Showing all newswire headlines

View by date, instead?

« Previous ( 1 ... 7427 7428 7429 7430 7431 7432 7433 7434 7435 7436 7437 ... 7439 ) Next »

Red Hat alert: new modutils release addresses more local root compromise possibilities

  • Mailing list (Posted by dave on Nov 22, 2000 3:50 PM EDT)
  • Story Type: Security; Groups: Red Hat
A new modutils-

Red Hat alert: ghostscript uses mktemp instead of mkstemp, and uses an improper LD_RUN_PATH

  • Mailing list (Posted by dave on Nov 22, 2000 12:59 PM EDT)
  • Story Type: Security; Groups: Red Hat
ghostscript makes use of mktemp instead of mkstemp to create temp files; and also uses improper LD_RUN_PATH values, causing it to search for libraries in the current directory.

Debian alert: New version of modutils released

  • Mailing list (Posted by dave on Nov 22, 2000 12:07 PM EDT)
  • Story Type: Security; Groups: Debian
Sebastian Krahmer raised an issue in modutils. In an ideal world modprobe should trust the kernel to only pass valid parameters to modprobe. However he has found at least one local root exploit because high level kernel code passed unverified parameters direct from the user to modprobe. So modprobe no longer trusts kernel input and switches to a safemode.

Debian alert: No koules vulnerability

  • Mailing list (Posted by dave on Nov 22, 2000 12:06 PM EDT)
  • Story Type: Security; Groups: Debian
Guido Bakker has reported a local root vulnerability that can result in local users gaining root permission on a host running koules.sndsrv.linux using a buffer overflow.

Debian alert: New version of elvis-tiny released

  • Mailing list (Posted by dave on Nov 22, 2000 11:53 AM EDT)
  • Story Type: Security; Groups: Debian
Topi Miettinen audited elvis-tiny and raised an issue covering the use and creation of temporary files. Those files are created with a predictable pattern and O_EXCL flag is not used when opening. This makes users of elvis-tiny vulnerable to race conditions and/or data lossage.

Debian alert: New Debian xmcd packages released

  • Mailing list (Posted by dave on Nov 22, 2000 8:31 AM EDT)
  • Story Type: Security; Groups: Debian
The Debian GNU/Linux xmcd package has historically installed two setuid helpers for accessing cddb databases and SCSI cdrom drives. More recently, the package offered the administrator the chance to remove these setuid flags, but did so incorrectly.

Debian alert: New Debian ncurses packages released

  • Mailing list (Posted by dave on Nov 22, 2000 7:43 AM EDT)
  • Story Type: Security; Groups: Debian
The version of the ncurses display library shipped with Debian GNU/Linux 2.2 is vulnerable to several buffer overflows in the parsing of terminfo database files. This problem was discovered by Jouko Pynnönen <jouko@solutions.fi>. The problems are only exploitable in the presence of setuid binaries linked to ncurses which use these particular functions, including xmcd versions before 2.5pl1-7.1.

Debian alert: New version of ethereal released

  • Mailing list (Posted by dave on Nov 21, 2000 5:38 PM EDT)
  • Story Type: Security; Groups: Debian
hacksware reported a buffer overflow in the AFS packet parsing code in ethereal. Gerald Combs then found more overflows in the netbios and ntp decoding logic as well. An attacker can exploit those overflows by sending carefully crafted packets to a network that is being monitored by ethereal.

Debian alert: New version of joe released

  • Mailing list (Posted by dave on Nov 21, 2000 3:57 PM EDT)
  • Story Type: Security; Groups: Debian
When joe (Joe's Own Editor) dies due to a signal instead of a normal exit it saves a list of the files it is editing to a file called `DEADJOE' in its current directory. Unfortunately this wasn't done safely which made joe vulnerable to a symlink attack.

Red Hat alert: Updated openssh packages available for Red Hat Linux 7

  • Mailing list (Posted by dave on Nov 21, 2000 12:39 PM EDT)
  • Story Type: Security; Groups: Red Hat
Updated openssh packages are now available for Red Hat Linux 7.

