### Key Information - **Announcement ID**: DSA-1671-1 - **Date**: November 24, 2008 - **Affected Software**: iceweasel - **Vulnerability Type**: Remote #### Vulnerability Details - **CVE IDs**: - CVE-2008-0017 - CVE-2008-4582 - CVE-2008-5012 - CVE-2008-5013 - CVE-2008-5014 - CVE-2008-5017 - CVE-2008-5018 - CVE-2008-5021 - CVE-2008-5022 - CVE-2008-5023 - CVE-2008-5024 - **Vulnerability Descriptions**: - CVE-2008-0017: Buffer overflow in the http-index-format parser may lead to arbitrary code execution. - CVE-2008-4582: Information disclosure via local shortcut files. - CVE-2008-5012: The canvas element can be used to bypass same-origin restrictions. - CVE-2008-5013: Insufficient checks in Flash plugin glue code may lead to arbitrary code execution. - CVE-2008-5014: Programming error in the window.\_\_proto\_\_.__proto\_\_ object may lead to arbitrary code execution. - CVE-2008-5017: Crash in the layout engine may lead to arbitrary code execution. - CVE-2008-5018: Crash in the JavaScript engine may lead to arbitrary code execution. - CVE-2008-5021: Crash in nsFrameManager may lead to arbitrary code execution. - CVE-2008-5022: Same-origin check in nsXMLHttpRequest::NotifyEventListeners() can be bypassed. - CVE-2008-5023: -moz-binding attribute bypasses security checks based on codebase principle. - CVE-2008-5024: Improperly escaped quote characters in default namespace of E4X documents. #### Fixed Versions - **Stable (etch)**: 2.0.0.18-0etch1 - **Upcoming Stable (lenny) and Unstable (sid)**: iceweasel 3.0.4-1 and xulrunner 1.9.0.4-1