---------------------------------------------------------------------- Do you need accurate and reliable IDS / IPS / AV detection rules? Get in-depth vulnerability details: http://secunia.com/binary_analysis/sample_analysis/ ---------------------------------------------------------------------- TITLE: Debian update for iceweasel SECUNIA ADVISORY ID: SA32185 VERIFY ADVISORY: http://secunia.com/advisories/32185/ CRITICAL: Highly critical IMPACT: Security Bypass, Exposure of system information, Exposure of sensitive information, DoS, System access WHERE: >From remote OPERATING SYSTEM: Debian GNU/Linux 4.0 http://secunia.com/advisories/product/13844/ Debian GNU/Linux unstable alias sid http://secunia.com/advisories/product/530/ DESCRIPTION: Debian has issued an update for iceweasel. This fixes some vulnerabilities, which can be exploited by malicious people to bypass certain security restrictions, to disclose sensitive information, or to potentially compromise a user's system. For more information: SA31984 SOLUTION: Apply updated packages. -- Debian GNU/Linux 4.0 alias etch -- Source archives: http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel_2.0.0.17.orig.tar.gz Size/MD5 checksum: 47264462 caa85228cc0f4d309e85d6991cb95305 http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel_2.0.0.17-0etch1.dsc Size/MD5 checksum: 1289 84dfa301f786f84a1d64baf4ed3db782 http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel_2.0.0.17-0etch1.diff.gz Size/MD5 checksum: 186694 8e6e9a55fde52af390122189070fca57 Architecture independent packages: http://security.debian.org/pool/updates/main/i/iceweasel/firefox_2.0.0.17-0etch1_all.deb Size/MD5 checksum: 54634 b2fd3414c31cebfcf9a1433dcc1d2e93 http://security.debian.org/pool/updates/main/i/iceweasel/firefox-dom-inspector_2.0.0.17-0etch1_all.deb Size/MD5 checksum: 54530 fc5fb66d2eaf4027d945dd0a28b2d846 http://security.debian.org/pool/updates/main/i/iceweasel/mozilla-firefox-dom-inspector_2.0.0.17-0etch1_all.deb Size/MD5 checksum: 54384 21762949b8e2fd39ac79476fa24b03d1 http://security.debian.org/pool/updates/main/i/iceweasel/mozilla-firefox-gnome-support_2.0.0.17-0etch1_all.deb Size/MD5 checksum: 54384 9df9c09b5351c290fee72c24b47a331d http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel-dom-inspector_2.0.0.17-0etch1_all.deb Size/MD5 checksum: 239720 644c28cc69b5ffa408b0c57b92152ec3 http://security.debian.org/pool/updates/main/i/iceweasel/mozilla-firefox_2.0.0.17-0etch1_all.deb Size/MD5 checksum: 55170 5d191251cab8743fdd8537c757e39abc http://security.debian.org/pool/updates/main/i/iceweasel/firefox-gnome-support_2.0.0.17-0etch1_all.deb Size/MD5 checksum: 54494 bf8060f4a48856e3221988210417ebd6 alpha architecture (DEC Alpha) http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel_2.0.0.17-0etch1_alpha.deb Size/MD5 checksum: 11578586 a8c71f32151faca4674a1a09e3b66545 http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel-dbg_2.0.0.17-0etch1_alpha.deb Size/MD5 checksum: 51173558 6361a1e6926eb32d5ede6c74671d86f1 http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel-gnome-support_2.0.0.17-0etch1_alpha.deb Size/MD5 checksum: 90252 569480998f4eac60ba8c0f6e62cb275e amd64 architecture (AMD x86_64 (AMD64)) http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel-gnome-support_2.0.0.17-0etch1_amd64.deb Size/MD5 checksum: 87924 70015d9a4e458e26ff6b65a2674ff56a http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel_2.0.0.17-0etch1_amd64.deb Size/MD5 checksum: 10206146 ec62c84f919bda242b9d65390d9143be http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel-dbg_2.0.0.17-0etch1_amd64.deb Size/MD5 checksum: 50165526 8b083d926eb7e6da63c0be882af1642f arm architecture (ARM) http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel-dbg_2.0.0.17-0etch1_arm.deb Size/MD5 checksum: 49257448 89f6c8c0b51255038eee5d13416fcadb http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel-gnome-support_2.0.0.17-0etch1_arm.deb Size/MD5 