Articles / Debian: New iceape packages…

Debian: New iceape packages fix several vulnerabilities

Several remote vulnerabilities have been discovered in the Iceape internet suite, an unbranded version of the Seamonkey Internet Suite. Jesse Ruderman, Kai Engert, Martijn Wargers, Mats Palmgren and Paul Nickerson discovered crashes in the layout engine, which might allow the execution of arbitrary code. Carsten Book, Wesley Garland, Igor Bukanov, "moz_bug_r_a4", "shutdown", Philip Taylor and "tgirmann" discovered crashes in the Javascript engine, which might allow the execution of arbitrary code. "hong" and Gregory Fleisher discovered that file input focus vulnerabilities in the file upload control could allow information disclosure of local files. "moz_bug_r_a4" and Boris Zbarsky discovered discovered several vulnerabilities in Javascript handling, which could allow privilege escalation. Justin Dolske discovered that the password storage machanism could be abused by malicious web sites to corrupt existing saved passwords. Gerry Eisenhaur and "moz_bug_r_a4" discovered that a directory traversal vulnerability in chrome: URI handling could lead to information disclosure. David Bloom discovered a race condition in the image handling of designMode elements, which can lead to information disclosure or potentially the execution of arbitrary code. Michal Zalewski discovered that timers protecting security-sensitive dialogs (which disable dialog elements until a timeout is reached) could be bypassed by window focus changes through Javascript. It was discovered that malformed content declarations of saved attachments could prevent a user in the opening local files with a ".txt" file name, resulting in minor denial of service. Martin Straka discovered that insecure stylesheet handling during redirects could lead to information disclosure. Emil Ljungdahl and Lars-Olof Moilanen discovered that phishing protections could be bypassed with <div> elements. Fixed packages are available from security.debian.org.
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ------------------------------------------------------------------------
Debian Security Advisory DSA-1506-1                  security@debian.org
http://www.debian.org/security/                       Moritz Muehlenhoff
February 24, 2008                     http://www.debian.org/security/faq
- ------------------------------------------------------------------------

Package        : iceape
Vulnerability  : several
Problem-Type   : remote
Debian-specific: no
CVE ID         : CVE-2008-0412 CVE-2008-0413 CVE-2008-0414 CVE-2008-0415
                CVE-2008-0417 CVE-2008-0418 CVE-2008-0419 CVE-2008-0591
                CVE-2008-0592 CVE-2008-0593 CVE-2008-0594

Several remote vulnerabilities have been discovered in the Iceape internet
suite, an unbranded version of the Seamonkey Internet Suite. The Common
Vulnerabilities and Exposures project identifies the following problems:

CVE-2008-0412

   Jesse Ruderman, Kai Engert, Martijn Wargers, Mats Palmgren and Paul
   Nickerson discovered crashes in the layout engine, which might allow
   the execution of arbitrary code.

CVE-2008-0413

   Carsten Book, Wesley Garland, Igor Bukanov, "moz_bug_r_a4", "shutdown",
   Philip Taylor and "tgirmann" discovered crashes in the Javascript
   engine, which might allow the execution of arbitrary code.

CVE-2008-0414

   "hong" and Gregory Fleisher discovered that file input focus
   vulnerabilities in the file upload control could allow information
   disclosure of local files.

CVE-2008-0415

   "moz_bug_r_a4" and Boris Zbarsky discovered discovered several
   vulnerabilities in Javascript handling, which could allow
   privilege escalation.

CVE-2008-0417

   Justin Dolske discovered that the password storage machanism could
   be abused by malicious web sites to corrupt existing saved passwords.

CVE-2008-0418

   Gerry Eisenhaur and "moz_bug_r_a4" discovered that a directory
   traversal vulnerability in chrome: URI handling could lead to
   information disclosure.

CVE-2008-0419

   David Bloom discovered a race condition in the image handling of
   designMode elements, which can lead to information disclosure or
   potentially the execution of arbitrary code.

CVE-2008-0591

   Michal Zalewski discovered that timers protecting security-sensitive
   dialogs (which disable dialog elements until a timeout is reached)
   could be bypassed by window focus changes through Javascript.

