icedove -- several vulnerabilities

2012-12-16T00:00:00
ID DSA-2588
Type debian
Reporter Debian
Modified 2012-12-16T00:00:00

Description

Multiple vulnerabilities have been found in Icedove, Debian's version of the Mozilla Thunderbird mail and news client.

The evalInSandbox implementation uses an incorrect context during the handling of JavaScript code that sets the location.href property, which allows remote attackers to conduct cross-site scripting (XSS) attacks or read arbitrary files by leveraging a sandboxed add-on.

The HZ-GB-2312 character-set implementation does not properly handle a ~ (tilde) character in proximity to a chunk delimiter, which allows remote attackers to conduct cross-site scripting (XSS) attacks via a crafted document.

Use-after-free vulnerability in the gfxFont::GetFontEntry function allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.

Heap-based buffer overflow in the nsWindow::OnExposeEvent function could allow remote attackers to execute arbitrary code.

Multiple unspecified vulnerabilities in the browser engine could allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code.

For the stable distribution (squeeze), these problems have been fixed in version 3.0.11-1+squeeze15.

For the unstable distribution (sid), these problems have been fixed in version 10.0.11-1.

We recommend that you upgrade your icedove packages.