Secunia Security Advisory - Debian has issued an update for iceweasel. This fixes some vulnerabilities, which can be exploited by malicious people to disclose potentially sensitive information, conduct spoofing and cross-site scripting attacks, and potentially compromise a user's system.
b5c4f3d0d7202ae76d58fcfdfe8c593f87ac4c6ec5d8f5fbe1e6bbad4c6af328
----------------------------------------------------------------------
Try a new way to discover vulnerabilities that ALREADY EXIST in your
IT infrastructure.
The Full Featured Secunia Network Software Inspector (NSI) is now
available:
http://secunia.com/network_software_inspector/
The Secunia NSI enables you to INSPECT, DISCOVER, and DOCUMENT
vulnerabilities in more than 4,000 different Windows applications.
----------------------------------------------------------------------
TITLE:
Debian update for iceweasel
SECUNIA ADVISORY ID:
SA26151
VERIFY ADVISORY:
http://secunia.com/advisories/26151/
CRITICAL:
Highly critical
IMPACT:
Cross Site Scripting, Spoofing, Exposure of sensitive information,
DoS, System access
WHERE:
>From remote
OPERATING SYSTEM:
Debian GNU/Linux 4.0
http://secunia.com/product/13844/
Debian GNU/Linux unstable alias sid
http://secunia.com/product/530/
DESCRIPTION:
Debian has issued an update for iceweasel. This fixes some
vulnerabilities, which can be exploited by malicious people to
disclose potentially sensitive information, conduct spoofing and
cross-site scripting attacks, and potentially compromise a user's
system.
For more information:
SA25990
SA26095
SOLUTION:
Apply updated packages.
-- Debian GNU/Linux 4.0 alias etch --
Source archives:
http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel_2.0.0.5-0etch1.dsc
Size/MD5 checksum: 1286 59238f560ecb32cdbc56a63ddb209e55
http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel_2.0.0.5-0etch1.diff.gz
Size/MD5 checksum: 185146 6524cf51c9e4b107d72600123967d6ef
http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel_2.0.0.5.orig.tar.gz
Size/MD5 checksum: 43667811 06e1bbe4d44d5b3333cabf8584844ca0
Architecture independent components:
http://security.debian.org/pool/updates/main/i/iceweasel/firefox-dom-inspector_2.0.0.5-0etch1_all.deb
Size/MD5 checksum: 53580 934bffd016c2040ae56d1701ab9ef8b0
http://security.debian.org/pool/updates/main/i/iceweasel/firefox-gnome-support_2.0.0.5-0etch1_all.deb
Size/MD5 checksum: 53548 01ec3b09cb5305f60952e8e7c8ac775f
http://security.debian.org/pool/updates/main/i/iceweasel/firefox_2.0.0.5-0etch1_all.deb
Size/MD5 checksum: 53702 d3ecadf21b84c62c473a658892510d73
http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel-dom-inspector_2.0.0.5-0etch1_all.deb
Size/MD5 checksum: 234160 bcf465cec9f922ad5e28c434cc9bce9a
http://security.debian.org/pool/updates/main/i/iceweasel/mozilla-firefox-dom-inspector_2.0.0.5-0etch1_all.deb
Size/MD5 checksum: 53432 cd14d22874e960c485e4cec1e559ef20
http://security.debian.org/pool/updates/main/i/iceweasel/mozilla-firefox-gnome-support_2.0.0.5-0etch1_all.deb
Size/MD5 checksum: 53428 b2d685e70ff5a9c0be04c24efe8cd660
http://security.debian.org/pool/updates/main/i/iceweasel/mozilla-firefox_2.0.0.5-0etch1_all.deb
Size/MD5 checksum: 54232 72be77489c8bc90232f09c3e4a37d2a8
AMD64 architecture:
http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel_2.0.0.5-0etch1_amd64.deb
Size/MD5 checksum: 10131746 6509776fdd7f65552627b22b7f0e5d5f
http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel-dbg_2.0.0.5-0etch1_amd64.deb
Size/MD5 checksum: 50034750 34db9be3f1aacd877fabacf163a716cf
http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel-gnome-support_2.0.0.5-0etch1_amd64.deb
Size/MD5 checksum: 87376 42ac4a2436251a5023a4122234a9b433
ARM architecture:
http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel_2.0.0.5-0etch1_arm.deb
Size/MD5 checksum: 9172536 d5a6afa28d7202a28151791944c6cbe4
http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel-dbg_2.0.0.5-0etch1_arm.deb
