Secunia Security Advisory - Debian has issued an update for iceweasel. This fixes a vulnerability, which can potentially be exploited by malicious people to compromise a user's system.
9ebfb262c4a1f0d4bafc48917c951c47ed7d54f664911af2159a0d8bb962028d
----------------------------------------------------------------------
Secunia Network Software Inspector 2.0 (NSI) - Public Beta
4 days left of beta period.
The 1st generation of the Secunia Network Software Inspector (NSI)
has been available for corporate users for almost 1 year and its been
a tremendous success.
The 2nd generation Secunia NSI is built on the same technology as the
award winning Secunia PSI, which has already been downloaded and
installed on more than 400,000 computers world wide.
Learn more / Download (instant access):
http://secunia.com/network_software_inspector_2/
----------------------------------------------------------------------
TITLE:
Debian update for iceweasel
SECUNIA ADVISORY ID:
SA29911
VERIFY ADVISORY:
http://secunia.com/advisories/29911/
CRITICAL:
Highly critical
IMPACT:
DoS, System access
WHERE:
>From remote
OPERATING SYSTEM:
Debian GNU/Linux 4.0
http://secunia.com/product/13844/
Debian GNU/Linux unstable alias sid
http://secunia.com/product/530/
DESCRIPTION:
Debian has issued an update for iceweasel. This fixes a
vulnerability, which can potentially be exploited by malicious people
to compromise a user's system.
For more information:
SA29787
SOLUTION:
Apply updated packages.
-- Debian 4.0 (stable) --
Source archives:
http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel_2.0.0.14-0etch1.diff.gz
Size/MD5 checksum: 186331 acc1d5eb4be5482e880641305ce90fe8
http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel_2.0.0.14-0etch1.dsc
Size/MD5 checksum: 1289 88eb7bc05fd1d7e443608bc7e351e90a
http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel_2.0.0.14.orig.tar.gz
Size/MD5 checksum: 43546462 0170d711d2fc68dfacf81c03a9f72929
Architecture independent packages:
http://security.debian.org/pool/updates/main/i/iceweasel/firefox-gnome-support_2.0.0.14-0etch1_all.deb
Size/MD5 checksum: 54270 f411ac104862b5dd4e015bb2b655aa6a
http://security.debian.org/pool/updates/main/i/iceweasel/mozilla-firefox-gnome-support_2.0.0.14-0etch1_all.deb
Size/MD5 checksum: 54154 bf3cb92ffa1f0395e0d3d1fd85a0adae
http://security.debian.org/pool/updates/main/i/iceweasel/mozilla-firefox_2.0.0.14-0etch1_all.deb
Size/MD5 checksum: 54946 567341248b0396d6d72e93953d30e0fe
http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel-dom-inspector_2.0.0.14-0etch1_all.deb
Size/MD5 checksum: 239462 17bd2b14956ddcd4f5622f5367d62a52
http://security.debian.org/pool/updates/main/i/iceweasel/firefox_2.0.0.14-0etch1_all.deb
Size/MD5 checksum: 54416 b842befbc600817d952b09ce72b20415
http://security.debian.org/pool/updates/main/i/iceweasel/mozilla-firefox-dom-inspector_2.0.0.14-0etch1_all.deb
Size/MD5 checksum: 54154 71f3a9a2a19df8c1ae2ee329da566a3c
http://security.debian.org/pool/updates/main/i/iceweasel/firefox-dom-inspector_2.0.0.14-0etch1_all.deb
Size/MD5 checksum: 54304 0ae61b52e5f7287010f9de806da0a09c
amd64 architecture (AMD x86_64 (AMD64))
http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel_2.0.0.14-0etch1_amd64.deb
Size/MD5 checksum: 10194434 734b381fc98eddf78db2fc99c8d2dac7
http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel-gnome-support_2.0.0.14-0etch1_amd64.deb
Size/MD5 checksum: 87686 8cd39afe40c5bce23adc9caa735f41b1
http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel-dbg_2.0.0.14-0etch1_amd64.deb
Size/MD5 checksum: 50101124 0e7607036faf0d15482808400ab6dc6b
arm architecture (ARM)
http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel-gnome-support_2.0.0.14-0etch1_arm.deb
Size/MD5 checksum: 81434 eda1e64da0aafcdf07b567faf4e1ce55
http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel_2.0.0.14-0etch1_arm.deb