CVE-2008-0592

   It was discovered that malformed content declarations of saved
   attachments could prevent a user in the opening local files
   with a ".txt" file name, resulting in minor denial of service.

CVE-2008-0593

   Martin Straka discovered that insecure stylesheet handling during
   redirects could lead to information disclosure.

CVE-2008-0594

   Emil Ljungdahl and Lars-Olof Moilanen discovered that phishing
   protections could be bypassed with 
elements. For the stable distribution (etch), these problems have been fixed in version 1.0.12~pre080131b-0etch1. The Mozilla releases from the old stable distribution (sarge) are no longer supported with security updates. We recommend that you upgrade your iceape packages. Upgrade instructions - -------------------- wget url will fetch the file for you dpkg -i file.deb will install the referenced file. If you are using the apt-get package manager, use the line for sources.list as given below: apt-get update will update the internal database apt-get upgrade will install corrected packages You may use an automated update by adding the resources from the footer to the proper configuration. Debian 4.0 (stable) - ------------------- Stable updates are available for alpha, amd64, arm, hppa, i386, ia64, mips, mipsel, powerpc, s390 and sparc. Source archives: http://security.debian.org/pool/updates/main/i/iceape/iceape_1.0.12~pre080131b.orig.tar.gz Size/MD5 checksum: 43535826 39071cd311888d73254336b782109776 http://security.debian.org/pool/updates/main/i/iceape/iceape_1.0.12~pre080131b-0etch1.dsc Size/MD5 checksum: 1439 eaee68845cb7d4660609f6c47ac01666 http://security.debian.org/pool/updates/main/i/iceape/iceape_1.0.12~pre080131b-0etch1.diff.gz Size/MD5 checksum: 269895 fb6e3c3d3bc4a94773c1b4921fdb42d6 Architecture independent packages: http://security.debian.org/pool/updates/main/i/iceape/mozilla_1.8+1.0.12~pre080131b-0etch1_all.deb Size/MD5 checksum: 27208 91bbb99fad75c41e2df1170749014288 http://security.debian.org/pool/updates/main/i/iceape/mozilla-calendar_1.8+1.0.12~pre080131b-0etch1_all.deb Size/MD5 checksum: 27210 0233d457074aa58542b8662c2a54c48a http://security.debian.org/pool/updates/main/i/iceape/mozilla-js-debugger_1.8+1.0.12~pre080131b-0etch1_all.deb Size/MD5 checksum: 27244 51f7e38462c1f39e0c662e4b58eca43a http://security.debian.org/pool/updates/main/i/iceape/iceape-chatzilla_1.0.12~pre080131b-0etch1_all.deb Size/MD5 checksum: 281870 1e8faf69c0bbf186f1a6c1d199646ce6 http://security.debian.org/pool/updates/main/i/iceape/iceape-dev_1.0.12~pre080131b-0etch1_all.deb Size/MD5 checksum: 3927248 df30ff32e825d5ceb1630025a7d0ef88 http://security.debian.org/pool/updates/main/i/iceape/mozilla-dom-inspector_1.8+1.0.12~pre080131b-0etch1_all.deb Size/MD5 checksum: 27248 2b1e9711c1e80b9651b88e3dc19d4b76 http://security.debian.org/pool/updates/main/i/iceape/iceape_1.0.12~pre080131b-0etch1_all.deb Size/MD5 checksum: 28614 20c852fc8104981654bd6227a0602375 http://security.debian.org/pool/updates/main/i/iceape/mozilla-chatzilla_1.8+1.0.12~pre080131b-0etch1_all.deb Size/MD5 checksum: 27232 97c0a7e4b71cc083c711086dd160322a