lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20080210204622.GA4196@galadriel.inutil.org>
Date: Sun, 10 Feb 2008 21:46:22 +0100
From: Moritz Muehlenhoff <jmm@...ian.org>
To: debian-security-announce@...ts.debian.org
Subject: [SECURITY] [DSA 1489-1] New iceweasel packages
	fix several vulnerabilities

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ------------------------------------------------------------------------
Debian Security Advisory DSA-1489-1                  security@...ian.org
http://www.debian.org/security/                       Moritz Muehlenhoff
February 10, 2008                     http://www.debian.org/security/faq
- ------------------------------------------------------------------------

Package        : iceweasel
Vulnerability  : several
Problem type   : remote
Debian-specific: no
CVE Id(s)      : CVE-2008-0412 CVE-2008-0413 CVE-2008-0414 CVE-2008-0415 CVE-2008-0416 CVE-2008-0417 CVE-2008-0418 CVE-2008-0419 CVE-2008-0591 CVE-2008-0592 CVE-2008-0593 CVE-2008-0594

Several remote vulnerabilities have been discovered in the Iceweasel
web browser, an unbranded version of the Firefox browser. The Common
Vulnerabilities and Exposures project identifies the following problems:

CVE-2008-0412

    Jesse Ruderman, Kai Engert, Martijn Wargers, Mats Palmgren and Paul
    Nickerson discovered crashes in the layout engine, which might allow
    the execution of arbitrary code.

CVE-2008-0413

    Carsten Book, Wesley Garland, Igor Bukanov, "moz_bug_r_a4", "shutdown",
    Philip Taylor and "tgirmann" discovered crashes in the Javascript
    engine, which might allow the execution of arbitrary code.

CVE-2008-0414

    "hong" and Gregory Fleisher discovered that file input focus
    vulnerabilities in the file upload control could allow information
    disclosure of local files.

CVE-2008-0415

    "moz_bug_r_a4" and Boris Zbarsky discovered discovered several
    vulnerabilities in Javascript handling, which could allow
    privilege escalation.

CVE-2008-0417

    Justin Dolske discovered that the password storage machanism could
    be abused by malicious web sites to corrupt existing saved passwords.

CVE-2008-0418

    Gerry Eisenhaur and "moz_bug_r_a4" discovered that a directory
    traversal vulnerability in chrome: URI handling could lead to
    information disclosure.

CVE-2008-0419

    David Bloom discovered a race condition in the image handling of
    designMode elements, which can lead to information disclosure or
    potentially the execution of arbitrary code.

CVE-2008-0591

    Michal Zalewski discovered that timers protecting security-sensitive
    dialogs (which disable dialog elements until a timeout is reached)
    could be bypassed by window focus changes through Javascript.

CVE-2008-0592

    It was discovered that malformed content declarations of saved
    attachments could prevent a user in the opening local files
    with a ".txt" file name, resulting in minor denial of service.

CVE-2008-0593

    Martin Straka discovered that insecure stylesheet handling during
    redirects could lead to information disclosure.

CVE-2008-0594

    Emil Ljungdahl and Lars-Olof Moilanen discovered that phishing
    protections could be bypassed with <div> elements.


For the stable distribution (etch), these problems have been fixed in
version 2.0.0.12-0etch1.

The Mozilla products from the old stable distribution (sarge) are no
longer supported with security updates.

We recommend that you upgrade your iceweasel packages.

Upgrade instructions
- --------------------

wget url
        will fetch the file for you
dpkg -i file.deb
        will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
        will update the internal database
apt-get upgrade
        will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.


Debian 4.0 (stable)
- -------------------

Stable updates are available for alpha, amd64, arm, hppa, i386, ia64, mips, mipsel, powerpc, s390 and sparc.

