Patch  oval:org.mitre.oval:def:13245
DSA-1697-1 iceape -- several vulnerabilities  

Several remote vulnerabilities have been discovered in Iceape an unbranded version of the Seamonkey internet suite. The Common Vulnerabilities and Exposures project identifies the following problems: CVE-2008-0016 Justin Schuh, Tom Cross and Peter Williams discovered a buffer overflow in the parser for UTF-8 URLs, which may lead to the execution of arbitrary code. CVE-2008-0304 It was discovered that a buffer overflow in MIME decoding can lead to the execution of arbitrary code. CVE-2008-2785 It was discovered that missing boundary checks on a reference counter for CSS objects can lead to the execution of arbitrary code. CVE-2008-2798 Devon Hubbard, Jesse Ruderman and Martijn Wargers discovered crashes in the layout engine, which might allow the execution of arbitrary code. CVE-2008-2799 Igor Bukanov, Jesse Ruderman and Gary Kwong discovered crashes in the Javascript engine, which might allow the execution of arbitrary code. CVE-2008-2800 "moz_bug_r_a4" discovered several cross-site scripting vulnerabilities. CVE-2008-2801 Collin Jackson and Adam Barth discovered that Javascript code could be executed in the context or signed JAR archives. CVE-2008-2802 "moz_bug_r_a4" discovered that XUL documements can escalate privileges by accessing the pre-compiled "fastload" file. CVE-2008-2803 "moz_bug_r_a4" discovered that missing input sanitising in the mozIJSSubScriptLoader.loadSubScript function could lead to the execution of arbitrary code. Iceape itself is not affected, but some addons are. CVE-2008-2805 Claudio Santambrogio discovered that missing access validation in DOM parsing allows malicious web sites to force the browser to upload local files to the server, which could lead to information disclosure. CVE-2008-2807 Daniel Glazman discovered that a programming error in the code for parsing .properties files could lead to memory content being exposed to addons, which could lead to information disclosure. CVE-2008-2808 Masahiro Yamada discovered that file URLS in directory listings were insufficiently escaped. CVE-2008-2809 John G. Myers, Frank Benkstein and Nils Toedtmann discovered that alternate names on self-signed certificates were handled insufficiently, which could lead to spoofings of secure connections. CVE-2008-2810 It was discovered that URL shortcut files could be used to bypass the same-origin restrictions. This issue does not affect current Iceape, but might occur with additional extensions installed. CVE-2008-2811 Greg McManus discovered a crash in the block reflow code, which might allow the execution of arbitrary code. CVE-2008-2933 Billy Rios discovered that passing an URL containing a pipe symbol to Iceape can lead to Chrome privilege escalation. CVE-2008-3835 "moz_bug_r_a4" discovered that the same-origin check in nsXMLDocument::OnChannelRedirect could be bypassed. CVE-2008-3836 "moz_bug_r_a4" discovered that several vulnerabilities in feedWriter could lead to Chrome privilege escalation. CVE-2008-3837 Paul Nickerson discovered that an attacker could move windows during a mouse click, resulting in unwanted action triggered by drag-and-drop. CVE-2008-4058 "moz_bug_r_a4" discovered a vulnerability which can result in Chrome privilege escalation through XPCNativeWrappers. CVE-2008-4059 "moz_bug_r_a4" discovered a vulnerability which can result in Chrome privilege escalation through XPCNativeWrappers. CVE-2008-4060 Olli Pettay and "moz_bug_r_a4" discovered a Chrome privilege escalation vulnerability in XSLT handling. CVE-2008-4061 Jesse Ruderman discovered a crash in the layout engine, which might allow the execution of arbitrary code. CVE-2008-4062 Igor Bukanov, Philip Taylor, Georgi Guninski and Antoine Labour discovered crashes in the Javascript engine, which might allow the execution of arbitrary code. CVE-2008-4065 Dave Reed discovered that some Unicode byte order marks are stripped from Javascript code before execution, which can result in code being executed, which were otherwise part of a quoted string. CVE-2008-4067 Boris Zbarsky discovered that resource: URls allow directory traversal when using URL-encoded slashes. CVE-2008-4068 Georgi Guninski discovered that resource: URLs could bypass local access restrictions. CVE-2008-4069 Billy Hoffman discovered that the XBM decoder could reveal uninitialised memory. CVE-2008-4070 It was discovered that a buffer overflow could be triggered via a long header in a news article, which could lead to arbitrary code execution. CVE-2008-5012 Georgi Guninski, Michal Zalewski and Chris Evan discovered that the canvas element could be used to bypass same-origin restrictions. CVE-2008-5013 It was discovered that insufficient checks in the Flash plugin glue code could lead to arbitrary code execution. CVE-2008-5014 Jesse Ruderman discovered that a programming error in the window.__proto__.__proto__ object could lead to arbitrary code execution. CVE-2008-5017 It was discovered that crashes in the layout engine could lead to arbitrary code execution. CVE-2008-0017 Justin Schuh discovered that a buffer overflow in http-index-format parser could lead to arbitrary code execution. CVE-2008-5021 It was discovered that a crash in the nsFrameManager might lead to the execution of arbitrary code. CVE-2008-5022 "moz_bug_r_a4" discovered that the same-origin check in nsXMLHttpRequest::NotifyEventListeners could be bypassed. CVE-2008-5024 Chris Evans discovered that quote characters were improperly escaped in the default namespace of E4X documents. CVE-2008-4582 Liu Die Yu discovered an information leak through local shortcut files. CVE-2008-5500 Jesse Ruderman discovered that the layout engine is vulnerable to DoS attacks that might trigger memory corruption and an integer overflow. CVE-2008-5503 Boris Zbarsky discovered that an information disclosure attack could be performed via XBL bindings. CVE-2008-5506 Marius Schilder discovered that it is possible to obtain sensible data via a XMLHttpRequest. CVE-2008-5507 Chris Evans discovered that it is possible to obtain sensible data via a JavaScript URL. CVE-2008-5508 Chip Salzenberg discovered possible phishing attacks via URLs with leading whitespaces or control characters. CVE-2008-5511 It was discovered that it is possible to perform cross-site scripting attacks via an XBL binding to an "unloaded document." CVE-2008-5512 It was discovered that it is possible to run arbitrary JavaScript with chrome privileges via unknown vectors. For the stable distribution these problems have been fixed in version 1.0.13~pre080614i-0etch1. For the upcoming stable distribution distribution these problems will be fixed soon. For the unstable distribution these problems have been fixed in version 1.1.14-1. We recommend that you upgrade your iceape packages.
Create Date: 2011-10-11 Last Update Date: 2014-06-23

