English | Deutsch | Español | Português
 UserID:
 Passwd:
new user
 About:   Dedicated  | Advanced  | Standard  | Recurring  | No Risk  | Desktop  | Basic  | Single  | Security Seal  | FAQ
  Price/Feature Summary  | Order  | New Vulnerabilities  | Confidentiality  | Vulnerability Search
 Vulnerability   
Search   
    Search 61204 CVE descriptions
and 32582 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.69975
Category:Debian Local Security Checks
Title:Debian Security Advisory DSA 2268-1 (iceweasel)
Summary:Debian Security Advisory DSA 2268-1 (iceweasel)
Description:The remote host is missing an update to iceweasel
announced via advisory DSA 2268-1.

Several vulnerabilities have been found in Iceweasel, a web browser
based on Firefox:

CVE-2011-0083 / CVE-2011-2363

regenrecht discovered two use-after-frees in SVG processing, which
could lead to the execution of arbitrary code.

CVE-2011-0085

regenrecht discovered a use-after-free in XUL processing, which
could lead to the execution of arbitrary code.

CVE-2011-2362

David Chan discovered that cookies were insufficiently isolated.

CVE-2011-2371

Chris Rohlf and Yan Ivnitskiy discovered an integer overflow in the
Javascript engine, which could lead to the execution of arbitrary
code.

CVE-2011-2373

Martin Barbella discovered a use-after-free in XUL processing,
which could lead to the execution of arbitrary code.

CVE-2011-2374

Bob Clary, Kevin Brosnan, Nils, Gary Kwong, Jesse Ruderman and
Christian Biesinger discovered memory corruption bugs, which may
lead to the execution of arbitrary code.

CVE-2011-2376

Luke Wagner and Gary Kwong discovered memory corruption bugs, which
may lead to the execution of arbitrary code.

For the oldstable distribution (lenny), this problem has been fixed in
version 1.9.0.19-12 of the xulrunner source package.

For the stable distribution (squeeze), this problem has been fixed in
version 3.5.16-9.

For the unstable distribution (sid), this problem has been fixed in
version 3.5.19-3

For the experimental distribution, this problem has been fixed in
version 5.0-1.

We recommend that you upgrade your iceweasel packages.

Solution:
http://www.securityspace.com/smysecure/catid.html?in=DSA%202268-1
Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2011-0083
Debian Security Information: DSA-2268 (Google Search)
http://www.debian.org/security/2011/dsa-2268
Debian Security Information: DSA-2269 (Google Search)
http://www.debian.org/security/2011/dsa-2269
Debian Security Information: DSA-2273 (Google Search)
http://www.debian.org/security/2011/dsa-2273
http://www.mandriva.com/security/advisories?name=MDVSA-2011:111
http://www.redhat.com/support/errata/RHSA-2011-0885.html
http://www.redhat.com/support/errata/RHSA-2011-0886.html
http://www.redhat.com/support/errata/RHSA-2011-0887.html
http://www.redhat.com/support/errata/RHSA-2011-0888.html
SuSE Security Announcement: SUSE-SA:2011:028 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2011-07/msg00001.html
http://www.ubuntu.com/usn/USN-1149-1
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:13543
http://secunia.com/advisories/45002
Common Vulnerability Exposure (CVE) ID: CVE-2011-0085
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:14432
Common Vulnerability Exposure (CVE) ID: CVE-2011-2362
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:13693
Common Vulnerability Exposure (CVE) ID: CVE-2011-2363
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:14046
Common Vulnerability Exposure (CVE) ID: CVE-2011-2365
BugTraq ID: 48368
http://www.securityfocus.com/bid/48368
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:14184
Common Vulnerability Exposure (CVE) ID: CVE-2011-2371
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:13987
http://securityreason.com/securityalert/8472
Common Vulnerability Exposure (CVE) ID: CVE-2011-2373
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:14178
XForce ISS Database: thunderbird-xul-code-exec(68133)
http://xforce.iss.net/xforce/xfdb/68133
Common Vulnerability Exposure (CVE) ID: CVE-2011-2374
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:14123
XForce ISS Database: thunderbird-memory-ce(68128)
http://xforce.iss.net/xforce/xfdb/68128
Common Vulnerability Exposure (CVE) ID: CVE-2011-2376
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:14396
CopyrightCopyright (c) 2011 E-Soft Inc. http://www.securityspace.com

This is only one of 32582 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.

New User Registration
Email:
UserID:
Passwd:
Please email me your monthly newsletters, informing the latest services, improvements & surveys.
Please email me a vulnerability test announcement whenever a new test is added.
   Privacy
Registered User Login
 
UserID:   
Passwd:  

 Forgot userid or passwd?
Email/Userid:




Home | About Us | Contact Us | Partner Programs | Privacy | Mailing Lists | Abuse
Security Audits | Managed DNS | Network Monitoring | Site Analyzer | Internet Research Reports
Web Probe | Whois

© 1998-2014 E-Soft Inc. All rights reserved.