http://security.debian.org/pool/updates/main/i/iceape/mozilla-dev_1.8+1.0.12~pre080131b-0etch1_all.deb Size/MD5 checksum: 27348 ad7233b5d98e1557cdc190d9cf6746df http://security.debian.org/pool/updates/main/i/iceape/mozilla-mailnews_1.8+1.0.12~pre080131b-0etch1_all.deb Size/MD5 checksum: 27236 8ae02d5d250866771250e19e5bb967bb http://security.debian.org/pool/updates/main/i/iceape/mozilla-psm_1.8+1.0.12~pre080131b-0etch1_all.deb Size/MD5 checksum: 27220 6035bbc507f4fc30a0564aa18c5a3a98 http://security.debian.org/pool/updates/main/i/iceape/mozilla-browser_1.8+1.0.12~pre080131b-0etch1_all.deb Size/MD5 checksum: 28186 4997ba36f2c9aacf25eb9c41bf104d6f alpha architecture (DEC Alpha) http://security.debian.org/pool/updates/main/i/iceape/iceape-dom-inspector_1.0.12~pre080131b-0etch1_alpha.deb Size/MD5 checksum: 197832 c2be45e20e6834b19969e125925622a1 http://security.debian.org/pool/updates/main/i/iceape/iceape-dbg_1.0.12~pre080131b-0etch1_alpha.deb Size/MD5 checksum: 60612536 5fbbf1f26498f361c0aadc0535bdee92 http://security.debian.org/pool/updates/main/i/iceape/iceape-gnome-support_1.0.12~pre080131b-0etch1_alpha.deb Size/MD5 checksum: 53952 ef80eea66f161134bc52d0cdbf985f51 http://security.debian.org/pool/updates/main/i/iceape/iceape-calendar_1.0.12~pre080131b-0etch1_alpha.deb Size/MD5 checksum: 626136 542e77b2a6ad52a40d29ecafa76c15a7 http://security.debian.org/pool/updates/main/i/iceape/iceape-mailnews_1.0.12~pre080131b-0etch1_alpha.deb Size/MD5 checksum: 2282858 e915238d369b469d5911e10d92be0e99 http://security.debian.org/pool/updates/main/i/iceape/iceape-browser_1.0.12~pre080131b-0etch1_alpha.deb Size/MD5 checksum: 12884578 9b5912dc643b38e5d3120d34d8685f16 amd64 architecture (AMD x86_64 (AMD64)) http://security.debian.org/pool/updates/main/i/iceape/iceape-dbg_1.0.12~pre080131b-0etch1_amd64.deb Size/MD5 checksum: 59608524 146775d1bd21250e027006f9dbf90d6f http://security.debian.org/pool/updates/main/i/iceape/iceape-calendar_1.0.12~pre080131b-0etch1_amd64.deb Size/MD5 checksum: 613832 6cb81b62325770fd1e2590908d0afda7 http://security.debian.org/pool/updates/main/i/iceape/iceape-dom-inspector_1.0.12~pre080131b-0etch1_amd64.deb Size/MD5 checksum: 195048 2ccb3800e4edcd8510d707a9ac4a5d7e http://security.debian.org/pool/updates/main/i/iceape/iceape-browser_1.0.12~pre080131b-0etch1_amd64.deb Size/MD5 checksum: 11687282 2fc3db14be5dd03b082497ab6f9ffc36 http://security.debian.org/pool/updates/main/i/iceape/iceape-gnome-support_1.0.12~pre080131b-0etch1_amd64.deb Size/MD5 checksum: 53366 8789d8dd06e30ce580ab37e94ec1d44b http://security.debian.org/pool/updates/main/i/iceape/iceape-mailnews_1.0.12~pre080131b-0etch1_amd64.deb Size/MD5 checksum: 2099654 99aef23fe234563ce99f3d8ce89b02d2 arm architecture (ARM) http://security.debian.org/pool/updates/main/i/iceape/iceape-mailnews_1.0.12~pre080131b-0etch1_arm.deb Size/MD5 checksum: 1916734 bdda1babe619d6f11429f1fb813fc347 http://security.debian.org/pool/updates/main/i/iceape/iceape-browser_1.0.12~pre080131b-0etch1_arm.deb Size/MD5 checksum: 10421094 4cf350729bfeff5f0a6edba041e72be7 http://security.debian.org/pool/updates/main/i/iceape/iceape-dbg_1.0.12~pre080131b-0etch1_arm.deb Size/MD5 checksum: 58769074 99504f3ad7121ed31583e3c77c3086e2 