LinuxQuestions.org
LinuxAnswers - the LQ Linux tutorial section.
Go Back   LinuxQuestions.org > Forums > Linux Forums > Linux - Security
User Name
Password
Linux - Security This forum is for all security related questions.
Questions, tips, system compromises, firewalls, etc. are all included here.

Notices

Closed Thread
 
Search this Thread
Old 01-09-2005, 01:41 PM   #1
Capt_Caveman
Senior Member
 
Registered: Mar 2003
Distribution: Fedora
Posts: 3,658

Rep: Reputation: 57
LQ Security Report - January 9th 2005


January 4th 2005
5 issues handled (SF)
1. Business Objects Crystal Enterprise Report File Cross-Site S...
2. GNU A2PS fixps.in Script Insecure Temporary File Vulnerabili...
3. GNU A2PS psmandup.in Script Insecure Temporary File Vulnerab...
4. SugarCRM Multiple Cross-Site Scripting Vulnerability
5. PHProjekt Remote File Include Vulnerability

January 6th 2005
27 issues handled (SN)
[SA13731] Conectiva update for mplayer
[SA13726] Gentoo update for shoutcast-server
[SA13724] Gentoo update for mozilla/firefox/thunderbird
[SA13705] Fedora update for tetex
[SA13698] Gentoo update for phprojekt
[SA13729] Debian update for pcal
[SA13707] Debian update for cupsys
[SA13727] Gentoo update for mit-krb5
[SA13719] Gentoo update for linpopup
[SA13723] Debian update for nasm
[SA13703] ViewCVS "content-type" HTTP Response Splitting Vulnerability
[SA13701] Bugzilla Internal Error Response Cross-Site Scripting
[SA13706] Fedora update for kernel
[SA13735] Red Hat update for vim
[SA13730] Debian update for zip
[SA13720] Gentoo update for a2ps
[SA13715] Debian update for htmlheadline
[SA13714] HtmlHeadLine.sh Insecure Temporary File Creation
[SA13702] Debian update for perl
[SA13733] Red Hat update for fam
[SA13711] GNUBoard File Upload Vulnerability
[SA13709] FlatNuke PHP Script Creation Vulnerability
[SA13700] KorWeblog "lng" and "G_PATH" File Inclusion Vulnerability
[SA13699] PhotoPost Classifieds Multiple Vulnerabilities
[SA13697] ReviewPost PHP Pro Multiple Vulnerabilities
[SA13722] MyBulletinBoard "uid" SQL Injection Vulnerability
[SA13718] b2evolution "title" SQL Injection Vulnerability

January 7th 2005
32 issues handled across 6 distros (LAW)
mplayer vulnerabilities fix
Samba vulnerabilities fix
wxgtk2 library vulnerabilities fix
CUPS arbitrary code execution fix
htmlheadline insecure temporary files fi
nasm arbitrary code execution fix
zip arbitrary code execution fix
pcal arbitrary code execution fix
tiff denial of service fix
namazu2 cross-site scripting vulnerability fix
imlib2 arbitrary code execution fix
selinux-policy-targeted update
tetex update
pcmcia-cs- update
kernel update
mysql update
man-pages update
ruby update
gpdf update
hotplug update
LinPopUp Buffer overflow in message reply
a2ps Insecure temporary files handling
Mozilla, Firefox, Thunderbird Various vulnerabilities
shoutcast Remote code execution
mit-kbr5 Heap overflow in libkadm5srv
xine-lib Multiple overflows
phpGroupWare Various vulnerabilities
xzgv Multiple overflows
vilistextum Buffer overflow vulnerability
vim modeline vulnerabilities fix
mc security vulnerabilities fix
fam security issue fix
 
Old 01-09-2005, 01:43 PM   #2
Capt_Caveman
Senior Member
 
Registered: Mar 2003
Distribution: Fedora
Posts: 3,658

Original Poster
Rep: Reputation: 57
January 4th 2005 (SF)

Security Focus

1. Business Objects Crystal Enterprise Report File Cross-Site S...
BugTraq ID: 12107
Remote: Yes
Date Published: Dec 27 2004
Relevant URL: http://www.securityfocus.com/bid/12107
Summary:
Business Objects Crystal Enterprise is prone to a cross-site scripting vulnerability. An attacker could exploit this issue by enticing a user to following a malicious link to a Report (RPT) file. Malicious script embedded in the link could access properties of the vulnerable Crystal Enterprise site, allowing for various attacks such as theft of cookie-based authentication credentials.

