Showing all newswire headlines
View by date, instead?« Previous ( 1 ... 7408 7409 7410 7411 7412 7413 7414 7415 7416 7417 7418 ... 7439 ) Next »
Mandrake alert: groff update
zen-parse discovered an exploitable buffer overflow in groff's preprocessor. If groff is invoked using the LPRng printing system, an attacker can gain rights as the "lp" user. Likewise, this may be remotely exploitable if lpd is running and remotely accessible and the attacker knows the name of the printer and it's spool file.
Red Hat alert: Updated at package available
This updated at package fixes two minor problems and one major
problem where the environment can get wiped out prior to the execution of a
scheduled command.
For versions of Red Hat Linux prior to 7.2, this package also fixes a
potential security vulnerability which can result in heap corruption (Red
Hat Linux 7.2 is not vulnerable to this security exploit).
Update 2002-02-01: The package for Red Hat Linux 6.2 tried to source a file
in /etc/init.d, which doesn't exist on a standard system.
Debian alert: New wmtv packages fix symlink vulnerability
Nicolas Boullis found some security problems in the wmtv package (a
dockable video4linux TV player for windowmaker) which is distributed
in Debian GNU/Linux 2.2. With the current version of wmtv, the
configuration file is written back as the superuser, and without any
further checks. A mailicious user might use that to damage important
files
Red Hat alert: New telnet packages available to fix buffer overflow vulnerabilities
New telnet, telnet-server packages are available for Red Hat Linux 5.2,
6.2, 7.0 and 7.1.
These packages fix a problem where buffer overflows can provide root
access to local users.
It is recommended that all users update to the fixed packages.
[2002-02-06] New packages are available for Red Hat Linux 7.0 and 7.1.
These fix issues when upgrading from the errata telnet packages released
for previous releases. No code changes are involved.
Debian alert: updated rsync fix
In Debian Security Advisory DSA-106-1 we reported a exploitable
problem in rsync. For details please see that advisory.
Mandrake alert: gzip update
There are two problems with the gzip archiving program; the first is a crash when an input file name is over 1020 characters, and the second is a buffer overflow that could be exploited if gzip is run on a server such as an FTP server. The patch applied is from the gzip developers and the problems have been fixed in the latest beta.
Red Hat alert: New rsync packages available
New rsync packages are available; these fix a remotely exploitable problem
in the I/O functions. These include the security patch from the recently
released rsync-
Debian alert: New jgroff packages fix printf format problem
Basically, this is the same Security Advisory as DSA 072-1, but for
jgroff instead of groff. The package jgroff contains a version
derived from groff that has japaneze character sets enabled. This
package is available only in the stable release of Debian, patches for
japanese support have been merged into the main groff package.
Mandrake alert: enscript update
The enscript program does not create temporary files in a secure fashion and as such could be abused if enscript is run as root.
Mandrake alert: rsync update
Sebastian Krahmer of the SuSE Security Team performed an audit on the rsync tool and discovered that in several places signed and unsigned numbers were mixed, with the end result being insecure code. These flaws could be abused by remote users to write 0 bytes into rsync's memory and trick rsync into executing arbitrary code on the server. It is recommended that all Mandrake Linux users update rsync immediately. As well, rsync server administrators should seriously consider making use of the "use chroot", "read only", and "uid" options as these can significantly reduce the impact that security problems in rsync (or elsewhere) have on the server.
Debian alert: rsync remote exploit
Sebastian Krahmer found several places in rsync (a popular tool to
synchronise files between machines) where signed and unsigned numbers
were mixed which resulted in insecure code. This could be abused by
remote users to write 0-bytes in rsync's memory and trick rsync into
executing arbitrary code.
SuSE alert: rsync
The rsync program allows users and administrators to synchronize files and whole directory structures on different machines. It is common practise to allow remote users to mirror ftp servers via anonymous rsync access. There exist several signedness bugs within the rsync program which allow remote attackers to write 0-bytes to almost arbitrary stack-locations, therefore being able to control the programflow and obtaining a shell remotely. These bugs have been fixed.
Red Hat alert: Updated 2.4 kernel available
A security vunlerability in the Linux CIPE (VPN tunnel) implementation has
been fixed.
Red Hat alert: Updated OpenLDAP packages available
Updated OpenLDAP packages are now available for Red Hat Linux 7, 7.1, and
7.
Red Hat alert: Updated at package available
This updated at package fixes two minor problems and one major
problem where the environment can get wiped out prior to the execution of a
scheduled command.
For versions of Red Hat Linux prior to 7.2, this package also fixes a
potential security vulnerability which can result in heap corruption (Red
Hat Linux 7.2 is not vulnerable to this security exploit).
Mandrake alert: jmcce update
A problem exists in the jmcce program that is used for Chinese text on the console. jmcce is installed setuid root and places log files in /tmp; because jmcce does not perform suitable checking on the files it writes to and because it uses a predictable logfile name, an attacker could exploit this to arbitrarily overwrite any file on the system.
Slackware alert: Security updates: at, sudo, xchat
New packages are now available to address security issues with the at
scheduler program (found in Slackware 8.0's bin.tgz package), sudo, and
xchat.
Debian alert: updated i386 icecast-server package
In Debian Security Advisory DSA-089-1 we reported that icecast-server
has several security problems. For details please see that advisory.
Debian alert: enscript creates temporary files insecurely
The version of enscript (a tool to convert ASCII text to different
formats) has been found to create temporary files insecurely.
Mandrake alert: at update
zen-parse discovered a problem in the at command containing an extra call to free() which can lead to a segfault with a carefully crafted, but incorrect, format. This is caused due to a heap corruption that can be exploited under certain circumstances because the at command is installed setuid root. Thanks to SuSE for an additional security improvement that ads the O_EXCL (exclusive) option to the open(2) system call inside the at code.
« Previous ( 1 ... 7408 7409 7410 7411 7412 7413 7414 7415 7416 7417 7418 ... 7439 ) Next »