Affected Platforms/Products

Affected Products (CPE + CVE references)
Platforms: unix (from OVAL definitions) Products: unix
  • Debian GNU/Linux 4.0
  • iceape

References

Total : 46 Click here to view references

Criteria

The patch should be installed
IF : All of the following are true
Prerequisites (Extended Definitions)
Debian GNU/Linux 4.0 is installed. oval:org.mitre.oval:def:6461
IF : Any one of the following are true Architecture section
IF : All of the following are true Architecture depended section
IF : Any one of the following are true Packages section
IF : iceape-gnome-support DPKG is earlier than 1.0.13~pre080614i-0etch1
Linux : Debian DPKG Test :  iceape-gnome-support DPKG is earlier than 1.0.13~pre080614i-0etch1 
At least one of the objects listed below must exist on the system (Existence check)
Linux : Debian DPKG Package iceape-gnome-support package information
iceape-gnome-support
RPM Version less than 0:1.0.13~pre080614i-0etch1 (datatype=evr_string)
linux : dpkginfo_state 
IF : iceape-mailnews DPKG is earlier than 1.0.13~pre080614i-0etch1
Linux : Debian DPKG Test :  iceape-mailnews DPKG is earlier than 1.0.13~pre080614i-0etch1 
At least one of the objects listed below must exist on the system (Existence check)
Linux : Debian DPKG Package iceape-mailnews package information
iceape-mailnews
RPM Version less than 0:1.0.13~pre080614i-0etch1 (datatype=evr_string)
linux : dpkginfo_state 
IF : iceape-browser DPKG is earlier than 1.0.13~pre080614i-0etch1
Linux : Debian DPKG Test :  iceape-browser DPKG is earlier than 1.0.13~pre080614i-0etch1 
At least one of the objects listed below must exist on the system (Existence check)
Linux : Debian DPKG Package iceape-browser package information
iceape-browser
RPM Version less than 0:1.0.13~pre080614i-0etch1 (datatype=evr_string)
linux : dpkginfo_state 
IF : iceape-calendar DPKG is earlier than 1.0.13~pre080614i-0etch1
Linux : Debian DPKG Test :  iceape-calendar DPKG is earlier than 1.0.13~pre080614i-0etch1 
At least one of the objects listed below must exist on the system (Existence check)
Linux : Debian DPKG Package iceape-calendar package information
iceape-calendar
RPM Version less than 0:1.0.13~pre080614i-0etch1 (datatype=evr_string)
linux : dpkginfo_state 
IF : iceape-dom-inspector DPKG is earlier than 1.0.13~pre080614i-0etch1
Linux : Debian DPKG Test :  iceape-dom-inspector DPKG is earlier than 1.0.13~pre080614i-0etch1 
At least one of the objects listed below must exist on the system (Existence check)
Linux : Debian DPKG Package iceape-dom-inspector package information
iceape-dom-inspector
RPM Version less than 0:1.0.13~pre080614i-0etch1 (datatype=evr_string)
linux : dpkginfo_state 
IF : iceape-dbg DPKG is earlier than 1.0.13~pre080614i-0etch1
Linux : Debian DPKG Test :  iceape-dbg DPKG is earlier than 1.0.13~pre080614i-0etch1 
At least one of the objects listed below must exist on the system (Existence check)
Linux : Debian DPKG Package iceape-dbg package information
iceape-dbg
RPM Version less than 0:1.0.13~pre080614i-0etch1 (datatype=evr_string)
linux : dpkginfo_state 
IF : Any one of the following are true Supported architectures section
IF : Installed architecture is hppa
Uname Test :  Installed architecture is hppa 
At least one of the objects listed below must exist on the system (Existence check)
Unix : uname Object The single uname object.
Output of "uname -a"
processor_type (equals) hppa
processor_type is hppa unix : uname_state 
IF : Installed architecture is mipsel
Uname Test :  Installed architecture is mipsel 
At least one of the objects listed below must exist on the system (Existence check)
Unix : uname Object The single uname object.
Output of "uname -a"
processor_type (equals) mipsel
processor_type is mipsel unix : uname_state 
IF : Installed architecture is alpha
Uname Test :  Installed architecture is alpha 
