-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                     ESB-2007.0425 -- [Linux][Debian]
            New iceweasel packages fix several vulnerabilities
                               18 June 2007

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:              iceweasel
Publisher:            Debian
Operating System:     Debian GNU/Linux 4.0
                      Linux variants
Impact:               Execute Arbitrary Code/Commands
                      Cross-site Scripting
                      Provide Misleading Information
                      Denial of Service
Access:               Remote/Unauthenticated
CVE Names:            CVE-2007-2871 CVE-2007-2870 CVE-2007-2869
                      CVE-2007-2868 CVE-2007-2867 CVE-2007-1362

Ref:                  AL-2007.0070

Original Bulletin:    http://www.debian.org/security/2007/dsa-1308

Comment: This advisory references vulnerabilities in products which run on
         platforms other than Debian. It is recommended that administrators
         running IceWeasel check for an updated version of the software for
         their operating system.

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- - --------------------------------------------------------------------------
Debian Security Advisory DSA 1308-1                    security@debian.org
http://www.debian.org/security/                         Moritz Muehlenhoff
June 14th, 2007                         http://www.debian.org/security/faq
- - --------------------------------------------------------------------------

Package        : iceweasel
Vulnerability  : several
Problem-Type   : remote
Debian-specific: no
CVE ID         : CVE-2007-1362 CVE-2007-2867 CVE-2007-2868 CVE-2007-2869 CVE-2007-2870 CVE-2007-2871

Several remote vulnerabilities have been discovered in the Iceweasel web
browser, an unbranded version of the Firefox browser. The Common 
Vulnerabilities and Exposures project identifies the following problems:

CVE-2007-1362

    Nicolas Derouet discovered that Iceweasel performs insufficient 
    validation of cookies, which could lead to denial of service.

CVE-2007-2867
 
    Boris Zbarsky, Eli Friedman, Georgi Guninski, Jesse Ruderman, Martijn
    Wargers and Olli Pettay discovered crashes in the layout engine, which
    might allow the execution of arbitrary code.

CVE-2007-2868

    Brendan Eich, Igor Bukanov, Jesse Ruderman, moz_bug_r_a4 and Wladimir Palant
    discovered crashes in the javascript engine, which might allow the execution of
    arbitrary code.

CVE-2007-2869

    "Marcel" discovered that malicous web sites can cause massive
    ressource comsumption through the auto completion feature, resulting
    in denial of service.

CVE-2007-2870

    "moz_bug_r_a4" discovered that adding an event listener through the
     addEventListener() function allows cross-site scripting.

CVE-2007-2871

    Chris Thomas discovered that XUL popups can can be abused for spoofing or
    phishing attacks.

Fixes for the oldstable distribution (sarge) are not available. While there
will be another round of security updates for Mozilla products, Debian doesn't
have the ressources to backport further security fixes to the old Mozilla
products. You're strongly encouraged to upgrade to stable as soon as possible.

For the stable distribution (etch) these problems have been fixed in version
2.0.0.4-0etch1. A build for the Alpha architecture is not yet available, it will
be provided later.

For the unstable distribution (sid) these problems have been fixed in version
2.0.0.4-1.

We recommend that you upgrade your iceweasel packages.


Upgrade Instructions
- - --------------------

wget url
        will fetch the file for you
dpkg -i file.deb
        will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
        will update the internal database
apt-get upgrade
        will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.


Debian GNU/Linux 4.0 alias etch
- - -------------------------------

  Source archives:

    http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel_2.0.0.4-0etch1.dsc
      Size/MD5 checksum:     1924 aba63dba59ba76416b113906cbbedc0a
    http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel_2.0.0.4-0etch1.diff.gz
      Size/MD5 checksum:   183131 8fd08b69077ffb470069648a74bffc8c
    http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel_2.0.0.4.orig.tar.gz
      Size/MD5 checksum: 42908101 30393b814633a645a25995abf487aee9

