Showing headlines posted by dave

« Previous ( 1 ... 523 524 525 526 527 528 529 530 531 532 533 ... 595 ) Next »

Debian alert: New xpcd packages fix buffer overflow

  • Mailing list (Posted by dave on Aug 8, 2003 6:08 AM EDT)
  • Story Type: Security; Groups: Debian
Steve Kemp discovered a buffer overflow in xpcd-svga which can be triggered by a long HOME environment variable. This vulnerability could be exploited by a local attacker to gain root privileges.

Debian alert: New xtokkaetama packages fix buffer overflow

  • Mailing list (Posted by dave on Aug 8, 2003 6:00 AM EDT)
  • Story Type: Security; Groups: Debian
Another buffer overflow was discovered in xtokkaetama, involving the "-nickname" command line option. This vulnerability could be exploited by a local attacker to gain gid 'games'.

Debian alert: New man-db packages fix problem with DSA-364-1

  • Mailing list (Posted by dave on Aug 8, 2003 5:51 AM EDT)
  • Story Type: Security; Groups: Debian
The previous man-db update (DSA-364-1) introduced an error which resulted in a segmentation fault in the "mandb" command, which runs part of the daily cron job. This error was caused by allocating a memory region which was one byte too small to hold the data written into it.

Debian alert: New eroaster packages fix insecure temporary file creation

  • Mailing list (Posted by dave on Aug 5, 2003 7:04 PM EDT)
  • Story Type: Security; Groups: Debian
eroaster, a frontend for burning CD-R media using cdrecord, does not take appropriate security precautions when creating a temporary file for use as a lockfile. This bug could potentially be exploited to overwrite arbitrary files with the privileges of the user running eroaster.

Debian alert: New phpgroupware package fix several vulnerabilities

  • Mailing list (Posted by dave on Aug 5, 2003 6:56 PM EDT)
  • Story Type: Security; Groups: Debian
Several vulnerabilities have been discovered in phpgroupware:

Debian alert: New kernel packages fix potential "oops"

  • Mailing list (Posted by dave on Aug 5, 2003 4:58 AM EDT)
  • Story Type: Security; Groups: Debian
This advisory provides a correction to the previous kernel updates, which contained an error introduced in kernel-source-2.4.18 version 2.4.18-7. This error could result in a kernel "oops" under certain circumstances.

Debian alert: New kernel packages fix potential "oops"

  • Mailing list (Posted by dave on Aug 4, 2003 6:00 PM EDT)
  • Story Type: Security; Groups: Debian
This advisory provides a correction to the previous kernel updates, which contained an error introduced in kernel-source-2.4.18 version 2.4.18-7. This error could result in a kernel "oops" under certain circumstances.

Debian alert: New man-db packages fix buffer overflows, arbitrary command execution

  • Mailing list (Posted by dave on Aug 4, 2003 4:37 PM EDT)
  • Story Type: Security; Groups: Debian
man-db provides the standard man(1) command on Debian systems. During configuration of this package, the administrator is asked whether man(1) should run setuid to a dedicated user ("man") in order to provide a shared cache of preformatted manual pages. The default is for man(1) NOT to be setuid, and in this configuration no known vulnerability exists. However, if the user explicitly requests setuid operation, a local attacker could exploit either of the following bugs to execute arbitrary code as the "man" user.

Red Hat alert: New postfix packages fix security issues.

  • Mailing list (Posted by dave on Aug 4, 2003 6:47 AM EDT)
  • Story Type: Security; Groups: Red Hat
New Postfix packages that fix two potential security issues are now available.

SuSE alert: postfix

  • Mailing list (Posted by dave on Aug 4, 2003 4:15 AM EDT)
  • Story Type: Security; Groups: SUSE
Postfix is a flexible MTA replacement for sendmail. Michal Zalewski has reported problems in postfix which can lead to a remote DoS attack or allow attackers to bounce-scan private networks. These problems have been fixed. Even though not all of our products are vulnerable in their default configurations, the updates should be applied.

Debian alert: New postfix packages fix remote denial of service, bounce scanning

  • Mailing list (Posted by dave on Aug 3, 2003 2:25 PM EDT)
  • Story Type: Security; Groups: Debian
The postfix mail transport agent in Debian 3.0 contains two vulnerabilities:

Debian alert: New mindi packages fix insecure temporary file creation

  • Mailing list (Posted by dave on Aug 2, 2003 1:25 PM EDT)
  • Story Type: Security; Groups: Debian
mindi, a program for creating boot/root disks, does not take appropriate security precautions when creating temporary files. This bug could potentially be exploited to overwrite arbitrary files with the privileges of the user running mindi.

Slackware alert: KDE packages updated (SSA:2003-213-01)

New KDE packages are available for Slackware 9.0. These address a security issue where Konqueror may leak authentication credentials.

Debian alert: New kdelibs packages fix several vulnerabilities

  • Mailing list (Posted by dave on Aug 1, 2003 2:46 PM EDT)
  • Story Type: Security; Groups: Debian
Two vulnerabilities were discovered in kdelibs:

Debian alert: New xfstt packages fix several vulnerabilities

  • Mailing list (Posted by dave on Aug 1, 2003 5:05 AM EDT)
  • Story Type: Security; Groups: Debian
xfstt, a TrueType font server for the X window system was found to contain two classes of vulnerabilities:

Mandrake alert: Updated kdelibs packages fix konqueror authentication leak

A vulnerability in Konqueror was discovered where it could inadvertently send authentication credentials to websites other than the intended site in clear text via the HTTP-referer header when authentication credentials are passed as part of a URL in the form http://user:password@host/.

Debian alert: New atari800 packages fix buffer overflows

  • Mailing list (Posted by dave on Jul 31, 2003 6:08 PM EDT)
  • Story Type: Security; Groups: Debian
Steve Kemp discovered multiple buffer overflows in atari800, an Atari emulator. In order to directly access graphics hardware, one of the affected programs is setuid root. A local attacker could exploit this vulnerability to gain root privileges.

Debian alert: New kernel source and i386, alpha kernel images fix multiple vulnerabilities

  • Mailing list (Posted by dave on Jul 31, 2003 5:57 PM EDT)
  • Story Type: Security; Groups: Debian
A number of vulnerabilities have been discovered in the Linux kernel.

Debian alert: New wu-ftpd packages fix buffer overflow

  • Mailing list (Posted by dave on Jul 31, 2003 2:01 PM EDT)
  • Story Type: Security; Groups: Debian
iSEC Security Research reports that wu-ftpd contains an off-by-one bug in the fb_realpath function which could be exploited by a logged-in user (local or anonymous) to gain root privileges. A demonstration exploit is reportedly available.

Mandrake alert: Updated wu-ftpd packages fix remote root vulnerability

A vulnerability was discovered by Janusz Niewiadomski and Wojciech Purczynski in the wu-ftpd FTP server package. They found an off-by- one bug in the fb_realpath() function which could be used by a remote attacker to obtain root privileges on the server. This bug can only be successfully accomplished by using wu-ftpd binaries compiled on Linux 2.0.x and later 2.4.x kernels because the 2.2.x and earlier 2.4.x kernels define PATH_MAX to be 4095 characters.

« Previous ( 1 ... 523 524 525 526 527 528 529 530 531 532 533 ... 595 ) Next »