Summary
Several vulnerabilities have been found in the Iceape internet suite, an unbranded version of Seamonkey:
CVE-2012-1948Benoit Jacob, Jesse Ruderman, Christian Holler, and Bill McCloskey identified several memory safety problems that may lead to the execution of arbitrary code.
CVE-2012-1954Abhishek Arya discovered a use-after-free problem in nsDocument::AdoptNode that may lead to the execution of arbitrary code.
CVE-2012-1967moz_bug_r_a4 discovered that in certain cases, javascript: URLs can be executed so that scripts can escape the JavaScript sandbox and run with elevated privileges. This can lead to arbitrary code execution.
Solution
For the stable distribution (squeeze), this problem has been fixed in version 2.0.11-14.
For the unstable (sid) and testing (wheezy) distribution, this problem will be fixed soon.
We recommend that you upgrade your iceape packages.
Insight
The Iceape Internet Suite is an unbranded Seamonkey Internet Suite suitable for free distribution. The Seamonkey Internet Suite is a set of Internet oriented applications. It is the continuity of the Mozilla Suite after it has been abandoned in favor of Firefox and Thunderbird.
Affected
iceape on Debian Linux
Detection
This check tests the installed software version using the apt package manager.
References
Updated on 2015-03-25
Severity
Classification
-
CVE CVE-2012-1948, CVE-2012-1954, CVE-2012-1967 -
CVSS Base Score: 10.0
AV:N/AC:L/Au:N/C:C/I:C/A:C
Related Vulnerabilities