Red Hat alert: Updated joe packages are available for Red Hat Linux 5.2, 6.x and 7

  • Mailing list (Posted by dave on Nov 20, 2000 6:21 AM EDT)
  • Story Type: Security; Groups: Red Hat
Updated joe packages are available for Red Hat Linux 5.2, 6.x and 7.

Debian alert: New version of tcpdump released

  • Mailing list (Posted by dave on Nov 20, 2000 6:14 AM EDT)
  • Story Type: Security; Groups: Debian
During internal source code auditing by FreeBSD several buffer overflows were found which allow an attacker to make tcpdump crash by sending carefully crafted packets to a network that is being monitored with tcpdump.

Debian alert: New version of modutils released

  • Mailing list (Posted by dave on Nov 20, 2000 6:03 AM EDT)
  • Story Type: Security; Groups: Debian
Sebastian Krahmer found a problem in the modprobe utility that could be exploited by local users to run arbitrary commands as root if the machine is running a kernel with kmod enabled.

Debian alert: New version of cupsys released

  • Mailing list (Posted by dave on Nov 19, 2000 7:29 AM EDT)
  • Story Type: Security; Groups: Debian
Mandrake has recently released a security advisory against CUPS raising two issues:

Debian alert: New Debian cron packages released

  • Mailing list (Posted by dave on Nov 17, 2000 6:33 PM EDT)
  • Story Type: Security; Groups: Debian
The version of Vixie Cron shipped with Debian GNU/Linux 2.2 is vulnerable to a local attack, discovered by Michal Zalewski. Several problems, including insecure permissions on temporary files and race conditions in their deletion, allowed attacks from a denial of service (preventing the editing of crontabs) to an escalation of priviledge (when another user edited their crontab).

Debian alert: New version of openssh released

  • Mailing list (Posted by dave on Nov 17, 2000 6:30 PM EDT)
  • Story Type: Security; Groups: Debian
The adv.fwd security advisory from OpenBSD reported a problem with openssh that Jacob Langseth <jwl@pobox.com> found: when the connection is established the remote ssh server can force the ssh client to enable agent and X11 forwarding.

Red Hat alert: Updated modutils fixing local root security bug available

  • Mailing list (Posted by dave on Nov 17, 2000 1:47 PM EDT)
  • Story Type: Security; Groups: Red Hat
A local root exploit in modutils has been fixed. 2000-11-17: New packages available for Red Hat Linux 6.2 to fix an error in the previous packages.

Red Hat alert: New Netscape packages available

  • Mailing list (Posted by dave on Nov 17, 2000 1:46 PM EDT)
  • Story Type: Security; Groups: Red Hat
New Netscape packages are available that fix a buffer overflow in parsing HTML. It is recommended that all Netscape users update to the fixed packages.

SuSE alert: tcpdump

  • Mailing list (Posted by dave on Nov 17, 2000 6:39 AM EDT)
  • Story Type: Security; Groups: SUSE
tcpdump is a widespread network/packet analysis tool, also known as a packet sniffer, used in unix/unix-like environment. Several overflowable buffers have been found in SuSE's version of tcpdump that could allow a remote attacker to crash the local tcpdump process. Since tcpdump may be used in combination with intrusion detection systems, a crashed tcpdump process may disable the network monitoring system as a whole. The FreeBSD team who found these vulnerabilities also reported that tcpdump's portion of code that can decode AFS ACL (AFS=Andrew File System, a network filesystem, ACL=Access Control List) packets is vulnerable to a (remotely exploitable) buffer overrun attack that could allow a remote attacker to execute arbitrary commands as root since the tcpdump program usually requires root privileges to gain access to the raw network socket. The versions of tcpdump as shipped with SuSE distributions do not contain the AFS packet decoding capability and are therefore not vulnerable to this second form of attack.

Red Hat alert: Updated modutils fixing local root security bug available

  • Mailing list (Posted by dave on Nov 16, 2000 8:31 AM EDT)
  • Story Type: Security; Groups: Red Hat
A local root exploit in modutils has been fixed.

« Previous ( 1 ... 7427 7428 7429 7430 7431 7432 7433 7434 7435 7436 7437 ... 7439 ) Next »