Debians sikkerhedsbulletin
DSA-1308-1 iceweasel -- flere sårbarheder
- Rapporteret den:
- 14. jun 2007
- Berørte pakker:
- iceweasel
- Sårbar:
- Ja
- Referencer i sikkerhedsdatabaser:
- I Mitres CVE-ordbog: CVE-2007-1362, CVE-2007-2867, CVE-2007-2868, CVE-2007-2869, CVE-2007-2870, CVE-2007-2871.
- Yderligere oplysninger:
-
Flere fjernudnytbare sårbarheder er opdaget i webbrowseren Iceweasel, en version af browseren Firefox. Projektet Common Vulnerabilities and Exposures har fundet frem til følgende problemer:
- CVE-2007-1362
Nicolas Derouet opdagede at Iceape udførte utilstrækkelig kontrol på cookies, hvilket kunne føre til lammelsesangreb (denial of service).
- CVE-2007-2867
Boris Zbarsky, Eli Friedman, Georgi Guninski, Jesse Ruderman, Martijn Wargers og Olli Pettay opdagede nedbrud i layoutmaskinen, hvilket kunne gøre det muligt at udføre vilkårlig kode.
- CVE-2007-2868
Brendan Eich, Igor Bukanov, Jesse Ruderman,
moz_bug_r_a4
og Wladimir Palant opdagede nedbrud i JavaScript-maskinen, hvilket kunne gøre det muligt at udføre vilkårlig kode. - CVE-2007-2869
Marcel
opdagede at ondsindede websteder kunne forårsage omfattende ressourceforbrug gennem funktionen til automatisk fuldførelse, medførende lammelsesangreb. - CVE-2007-2870
moz_bug_r_a4
opdagede at tilføjelse af en event-lytter gennem funktionen addEventListener() tillod udførelse af skripter på tværs af websteder (cross-site scripting). - CVE-2007-2871
Chris Thomas opdagede at XUL-popup'er kunne misbruges til forfalsknings- (spoofing) eller fiskningsangreb (phising).
Rettelser til den gamle stabile distribution (sarge) er ikke tilgængelige. Mens der vil være en ny runde sikkerhedsopdateringer til Mozilla-produkter, har Debian ikke ressourcer til at tilbageføre flere sikkerhedsrettelser til de gamle Mozilla-produkter. Du opfordres kraftigt til så snart som muligt at opgradere til den stabile distribution.
I den stabile distribution (etch) er disse problemer rettet i version 2.0.0.4-0etch1. En opbygning til alpha-arkitekturen er endnu ikke tilgængelig, den vil senere blive stillet til rådighed.
I den ustabile distribution (sid) er disse problemer rettet i version 2.0.0.4-1.
Vi anbefaler at du opgraderer dine iceweasel-pakker.
- CVE-2007-1362
- Rettet i:
-
Debian GNU/Linux 4.0 (etch)
- Kildekode:
- http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel_2.0.0.4-0etch1.dsc
- http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel_2.0.0.4-0etch1.diff.gz
- http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel_2.0.0.4.orig.tar.gz
- http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel_2.0.0.4-0etch1.diff.gz
- Arkitekturuafhængig komponent:
- http://security.debian.org/pool/updates/main/i/iceweasel/firefox-dom-inspector_2.0.0.4-0etch1_all.deb
- http://security.debian.org/pool/updates/main/i/iceweasel/firefox-gnome-support_2.0.0.4-0etch1_all.deb
- http://security.debian.org/pool/updates/main/i/iceweasel/firefox_2.0.0.4-0etch1_all.deb
- http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel-dom-inspector_2.0.0.4-0etch1_all.deb
- http://security.debian.org/pool/updates/main/i/iceweasel/mozilla-firefox-dom-inspector_2.0.0.4-0etch1_all.deb
- http://security.debian.org/pool/updates/main/i/iceweasel/mozilla-firefox-gnome-support_2.0.0.4-0etch1_all.deb
- http://security.debian.org/pool/updates/main/i/iceweasel/mozilla-firefox_2.0.0.4-0etch1_all.deb
- http://security.debian.org/pool/updates/main/i/iceweasel/firefox-gnome-support_2.0.0.4-0etch1_all.deb
- AMD64:
- http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel_2.0.0.4-0etch1_amd64.deb
- http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel-dbg_2.0.0.4-0etch1_amd64.deb
- http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel-gnome-support_2.0.0.4-0etch1_amd64.deb
- http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel-dbg_2.0.0.4-0etch1_amd64.deb
- ARM:
- http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel_2.0.0.4-0etch1_arm.deb
- http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel-dbg_2.0.0.4-0etch1_arm.deb
- http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel-gnome-support_2.0.0.4-0etch1_arm.deb
- http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel-dbg_2.0.0.4-0etch1_arm.deb
- HPPA:
- http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel_2.0.0.4-0etch1_hppa.deb
- http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel-dbg_2.0.0.4-0etch1_hppa.deb
- http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel-gnome-support_2.0.0.4-0etch1_hppa.deb
- http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel-dbg_2.0.0.4-0etch1_hppa.deb
- Intel IA-32:
- http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel_2.0.0.4-0etch1_i386.deb
- http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel-dbg_2.0.0.4-0etch1_i386.deb
- http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel-gnome-support_2.0.0.4-0etch1_i386.deb
- http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel-dbg_2.0.0.4-0etch1_i386.deb
- Intel IA-64:
- http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel_2.0.0.4-0etch1_ia64.deb
- http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel-dbg_2.0.0.4-0etch1_ia64.deb
- http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel-gnome-support_2.0.0.4-0etch1_ia64.deb
- http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel-dbg_2.0.0.4-0etch1_ia64.deb
- Big endian MIPS:
- http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel_2.0.0.4-0etch1_mips.deb
- http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel-dbg_2.0.0.4-0etch1_mips.deb
- http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel-gnome-support_2.0.0.4-0etch1_mips.deb
- http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel-dbg_2.0.0.4-0etch1_mips.deb
- Little endian MIPS:
- http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel_2.0.0.4-0etch1_mipsel.deb
- http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel-dbg_2.0.0.4-0etch1_mipsel.deb
- http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel-gnome-support_2.0.0.4-0etch1_mipsel.deb
- http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel-dbg_2.0.0.4-0etch1_mipsel.deb
- PowerPC:
- http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel_2.0.0.4-0etch1_powerpc.deb
- http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel-dbg_2.0.0.4-0etch1_powerpc.deb
- http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel-gnome-support_2.0.0.4-0etch1_powerpc.deb
- http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel-dbg_2.0.0.4-0etch1_powerpc.deb
- IBM S/390:
- http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel_2.0.0.4-0etch1_s390.deb
- http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel-dbg_2.0.0.4-0etch1_s390.deb
- http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel-gnome-support_2.0.0.4-0etch1_s390.deb
- http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel-dbg_2.0.0.4-0etch1_s390.deb
- Sun Sparc:
- http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel_2.0.0.4-0etch1_sparc.deb
- http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel-dbg_2.0.0.4-0etch1_sparc.deb
- http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel-gnome-support_2.0.0.4-0etch1_sparc.deb
- http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel-dbg_2.0.0.4-0etch1_sparc.deb
MD5-kontrolsummer for de listede filer findes i den originale sikkerhedsbulletin.