---------------------------------------------------------------------- A new version (0.9.0.0 - Release Candidate 1) of the free Secunia PSI has been released. The new version includes many new and advanced features, which makes it even easier to stay patched. Download and test it today: https://psi.secunia.com/ Read more about this new version: https://psi.secunia.com/?page=changelog ---------------------------------------------------------------------- TITLE: Debian update for iceweasel SECUNIA ADVISORY ID: SA29616 VERIFY ADVISORY: http://secunia.com/advisories/29616/ CRITICAL: Highly critical IMPACT: Security Bypass, Cross Site Scripting, Spoofing, Exposure of sensitive information, System access WHERE: >From remote OPERATING SYSTEM: Debian GNU/Linux 4.0 http://secunia.com/product/13844/ DESCRIPTION: Debian has issued an update for iceweasel. This fixes some vulnerabilities, which can be exploited by malicious people to bypass certain security restrictions, disclose potentially sensitive information, conduct cross-site scripting and phishing attacks, and potentially compromise a user's system. For more information: SA29526 SOLUTION: Apply updated packages. -- Debian 4.0 (stable) -- Source archives: http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel_2.0.0.13-0etch1.diff.gz Size/MD5 checksum: 186301 53f3006d2e0e33c5c3b9b2e5455dceda http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel_2.0.0.13-0etch1.dsc Size/MD5 checksum: 1289 4cae6173a998d828c2482342990d278a http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel_2.0.0.13.orig.tar.gz Size/MD5 checksum: 43550925 d9581b7ecfadc75faab6745b27f153fb Architecture independent packages: http://security.debian.org/pool/updates/main/i/iceweasel/mozilla-firefox-dom-inspector_2.0.0.13-0etch1_all.deb Size/MD5 checksum: 54124 1c174b651e317df30e5fdeba88d0ec55 http://security.debian.org/pool/updates/main/i/iceweasel/firefox_2.0.0.13-0etch1_all.deb Size/MD5 checksum: 54384 5edb0209f67852029483cbcba18f5c92 http://security.debian.org/pool/updates/main/i/iceweasel/firefox-dom-inspector_2.0.0.13-0etch1_all.deb Size/MD5 checksum: 54274 7b8c2847eccc00fe3fd8b867e9d71acf http://security.debian.org/pool/updates/main/i/iceweasel/firefox-gnome-support_2.0.0.13-0etch1_all.deb Size/MD5 checksum: 54242 92384349e31851e1b0119552cb07f44d http://security.debian.org/pool/updates/main/i/iceweasel/mozilla-firefox-gnome-support_2.0.0.13-0etch1_all.deb Size/MD5 checksum: 54124 45d17d43f0b99aeb176375edd4c75d76 http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel-dom-inspector_2.0.0.13-0etch1_all.deb Size/MD5 checksum: 239444 393dcf03f5b94cf95be68525b89492bf http://security.debian.org/pool/updates/main/i/iceweasel/mozilla-firefox_2.0.0.13-0etch1_all.deb Size/MD5 checksum: 54914 6540e2954f40e3bc63bf74bc4fd8b674 amd64 architecture (AMD x86_64 (AMD64)) http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel_2.0.0.13-0etch1_amd64.deb Size/MD5 checksum: 10194518 754786f9c4fdc37b85cf89834e9cbdb5 http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel-dbg_2.0.0.13-0etch1_amd64.deb Size/MD5 checksum: 50099150 ca0f49a7edcb77cbdd7cad9f6d0ea069 http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel-gnome-support_2.0.0.13-0etch1_amd64.deb Size/MD5 checksum: 87670 338c9a70618805a6ffb822269101b044 arm architecture (ARM) http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel_2.0.0.13-0etch1_arm.deb Size/MD5 checksum: 9243714 c57fc912cd587993569f30cca27ece6c http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel-dbg_2.0.0.13-0etch1_arm.deb Size/MD5 checksum: 49186638 1574200afef731f356faf15092f2721a http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel-gnome-support_2.0.0.13-0etch1_arm.deb