copyright | disclaimer | privacy | contact  
Australia's Leading Computer Emergency Response Team
 
Search this site

 
On this site

 > HOME
 > About AusCERT
 > Membership
 > Contact Us
 > PKI Services
 > Publications
 > Sec. Bulletins
 > Conferences
 > News & Media
 > Services
 > Web Log
 > Site Map
 > Site Help
 > Member login





 

ESB-2014.2297 - [Debian] iceweasel: Multiple vulnerabilities

Date: 05 December 2014
References: ASB-2014.0139  ESB-2014.2269  ESB-2014.2270  ESB-2014.2311  

Click here for printable version
Click here for PGP verifiable version
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2014.2297
                         iceweasel security update
                              5 December 2014

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           iceweasel
Publisher:         Debian
Operating System:  Debian GNU/Linux 7
Impact/Access:     Execute Arbitrary Code/Commands -- Remote with User Interaction
                   Denial of Service               -- Remote with User Interaction
Resolution:        Patch/Upgrade
CVE Names:         CVE-2014-1594 CVE-2014-1593 CVE-2014-1592
                   CVE-2014-1590 CVE-2014-1587 

Reference:         ASB-2014.0139
                   ESB-2014.2270
                   ESB-2014.2269

Original Bulletin: 
   http://www.debian.org/security/2014/dsa-3090

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- - -------------------------------------------------------------------------
Debian Security Advisory DSA-3090-1                   security@debian.org
http://www.debian.org/security/                        Moritz Muehlenhoff
December 04, 2014                      http://www.debian.org/security/faq
- - -------------------------------------------------------------------------

Package        : iceweasel
CVE ID         : CVE-2014-1587 CVE-2014-1590 CVE-2014-1592 CVE-2014-1593 
                 CVE-2014-1594

Multiple security issues have been found in Iceweasel, Debian's version
of the Mozilla Firefox web browser:  Multiple memory safety errors, buffer
overflows, use-after-frees and other implementation errors may lead to
the execution of arbitrary code, the bypass of security restrictions or
denial of service.

For the stable distribution (wheezy), these problems have been fixed in
version 31.3.0esr-1~deb7u1.

For the upcoming stable distribution (jessie), these problems will be
fixe soon.

For the unstable distribution (sid), these problems have been fixed in
version 31.3.0esr-1.

We recommend that you upgrade your iceweasel packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
- -----BEGIN PGP SIGNATURE-----
Version: GnuPG v1

iQIcBAEBAgAGBQJUgH2+AAoJEBDCk7bDfE42fbsP/RpAMD8xmCsoaZ0XIyG8v3XM
D71lWnzR1hFZLsOxTLdE9hC/uP+h7cU5VoJKRQC7Dnlq6FHAfo6haZM7jFm2DSUI
kazCoUQpCcAe5kzU3ZSuede8VJp+2QBihLF18m0Tv8euKcVhuD/Rc2CtBblr2RRM
LqB3UQABknMKMfgN/6IpmHdbYkQCALwqZ2cPUs9PWyzRBhuVuaUfqscObLcqSU10
Ye/XDaYCzIMvfzZHNEH74f0RYoRGByhTfIIL91knx2Zt84esxSbRcTAZsE3FpgL3
ME96YVg7QNJ3FoSbW3X27Etj56ccTfQrxi4mxGsvVVtFqFDwQ61qymaURCmnBpB4
oad9AOMgoRYjaswLonh0pHSaoK3g3POh4HNVGeHF5LTijbn19HIkrRhVWKohdAxy
ra6LsN2ll3uQnneDgceK8xbO1Xv+veJsk4UbNiERerzZZtgCvbj1ekaU/Z7qulzI
Wiw14dvOV5/m+TK42KS3hoYkBy8pTRPVzEcJpcJcyTY4n9hRzqyuBnAnhRfWSa5P
evUcizfGcjIMEKCAB0NumWliyvAcT6xfu7FEu1HLdbef1OUV1rgWOSomXuR0jgCg
d7kIsF1V2jkM0fzsCFvMDlBizccPvC28+YdTUBORKyDxIDBd3pydtq71088uxbAX
LkWuZqPeLJQOtZgMteuC
=JgGE
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=GgcD
-----END PGP SIGNATURE-----