Source archives:

  http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel_2.0.0.12.orig.tar.gz
    Size/MD5 checksum: 43522779 34cb9e2038afa635dac9319a0f113be8
  http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel_2.0.0.12-0etch1.dsc
    Size/MD5 checksum:     1289 568c8d5661721888aa75724f4ec76cf9
  http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel_2.0.0.12-0etch1.diff.gz
    Size/MD5 checksum:   186174 96e7907d265cdf00b81785db4e2ab6c4

Architecture independent packages:

  http://security.debian.org/pool/updates/main/i/iceweasel/firefox_2.0.0.12-0etch1_all.deb
    Size/MD5 checksum:    54290 97f40d39e73fba4b90c79a514ab89f18
  http://security.debian.org/pool/updates/main/i/iceweasel/firefox-gnome-support_2.0.0.12-0etch1_all.deb
    Size/MD5 checksum:    54146 ef3dbcc83837bc5c86ecdb3295716e23
  http://security.debian.org/pool/updates/main/i/iceweasel/mozilla-firefox-dom-inspector_2.0.0.12-0etch1_all.deb
    Size/MD5 checksum:    54026 91815e0777f6249b4ba95bbeb38cee0c
  http://security.debian.org/pool/updates/main/i/iceweasel/firefox-dom-inspector_2.0.0.12-0etch1_all.deb
    Size/MD5 checksum:    54176 1b7640fa33604225b347b8fd368163a0
  http://security.debian.org/pool/updates/main/i/iceweasel/mozilla-firefox_2.0.0.12-0etch1_all.deb
    Size/MD5 checksum:    54816 97db059f2fc4f52bd4d2389f724e8378
  http://security.debian.org/pool/updates/main/i/iceweasel/mozilla-firefox-gnome-support_2.0.0.12-0etch1_all.deb
    Size/MD5 checksum:    54026 969ad8b6ed5b8b0dea8cd5d3414c1485
  http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel-dom-inspector_2.0.0.12-0etch1_all.deb
    Size/MD5 checksum:   239356 4309e0a07163450b9d7ce65103b39b80

alpha architecture (DEC Alpha)

  http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel-gnome-support_2.0.0.12-0etch1_alpha.deb
    Size/MD5 checksum:    90934 5e1bdb44f0484fd2111a1541276b99dd
  http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel-dbg_2.0.0.12-0etch1_alpha.deb
    Size/MD5 checksum: 51062530 72e80dbe1969eae96b4d9ed57aa89122
  http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel_2.0.0.12-0etch1_alpha.deb
    Size/MD5 checksum: 11553820 0cea194c903903bb98b53cc349b89dbf

amd64 architecture (AMD x86_64 (AMD64))

  http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel-dbg_2.0.0.12-0etch1_amd64.deb
    Size/MD5 checksum: 50060784 8639ed04300fac0705c47c27338fdfbb
  http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel-gnome-support_2.0.0.12-0etch1_amd64.deb
    Size/MD5 checksum:    87564 79c23f813fc543121275f4a974833c82
  http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel_2.0.0.12-0etch1_amd64.deb
    Size/MD5 checksum: 10182710 bb8bbff82040dc0c04e98ac477a5a691

hppa architecture (HP PA RISC)

  http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel-gnome-support_2.0.0.12-0etch1_hppa.deb
    Size/MD5 checksum:    89302 2867a60e5385e94188bf66f38f992a29
  http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel_2.0.0.12-0etch1_hppa.deb
    Size/MD5 checksum: 11031094 f5926d349e00706a548fdb4f6c02dbac
  http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel-dbg_2.0.0.12-0etch1_hppa.deb
    Size/MD5 checksum: 50426978 4228e87f68b21f2627069a320603263d

i386 architecture (Intel ia32)

  http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel_2.0.0.12-0etch1_i386.deb
    Size/MD5 checksum:  9096292 1c535164988178a3d6b889f9d44f31e8
  http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel-gnome-support_2.0.0.12-0etch1_i386.deb
    Size/MD5 checksum:    81706 a7ca2818a1d14730077724e3acaf615f
  http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel-dbg_2.0.0.12-0etch1_i386.deb
    Size/MD5 checksum: 49451404 3525c3b01dd1142815513cc0d390493f

