LinuxSecurity.com
Share your story
The central voice for Linux and Open Source security news
Home News Topics Advisories HOWTOs Features Newsletters About Register

Welcome!
Sign up!
EnGarde Community
Login
Polls
What is the most important Linux security technology?
 
Advisories
Community
Linux Events
Linux User Groups
Link to Us
Security Center
Book Reviews
Security Dictionary
Security Tips
SELinux
White Papers
Featured Blogs
All About Linux
DanWalsh LiveJournal
Securitydistro
Latest Newsletters
Linux Advisory Watch: December 19th, 2014
Linux Advisory Watch: December 12th, 2014
Subscribe
LinuxSecurity Newsletters
E-mail:
Choose Lists:
About our Newsletters
RSS Feeds
Get the LinuxSecurity news you want faster with RSS
Powered By

  
Debian: New iceweasel packages fix several vulnerabilities Print E-mail
User Rating:      How can I rate this item?
Posted by Benjamin D. Thomas   
Debian Several remote vulnerabilities have been discovered in the Iceweasel web browser, an unbranded version of the Firefox browser.It was discovered that missing boundary checks on a reference counter for CSS objects can lead to the execution of arbitrary code.
- ------------------------------------------------------------------------
Debian Security Advisory DSA-1614-1                  security@debian.org
http://www.debian.org/security/                       Moritz Muehlenhoff
July 23, 2008                         http://www.debian.org/security/faq
- ------------------------------------------------------------------------

Package        : iceweasel
Vulnerability  : several
Problem-Type   : remote
Debian-specific: no
CVE ID         : CVE-2008-2785 CVE-2008-2933

Several remote vulnerabilities have been discovered in the Iceweasel
web browser, an unbranded version of the Firefox browser. The Common 
Vulnerabilities and Exposures project identifies the following problems:

CVE-2008-2785

    It was discovered that missing boundary checks on a reference
    counter for CSS objects can lead to the execution of arbitrary code.

CVE-2008-2933

    Billy Rios discovered that passing an URL containing a pipe symbol
    to Iceweasel can lead to Chrome privilege escalation.

For the stable distribution (etch), these problems have been fixed in
version 2.0.0.16-0etch1. Updated packages for ia64, arm and mips are
not yet available and will be released as soon as they have been built.

For the unstable distribution (sid), these problems have been fixed in
xulrunner 1.9.0.1-1 and iceweasel 3.0.1-1.

We recommend that you upgrade your iceweasel package.

Upgrade instructions
- --------------------

wget url
        will fetch the file for you
dpkg -i file.deb
        will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
        will update the internal database
apt-get upgrade
        will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.


Debian GNU/Linux 4.0 alias etch
- -------------------------------

Stable updates are available for alpha, amd64, hppa, i386, mipsel, powerpc, s390 and sparc.

Source archives:

  http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel_2.0.0.16-0etch1.diff.gz
    Size/MD5 checksum:   186601 1a6e2029bb1be403464dc05d0d7056f3
  http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel_2.0.0.16.orig.tar.gz
    Size/MD5 checksum: 47244084 838ff458cac5da69ac0f2102c9a4fa43
  http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel_2.0.0.16-0etch1.dsc
    Size/MD5 checksum:     1289 b20f98b6d9dea662336b8287164b326e

Architecture independent packages:

  http://security.debian.org/pool/updates/main/i/iceweasel/mozilla-firefox-dom-inspector_2.0.0.16-0etch1_all.deb
    Size/MD5 checksum:    54310 13d18b856d4e0a01e7931afef496e3ec
  http://security.debian.org/pool/updates/main/i/iceweasel/firefox-dom-inspector_2.0.0.16-0etch1_all.deb
    Size/MD5 checksum:    54460 dc8582c2f9b6f7be94c881596ce9d191
  http://security.debian.org/pool/updates/main/i/iceweasel/mozilla-firefox-gnome-support_2.0.0.16-0etch1_all.deb
    Size/MD5 checksum:    54310 816c6f0fd47121ca9ab87116b631c210
  http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel-dom-inspector_2.0.0.16-0etch1_all.deb
    Size/MD5 checksum:   239618 b130c9f2f2e153789d4081b03c1f3ecf
  http://security.debian.org/pool/updates/main/i/iceweasel/mozilla-firefox_2.0.0.16-0etch1_all.deb
    Size/MD5 checksum:    55096 c080b75d5a9b47353c070c8ae018ee93
  http://security.debian.org/pool/updates/main/i/iceweasel/firefox-gnome-support_2.0.0.16-0etch1_all.deb
    Size/MD5 checksum:    54428 6ef73c9c91f47d9d3b9695b0baba16e0
  http://security.debian.org/pool/updates/main/i/iceweasel/firefox_2.0.0.16-0etch1_all.deb
    Size/MD5 checksum:    54572 fc0e196c2ac5634b69c8d393eaa83809

alpha architecture (DEC Alpha)

  http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel-gnome-support_2.0.0.16-0etch1_alpha.deb
    Size/MD5 checksum:    90158 d993f5d5638bf2644992c3a51cb07aaf
  http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel-dbg_2.0.0.16-0etch1_alpha.deb
    Size/MD5 checksum: 51153588 537368b3db70016472e36fa96fa6d45f
  http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel_2.0.0.16-0etch1_alpha.deb
    Size/MD5 checksum: 11577992 dfcf655ebf1ab9f30e2fdd10aee79b77