At least one of the objects listed below must exist on the system (Existence check)
Unix : uname Object The single uname object.
Output of "uname -a"
processor_type (equals) alpha
processor_type is alpha unix : uname_state 
IF : Installed architecture is ia64
Uname Test :  Installed architecture is ia64 
At least one of the objects listed below must exist on the system (Existence check)
Unix : uname Object The single uname object.
Output of "uname -a"
processor_type (equals) ia64
processor_type is ia64 unix : uname_state 
IF : Installed architecture is mips
Uname Test :  Installed architecture is mips 
At least one of the objects listed below must exist on the system (Existence check)
Unix : uname Object The single uname object.
Output of "uname -a"
processor_type (equals) mips
processor_type is mips unix : uname_state 
IF : Installed architecture is i386
Uname Test :  Installed architecture is i386 
At least one of the objects listed below must exist on the system (Existence check)
Unix : uname Object The single uname object.
Output of "uname -a"
processor_type (equals) i686
processor_type is i686 unix : uname_state 
IF : Installed architecture is amd64
Uname Test :  Installed architecture is amd64 
At least one of the objects listed below must exist on the system (Existence check)
Unix : uname Object The single uname object.
Output of "uname -a"
processor_type (equals) x86-64
processor_type is x86-64 unix : uname_state 
IF : Installed architecture is sparc
Uname Test :  Installed architecture is sparc 
At least one of the objects listed below must exist on the system (Existence check)
Unix : uname Object The single uname object.
Output of "uname -a"
processor_type (equals) sparc
processor_type is sparc unix : uname_state 
IF : Installed architecture is powerpc
Uname Test :  Installed architecture is powerpc 
At least one of the objects listed below must exist on the system (Existence check)
Unix : uname Object The single uname object.
Output of "uname -a"
processor_type (equals) ppc
processor_type is ppc unix : uname_state 
IF : Installed architecture is s390
Uname Test :  Installed architecture is s390 
At least one of the objects listed below must exist on the system (Existence check)
Unix : uname Object The single uname object.
Output of "uname -a"
processor_type (equals) s390x
processor_type is s390x unix : uname_state 
IF : All of the following are true Architecture independent section
IF : Installed architecture is all
Uname Test :  Installed architecture is all 
At least one of the objects listed below must exist on the system (Existence check)
Unix : uname Object The single uname object.
Output of "uname -a"
IF : Any one of the following are true Packages section
IF : mozilla-js-debugger DPKG is earlier than 1.8+1.0.13~pre080614i-0etch1
Linux : Debian DPKG Test :  mozilla-js-debugger DPKG is earlier than 1.8+1.0.13~pre080614i-0etch1 
At least one of the objects listed below must exist on the system (Existence check)
Linux : Debian DPKG Package mozilla-js-debugger package information
mozilla-js-debugger
RPM Version less than 0:1.8+1.0.13~pre080614i-0etch1 (datatype=evr_string)
linux : dpkginfo_state 
IF : mozilla-chatzilla DPKG is earlier than 1.8+1.0.13~pre080614i-0etch1
Linux : Debian DPKG Test :  mozilla-chatzilla DPKG is earlier than 1.8+1.0.13~pre080614i-0etch1 
At least one of the objects listed below must exist on the system (Existence check)
Linux : Debian DPKG Package mozilla-chatzilla package information
mozilla-chatzilla
RPM Version less than 0:1.8+1.0.13~pre080614i-0etch1 (datatype=evr_string)
linux : dpkginfo_state 
IF : iceape-dev DPKG is earlier than 1.0.13~pre080614i-0etch1
Linux : Debian DPKG Test :  iceape-dev DPKG is earlier than 1.0.13~pre080614i-0etch1 
At least one of the objects listed below must exist on the system (Existence check)
Linux : Debian DPKG Package iceape-dev package information