2. GNU A2PS fixps.in Script Insecure Temporary File Vulnerabili...
BugTraq ID: 12108
Remote: No
Date Published: Dec 27 2004
Relevant URL: http://www.securityfocus.com/bid/12108
Summary:
GNU a2ps is prone to a vulnerability that may allow malicious local users to corrupt files. This issue is due to the fact that the 'fixps.in' script creates temporary files in an insecure manner, allowing symbolic link attacks. File corruption would occur in the context of the user running the script. It is not known if this issue could be leveraged to elevate privileges.

3. GNU A2PS psmandup.in Script Insecure Temporary File Vulnerab...
BugTraq ID: 12109
Remote: No
Date Published: Dec 27 2004
Relevant URL: http://www.securityfocus.com/bid/12109
Summary:
GNU a2ps is prone to a vulnerability that may allow malicious local users to corrupt files. This issue is due to the fact that the 'psmandup.in' script creates temporary files in an insecure manner, allowing symbolic link attacks. File corruption would occur in the context of the user running the script. It is not known if this issue could be leveraged to elevate privileges.

4. SugarCRM Multiple Cross-Site Scripting Vulnerability
BugTraq ID: 12113
Remote: Yes
Date Published: Dec 26 2004
Relevant URL: http://www.securityfocus.com/bid/12113
Summary:
SugarCRM is prone to multiple cross-site scripting vulnerabilities. These issues are exposed through various URI parameters of the 'index.php' script. The affected parameters are not adequately sanitized of HTML and script code before being output into dynamically generated pages. An attacker could exploit these issues by enticing a victim user into following a malicious link that contains hostile HTML and script code. This could be exploited to steal cookie-based authentication credentials. The discoverer of these issues stated that some of the issues could theoretically allow for execution of arbitrary PHP code, though has not provided further information as to how this is possible.

5. PHProjekt Remote File Include Vulnerability
BugTraq ID: 12116
Remote: Yes
Date Published: Dec 28 2004
Relevant URL: http://www.securityfocus.com/bid/12116
Summary:
A remote file include vulnerability affects PHProjekt. This issue is due to a failure of the application to properly sanitize user-supplied input prior to using it in a PHP 'include()' function call. An attacker may leverage this issue to execute arbitrary server-side script code on an affected computer with the privileges of the Web server process. This will facilitate unauthorized access.
 
Old 01-09-2005, 01:45 PM   #3
Capt_Caveman
Senior Member
 
Registered: Mar 2003
Distribution: Fedora
Posts: 3,658

Original Poster
Rep: Reputation: 57
January 6th 2005 (SN)

Secunia

[SA13731] Conectiva update for mplayer
Critical: Highly critical
Where: From remote
Impact: System access
Released: 2005-01-06
Conectiva has issued an update for mplayer. This fixes multiple
vulnerabilities, which can be exploited by malicious people to
compromise a user's system.
Full Advisory: http://secunia.com/advisories/13731/

[SA13726] Gentoo update for shoutcast-server
Critical: Highly critical
Where: From remote
Impact: System access
Released: 2005-01-06
Gentoo has issued an update for shoutcast-server. This fixes a
vulnerability, which potentially can be exploited by malicious people
to compromise a vulnerable system.
Full Advisory: http://secunia.com/advisories/13726/

[SA13724] Gentoo update for mozilla/firefox/thunderbird
Critical: Highly critical
Where: From remote
Impact: Spoofing, Exposure of system information, Exposure of sensitive information, DoS, System access
Released: 2005-01-05
Gentoo has issued updates for mozilla, firefox and thunderbird. These
fix some vulnerabilities, which can be exploited to cause a DoS (Denial
of Service), detect the presence of local files, spoof the file download
dialog, disclose sensitive information, or potentially compromise a
vulnerable system.
Full Advisory: http://secunia.com/advisories/13724/

[SA13705] Fedora update for tetex
Critical: Highly critical
Where: From remote
Impact: System access
Released: 2005-01-04
Fedora has issued an update for tetex. This fixes a vulnerability,
which potentially can be exploited by malicious people to compromise a
user's system.
Full Advisory: http://secunia.com/advisories/13705/

