- ------------------------------------------------------------------------Debian Security Advisory DSA-1669-1                  security@debian.org
https://www.debian.org/security/                       Moritz Muehlenhoff
November 23, 2008                     https://www.debian.org/security/faq
- ------------------------------------------------------------------------Package        : xulrunner
Vulnerability  : several
Problem-Type   : remote
Debian-specific: no
CVE ID         : CVE-2008-0016 CVE-2008-3835 CVE-2008-3836 CVE-2008-3837 CVE-2008-4058 CVE-2008-4059 CVE-2008-4060 CVE-2008-4061 CVE-2008-4062 CVE-2008-4065 CVE-2008-4066 CVE-2008-4067 CVE-2008-4068 CVE-2008-4069 CVE-2008-4582 CVE-2008-5012 CVE-2008-5013 CVE-2008-5014 CVE-2008-5017 CVE-2008-5018 CVE-2008-0017 CVE-2008-5021 CVE-2008-5022 CVE-2008-5023 CVE-2008-5024

Several remote vulnerabilities have been discovered in Xulrunner, a
runtime environment for XUL applications. The Common Vulnerabilities
and Exposures project identifies the following problems:


   Justin Schuh, Tom Cross and Peter Williams discovered a buffer
   overflow in the parser for UTF-8 URLs, which may lead to the
   execution of arbitrary code.


   "moz_bug_r_a4" discovered that the same-origin check in
   nsXMLDocument::OnChannelRedirect() could by bypassed.


   "moz_bug_r_a4" discovered that several vulnerabilities in
   feedWriter could lead to Chrome privilege escalation.


   Paul Nickerson discovered that an attacker could move windows
   during a mouse click, resulting in unwanted action triggered by


   "moz_bug_r_a4" discovered a vulnerability which can result in
   Chrome privilege escalation through XPCNativeWrappers.


   "moz_bug_r_a4" discovered a vulnerability which can result in
   Chrome privilege escalation through XPCNativeWrappers.


   Olli Pettay and "moz_bug_r_a4" discovered a Chrome privilege
   escalation vulnerability in XSLT handling.


   Jesse Ruderman discovered a crash in the layout engine, which might
   allow the execution of arbitrary code.


   Igor Bukanov, Philip Taylor, Georgi Guninski and Antoine Labour
   discovered crashes in the Javascript engine, which might allow the
   execution of arbitrary code.


   Dave Reed discovered that some Unicode byte order marks are
   stripped from Javascript code before execution, which can result in
   code being executed, which were otherwise part of a quoted string.


   Gareth Heyes discovered that some Unicode surrogate characters are
   ignored by the HTML parser.


   Boris Zbarsky discovered that resource: URls allow directory
   traversal when using URL-encoded slashes.


   Georgi Guninski discovered that resource: URLs could bypass local
   access restrictions.


   Billy Hoffman discovered that the XBM decoder could reveal
   uninitialised memory.


   Liu Die Yu discovered an information leak through local shortcut


   Georgi Guninski, Michal Zalewski and Chris Evan discovered that
   the canvas element could be used to bypass same-origin


   It was discovered that insufficient checks in the Flash plugin glue
   code could lead to arbitrary code execution.


   Jesse Ruderman discovered that a programming error in the
   window.__proto__.__proto__ object could lead to arbitrary code


   It was discovered that crashes in the layout engine could lead to
   arbitrary code execution.


   It was discovered that crashes in the Javascript engine could lead to
   arbitrary code execution.

   Justin Schuh discovered that a buffer overflow in http-index-format
   parser could lead to arbitrary code execution.


   It was discovered that a crash in the nsFrameManager might lead to
   the execution of arbitrary code.


   "moz_bug_r_a4" discovered that the same-origin check in
   nsXMLHttpRequest::NotifyEventListeners() could be bypassed.


   Collin Jackson discovered that the -moz-binding property bypasses
   security checks on codebase principals.


   Chris Evans discovered that quote characters were improperly
   escaped in the default namespace of E4X documents.

For the stable distribution (etch), these problems have been fixed in
version Packages for mips will be provided

For the upcoming stable distribution (lenny) and the unstable
distribution (sid), these problems have been fixed in version

We recommend that you upgrade your xulrunner packages.

Upgrade instructions
- --------------------wget url
        will fetch the file for you
dpkg -i file.deb
        will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
        will update the internal database
apt-get upgrade
        will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.

Debian GNU/Linux 4.0 alias etch
- -------------------------------Stable updates are available for alpha, amd64, arm, hppa, i386, ia64, mips, mipsel, powerpc, s390 and sparc.

