Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2012.0303 icedove security update 22 March 2012 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: icedove Publisher: Debian Operating System: Debian GNU/Linux 6 Impact/Access: Execute Arbitrary Code/Commands -- Remote with User Interaction Increased Privileges -- Remote with User Interaction Cross-site Scripting -- Remote with User Interaction Access Confidential Data -- Remote with User Interaction Resolution: Patch/Upgrade CVE Names: CVE-2012-0461 CVE-2012-0458 CVE-2012-0456 CVE-2012-0455 Reference: ASB-2012.0037 ESB-2012.0287 ESB-2012.0284 Original Bulletin: http://www.debian.org/security/2012/dsa-2437 - --------------------------BEGIN INCLUDED TEXT-------------------- - -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - - ------------------------------------------------------------------------- Debian Security Advisory DSA-2437-1 security@debian.org http://www.debian.org/security/ Moritz Muehlenhoff March 21, 2012 http://www.debian.org/security/faq - - ------------------------------------------------------------------------- Package : icedove Vulnerability : several Problem type : remote Debian-specific: no CVE ID : CVE-2012-0455 CVE-2012-0456 CVE-2012-0458 CVE-2012-0461 Several vulnerabilities have been discovered in Icedove, an unbranded version of the Thunderbird mail/news client. CVE-2012-0455 Soroush Dalili discovered that a cross-site scripting countermeasure related to Javascript URLs could be bypassed. CVE-2012-0456 Atte Kettunen discovered an out of bounds read in the SVG Filters, resulting in memory disclosure. CVE-2012-0458 Mariusz Mlynski discovered that privileges could be escalated through a Javascript URL as the home page. CVE-2012-0461 Bob Clary discovered memory corruption bugs, which may lead to the execution of arbitrary code. For the stable distribution (squeeze), this problem has been fixed in version icedove 3.0.11-1+squeeze8. For the unstable distribution (sid), this problem will be fixed soon. We recommend that you upgrade your icedove packages. Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: http://www.debian.org/security/ Mailing list: debian-security-announce@lists.debian.org - -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.12 (GNU/Linux) iEYEARECAAYFAk9qJH0ACgkQXm3vHE4uylpShwCfb5mWkFv2kWl6X7pDyCCCgtMu TdoAn16m4KzIQTJWh7ytAzEkwTNGoEVC =rCQZ - -----END PGP SIGNATURE----- - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: http://www.auscert.org.au/render.html?cid=1980 =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBT2p0pe4yVqjM2NGpAQIhQQ/9EHOGbbOE1ZD+NvfveBFzckP+7QumFRzJ NkB9dS2UlTgZWa3fg1wTgb7KeVIMNeENJKMC6DyrCDow+EpCszOMhXi8wAsitSCY VNaV67BLlGaJDSiYe1r8E06dMrL71rd6/527+lixdfSlhZFGP8S0VMn1Z2V5rGAM Pntdf87aHU1U+IRY+lXjWSLTuAyRWejjnZ67iJksxg9XHMzlyNfX6fIMtfcoKVDY 26qhytiKtjbfhz7xBeM1n57A9TjXL8JMV1f5FZNsFrXKLRBfaJT5z134zmkBPLwq skRUKU+8BfXHF4TupCmTbC9KvzcQLOCHeW3o7+ZIiA/AxEeINYXbPCOTOPgMdBhR IkHTQXAHc8vB0pu43zZN3t9KdatylMqYHdpz0nmldONpjcnMnxBxfms5BCGpxKCS UI9hpBcppoEwJX+Tb5d2QfbIJFQn1vSLDKHvg9M3rsyy4izoxMHa6MQQsDvRsL+8 p6kfkRZVzfJHC79q3P7vWREBzq71p1qyGCmEAZSQpCNatADrEol2Rw6Smo+5obkJ s3cHFoCapU7IJx+AvezZvhuqbj7d5hq+aRog4no0FVf+UniQH/mLCeRWBjQwbqOE rzX+bgooHxEUl3ULhR8Ekdg+pAW8w09p3RYpYhoPpfwpPv7k7fqHlTcErSerEYfX BGHK1JSV1LM= =cssP -----END PGP SIGNATURE-----