MD5 checksum: 50827196 5d86bfb3dcebd97ac8182e0e3f95d1e2
          Size/MD5 checksum:  3919820 d442262ccc5a44cbcd7a5f64fe8eb37b
          Size/MD5 checksum:    47176 64c99299d7fc3a683b421a8dc5d1f02a
          Size/MD5 checksum:   189960 b83f0f0fc068e98964629cc9e5abe4ec
          Size/MD5 checksum:    58784 3dbf10421174d1ca69ac3ff1dc792913
      Intel IA-32 architecture:
          Size/MD5 checksum: 10907250 1199372b7db30d88866d8593ab623fa4
          Size/MD5 checksum: 50727826 05b724998e5ad5ab979f1f617133677f
          Size/MD5 checksum:  3673196 0081310d1c9e694b66e76d61c1991ba9
          Size/MD5 checksum:    47998 fecad4abe4563d7ef3cb1241237cc48f
          Size/MD5 checksum:   190752 a04352a82bdd8b1e44d893e52e2c8f78
          Size/MD5 checksum:    58096 605dadf61f57c94fe3ecfe64f61a60e2
      Intel IA-64 architecture:
          Size/MD5 checksum: 16549542 192455836f9d3eb042f31a764e26cabf
          Size/MD5 checksum: 51779230 f6bb62bfefa37428bc974296aefe71af
          Size/MD5 checksum:  3725888 6f3ce218d453889fe559279eefb04f0c
          Size/MD5 checksum:    59474 fabb1f94e5f63a0e104c011ac69d48a1
          Size/MD5 checksum:   204796 a5ecb32106350803a9484be3518d370f
          Size/MD5 checksum:    74168 827a5b641d4636b9ec0989bc00696f12
      Big endian MIPS architecture:
          Size/MD5 checksum: 11578122 8ff9399d2ee8a78a08e92e9df127ba9e
          Size/MD5 checksum: 53098688 857aa81aa88e57b008d79968ac485be5
          Size/MD5 checksum:  3681558 801a505ed2047dc3529f2f0892970b12
          Size/MD5 checksum:    49180 70feb0d4c30be9021fad80326e508d70
          Size/MD5 checksum:   192564 8cc78754e7b0e1a8f3719ede7b3b5fd9
          Size/MD5 checksum:    58626 4a17a19e3566abd93b03c42d57e11373
      Little endian MIPS architecture:
          Size/MD5 checksum: 11357332 f2ce1e851f2901f347e36c911b34f0bd
          Size/MD5 checksum: 51668660 52e861adbf9db87800e72fba8927be4a
          Size/MD5 checksum:  3681328 38cb9f4e2bec05c0d4d87bc0a37c8227
          Size/MD5 checksum:    49046 a81ede66fa203d422cab4229f41d4acf
          Size/MD5 checksum:   192066 14bd132627dda77ebd51c35a16ba4177
          Size/MD5 checksum:    58692 462392c1a31cb10c369113aa8e9ed2b4
      PowerPC architecture:
          Size/MD5 checksum: 11802298 e2a2e2a68725e9199bb6577cf1915c2d
          Size/MD5 checksum: 53275990 28257c9a2f527a42fd13af8d1374b326
          Size/MD5 checksum:  3676086 8b102b424b32292623e4d6fb58bd22d5
          Size/MD5 checksum:    49662 671b9ef6d16dad0e5c78fe1179ccfb03
          Size/MD5 checksum:   192760 3647291657831f9e7521042f45c0a21e
          Size/MD5 checksum:    60496 e3db6721e38912f876f9d8a659180c98
      IBM S/390 architecture:
          Size/MD5 checksum: 12828684 668ac711c1a1e799aec0d67cc4c67b98
          Size/MD5 checksum: 52146038 805635d08025fefeab7d1c25ff635181
          Size/MD5 checksum:  3679950 02543a6b8725e78b7a5feaa8bf0d9811
          Size/MD5 checksum:    52698 032c290706967610dcf2f453e58168ac
          Size/MD5 checksum:   197474 fdafe757e29a035228b975a01245bcaf
          Size/MD5 checksum:    62246 29e686985a17d0815df3f8ff78673e1a
      Sun Sparc architecture:
          Size/MD5 checksum: 11112636 6db1588af2492a6858b864d7c48ea6cd
          Size/MD5 checksum: 50625596 d312e6e9c3281a3f6afa2ec8d36a5fac
          Size/MD5 checksum:  3669498 8fb7f294f0605a6350d1389c2ca0a672
          Size/MD5 checksum:    48158 99b3bc04292ba6c173f44342e8c75f00
          Size/MD5 checksum:   190272 d6d20cf4bf48f0d446d14c4df31f70bb
          Size/MD5 checksum:    58184 d5c1f9f6d261da2eb051e5acecef6818
      These files will probably be moved into the stable distribution on
      its next update.
    - ---------------------------------------------------------------------------------
    For apt-get: deb stable/updates main
    For dpkg-ftp: dists/stable/updates/main
    Mailing list: This email address is being protected from spambots. You need JavaScript enabled to view it.

    LinuxSecurity Poll

    If you are using full-disk encryption: are you concerned about the resulting performance hit?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 2 answer(s).
    [{"id":"120","title":"Yes","votes":"14","type":"x","order":"1","pct":58.33,"resources":[]},{"id":"121","title":"No ","votes":"10","type":"x","order":"2","pct":41.67,"resources":[]}] ["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"] ["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"] 350
    bottom 200

    Please enable / Bitte aktiviere JavaScript!
    Veuillez activer / Por favor activa el Javascript![ ? ]

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.