Size/MD5 checksum: 81406 c80e04d7cb727b3cdb2144819bf7f028 i386 architecture (Intel ia32) http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel-gnome-support_2.0.0.13-0etch1_i386.deb Size/MD5 checksum: 81770 8b584c2e16fc0eb7bd8c11d27a68f8e5 http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel_2.0.0.13-0etch1_i386.deb Size/MD5 checksum: 9107570 8ac43d77b6449acbecd281b1e5f2e9ac http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel-dbg_2.0.0.13-0etch1_i386.deb Size/MD5 checksum: 49495882 81830f6ad26fa886669d90b887433e77 ia64 architecture (Intel ia64) http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel-gnome-support_2.0.0.13-0etch1_ia64.deb Size/MD5 checksum: 99988 d28403a679b81194e3f65e1b1cec1220 http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel-dbg_2.0.0.13-0etch1_ia64.deb Size/MD5 checksum: 50453990 eb2fc53f839647fb1584012b126b661b http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel_2.0.0.13-0etch1_ia64.deb Size/MD5 checksum: 14130102 d8e18be59e8d5c800e606ae69708f124 mips architecture (MIPS (Big Endian)) http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel-dbg_2.0.0.13-0etch1_mips.deb Size/MD5 checksum: 53881214 78264349841c07851ae9077e12506456 http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel_2.0.0.13-0etch1_mips.deb Size/MD5 checksum: 11049744 2b030d2cfc9cc25127a83a27a3acb180 http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel-gnome-support_2.0.0.13-0etch1_mips.deb Size/MD5 checksum: 82892 413e9bbb536e91cb9374bc7660034f43 mipsel architecture (MIPS (Little Endian)) http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel_2.0.0.13-0etch1_mipsel.deb Size/MD5 checksum: 10750920 c4f9f270a9dc3bb9a4c7fb653672ca61 http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel-dbg_2.0.0.13-0etch1_mipsel.deb Size/MD5 checksum: 52448404 2adcb659d1f1eacbe089e6ecf5c1a577 http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel-gnome-support_2.0.0.13-0etch1_mipsel.deb Size/MD5 checksum: 82932 cf40c0bddc35bbcc0ad25bdd5b75cc70 powerpc architecture (PowerPC) http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel-dbg_2.0.0.13-0etch1_powerpc.deb Size/MD5 checksum: 51896022 22d862ee8df86400f7cf1e92fcbe8299 http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel-gnome-support_2.0.0.13-0etch1_powerpc.deb Size/MD5 checksum: 83486 3cfbd6d6e50cba5ee0f9f2a64c582bbb http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel_2.0.0.13-0etch1_powerpc.deb Size/MD5 checksum: 9925618 b0790a2eaa530ae0c14cf3e4e087c156 s390 architecture (IBM S/390) http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel-gnome-support_2.0.0.13-0etch1_s390.deb Size/MD5 checksum: 87860 6cf8c562ea26ef6b4966990380d0dbaa http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel_2.0.0.13-0etch1_s390.deb Size/MD5 checksum: 10344926 36b3aa8464d05e8f62c7526df1edb90d http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel-dbg_2.0.0.13-0etch1_s390.deb Size/MD5 checksum: 50768124 95d62e4679469eda4932f22ef004e3e1 sparc architecture (Sun SPARC/UltraSPARC) http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel-gnome-support_2.0.0.13-0etch1_sparc.deb Size/MD5 checksum: 81614 4c1326aaae9821365b4baab2c692e5f0 http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel_2.0.0.13-0etch1_sparc.deb Size/MD5 checksum: 9129464 dc5b96ef06e08ee830411f043ead9836 http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel-dbg_2.0.0.13-0etch1_sparc.deb Size/MD5 checksum: 49108664 fee19c03f569025e398d02e1c63af3c4 ORIGINAL ADVISORY: http://lists.debian.org/debian-security-announce/2008/msg00104.html OTHER REFERENCES: SA29526: http://secunia.com/advisories/29526/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------