Showing all newswire headlines
View by date, instead?« Previous ( 1 ... 7415 7416 7417 7418 7419 7420 7421 7422 7423 7424 7425 ... 7472 ) Next »
Debian alert: New mhc-utils packages fix predictable temporary file
It has been discovered that adb2mhc from the mhc-utils package. The
default temporary directory uses a predictable name. This adds a
vulnerability that allows a local attacker to overwrite arbitrary
files the users has write permissions for.
Debian alert: New tcpdump packages fix denial of service vulnerability
Andrew Griffiths and iDEFENSE Labs discovered a problem in tcpdump, a
powerful tool for network monitoring and data acquisition. An
attacker is able to send a specially crafted network packet which
causes tcpdump to enter an infinite loop.
SuSE alert: hypermail
Hypermail is a tool to convert a Unix mail-box file to a set of cross- referenced HTML documents. During an internal source code review done by Thomas Biege several bugs where found in hypermail and its tools. These bugs allow remote code execution, local tmp race conditions, denial-of-service conditions and read access to files belonging to the host hypermail is running on. Additionally the mail CGI program can be abused by spammers as email- relay and should thus be disabled.
Debian alert: New NANOG traceroute packages fix buffer overflow
A vulnerability has been discovered in NANOG traceroute, an enhanced
version of the Van Jacobson/BSD traceroute program. A buffer overflow
occurs in the 'get_origin()' function. Due to insufficient bounds
checking performed by the whois parser, it may be possible to corrupt
memory on the system stack. This vulnerability can be exploited by a
remote attacker to gain root privileges on a target host. Though,
most probably not in Debian.
Mandrake alert: Updated shadow-utils packages fix improper mailspool ownership
The shadow-utils package contains the tool useradd, which is used to create or update new user information. When useradd creates an account, it would create it with improper permissions; instead of having it owned by the group mail, it would be owned by the user's primary group. If this is a shared group (ie. "users"), then all members of the shared group would be able to obtain access to the mail spools of other members of the same group. A patch to useradd has been applied to correct this problem.
Mandrake alert: Updated webmin packages fix session ID spoofing vulnerability
A vulnerability was discovered in webmin by Cintia M. Imanishi, in the miniserv.pl program, which is the core server of webmin. This vulnerability allows an attacker to spoof a session ID by including special metacharacters in the BASE64 encoding string used during the authentication process. This could allow an attacker to gain full administrative access to webmin.
SuSE alert: openssl
OpenSSL is an implementation of the Secure Sockets Layer and Transport Layer Security protocols and provides strong cryptography for many applications in a Linux system. It is a default package in all SuSE products.
SuSE alert: libmcrypt
Libmcrypt is a data encryption library that is able to load crypto- modules at run-time by using libltdl. Versions of libmcrypt prior to 2.5.5 include several buffer overflows that can be triggered by passing very long input to the mcrypt_* functions. The way libmcrypt handles dynamic crypto-modules via libltdl leads to memory-leaks that can cause a Denial-of-Service condition. This Problem can just be solved by linking modules static. This security update does not solve the memory-leak problem to avoid compatibility problems. Future releases of libmcrypt will be linked statically.
Mandrake alert: Updated packages fix multiple vulnerabilities
The following packages are now available for Multi Network Firewall 8.2 and bring it up to the same errata level as Mandrake Linux 8.2 with all patches and updates available to date applied.
Red Hat alert: Updated vte packages fix gnome-terminal vulnerability
Updated vte packages that fix a vulnerability in gnome-terminal are
available for Red Hat Linux 8.0.
Mandrake alert: Updated vnc packages fix cookie vulnerability
A vulnerability was discovered in the VNC server script that generates an X cookie, used by X authentication. The script generated a cookie that was not strong enough and allow an attacker to more easily guess the authentication cookie, thus obtaining unauthorized access to the VNC server.
Mandrake alert: Updated lynx packages fix CRLF injection vulnerability
A vulnerability was discovered in lynx, a text-mode web browser. The HTTP queries that lynx constructs are from arguments on the command line or the $WWW_HOME environment variable, but lynx does not properly sanitize special characters such as carriage returns or linefeeds. Extra headers can be inserted into the request because of this, which can cause scripts that use lynx to fetch data from the wrong site from servers that use virtual hosting.
Debian alert: New OpenSSL packages fix timing-based attack vulnerability
A vulnerability has been discovered in OpenSSL, a Secure Socket Layer
(SSL) implementation. In an upcoming paper, Brice Canvel (EPFL),
Alain Hiltgen (UBS), Serge Vaudenay (EPFL), and Martin Vuagnoux (EPFL,
Ilion) describe and demonstrate a timing-based attack on CBC cipher
suites used in SSL and TLS. OpenSSL has been found to vulnerable to
this attack.
Mandrake alert: Updated krb5 packages fix vulnerability in FTP client
A vulnerability was discovered in the Kerberos FTP client. When the client retrieves a file that has a filename beginning with a pipe character, the FTP client will pass that filename to the command shell in a system() call. This could allow a malicious remote FTP server to write to files outside of the current directory or even execute arbitrary commands as the user using the FTP client.
Mandrake alert: Updated openssl packages fix timing-based attack vulnerability
In an upcoming paper, Brice Canvel (EPFL), Alain Hiltgen (UBS), Serge Vaudenay (EPFL), and Martin Vuagnoux (EPFL, Ilion) describe and demonstrate a timing-based attack on CBC ciphersuites in SSL and TLS.
Debian alert: New slocate packages fix local root exploit
A problem has been discovered in slocate, a secure locate replacement.
A buffer overflow in the setuid program slocate can be used to execute
arbitrary code as superuser.
Red Hat alert: Updated VNC packages fix replay and cookie vulnerabilities
Updated VNC packages are available to fix a challenge replay vulnerability
and a weak cookie vulnerability.
Red Hat alert: Updated shadow-utils packages fix exposure
Updated shadow-utils packages correct a bug that caused the useradd tool to
create mail spools with incorrect permissions.
Mandrake alert: Updated php packages fix buffer overflow vulnerability
A buffer overflow was discovered in the wordwrap() function in versions of PHP greater than 4.1.2 and less than 4.3.0. Under certain circumstances, this buffer overflow can be used to overwite heap memory and could potentially lead to remote system compromise.
Mandrake alert: Updated apcupsd packages fix buffer overflow and remove vulnerability
A remote root vulnerability in slave setups and some buffer overflows in the network information server code were discovered by the apcupsd developers. They have been fixed in the latest unstable version, 3.10.5 which contains additional enhancements like USB support, and the latest stable version, 3.8.6.
« Previous ( 1 ... 7415 7416 7417 7418 7419 7420 7421 7422 7423 7424 7425 ... 7472 ) Next »