[SA13698] Gentoo update for phprojekt
Critical: Highly critical
Where: From remote
Impact: System access
Released: 2004-12-30
Gentoo has issued an update for phprojekt. This fixes a vulnerability,
which can be exploited by malicious people to compromise a vulnerable
system.
Full Advisory: http://secunia.com/advisories/13698/

[SA13729] Debian update for pcal
Critical: Moderately critical
Where: From remote
Impact: System access
Released: 2005-01-06
Debian has issued an update for pcal. This fixes two vulnerabilities,
which can be exploited by malicious people to compromise a user's
system.
Full Advisory: http://secunia.com/advisories/13729/

[SA13707] Debian update for cupsys
Critical: Moderately critical
Where: From remote
Impact: System access
Released: 2005-01-03
Debian has issued an update for cupsys. This fixes a vulnerability,
which potentially can be exploited by malicious people to compromise a
vulnerable system.
Full Advisory: http://secunia.com/advisories/13707/

[SA13727] Gentoo update for mit-krb5
Critical: Moderately critical
Where: From local network
Impact: System access
Released: 2005-01-06
Gentoo has issued an update for mit-krb5. This fixes a vulnerability,
which potentially can be exploited by malicious users to compromise a
vulnerable system.
Full Advisory: http://secunia.com/advisories/13727/

[SA13719] Gentoo update for linpopup
Critical: Moderately critical
Where: From local network
Impact: System access
Released: 2005-01-05
Gentoo has issued an update for linpopup. This fixes a vulnerability,
which can be exploited by malicious people to compromise a user's
system.
Full Advisory: http://secunia.com/advisories/13719/

[SA13723] Debian update for nasm
Critical: Less critical
Where: From remote
Impact: System access
Released: 2005-01-06
Debian has issued an update for nasm. This fixes a vulnerability, which
potentially can be exploited by malicious people to compromise a user's
system.
Full Advisory: http://secunia.com/advisories/13723/

[SA13703] ViewCVS "content-type" HTTP Response Splitting Vulnerability
Critical: Less critical
Where: From remote
Impact: Cross Site Scripting
Released: 2005-01-03
Joxean Koret has reported a vulnerability in ViewCVS, which can be
exploited by malicious people to conduct cross-site scripting attacks.
Full Advisory: http://secunia.com/advisories/13703/

[SA13701] Bugzilla Internal Error Response Cross-Site Scripting
Critical: Less critical
Where: From remote
Impact: Cross Site Scripting
Released: 2005-01-04
Michael Krax has reported a vulnerability in Bugzilla, which can be
exploited by malicious people to conduct cross-site scripting attacks.
Full Advisory: http://secunia.com/advisories/13701/

[SA13706] Fedora update for kernel
Critical: Less critical
Where: From local network
Impact: Unknown, Exposure of sensitive information, Privilege escalation, DoS
Released: 2005-01-04
Fedora has issued an update for the kernel. This fixes multiple
vulnerabilities, where some have unknown impacts and others can be
exploited to gain knowledge of sensitive information, cause a DoS
(Denial of Service), or gain escalated privileges.
Full Advisory: http://secunia.com/advisories/13706/

[SA13735] Red Hat update for vim
Critical: Less critical
Where: Local system
Impact: Privilege escalation
Released: 2005-01-06
Red Hat has issued an update for vim. This fixes some vulnerabilities,
which can be exploited by malicious, local users to gain escalated
privileges.
Full Advisory: http://secunia.com/advisories/13735/

[SA13730] Debian update for zip
Critical: Less critical
Where: Local system
Impact: Privilege escalation
Released: 2005-01-06
Debian has issued an update for zip. This fixes a vulnerability, which
potentially can be exploited by malicious, local users to gain
escalated privileges.
Full Advisory: http://secunia.com/advisories/13730/

[SA13720] Gentoo update for a2ps
Critical: Less critical
Where: Local system
Impact: Privilege escalation
Released: 2005-01-05
Gentoo has issued an update for a2ps. This fixes two vulnerabilities,
which can be exploited by malicious, local users to perform certain
actions on a vulnerable system with escalated privileges.
Full Advisory: http://secunia.com/advisories/13720/

