Showing headlines posted by dave

« Previous ( 1 ... 518 519 520 521 522 523 524 525 526 527 528 ... 595 ) Next »

Red Hat alert: Updated SANE packages fix remote vulnerabilities

  • Mailing list (Posted by dave on Oct 7, 2003 11:11 AM EDT)
  • Story Type: Security; Groups: Red Hat
Updated SANE packages that resolve a number of vulnerabilities with the saned daemon are now available.

Red Hat alert: Updated Perl packages fix security issues.

  • Mailing list (Posted by dave on Oct 3, 2003 6:33 AM EDT)
  • Story Type: Security; Groups: Red Hat
Updated Perl packages that fix a security issue in Safe.pm and a cross-site scripting (XSS) vulnerability in CGI.pm are now available. [Updated 3 Oct 2003] Added updated mod_perl packages for Red Hat Linux 7.1, which are required due to the move to Perl version 5.6.1 on this platform.

SuSE alert: openssl

  • Mailing list (Posted by dave on Oct 1, 2003 9:15 AM EDT)
  • Story Type: Security; Groups: SUSE
OpenSSL is an implementation of the Secure Socket Layer (SSL v2/3) and Transport Layer Security (TLS v1) protocol. While checking the openssl implementation with a tool-kit from NISCC several errors were revealed most are ASN.1 encoding issues that causes a remote denial-of-service attack on the server side and possibly lead to remote command execution.

SuSE alert: mysql

  • Mailing list (Posted by dave on Oct 1, 2003 3:45 AM EDT)
  • Story Type: Security; Groups: SUSE
A remotely exploitable buffer overflow within the authentication code of MySQL has been reported. This allows remote attackers who have access to the 'User' table to execute arbitrary commands as mysql user. The list of affected packages is as follows: mysql, mysql-client, mysql-shared, mysql-bench, mysql-devel, mysql-Max. In this advisory the MD5 sums for the mysql, mysql-shared and mysql-devel packages are listed.

Debian alert: New OpenSSL packages correct denial of service issues

  • Mailing list (Posted by dave on Oct 1, 2003 2:43 AM EDT)
  • Story Type: Security; Groups: Debian
Dr. Stephen Henson (steve@openssl.org), using a test suite provided by NISCC (www.niscc.gov.uk), discovered a number of errors in the OpenSSL ASN1 code. Combined with an error that causes the OpenSSL code to parse client certificates even when it should not, these errors can cause a denial of service (DoS) condition on a system using the OpenSSL code, depending on how that code is used. For example, even though apache-ssl and ssh link to OpenSSL libraries, they should not be affected by this vulnerability. However, other SSL-enabled applications may be vulnerable and an OpenSSL upgrade is recommended.

SuSE alert: lsh

  • Mailing list (Posted by dave on Oct 1, 2003 1:38 AM EDT)
  • Story Type: Security; Groups: SUSE
LSH is the GNU implementation of SSH and can be seen as an alternative to OpenSSH. Recently various remotely exploitable buffer overflows have been reported in LSH. These allow attackers to execute arbitrary code as root on un-patched systems. LSH is not installed by default on SuSE Linux. An update is therefore only recommended if you run LSH. Maintained SuSE products are not affected by this bug as LSH is not packaged on maintained products such as the Enterprise Server.

Slackware alert: OpenSSL security update (SSA:2003-273-01)



Upgraded OpenSSL packages are available for Slackware 8.1, 9.0, 9.1, and -current. These fix problems with ASN.1 parsing which could lead to a denial of service. It is not known whether the problems could lead to the running of malicious code on the server, but it has not been ruled out.

Mandrake alert: Updated openssl packages fix vulnerabilities

Two bugs were discovered in OpenSSL 0.9.6 and 0.9.7 by NISCC. The parsing of unusual ASN.1 tag values can cause OpenSSL to crash, which could be triggered by a remote attacker by sending a carefully-crafted SSL client certificate to an application. Depending upon the application targetted, the effects seen will vary; in some cases a DoS (Denial of Service) could be performed, in others nothing noticeable or adverse may happen. These two vulnerabilities have been assigned CAN-2003-0543 and CAN-2003-0544.