http://security.debian.org/pool/updates/main/i/iceape/iceape-calendar_1.0.12~pre080131b-0etch1_arm.deb Size/MD5 checksum: 586096 4c1e372a14bcbe1ec4b3046be24ced89 http://security.debian.org/pool/updates/main/i/iceape/iceape-dom-inspector_1.0.12~pre080131b-0etch1_arm.deb Size/MD5 checksum: 186930 33820091037a0e30e4271e8c8c462ff9 http://security.debian.org/pool/updates/main/i/iceape/iceape-gnome-support_1.0.12~pre080131b-0etch1_arm.deb Size/MD5 checksum: 47526 5244fa8a247df56a3f14c364107dc5b8 hppa architecture (HP PA RISC) http://security.debian.org/pool/updates/main/i/iceape/iceape-dbg_1.0.12~pre080131b-0etch1_hppa.deb Size/MD5 checksum: 60480238 50ee40317fd63bd0c7d04022e21f8f76 http://security.debian.org/pool/updates/main/i/iceape/iceape-mailnews_1.0.12~pre080131b-0etch1_hppa.deb Size/MD5 checksum: 2340460 70af4c1cfbd089e6a2ad548d1553093b http://security.debian.org/pool/updates/main/i/iceape/iceape-browser_1.0.12~pre080131b-0etch1_hppa.deb Size/MD5 checksum: 12958476 f2acc587b4c985c6ea939ed1bba53de9 http://security.debian.org/pool/updates/main/i/iceape/iceape-calendar_1.0.12~pre080131b-0etch1_hppa.deb Size/MD5 checksum: 615240 7e3158df6d488c6b0bfe7827cfce37ed http://security.debian.org/pool/updates/main/i/iceape/iceape-gnome-support_1.0.12~pre080131b-0etch1_hppa.deb Size/MD5 checksum: 54444 c7ddb1f77645cd60689dbb7a5c4b2768 http://security.debian.org/pool/updates/main/i/iceape/iceape-dom-inspector_1.0.12~pre080131b-0etch1_hppa.deb Size/MD5 checksum: 198108 967170dcf4a4a1d6687d2d0b55edaec8 i386 architecture (Intel ia32) http://security.debian.org/pool/updates/main/i/iceape/iceape-mailnews_1.0.12~pre080131b-0etch1_i386.deb Size/MD5 checksum: 1891212 ba923a32b2a34a9299cb4d5a8bad2d77 http://security.debian.org/pool/updates/main/i/iceape/iceape-browser_1.0.12~pre080131b-0etch1_i386.deb Size/MD5 checksum: 10469782 994f4b0fd8e4bd9af76fe013c7123bdc http://security.debian.org/pool/updates/main/i/iceape/iceape-calendar_1.0.12~pre080131b-0etch1_i386.deb Size/MD5 checksum: 588886 5856c66a12bf5a984668743b8b366cee http://security.debian.org/pool/updates/main/i/iceape/iceape-dom-inspector_1.0.12~pre080131b-0etch1_i386.deb Size/MD5 checksum: 189766 ee9064d51a33a035b7a46de44d80249d http://security.debian.org/pool/updates/main/i/iceape/iceape-dbg_1.0.12~pre080131b-0etch1_i386.deb Size/MD5 checksum: 58697388 299a8786d15d0abb99d7fc6fe4b87b7f http://security.debian.org/pool/updates/main/i/iceape/iceape-gnome-support_1.0.12~pre080131b-0etch1_i386.deb Size/MD5 checksum: 48438 de1f808e760ee3ca502efb8276875fbf ia64 architecture (Intel ia64) http://security.debian.org/pool/updates/main/i/iceape/iceape-calendar_1.0.12~pre080131b-0etch1_ia64.deb Size/MD5 checksum: 661876 a673cbf8efb0be476d2cd23dc514704a http://security.debian.org/pool/updates/main/i/iceape/iceape-gnome-support_1.0.12~pre080131b-0etch1_ia64.deb Size/MD5 checksum: 61898 cccd1556f5ee674a2c2f6ddf71522b39 http://security.debian.org/pool/updates/main/i/iceape/iceape-dbg_1.0.12~pre080131b-0etch1_ia64.deb Size/MD5 checksum: 59883340 f6ee758cb0b235682f20e2e22edd870a http://security.debian.org/pool/updates/main/i/iceape/iceape-mailnews_1.0.12~pre080131b-0etch1_ia64.deb Size/MD5 checksum: 