Debian DSA-2235-1 : icedove - several vulnerabilities

Critical Nessus Plugin ID 53862

New! Vulnerability Priority Rating (VPR)

Tenable calculates a dynamic VPR for every vulnerability. VPR combines vulnerability information with threat intelligence and machine learning algorithms to predict which vulnerabilities are most likely to be exploited in attacks. Read more about what VPR is and how it's different from CVSS.

VPR Score: 8.9

Synopsis

The remote Debian host is missing a security-related update.

Description

Several vulnerabilities have been discovered in Icedove, an unbranded version of the Thunderbird mail/news client.

- CVE-2011-0069 CVE-2011-0070 CVE-2011-0072 CVE-2011-0074 CVE-2011-0075 CVE-2011-0077 CVE-2011-0078 CVE-2011-0080 CVE-2011-0081 'Scoobidiver', Ian Beer Bob Clary, Henri Sivonen, Marco Bonardo, Mats Palmgren, Jesse Ruderman, Aki Kelin and Martin Barbella discovered memory corruption bugs, which may lead to the execution of arbitrary code.

- CVE-2011-0065 CVE-2011-0066 CVE-2011-0073 'regenrecht' discovered several dangling pointer vulnerabilities, which may lead to the execution of arbitrary code.

- CVE-2011-0067 Paul Stone discovered that Java applets could steal information from the autocompletion history.

- CVE-2011-0071 Soroush Dalili discovered a directory traversal vulnerability in handling resource URIs.

As indicated in the Lenny (oldstable) release notes, security support for the Icedove packages in the oldstable needed to be stopped before the end of the regular Lenny security maintenance life cycle. You are strongly encouraged to upgrade to stable or switch to a different mail client.

Solution

Upgrade the icedove packages.

For the stable distribution (squeeze), this problem has been fixed in version 3.0.11-1+squeeze2.

See Also

https://security-tracker.debian.org/tracker/CVE-2011-0069

https://security-tracker.debian.org/tracker/CVE-2011-0070

https://security-tracker.debian.org/tracker/CVE-2011-0072

https://security-tracker.debian.org/tracker/CVE-2011-0074

https://security-tracker.debian.org/tracker/CVE-2011-0075

https://security-tracker.debian.org/tracker/CVE-2011-0077

https://security-tracker.debian.org/tracker/CVE-2011-0078

https://security-tracker.debian.org/tracker/CVE-2011-0080

https://security-tracker.debian.org/tracker/CVE-2011-0081

https://security-tracker.debian.org/tracker/CVE-2011-0065

https://security-tracker.debian.org/tracker/CVE-2011-0066

https://security-tracker.debian.org/tracker/CVE-2011-0073

https://security-tracker.debian.org/tracker/CVE-2011-0067

https://security-tracker.debian.org/tracker/CVE-2011-0071

https://packages.debian.org/source/squeeze/icedove

https://www.debian.org/security/2011/dsa-2235

Plugin Details

Severity: Critical

ID: 53862

File Name: debian_DSA-2235.nasl

Version: 1.19

Type: local

Agent: unix

Published: 2011/05/11

Updated: 2020/03/12

Dependencies: 12634

Risk Information

Risk Factor: Critical

VPR Score: 8.9

CVSS v2.0

Base Score: 10

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: p-cpe:/a:debian:debian_linux:icedove, cpe:/o:debian:debian_linux:6.0

Required KB Items: Host/local_checks_enabled, Host/Debian/release, Host/Debian/dpkg-l

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2011/05/10

Vulnerability Publication Date: 2011/05/07

Exploitable With

CANVAS (White_Phosphorus)

Core Impact

Metasploit (Mozilla Firefox "nsTreeRange" Dangling Pointer Vulnerability)

Reference Information

CVE: CVE-2011-0065, CVE-2011-0066, CVE-2011-0067, CVE-2011-0069, CVE-2011-0070, CVE-2011-0071, CVE-2011-0072, CVE-2011-0073, CVE-2011-0074, CVE-2011-0075, CVE-2011-0077, CVE-2011-0078, CVE-2011-0080, CVE-2011-0081

DSA: 2235