Size/MD5 checksum: 9244706 52c46f9d480a6d52bc9f34e973f23563
http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel-dbg_2.0.0.14-0etch1_arm.deb
Size/MD5 checksum: 49187858 7948dc8f3950be63da4bd6ea389344ab
hppa architecture (HP PA RISC)
http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel-dbg_2.0.0.14-0etch1_hppa.deb
Size/MD5 checksum: 50467180 2b0ec0008fe33f71e49f77cac11de1a5
http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel-gnome-support_2.0.0.14-0etch1_hppa.deb
Size/MD5 checksum: 89190 4e3c4a286b498d9d1729855d12979f4d
http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel_2.0.0.14-0etch1_hppa.deb
Size/MD5 checksum: 11094864 2e84fc92a26f0d6519e150b5675fe99c
i386 architecture (Intel ia32)
http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel-dbg_2.0.0.14-0etch1_i386.deb
Size/MD5 checksum: 49494744 e03445e7ffb50572950a6703b86abe6c
http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel_2.0.0.14-0etch1_i386.deb
Size/MD5 checksum: 9107850 809f52c22ae1851d933be6ee65bc2985
http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel-gnome-support_2.0.0.14-0etch1_i386.deb
Size/MD5 checksum: 81810 8ffb2dfe63ca0b78fc88f261fc4c0538
ia64 architecture (Intel ia64)
http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel-dbg_2.0.0.14-0etch1_ia64.deb
Size/MD5 checksum: 50452718 4de5c04340b88dbea3bbdeec5136ea9e
http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel-gnome-support_2.0.0.14-0etch1_ia64.deb
Size/MD5 checksum: 100000 ef745446c34acaeb23c230473d108246
http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel_2.0.0.14-0etch1_ia64.deb
Size/MD5 checksum: 14130582 5914609cccaabfc4566b9fa6d61a424d
mips architecture (MIPS (Big Endian))
http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel-gnome-support_2.0.0.14-0etch1_mips.deb
Size/MD5 checksum: 82918 74568fad74f94c2756ddba46d23a20dd
http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel_2.0.0.14-0etch1_mips.deb
Size/MD5 checksum: 11049472 1cce8a2e26b4bf76985480b8e73c87f9
http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel-dbg_2.0.0.14-0etch1_mips.deb
Size/MD5 checksum: 53883452 cf204de123656a4c5999f7a363106023
mipsel architecture (MIPS (Little Endian))
http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel-gnome-support_2.0.0.14-0etch1_mipsel.deb
Size/MD5 checksum: 82958 c1a9d56e9136bb1e841c8071c5ec0295
http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel-dbg_2.0.0.14-0etch1_mipsel.deb
Size/MD5 checksum: 52445632 170d3c71d0bf73507679829e1880198d
http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel_2.0.0.14-0etch1_mipsel.deb
Size/MD5 checksum: 10750956 3c616431a7fb1d77a4c95ebdf5ae2185
s390 architecture (IBM S/390)
http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel-gnome-support_2.0.0.14-0etch1_s390.deb
Size/MD5 checksum: 87878 d3bda545d0590d9d130fa990dbed605c
http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel-dbg_2.0.0.14-0etch1_s390.deb
Size/MD5 checksum: 50767092 d54ef1946de06eca9155bc2e6fc1c7f0
http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel_2.0.0.14-0etch1_s390.deb
Size/MD5 checksum: 10345682 0b7d6059cf9d8bb24f337d872b9eeca2
sparc architecture (Sun SPARC/UltraSPARC)
http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel-dbg_2.0.0.14-0etch1_sparc.deb
Size/MD5 checksum: 49108930 2827fd7c3c1f06ab4b00dbe3af5f8cd4
http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel-gnome-support_2.0.0.14-0etch1_sparc.deb
Size/MD5 checksum: 81640 c14d0c48f14db246ceab95fbdd1022dc
http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel_2.0.0.14-0etch1_sparc.deb
Size/MD5 checksum: 9129222 e4fbd6a1d42269507a44d9e7d7f6cc38
-- Debian GNU/Linux unstable alias sid --
Fixed in version 2.0.0.14-1.
ORIGINAL ADVISORY:
http://lists.debian.org/debian-security-announce/2008/msg00126.html
OTHER REFERENCES:
SA29787:
http://secunia.com/advisories/29787/
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------