-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                         ESB-2008.0414 -- [Debian]
            New iceweasel packages fix arbitrary code execution
                               24 April 2008

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:              iceweasel
Publisher:            Debian
Operating System:     Debian GNU/Linux 4.0
Impact:               Execute Arbitrary Code/Commands
Access:               Remote/Unauthenticated
CVE Names:            CVE-2008-1380

Ref:                  AL-2008.0050

Original Bulletin:    http://www.debian.org/security/2008/dsa-1555

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- - ------------------------------------------------------------------------
Debian Security Advisory DSA-1555-1                  security@debian.org
http://www.debian.org/security/                       Moritz Muehlenhoff
April 23, 2008                        http://www.debian.org/security/faq
- - ------------------------------------------------------------------------

Package        : iceweasel
Vulnerability  : programming error
Problem type   : remote
Debian-specific: no
CVE Id(s)      : CVE-2008-1380

It was discovered that crashes in the Javascript engine of Iceweasel,
an unbranded version of the Firefox browser could potentially lead to 
the execution of arbitrary code.

For the stable distribution (etch), this problem has been fixed in
version 2.0.0.14-0etch1

For the unstable distribution (sid), this problem has been fixed in
version 2.0.0.14-1.

We recommend that you upgrade your iceweasel package.

Upgrade instructions
- - --------------------

wget url
        will fetch the file for you
dpkg -i file.deb
        will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
        will update the internal database
apt-get upgrade
        will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.

Debian 4.0 (stable)
- - -------------------

Stable updates are available for amd64, arm, hppa, i386, ia64, mips, mipsel, s390 and sparc.

Source archives:

  http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel_2.0.0.14-0etch1.diff.gz
    Size/MD5 checksum:   186331 acc1d5eb4be5482e880641305ce90fe8
  http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel_2.0.0.14-0etch1.dsc
    Size/MD5 checksum:     1289 88eb7bc05fd1d7e443608bc7e351e90a
  http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel_2.0.0.14.orig.tar.gz
    Size/MD5 checksum: 43546462 0170d711d2fc68dfacf81c03a9f72929

Architecture independent packages:

  http://security.debian.org/pool/updates/main/i/iceweasel/firefox-gnome-support_2.0.0.14-0etch1_all.deb
    Size/MD5 checksum:    54270 f411ac104862b5dd4e015bb2b655aa6a
  http://security.debian.org/pool/updates/main/i/iceweasel/mozilla-firefox-gnome-support_2.0.0.14-0etch1_all.deb
    Size/MD5 checksum:    54154 bf3cb92ffa1f0395e0d3d1fd85a0adae
  http://security.debian.org/pool/updates/main/i/iceweasel/mozilla-firefox_2.0.0.14-0etch1_all.deb
    Size/MD5 checksum:    54946 567341248b0396d6d72e93953d30e0fe
  http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel-dom-inspector_2.0.0.14-0etch1_all.deb
    Size/MD5 checksum:   239462 17bd2b14956ddcd4f5622f5367d62a52
  http://security.debian.org/pool/updates/main/i/iceweasel/firefox_2.0.0.14-0etch1_all.deb
    Size/MD5 checksum:    54416 b842befbc600817d952b09ce72b20415
  http://security.debian.org/pool/updates/main/i/iceweasel/mozilla-firefox-dom-inspector_2.0.0.14-0etch1_all.deb
    Size/MD5 checksum:    54154 71f3a9a2a19df8c1ae2ee329da566a3c
  http://security.debian.org/pool/updates/main/i/iceweasel/firefox-dom-inspector_2.0.0.14-0etch1_all.deb
    Size/MD5 checksum:    54304 0ae61b52e5f7287010f9de806da0a09c

amd64 architecture (AMD x86_64 (AMD64))

  http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel_2.0.0.14-0etch1_amd64.deb
    Size/MD5 checksum: 10194434 734b381fc98eddf78db2fc99c8d2dac7
  http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel-gnome-support_2.0.0.14-0etch1_amd64.deb
    Size/MD5 checksum:    87686 8cd39afe40c5bce23adc9caa735f41b1
  http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel-dbg_2.0.0.14-0etch1_amd64.deb
    Size/MD5 checksum: 50101124 0e7607036faf0d15482808400ab6dc6b

arm architecture (ARM)

  http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel-gnome-support_2.0.0.14-0etch1_arm.deb
    Size/MD5 checksum:    81434 eda1e64da0aafcdf07b567faf4e1ce55
  http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel_2.0.0.14-0etch1_arm.deb
    Size/MD5 checksum:  9244706 52c46f9d480a6d52bc9f34e973f23563
  http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel-dbg_2.0.0.14-0etch1_arm.deb
    Size/MD5 checksum: 49187858 7948dc8f3950be63da4bd6ea389344ab

hppa architecture (HP PA RISC)