ia64 architecture (Intel ia64)

  http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel_2.0.0.12-0etch1_ia64.deb
    Size/MD5 checksum: 14120046 8d6c6253c001988251523976eee216a1
  http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel-gnome-support_2.0.0.12-0etch1_ia64.deb
    Size/MD5 checksum:    99914 3a4bd7bd5ab87d20bbf5a962411ae4fa
  http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel-dbg_2.0.0.12-0etch1_ia64.deb
    Size/MD5 checksum: 50400330 dfa48b54a479b7f305c899bc3f395f92

mips architecture (MIPS (Big Endian))

  http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel-dbg_2.0.0.12-0etch1_mips.deb
    Size/MD5 checksum: 53844792 613a7bc03c43510bcb09e09d33bce694
  http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel-gnome-support_2.0.0.12-0etch1_mips.deb
    Size/MD5 checksum:    82810 e673433c89d7a74e95b86ed1a264fa5b
  http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel_2.0.0.12-0etch1_mips.deb
    Size/MD5 checksum: 11038906 5f60ab9a24ad69a5b8c17ef69f31ef83

mipsel architecture (MIPS (Little Endian))

  http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel-gnome-support_2.0.0.12-0etch1_mipsel.deb
    Size/MD5 checksum:    82872 e9fcd10390f6241f8ddc9c996807afe0
  http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel_2.0.0.12-0etch1_mipsel.deb
    Size/MD5 checksum: 10735706 dcc381a4d6a0d26a0d69afb0696955db
  http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel-dbg_2.0.0.12-0etch1_mipsel.deb
    Size/MD5 checksum: 52399756 ffa41f602d079d778355e5a4a7cbde18

powerpc architecture (PowerPC)

  http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel_2.0.0.12-0etch1_powerpc.deb
    Size/MD5 checksum:  9913630 75da2ef9f6915fc6961cc56755f6b8fb
  http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel-gnome-support_2.0.0.12-0etch1_powerpc.deb
    Size/MD5 checksum:    83434 0b65d7b061d42bfb5ae48c9fb2f65e05
  http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel-dbg_2.0.0.12-0etch1_powerpc.deb
    Size/MD5 checksum: 51852988 59f76c278e30b86d7e3caaab603d774e

s390 architecture (IBM S/390)

  http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel-gnome-support_2.0.0.12-0etch1_s390.deb
    Size/MD5 checksum:    87788 6cc1b69d90583e765b1f54bdd8ec88a4
  http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel_2.0.0.12-0etch1_s390.deb
    Size/MD5 checksum: 10339140 dd605f3c893a9fd281ee68c940faaea7
  http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel-dbg_2.0.0.12-0etch1_s390.deb
    Size/MD5 checksum: 50726238 fdc527fd80bb0383ea8ef02dca684f16

sparc architecture (Sun SPARC/UltraSPARC)

  http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel-gnome-support_2.0.0.12-0etch1_sparc.deb
    Size/MD5 checksum:    81548 f4e489f39594fda6a3a3498aea9bd986
  http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel_2.0.0.12-0etch1_sparc.deb
    Size/MD5 checksum:  9122208 28632988671ede31388d9caa46a5cfe9
  http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel-dbg_2.0.0.12-0etch1_sparc.deb
    Size/MD5 checksum: 49060394 1008a6ee3a9f8a3b6e46b766e62af10a


  These files will probably be moved into the stable distribution on
  its next update.

- ---------------------------------------------------------------------------------
For apt-get: deb http://security.debian.org/ stable/updates main
For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
Mailing list: debian-security-announce@...ts.debian.org
Package info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.6 (GNU/Linux)

iD8DBQFHr2JkXm3vHE4uyloRAhzrAKDV6FwWWT6zbc76/ZDibTDSmd13mQCfegas
oCcPvP3xPzO1cIgOX25gUi0=
=5KCZ
-----END PGP SIGNATURE-----

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