Showing all newswire headlines

View by date, instead?

« Previous ( 1 ... 7216 7217 7218 7219 7220 7221 7222 7223 7224 7225 7226 ... 7264 ) Next »

Mandrake alert: Updated samba packages fix potential root compromise

A vulnerability in samba versions 2.2.2 through 2.2.6 was discovered by the Debian samba maintainers. A bug in the length checking for encrypted password change requests from clients could be exploited using a buffer overrun attack on the smbd stack. This attack would have to crafted in such a way that converting a DOS codepage string to little endian UCS2 unicode would translate into an executable block of code.

Red Hat alert: New kernel 2.2 packages fix local denial of service issue

  • Mailing list (Posted by dave on Nov 25, 2002 8:43 AM EDT)
  • Story Type: Security; Groups: Red Hat
The kernel in Red Hat Linux 6.2 and 7 is vulnerable to a local denial of service attack.

SuSE alert: pine

  • Mailing list (Posted by dave on Nov 25, 2002 1:52 AM EDT)
  • Story Type: Security; Groups: SUSE
Pine, Program for Internet News and Email, is a well known and widely used eMail client. While parsing and escaping characters of eMail addresses pine does not allocate enough memory for storing the escaped mailbox part of an address. This results in a buffer overflow on the heap that will make pine crash. The offending eMail can just be deleted manually or by using another mail user agent.

Debian alert: Samba buffer overflow

  • Mailing list (Posted by dave on Nov 22, 2002 11:21 AM EDT)
  • Story Type: Security; Groups: Debian
Steve Langasek found an exploitable bug in the password handling code in samba: when converting from DOS code-page to little endian UCS2 unicode a buffer length was not checked and a buffer could be overflowed. There is no known exploit for this, but an upgrade is strongly recommended.

Red Hat alert: New samba packages available to fix potential security vulnerability

  • Mailing list (Posted by dave on Nov 22, 2002 8:33 AM EDT)
  • Story Type: Security; Groups: Red Hat
New samba packages are available that fix a security vulnerability present in samba versions

Debian alert: New security.debian.org server after fire in Twente

  • Mailing list (Posted by dave on Nov 21, 2002 11:44 PM EDT)
  • Story Type: Security; Groups: Debian
Around 08:00 CET on November 20th, the University of Twente Network Operations Center (NOC) caught fire. The building has burnt to the ground. The fire department has given up every hope on protecting the server area. Among other things the NOC hosted satie.debian.org which contained the security archive for the Debian distribution.

Mandrake alert: Updated kdenetwork packages fix remote command execution vulnerabilites

The SuSE security team discovered two vulnerabilities in the KDE lanbrowsing service during an audit. The LISa network daemon and "reslisa", a restricted version of LISa are used to identify servers on the local network by using the URL type "lan://" and "rlan://" respectively. A buffer overflow was discovered in the lisa daemon that can be exploited by an attacker on the local network to obtain root privilege on a machine running the lisa daemon. Another buffer overflow was found in the lan:// URL handler, which can be exploited by a remote attacker to gain access to the victim user's account.

Mandrake alert: Updated kdelibs packages fix remote command execution vulnerabilites

Vulnerabilities were discovered in the KIO subsystem support for various network protocols. The implementation of the rlogin protocol affects all KDE versions from 2.1 up to 3.0.4, while the flawed implementation of the telnet protocol only affects KDE 2.x. They allow a carefully crafted URL in an HTML page, HTML email, or other KIO-enabled application to execute arbitrary commands as the victim with their privilege.

SuSE alert: samba

  • Mailing list (Posted by dave on Nov 20, 2002 8:03 AM EDT)
  • Story Type: Security; Groups: SUSE
Samba developer Steve Langasek found a security problem in samba, the widely known free implementation of the SMB protocol.

Debian alert: New mhonarc packages fix cross site scripting

  • Mailing list (Posted by dave on Nov 19, 2002 6:15 AM EDT)
  • Story Type: Security; Groups: Debian
Steven Christey discovered a cross site scripting vulnerability in mhonarc, a mail to HTML converter. Carefully crafted message headers can introduce cross site scripting when mhonarc is configured to display all headers lines on the web. However, it is often useful to restrict the displayed header lines to To, From and Subject, in which case the vulnerability cannot be exploited.