amd64 architecture (AMD x86_64 (AMD64))

  http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel-gnome-support_2.0.0.16-0etch1_amd64.deb
    Size/MD5 checksum:    87828 bedb77649ba472190d25054b192b6209
  http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel_2.0.0.16-0etch1_amd64.deb
    Size/MD5 checksum: 10203870 5de267d5ee71e3847e73ae64872100ad
  http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel-dbg_2.0.0.16-0etch1_amd64.deb
    Size/MD5 checksum: 50156988 105ffac099d3a73aa40be32a44cd7212

hppa architecture (HP PA RISC)

  http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel-gnome-support_2.0.0.16-0etch1_hppa.deb
    Size/MD5 checksum:    89332 ca1481f5414cf4faf8a5a370906d8f64
  http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel_2.0.0.16-0etch1_hppa.deb
    Size/MD5 checksum: 11108696 06ec3f1f3819d33be04502e5bce656e0
  http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel-dbg_2.0.0.16-0etch1_hppa.deb
    Size/MD5 checksum: 50532424 9971def7580d2166292c8547f27dd2b4

i386 architecture (Intel ia32)

  http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel-dbg_2.0.0.16-0etch1_i386.deb
    Size/MD5 checksum: 49553762 65280e9ae0c54fc73e75a361dbe722fe
  http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel_2.0.0.16-0etch1_i386.deb
    Size/MD5 checksum:  9119010 de6f68bb7acdf4cfdf74030cd2333de8
  http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel-gnome-support_2.0.0.16-0etch1_i386.deb
    Size/MD5 checksum:    81938 a7eb73d423a318b5901eb3a8a06685b9

mipsel architecture (MIPS (Little Endian))

  http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel_2.0.0.16-0etch1_mipsel.deb
    Size/MD5 checksum: 10760324 2c0b072407554c994af92a170313e26d
  http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel-dbg_2.0.0.16-0etch1_mipsel.deb
    Size/MD5 checksum: 52504852 d2a9840321f5daf57e6dc31be4d001ec
  http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel-gnome-support_2.0.0.16-0etch1_mipsel.deb
    Size/MD5 checksum:    83096 610122542964f56450722b5a1268f9f7

powerpc architecture (PowerPC)

  http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel_2.0.0.16-0etch1_powerpc.deb
    Size/MD5 checksum:  9935532 8ef7577d3ee21a66ed0f3dd49554228b
  http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel-gnome-support_2.0.0.16-0etch1_powerpc.deb
    Size/MD5 checksum:    83658 bb96af576cc431bc5d2395065cc26519
  http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel-dbg_2.0.0.16-0etch1_powerpc.deb
    Size/MD5 checksum: 51951260 ce9193a0f59b5f6ebe385a6b99d81082

s390 architecture (IBM S/390)

  http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel_2.0.0.16-0etch1_s390.deb
    Size/MD5 checksum: 10361684 97e6a00b1925964345ab444e08decfd7
  http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel-dbg_2.0.0.16-0etch1_s390.deb
    Size/MD5 checksum: 50833158 e7d855931549380a580cca41b16eb132
  http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel-gnome-support_2.0.0.16-0etch1_s390.deb
    Size/MD5 checksum:    88076 3718818f93134dd2bdbd830839c77cac

sparc architecture (Sun SPARC/UltraSPARC)

  http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel_2.0.0.16-0etch1_sparc.deb
    Size/MD5 checksum:  9141294 fbb65f64f8cc4e8580582633b447a9c5
  http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel-dbg_2.0.0.16-0etch1_sparc.deb
    Size/MD5 checksum: 49164530 d54078908cc2adaecb5f492b13a966eb
  http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel-gnome-support_2.0.0.16-0etch1_sparc.deb
    Size/MD5 checksum:    81782 bb4025ab732da55e1d29d7ade28d10aa


  These files will probably be moved into the stable distribution on
  its next update.

- ---------------------------------------------------------------------------------
For apt-get: deb http://security.debian.org/ stable/updates main
For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
Mailing list: debian-security-announce@lists.debian.org
 
< Prev   Next >
    
Partner

 

Latest Features
Peter Smith Releases Linux Network Security Online
Securing a Linux Web Server
Password guessing with Medusa 2.0
Password guessing as an attack vector
Squid and Digest Authentication
Squid and Basic Authentication
Demystifying the Chinese Hacking Industry: Earning 6 Million a Night
Free Online security course (LearnSIA) - A Call for Help
What You Need to Know About Linux Rootkits
Review: A Practical Guide to Fedora and Red Hat Enterprise Linux - Fifth Edition
Yesterday's Edition
Report: U.S. planning “proportional response” to Sony hack, blamed on North Korea
Heartbleed, Shellshock, Tor and more: The 13 biggest security stories of 2014
Partner Sponsor

Community | HOWTOs | Blogs | Features | Book Reviews | Networking
 Security Projects |  Latest News |  Newsletters |  SELinux |  Privacy |  Home
 Hardening |   About Us |   Advertise |   Legal Notice |   RSS |   Guardian Digital
(c)Copyright 2014 Guardian Digital, Inc. All rights reserved.