Debian: New Mozilla Thunderbird packages fix several vulnerabilities
Summary
- --------------------------------------------------------------------------Debian Security Advisory DSA 868-1 security@debian.org http://www.debian.org/security/ Martin Schulze October 20th, 2005 http://www.debian.org/security/faq - --------------------------------------------------------------------------Package : mozilla-thunderbird Vulnerability : several Problem type : remote Debian-specific: no CVE IDs : CAN-2005-2871 CAN-2005-2701 CAN-2005-2702 CAN-2005-2703 CAN-2005-2704 CAN-2005-2705 CAN-2005-2706 CAN-2005-2707 CAN-2005-2968 CERT advisory : VU#573857 BugTraq ID : 14784 Debian Bug : 327366 329778 Several security-related problems have been discovered in Mozilla and derived programs. Some of the following problems don't exactly apply to Mozilla Thunderbird, even though the code is present. In order to keep the codebase in sync with upstream it has been altered nevertheless. The Common Vulnerabilities and Exposures project identifies the following problems: CAN-2005-2871 Tom Ferris discovered a bug in the IDN hostname handling of Mozilla that allows remote attackers to cause a denial of service and possibly execute arbitrary code via a hostname with dashes. CAN-2005-2701 A buffer overflow allows remote attackers to execute arbitrary code via an XBM image file that ends in a large number of spaces instead of the expected end tag. CAN-2005-2702 Mats Palmgren discovered a buffer overflow in the Unicode string parser that allowas a specially crafted unicode sequences to overflow a buffer and cause arbitrary code to be executed. CAN-2005-2703 Remote attackers could spoof HTTP headers of XML HTTP requests via XMLHttpRequest and possibly use the client to exploit vulnerabilities in servers or proxies. CAN-2005-2704 Remote attackers could spoof DOM objects via an XBL control that implements an internal XPCOM interface. CAN-2005-2705 Georgi Guninski discovered an integer overflow in the JavaScript engine that might allow remote attackers to execute arbitrary code. CAN-2005-2706 Remote attackers could execute Javascript code with chrome privileges via an about: page such as about:mozilla. CAN-2005-2707 Remote attackers could spawn windows without user interface components such as the address and status bar that could be used to conduct spoofing or phishing attacks. CAN-2005-2968 Peter Zelezny discovered that shell metacharacters are not properly escaped when they are passed to a shell script and allow the execution of arbitrary commands, e.g. when a malicious URL is automatically copied from another program into Mozilla as default browser. For the stable distribution (sarge) these problems have been fixed in version 1.0.2-2.sarge1.0.7. For the unstable distribution (sid) these problems have been fixed in version 1.0.7-1. We recommend that you upgrade your mozilla-thunderbird package. Upgrade Instructions - --------------------wget url will fetch the file for you dpkg -i file.deb will install the referenced file. If you are using the apt-get package manager, use the line for sources.list as given below: apt-get update will update the internal database apt-get upgrade will install corrected packages You may use an automated update by adding the resources from the footer to the proper configuration. Debian GNU/Linux 3.1 alias sarge - -------------------------------- Source archives: Size/MD5 checksum: 997 303ed28d7dac19a27a47c23819f80bd7 Size/MD5 checksum: 210991 79fbaf89373ea1d4698942f289b556d2 Size/MD5 checksum: 33288906 806175393a226670aa66060452d31df4 Alpha architecture: Size/MD5 checksum: 12829612 e50199388042e84de94d2b015484fedc Size/MD5 checksum: 3269804 1b50a6a5ca2df178025f4bfb9e72ef7d Size/MD5 checksum: 145778 4bffbad43fba608ae24f64b36d936c99 Size/MD5 checksum: 27290 f979f0128931281a2eb004910b8ba5c8 Size/MD5 checksum: 83080 