-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                         ESB-2008.0134 -- [Debian]
            New iceweasel packages fix several vulnerabilities
                             11 February 2008

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:              iceweasel
Publisher:            Debian
Operating System:     Debian GNU/Linux 4.0
Impact:               Execute Arbitrary Code/Commands
                      Access Confidential Data
                      Read-only Data Access
                      Cross-site Scripting
                      Denial of Service
                      Inappropriate Access
                      Provide Misleading Information
Access:               Remote/Unauthenticated
CVE Names:            CVE-2008-0594 CVE-2008-0593 CVE-2008-0592
                      CVE-2008-0591 CVE-2008-0419 CVE-2008-0418
                      CVE-2008-0417 CVE-2008-0416 CVE-2008-0415
                      CVE-2008-0414 CVE-2008-0413 CVE-2008-0412

Ref:                  AL-2008.0014

Original Bulletin:    http://www.debian.org/security/2008/dsa-1489

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- - ------------------------------------------------------------------------
Debian Security Advisory DSA-1489-1                  security@debian.org
http://www.debian.org/security/                       Moritz Muehlenhoff
February 10, 2008                     http://www.debian.org/security/faq
- - ------------------------------------------------------------------------

Package        : iceweasel
Vulnerability  : several
Problem type   : remote
Debian-specific: no
CVE Id(s)      : CVE-2008-0412 CVE-2008-0413 CVE-2008-0414 CVE-2008-0415 CVE-2008-0416 CVE-2008-0417 CVE-2008-0418 CVE-2008-0419 CVE-2008-0591 CVE-2008-0592 CVE-2008-0593 CVE-2008-0594

Several remote vulnerabilities have been discovered in the Iceweasel
web browser, an unbranded version of the Firefox browser. The Common
Vulnerabilities and Exposures project identifies the following problems:

CVE-2008-0412

    Jesse Ruderman, Kai Engert, Martijn Wargers, Mats Palmgren and Paul
    Nickerson discovered crashes in the layout engine, which might allow
    the execution of arbitrary code.

CVE-2008-0413

    Carsten Book, Wesley Garland, Igor Bukanov, "moz_bug_r_a4", "shutdown",
    Philip Taylor and "tgirmann" discovered crashes in the Javascript
    engine, which might allow the execution of arbitrary code.

CVE-2008-0414

    "hong" and Gregory Fleisher discovered that file input focus
    vulnerabilities in the file upload control could allow information
    disclosure of local files.

CVE-2008-0415

    "moz_bug_r_a4" and Boris Zbarsky discovered discovered several
    vulnerabilities in Javascript handling, which could allow
    privilege escalation.

CVE-2008-0417

    Justin Dolske discovered that the password storage machanism could
    be abused by malicious web sites to corrupt existing saved passwords.

CVE-2008-0418

    Gerry Eisenhaur and "moz_bug_r_a4" discovered that a directory
    traversal vulnerability in chrome: URI handling could lead to
    information disclosure.

CVE-2008-0419

    David Bloom discovered a race condition in the image handling of
    designMode elements, which can lead to information disclosure or
    potentially the execution of arbitrary code.

CVE-2008-0591

    Michal Zalewski discovered that timers protecting security-sensitive
    dialogs (which disable dialog elements until a timeout is reached)
    could be bypassed by window focus changes through Javascript.

CVE-2008-0592

    It was discovered that malformed content declarations of saved
    attachments could prevent a user in the opening local files
    with a ".txt" file name, resulting in minor denial of service.

CVE-2008-0593

    Martin Straka discovered that insecure stylesheet handling during
    redirects could lead to information disclosure.

CVE-2008-0594

    Emil Ljungdahl and Lars-Olof Moilanen discovered that phishing
    protections could be bypassed with <div> elements.


For the stable distribution (etch), these problems have been fixed in
version 2.0.0.12-0etch1.

The Mozilla products from the old stable distribution (sarge) are no
longer supported with security updates.

We recommend that you upgrade your iceweasel packages.

Upgrade instructions
- - --------------------

wget url
        will fetch the file for you
dpkg -i file.deb
        will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
        will update the internal database
apt-get upgrade
        will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.


Debian 4.0 (stable)
- - -------------------

Stable updates are available for alpha, amd64, arm, hppa, i386, ia64, mips, mipsel, powerpc, s390 and sparc.

