-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2013.1088
                         iceweasel security update
                               8 August 2013

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           iceweasel
Publisher:         Debian
Operating System:  Debian GNU/Linux 7
Impact/Access:     Execute Arbitrary Code/Commands -- Remote with User Interaction
                   Administrator Compromise        -- Existing Account            
                   Cross-site Scripting            -- Remote with User Interaction
                   Denial of Service               -- Remote with User Interaction
Resolution:        Patch/Upgrade
CVE Names:         CVE-2013-1717 CVE-2013-1714 CVE-2013-1713
                   CVE-2013-1710 CVE-2013-1709 CVE-2013-1701

Reference:         ASB-2013.0095
                   ESB-2013.1085
                   ESB-2013.1084

Original Bulletin: 
   http://www.debian.org/security/2013/dsa-2735

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- - -------------------------------------------------------------------------
Debian Security Advisory DSA-2735-1                   security@debian.org
http://www.debian.org/security/                        Moritz Muehlenhoff
August 07, 2013                        http://www.debian.org/security/faq
- - -------------------------------------------------------------------------

Package        : iceweasel
Vulnerability  : several
Problem type   : remote
Debian-specific: no
CVE ID         : CVE-2013-1701 CVE-2013-1709 CVE-2013-1710 CVE-2013-1713 
                 CVE-2013-1714 CVE-2013-1717

Multiple security issues have been found in Iceweasel, Debian's version 
of the Mozilla Firefox web browser: Multiple memory safety errors, 
missing permission checks and other implementation errors may lead to 
the execution of arbitrary code, cross-site scripting, privilege 
escalation, bypass of the same-origin policy or the installation of 
malicious addons.

The Iceweasel version in the oldstable distribution (squeeze) is no 
longer supported with security updates.

For the stable distribution (wheezy), these problems have been fixed in
version 17.0.8esr-1~deb7u1.

For the unstable distribution (sid), these problems have been fixed in
version 17.0.8esr-1.

We recommend that you upgrade your iceweasel packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: http://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
- -----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.14 (GNU/Linux)

iEYEARECAAYFAlICVeQACgkQXm3vHE4uylpxcwCg0aSZ2guURbRwOCvlMCEX8SLM
6d8AoJ+EWsZdjm/dtFxRNQ4QYgPrGC92
=tept
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=2Dji
-----END PGP SIGNATURE-----