-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2014.2311
                          icedove security update
                              8 December 2014

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           icedove
Publisher:         Debian
Operating System:  Debian GNU/Linux 7
Impact/Access:     Execute Arbitrary Code/Commands -- Remote with User Interaction
                   Denial of Service               -- Remote with User Interaction
                   Access Confidential Data        -- Remote with User Interaction
Resolution:        Patch/Upgrade
CVE Names:         CVE-2014-1594 CVE-2014-1593 CVE-2014-1592
                   CVE-2014-1590 CVE-2014-1587 

Reference:         ASB-2014.0139
                   ESB-2014.2297
                   ESB-2014.2270
                   ESB-2014.2269

Original Bulletin: 
   http://www.debian.org/security/2014/dsa-3092

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- - -------------------------------------------------------------------------
Debian Security Advisory DSA-3092-1                   security@debian.org
http://www.debian.org/security/                        Moritz Muehlenhoff
December 07, 2014                      http://www.debian.org/security/faq
- - -------------------------------------------------------------------------

Package        : icedove
CVE ID         : CVE-2014-1587 CVE-2014-1590 CVE-2014-1592 CVE-2014-1593 
                 CVE-2014-1594

Multiple security issues have been found in Icedove, Debian's version of 
the Mozilla Thunderbird mail and news client: Multiple memory safety 
errors, buffer overflows, use-after-frees and other implementation errors
may lead to the execution of arbitrary code, the bypass of security 
restrictions or denial of service.

For the stable distribution (wheezy), these problems have been fixed in
version 31.3.0-1~deb7u1.

For the upcoming stable distribution (jessie), these problems will be
fixed soon.

For the unstable distribution (sid), these problems have been fixed in
version 31.3.0-1.

We recommend that you upgrade your icedove packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
- -----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=MRHS
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=I7ly
-----END PGP SIGNATURE-----