d39767ad00fc79d6dd014d20aa2b94e9 AMD64 architecture: Size/MD5 checksum: 12240810 5ac70842faf52d027c0376bc5d4f60e5 Size/MD5 checksum: 3270622 60d3f2eecebb4806bfaef54db73d26c6 Size/MD5 checksum: 144798 152536a2fa4d71b41a73f614824809c5 Size/MD5 checksum: 27280 21aaf659e40e08d2434fca10e8a97a5b Size/MD5 checksum: 82972 dc0c6b48cbbdc2c0f39e30ab930ac612 ARM architecture: Size/MD5 checksum: 10328712 2e587b8809aeda36023974b42693e4f2 Size/MD5 checksum: 3265014 ce2fcff9b73b5c2ba69ad3a8c47fdd83 Size/MD5 checksum: 136886 b13673a24d714b375b54c17ce7a8a308 Size/MD5 checksum: 27308 a2a3d30505885a521b703b99b40ebd66 Size/MD5 checksum: 74954 039d4f13961625a42dbeaac125e0a125 Intel IA-32 architecture: Size/MD5 checksum: 11550326 fc8572c0a89b914fc288fd638e224213 Size/MD5 checksum: 3497080 02fbded3b5e503def6c29f32c34b24d1 Size/MD5 checksum: 140456 a90c517acdcaf177b4585cf8f9e35344 Size/MD5 checksum: 27286 ec039bd40938c0d6bb87874cc8703c25 Size/MD5 checksum: 81696 ecf0d09362306bcd6c8a65c2e779f792 Intel IA-64 architecture: Size/MD5 checksum: 14602590 f69ca59b99191b96a3a8dbd69f2652b1 Size/MD5 checksum: 3284198 ea4287ce4ba1b6f36ab96d419528d8e3 Size/MD5 checksum: 149120 8c288112472ef49da43cdfd24b9524ac Size/MD5 checksum: 27286 789de6fbe31cf969076e3ef19bcc9319 Size/MD5 checksum: 100774 b27c9fb9fef1cb19959953d8cb13e74a HP Precision architecture: Size/MD5 checksum: 13550208 82ea35b6046092051ee9e7212f160403 Size/MD5 checksum: 3275452 06778a5a45f737f5f0fffa8f7e2648f1 Size/MD5 checksum: 147020 9ebbdd2d3bc44c45d0752c62c68e527e Size/MD5 checksum: 27294 2a7860aedde7c3535fd19105121c2043 Size/MD5 checksum: 90916 4a602f8c63d22f80fabb10e2019402e2 Motorola 680x0 architecture: Size/MD5 checksum: 10774276 d3ea2f30a593a8ec702230168a59fc24 Size/MD5 checksum: 3263230 5757de718fb0c34c9db6affcb554068f Size/MD5 checksum: 138658 6f3f3b329ee12275eb6eea3be2d9c59a Size/MD5 checksum: 27318 b9e4fe5b540bc544eab853b8077cc2d3 Size/MD5 checksum: 76178 8aa668acaf233693e6bc55d3d3f983e0 Big endian MIPS architecture: Size/MD5 checksum: 11933302 e1859aeb3cba8f716f6358499c79a6c6 Size/MD5 checksum: 3269570 383accb42b1d5cb16ed669ebdeea3db0 Size/MD5 checksum: 141722 f94d559a76c4488fd29ca08f2a5aa2e4 Size/MD5 checksum: 27288 d44eb068d5211f6ec32a912c7158b95c Size/MD5 checksum: 78500 cf4e68bdc3956dc3ad780ed88188667c Little endian MIPS architecture: Size/MD5 checksum: 11793468 99b3eb9576dc324920f2217c9eb153ef Size/MD5 checksum: 3270338 5c13a33de951afe85fed1adb014be4ab Size/MD5 checksum: 141292 8fe41e9685ddbdd396fd73354867f49b Size/MD5 checksum: 27304 3f96914c37025c901090a86cb6a2fc07 Size/MD5 checksum: 78350 37448dc23ebcf8d8a7a5431d579c6670 PowerPC architecture: Size/MD5 checksum: 10892752 c4642646840672162e058dd2ca7a3309 Size/MD5 checksum: 3263168 6e5b333f01170824eaf06b219caea6ab Size/MD5 checksum: 138680 ff10d8c364f08f8d6dbf3c01c1aa19df Size/MD5 checksum: 27296 1112ef17ba7fcd97b5e9ef96ea2a03ab Size/MD5 checksum: 75032 6083403690046238fa54fb19262f19da IBM S/390 architecture: Size/MD5 checksum: 12685000 d9dcc7200f471840874dd933e327d6ea Size/MD5 checksum: 3270478 c7164fc9fc49387916f7d4f2d46d369f Size/MD5 checksum: 145108 766d10f0d52d8f877ae10291c7f092a7 Size/MD5 checksum: 27292 5d5a68b544e284c162476096ea263eda Size/MD5 checksum: 82992 8648e3e4157d11344b483d3997156af0 Sun Sparc architecture: Size/MD5 checksum: 11157174 d19fc8bcdc091d58abac26844734568b Size/MD5 checksum: 3267158 1f4f1ab1f525c261be893df79a77639b Size/MD5 checksum: 138358 eeb8d91cc46daf6020a7f60d17ccdb7c Size/MD5 checksum: 27304 9786860d3265d8dd03c964df8afbc5ab Size/MD5 checksum: 76782 7231203489126cc4f3ad6d68fa863783 These files will probably be moved into the stable distribution on its next update. - ---------------------------------------------------------------------------------For apt-get: deb http://security.debian.org/ stable/updates main For dpkg-ftp: dists/stable/updates/main Mailing list: debian-security-announce@lists.debian.org