---------------------------------------------------------------------- Try a new way to discover vulnerabilities that ALREADY EXIST in your IT infrastructure. The Full Featured Secunia Network Software Inspector (NSI) is now available: http://secunia.com/network_software_inspector/ The Secunia NSI enables you to INSPECT, DISCOVER, and DOCUMENT vulnerabilities in more than 4,000 different Windows applications. ---------------------------------------------------------------------- TITLE: Debian update for iceweasel SECUNIA ADVISORY ID: SA26151 VERIFY ADVISORY: http://secunia.com/advisories/26151/ CRITICAL: Highly critical IMPACT: Cross Site Scripting, Spoofing, Exposure of sensitive information, DoS, System access WHERE: >From remote OPERATING SYSTEM: Debian GNU/Linux 4.0 http://secunia.com/product/13844/ Debian GNU/Linux unstable alias sid http://secunia.com/product/530/ DESCRIPTION: Debian has issued an update for iceweasel. This fixes some vulnerabilities, which can be exploited by malicious people to disclose potentially sensitive information, conduct spoofing and cross-site scripting attacks, and potentially compromise a user's system. For more information: SA25990 SA26095 SOLUTION: Apply updated packages. -- Debian GNU/Linux 4.0 alias etch -- Source archives: http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel_2.0.0.5-0etch1.dsc Size/MD5 checksum: 1286 59238f560ecb32cdbc56a63ddb209e55 http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel_2.0.0.5-0etch1.diff.gz Size/MD5 checksum: 185146 6524cf51c9e4b107d72600123967d6ef http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel_2.0.0.5.orig.tar.gz Size/MD5 checksum: 43667811 06e1bbe4d44d5b3333cabf8584844ca0 Architecture independent components: http://security.debian.org/pool/updates/main/i/iceweasel/firefox-dom-inspector_2.0.0.5-0etch1_all.deb Size/MD5 checksum: 53580 934bffd016c2040ae56d1701ab9ef8b0 http://security.debian.org/pool/updates/main/i/iceweasel/firefox-gnome-support_2.0.0.5-0etch1_all.deb Size/MD5 checksum: 53548 01ec3b09cb5305f60952e8e7c8ac775f http://security.debian.org/pool/updates/main/i/iceweasel/firefox_2.0.0.5-0etch1_all.deb Size/MD5 checksum: 53702 d3ecadf21b84c62c473a658892510d73 http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel-dom-inspector_2.0.0.5-0etch1_all.deb Size/MD5 checksum: 234160 bcf465cec9f922ad5e28c434cc9bce9a http://security.debian.org/pool/updates/main/i/iceweasel/mozilla-firefox-dom-inspector_2.0.0.5-0etch1_all.deb Size/MD5 checksum: 53432 cd14d22874e960c485e4cec1e559ef20 http://security.debian.org/pool/updates/main/i/iceweasel/mozilla-firefox-gnome-support_2.0.0.5-0etch1_all.deb Size/MD5 checksum: 53428 b2d685e70ff5a9c0be04c24efe8cd660 http://security.debian.org/pool/updates/main/i/iceweasel/mozilla-firefox_2.0.0.5-0etch1_all.deb Size/MD5 checksum: 54232 72be77489c8bc90232f09c3e4a37d2a8 AMD64 architecture: http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel_2.0.0.5-0etch1_amd64.deb Size/MD5 checksum: 10131746 6509776fdd7f65552627b22b7f0e5d5f http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel-dbg_2.0.0.5-0etch1_amd64.deb Size/MD5 checksum: 50034750 34db9be3f1aacd877fabacf163a716cf http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel-gnome-support_2.0.0.5-0etch1_amd64.deb Size/MD5 checksum: 87376 42ac4a2436251a5023a4122234a9b433 ARM architecture: http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel_2.0.0.5-0etch1_arm.deb Size/MD5 checksum: 9172536 d5a6afa28d7202a28151791944c6cbe4 http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel-dbg_2.0.0.5-0etch1_arm.deb Size/MD5 checksum: 49133408 d8bfcda8c8f3675bbf4dfc2f84f88fb0 http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel-gnome-support_2.0.0.5-0etch1_arm.deb