Showing headlines posted by dave
« Previous ( 1 ... 578 579 580 581 582 583 584 585 586 587 588 ... 595 ) Next »Red Hat alert: New mutt packages fix IMAP vulnerability/incompatibility
New mutt packages are available. These packages fix an
instance of the common 'format string' vulnerability,
and correct an incompatibilty with the current errata
IMAP server.
It is recommended that all mutt users using Red Hat Linux
upgrade to the new packages. The version of mutt shipped
in Red Hat Linux 7.0 does not contain the format string
vulnerability; it is merely a bugfix update.
Users of Red Hat Linux 6.0 and 6.1 should use the
packages for Red Hat Linux 6.
Red Hat alert: buffer overflow in slrn
An overflow exists in the slrn pacakge as shipped in Red Hat Linux
7 and Red Hat Linux 6.x, which could possibly lead to remote users
executing arbitrary code as the user running slrn.
It is recommended that all users of slrn update to the fixed packages.
Users of Red Hat Linux 6.0 or 6.1 should use the packages
for Red Hat Linux 6.
Debian alert: mailx local exploit
The mail program (a simple tool to read and send email) as
distributed with Debian GNU/Linux 2.2 has a buffer overflow in the
input parsing code. Since mail is installed setgid mail by default
this allowed local users to use it to gain access to mail group.
Debian alert: New Zope packages available
This advisory covers several vulnerabilities in Zope that have been
addressed.
Debian alert: New XEmacs and gnuserv packages available
Klaus Frank has found a vulnerability in the way gnuserv handled
remote connections. Gnuserv is a remote control facility for Emacsen
which is available as standalone program as well as included in
XEmacs21. Gnuserv has a buffer for which insufficient boundary checks
were made. Unfortunately this buffer affected access control to
gnuserv which is using a MIT-MAGIC-COOCKIE based system. It is
possible to overflow the buffer containing the cookie and foozle
cookie comparison.
Debian alert: joe local attack via joerc
Christer Öberg of Wkit Security AB found a problem in joe (Joe's
Own Editor). joe will look for a configuration file in three
locations: the current directory, the users homedirectory ($HOME)
and in /etc/joe. Since the configuration file can define commands
joe will run (for example to check spelling) reading it from
the current directory can be dangerous: an attacker can leave
a .joerc file in a writable directory, which would be read when
a unsuspecting user starts joe in that directory.
Debian alert: slrn buffer overflow
Bill Nottingham reported a problem in the wrapping/unwrapping
functions of the slrn newsreader. A long header in a message
might overflow a buffer and which could result into executing
arbitraty code encoded in the message.
Debian alert: proftp runs as root, /var symlink removal
This is an update to the DSA-032-1 advisory. The powerpc package
that was listed in that advisory was unfortunately compiled on
the wrong system which caused it to not work on a Debian GNU/Linux 2.2
system.
Debian alert: glibc local file overwrite problems
The version of GNU libc that was distributed with Debian GNU/Linux 2.2
suffered from 2 security problems:
Debian alert: New version of sgml-tools available
Former versions of sgml-tools created temporary files directly in /tmp
in an insecure fashion. Version 1.0.9-15 and higher create a
subdirectory first and open temporary files within that directory.
Debian alert: New versions of Athena Widget replacement libraries available
It has been reported that the AsciiSrc and MultiSrc widget in the
Athena widget library handle temporary files insecurely. Joey Hess
has ported the bugfix from XFree86 to these Xaw replacements
libraries.
Debian alert: New version of Midnight Commander available
It has been reported that a local user could tweak Midnight Commander
of another user into executing a random program under the user id of
the person running Midnight Commander. This behaviour has been fixed
by Andrew V. Samoilov.
Debian alert: New version of man2html available
It has been reported that one can tweak man2html remotely into
consuming all available memory. This has been fixed by Nicolás
Lichtmaier with help of Stephan Kulow.
Debian alert: New version of ePerl packages available
Fumitoshi Ukai and Denis Barbier have found several potential buffer
overflow bugs in our version of ePerl as distributed in all of our
distributions.
Debian alert: New versions of analog available
The author of analog, Stephen Turner, has found a buffer overflow bug
in all versions of analog except of version 4.16. A malicious user
could use an ALIAS command to construct very long strings which were
not checked for length and boundaries. This bug is particularly
dangerous if the form interface (which allows unknown users to run the
program via a CGI script) has been installed. There doesn't seem to
be a known exploit.
Debian alert: proftp runs as root, /var symlink removal
The following problems have been reported for the version of proftpd in
Debian 2.2 (potato):
Debian alert: New sudo packages for powerpc available
Todd Miller announced a new version of sudo which corrects a buffer
overflow that could potentially be used to gain root privilages on the
local system. This bugfix has been backported to the version which
was used in Debian GNU/Linux 2.2.
Debian alert: New proftpd packages for m68k available
In Debian Security Advisory DSA 029-1 we have reported several
vulnerabilities in proftpd that have been fixed. For details please
read the main advisory. This upload fixes:
Debian alert: New mgetty packages for m68k and powerpc available
In Debian Security Advisory DSA 011-1 we have reported insecure
creation of temporary files in the mgetty package that have been
fixed. For details please read the main advisory.
SuSE alert: cups
CUPS is an implementation of the Internet Printing Protocol (IPP) and is used as an alternative to the lpr and LPRng packages. The CUPS package aims to be a comprehensive printing solution for UN*X-systems. In SuSE-7.1 distribution, the cups package is not used by any configuration utilities unless the admin has decided to configure the package manually. The cups package has been introduced in the SuSE-7.1 distribution; enhanced support for future releases of the SuSE Linux distribution is planned. A SuSE-internal security audit conducted by Sebastian Krahmer and Thomas Biege revealed several overflows as well as insecure file handling. These bugs have been fixed by adding length-checks and securing the file-access. For a temporary workaround, remove the suid-bit from the 'lppasswd' program. Make sure nobody from outside your network can access the CUPS-server running on port 631. Allowing access to this port from outside is a bad idea regardless whether or not the used version is vulnerable.
« Previous ( 1 ... 578 579 580 581 582 583 584 585 586 587 588 ... 595 ) Next »