Showing all newswire headlines

View by date, instead?

« Previous ( 1 ... 7415 7416 7417 7418 7419 7420 7421 7422 7423 7424 7425 ... 7472 ) Next »

Debian alert: New mhc-utils packages fix predictable temporary file

  • Mailing list (Posted by dave on Feb 28, 2003 6:20 AM EDT)
  • Story Type: Security; Groups: Debian
It has been discovered that adb2mhc from the mhc-utils package. The default temporary directory uses a predictable name. This adds a vulnerability that allows a local attacker to overwrite arbitrary files the users has write permissions for.

Debian alert: New tcpdump packages fix denial of service vulnerability

  • Mailing list (Posted by dave on Feb 27, 2003 11:35 AM EDT)
  • Story Type: Security; Groups: Debian
Andrew Griffiths and iDEFENSE Labs discovered a problem in tcpdump, a powerful tool for network monitoring and data acquisition. An attacker is able to send a specially crafted network packet which causes tcpdump to enter an infinite loop.

SuSE alert: hypermail

  • Mailing list (Posted by dave on Feb 27, 2003 9:06 AM EDT)
  • Story Type: Security; Groups: SUSE
Hypermail is a tool to convert a Unix mail-box file to a set of cross- referenced HTML documents. During an internal source code review done by Thomas Biege several bugs where found in hypermail and its tools. These bugs allow remote code execution, local tmp race conditions, denial-of-service conditions and read access to files belonging to the host hypermail is running on. Additionally the mail CGI program can be abused by spammers as email- relay and should thus be disabled.

Debian alert: New NANOG traceroute packages fix buffer overflow

  • Mailing list (Posted by dave on Feb 27, 2003 5:45 AM EDT)
  • Story Type: Security; Groups: Debian
A vulnerability has been discovered in NANOG traceroute, an enhanced version of the Van Jacobson/BSD traceroute program. A buffer overflow occurs in the 'get_origin()' function. Due to insufficient bounds checking performed by the whois parser, it may be possible to corrupt memory on the system stack. This vulnerability can be exploited by a remote attacker to gain root privileges on a target host. Though, most probably not in Debian.

Mandrake alert: Updated shadow-utils packages fix improper mailspool ownership

The shadow-utils package contains the tool useradd, which is used to create or update new user information. When useradd creates an account, it would create it with improper permissions; instead of having it owned by the group mail, it would be owned by the user's primary group. If this is a shared group (ie. "users"), then all members of the shared group would be able to obtain access to the mail spools of other members of the same group. A patch to useradd has been applied to correct this problem.

Mandrake alert: Updated webmin packages fix session ID spoofing vulnerability

A vulnerability was discovered in webmin by Cintia M. Imanishi, in the miniserv.pl program, which is the core server of webmin. This vulnerability allows an attacker to spoof a session ID by including special metacharacters in the BASE64 encoding string used during the authentication process. This could allow an attacker to gain full administrative access to webmin.

SuSE alert: openssl

  • Mailing list (Posted by dave on Feb 26, 2003 6:40 AM EDT)
  • Story Type: Security; Groups: SUSE
OpenSSL is an implementation of the Secure Sockets Layer and Transport Layer Security protocols and provides strong cryptography for many applications in a Linux system. It is a default package in all SuSE products.

SuSE alert: libmcrypt

  • Mailing list (Posted by dave on Feb 26, 2003 2:17 AM EDT)
  • Story Type: Security; Groups: SUSE
Libmcrypt is a data encryption library that is able to load crypto- modules at run-time by using libltdl. Versions of libmcrypt prior to 2.5.5 include several buffer overflows that can be triggered by passing very long input to the mcrypt_* functions. The way libmcrypt handles dynamic crypto-modules via libltdl leads to memory-leaks that can cause a Denial-of-Service condition. This Problem can just be solved by linking modules static. This security update does not solve the memory-leak problem to avoid compatibility problems. Future releases of libmcrypt will be linked statically.

Mandrake alert: Updated packages fix multiple vulnerabilities

The following packages are now available for Multi Network Firewall 8.2 and bring it up to the same errata level as Mandrake Linux 8.2 with all patches and updates available to date applied.

