Share your story
The central voice for Linux and Open Source security news
Home News Topics Advisories HOWTOs Features Newsletters About Register

Sign up!
EnGarde Community
What is the most important Linux security technology?
Linux Events
Linux User Groups
Link to Us
Security Center
Book Reviews
Security Dictionary
Security Tips
White Papers
Featured Blogs
All About Linux
DanWalsh LiveJournal
Latest Newsletters
Linux Security Week: March 30th, 2015
Linux Advisory Watch: March 27th, 2015
LinuxSecurity Newsletters
Choose Lists:
About our Newsletters
RSS Feeds
Get the LinuxSecurity news you want faster with RSS
Powered By

Debian: New iceape packages fix arbitrary code execution Print E-mail
User Rating:      How can I rate this item?
Posted by Benjamin D. Thomas   
Debian It was discovered that crashes in the Javascript engine of Iceape, an unbranded version of the Seamonkey internet suite could potentially lead to the execution of arbitrary code.
- ------------------------------------------------------------------------
Debian Security Advisory DSA-1562-1                               Moritz Muehlenhoff
April 28, 2008              
- ------------------------------------------------------------------------

Package        : iceape
Vulnerability  : programming error
Problem type   : remote
Debian-specific: no
CVE Id(s)      : CVE-2008-1380

It was discovered that crashes in the Javascript engine of Iceape,
an unbranded version of the Seamonkey internet suite could
potentially lead to the execution of arbitrary code.

For the stable distribution (etch), this problem has been fixed in
version 1.0.13~pre080323b-0etch3.

For the unstable distribution (sid), this problem has been fixed in
version 1.1.9-2.

We recommend that you upgrade your iceape packages.

Upgrade instructions
- --------------------

wget url
        will fetch the file for you
dpkg -i file.deb
        will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
        will update the internal database
apt-get upgrade
        will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.

Debian 4.0 (stable)
- -------------------

Stable updates are available for alpha, amd64, arm, hppa, i386, ia64, mips, mipsel, powerpc, s390 and sparc.

Source archives:
    Size/MD5 checksum:   272290 65a6cc900463ab3324a42250ce39c10b
    Size/MD5 checksum: 42900009 f2a3c50d814f6e7015f779b10494fac8
    Size/MD5 checksum:     1439 7e71d648dcc53a64aa9e8675c09021f8

Architecture independent packages:
    Size/MD5 checksum:    27638 9ea252e567314297df273d1d0565c081
    Size/MD5 checksum:    27636 19e71b334df21b23b2f511830972a0d4
    Size/MD5 checksum:    27682 7bfcf10a1034eefac22ae8657dee9bd2
    Size/MD5 checksum:    27772 36a3464a2d8fd4fc3847039b82dd1f5f
    Size/MD5 checksum:    29034 a9f31dc27b4b17c63b783f07c3f8fd2c
    Size/MD5 checksum:    27650 6894ea2d406646086f60a29c1aba9cbe
    Size/MD5 checksum:  3928844 9a28456f31b2b5a06c6e69b175183ab9
    Size/MD5 checksum:    28606 6e89267d545052a9b053c0b17b02d265
    Size/MD5 checksum:    27676 fed0fa97fb88ec0c975c432003dffaea
    Size/MD5 checksum:   282388 f6e5876a2562123eb182f44a9d28c0f5
    Size/MD5 checksum:    27644 97fd6c82d0386ed6f1ed8c2b45391634
    Size/MD5 checksum:    27658 67afa911887af3df5a081d9bcaeb9e7b

alpha architecture (DEC Alpha)
    Size/MD5 checksum:  2281694 6688ce20712749da04e7bc0e1f63b531
    Size/MD5 checksum:    55052 d14150e730a8357b0e2ef81542eb604b
    Size/MD5 checksum: 60657374 ebc2656e676b129223a0d7b060205d32
    Size/MD5 checksum: 12886440 aa35edb178dc8812275a005cb0449e7b
    Size/MD5 checksum:   627600 a7801c7ba516484aa2028c91646c2504
    Size/MD5 checksum:   199118 44501f7751ab5a2b0e7cab912a132200