Source archives:

      Size/MD5 checksum: 43763318 269ce29df92d5053f6d0fc659717c18b
      Size/MD5 checksum:   144529 7f517d4bd904df70b6ead61c85e5eb71
      Size/MD5 checksum:     1984 2f56bfad80749a3af01a185cfc3a19e5

Architecture independent packages:

      Size/MD5 checksum:    37108 ac110712c554bc90e6156ddf375c20e6
      Size/MD5 checksum:   231230 75b9b3c909279253b358fe73c87ae920
      Size/MD5 checksum:   176254 6bffe2de1c86a23ea69141da310df072
      Size/MD5 checksum:    37070 a83bac43079f44db9c6a8ba23638481a
      Size/MD5 checksum:  2637220 39ab7259a30e82173bd736ff4d26b366
      Size/MD5 checksum:  1051896 e9a4021391f5153eaca415b5f6e93fe6
      Size/MD5 checksum:  1032080 388688d0bfcb0a5c4abde96f9fb24c98
      Size/MD5 checksum:   207752 516386bf8588e6210ac121d38cc67308

alpha architecture (DEC Alpha)

      Size/MD5 checksum:   292440 187aad52fc63d5fdca6521359b6a360a
      Size/MD5 checksum:   386628 536f366c637868a9f27746f776d37a31
      Size/MD5 checksum:  7346254 4b946a8f3cde017ff0580a9a97687e7e
      Size/MD5 checksum:   765180 673c7bd51731495926293ff92301b327
      Size/MD5 checksum:   739026 d96d09c1ecbf280a77ee5f4fe4a7d1a3
      Size/MD5 checksum:  3188906 5cfc3218c50b909a4e64e06d09774224
      Size/MD5 checksum:    53106 20768cf8e831ad71f45cccb657eb3448
      Size/MD5 checksum:    71212 0f8fe3e84b4faf38d25347f3dfdc463d
      Size/MD5 checksum:   302616 01109cc8d78492dbbbcbad4756255e8b
      Size/MD5 checksum:   162612 9af11053277aa8398ed4852890076b41
      Size/MD5 checksum:   129930 7b03aa5bcfb76b15d860621806ffbccb
      Size/MD5 checksum:   905638 3a558f50e394d109e4d306559b48283a
      Size/MD5 checksum: 46017420 d5f238086f7f77270d31a3d34c4b9a35

amd64 architecture (AMD x86_64 (AMD64))

      Size/MD5 checksum:  3177838 69775ab87c4c2677faf2fbe8ed1c4617
      Size/MD5 checksum:   148946 d179d55f788e6fbaf2259446d79c342c
      Size/MD5 checksum:   356028 7e6147ae3531fb175cdf637a25f4dc33
      Size/MD5 checksum:   126632 7795ccbd3edeb72623450ec3b0c407f9
      Size/MD5 checksum:   810296 09a7217cbe1b1180c71ae7b16a306747
      Size/MD5 checksum:    69360 2e6a6559a22ce55f2b6b9331b0bfbd68
      Size/MD5 checksum:   755560 ade61fc66030701ba9d62086288403bf
      Size/MD5 checksum:   278728 9124a96cd6b202d076a35829b542f6f6
      Size/MD5 checksum:  6343406 7683694615827e8674c59034978b86b1
      Size/MD5 checksum:   671010 7984141447417ad48f657e5752a197c5
      Size/MD5 checksum: 45217322 e18a8c41099328f6979c27614a81b83c
      Size/MD5 checksum:    53340 803733e356f2f74037a6f3a7d9a4a91f
      Size/MD5 checksum:   304624 36ced9e2336ccaa648a15c76707f8645

arm architecture (ARM)

      Size/MD5 checksum:    50992 e655c2956e96e317f0a32c4122b34d3b
      Size/MD5 checksum:   732278 0f2bce0bc1d0b13b36c5b45465516b04
      Size/MD5 checksum: 44746676 980a58b4e66d48cb8e913a3846081001
      Size/MD5 checksum:  5368942 8a6560e2302db9686218205d5c347e16
      Size/MD5 checksum:   290778 305d1c3d9f893d75d6b92e7b02819bdb
      Size/MD5 checksum:    63054 72ef44af146319f439a44197b7d4743a
      Size/MD5 checksum:   594214 7c6d64740f289185389b15b790d645ad
      Size/MD5 checksum:  2969882 9acb7cc81292692bedc12f523fb25f19
      Size/MD5 checksum:   119110 249f11b4d5c08aa5d1bd4d74221e0c38
      Size/MD5 checksum:   136886 ce4ac4ba2050790518c8528c2a415f02
      Size/MD5 checksum:   326184 5c4f59cedea7db6e7dd5d9a9522c24c7
      Size/MD5 checksum:   260186 a9ac930957d7416cc7a160b6044f96b3
      Size/MD5 checksum:   705170 fbdb65410c70fa8805ce72c0c97c179b

hppa architecture (HP PA RISC)

