Showing headlines posted by dave
« Previous ( 1 ... 532 533 534 535 536 537 538 539 540 541 542 ... 595 ) Next »Mandrake alert: Updated snort packages fix remote vulnerability
An integer overflow was discovered in the Snort stream4 preprocessor by the Sourcefire Vulnerability Research Team. This preprocessor (spp_stream4) incorrectly calculates segment size parameters during stream reassembly for certainm sequence number ranges. This can lead to an integer overflow that can in turn lead to a heap overflow that can be exploited to perform a denial of service (DoS) or even remote command excution on the host running Snort.
Mandrake alert: Updated pam packages fix root authorization handling in pam_xauth module
Andreas Beck discovered that the pam_xauth module would forward authorization information from the root account to unprivileged users. This can be exploited by a local attacker to gain access to the root user's X session. In order for it to be successfully exploited, the attacker would have to somehow get the root user to su to the account belonging to the attacker. Update: The previous fix was incorrect because certain applications, such as userdrake and net_monitor could not be executed as root, although they could be executed as users who successfully authenticated as root.
Mandrake alert: Updated ethereal packages fix remote vulnerability
A vulnerability was discovered in Ethereal 0.9.9 and earlier that allows a remote attacker to use specially crafted SOCKS packets to cause a denial of service (DoS) and possibly execute arbitrary code.
Red Hat alert: Updated mICQ packages fix vulnerability
Updated mICQ packages are available for Red Hat Linux versions 7.2 and 7.3
that fix a remote crash.
Red Hat alert: Updated LPRng packages fix psbanner vulnerability
Updated LPRng packages resolving a temporary file vulnerability are now
available.
Red Hat alert: Updated squirrelmail packages fix cross-site scripting vulnerabilities
Updated SquirrelMail packages are now available for Red Hat Linux.
Mandrake alert: Updated kde3 packages fix arbitrary command execution
A vulnerability was discovered by the KDE team in the way that KDE uses Ghostscript for processing PostScript and PDF files. A malicious attacker could provide a carefully constructed PDF or PostScript file to an end user (via web or mail) that could lead to the execution of arbitrary commands as the user viewing the file. The vulnerability can be triggered even by the browser generating a directory listing with thumbnails.
SuSE alert: KDE
The K Desktop Environment KDE allows to generate postscript previews which can be viewed via certain konqueror plug-ins for example. The previews are generated by invoking the ghostscript program but without supplying the "-dSAFER" option as an argument. This allows embedded code to be executed. Additionally to the correction made to the postscript generation process, various other security related bug fixes and patches from KDE 3.0.5a have been incorporated. For more information regarding these fixes please visit the URLs given as cross references.
Red Hat alert: Updated ethereal packages fix security vulnerabilities
Updated ethereal packages are now available which fix a format string
bug and a heap-based buffer overflow.
Debian alert: New gkrellm-newsticker packages fix DoS and arbitrary command execution
Brian Campbell discovered two security-related problems in
gkrellm-newsticker, a plugin for the gkrellm system monitor program,
which provides a news ticker from RDF feeds. The Common
Vulnerabilities and Exposures project identifies the following
problems:
Red Hat alert: Updated tcpdump packages fix various vulnerabilities
Updated tcpdump, libpcap, and arpwatch packages are available, fixing
a number of vulnerabilities that could be used to cause a denial of service
attack, or possibly execute arbitrary code.
Debian alert: New kdelibs packages fix arbitrary command execution
The KDE team discoverd a vulnerability in the way KDE uses Ghostscript
software for processing of PostScript (PS) and PDF files. An attacker
could provide a malicious PostScript or PDF file via mail or websites
that could lead to executing arbitrary commands under the privileges
of the user viewing the file or when the browser generates a directory
listing with thumbnails.
Debian alert: New mime-support packages fix temporary file race conditions
Unfortunately yesterday's update for mime-support did not exactly work
as expected, which requires an update. For completeness we include
the advisory text:
Mandrake alert: Updated apache packages fix denial of service vulnerabilities
A memory leak was discovered in Apache 2.0 through 2.0.44 that can allow a remote attacker to cause a significant denial of service (DoS) by sending requests containing a lot of linefeed characters to the server.
Debian alert: New mime-support packages fix temporary file race conditions
Colin Phipps discovered several problems in mime-support, that contains
support programs for the MIME control files 'mime.types' and 'mailcap'.
When a temporary file is to be used it is created insecurely, allowing
an attacker to overwrite arbitrary under the user id of the person
executing run-mailcap, most probably root. Additionally the program did
not properly escape shell escape characters when executing a command.
This is unlikely to be exploitable, though.
Debian alert: New ircII packages fix DoS and arbitrary code execution
Timo Sirainen discovered several problems in ircII, a popular
client for Internet Relay Chat (IRC). A malicious server could
craft special reply strings, triggering the client to write beyond
buffer boundaries. This could lead to a denial of service if the
client only crashes, but may also lead to executing of arbitrary code
under the user id of the chatting user.
Slackware alert: Updated KDE packages available
New KDE 3.1.1a packages are available for Slackware 9.0 which
fix a security problem with the handling of PS and PDF documents.
Mandrake alert: Updated file packages fix stack overflow vulnerability
A memory allocation problem in file was found by Jeff Johnson, and a stack overflow corruption problem was found by David Endler. These problems have been corrected in file version 3.41 and likely affect all previous version. These problems pose a security threat as they can be used to execute arbitrary code by an attacker under the privileges of another user. Note that the attacker must first somehow convince the target user to execute file against a specially crafted file that triggers the buffer overflow in file. Update: The 8.2 and 9.0 packages installed data in a different directory than where they should have been installed, which broke compatability with a small number of programs. These updated packages place those files back in the appropriate location.
Mandrake alert: Updated kde3 packages fix arbitrary command execution
A vulnerability was discovered by the KDE team in the way that KDE uses Ghostscript for processing PostScript and PDF files. A malicious attacker could provide a carefully constructed PDF or PostScript file to an end user (via web or mail) that could lead to the execution of arbitrary commands as the user viewing the file. The vulnerability can be triggered even by the browser generating a directory listing with thumbnails.
Debian alert: New sendmail-wide packages fix DoS and arbitrary code execution
Michal Zalewski discovered a buffer overflow, triggered by a char to
int conversion, in the address parsing code in sendmail, a widely used
powerful, efficient, and scalable mail transport agent. This problem
is potentially remotely exploitable.
« Previous ( 1 ... 532 533 534 535 536 537 538 539 540 541 542 ... 595 ) Next »