Several vulnerabilities have been found in the Iceape internet suite, an unbranded version of Seamonkey.
Mozilla developers discovered several memory corruption bugs, which may lead to the execution of arbitrary code.
Abhishek Arya discovered a use-after-free problem when working with column layout with absolute positioning in a container that changes size, which may lead to the execution of arbitrary code.
Abhishek Arya discovered a heap buffer overflow in utf16 to latin1 character set conversion, allowing to execute arbitrary code.
For the stable distribution (squeeze), this problem has been fixed in version 2.0.11-13.
For the testing distribution (wheezy) and unstable distribution (sid), this problem will be fixed soon.
We recommend that you upgrade your iceape packages.