-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2014.0556
                          icedove security update
                               23 April 2014

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           icedove
Publisher:         Debian
Operating System:  Debian GNU/Linux 6
                   Debian GNU/Linux 7
Impact/Access:     Execute Arbitrary Code/Commands -- Remote with User Interaction
                   Denial of Service               -- Remote with User Interaction
                   Access Confidential Data        -- Remote with User Interaction
Resolution:        Patch/Upgrade
CVE Names:         CVE-2014-1514 CVE-2014-1513 CVE-2014-1512
                   CVE-2014-1511 CVE-2014-1510 CVE-2014-1508
                   CVE-2014-1505 CVE-2014-1497 CVE-2014-1493

Reference:         ASB-2014.0031
                   ESB-2014.0365
                   ESB-2014.0364
                   ESB-2014.0360

Original Bulletin: 
   http://www.debian.org/security/2014/dsa-2911

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- - -------------------------------------------------------------------------
Debian Security Advisory DSA-2911-1                   security@debian.org
http://www.debian.org/security/                        Moritz Muehlenhoff
April 22, 2014                         http://www.debian.org/security/faq
- - -------------------------------------------------------------------------

Package        : icedove
CVE ID         : CVE-2014-1493 CVE-2014-1497 CVE-2014-1505 CVE-2014-1508 
                 CVE-2014-1510 CVE-2014-1511 CVE-2014-1512 CVE-2014-1513
                 CVE-2014-1514

Multiple security issues have been found in Icedove, Debian's version of
the Mozilla Thunderbird mail and news client. Multiple memory safety 
errors, out of bound reads, use-after-frees and other implementation 
errors may lead to the execution of arbitrary code, information 
disclosure or denial of service.

For the stable distribution (wheezy), these problems have been fixed in
version 24.4.0-1~deb7u1. This updates Icedove to the Extended Support
Release (ESR) branch 24. An updated and compatible version of Enigmail 
is included with this update.

For the testing distribution (jessie), these problems have been fixed in
version 24.4.0esr-1.

For the unstable distribution (sid), these problems have been fixed in
version 24.4.0esr-1.

We recommend that you upgrade your icedove packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: http://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
- -----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=9qpb
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=Whpz
-----END PGP SIGNATURE-----