Red Hat alert: Updated vte packages fix gnome-terminal vulnerability

  • Mailing list (Posted by dave on Feb 24, 2003 4:11 PM EDT)
  • Story Type: Security; Groups: Red Hat
Updated vte packages that fix a vulnerability in gnome-terminal are available for Red Hat Linux 8.0.

Mandrake alert: Updated vnc packages fix cookie vulnerability

A vulnerability was discovered in the VNC server script that generates an X cookie, used by X authentication. The script generated a cookie that was not strong enough and allow an attacker to more easily guess the authentication cookie, thus obtaining unauthorized access to the VNC server.

Mandrake alert: Updated lynx packages fix CRLF injection vulnerability

A vulnerability was discovered in lynx, a text-mode web browser. The HTTP queries that lynx constructs are from arguments on the command line or the $WWW_HOME environment variable, but lynx does not properly sanitize special characters such as carriage returns or linefeeds. Extra headers can be inserted into the request because of this, which can cause scripts that use lynx to fetch data from the wrong site from servers that use virtual hosting.

Debian alert: New OpenSSL packages fix timing-based attack vulnerability

  • Mailing list (Posted by dave on Feb 24, 2003 5:00 AM EDT)
  • Story Type: Security; Groups: Debian
A vulnerability has been discovered in OpenSSL, a Secure Socket Layer (SSL) implementation. In an upcoming paper, Brice Canvel (EPFL), Alain Hiltgen (UBS), Serge Vaudenay (EPFL), and Martin Vuagnoux (EPFL, Ilion) describe and demonstrate a timing-based attack on CBC cipher suites used in SSL and TLS. OpenSSL has been found to vulnerable to this attack.

Mandrake alert: Updated krb5 packages fix vulnerability in FTP client

A vulnerability was discovered in the Kerberos FTP client. When the client retrieves a file that has a filename beginning with a pipe character, the FTP client will pass that filename to the command shell in a system() call. This could allow a malicious remote FTP server to write to files outside of the current directory or even execute arbitrary commands as the user using the FTP client.

Mandrake alert: Updated openssl packages fix timing-based attack vulnerability

In an upcoming paper, Brice Canvel (EPFL), Alain Hiltgen (UBS), Serge Vaudenay (EPFL), and Martin Vuagnoux (EPFL, Ilion) describe and demonstrate a timing-based attack on CBC ciphersuites in SSL and TLS.

Debian alert: New slocate packages fix local root exploit

  • Mailing list (Posted by dave on Feb 21, 2003 5:26 AM EDT)
  • Story Type: Security; Groups: Debian
A problem has been discovered in slocate, a secure locate replacement. A buffer overflow in the setuid program slocate can be used to execute arbitrary code as superuser.

Red Hat alert: Updated VNC packages fix replay and cookie vulnerabilities

  • Mailing list (Posted by dave on Feb 20, 2003 11:40 PM EDT)
  • Story Type: Security; Groups: Red Hat
Updated VNC packages are available to fix a challenge replay vulnerability and a weak cookie vulnerability.

Red Hat alert: Updated shadow-utils packages fix exposure

  • Mailing list (Posted by dave on Feb 20, 2003 9:26 AM EDT)
  • Story Type: Security; Groups: Red Hat
Updated shadow-utils packages correct a bug that caused the useradd tool to create mail spools with incorrect permissions.

Mandrake alert: Updated php packages fix buffer overflow vulnerability

A buffer overflow was discovered in the wordwrap() function in versions of PHP greater than 4.1.2 and less than 4.3.0. Under certain circumstances, this buffer overflow can be used to overwite heap memory and could potentially lead to remote system compromise.

Mandrake alert: Updated apcupsd packages fix buffer overflow and remove vulnerability

A remote root vulnerability in slave setups and some buffer overflows in the network information server code were discovered by the apcupsd developers. They have been fixed in the latest unstable version, 3.10.5 which contains additional enhancements like USB support, and the latest stable version, 3.8.6.

« Previous ( 1 ... 7415 7416 7417 7418 7419 7420 7421 7422 7423 7424 7425 ... 7472 ) Next »