Mandrake alert: Updated mplayer packages fix buffer overflow vulnerability

A buffer overflow vulnerability was found in MPlayer that is remotely exploitable. A malicious host can craft a harmful ASX header and trick MPlayer into executing arbitrary code when it parses that particular header.

Red Hat alert: Updated OpenSSL packages fix vulnerabilities

  • Mailing list (Posted by dave on Sep 30, 2003 4:17 AM EDT)
  • Story Type: Security; Groups: Red Hat
Updated OpenSSL packages that fix ASN.1 parsing vulnerabilities are now available for Red Hat Linux versions 7.1, 7.2, 7.3, and 8.0.

Red Hat alert: Updated OpenSSL packages fix vulnerabilities

  • Mailing list (Posted by dave on Sep 30, 2003 4:10 AM EDT)
  • Story Type: Security; Groups: Red Hat
Updated OpenSSL packages that fix ASN.1 parsing vulnerabilities are now available for Red Hat Linux 9.

Debian alert: New webfs packages fix buffer overflows, file and directory exposure

  • Mailing list (Posted by dave on Sep 29, 2003 7:55 AM EDT)
  • Story Type: Security; Groups: Debian
Jens Steube reported two vulnerabilities in webfs, a lightweight HTTP server for static content.

Debian alert: New freesweep packages fix buffer overflow

  • Mailing list (Posted by dave on Sep 28, 2003 6:15 AM EDT)
  • Story Type: Security; Groups: Debian
Steve Kemp discovered a buffer overflow in freesweep, when processing several environment variables. This vulnerability could be exploited by a local user to gain gid 'games'.

Mandrake alert: Updated apache2 packages fix CGI scripting deadlock

A problem was discovered in Apache2 where CGI scripts that output more than 4k of output to STDERR will hang the script's execution which can cause a Denial of Service on the httpd process because it is waiting for more input from the CGI that is not forthcoming due to the locked write() call in mod_cgi.

Mandrake alert: Updated proftpd packages fix remote root vulnerability

A vulnerability was discovered by X-Force Research at ISS in ProFTPD's handling of ASCII translation. An attacker, by downloading a carefully crafted file, can remotely exploit this bug to create a root shell.

Debian alert: New marbles packages fix buffer overflow

  • Mailing list (Posted by dave on Sep 25, 2003 9:05 PM EDT)
  • Story Type: Security; Groups: Debian
Steve Kemp discovered a buffer overflow in marbles, when processing the HOME environment variable. This vulnerability could be exploited by a local user to gain gid 'games'.

Slackware alert: WU-FTPD Security Advisory (SSA:2003-259-03)

Upgraded WU-FTPD packages are available for Slackware 9.0 and - -current. These fix a problem where an attacker could use a specially crafted filename in conjunction with WU-FTPD's conversion feature (mostly used to compress files, or produce tar archives) to execute arbitrary commands on the server.

Slackware alert: ProFTPD Security Advisory (SSA:2003-259-02)

Upgraded ProFTPD packages are available for Slackware 8.1, 9.0 and - -current. These fix a security issue where an attacker could gain a root shell by downloading a specially crafted file.

Slackware alert: New OpenSSH packages (SSA:2003-266-01)

Upgraded OpenSSH 3.7.1p2 packages are available for Slackware 8.1, 9.0 and -current. This fixes security problems with PAM authentication. It also includes several code cleanups from Solar Designer.

Red Hat alert: Updated Perl packages fix security issues.

  • Mailing list (Posted by dave on Sep 22, 2003 12:53 AM EDT)
  • Story Type: Security; Groups: Red Hat
Updated Perl packages that fix a security issue in Safe.pm and a cross-site scripting (XSS) vulnerability in CGI.pm are now available.

« Previous ( 1 ... 518 519 520 521 522 523 524 525 526 527 528 ... 595 ) Next »