2817080 c0adbe387222eedf4d5cf7eff91a4657 http://security.debian.org/pool/updates/main/i/iceape/iceape-dom-inspector_1.0.12~pre080131b-0etch1_ia64.deb Size/MD5 checksum: 204694 8aa8c681d136482bd2cda6563eacbfb9 http://security.debian.org/pool/updates/main/i/iceape/iceape-browser_1.0.12~pre080131b-0etch1_ia64.deb Size/MD5 checksum: 15783590 960303c76c2be69aad2e4b7bfe4f542e mips architecture (MIPS (Big Endian)) http://security.debian.org/pool/updates/main/i/iceape/iceape-dbg_1.0.12~pre080131b-0etch1_mips.deb Size/MD5 checksum: 61481346 66bc2a72517409d5334bc0ba40be51fd http://security.debian.org/pool/updates/main/i/iceape/iceape-calendar_1.0.12~pre080131b-0etch1_mips.deb Size/MD5 checksum: 599404 ff50ca675b598da75eb7f3ab08d34ee6 http://security.debian.org/pool/updates/main/i/iceape/iceape-browser_1.0.12~pre080131b-0etch1_mips.deb Size/MD5 checksum: 11154048 bd1cb7c5bc7136fd644eb9c87e7181b7 http://security.debian.org/pool/updates/main/i/iceape/iceape-mailnews_1.0.12~pre080131b-0etch1_mips.deb Size/MD5 checksum: 1959202 7eb50924f7400d84008edffd0e9d6413 http://security.debian.org/pool/updates/main/i/iceape/iceape-gnome-support_1.0.12~pre080131b-0etch1_mips.deb Size/MD5 checksum: 49884 80c1be2a4afb6ce7bf9fc785901704dd http://security.debian.org/pool/updates/main/i/iceape/iceape-dom-inspector_1.0.12~pre080131b-0etch1_mips.deb Size/MD5 checksum: 190950 006169fb68cb210f51fe52090be5050e mipsel architecture (MIPS (Little Endian)) http://security.debian.org/pool/updates/main/i/iceape/iceape-gnome-support_1.0.12~pre080131b-0etch1_mipsel.deb Size/MD5 checksum: 49768 42593decc9887241317c87567f8223b1 http://security.debian.org/pool/updates/main/i/iceape/iceape-dom-inspector_1.0.12~pre080131b-0etch1_mipsel.deb Size/MD5 checksum: 191194 78f3b008208527bf214ed516e85b13f3 http://security.debian.org/pool/updates/main/i/iceape/iceape-dbg_1.0.12~pre080131b-0etch1_mipsel.deb Size/MD5 checksum: 59840612 0118b96a4f8d82286b8d5ccc946b6c0d http://security.debian.org/pool/updates/main/i/iceape/iceape-browser_1.0.12~pre080131b-0etch1_mipsel.deb Size/MD5 checksum: 10905670 9874cc963f87d284d927d467eafc8c2f http://security.debian.org/pool/updates/main/i/iceape/iceape-calendar_1.0.12~pre080131b-0etch1_mipsel.deb Size/MD5 checksum: 595920 3024870501878bf13254165af3ac9686 http://security.debian.org/pool/updates/main/i/iceape/iceape-mailnews_1.0.12~pre080131b-0etch1_mipsel.deb Size/MD5 checksum: 1942002 130b8ab791ae8591e22d9635362bf202 powerpc architecture (PowerPC) http://security.debian.org/pool/updates/main/i/iceape/iceape-gnome-support_1.0.12~pre080131b-0etch1_powerpc.deb Size/MD5 checksum: 49232 e526eb3de3861503a826593f582f2932 http://security.debian.org/pool/updates/main/i/iceape/iceape-calendar_1.0.12~pre080131b-0etch1_powerpc.deb Size/MD5 checksum: 596206 da0aa1d500d126ef390da42e3b3bc973 http://security.debian.org/pool/updates/main/i/iceape/iceape-dom-inspector_1.0.12~pre080131b-0etch1_powerpc.deb Size/MD5 checksum: 192018 6278d2517e0d32b3e5c42aa2f0010aef http://security.debian.org/pool/updates/main/i/iceape/iceape-dbg_1.0.12~pre080131b-0etch1_powerpc.deb Size/MD5 checksum: 61613310 b6b25ed7a498f98c3908efb7bd185e0a