Summary
The remote host is missing an update to iceape
announced via advisory DSA 2180-1.
Solution
The oldstable distribution (lenny) is not affected. The iceape package only provides the XPCOM code.
For the stable distribution (squeeze), this problem has been fixed in version 2.0.11-3.
For the unstable distribution (sid), this problem has been fixed in version 2.0.12-1.
We recommend that you upgrade your iceape packages.
https://secure1.securityspace.com/smysecure/catid.html?in=DSA%202180-1
Insight
Several vulnerabilities have been found in the Iceape internet suite, an unbranded version of Seamonkey:
CVE-2010-1585
Roberto Suggi Liverani discovered that the sanitising performed by ParanoidFragmentSink was incomplete.
CVE-2011-0051
Zach Hoffmann discovered that incorrect parsing of recursive eval() calls could lead to attackers forcing acceptance of a confirmation dialogue.
CVE-2011-0053
Crashes in the layout engine may lead to the execution of arbitrary code.
CVE-2011-0054
Christian Holler discovered buffer overflows in the Javascript engine, which could allow the execution of arbitrary code.
CVE-2010-0056
Christian Holler discovered buffer overflows in the Javascript engine, which could allow the execution of arbitrary code.
CVE-2011-0055
regenrecht and Igor Bukanov discovered a use-after-free error in the JSON-Implementation, which could lead to the execution of arbitrary code.
CVE-2011-0057
Daniel Kozlowski discovered that incorrect memory handling the web workers implementation could lead to the execution of arbitrary code.
CVE-2011-0059
Peleus Uhley discovered a cross-site request forgery risk in the plugin code.
Severity
Classification
-
CVE CVE-2010-0056, CVE-2010-1585, CVE-2011-0051, CVE-2011-0053, CVE-2011-0054, CVE-2011-0055, CVE-2011-0056, CVE-2011-0057, CVE-2011-0059 -
CVSS Base Score: 10.0
AV:N/AC:L/Au:N/C:C/I:C/A:C
Related Vulnerabilities