exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Debian Linux Security Advisory 2025-1

Debian Linux Security Advisory 2025-1
Posted Apr 1, 2010
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2025-1 - Several remote vulnerabilities have been discovered in the Icedove mail client, an unbranded version of the Thunderbird mail client.

tags | advisory, remote, vulnerability
systems | linux, debian
advisories | CVE-2009-2408, CVE-2009-2404, CVE-2009-2463, CVE-2009-3072, CVE-2009-3075, CVE-2010-0163
SHA-256 | 5ccd1a2ad93d249d46e731464cdcc802a972eeda3800afed3825af7057dffa07

Debian Linux Security Advisory 2025-1

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ------------------------------------------------------------------------
Debian Security Advisory DSA-2025-1 security@debian.org
https://www.debian.org/security/ Steffen Joeris
March 31, 2010 https://www.debian.org/security/faq
- ------------------------------------------------------------------------

Package : icedove
Vulnerability : several vulnerabilities
Problem type : remote
Debian-specific: no
CVE IDs : CVE-2009-2408 CVE-2009-2404 CVE-2009-2463
CVE-2009-3072 CVE-2009-3075 CVE-2010-0163

Several remote vulnerabilities have been discovered in the Icedove
mail client, an unbranded version of the Thunderbird mail client. The
Common Vulnerabilities and Exposures project identifies the following
problems:

CVE-2009-2408

Dan Kaminsky and Moxie Marlinspike discovered that icedove does not
properly handle a '\0' character in a domain name in the subject's
Common Name (CN) field of an X.509 certificate (MFSA 2009-42).

CVE-2009-2404

Moxie Marlinspike reported a heap overflow vulnerability in the code
that handles regular expressions in certificate names (MFSA 2009-43).

CVE-2009-2463

monarch2020 discovered an integer overflow n a base64 decoding function
(MFSA 2010-07).

CVE-2009-3072

Josh Soref discovered a crash in the BinHex decoder (MFSA 2010-07).

CVE-2009-3075

Carsten Book reported a crash in the JavaScript engine (MFSA 2010-07).

CVE-2010-0163

Ludovic Hirlimann reported a crash indexing some messages with
attachments, which could lead to the execution of arbitrary code
(MFSA 2010-07).


For the stable distribution (lenny), these problems have been fixed in
version 2.0.0.24-0lenny1.

Due to a problem with the archive system it is not possible to release
all architectures. The missing architectures will be installed into the
archive once they become available.

For the testing distribution squeeze and the unstable distribution (sid),
these problems will be fixed soon.


We recommend that you upgrade your icedove packages.


Upgrade instructions
- --------------------

wget url
will fetch the file for you
dpkg -i file.deb
will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
will update the internal database
apt-get upgrade
will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.


Debian GNU/Linux 4.0 alias etch
- -------------------------------

Debian GNU/Linux 5.0 alias lenny
- --------------------------------

Debian (stable)
- ---------------

Stable updates are available for alpha, amd64, arm, armel, hppa, i386, ia64, mips, mipsel, powerpc, s390 and sparc.

Source archives:

https://security.debian.org/pool/updates/main/i/icedove/icedove_2.0.0.24.orig.tar.gz
Size/MD5 checksum: 35856543 3bf6e40cddf593ddc1a66b9e721f12b9
https://security.debian.org/pool/updates/main/i/icedove/icedove_2.0.0.24-0lenny1.dsc
Size/MD5 checksum: 1668 111c1a93c1ce498715e231272123f841
https://security.debian.org/pool/updates/main/i/icedove/icedove_2.0.0.24-0lenny1.diff.gz
Size/MD5 checksum: 103260 4661b0c8c170d58f844337699cb8ca1a

alpha architecture (DEC Alpha)

