Showing all newswire headlines

View by date, instead?

« Previous ( 1 ... 7338 7339 7340 7341 7342 7343 7344 7345 7346 7347 7348 ... 7384 ) Next »

Debian alert: New heimdal packages fix buffer overflows

  • Mailing list (Posted by dave on Oct 31, 2002 6:10 AM EDT)
  • Story Type: Security; Groups: Debian
A stack buffer overflow in the kadm_ser_wrap_in function in the Kerberos v4 administration server was discovered, which is provided by Heimdal as well. A working exploit for this kadmind bug is already circulating, hence it is considered serious. The roken library also contains a vulnerability which could lead to another root exploit.

SuSE alert: lprng/html2ps

  • Mailing list (Posted by dave on Oct 31, 2002 2:01 AM EDT)
  • Story Type: Security; Groups: SUSE
The lprng package contains the "runlpr" program which allows the lp user to execute the lpr program as root. Local attackers can pass certain commandline arguments to lpr running as root, fooling it to execute arbitrary commands as root. This has been fixed. Note that this vulnerability can only be exploited if the attacker has previously gained access to the lp account.

SuSE alert: syslog-ng

  • Mailing list (Posted by dave on Oct 31, 2002 1:24 AM EDT)
  • Story Type: Security; Groups: SUSE
The syslog-ng package is a portable syslog implementation which can be used as syslogd replacement. Syslog-ng contained buffer overflows in its macro expansion routines. These overflows could be triggered by remote attackers if certain configuration options were enabled. Syslog-ng is not used by default on SuSE Linux, and even if installed, the problematic options are not enabled by default. We recommend an update of the syslog-ng package nevertheless if you use syslog-ng for logging. To be sure the update takes effect you have to restart the daemon by issuing the following command as root:

Debian alert: New krb4 packages fix buffer overflow

  • Mailing list (Posted by dave on Oct 30, 2002 7:58 AM EDT)
  • Story Type: Security; Groups: Debian
Tom Yu and Sam Hartman of MIT discovered another stack buffer overflow in the kadm_ser_wrap_in function in the Kerberos v4 administration server. This kadmind bug has a working exploit code circulating, hence it is considered serious.

Mandrake alert: krb5 update

A stack buffer overflow in the implementation of the Kerberos v4 compatibility administration daemon (kadmind4) in the krb5 package can be exploited to gain unauthorized root access to a KDC host. Authentication to the daemon is not required to successfully perform the attack and according to MIT at least one exploit is known to exist. kadmind4 is used only by sites that require compatibility with legacy administrative clients, and sites that do not have these needs are likely not using kadmind4 and are not affected. MandrakeSoft encourages all users who use Kerberos to upgrade to these packages immediately.

Debian alert: New krb5 packages fix buffer overflow

  • Mailing list (Posted by dave on Oct 29, 2002 9:55 AM EDT)
  • Story Type: Security; Groups: Debian
Tom Yu and Sam Hartman of MIT discovered another stack buffer overflow in the kadm_ser_wrap_in function in the Kerberos v4 administration server. This kadmind bug has a working exploit code circulating, hence it is considered serious. The MIT krb5 implementation includes support for version 4, including a complete v4 library, server side support for krb4, and limited client support for v4.

Debian alert: New kghostview packages fix buffer overflow

  • Mailing list (Posted by dave on Oct 28, 2002 6:15 AM EDT)
  • Story Type: Security; Groups: Debian
Zen-parse discovered a buffer overflow in gv, a PostScript and PDF viewer for X11. The same code is present in kghostview which is part of the KDE-Graphics package. This problem is triggered by scanning the PostScript file and can be exploited by an attacker sending a malformed PostScript or PDF file. The attacker is able to cause arbitrary code to be run with the privileges of the victim.

Mandrake alert: mod_ssl update

A cross-site scripting vulnerability was discovered in mod_ssl by Joe Orton. This only affects servers using a combination of wildcard DNS and "UseCanonicalName off" (which is not the default in Mandrake Linux). With this setting turned off, Apache will attempt to use the hostname:port that the client supplies, which is where the problem comes into play. With this setting turned on (the default), Apache constructs a self-referencing URL and will use ServerName and Port to form the canonical name. It is recommended that all users upgrade, regardless of the setting of the "UseCanonicalName" configuration option.

Mandrake alert: kdegraphics update

A vulnerability exists in KGhostview, part of the kdegraphics package. It includes a DSC 3.0 parser from GSview then is vulnerable to a buffer overflow while parsing a specially crafted .ps file. It also contains code from gv which is vulnerable to a similar buffer overflow triggered by malformed PostScript and PDF files. This has been fixed in KDE 3.0.4 and patches have been applied to correct these packages.

