Articles / Debian: Security update for...

Debian: Security update for Iceweasel

Multiple vulnerabilities have been discovered in Iceweasel, Debian’s version of the Mozilla Firefox web browser. Multiple unspecified vulnerabilities in the browser engine allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors. Iceweasel does not properly restrict calls to DOMWindowUtils methods, which allows remote attackers to bypass intended access restrictions via crafted JavaScript code.

A Use-after-free vulnerability in the IME State Manager implementation allows remote attackers to execute arbitrary code via unspecified vectors, related to the nsIContent::GetNameSpaceID function. Iceweasel does not properly restrict JSAPI access to the GetProperty function, which allows remote attackers to bypass the Same Origin Policy and possibly have unspecified other impact via a crafted web site. A use-after-free vulnerability in the nsHTMLCSSUtils::CreateCSSPropertyTxn function allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.

A heap-based buffer overflow in the nsHTMLEditor::IsPrevCharInNodeWhitespace function allows remote attackers to execute arbitrary code via unspecified vectors. A use-after-free vulnerability in the nsTextEditRules::WillInsert function allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors. A heap-based buffer overflow in the nsWav-eReader::DecodeAudioData function allows remote attackers to execute arbitrary code via unspecified vectors.

A heap-based buffer overflow in the Convolve3x3 function allows remote attackers to execute arbitrary code via unspecified vectors.

Updated packages are available from security.debian.org.

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- -------------------------------------------------------------------------
Debian Security Advisory DSA-2565-1                   security@debian.org
http://www.debian.org/security/                            Florian Weimer
October 23, 2012                       http://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : iceweasel
Vulnerability  : several
Problem type   : local (remote)
Debian-specific: no
CVE ID         : CVE-2012-3982 CVE-2012-3986 CVE-2012-3990 CVE-2012-3991
                CVE-2012-4179 CVE-2012-4180 CVE-2012-4182 CVE-2012-4186
     CVE-2012-4188

Multiple vulnerabilities have been discovered in Iceweasel, Debian's
version of the Mozilla Firefox web browser.  The Common
Vulnerabilities and Exposures project identifies the following
problems:

CVE-2012-3982
  Multiple unspecified vulnerabilities in the browser engine
  allow remote attackers to cause a denial of service (memory
  corruption and application crash) or possibly execute
  arbitrary code via unknown vectors.

CVE-2012-3986
  Iceweasel does not properly restrict calls to DOMWindowUtils
       methods, which allows remote attackers to bypass intended
       access restrictions via crafted JavaScript code.

CVE-2012-3990
  A Use-after-free vulnerability in the IME State Manager
  implementation allows remote attackers to execute arbitrary
  code via unspecified vectors, related to the
  nsIContent::GetNameSpaceID function.

CVE-2012-3991
  Iceweasel does not properly restrict JSAPI access to the
  GetProperty function, which allows remote attackers to bypass
  the Same Origin Policy and possibly have unspecified other
  impact via a crafted web site.

CVE-2012-4179
  A use-after-free vulnerability in the
  nsHTMLCSSUtils::CreateCSSPropertyTxn function allows remote
  attackers to execute arbitrary code or cause a denial of
  service (heap memory corruption) via unspecified vectors.

CVE-2012-4180
  A heap-based buffer overflow in the
  nsHTMLEditor::IsPrevCharInNodeWhitespace function allows
  remote attackers to execute arbitrary code via unspecified
  vectors.

CVE-2012-4182
  A use-after-free vulnerability in the
  nsTextEditRules::WillInsert function allows remote attackers
  to execute arbitrary code or cause a denial of service (heap
  memory corruption) via unspecified vectors.

CVE-2012-4186
  A heap-based buffer overflow in the
  nsWav-eReader::DecodeAudioData function allows remote attackers
  to execute arbitrary code via unspecified vectors.

CVE-2012-4188
  A heap-based buffer overflow in the Convolve3x3 function
  allows remote attackers to execute arbitrary code via
  unspecified vectors.

For the stable distribution (squeeze), these problems have been fixed
in version 3.5.16-19.

For the testing distribution (wheezy) and the unstable distribution
(sid), these problems have been fixed in version 10.0.8esr-1.

We recommend that you upgrade your iceweasel packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: http://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.10 (GNU/Linux)

iQEcBAEBAgAGBQJQhvVjAAoJEL97/wQC1SS+LpwH/i9wHRmpa8bO25gx40Wf9Fbv
AvaVyEFxF565z5NnQSaVhjV1B9t5oswG3VTZmPfEgI0jdh6HfQGZfO0nZmSwEhy5
xgb7lJzD9WB4uCg1k0C9f/YIVXywsI9elfsbtbbroxz9a46jv5VWIyuxabiLr8ev
QNv0gHXuPA1IaNqNJlgvF3AteN8/UCF6yhRMRK7DIUr3VqHRrGiHSxNi64VrisXA
7zbmZhi7x8jQSRz7Ji00enedimk8wzy0QPz9RQov4Z+FLX1z3GShnS7esEKB4Kuw
XMVbMZij5N/6pknzDLRs9naBtp0gFnalTU8z24kHyx9kckXyKdinz25oPBm75eA=
=Z1ad
-----END PGP SIGNATURE-----
Screenshot

Project Spotlight

TimeIT

A simple-to-use time tracker.

Screenshot

Project Spotlight

GNU recutils

A set of tools and libraries to access human-editable text-based databases called recfiles.