https://security.debian.org/pool/updates/main/i/icedove/icedove-dev_2.0.0.24-0lenny1_alpha.deb
Size/MD5 checksum: 3723382 12c7fe63b0a5c59680ca36200a6f7d20
https://security.debian.org/pool/updates/main/i/icedove/icedove-gnome-support_2.0.0.24-0lenny1_alpha.deb
Size/MD5 checksum: 61132 c0f96569d4ea0f01cff3950572b3dda9
https://security.debian.org/pool/updates/main/i/icedove/icedove-dbg_2.0.0.24-0lenny1_alpha.deb
Size/MD5 checksum: 57375560 95a614e1cb620fad510eb51ae5cb37c5
https://security.debian.org/pool/updates/main/i/icedove/icedove_2.0.0.24-0lenny1_alpha.deb
Size/MD5 checksum: 13468190 03a629abf18130605927f5817b097bac

amd64 architecture (AMD x86_64 (AMD64))

https://security.debian.org/pool/updates/main/i/icedove/icedove-dbg_2.0.0.24-0lenny1_amd64.deb
Size/MD5 checksum: 57584134 7d909c9f1b67d4758e290dc2c1dc01f2
https://security.debian.org/pool/updates/main/i/icedove/icedove-dev_2.0.0.24-0lenny1_amd64.deb
Size/MD5 checksum: 3937168 de9dda16f94e696de897bec6c8d45f90
https://security.debian.org/pool/updates/main/i/icedove/icedove_2.0.0.24-0lenny1_amd64.deb
Size/MD5 checksum: 12384488 8d1632f7511c711a1d2ea940f7e451a2
https://security.debian.org/pool/updates/main/i/icedove/icedove-gnome-support_2.0.0.24-0lenny1_amd64.deb
Size/MD5 checksum: 59114 fae947071c0de6ebce316decbce61f9a

arm architecture (ARM)

https://security.debian.org/pool/updates/main/i/icedove/icedove-dev_2.0.0.24-0lenny1_arm.deb
Size/MD5 checksum: 3929902 5ab6f673b34770278270fb7862986b0b
https://security.debian.org/pool/updates/main/i/icedove/icedove-gnome-support_2.0.0.24-0lenny1_arm.deb
Size/MD5 checksum: 53746 c9c53e8a42d85fe5f4fa8e2a85e55629
https://security.debian.org/pool/updates/main/i/icedove/icedove-dbg_2.0.0.24-0lenny1_arm.deb
Size/MD5 checksum: 56491578 8eb38c6f99c501556506ac6790833941
https://security.debian.org/pool/updates/main/i/icedove/icedove_2.0.0.24-0lenny1_arm.deb
Size/MD5 checksum: 10943350 d7c0badfe9210ce5341eb17ab7e71ca2

hppa architecture (HP PA RISC)

https://security.debian.org/pool/updates/main/i/icedove/icedove-dev_2.0.0.24-0lenny1_hppa.deb
Size/MD5 checksum: 3944678 2a9dc50b61420b4fdf8f3a4d378bb484
https://security.debian.org/pool/updates/main/i/icedove/icedove-gnome-support_2.0.0.24-0lenny1_hppa.deb
Size/MD5 checksum: 60554 7dcd739363cff3cc4bda659b82856536
https://security.debian.org/pool/updates/main/i/icedove/icedove-dbg_2.0.0.24-0lenny1_hppa.deb
Size/MD5 checksum: 58523174 6780e8f9de0f2ed0c3bd533d03853d85
https://security.debian.org/pool/updates/main/i/icedove/icedove_2.0.0.24-0lenny1_hppa.deb
Size/MD5 checksum: 13952170 88674f31191b07cd76ea5d366c545f1d

i386 architecture (Intel ia32)

https://security.debian.org/pool/updates/main/i/icedove/icedove_2.0.0.24-0lenny1_i386.deb
Size/MD5 checksum: 10951904 52ce1587c6eb95b7f8b63ccedf224d88
https://security.debian.org/pool/updates/main/i/icedove/icedove-gnome-support_2.0.0.24-0lenny1_i386.deb
Size/MD5 checksum: 54838 101de9e837bea9391461074481bf770f
https://security.debian.org/pool/updates/main/i/icedove/icedove-dev_2.0.0.24-0lenny1_i386.deb
Size/MD5 checksum: 3924810 6ecf3693cce2ae97fd0bbdafc1ff06f6
https://security.debian.org/pool/updates/main/i/icedove/icedove-dbg_2.0.0.24-0lenny1_i386.deb
Size/MD5 checksum: 56543048 73d1684cf69bed0441393abb46610433