      Size/MD5 checksum:   302322 61f8282f8cd276c69d24fa6824761a4e
      Size/MD5 checksum:   703692 06452f715efa7e66c5d22e3866db2c0e
      Size/MD5 checksum: 46134820 cd29259ebf9caf9dca35560e806f984b
      Size/MD5 checksum:    53462 27cc05a50b56afbe49b5fa3b30672e58
      Size/MD5 checksum:   390962 9fed7a335de83d6333b1c2e5c9bedfea
      Size/MD5 checksum:   161670 b9c1c8bfdf1db386d301dbb03d5c403c
      Size/MD5 checksum:  7552110 91b773e5373158755289930d39ff7470
      Size/MD5 checksum:   132130 8a5c0d6d99049ab1a499c584a602d7dc
      Size/MD5 checksum:   753050 bc5f4f2723836580fbfbaed5a71272b1
      Size/MD5 checksum:   287828 b0a84eacece17a811defbb7b30c757f7
      Size/MD5 checksum:  3104660 47ab34d7126c8f64cbaa269f7a2afdd4
      Size/MD5 checksum:    70902 67634b0f71a03fd87476396172ccffe7
      Size/MD5 checksum:   874810 ae271a1ca58484ddf43ba14d66387a06

i386 architecture (Intel ia32)

      Size/MD5 checksum:  5383100 25dfd28aef781b5ca352f0232aa211e9
      Size/MD5 checksum:    63834 2691c48af147f802e684e030d3e04701
      Size/MD5 checksum: 44696504 d3f45db182ee59de39c86b5ea12ad01a
      Size/MD5 checksum:   714892 13951abf0a2c9030ed8ff163f6259351
      Size/MD5 checksum:   296446 b8a9da32c6184afac2f6649ce8ad5847
      Size/MD5 checksum:   139824 13cb243ffadc155900abb00835a6507b
      Size/MD5 checksum:  3033280 705838b8f872cd335ce180cbad03cdb1
      Size/MD5 checksum:   337086 87db12ec21885f3833560b334e1af3e4
      Size/MD5 checksum:    50868 707ae35a901c3e9ae1ec40c3c00f7921
      Size/MD5 checksum:   742916 bd2ff5be8f3a94deaf104bafe477a9d3
      Size/MD5 checksum:   118548 8ce74f7ef876172271c72c3c411cbd33
      Size/MD5 checksum:   267924 7d8bcf96f9244594b9a937b6224fa097
      Size/MD5 checksum:   628432 e109e6b6aa054ced99a8844df67ced17

ia64 architecture (Intel ia64)

      Size/MD5 checksum:   150698 ab8c0d92e7ac8bb48b604d6ea36197e4
      Size/MD5 checksum:   287530 c9db22cd56cc17dd619cbd95b3b45075
      Size/MD5 checksum:   532996 b7c0eadd7ddd85642c761e29cf7cafc3
      Size/MD5 checksum:   755714 eae62df93df4e8bb5f0deda5dd4ec4e9
      Size/MD5 checksum:  3051824 e516b3a4601b8350faeff14a47b298b2
      Size/MD5 checksum:   334028 3a0cc332ff6b095193b7c70952d13532
      Size/MD5 checksum: 45437166 c3a164f9d48b0c96277be51a441915dd
      Size/MD5 checksum:  1121458 5f97e14d0837fc02241fec88c81f706a
      Size/MD5 checksum:    80872 a36655812bc3600a00ada31f7b5af8d7
      Size/MD5 checksum:  9685646 1ec5fef153646e888c1e28c306e0edae
      Size/MD5 checksum:    57870 97e42348ab45451378fd360df57ee996
      Size/MD5 checksum:   198742 bbba497dfc3b9e556082c6357e3dfde5
      Size/MD5 checksum:   937264 e538ce36bc43ed941394d13ee0d52a53

mipsel architecture (MIPS (Little Endian))

      Size/MD5 checksum:   274964 8cc829f5a01dabeb02357a57f26de510
      Size/MD5 checksum:    65170 7ca8f4598376b9e35cf62096cd0663aa
      Size/MD5 checksum:   785530 464969451374f49191184fdd78363633
      Size/MD5 checksum:   351424 21b9b17a786ee9e8a28bff8e2cb7b067
      Size/MD5 checksum:  3187334 da69f74749bc9d111d4a1e4597b7a075
      Size/MD5 checksum:    52554 fd3706c6cfccb0442e3b092e184adfbb
      Size/MD5 checksum:   118606 3f78ef107edbf118d6da0a504b1a6c90
      Size/MD5 checksum:  5756448 5d27b51600c5aecf30d82872ea5ef976
      Size/MD5 checksum:   670678 861a749803d3906cd21d77e8f45ecae6
      Size/MD5 checksum:   305782 739ba0f2bcb1c8204734225044648734
      Size/MD5 checksum: 45367986 ff5cbe1732d1dae74bb822119d86a925
      Size/MD5 checksum:   766946 438965e5962147e88570d0f0502b43fd
      Size/MD5 checksum:   146350 3cdb4a00d928cd6d222841d961edcaf8

powerpc architecture (PowerPC)