checksum: 81618 59dba0eee92b991d069f883c19680d75 http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel_2.0.0.17-0etch1_arm.deb Size/MD5 checksum: 9256358 4fd0774c50d76457152d406ed19ea367 i386 architecture (Intel ia32) http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel-dbg_2.0.0.17-0etch1_i386.deb Size/MD5 checksum: 49570130 6a6b0cb233e73d4baef8ddbd33029b98 http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel-gnome-support_2.0.0.17-0etch1_i386.deb Size/MD5 checksum: 82056 91a67db26a7c51ae185d39dedaaf94cb http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel_2.0.0.17-0etch1_i386.deb Size/MD5 checksum: 9122164 5b4e1dfeb171be9542572fc9e490b818 ia64 architecture (Intel ia64) http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel_2.0.0.17-0etch1_ia64.deb Size/MD5 checksum: 14156490 2607bd2156b38eebeb2ecdde49acea53 http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel-gnome-support_2.0.0.17-0etch1_ia64.deb Size/MD5 checksum: 100252 1e28dda1215d01e2cfe35403a52a0fcc http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel-dbg_2.0.0.17-0etch1_ia64.deb Size/MD5 checksum: 50513628 0db2edd5ef28c04f8c1d5331e92e100d mips architecture (MIPS (Big Endian)) http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel_2.0.0.17-0etch1_mips.deb Size/MD5 checksum: 11063822 d78bb2a163ec303a618ea88e005f0116 http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel-gnome-support_2.0.0.17-0etch1_mips.deb Size/MD5 checksum: 83196 ef3e17948ca57bebb18890d5ce89e0f8 http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel-dbg_2.0.0.17-0etch1_mips.deb Size/MD5 checksum: 53969964 f42e61e36c60c76b24e1bf34600479da mipsel architecture (MIPS (Little Endian)) http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel-gnome-support_2.0.0.17-0etch1_mipsel.deb Size/MD5 checksum: 83224 be3cb4e303ad8544dd274447451228c6 http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel_2.0.0.17-0etch1_mipsel.deb Size/MD5 checksum: 10761380 077af6ef650d85ed023acb5d936318c3 http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel-dbg_2.0.0.17-0etch1_mipsel.deb Size/MD5 checksum: 52518328 de36b16feb4052325ed975d9d75a6625 powerpc architecture (PowerPC) http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel_2.0.0.17-0etch1_powerpc.deb Size/MD5 checksum: 9937490 9ef7bdd022ec317efaefbfcd5e0b0aa0 http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel-dbg_2.0.0.17-0etch1_powerpc.deb Size/MD5 checksum: 51973444 ee5cb6165d1cda06c158df93f393b833 http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel-gnome-support_2.0.0.17-0etch1_powerpc.deb Size/MD5 checksum: 83786 56ad8684dc229e605f7285e48bb10389 s390 architecture (IBM S/390) http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel_2.0.0.17-0etch1_s390.deb Size/MD5 checksum: 10366602 06f0cc6f4fab228756f7b088eee305d3 http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel-dbg_2.0.0.17-0etch1_s390.deb Size/MD5 checksum: 50839114 fa42c55974b0beece5184341e5ca4340 http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel-gnome-support_2.0.0.17-0etch1_s390.deb Size/MD5 checksum: 88198 6ebd745cc96c2c6c80cb7f2987138364 sparc architecture (Sun SPARC/UltraSPARC) http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel-dbg_2.0.0.17-0etch1_sparc.deb Size/MD5 checksum: 49179416 00c2781b99157e0f0970b01d1d2e70ed http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel-gnome-support_2.0.0.17-0etch1_sparc.deb Size/MD5 checksum: 82000 e74866cfbd6a70b1e7e7b5eb737dc8a8 http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel_2.0.0.17-0etch1_sparc.deb Size/MD5 checksum: 9199076 95cacd55b0dc6415d62f30394517048a -- Debian GNU/Linux unstable alias sid -- Fixed in version 3.0.3 of iceweasel and 1.9.0.3-1 of xulrunner. ORIGINAL ADVISORY: DSA-1649-1: http://lists.debian.org/debian-security-announce/2008/msg00240.html OTHER REFERENCES: SA31984: http://secunia.com/advisories/31984/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------