[SA13715] Debian update for htmlheadline
Critical: Less critical
Where: Local system
Impact: Privilege escalation
Released: 2005-01-03
Debian has issued an update for htmlheadline. This fixes a
vulnerability, which can be exploited by malicious, local users to
perform certain actions on a vulnerable system with escalated
privileges.
Full Advisory: http://secunia.com/advisories/13715/

[SA13714] HtmlHeadLine.sh Insecure Temporary File Creation
Critical: Less critical
Where: Local system
Impact: Privilege escalation
Released: 2005-01-03
Javier Fernández-Sanguino Peña has reported a vulnerability in
HtmlHeadLine.sh, which can be exploited by malicious, local users to
perform certain actions on a vulnerable system with escalated
privileges.
Full Advisory: http://secunia.com/advisories/13714/

[SA13702] Debian update for perl
Critical: Less critical
Where: Local system
Impact: Privilege escalation
Released: 2005-01-03
Debian has issued an update for perl. This fixes some vulnerabilities,
which can be exploited by malicious, local users to perform certain
actions on a vulnerable system with escalated privileges.
Full Advisory: http://secunia.com/advisories/13702/

[SA13733] Red Hat update for fam
Critical: Not critical
Where: Local system
Impact: Exposure of system information
Released: 2005-01-06
Red Hat has issued an update for fam. This fixes an old security issue,
which can be exploited by malicious, local users to gain knowledge of
certain system information.
Full Advisory: http://secunia.com/advisories/13733

[SA13711] GNUBoard File Upload Vulnerability
Critical: Highly critical
Where: From remote
Impact: System access
Released: 2005-01-04
Jeremy Bae has reported a vulnerability in GNUBoard, which potentially
can be exploited by malicious people to compromise a vulnerable
system.
Full Advisory: http://secunia.com/advisories/13711/

[SA13709] FlatNuke PHP Script Creation Vulnerability
Critical: Highly critical
Where: From remote
Impact: Manipulation of data, System access
Released: 2005-01-05
Pierquinto "Mantra" Manco has reported a vulnerability in FlatNuke,
which can be exploited by malicious people to compromise a vulnerable
system.
Full Advisory: http://secunia.com/advisories/13709/

[SA13700] KorWeblog "lng" and "G_PATH" File Inclusion Vulnerability
Critical: Highly critical
Where: From remote
Impact: System access
Released: 2005-01-03
Min-sung Choi has reported a vulnerability in KorWeblog, which can be
exploited by malicious people to compromise a vulnerable system.
Full Advisory: http://secunia.com/advisories/13700/

[SA13699] PhotoPost Classifieds Multiple Vulnerabilities
Critical: Highly critical
Where: From remote
Impact: Cross Site Scripting, Manipulation of data, System access
Released: 2005-01-04
James Bercegay has reported some vulnerabilities in PhotoPost
Classifieds, which can be exploited by malicious people to conduct
cross-site scripting and SQL injection attacks, and compromise a
vulnerable system.
Full Advisory: http://secunia.com/advisories/13699/

[SA13697] ReviewPost PHP Pro Multiple Vulnerabilities
Critical: Highly critical
Where: From remote
Impact: Cross Site Scripting, Manipulation of data, System access
Released: 2005-01-04
James Bercegay has reported some vulnerabilities in ReviewPost PHP Pro,
which can be exploited by malicious people to conduct cross-site
scripting and SQL injection attacks, and compromise a vulnerable
system.
Full Advisory: http://secunia.com/advisories/13697/

[SA13722] MyBulletinBoard "uid" SQL Injection Vulnerability
Critical: Moderately critical
Where: From remote
Impact: Manipulation of data
Released: 2005-01-05
scottm has reported a vulnerability in MyBulletinBoard, which can be
exploited by malicious people to conduct SQL injection attacks.
Full Advisory: http://secunia.com/advisories/13722/

[SA13718] b2evolution "title" SQL Injection Vulnerability
Critical: Moderately critical
Where: From remote
Impact: Manipulation of data
Released: 2005-01-06
r0ut3r has reported a vulnerability in b2evolution, which can be
exploited by malicious people to conduct SQL injection attacks.
Full Advisory: http://secunia.com/advisories/13718/
 
Old 01-09-2005, 01:47 PM   #4
Capt_Caveman
Senior Member
 
Registered: Mar 2003
Distribution: Fedora
Posts: 3,658

Original Poster
Rep: Reputation: 57
January 7th 2005 (LAW)

