Debian Security Advisory DSA 2584-1 (iceape - several vulnerabilities)

Summary
Multiple vulnerabilities have been found in Iceape, the Debian Internet suite based on Mozilla Seamonkey: CVE-2012-5829Heap-based buffer overflow in the nsWindow::OnExposeEvent function could allow remote attackers to execute arbitrary code. CVE-2012-5842Multiple unspecified vulnerabilities in the browser engine could allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code. CVE-2012-4207The HZ-GB-2312 character-set implementation does not properly handle a ~ (tilde) character in proximity to a chunk delimiter, which allows remote attackers to conduct cross-site scripting (XSS) attacks via a crafted document. CVE-2012-4201The evalInSandbox implementation uses an incorrect context during the handling of JavaScript code that sets the location.href property, which allows remote attackers to conduct cross-site scripting (XSS) attacks or read arbitrary files by leveraging a sandboxed add-on. CVE-2012-4216Use-after-free vulnerability in the gfxFont::GetFontEntry function allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.
Solution
For the stable distribution (squeeze), these problems have been fixed in version 2.0.11-17. For the testing distribution (wheezy), these problems have been fixed in version 2.7.11-1. For the unstable distribution (sid), these problems have been fixed in version 2.7.11-1. We recommend that you upgrade your iceape packages.
Insight
The Iceape Internet Suite is an unbranded Seamonkey Internet Suite suitable for free distribution. The Seamonkey Internet Suite is a set of Internet oriented applications. It is the continuity of the Mozilla Suite after it has been abandoned in favor of Firefox and Thunderbird.
Affected
iceape on Debian Linux
Detection
This check tests the installed software version using the apt package manager.
References