iceape-dev
RPM Version less than 0:1.0.13~pre080614i-0etch1 (datatype=evr_string)
linux : dpkginfo_state 
IF : mozilla-dev DPKG is earlier than 1.8+1.0.13~pre080614i-0etch1
Linux : Debian DPKG Test :  mozilla-dev DPKG is earlier than 1.8+1.0.13~pre080614i-0etch1 
At least one of the objects listed below must exist on the system (Existence check)
Linux : Debian DPKG Package mozilla-dev package information
mozilla-dev
RPM Version less than 0:1.8+1.0.13~pre080614i-0etch1 (datatype=evr_string)
linux : dpkginfo_state 
IF : mozilla-browser DPKG is earlier than 1.8+1.0.13~pre080614i-0etch1
Linux : Debian DPKG Test :  mozilla-browser DPKG is earlier than 1.8+1.0.13~pre080614i-0etch1 
At least one of the objects listed below must exist on the system (Existence check)
Linux : Debian DPKG Package mozilla-browser package information
mozilla-browser
RPM Version less than 0:1.8+1.0.13~pre080614i-0etch1 (datatype=evr_string)
linux : dpkginfo_state 
IF : mozilla-mailnews DPKG is earlier than 1.8+1.0.13~pre080614i-0etch1
Linux : Debian DPKG Test :  mozilla-mailnews DPKG is earlier than 1.8+1.0.13~pre080614i-0etch1 
At least one of the objects listed below must exist on the system (Existence check)
Linux : Debian DPKG Package mozilla-mailnews package information
mozilla-mailnews
RPM Version less than 0:1.8+1.0.13~pre080614i-0etch1 (datatype=evr_string)
linux : dpkginfo_state 
IF : mozilla-dom-inspector DPKG is earlier than 1.8+1.0.13~pre080614i-0etch1
Linux : Debian DPKG Test :  mozilla-dom-inspector DPKG is earlier than 1.8+1.0.13~pre080614i-0etch1 
At least one of the objects listed below must exist on the system (Existence check)
Linux : Debian DPKG Package mozilla-dom-inspector package information
mozilla-dom-inspector
RPM Version less than 0:1.8+1.0.13~pre080614i-0etch1 (datatype=evr_string)
linux : dpkginfo_state 
IF : mozilla-calendar DPKG is earlier than 1.8+1.0.13~pre080614i-0etch1
Linux : Debian DPKG Test :  mozilla-calendar DPKG is earlier than 1.8+1.0.13~pre080614i-0etch1 
At least one of the objects listed below must exist on the system (Existence check)
Linux : Debian DPKG Package mozilla-calendar package information
mozilla-calendar
RPM Version less than 0:1.8+1.0.13~pre080614i-0etch1 (datatype=evr_string)
linux : dpkginfo_state 
IF : mozilla DPKG is earlier than 1.8+1.0.13~pre080614i-0etch1
Linux : Debian DPKG Test :  mozilla DPKG is earlier than 1.8+1.0.13~pre080614i-0etch1 
At least one of the objects listed below must exist on the system (Existence check)
Linux : Debian DPKG Package mozilla package information
mozilla
RPM Version less than 0:1.8+1.0.13~pre080614i-0etch1 (datatype=evr_string)
linux : dpkginfo_state 
IF : mozilla-psm DPKG is earlier than 1.8+1.0.13~pre080614i-0etch1
Linux : Debian DPKG Test :  mozilla-psm DPKG is earlier than 1.8+1.0.13~pre080614i-0etch1 
At least one of the objects listed below must exist on the system (Existence check)
Linux : Debian DPKG Package mozilla-psm package information
mozilla-psm
RPM Version less than 0:1.8+1.0.13~pre080614i-0etch1 (datatype=evr_string)
linux : dpkginfo_state 
IF : iceape-chatzilla DPKG is earlier than 1.0.13~pre080614i-0etch1
Linux : Debian DPKG Test :  iceape-chatzilla DPKG is earlier than 1.0.13~pre080614i-0etch1 
At least one of the objects listed below must exist on the system (Existence check)
Linux : Debian DPKG Package iceape-chatzilla package information
iceape-chatzilla
RPM Version less than 0:1.0.13~pre080614i-0etch1 (datatype=evr_string)
linux : dpkginfo_state 
IF : iceape DPKG is earlier than 1.0.13~pre080614i-0etch1
Linux : Debian DPKG Test :  iceape DPKG is earlier than 1.0.13~pre080614i-0etch1 
At least one of the objects listed below must exist on the system (Existence check)
Linux : Debian DPKG Package iceape package information
iceape
RPM Version less than 0:1.0.13~pre080614i-0etch1 (datatype=evr_string)
linux : dpkginfo_state 