Size/MD5 checksum: 80786 547a41d33735a51c539fd93f8584ca8c HP Precision architecture: http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel_2.0.0.5-0etch1_hppa.deb Size/MD5 checksum: 11038942 73a12aae1df5a9ff435fdbf111641271 http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel-dbg_2.0.0.5-0etch1_hppa.deb Size/MD5 checksum: 50416604 d1dd0fa25fac83208fbee1e5016bea40 http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel-gnome-support_2.0.0.5-0etch1_hppa.deb Size/MD5 checksum: 88872 33dce9b617f9772f706ad4d711ccbacf Intel IA-32 architecture: http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel_2.0.0.5-0etch1_i386.deb Size/MD5 checksum: 9104036 31bd4e0e97fc842cfb36332222227701 http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel-dbg_2.0.0.5-0etch1_i386.deb Size/MD5 checksum: 49439820 c7760fc3be07338899256b1bf00883e7 http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel-gnome-support_2.0.0.5-0etch1_i386.deb Size/MD5 checksum: 81298 b9479b0ba634c0456301effa7f69ef14 Intel IA-64 architecture: http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel_2.0.0.5-0etch1_ia64.deb Size/MD5 checksum: 14134080 497b02f80092d16b883a0fe5543e865a http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel-dbg_2.0.0.5-0etch1_ia64.deb Size/MD5 checksum: 50396004 1eefae991deb0610dfee10f5fc25929a http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel-gnome-support_2.0.0.5-0etch1_ia64.deb Size/MD5 checksum: 99638 ab6b8c85a7d7f796f6aa83c567d81f7a Little endian MIPS architecture: http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel_2.0.0.5-0etch1_mipsel.deb Size/MD5 checksum: 10744354 de1cb2892c1a5f2474301c967002db40 http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel-dbg_2.0.0.5-0etch1_mipsel.deb Size/MD5 checksum: 52394050 8c57505e91c9ee8137d7f596de85cb20 http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel-gnome-support_2.0.0.5-0etch1_mipsel.deb Size/MD5 checksum: 82468 624046892b6bc835db7ad352a58193b1 PowerPC architecture: http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel_2.0.0.5-0etch1_powerpc.deb Size/MD5 checksum: 9918324 b55975975e333962fbe7700f394e4efc http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel-dbg_2.0.0.5-0etch1_powerpc.deb Size/MD5 checksum: 51849604 a382e26d5f81f3cba80d3c74c803bfba http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel-gnome-support_2.0.0.5-0etch1_powerpc.deb Size/MD5 checksum: 82998 5b3f148c7e5115779efb9eab5f7ec085 IBM S/390 architecture: http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel_2.0.0.5-0etch1_s390.deb Size/MD5 checksum: 10343876 392bd7c3b4498f16a18af4f33433cdec http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel-dbg_2.0.0.5-0etch1_s390.deb Size/MD5 checksum: 50714240 4fcb5751ac1f74858e77ec55511ebfe3 http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel-gnome-support_2.0.0.5-0etch1_s390.deb Size/MD5 checksum: 87386 78d93550b19df51bb0ecde33117dc657 Sun Sparc architecture: http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel_2.0.0.5-0etch1_sparc.deb Size/MD5 checksum: 9125776 96b405d93d02e5a80933fba0658c18d3 http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel-dbg_2.0.0.5-0etch1_sparc.deb Size/MD5 checksum: 49052276 615dac8bcaeb9a4c5cdb6500fe519f8a http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel-gnome-support_2.0.0.5-0etch1_sparc.deb Size/MD5 checksum: 81150 63d0482567e238eae0d201b43696ca02 -- Debian GNU/Linux unstable alias sid -- Fixed in version 2.0.0.5-1. ORIGINAL ADVISORY: http://www.debian.org/security/2007/dsa-1338 OTHER REFERENCES: SA25990: http://secunia.com/advisories/25990/ SA26095: http://secunia.com/advisories/26095/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------