Showing all newswire headlines

View by date, instead?

« Previous ( 1 ... 5711 5712 5713 5714 5715 5716 5717 5718 5719 5720 5721 ... 5740 ) Next »

Mandrake alert: bind update

There are some insecure permissions on configuration files and executables with the bind 9.x packages shipped with Mandrake Linux 8.0 and 8.1. This update provides stricter permissions by making the /etc/rndc.conf and /etc/rndc.key files read/write by the named user and by making /sbin/rndc-confgen and /sbin/rndc read/write/executable only by root.

Mandrake alert: mutt update

Joost Pol reported a remotely exploitable buffer overflow in the mutt email client. It is recommended that all mutt users upgrade their packages immediately.

Mandrake alert: glibc update

Flavio Veloso found an overflowable buffer problem in earlier versions of the glibc glob(3) implementation. It may be possible to exploit some programs that pass input to the glibc glob() function in a manner that can be modified by the user. Update: The glibc update for 8.0/PPC resulted in ldconfig segfaulting consistently. This update fixes the problems with ldconfig on PPC.

Debian alert: two libgtop security problems

  • Mailing list (Posted by dave on Jan 8, 2002 2:53 PM EDT)
  • Story Type: Security; Groups: Debian
Two different problems where found in libgtop-daemon:

Slackware alert: mutt remote exploit patched

An exploitable overflow has been found in the address handling code of the mutt mail client version 1.2.5i supplied with Slackware 8.0. A new mutt-1.2.5.1 has been released which addresses this problem, and packages are now available for Slackware 8.0 and -current.

SuSE alert: mutt

  • Mailing list (Posted by dave on Jan 7, 2002 10:28 AM EDT)
  • Story Type: Security; Groups: SUSE
mutt, a popular mail client for Linux-like systems, is vulnerable to a buffer overflow that is remotely exploitable. We have added patches to the versions of mutt as shipped with the affected distributions to fix the problem. We recommend to install the update package for your product and to restart all running instances of mutt. We thank Joost Pol for reporting the problem to the makers of mutt.

Debian alert: New versions of Exim fix uncontrolled program execution

  • Mailing list (Posted by dave on Jan 3, 2002 11:33 PM EDT)
  • Story Type: Security; Groups: Debian
Patrice Fournier discovered a bug in all versions of Exim older than Exim 3.34 and Exim 3.952.

Debian alert: mutt buffer overflow, sparc update

  • Mailing list (Posted by dave on Jan 2, 2002 3:29 PM EDT)
  • Story Type: Security; Groups: Debian
The sparc binary for the mutt security fix described in DSA-096-1 is now available.

Debian alert: mutt buffer overflow

  • Mailing list (Posted by dave on Jan 2, 2002 8:38 AM EDT)
  • Story Type: Security; Groups: Debian
Joost Pol found a buffer overflow in the address handling code of mutt (a popular mail user agent). Even though this is a one byte overflow this is exploitable.

Red Hat alert: Updated Mailman packages available

  • Mailing list (Posted by dave on Jan 2, 2002 6:24 AM EDT)
  • Story Type: Security; Groups: Red Hat
Updated Mailman packages are now available for Red Hat Secure Web Server 3.2 (U.S.). These updates fix cross-site scripting bugs which might allow another server to be used to gain a user's private information from a server running Mailman.

Debian alert: gpm (gpm-root) format string vulnerabilities

  • Mailing list (Posted by dave on Dec 27, 2001 11:22 AM EDT)
  • Story Type: Security; Groups: Debian
The package 'gpm' contains the 'gpm-root' program, which can be used to create mouse-activated menus on the console. Among other problems, the gpm-root program contains a format string vulnerability, which allows an attacker to gain root privileges.

Red Hat alert: Updated namazu packages are available

  • Mailing list (Posted by dave on Dec 24, 2001 6:05 PM EDT)
  • Story Type: Security; Groups: Red Hat
Updated namazu packages are available for Red Hat Linux 7.0J. These packages fix cross-site scripting vulnerability.

SuSE alert: glibc/shlibs, in.ftpd

  • Mailing list (Posted by dave on Dec 24, 2001 9:11 AM EDT)
  • Story Type: Security; Groups: SUSE
This security announcement obsoletes SuSE-SA:2001:001 about glibc (shlibs).

Red Hat alert: Updated Mailman packages available

  • Mailing list (Posted by dave on Dec 21, 2001 5:12 AM EDT)
  • Story Type: Security; Groups: Red Hat
Updated Mailman packages are now available for Red Hat PowerTools 7 and 7.1. These updates fix cross-site scripting bugs which might allow another server to be used to gain a user's private information from a server running Mailman.

Red Hat alert: Updated Mailman packages available

  • Mailing list (Posted by dave on Dec 21, 2001 5:09 AM EDT)
  • Story Type: Security; Groups: Red Hat
Updated Mailman packages are now available for Red Hat Linux 7.

Mandrake alert: glibc update

Flavio Veloso found an overflowable buffer problem in earlier versions of the glibc glob(3) implementation. It may be possible to exploit some programs that pass input to the glibc glob() function in a manner that can be modified by the user.

Mandrake alert: libgtop update

A remote format string vulnerability was found in the libgtop daemon by Laboratory intexxia. By sending a specially crafted format string to the server, a remote attacker could potentially execute arbitrary code on the remote system with the daemon's permissions. By default libgtop runs as the user nobody, but the flaw could be used to compromise local system security by allowing the attacker to exploit other local vulnerabilities. A buffer overflow was also found by Flavio Veloso which could allow the client to execute code on the server. Both vulnerabilities are patched in this update and will be fixed upstream in version 1.0.14. libgtop_daemon is not invoked by default anywhere in Mandrake Linux.

Mandrake alert: kerberos update

A buffer overflow exists in the telnet portion of Kerberos that could provide root access to local users. MDKSA-2001:068 provided a similar fix to the normal telnet packages, but the Kerberized equivalent was not updated previously.

Debian alert: mailman cross-site scripting problem

  • Mailing list (Posted by dave on Dec 15, 2001 4:42 PM EDT)
  • Story Type: Security; Groups: Debian
Barry A. Warsaw reported several cross-site scripting security holes in Mailman, due to non-existent escaping of CGI variables.

Red Hat alert: Updated glibc packages are available

  • Mailing list (Posted by dave on Dec 14, 2001 1:05 PM EDT)
  • Story Type: Security; Groups: Red Hat
Updated glibc packages are available to fix an overflowable buffer and for 7.x to fix a couple of non-security related bugs.

« Previous ( 1 ... 5711 5712 5713 5714 5715 5716 5717 5718 5719 5720 5721 ... 5740 ) Next »