Size/MD5 checksum: 49133408 d8bfcda8c8f3675bbf4dfc2f84f88fb0
http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel-gnome-support_2.0.0.5-0etch1_arm.deb
Size/MD5 checksum: 80786 547a41d33735a51c539fd93f8584ca8c
HP Precision architecture:
http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel_2.0.0.5-0etch1_hppa.deb
Size/MD5 checksum: 11038942 73a12aae1df5a9ff435fdbf111641271
http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel-dbg_2.0.0.5-0etch1_hppa.deb
Size/MD5 checksum: 50416604 d1dd0fa25fac83208fbee1e5016bea40
http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel-gnome-support_2.0.0.5-0etch1_hppa.deb
Size/MD5 checksum: 88872 33dce9b617f9772f706ad4d711ccbacf
Intel IA-32 architecture:
http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel_2.0.0.5-0etch1_i386.deb
Size/MD5 checksum: 9104036 31bd4e0e97fc842cfb36332222227701
http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel-dbg_2.0.0.5-0etch1_i386.deb
Size/MD5 checksum: 49439820 c7760fc3be07338899256b1bf00883e7
http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel-gnome-support_2.0.0.5-0etch1_i386.deb
Size/MD5 checksum: 81298 b9479b0ba634c0456301effa7f69ef14
Intel IA-64 architecture:
http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel_2.0.0.5-0etch1_ia64.deb
Size/MD5 checksum: 14134080 497b02f80092d16b883a0fe5543e865a
http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel-dbg_2.0.0.5-0etch1_ia64.deb
Size/MD5 checksum: 50396004 1eefae991deb0610dfee10f5fc25929a
http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel-gnome-support_2.0.0.5-0etch1_ia64.deb
Size/MD5 checksum: 99638 ab6b8c85a7d7f796f6aa83c567d81f7a
Little endian MIPS architecture:
http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel_2.0.0.5-0etch1_mipsel.deb
Size/MD5 checksum: 10744354 de1cb2892c1a5f2474301c967002db40
http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel-dbg_2.0.0.5-0etch1_mipsel.deb
Size/MD5 checksum: 52394050 8c57505e91c9ee8137d7f596de85cb20
http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel-gnome-support_2.0.0.5-0etch1_mipsel.deb
Size/MD5 checksum: 82468 624046892b6bc835db7ad352a58193b1
PowerPC architecture:
http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel_2.0.0.5-0etch1_powerpc.deb
Size/MD5 checksum: 9918324 b55975975e333962fbe7700f394e4efc
http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel-dbg_2.0.0.5-0etch1_powerpc.deb
Size/MD5 checksum: 51849604 a382e26d5f81f3cba80d3c74c803bfba
http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel-gnome-support_2.0.0.5-0etch1_powerpc.deb
Size/MD5 checksum: 82998 5b3f148c7e5115779efb9eab5f7ec085
IBM S/390 architecture:
http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel_2.0.0.5-0etch1_s390.deb
Size/MD5 checksum: 10343876 392bd7c3b4498f16a18af4f33433cdec
http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel-dbg_2.0.0.5-0etch1_s390.deb
Size/MD5 checksum: 50714240 4fcb5751ac1f74858e77ec55511ebfe3
http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel-gnome-support_2.0.0.5-0etch1_s390.deb
Size/MD5 checksum: 87386 78d93550b19df51bb0ecde33117dc657
Sun Sparc architecture:
http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel_2.0.0.5-0etch1_sparc.deb
Size/MD5 checksum: 9125776 96b405d93d02e5a80933fba0658c18d3
http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel-dbg_2.0.0.5-0etch1_sparc.deb
Size/MD5 checksum: 49052276 615dac8bcaeb9a4c5cdb6500fe519f8a
http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel-gnome-support_2.0.0.5-0etch1_sparc.deb
Size/MD5 checksum: 81150 63d0482567e238eae0d201b43696ca02
-- Debian GNU/Linux unstable alias sid --
Fixed in version 2.0.0.5-1.
ORIGINAL ADVISORY:
http://www.debian.org/security/2007/dsa-1338
OTHER REFERENCES:
SA25990:
http://secunia.com/advisories/25990/
SA26095:
http://secunia.com/advisories/26095/
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------