ia64 architecture (Intel ia64)

https://security.debian.org/pool/updates/main/i/icedove/icedove-dev_2.0.0.24-0lenny1_ia64.deb
Size/MD5 checksum: 3756914 615afd30bf893d2d32bbacedf1f7ff8e
https://security.debian.org/pool/updates/main/i/icedove/icedove_2.0.0.24-0lenny1_ia64.deb
Size/MD5 checksum: 16545566 0444c7198e94ab59e103e60bf86a2aa2
https://security.debian.org/pool/updates/main/i/icedove/icedove-gnome-support_2.0.0.24-0lenny1_ia64.deb
Size/MD5 checksum: 66302 f8800140b3797d4a4267a5dac0043995
https://security.debian.org/pool/updates/main/i/icedove/icedove-dbg_2.0.0.24-0lenny1_ia64.deb
Size/MD5 checksum: 57199564 5df5808f91ecdf6ac49f0e922b1a0234

powerpc architecture (PowerPC)

https://security.debian.org/pool/updates/main/i/icedove/icedove_2.0.0.24-0lenny1_powerpc.deb
Size/MD5 checksum: 12112586 4b40106b68670c726624348c0cb8bd1f
https://security.debian.org/pool/updates/main/i/icedove/icedove-dbg_2.0.0.24-0lenny1_powerpc.deb
Size/MD5 checksum: 59511730 226cdd43af9dffb4132002044120769c
https://security.debian.org/pool/updates/main/i/icedove/icedove-gnome-support_2.0.0.24-0lenny1_powerpc.deb
Size/MD5 checksum: 56670 72e58731ac68f2c599704a3e7ca45d4c
https://security.debian.org/pool/updates/main/i/icedove/icedove-dev_2.0.0.24-0lenny1_powerpc.deb
Size/MD5 checksum: 3942470 e8454d41a095226a2d252f10da795d96


These files will probably be moved into the stable distribution on
its next update.

- ---------------------------------------------------------------------------------
For apt-get: deb https://security.debian.org/ stable/updates main
For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
Mailing list: debian-security-announce@lists.debian.org
Package info: `apt-cache show <pkg>' and https://packages.debian.org/<pkg>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.10 (GNU/Linux)

iEYEARECAAYFAkuzCYEACgkQ62zWxYk/rQfEoQCfZP1v8IKG5mZvqvpREtfgpHLH
mSkAn3Irm0DPIBkS/Zqz2dMfEVSq96IU
=gE9m
-----END PGP SIGNATURE-----
Login or Register to add favorites

File Archive:

September 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    261 Files
  • 2
    Sep 2nd
    17 Files
  • 3
    Sep 3rd
    38 Files
  • 4
    Sep 4th
    52 Files
  • 5
    Sep 5th
    23 Files
  • 6
    Sep 6th
    27 Files
  • 7
    Sep 7th
    0 Files
  • 8
    Sep 8th
    1 Files
  • 9
    Sep 9th
    16 Files
  • 10
    Sep 10th
    38 Files
  • 11
    Sep 11th
    21 Files
  • 12
    Sep 12th
    40 Files
  • 13
    Sep 13th
    18 Files
  • 14
    Sep 14th
    0 Files
  • 15
    Sep 15th
    0 Files
  • 16
    Sep 16th
    21 Files
  • 17
    Sep 17th
    51 Files
  • 18
    Sep 18th
    23 Files
  • 19
    Sep 19th
    48 Files
  • 20
    Sep 20th
    36 Files
  • 21
    Sep 21st
    0 Files
  • 22
    Sep 22nd
    0 Files
  • 23
    Sep 23rd
    0 Files
  • 24
    Sep 24th
    0 Files
  • 25
    Sep 25th
    0 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close