amd64 architecture (AMD x86_64 (AMD64))
    Size/MD5 checksum:   195524 d36d3e4cf9f7442bb550f5e8675b3036
    Size/MD5 checksum:   614288 f1396dbd501a98b181cca52d5ba8e2a8
    Size/MD5 checksum: 59660176 f90d321b0a4599135fe16f53338b362f
    Size/MD5 checksum:  2100064 c626d518a1becbf76a23aa064a3ee2eb
    Size/MD5 checksum: 11692364 6b191980ebc9d493f703b5fedc65081b
    Size/MD5 checksum:    53836 8695a98820343b899364083a40b03c1a

arm architecture (ARM)
    Size/MD5 checksum: 58799260 c243477696e8ea19c4263d2656d97c0c
    Size/MD5 checksum:   586712 0c8a041b5a1d7d41263fa2c27575d607
    Size/MD5 checksum:  1917016 7ceb3becd5be4a158bcd28151bd7ab51
    Size/MD5 checksum:    47860 e65b19737b893676a310b8256e4b3b38
    Size/MD5 checksum: 10426174 2d5f6458ed8aca7ee0f8c5ec643c9964
    Size/MD5 checksum:   187162 a08b63a8fb7f448664b01e52f8de9ffb

hppa architecture (HP PA RISC)
    Size/MD5 checksum: 12992154 d00f8b54c176ce496f4728c7198d004a
    Size/MD5 checksum:  2349904 356528663fc19599701944ee30afe6ff
    Size/MD5 checksum:    55244 3edf68481a15575131f426a569a171d4
    Size/MD5 checksum:   198650 b7f9775322181a1fd944dd8b3b90681d
    Size/MD5 checksum: 60520216 cf8581572da5dedbbd3696ebbb793ba3
    Size/MD5 checksum:   619710 ef8266cbebfdfdcf659999c8e67ecbaf

i386 architecture (Intel ia32)
    Size/MD5 checksum:   190234 f3f876cbc5cf3efec5ceb50a2c23d8dd
    Size/MD5 checksum: 58741446 e2afabfab01c0a75295864916a20f0ca
    Size/MD5 checksum: 10481106 9f7420c8033d5783cbfdd40ec9dc91ff
    Size/MD5 checksum:    48872 226a49cb7be9ba105ed34ec974dd59c4
    Size/MD5 checksum:   589458 3de29c0ae9e2a230ffbfcd5126822f4a
    Size/MD5 checksum:  1892130 05cccfec539b244127470556c51984e5

ia64 architecture (Intel ia64)
    Size/MD5 checksum:   662418 ae517af1ffb77c7b51235872f7d80312
    Size/MD5 checksum: 15794624 93cc77d14a609e82d121e56cc2c27bfc
    Size/MD5 checksum:  2817276 41d813a7f813ac4f4b0f41a456cc02f7
    Size/MD5 checksum:    62370 b097cd29fa93c5529673cb6b51dc9fad
    Size/MD5 checksum: 59920168 46992c61685020d55a2d3f5954f4c1dd
    Size/MD5 checksum:   205156 235d6ba67f58d4796d75375ee0c9d488

mips architecture (MIPS (Big Endian))
    Size/MD5 checksum:    50344 34df46c921c10427bd2be8f81a588b67
    Size/MD5 checksum:  1959720 6d82bdd9b96c072b4f693fe578c9366f
    Size/MD5 checksum:   599894 deea3ff0702f70c48628d34dc63c373b
    Size/MD5 checksum: 61515672 e493c5a6ac2fca145163c27dddfbeb44
    Size/MD5 checksum:   191488 63738c541fadb3092eead2f3e5f1cd26
    Size/MD5 checksum: 11157416 e39b38cad58bfca703d7d3a332a63d1b