  http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel-dbg_2.0.0.14-0etch1_hppa.deb
    Size/MD5 checksum: 50467180 2b0ec0008fe33f71e49f77cac11de1a5
  http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel-gnome-support_2.0.0.14-0etch1_hppa.deb
    Size/MD5 checksum:    89190 4e3c4a286b498d9d1729855d12979f4d
  http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel_2.0.0.14-0etch1_hppa.deb
    Size/MD5 checksum: 11094864 2e84fc92a26f0d6519e150b5675fe99c

i386 architecture (Intel ia32)

  http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel-dbg_2.0.0.14-0etch1_i386.deb
    Size/MD5 checksum: 49494744 e03445e7ffb50572950a6703b86abe6c
  http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel_2.0.0.14-0etch1_i386.deb
    Size/MD5 checksum:  9107850 809f52c22ae1851d933be6ee65bc2985
  http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel-gnome-support_2.0.0.14-0etch1_i386.deb
    Size/MD5 checksum:    81810 8ffb2dfe63ca0b78fc88f261fc4c0538

ia64 architecture (Intel ia64)

  http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel-dbg_2.0.0.14-0etch1_ia64.deb
    Size/MD5 checksum: 50452718 4de5c04340b88dbea3bbdeec5136ea9e
  http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel-gnome-support_2.0.0.14-0etch1_ia64.deb
    Size/MD5 checksum:   100000 ef745446c34acaeb23c230473d108246
  http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel_2.0.0.14-0etch1_ia64.deb
    Size/MD5 checksum: 14130582 5914609cccaabfc4566b9fa6d61a424d

mips architecture (MIPS (Big Endian))

  http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel-gnome-support_2.0.0.14-0etch1_mips.deb
    Size/MD5 checksum:    82918 74568fad74f94c2756ddba46d23a20dd
  http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel_2.0.0.14-0etch1_mips.deb
    Size/MD5 checksum: 11049472 1cce8a2e26b4bf76985480b8e73c87f9
  http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel-dbg_2.0.0.14-0etch1_mips.deb
    Size/MD5 checksum: 53883452 cf204de123656a4c5999f7a363106023

mipsel architecture (MIPS (Little Endian))

  http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel-gnome-support_2.0.0.14-0etch1_mipsel.deb
    Size/MD5 checksum:    82958 c1a9d56e9136bb1e841c8071c5ec0295
  http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel-dbg_2.0.0.14-0etch1_mipsel.deb
    Size/MD5 checksum: 52445632 170d3c71d0bf73507679829e1880198d
  http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel_2.0.0.14-0etch1_mipsel.deb
    Size/MD5 checksum: 10750956 3c616431a7fb1d77a4c95ebdf5ae2185

s390 architecture (IBM S/390)

  http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel-gnome-support_2.0.0.14-0etch1_s390.deb
    Size/MD5 checksum:    87878 d3bda545d0590d9d130fa990dbed605c
  http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel-dbg_2.0.0.14-0etch1_s390.deb
    Size/MD5 checksum: 50767092 d54ef1946de06eca9155bc2e6fc1c7f0
  http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel_2.0.0.14-0etch1_s390.deb
    Size/MD5 checksum: 10345682 0b7d6059cf9d8bb24f337d872b9eeca2

sparc architecture (Sun SPARC/UltraSPARC)

  http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel-dbg_2.0.0.14-0etch1_sparc.deb
    Size/MD5 checksum: 49108930 2827fd7c3c1f06ab4b00dbe3af5f8cd4
  http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel-gnome-support_2.0.0.14-0etch1_sparc.deb
    Size/MD5 checksum:    81640 c14d0c48f14db246ceab95fbdd1022dc
  http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel_2.0.0.14-0etch1_sparc.deb
    Size/MD5 checksum:  9129222 e4fbd6a1d42269507a44d9e7d7f6cc38


  These files will probably be moved into the stable distribution on
  its next update.

- - ---------------------------------------------------------------------------------
For apt-get: deb http://security.debian.org/ stable/updates main
For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
Mailing list: debian-security-announce@lists.debian.org
Package info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg>
- -----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.6 (GNU/Linux)

iD8DBQFID3eQXm3vHE4uyloRAiiQAKCu1F81K/FstjYOWX249tEc6633LwCg0137
90sYKnNZo/lTdd+EyhOGu1U=
=4U4d
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

If you believe that your computer system has been compromised or attacked in 
any way, we encourage you to let us know by completing the secure National IT 
Incident Reporting Form at:

        http://www.auscert.org.au/render.html?it=3192

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================

-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967

iQCVAwUBSA/HEyh9+71yA2DNAQKkcwP+Mq4X5IPy4DwpHnqvikXT2OSW0SXFmF81
3NahHyf4N5vvfQge18TEPAgCjbQvy5WEr/NKYFKtaf7AUWKazF2sQA6q2AFTZOxP
jsbCsvZ4tNW0fe/4mQ7gUwW3PARsJRiktC7jI92MqJofGI4180YetYHW4S5z0Fia
BYWGfTHD06o=
=DWaT
-----END PGP SIGNATURE-----