Source archives:

  http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel_2.0.0.12.orig.tar.gz
    Size/MD5 checksum: 43522779 34cb9e2038afa635dac9319a0f113be8
  http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel_2.0.0.12-0etch1.dsc
    Size/MD5 checksum:     1289 568c8d5661721888aa75724f4ec76cf9
  http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel_2.0.0.12-0etch1.diff.gz
    Size/MD5 checksum:   186174 96e7907d265cdf00b81785db4e2ab6c4

Architecture independent packages:

  http://security.debian.org/pool/updates/main/i/iceweasel/firefox_2.0.0.12-0etch1_all.deb
    Size/MD5 checksum:    54290 97f40d39e73fba4b90c79a514ab89f18
  http://security.debian.org/pool/updates/main/i/iceweasel/firefox-gnome-support_2.0.0.12-0etch1_all.deb
    Size/MD5 checksum:    54146 ef3dbcc83837bc5c86ecdb3295716e23
  http://security.debian.org/pool/updates/main/i/iceweasel/mozilla-firefox-dom-inspector_2.0.0.12-0etch1_all.deb
    Size/MD5 checksum:    54026 91815e0777f6249b4ba95bbeb38cee0c
  http://security.debian.org/pool/updates/main/i/iceweasel/firefox-dom-inspector_2.0.0.12-0etch1_all.deb
    Size/MD5 checksum:    54176 1b7640fa33604225b347b8fd368163a0
  http://security.debian.org/pool/updates/main/i/iceweasel/mozilla-firefox_2.0.0.12-0etch1_all.deb
    Size/MD5 checksum:    54816 97db059f2fc4f52bd4d2389f724e8378
  http://security.debian.org/pool/updates/main/i/iceweasel/mozilla-firefox-gnome-support_2.0.0.12-0etch1_all.deb
    Size/MD5 checksum:    54026 969ad8b6ed5b8b0dea8cd5d3414c1485
  http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel-dom-inspector_2.0.0.12-0etch1_all.deb
    Size/MD5 checksum:   239356 4309e0a07163450b9d7ce65103b39b80

alpha architecture (DEC Alpha)

  http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel-gnome-support_2.0.0.12-0etch1_alpha.deb
    Size/MD5 checksum:    90934 5e1bdb44f0484fd2111a1541276b99dd
  http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel-dbg_2.0.0.12-0etch1_alpha.deb
    Size/MD5 checksum: 51062530 72e80dbe1969eae96b4d9ed57aa89122
  http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel_2.0.0.12-0etch1_alpha.deb
    Size/MD5 checksum: 11553820 0cea194c903903bb98b53cc349b89dbf

amd64 architecture (AMD x86_64 (AMD64))

  http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel-dbg_2.0.0.12-0etch1_amd64.deb
    Size/MD5 checksum: 50060784 8639ed04300fac0705c47c27338fdfbb
  http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel-gnome-support_2.0.0.12-0etch1_amd64.deb
    Size/MD5 checksum:    87564 79c23f813fc543121275f4a974833c82
  http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel_2.0.0.12-0etch1_amd64.deb
    Size/MD5 checksum: 10182710 bb8bbff82040dc0c04e98ac477a5a691

hppa architecture (HP PA RISC)

  http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel-gnome-support_2.0.0.12-0etch1_hppa.deb
    Size/MD5 checksum:    89302 2867a60e5385e94188bf66f38f992a29
  http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel_2.0.0.12-0etch1_hppa.deb
    Size/MD5 checksum: 11031094 f5926d349e00706a548fdb4f6c02dbac
  http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel-dbg_2.0.0.12-0etch1_hppa.deb
    Size/MD5 checksum: 50426978 4228e87f68b21f2627069a320603263d

i386 architecture (Intel ia32)

  http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel_2.0.0.12-0etch1_i386.deb
    Size/MD5 checksum:  9096292 1c535164988178a3d6b889f9d44f31e8
  http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel-gnome-support_2.0.0.12-0etch1_i386.deb
    Size/MD5 checksum:    81706 a7ca2818a1d14730077724e3acaf615f
  http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel-dbg_2.0.0.12-0etch1_i386.deb
    Size/MD5 checksum: 49451404 3525c3b01dd1142815513cc0d390493f

ia64 architecture (Intel ia64)

