Debian: New Mozilla Thunderbird packages fix several vulnerabilities
Summary
Tom Ferris discovered a bug in the IDN hostname handling of
Mozilla that allows remote attackers to cause a denial of service
and possibly execute arbitrary code via a hostname with dashes.
CAN-2005-2701
A buffer overflow allows remote attackers to execute arbitrary
code via an XBM image file that ends in a large number of spaces
instead of the expected end tag.
CAN-2005-2702
Mats Palmgren discovered a buffer overflow in the Unicode string
parser that allowas a specially crafted unicode sequences to
overflow a buffer and cause arbitrary code to be executed.
CAN-2005-2703
Remote attackers could spoof HTTP headers of XML HTTP requests
via XMLHttpRequest and possibly use the client to exploit
vulnerabilities in servers or proxies.
CAN-2005-2704
Remote attackers could spoof DOM objects via an XBL control that
implements an internal XPCOM interface.
CAN-2005-2705
Georgi Guninski discovered an integer overflow in the JavaScript
engine that might allow remote attackers to execute arbitrary
code.
CAN-2005-2706
Remote attackers could execute Javascript code with chrome
privileges via an about: page such as about:mozilla.
CAN-2005-2707
Remote attackers could spawn windows without user interface
components such as the address and status bar that could be used
to conduct spoofing or phishing attacks.
CAN-2005-2968
Peter Zelezny discovered that shell metacharacters are not
properly escaped when they are passed to a shell script and allow
the execution of arbitrary commands, e.g. when a malicious URL is
automatically copied from another program into Mozilla as default
browser.
For the stable distribution (sarge) these problems have been fixed in
version 1.0.2-2.sarge1.0.7.
For the unstable distribution (sid) these problems have been fixed in
version 1.0.7-1.
We recommend that you upgrade your mozilla-thunderbird package.
Upgrade Instructions
- --------------------wget url
will fetch the file for you
dpkg -i file.deb
will install the referenced file.
If you are using the apt-get package manager, use the line for
sources.list as given below:
apt-get update
will update the internal database
apt-get upgrade
will install corrected packages
You may use an automated update by adding the resources from the
footer to the proper configuration.
Debian GNU/Linux 3.1 alias sarge
Size/MD5 checksum: 997 303ed28d7dac19a27a47c23819f80bd7
Size/MD5 checksum: 210991 79fbaf89373ea1d4698942f289b556d2
Size/MD5 checksum: 33288906 806175393a226670aa66060452d31df4
Alpha architecture:
Size/MD5 checksum: 12829612 e50199388042e84de94d2b015484fedc
Size/MD5 checksum: 3269804 1b50a6a5ca2df178025f4bfb9e72ef7d
Size/MD5 checksum: 145778 4bffbad43fba608ae24f64b36d936c99
Size/MD5 checksum: 27290 f979f0128931281a2eb004910b8ba5c8
Size/MD5 checksum: 83080 d39767ad00fc79d6dd014d20aa2b94e9
AMD64 architecture:
Size/MD5 checksum: 12240810 5ac70842faf52d027c0376bc5d4f60e5
Size/MD5 checksum: 3270622 60d3f2eecebb4806bfaef54db73d26c6
Size/MD5 checksum: 144798 152536a2fa4d71b41a73f614824809c5
Size/MD5 checksum: 27280 21aaf659e40e08d2434fca10e8a97a5b
Size/MD5 checksum: 82972 dc0c6b48cbbdc2c0f39e30ab930ac612
ARM architecture:
Size/MD5 checksum: 10328712 2e587b8809aeda36023974b42693e4f2
Size/MD5 checksum: 3265014 ce2fcff9b73b5c2ba69ad3a8c47fdd83
