-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2012.0303
                          icedove security update
                               22 March 2012

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           icedove
Publisher:         Debian
Operating System:  Debian GNU/Linux 6
Impact/Access:     Execute Arbitrary Code/Commands -- Remote with User Interaction
                   Increased Privileges            -- Remote with User Interaction
                   Cross-site Scripting            -- Remote with User Interaction
                   Access Confidential Data        -- Remote with User Interaction
Resolution:        Patch/Upgrade
CVE Names:         CVE-2012-0461 CVE-2012-0458 CVE-2012-0456
                   CVE-2012-0455  

Reference:         ASB-2012.0037
                   ESB-2012.0287
                   ESB-2012.0284

Original Bulletin: 
   http://www.debian.org/security/2012/dsa-2437

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- - -------------------------------------------------------------------------
Debian Security Advisory DSA-2437-1                   security@debian.org
http://www.debian.org/security/                        Moritz Muehlenhoff
March 21, 2012                         http://www.debian.org/security/faq
- - -------------------------------------------------------------------------

Package        : icedove
Vulnerability  : several
Problem type   : remote
Debian-specific: no
CVE ID         : CVE-2012-0455 CVE-2012-0456 CVE-2012-0458 CVE-2012-0461

Several vulnerabilities have been discovered in Icedove, an unbranded
version of the Thunderbird mail/news client.

CVE-2012-0455

   Soroush Dalili discovered that a cross-site scripting countermeasure
   related to Javascript URLs could be bypassed.

CVE-2012-0456

   Atte Kettunen discovered an out of bounds read in the SVG Filters,
   resulting in memory disclosure.

CVE-2012-0458

   Mariusz Mlynski discovered that privileges could be escalated through
   a Javascript URL as the home page.

CVE-2012-0461

   Bob Clary discovered memory corruption bugs, which may lead to the
   execution of arbitrary code.

For the stable distribution (squeeze), this problem has been fixed in
version icedove 3.0.11-1+squeeze8.

For the unstable distribution (sid), this problem will be fixed soon.

We recommend that you upgrade your icedove packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: http://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
- -----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)

iEYEARECAAYFAk9qJH0ACgkQXm3vHE4uylpShwCfb5mWkFv2kWl6X7pDyCCCgtMu
TdoAn16m4KzIQTJWh7ytAzEkwTNGoEVC
=rCQZ
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=cssP
-----END PGP SIGNATURE-----