10 High
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:C/I:C/A:C
6.8 Medium
AI Score
Confidence
Low
0.598 Medium
EPSS
Percentile
97.8%
Debian Security Advisory DSA-2313-1 [email protected]
http://www.debian.org/security/ Moritz Muehlenhoff
September 29, 2011 http://www.debian.org/security/faq
Package : iceweasel
Vulnerability : several
Problem type : remote
Debian-specific: no
CVE ID : CVE-2011-2372 CVE-2011-2995 CVE-2011-2998 CVE-2011-2999
CVE-2011-3000
Several vulnerabilities have been found in Iceweasel, a web browser
based on Firefox:
CVE-2011-2372
Mariusz Mlynski discovered that websites could open a download
dialog - which has "open" as the default action -, while a user
presses the ENTER key.
CVE-2011-2995
Benjamin Smedberg, Bob Clary and Jesse Ruderman discovered crashes
in the rendering engine, which could lead to the execution of
arbitrary code.
CVE-2011-2998
Mark Kaplan discovered an integer underflow in the javascript
engine, which could lead to the execution of arbitrary code.
CVE-2011-2999
Boris Zbarsky discovered that incorrect handling of the
window.location object could lead to bypasses of the same-origin
policy.
CVE-2011-3000
Ian Graham discovered that multiple Location headers might lead to
CRLF injection.
For the oldstable distribution (lenny), this problem has been fixed in
version 1.9.0.19-14 of the xulrunner source package. This update also
marks the compromised DigiNotar root certs as revoked rather then
untrusted.
For the stable distribution (squeeze), this problem has been fixed
inversion 3.5.16-10. This update also marks the compromised DigiNotar
root certs as revoked rather then untrusted.
For the unstable distribution (sid), this problem has been fixed in
version 7.0-1.
We recommend that you upgrade your iceweasel packages.
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: http://www.debian.org/security/
Mailing list: [email protected]
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Debian | 5 | amd64 | libmozjs1d | < 1.9.0.19-14 | libmozjs1d_1.9.0.19-14_amd64.deb |
Debian | 5 | i386 | xulrunner-1.9-dbg | < 1.9.0.19-14 | xulrunner-1.9-dbg_1.9.0.19-14_i386.deb |
Debian | 5 | mipsel | libmozjs1d | < 1.9.0.19-14 | libmozjs1d_1.9.0.19-14_mipsel.deb |
Debian | 5 | powerpc | spidermonkey-bin | < 1.9.0.19-14 | spidermonkey-bin_1.9.0.19-14_powerpc.deb |
Debian | 6 | mipsel | iceape-browser | < 2.0.11-8 | iceape-browser_2.0.11-8_mipsel.deb |
Debian | 5 | amd64 | python-xpcom | < 1.9.0.19-14 | python-xpcom_1.9.0.19-14_amd64.deb |
Debian | 6 | amd64 | libmozjs2d | < 1.9.1.16-10 | libmozjs2d_1.9.1.16-10_amd64.deb |
Debian | 6 | s390 | spidermonkey-bin | < 1.9.1.16-10 | spidermonkey-bin_1.9.1.16-10_s390.deb |
Debian | 6 | i386 | libmozjs2d | < 1.9.1.16-10 | libmozjs2d_1.9.1.16-10_i386.deb |
Debian | 6 | mipsel | iceape-dbg | < 2.0.11-8 | iceape-dbg_2.0.11-8_mipsel.deb |