  Architecture independent components:

    http://security.debian.org/pool/updates/main/i/iceweasel/firefox-dom-inspector_2.0.0.4-0etch1_all.deb
      Size/MD5 checksum:    53480 a9fa7b813e23fbb6fd6a2c665fd82eb2
    http://security.debian.org/pool/updates/main/i/iceweasel/firefox-gnome-support_2.0.0.4-0etch1_all.deb
      Size/MD5 checksum:    53448 0398decfb6cf55d4c0d1a01d8ee17b9d
    http://security.debian.org/pool/updates/main/i/iceweasel/firefox_2.0.0.4-0etch1_all.deb
      Size/MD5 checksum:    53608 3689375b31ebcbb1e59c39489f6249da
    http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel-dom-inspector_2.0.0.4-0etch1_all.deb
      Size/MD5 checksum:   234734 d4209998bcfe3dff15fc0e48e0262657
    http://security.debian.org/pool/updates/main/i/iceweasel/mozilla-firefox-dom-inspector_2.0.0.4-0etch1_all.deb
      Size/MD5 checksum:    53336 7e5e38e1040b4cf621d9a13c1b75082d
    http://security.debian.org/pool/updates/main/i/iceweasel/mozilla-firefox-gnome-support_2.0.0.4-0etch1_all.deb
      Size/MD5 checksum:    53330 d1066e17bb1a2051966d91fb81ff811e
    http://security.debian.org/pool/updates/main/i/iceweasel/mozilla-firefox_2.0.0.4-0etch1_all.deb
      Size/MD5 checksum:    54132 0c7a29cf4457b2f85552ff5f9d628cc8

  AMD64 architecture:

    http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel_2.0.0.4-0etch1_amd64.deb
      Size/MD5 checksum: 10092436 7f999c7c7aa195301716fa53bbf0fe49
    http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel-dbg_2.0.0.4-0etch1_amd64.deb
      Size/MD5 checksum: 49953382 e08feb61d7942d6eb6b4fa2cccb94ff7
    http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel-gnome-support_2.0.0.4-0etch1_amd64.deb
      Size/MD5 checksum:    87256 5b89ecd74f39ae6422f1a988431ad9ea

  ARM architecture:

    http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel_2.0.0.4-0etch1_arm.deb
      Size/MD5 checksum:  9138188 b2c6c94598ba3b3886119867613b27b0
    http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel-dbg_2.0.0.4-0etch1_arm.deb
      Size/MD5 checksum: 49041146 4f20464c94fef0d847bc52c3cf8de2ce
    http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel-gnome-support_2.0.0.4-0etch1_arm.deb
      Size/MD5 checksum:    80662 28b16bcffe81e9172a9deeb861ce80ef

  HP Precision architecture:

    http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel_2.0.0.4-0etch1_hppa.deb
      Size/MD5 checksum: 10999754 44b0fba4511ffc094f2c4ff7d7d76ee2
    http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel-dbg_2.0.0.4-0etch1_hppa.deb
      Size/MD5 checksum: 50326858 61c142d3c2091f17411705695c728782
    http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel-gnome-support_2.0.0.4-0etch1_hppa.deb
      Size/MD5 checksum:    88754 39ffa79c319c768aaa08a9623d79bdba

  Intel IA-32 architecture:

    http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel_2.0.0.4-0etch1_i386.deb
      Size/MD5 checksum:  9067976 752dbe8fda218e098a8b6eb25bc784a0
    http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel-dbg_2.0.0.4-0etch1_i386.deb
      Size/MD5 checksum: 49338842 390f58d5a152b64255c2b8b7be91d059
    http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel-gnome-support_2.0.0.4-0etch1_i386.deb
      Size/MD5 checksum:    81168 4460515a66562bc6833e55b359417eb1

  Intel IA-64 architecture:

    http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel_2.0.0.4-0etch1_ia64.deb
      Size/MD5 checksum: 14077128 3517147c8ab2c49401adf6be2422357e
    http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel-dbg_2.0.0.4-0etch1_ia64.deb
      Size/MD5 checksum: 50295570 7fc5542e7ce61664193cd5df1ee105ab
    http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel-gnome-support_2.0.0.4-0etch1_ia64.deb
      Size/MD5 checksum:    99484 b6543fa992de4e15ed99862c05fa3c1e