Linux Advisory Watch

Distribution: Conectiva

* Conectiva: mplayer vulnerabilities fix
iDEFENSE[2] found a buffer overflow vulnerability[3] due to an error
in dynamically allocating memory and further investigation by mplayer
team found more vulnerabilities. This announcement fixes these
vulnerabilities.
http://www.linuxsecurity.com/content/view/117769

* Conectiva: Samba vulnerabilities fix
Remote exploitation of an integer overflow vulnerability[2] in the
smbd daemon could allow an attacker to cause controllable heap
corruption, leading to execution of arbitrary commands with root
privileges.
http://www.linuxsecurity.com/content/view/117793

* Conectiva: wxgtk2 library vulnerabilities fix
Several vulnerabilities were found in libtiff, which may also be in
wxGTK library, since it has a private copy of libtiff's source.
http://www.linuxsecurity.com/content/view/117794

Distribution: Debian

* Debian: CUPS arbitrary code execution fix
An iDEFENSE security researcher discovered a buffer overflow in xpdf,
the Portable Document Format (PDF) suite. Similar code is present in
the PDF processing part of CUPS. A maliciously crafted PDF file
could exploit this problem, leading to the execution of arbitrary
code.
http://www.linuxsecurity.com/content/view/117725

* Debian: htmlheadline insecure temporary files fix
Javier Fern=C3=A1ndez-Sanguino Pe=C3=B1a has discovered multiple insecure uses
of temporary files that could lead to overwriting arbitrary files via
a symlink attack.
http://www.linuxsecurity.com/content/view/117726

* Debian: nasm arbitrary code execution fix
Jonathan Rockway discovered a buffer overflow in nasm, the
general-purpose x86 assembler, which could lead to the execution of
arbitrary code when compiling a maliciously crafted assembler source
file.
http://www.linuxsecurity.com/content/view/117756

* Debian: zip arbitrary code execution fix
A buffer overflow has been discovered in zip, the archiver for .zip
files. When doing recursive folder compression the program did not
check the resulting path length, which would lead to memory being
overwritten. A malicious person could convince a user to create an
archive containing a specially crafted path name, which could lead to
the execution of arbitrary code.
http://www.linuxsecurity.com/content/view/117767

* Debian: pcal arbitrary code execution fix
Danny Lungstrom discovered two buffer overflows in pcal, a program to
generate Postscript calendars, that could lead to the execution of
arbitrary code when compiling a calendar.
http://www.linuxsecurity.com/content/view/117770

* Debian: tiff denial of service fix
Dmitry V. Levin discovered a buffer overflow in libtiff, the Tag
Image File Format library for processing TIFF graphics files. Upon
reading a TIFF file it is possible to crash the application, and
maybe also to execute arbitrary code.
http://www.linuxsecurity.com/content/view/117780

* Debian: namazu2 cross-site scripting vulnerability fix
A cross-site scripting vulnerability has been discovered in namazu2,
a full text search engine. An attacker could prepare specially
crafted input that would not be sanitised by namazu2 and hence
displayed verbatim for the victim.
http://www.linuxsecurity.com/content/view/117790

* Debian: imlib2 arbitrary code execution fix
Pavel Kankovsky discovered that several overflows found in the libXpm
library were also present in imlib and imlib2, imaging libraries for
X11. An attacker could create a carefully crafted image file in such
a way that it could cause an application linked with imlib or imlib2
to execute arbitrary code when the file was opened by a victim.
http://www.linuxsecurity.com/content/view/117791

Distribution: Fedora

* Fedora: selinux-policy-targeted-1.17.30-2.62 update
Fix for postgres startup scripts.
http://www.linuxsecurity.com/content/view/117729

* Fedora: tetex-2.0.2-14FC2.1 update
The updated tetex package fixes a buffer overflow which allows
attackers to cause the internal xpdf library used by applications in
tetex to crash, and possibly to execute arbitrary code. The Common
Vulnerabilities and Exposures projects (cve.mitre.org) has assigned
the name CAN-2004-1125 to this issue.
http://www.linuxsecurity.com/content/view/117742

* Fedora: tetex-2.0.2-21.2 update
The updated tetex package fixes a buffer overflow which allows
attackers to cause the internal xpdf library used by applications in
tetex to crash, and possibly to execute arbitrary code. The Common
Vulnerabilities and Exposures projects (cve.mitre.org) has assigned
the name CAN-2004-1125 to this issue.
http://www.linuxsecurity.com/content/view/117743