  http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel_2.0.0.12-0etch1_ia64.deb
    Size/MD5 checksum: 14120046 8d6c6253c001988251523976eee216a1
  http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel-gnome-support_2.0.0.12-0etch1_ia64.deb
    Size/MD5 checksum:    99914 3a4bd7bd5ab87d20bbf5a962411ae4fa
  http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel-dbg_2.0.0.12-0etch1_ia64.deb
    Size/MD5 checksum: 50400330 dfa48b54a479b7f305c899bc3f395f92

mips architecture (MIPS (Big Endian))

  http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel-dbg_2.0.0.12-0etch1_mips.deb
    Size/MD5 checksum: 53844792 613a7bc03c43510bcb09e09d33bce694
  http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel-gnome-support_2.0.0.12-0etch1_mips.deb
    Size/MD5 checksum:    82810 e673433c89d7a74e95b86ed1a264fa5b
  http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel_2.0.0.12-0etch1_mips.deb
    Size/MD5 checksum: 11038906 5f60ab9a24ad69a5b8c17ef69f31ef83

mipsel architecture (MIPS (Little Endian))

  http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel-gnome-support_2.0.0.12-0etch1_mipsel.deb
    Size/MD5 checksum:    82872 e9fcd10390f6241f8ddc9c996807afe0
  http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel_2.0.0.12-0etch1_mipsel.deb
    Size/MD5 checksum: 10735706 dcc381a4d6a0d26a0d69afb0696955db
  http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel-dbg_2.0.0.12-0etch1_mipsel.deb
    Size/MD5 checksum: 52399756 ffa41f602d079d778355e5a4a7cbde18

powerpc architecture (PowerPC)

  http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel_2.0.0.12-0etch1_powerpc.deb
    Size/MD5 checksum:  9913630 75da2ef9f6915fc6961cc56755f6b8fb
  http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel-gnome-support_2.0.0.12-0etch1_powerpc.deb
    Size/MD5 checksum:    83434 0b65d7b061d42bfb5ae48c9fb2f65e05
  http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel-dbg_2.0.0.12-0etch1_powerpc.deb
    Size/MD5 checksum: 51852988 59f76c278e30b86d7e3caaab603d774e

s390 architecture (IBM S/390)

  http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel-gnome-support_2.0.0.12-0etch1_s390.deb
    Size/MD5 checksum:    87788 6cc1b69d90583e765b1f54bdd8ec88a4
  http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel_2.0.0.12-0etch1_s390.deb
    Size/MD5 checksum: 10339140 dd605f3c893a9fd281ee68c940faaea7
  http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel-dbg_2.0.0.12-0etch1_s390.deb
    Size/MD5 checksum: 50726238 fdc527fd80bb0383ea8ef02dca684f16

sparc architecture (Sun SPARC/UltraSPARC)

  http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel-gnome-support_2.0.0.12-0etch1_sparc.deb
    Size/MD5 checksum:    81548 f4e489f39594fda6a3a3498aea9bd986
  http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel_2.0.0.12-0etch1_sparc.deb
    Size/MD5 checksum:  9122208 28632988671ede31388d9caa46a5cfe9
  http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel-dbg_2.0.0.12-0etch1_sparc.deb
    Size/MD5 checksum: 49060394 1008a6ee3a9f8a3b6e46b766e62af10a


  These files will probably be moved into the stable distribution on
  its next update.

- - ---------------------------------------------------------------------------------
For apt-get: deb http://security.debian.org/ stable/updates main
For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
Mailing list: debian-security-announce@lists.debian.org
Package info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg>
- -----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.6 (GNU/Linux)

iD8DBQFHr2JkXm3vHE4uyloRAhzrAKDV6FwWWT6zbc76/ZDibTDSmd13mQCfegas
oCcPvP3xPzO1cIgOX25gUi0=
=5KCZ
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

If you believe that your computer system has been compromised or attacked in 
any way, we encourage you to let us know by completing the secure National IT 
Incident Reporting Form at:

        http://www.auscert.org.au/render.html?it=3192

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================

-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967

iQCVAwUBR6994Ch9+71yA2DNAQI7qwQAmF9cRwiuuFzYho/aq1drWlaDp/EBWC5p
f1n1h/8LfWZXtIMm0y9WBpG15DcqHF4nf1Zfey1ABBEyPdognkz51tRyT92qdVPJ
plgWRxqkfn8U20yZ5Qp+rJ6Tzk/anSxzNwapoitMybM3GGTWWzMWJ9QnNqQF3l8/
mNduXT3kr/U=
=ua1r
-----END PGP SIGNATURE-----