Showing all newswire headlines

View by date, instead?

« Previous ( 1 ... 7264 7265 7266 7267 7268 7269 7270 7271 7272 7273 7274 ... 7297 ) Next »

Mandrake alert: cyrus-sasl update

Kari Hurtta discovered that a format bug exists in the Cyrus SASL library, which is used to provide an authentication API for mail clients and servers, as well as other services such as LDAP. The format bug was found in one of the logging functions which could be used by an attacker to obtain acces to a machine or to possibly acquire elevated privileges. Thanks to the SuSE security team for providing the fix.

Mandrake alert: php update

Several flaws exist in various versions of PHP in the way it handles multipart/form-data POST requests, which are used for file uploads. The php_mime_split() function could be used by an attacker to execute arbitrary code on the server. This affects both PHP4 and PHP3. The authors have fixed this in PHP 4.1.2 and provided patches for older versions of PHP.

SuSE alert: mod_php/mod_php4

  • Mailing list (Posted by dave on Feb 28, 2002 11:58 AM EDT)
  • Story Type: Security; Groups: SUSE
The e-matters team have found multiple remotely exploitable vulnerabilites in the source code responsible for file upload in the apache modules mod_php and mod_php4 (versions 3 and 4). The weakness can be used to have the webserver execute arbitrary code as supplied by the attacker.

Red Hat alert: Updated PHP packages are available

  • Mailing list (Posted by dave on Feb 28, 2002 8:59 AM EDT)
  • Story Type: Security; Groups: Red Hat
Updated PHP packages are available to fix vulnerabilities in the functions that parse multipart MIME data, which are used when uploading files through forms.

Debian alert: Update for SNMP security fix

  • Mailing list (Posted by dave on Feb 28, 2002 5:07 AM EDT)
  • Story Type: Security; Groups: Debian
Some of the changes made in the DSA-111-1 security fix for SNMP changed the API and ABI for the SNMP library which broke some other applications.

SuSE alert: Resend: cups

  • Mailing list (Posted by dave on Feb 27, 2002 5:06 PM EDT)
  • Story Type: Security; Groups: SUSE
We re-release SuSE Security Announcement SuSE-SA:2002:005 with the new announcement ID SuSE-SA:2002:006 due to minor packaging errors that can result in a malfunction of the printing subsystem. The erroneous packages have been removed from the ftp server. The new packages are in place as announced in the URL list below.

Red Hat alert: Updated 2.4 kernel available

  • Mailing list (Posted by dave on Feb 27, 2002 10:59 AM EDT)
  • Story Type: Security; Groups: Red Hat
The Linux Netfilter team has found a problem in the "IRC connection tracking" component of the firewall within the linux kernel. This problem affects Red Hat Linux versions 7.1 and 7.

Mandrake alert: squid update

Three security issues were found in the 2.x versions of the Squid proxy server up to and including 2.4.STABLE3.

Red Hat alert: New squid packages available

  • Mailing list (Posted by dave on Feb 26, 2002 1:22 PM EDT)
  • Story Type: Security; Groups: Red Hat
New squid packages are available that fix various vulnerabilities. Some of these vulnerabilities could be used to perform a denial of service (DoS) attack or allow remote users to execute code as the user squid.

SuSE alert: Re: cups

  • Mailing list (Posted by dave on Feb 26, 2002 4:52 AM EDT)
  • Story Type: Security; Groups: SUSE
We have retracted the security update packages for cups as announced by SuSE Security announcement SuSE-SA:2002:005 due to errors in the binary packages.

SuSE alert: cups

  • Mailing list (Posted by dave on Feb 25, 2002 3:42 AM EDT)
  • Story Type: Security; Groups: SUSE
The well known Common Unix Printing System (CUPS) was found vulnerable to a buffer overflow in the Internet Printing Protocol (IPP) handling code. The buffer overflow could be exploited by a remote attacker as long as their IP address is allowed to connect to the CUPS server.

Mandrake alert: squid update

Three security issues were found in the 2.x versions of the Squid proxy server up to and including 2.4.STABLE3. The first is a memory leak in the optional SNMP interface to Squid which could allow a malicious user who can send packets to the Squid SNMP port to possibly perform a Denial of Service attack on ther server if the SNMP interface is enabled. The next is a buffer overflow in the implementation of ftp:// URLs where allowed users could possibly perform a DoS on the server, and may be able to trigger remote execution of code (which the authors have not yet confirmed). The final issue is with the HTCP interface which cannot be properly disabled from squid.conf; HTCP is enabled by default on Mandrake Linux systems.

Red Hat alert: Updated ncurses4 compat packages are available

  • Mailing list (Posted by dave on Feb 21, 2002 1:08 PM EDT)
  • Story Type: Security; Groups: Red Hat
Updated ncurses4 compatability packages which fix a potential security problem are available.

Debian alert: New GNUJSP packages fix directory and script source disclosure

  • Mailing list (Posted by dave on Feb 21, 2002 3:22 AM EDT)
  • Story Type: Security; Groups: Debian
Thomas Springer found a vulnerability in GNUJSP, a Java servlet that allows you to insert Java source code into HTML files. The problem can be used to bypass access restrictions in the web server. An attacker can view the contents of directories and download files directly rather then receiving their HTML output. This means that the source code of scripts could also be revealed.

Debian alert: New ncurses packages available

  • Mailing list (Posted by dave on Feb 18, 2002 3:36 PM EDT)
  • Story Type: Security; Groups: Debian
Several buffer overflows were fixed in the "ncurses" library in November 2000. Unfortunately, one was missed. This can lead to crashes when using ncurses applications in large windows.

Debian alert: New hanterm packages fix buffer overflow

  • Mailing list (Posted by dave on Feb 16, 2002 10:22 AM EDT)
  • Story Type: Security; Groups: Debian
A set of buffer overflow problems have been found in hanterm, a Hangul terminal for X11 derived from xterm, that will read and display Korean characters in its terminal window. The font handling code in hanterm uses hard limited string variables but didn't check for boundaries.

Mandrake alert: cups update

There is a potential buffer overflow vulnerability in CUPS when reading the names of attributes. This bug affects all versions of CUPS and is fixed upstream in version 1.1.14.

Mandrake alert: ucd-snmp update

The Oulu University Secure Programming Group (OUSPG) has identified numerous vulnerabilities in multiple vendor SNMPv1 implementations. These vulnerabilities may allow unauthorized privileged access, denial of service attacks, or unstable behaviour.

Debian alert: Multiple SNMP vulnerabilities

  • Mailing list (Posted by dave on Feb 14, 2002 9:15 AM EDT)
  • Story Type: Security; Groups: Debian
The Secure Programming Group of the Oulu University did a study on SNMP implementations and uncovered multiple problems which can cause problems ranging from Denial of Service attacks to remote exploits.

Debian alert: New CUPS packages fix buffer overflow

  • Mailing list (Posted by dave on Feb 13, 2002 9:59 AM EDT)
  • Story Type: Security; Groups: Debian
The authors of CUPS, the Common UNIX Printing System, have found a potential buffer overflow bug in the code of the CUPS daemon where it reads the names of attributes. This affects all versions of CUPS.

« Previous ( 1 ... 7264 7265 7266 7267 7268 7269 7270 7271 7272 7273 7274 ... 7297 ) Next »