mipsel architecture (MIPS (Little Endian))
    Size/MD5 checksum:   191704 36ee86fdbd01a7d250ecb028bca5ad5b
    Size/MD5 checksum: 59864044 65cb18ae21e9231db157d41b5d91f12c
    Size/MD5 checksum:  1942838 94c7f270fd6fdc8142d41b202df8eefd
    Size/MD5 checksum:    50204 3243edf82c2bcbd7784393cda8a2c1e6
    Size/MD5 checksum: 10911166 7d75c7d1918658e1a6f6435780e0885d
    Size/MD5 checksum:   596506 62a92a8f8a703393df92d595250c5669

powerpc architecture (PowerPC)
    Size/MD5 checksum: 61652008 2891f06dc14d01571cd67c63391aabc2
    Size/MD5 checksum:   596662 5a7f977f5e1ebb9e27d3f1faf969a573
    Size/MD5 checksum:  2006874 aa7cf8f2b5bd5091b889185f55460a40
    Size/MD5 checksum:    49666 0a376f9b57ed80972ba170533623fb7f
    Size/MD5 checksum:   192472 494082cc73ee91c15d8c102015e27357
    Size/MD5 checksum: 11310932 7995d14bb7fb8ccc76c7b70e9ce93204

s390 architecture (IBM S/390)
    Size/MD5 checksum:    54436 685ac8c473a6d6f2f33d31c74a334238
    Size/MD5 checksum:  2186280 5db2c2e519c5f8e76061ce6c48d851a3
    Size/MD5 checksum: 60408272 b141b0de2b3e3e9cd2bef50b0a956050
    Size/MD5 checksum: 12288534 1b3cd06388c789d7a977fe9b284b19ab
    Size/MD5 checksum:   197338 8981bee198dad3399e7e5bc293785537
    Size/MD5 checksum:   612218 be67de61abb2e447a34c0eaf706498df

sparc architecture (Sun SPARC/UltraSPARC)
    Size/MD5 checksum:  1896522 7212773ff30ee7f0c9c268738f022e46
    Size/MD5 checksum:   190132 8731cfeb8d89d4006f5b53836f25f02b
    Size/MD5 checksum:    48478 d131f30545b3aa2ca2008e983ad4ef9f
    Size/MD5 checksum:   585808 352c0eb180728a70c5b805839b5a7e67
    Size/MD5 checksum: 58543536 92de9dc46e407a7c23f95023ad3a4a91
    Size/MD5 checksum: 10660224 c21e2625875cf929b9a01767c203c9cd

  These files will probably be moved into the stable distribution on
  its next update.

- ---------------------------------------------------------------------------------
For apt-get: deb stable/updates main
For dpkg-ftp: dists/stable/updates/main
Mailing list:
< Prev   Next >


Latest Features
Peter Smith Releases Linux Network Security Online
Securing a Linux Web Server
Password guessing with Medusa 2.0
Password guessing as an attack vector
Squid and Digest Authentication
Squid and Basic Authentication
Demystifying the Chinese Hacking Industry: Earning 6 Million a Night
Free Online security course (LearnSIA) - A Call for Help
What You Need to Know About Linux Rootkits
Review: A Practical Guide to Fedora and Red Hat Enterprise Linux - Fifth Edition
Weekend Edition
FBI Quietly Removes Recommendation To Encrypt Your Phone
And the prize for LEAST SECURE BROWSER goes to ... Chrome!
Partner Sponsor

Community | HOWTOs | Blogs | Features | Book Reviews | Networking
 Security Projects |  Latest News |  Newsletters |  SELinux |  Privacy |  Home
 Hardening |   About Us |   Advertise |   Legal Notice |   RSS |   Guardian Digital
(c)Copyright 2015 Guardian Digital, Inc. All rights reserved.