Red Hat alert: Updated ypserv packages fixes memory leak

  • Mailing list (Posted by dave on Oct 24, 2002 4:14 AM EDT)
  • Story Type: Security; Groups: Red Hat
Updated ypserv packages which fix a memory leak are now available for Red Hat Linux 7.x and 6.

Mandrake alert: tetex update

A vulnerability was discovered in dvips by Olaf Kirch that would allow remote users with access to the printer to execute commands as the lp user through sending special print jobs to the printer.

Debian alert: New mod_ssl packages fix cross site scripting

  • Mailing list (Posted by dave on Oct 22, 2002 6:48 AM EDT)
  • Story Type: Security; Groups: Debian
Joe Orton discovered a cross site scripting problem in mod_ssl, an Apache module that adds Strong cryptography (i.e. HTTPS support) to the webserver. The module will return the server name unescaped in the response to an HTTP request on an SSL port.

Mandrake alert: gv update

A buffer overflow was discovered in gv versions 3.5.8 and earlier by Zen Parse. The problem is triggered by scanning a file and can be exploited by an attacker sending a malformed PostScript or PDF file. This would result in arbitrary code being executed with the privilege of the user viewing the file. ggv uses code derived from gv and has the same vulnerability. These updates provide patched versions of gv and ggv to fix the vulnerabilities.

SuSE alert: postgresql

  • Mailing list (Posted by dave on Oct 21, 2002 7:52 AM EDT)
  • Story Type: Security; Groups: SUSE
The PostgreSQL Object-Relational DBMS was found vulnerable to several security related buffer overflow problems. The buffer overflows are located in: * handling long datetime input * lpad() and rpad() function with multibyte * repeat() function * TZ and SET TIME ZONE environment variables These bugs could just be exploited by attackers who have access to the postgresql server to gain the privileges postgres user ID .

Debian alert: New NIS packages fix information leak

  • Mailing list (Posted by dave on Oct 21, 2002 6:45 AM EDT)
  • Story Type: Security; Groups: Debian
Thorsten Kukuck discovered a problem in the ypserv program which is part of the Network Information Services (NIS). A memory leak in all versions of ypserv prior to 2.5 is remotely exploitable. When a malicious user could request a non-existing map the server will leak parts of an old domainname and mapname.

Debian alert: New gnome-gv packages fix buffer overflow

  • Mailing list (Posted by dave on Oct 18, 2002 6:00 AM EDT)
  • Story Type: Security; Groups: Debian
Zen-parse discovered a buffer overflow in gv, a PostScript and PDF viewer for X11. The same code is present in gnome-gv. This problem is triggered by scanning the PostScript file and can be exploited by an attacker sending a malformed PostScript or PDF file. The attacker is able to cause arbitrary code to be run with the privileges of the victim.

Red Hat alert: Updated Mozilla packages fix security vulnerabilities

  • Mailing list (Posted by dave on Oct 18, 2002 1:18 AM EDT)
  • Story Type: Security; Groups: Red Hat
Updated Mozilla packages are now available for Red Hat Linux. These new packages fix vulnerabilities in previous versions of Mozilla.

Debian alert: New PAM packages fix serious security violation in Debian/unstable

  • Mailing list (Posted by dave on Oct 17, 2002 9:44 AM EDT)
  • Story Type: Security; Groups: Debian
Paul Aurich and Samuele Giovanni Tonon discovered a serious security violation in PAM. Disabled passwords (i.e. those with '*' in the password file) were classified as empty password and access to such accounts is granted through the regular login procedure (getty, telnet, ssh). This works for all such accounts whose shell field in the password file does not refer to /bin/false. Only version 0.76 of PAM seems to be affected by this problem.

Debian alert: New Heimdal packages fix remote command execution

  • Mailing list (Posted by dave on Oct 17, 2002 6:06 AM EDT)
  • Story Type: Security; Groups: Debian
The SuSE Security Team has reviewed critical parts of the Heimdal package such as the kadmind and kdc server. While doing so several potential buffer overflows and other bugs have been uncovered and fixed. Remote attackers can probably gain remote root access on systems without fixes. Since these services usually run on authentication servers these bugs are considered very serious.

Red Hat alert: New kernel 2.2 packages fix local vulnerabilities

  • Mailing list (Posted by dave on Oct 17, 2002 2:11 AM EDT)
  • Story Type: Security; Groups: Red Hat
Some potential local security vulnerabilities were found in the kernel during code audits; these have been fixed in the

« Previous ( 1 ... 7338 7339 7340 7341 7342 7343 7344 7345 7346 7347 7348 ... 7384 ) Next »