* Fedora: pcmcia-cs-3.2.7-2.1 update
This update fixes bug #135508, silencing a warning message on cardmgr
startup.
http://www.linuxsecurity.com/content/view/117750

* Fedora: pcmcia-cs-3.2.7-1.8.2.2 update
This update fixes bug #135508, silencing a warning message on cardmgr
startup.
http://www.linuxsecurity.com/content/view/117751

* Fedora: kernel-2.6.9-1.11_FC2 update
A large change over previous kernels has been made. The 4G:4G memory
split patch has been dropped, and Fedora kernels now revert back to
the upstream 3G:1G kernel/userspace split.
http://www.linuxsecurity.com/content/view/117752

* Fedora: kernel-2.6.9-1.724_FC3 update
A large change over previous kernels has been made. The 4G:4G memory
split patch has been dropped, and Fedora kernels now revert back to
the upstream 3G:1G kernel/userspace split.
http://www.linuxsecurity.com/content/view/117753

* Fedora: mysql-3.23.58-14 update
work around SELinux restriction that breaks mysql_install_db (bug
#141062). Add a restorecon to keep the mysql.log file in the right
context (bz#143887). Fix init script to not need a valid username for
startup check (bz#142328). Don't assume /etc/my.cnf will specify
pid-file (bz#143724)
http://www.linuxsecurity.com/content/view/117777

* Fedora: man-pages-ja-20041215-1.FC3.0 update
prefer GNU fileutils's chown(1) rather than gnumaniak's. (#142077)
http://www.linuxsecurity.com/content/view/117783

* Fedora: ruby-1.8.2-1.FC3.0 update
New upstream release.
http://www.linuxsecurity.com/content/view/117784

* Fedora: man-pages-ja-20041215-1.FC2.0 update
Fixed wrong filename for in.rlogind.8 man pages. prefer GNU
fileutils's chown(1) rather than gnumaniak's.
http://www.linuxsecurity.com/content/view/117785

* Fedora: tetex-2.0.2-14FC2.1 update
The updated tetex package fixes a buffer overflow which allows
attackers to cause the internal xpdf library used by applications in
tetex to crash, and possibly to execute arbitrary code. The Common
Vulnerabilities and Exposures projects (cve.mitre.org) has assigned
the name CAN-2004-1125 to this issue.
http://www.linuxsecurity.com/content/view/117786

* Fedora: tetex-2.0.2-21.2 update
The updated tetex package fixes a buffer overflow which allows
attackers to cause the internal xpdf library used by applications in
tetex to crash, and possibly to execute arbitrary code. The Common
Vulnerabilities and Exposures projects (cve.mitre.org) has assigned
the name CAN-2004-1125 to this issue.
http://www.linuxsecurity.com/content/view/117787

* Fedora: gpdf-2.8.0-8.2 update
Applied patch to fix CAN-2004-1125 (bug #144210)
http://www.linuxsecurity.com/content/view/117788

* Fedora: gpdf-2.8.0-4.2.fc2 update
Applied patch to fix CAN-2004-1125 (bug #144210)
http://www.linuxsecurity.com/content/view/117789

* Fedora: hotplug-2004_04_01-8.1 update
This adds a fix to properly set the path for devices on USB removal.
http://www.linuxsecurity.com/content/view/117792

Distribution: Gentoo

* Gentoo: LinPopUp Buffer overflow in message reply
LinPopUp contains a buffer overflow potentially allowing execution of
arbitrary code.
http://www.linuxsecurity.com/content/view/117760

* Gentoo: a2ps Insecure temporary files handling
The fixps and psmandup scripts in the a2ps package are vulnerable to
symlink attacks, potentially allowing a local user to overwrite
arbitrary files.
http://www.linuxsecurity.com/content/view/117761

* Gentoo: Mozilla, Firefox, Thunderbird Various vulnerabilities
Various vulnerabilities were found and fixed in Mozilla-based
products, ranging from a potential buffer overflow and temporary
files disclosure to anti-spoofing issues.
http://www.linuxsecurity.com/content/view/117768

* Gentoo: shoutcast Remote code execution
Shoutcast Server contains a possible buffer overflow that could lead
to the execution of arbitrary code.
http://www.linuxsecurity.com/content/view/117771