Debian alert: New nullmailer packages fix local denial of service

  • Mailing list (Posted by dave on Nov 18, 2002 6:24 AM EDT)
  • Story Type: Security; Groups: Debian
A problem has been discovered in nullmailer, a simple relay-only mail transport agent for hosts that relay mail to a fixed set of smart relays. When a mail is to be delivered locally to a user that doesn't exist, nullmailer tries to deliver it, discovers a user unknown error and stops delivering. Unfortunately, it stops delivering entirely, not only this mail. Hence, it's very easy to craft a denial of service.

Red Hat alert: New kernel fixes local denial of service issue

  • Mailing list (Posted by dave on Nov 16, 2002 2:07 AM EDT)
  • Story Type: Security; Groups: Red Hat
The kernel in Red Hat Linux 7.1, 7.1K, 7.2, 7.3, and 8.0 are vulnerable to a local denial of service attack. Updated packages are available which address this vulnerability, as well as bugs in several drivers.

Debian alert: New sqwebmail packages fix local information exposure

  • Mailing list (Posted by dave on Nov 15, 2002 6:36 AM EDT)
  • Story Type: Security; Groups: Debian
A problem in the Courier sqwebmail package, a CGI program to grant authenticated access to local mailboxes, has been discovered. The program did not drop permissions fast enough upon startup under certain circumstances so a local shell user can execute the sqwebmail binary and manage to read an arbitrary file on the local filesystem.

Debian alert: New BIND packages fix several vulnerabilities

  • Mailing list (Posted by dave on Nov 14, 2002 8:04 AM EDT)
  • Story Type: Security; Groups: Debian
[Bind version 9, the bind9 package, is not affected by these problems.]

Mandrake alert: bind update

Several vulnerabilities were discovered in the BIND8 DNS server by ISS (Internet Security Services), including a remotely exploitable buffer overflow. The first vulnerability is how named handles SIG records; this buffer overflow can be exploited to obtain access to the victim host with the privilege of the user the named process is running as. By default, Mandrake Linux is configured to run the named process as the named user. To successfully exploit this vulnerability, the attacker must control an existing DNS domain and must be allowed to perform a recursive query.

SuSE alert: Multiple vulnerabilities in BIND8

  • Mailing list (Posted by dave on Nov 14, 2002 1:19 AM EDT)
  • Story Type: Security; Groups: SUSE
The security research company ISS (Internet Security Services) has discovered several vulnerabilities in the BIND8 name server, including a remotely exploitable buffer overflow.

Debian alert: New Apache-Perl packages fix several vulnerabilities

  • Mailing list (Posted by dave on Nov 13, 2002 6:33 AM EDT)
  • Story Type: Security; Groups: Debian
According to David Wagner, iDEFENSE and the Apache HTTP Server Project, several vulnerabilities have been found in the Apache server package, a commonly used webserver. Most of the code is shared between the Apache and Apache-Perl packages, so vulnerabilities are shared as well.

Red Hat alert: Remote vulnerabilities in BIND 4 and 8

  • Mailing list (Posted by dave on Nov 12, 2002 10:56 AM EDT)
  • Story Type: Security; Groups: Red Hat


BIND (Berkeley Internet Name Domain) is an implementation of the DNS (Domain Name System) protocols. Three remotely exploitable vulnerabilities were disclosed by ISC on 12 November 2002 that affect various versions of BIND 4 and 8.

Debian alert: New masqmail packages fix buffer overflows

  • Mailing list (Posted by dave on Nov 12, 2002 7:37 AM EDT)
  • Story Type: Security; Groups: Debian
A set of buffer overflows have been discovered in masqmail, a mail transport agent for hosts without permanent internet connection. In addition to this privileges were dropped only after reading a user supplied configuration file. Together this could be exploited to gain unauthorized root access to the machine on which masqmail is installed.

SuSE alert: (traceroute-nanog/nkitb)

  • Mailing list (Posted by dave on Nov 12, 2002 4:00 AM EDT)
  • Story Type: Security; Groups: SUSE
Traceroute is a tool that can be used to track packets in a TCP/IP network to determine it's route or to find out about not working routers. Traceroute-nanog requires root privilege to open a raw socket. It does not relinquish these privileges after doing so. This allows a malicious user to gain root access by exploiting a buffer overflow at a later point.

« Previous ( 1 ... 7216 7217 7218 7219 7220 7221 7222 7223 7224 7225 7226 ... 7264 ) Next »