http://security.debian.org/pool/updates/main/i/iceape/iceape-mailnews_1.0.12~pre080131b-0etch1_powerpc.deb Size/MD5 checksum: 2006468 3253d618628235a609417783309079aa http://security.debian.org/pool/updates/main/i/iceape/iceape-browser_1.0.12~pre080131b-0etch1_powerpc.deb Size/MD5 checksum: 11304736 186491b14177328e4cdcc2c0599bee48 s390 architecture (IBM S/390) http://security.debian.org/pool/updates/main/i/iceape/iceape-gnome-support_1.0.12~pre080131b-0etch1_s390.deb Size/MD5 checksum: 53962 937cb4b85e25812c189fde886a9ae8b8 http://security.debian.org/pool/updates/main/i/iceape/iceape-dom-inspector_1.0.12~pre080131b-0etch1_s390.deb Size/MD5 checksum: 196854 e838b4c9820b202ba25da00adca529e8 http://security.debian.org/pool/updates/main/i/iceape/iceape-browser_1.0.12~pre080131b-0etch1_s390.deb Size/MD5 checksum: 12282708 04c09a3bbbe96035301ffa3fa427d2e2 http://security.debian.org/pool/updates/main/i/iceape/iceape-dbg_1.0.12~pre080131b-0etch1_s390.deb Size/MD5 checksum: 60369160 80e463d3e1abe4c6f2e44084c0af1cc6 http://security.debian.org/pool/updates/main/i/iceape/iceape-calendar_1.0.12~pre080131b-0etch1_s390.deb Size/MD5 checksum: 611658 d51e50f35fa7f644e68719bd3c3e1cde http://security.debian.org/pool/updates/main/i/iceape/iceape-mailnews_1.0.12~pre080131b-0etch1_s390.deb Size/MD5 checksum: 2185818 4b702edba4ac2c7e85a22f499250fd40 sparc architecture (Sun SPARC/UltraSPARC) http://security.debian.org/pool/updates/main/i/iceape/iceape-mailnews_1.0.12~pre080131b-0etch1_sparc.deb Size/MD5 checksum: 1895872 2eb1f20b00c11d4f4330016aaa827d55 http://security.debian.org/pool/updates/main/i/iceape/iceape-browser_1.0.12~pre080131b-0etch1_sparc.deb Size/MD5 checksum: 10652974 8ea3ab5df7323a302c0b9441222fb407 http://security.debian.org/pool/updates/main/i/iceape/iceape-dbg_1.0.12~pre080131b-0etch1_sparc.deb Size/MD5 checksum: 58513948 a455a4a30f354129f5ab3441fcb422af http://security.debian.org/pool/updates/main/i/iceape/iceape-calendar_1.0.12~pre080131b-0etch1_sparc.deb Size/MD5 checksum: 585296 a57295461949681a7628c2c0aa603ccb http://security.debian.org/pool/updates/main/i/iceape/iceape-gnome-support_1.0.12~pre080131b-0etch1_sparc.deb Size/MD5 checksum: 48038 5cba2cf78058d6dd4609cb895961298d http://security.debian.org/pool/updates/main/i/iceape/iceape-dom-inspector_1.0.12~pre080131b-0etch1_sparc.deb Size/MD5 checksum: 189644 bdc3c7725fed05757a888de08a4fa959 These files will probably be moved into the stable distribution on its next update. - --------------------------------------------------------------------------------- For apt-get: deb http://security.debian.org/ stable/updates main For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main Mailing list: debian-security-announce@lists.debian.org Package info: `apt-cache show ' and http://packages.debian.org/ -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.6 (GNU/Linux) iD8DBQFHwWMXXm3vHE4uyloRAni+AKCFZjHGe6/mGspe9LnXov75lXzIKgCgrd1H mx26R4fNESdhTDfR3/KLHdo= =hdcu -----END PGP SIGNATURE-----
Screenshot

Project Spotlight

Kigo Video Converter Ultimate for Mac

A tool for converting and editing videos.

Screenshot

Project Spotlight

Kid3

An efficient tagger for MP3, Ogg/Vorbis, and FLAC files.