Size/MD5 checksum: 136886 b13673a24d714b375b54c17ce7a8a308
Size/MD5 checksum: 27308 a2a3d30505885a521b703b99b40ebd66
Size/MD5 checksum: 74954 039d4f13961625a42dbeaac125e0a125
Intel IA-32 architecture:
Size/MD5 checksum: 11550326 fc8572c0a89b914fc288fd638e224213
Size/MD5 checksum: 3497080 02fbded3b5e503def6c29f32c34b24d1
Size/MD5 checksum: 140456 a90c517acdcaf177b4585cf8f9e35344
Size/MD5 checksum: 27286 ec039bd40938c0d6bb87874cc8703c25
Size/MD5 checksum: 81696 ecf0d09362306bcd6c8a65c2e779f792
Intel IA-64 architecture:
Size/MD5 checksum: 14602590 f69ca59b99191b96a3a8dbd69f2652b1
Size/MD5 checksum: 3284198 ea4287ce4ba1b6f36ab96d419528d8e3
Size/MD5 checksum: 149120 8c288112472ef49da43cdfd24b9524ac
Size/MD5 checksum: 27286 789de6fbe31cf969076e3ef19bcc9319
Size/MD5 checksum: 100774 b27c9fb9fef1cb19959953d8cb13e74a
HP Precision architecture:
Size/MD5 checksum: 13550208 82ea35b6046092051ee9e7212f160403
Size/MD5 checksum: 3275452 06778a5a45f737f5f0fffa8f7e2648f1
Size/MD5 checksum: 147020 9ebbdd2d3bc44c45d0752c62c68e527e
Size/MD5 checksum: 27294 2a7860aedde7c3535fd19105121c2043
Size/MD5 checksum: 90916 4a602f8c63d22f80fabb10e2019402e2
Motorola 680x0 architecture:
Size/MD5 checksum: 10774276 d3ea2f30a593a8ec702230168a59fc24
Size/MD5 checksum: 3263230 5757de718fb0c34c9db6affcb554068f
Size/MD5 checksum: 138658 6f3f3b329ee12275eb6eea3be2d9c59a
Size/MD5 checksum: 27318 b9e4fe5b540bc544eab853b8077cc2d3
Size/MD5 checksum: 76178 8aa668acaf233693e6bc55d3d3f983e0
Big endian MIPS architecture:
Size/MD5 checksum: 11933302 e1859aeb3cba8f716f6358499c79a6c6
Size/MD5 checksum: 3269570 383accb42b1d5cb16ed669ebdeea3db0
Size/MD5 checksum: 141722 f94d559a76c4488fd29ca08f2a5aa2e4
Size/MD5 checksum: 27288 d44eb068d5211f6ec32a912c7158b95c
Size/MD5 checksum: 78500 cf4e68bdc3956dc3ad780ed88188667c
Little endian MIPS architecture:
Size/MD5 checksum: 11793468 99b3eb9576dc324920f2217c9eb153ef
Size/MD5 checksum: 3270338 5c13a33de951afe85fed1adb014be4ab
Size/MD5 checksum: 141292 8fe41e9685ddbdd396fd73354867f49b
Size/MD5 checksum: 27304 3f96914c37025c901090a86cb6a2fc07
Size/MD5 checksum: 78350 37448dc23ebcf8d8a7a5431d579c6670
PowerPC architecture:
Size/MD5 checksum: 10892752 c4642646840672162e058dd2ca7a3309
Size/MD5 checksum: 3263168 6e5b333f01170824eaf06b219caea6ab
Size/MD5 checksum: 138680 ff10d8c364f08f8d6dbf3c01c1aa19df
Size/MD5 checksum: 27296 1112ef17ba7fcd97b5e9ef96ea2a03ab
Size/MD5 checksum: 75032 6083403690046238fa54fb19262f19da
IBM S/390 architecture:
Size/MD5 checksum: 12685000 d9dcc7200f471840874dd933e327d6ea
Size/MD5 checksum: 3270478 c7164fc9fc49387916f7d4f2d46d369f
Size/MD5 checksum: 145108 766d10f0d52d8f877ae10291c7f092a7
Size/MD5 checksum: 27292 5d5a68b544e284c162476096ea263eda
Size/MD5 checksum: 82992 8648e3e4157d11344b483d3997156af0
Sun Sparc architecture:
Size/MD5 checksum: 11157174 d19fc8bcdc091d58abac26844734568b
Size/MD5 checksum: 3267158 1f4f1ab1f525c261be893df79a77639b
Size/MD5 checksum: 138358 eeb8d91cc46daf6020a7f60d17ccdb7c
Size/MD5 checksum: 27304 9786860d3265d8dd03c964df8afbc5ab
Size/MD5 checksum: 76782 7231203489126cc4f3ad6d68fa863783
These files will probably be moved into the stable distribution on
its next update.
For dpkg-ftp: dists/stable/updates/main
Mailing list: debian-security-announce@lists.debian.org