  Big endian MIPS architecture:

    http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel_2.0.0.4-0etch1_mips.deb
      Size/MD5 checksum: 10930072 991a5aba5e4d570f2872b7cef5570e89
    http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel-dbg_2.0.0.4-0etch1_mips.deb
      Size/MD5 checksum: 53740564 116826073fd481ac6a8d07f335af60ba
    http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel-gnome-support_2.0.0.4-0etch1_mips.deb
      Size/MD5 checksum:    82516 0a9ec06de3e55393661bd3fdc243e711

  Little endian MIPS architecture:

    http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel_2.0.0.4-0etch1_mipsel.deb
      Size/MD5 checksum: 10702566 ceb471ef12104f0560019be7c998f38a
    http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel-dbg_2.0.0.4-0etch1_mipsel.deb
      Size/MD5 checksum: 52288188 dd07d9df07da2a10185ed8197863fc9d
    http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel-gnome-support_2.0.0.4-0etch1_mipsel.deb
      Size/MD5 checksum:    82372 8375ed3e07601da1dbc22acfe99dc2a3

  PowerPC architecture:

    http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel_2.0.0.4-0etch1_powerpc.deb
      Size/MD5 checksum:  9883412 1befbff15d9b977f151cbcab541511dd
    http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel-dbg_2.0.0.4-0etch1_powerpc.deb
      Size/MD5 checksum: 51764698 b2039000765baa2528163fa01960f52f
    http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel-gnome-support_2.0.0.4-0etch1_powerpc.deb
      Size/MD5 checksum:    82870 74584a1e504ef767809c147381e47a1f

  IBM S/390 architecture:

    http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel_2.0.0.4-0etch1_s390.deb
      Size/MD5 checksum: 10309800 0fc16882b8d464a3214f543eec15c853
    http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel-dbg_2.0.0.4-0etch1_s390.deb
      Size/MD5 checksum: 50627948 9b49abe603c049fd778e5e6903563637
    http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel-gnome-support_2.0.0.4-0etch1_s390.deb
      Size/MD5 checksum:    87266 dfbaa0b67ed43e0f75f1bf9de7982a08

  Sun Sparc architecture:

    http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel_2.0.0.4-0etch1_sparc.deb
      Size/MD5 checksum:  9091304 296ab2cdde8940f00e3d891d496afc3b
    http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel-dbg_2.0.0.4-0etch1_sparc.deb
      Size/MD5 checksum: 48962490 c2741509f2e83d06f736d883b4f81eda
    http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel-gnome-support_2.0.0.4-0etch1_sparc.deb
      Size/MD5 checksum:    80974 2c877be88bd016bb2854d27624680b27


  These files will probably be moved into the stable distribution on
  its next update.

- - ---------------------------------------------------------------------------------
For apt-get: deb http://security.debian.org/ stable/updates main
For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
Mailing list: debian-security-announce@lists.debian.org
Package info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg>
- -----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.6 (GNU/Linux)

iD8DBQFGcXkMXm3vHE4uyloRAlHSAKDRPS71NTDief+k8QulZn6RVhp/tQCfVB9u
1JYR/q4rJEM6g5kBXnqTp4U=
=6C0r
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

If you believe that your computer system has been compromised or attacked in 
any way, we encourage you to let us know by completing the secure National IT 
Incident Reporting Form at:

        http://www.auscert.org.au/render.html?it=3192

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================

-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967

iQCVAwUBRnXHWCh9+71yA2DNAQIH6gQAitJxLNS+lCGhPNu/68Jy5Ua7IgsZGAcX
9PHUrmgdCCtdpdR3b1PpgAcPsH6I0hzCOCWf9/4Ou7E4nJ49+UH4ii2l3bPTstMS
irKygTlty5vaH2SqhL3e8YT+iSdYAd0ywW/kcSooG39F/dsr0m4tB8xqPFV+Zie6
zV4QNnRqxzg=
=5Qke
-----END PGP SIGNATURE-----