Quick Help

evr_string datatype
Represents epoch, version, and release number as a single version string
Other Help Topics
Data Types
What is an Object?
What is a State?
What is a Test?
Other Help Topics
Regular Expression Patterns
Some object or state definitions are defined as regular expression patterns, you should interpret the regexp pattern while evaluating them.

OVAL Definitions By Referenced Objects

How does it work?   User agreement and privacy statement   About & Contact
CVE is a registred trademark of the MITRE Corporation and the authoritive source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritive source of CWE content is MITRE's CWE web site. OVAL is a registered trademark of The MITRE Corporation and the authoritive source of OVAL content is MITRE's OVAL web site.
Warning: This site and all data are provided as is. It is not guaranteed that all information is accurate and complete. Use any information provided on this site at your own risk. By using this site you accept that you know that these data are provided as is and not guaranteed to be accurate, correct or complete. All trademarks appearing on this site are the property of their respective owners in the US or other countries. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss. PLEASE SEE nvd.nist.gov and oval.mitre.org for more details about OVAL language and definitions.
The information within this database may change without notice. Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. In no event shall the author/distributor/web site owner/maintainer be held liable for any damages whatsoever arising out of or in connection with the use or spread of this information.
Use of OVAL and all related data is subject to terms of use defined by Mitre at http://oval.mitre.org/oval/about/termsofuse.html