* Gentoo: mit-kbr5 Heap overflow in libkadm5srv
The MIT Kerberos 5 administration library (libkadm5srv) contains a
heap overflow that could lead to execution of arbitrary code.
http://www.linuxsecurity.com/content/view/117778

* Gentoo: tiff New overflows in image decoding
An integer overflow has been found in the TIFF library image decoding
routines and the tiffdump utility, potentially allowing arbitrary
code execution.
http://www.linuxsecurity.com/content/view/117779

* Gentoo: xine-lib Multiple overflows
xine-lib contains multiple overflows potentially allowing execution
of arbitrary code.
http://www.linuxsecurity.com/content/view/117781

* Gentoo: phpGroupWare Various vulnerabilities
Multiple vulnerabilities have been discovered in phpGroupWare that
could lead to information disclosure or remote compromise.
http://www.linuxsecurity.com/content/view/117798

* Gentoo: xzgv Multiple overflows
xzgv contains multiple overflows that may lead to the execution of
arbitrary code.
http://www.linuxsecurity.com/content/view/117806

* Gentoo: vilistextum Buffer overflow vulnerability
Vilistextum is vulnerable to a buffer overflow that allows an
attacker to execute arbitrary code through the use of a malicious
webpage.
http://www.linuxsecurity.com/content/view/117807

Distribution: Mandrake

* Mandrake: libtiff multiple vulnerabilities fix
Several vulnerabilities have been discovered in the libtiff package.
http://www.linuxsecurity.com/content/view/117801

* Mandrake: wcGTK2 vulnerabilities fix
Several vulnerabilities have been discovered in the libtiff package;
wxGTK2 uses a libtiff code tree, so it may have the same
vulnerabilities.
http://www.linuxsecurity.com/content/view/117802

* Mandrake: vim modeline vulnerabilities fix
Several "modeline"-related vulnerabilities were discovered in Vim by
Ciaran McCreesh. The updated packages have been patched with Bram
Moolenaar's vim 6.3.045 patch which fixes the reported
vulnerabilities and adds more conservative "modeline" rights.
http://www.linuxsecurity.com/content/view/117803

* Mandrake: nasm buffer overflow vulnerability fix
A buffer overflow in nasm was discovered by Jonathan Rockway. This
vulnerability could lead to the execution of arbitrary code when
compiling a malicious assembler source file.
http://www.linuxsecurity.com/content/view/117804

* Mandrake: libtiff multiple vulnerabilities fix
Several vulnerabilities have been discovered in the libtiff package.
http://www.linuxsecurity.com/content/view/117805

Distribution: Red Hat

* Red Hat: mc security vulnerabilities fix
An updated mc package that resolves several shell escape security
issues is now available.
http://www.linuxsecurity.com/content/view/117772

* Red Hat: fam security issue fix
Updated fam packages that fix an information disclosure bug are now
available.
http://www.linuxsecurity.com/content/view/117773

* Red Hat: VIM security vulnerability fix
Updated vim packages that fix a modeline vulnerability are now
available.
http://www.linuxsecurity.com/content/view/117774

* Red Hat: samba security issue fix
Updated samba packages that fix an integer overflow vulnerability are
now available for Red Hat Enterprise Linux 2.1.
http://www.linuxsecurity.com/content/view/117775
 
  


Closed Thread


Thread Tools Search this Thread
Search this Thread:

Advanced Search

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off


Similar Threads
Thread Thread Starter Forum Replies Last Post
LQ Security Report Oct 2005 unSpawn Linux - Security 5 11-09-2005 03:16 PM
LQ Security Report - May 8th 2005 Capt_Caveman Linux - Security 3 05-08-2005 10:08 PM
LQ Security Report - January 30th 2005 Capt_Caveman Linux - Security 4 01-30-2005 11:21 PM
LQ Security Report - January 23rd 2005 Capt_Caveman Linux - Security 3 01-23-2005 11:14 PM
LQ Security Report - Aug 9th 2004 Capt_Caveman Linux - Security 2 08-09-2004 12:28 AM


All times are GMT -5. The time now is 01:05 PM.

Main Menu
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
identi.ca: @linuxquestions
Facebook: linuxquestions Google+: linuxquestions
Open Source Consulting | Domain Registration