      Size/MD5 checksum:   124684 defd7a2555c14d3a0f06c971bea7a451
      Size/MD5 checksum:   810014 20a1a9dbf4a3ad3eb8fd0d35ee64342f
      Size/MD5 checksum: 46948440 e99e9c17fe4fff09ffa231ab61344926
      Size/MD5 checksum:  3207304 106c8e04e7e69a403629a08113af60b1
      Size/MD5 checksum:    53822 06e6021788dfa6ed42f73c42dc42d4c6
      Size/MD5 checksum:   148102 9ee04ff3dbad84bebf8536adf942da51
      Size/MD5 checksum:   279498 2a91ba4052440b688a084142034094b2
      Size/MD5 checksum:   350088 2cdf2cc81b27d7ecab9c8045f9fa3f4c
      Size/MD5 checksum:   774852 68f4364621232a4ccaf379739fe90844
      Size/MD5 checksum:   640770 caf3b284405fe5c5c630aa3079b03a98
      Size/MD5 checksum:    65030 1fb0c63b382b718542a93f6a5044c5dd
      Size/MD5 checksum:  6111652 8084da84956a7dd10fb41a748571d1ce
      Size/MD5 checksum:   311138 dd2cdb789b213198e2d07793ff6cda7d

s390 architecture (IBM S/390)

      Size/MD5 checksum:   372540 2a5ba267a8fe0873efd38cd4b7901cc6
      Size/MD5 checksum:   282950 45ee96102546cd3721b3035fa66625d5
      Size/MD5 checksum:   127476 c84ebe0a16a997feec58a7e4b8cb680e
      Size/MD5 checksum:  6815988 904ffedb7cf2d3951fa3ba419db97bf8
      Size/MD5 checksum:   688656 68fe7ceca84ad73d3af368cafcc8bb8d
      Size/MD5 checksum:  3182688 e31c62d66bbc8c56803ad26bebdd759b
      Size/MD5 checksum:    54072 143164871ff9749b6b6b4430cb32041b
      Size/MD5 checksum:   756986 e369095cb45670013a7842c16e4b705d
      Size/MD5 checksum:    69980 9d100c8a6ce21bf7072068084fb0d686
      Size/MD5 checksum:   306772 7d5c5de6d3b220c4ed01f0f41fdee5bc
      Size/MD5 checksum:   899720 3ac2e0a53da7a24c693705e38222063e
      Size/MD5 checksum:   160818 24d85411a0b362051bf4a01071b62fba
      Size/MD5 checksum: 46082350 b519a68a5f31a04f0f5e236845487bde

sparc architecture (Sun SPARC/UltraSPARC)

      Size/MD5 checksum:   719922 5bc9efc37cef094718adb36d5a016179
      Size/MD5 checksum:   676172 b0241dcaf3f7153dc9145a9c5babe787
      Size/MD5 checksum:    63314 4e65fa183e0e12f543d0eb669c6d670d
      Size/MD5 checksum:    51986 303f9de96490f0633aab95306fe30f05
      Size/MD5 checksum:   586488 6236e767259e06e3d3b4c062ee6362a2
      Size/MD5 checksum: 44786670 07e5e02fced64c2303043cffa255a4ee
      Size/MD5 checksum:  5691050 3f4e9e5e4feff6a386094101820c9f11
      Size/MD5 checksum:   323786 ec3a7690b2e154e51132d1983a72be3b
      Size/MD5 checksum:  2854664 214407a606e9b94ab300ea306d1c0e18
      Size/MD5 checksum:   136908 be6e397388eb412bcbf9ec6a014b00f5
      Size/MD5 checksum:   118720 346aa123c24a426716a1576c3c285dc6
      Size/MD5 checksum:   284372 63ba1195ae71a92c6b780004c0c7e2da
      Size/MD5 checksum:   261348 690d1985e4d4cd1c5b076e76af55ac84

  These files will probably be moved into the stable distribution on
  its next update.

- ---------------------------------------------------------------------------------For apt-get: deb https://security.debian.org/ stable/updates main
For dpkg-ftp:  dists/stable/updates/main
Mailing list: debian-security-announce@lists.debian.org

Debian: xulrunner fix several vulnerabilities DSA-1669-1

November 23, 2008
Justin Schuh, Tom Cross and Peter Williams discovered a buffer overflow in the parser for UTF-8 URLs, which may lead to the execution of arbitrary code.