LinuxQuestions.org
Latest LQ Deal: Latest LQ Deals
Home Forums Tutorials Articles Register
Go Back   LinuxQuestions.org > Forums > Linux Forums > Linux - Security
User Name
Password
Linux - Security This forum is for all security related questions.
Questions, tips, system compromises, firewalls, etc. are all included here.

Notices


Closed Thread
  Search this Thread
Old 07-17-2005, 11:41 PM   #1
Capt_Caveman
Senior Member
 
Registered: Mar 2003
Distribution: Fedora
Posts: 3,658

Rep: Reputation: 69
LQ Security Report - July 19th 2005


July 14th 2005
74 issues reported (SN)
[SA16061] Sun Solaris / SEAM Kerberos "krb5_recvauth()" Vulnerability
[SA16060] Sun Solaris / SEAM Kerberos KDC Vulnerabilities
[SA16057] Red Hat update for krb5
[SA16054] Fedora update for krb5
[SA16052] Gentoo update for mit-krb5
[SA16050] SUSE update for multiple packages
[SA16041] Kerberos V5 Multiple Vulnerabilities
[SA16034] Mandriva update for krb5
[SA16029] Debian update for phpgroupware
[SA16027] Gentoo update for phpwebsite
[SA16025] Gentoo update for acroread
[SA16023] Trustix update for zlib
[SA16018] Slackware update for php
[SA16017] Mandriva update for mplayer
[SA16015] Red Hat update for Adobe Acrobat Reader
[SA16014] SUSE update for php/pear XML::RPC
[SA16012] Slackware update for zlib
[SA16002] Debian update for drupal
[SA15999] Debian update for egroupware
[SA15993] Gentoo update for phpgroupware/egroupware
[SA15987] MMS Ripper MMST Streams Buffer Overflow Vulnerability
[SA15985] USANet Creations Products Shell Command Injection Vulnerability
[SA15981] pngcntrp "kaiseki.cgi" Shell Command Injection Vulnerability
[SA15978] OpenBSD update for zlib
[SA16063] Debian update for tiff
[SA16047] Apple Mac OS X Two Vulnerabilities
[SA16045] Mandriva update for ruby
[SA16026] Debian update for hteditor
[SA16020] Gentoo update for ruby
[SA16000] Debian update for ettercap
[SA15997] Debian update for ruby1.8
[SA15992] Debian update for cvs
[SA15988] Affix Buffer Overflow and Shell Command Injection Vulnerabilities
[SA16066] Gentoo update for bugzilla
[SA16037] SGI Advanced Linux Environment Multiple Updates
[SA16036] SGI Advanced Linux Environment Multiple Updates
[SA16035] SGI Advanced Linux Environment Multiple Updates
[SA16030] Debian update for gzip
[SA16021] Bugzilla Two Information Disclosure Vulnerabilities
[SA16019] Mandriva update for cpio
[SA16016] AIX ftpd Unspecified Denial of Service Vulnerability
[SA16013] Mandriva update for leafnode
[SA16010] Mandriva update for clamav
[SA15996] Debian update for gedit
[SA16072] Fedora update for net-snmp
[SA16046] Mandriva update for dhcpcd
[SA16032] Debian update for squid
[SA16006] SGI ProPack arrayd Privilege Escalation Vulnerability
[SA15984] Debian update for dhcpcd
[SA15982] dhcpcd Denial of Service Vulnerability
[SA16053] Debian update for centericq
[SA16040] xpvm "xpvm.tcl" Insecure Temporary File Creation
[SA16039] Heartbeat Multiple Insecure Temporary File Creation
[SA16038] SMS "mpl.sh" Insecure Temporary File Creation
[SA16024] Debian update for fuse
[SA15989] Backup Manager Unspecified Insecure Temporary File Creation
[SA15980] Linux Kernel IA32 Compatibility "execve()" Buffer Overflow
[SA15977] Elmo "stats_dump()" Insecure Temporary File Creation
[SA16059] Mozilla Multiple Vulnerabilities
[SA16049] Yawp "_Yawp[conf_path]" File Inclusion Vulnerability
[SA16043] Firefox Multiple Vulnerabilities
[SA16031] iPhotoAlbum File Inclusion Vulnerabilities
[SA16022] SPiD "lang_path" File Inclusion Vulnerability
[SA16011] PPA "config[ppa_root_path]" File Inclusion Vulnerability
[SA16009] Squito Gallery "photoroot" File Inclusion Vulnerability
[SA16001] phpWebSite PEAR XML_RPC PHP Code Execution
[SA15994] phpSecurePages "cfgProgDir" File Inclusion Vulnerability
[SA15990] PunBB SQL Injection and PHP Code Execution Vulnerabilities
[SA16028] Moodle Unspecified Vulnerabilities
[SA16003] DownloadProtect "file" Disclosure of Sensitive Information
[SA15991] Oracle Products Multiple Unspecified Vulnerabilities
[SA15976] Id Board free "f" SQL Injection Vulnerability
[SA16062] Mozilla Thunderbird XBL Controls Script Execution Vulnerability
[SA15983] Blog Torrent User Credentials Disclosure Security Issue

July 15th 2005
37 issues reported over 4 distros (LAW)
ht
fuse
drupal
egroupware
ettercap
dhcpd
ruby
squid
gzip
gedit
centericq
tiff
squirrelmail
phpgroupware
kdegraphics
kernel
procps
libwnck
metacity
gaim
audit
libxml2
lam
vixie-cron
krb5
net-snmp
selinux-policy
bind
rpm
openssh
pam
phpWebSite
Adobe Acrobat
Bugzilla
pam_ldap and nss_ldap
Mozilla Firefox
cups
 
Old 07-17-2005, 11:44 PM   #2
Capt_Caveman
Senior Member
 
Registered: Mar 2003
Distribution: Fedora
Posts: 3,658

Original Poster
Rep: Reputation: 69
July 14th 2005 (SN)

Secunia

Part A

[SA16061] Sun Solaris / SEAM Kerberos "krb5_recvauth()" Vulnerability
Critical: Highly critical
Where: From remote
Impact: DoS, System access
Released: 2005-07-13
Sun has acknowledged a vulnerability in Solaris and SEAM, which can be
exploited by malicious people to cause a DoS (Denial of Service) or
potentially compromise a vulnerable system.
Full Advisory:
http://secunia.com/advisories/16061/

[SA16060] Sun Solaris / SEAM Kerberos KDC Vulnerabilities
Critical: Highly critical
Where: From remote
Impact: DoS, System access
Released: 2005-07-13
Sun has acknowledged some vulnerabilities in Solaris and SEAM, which
can be exploited by malicious people to cause a DoS (Denial of Service)
or potentially compromise a vulnerable system.
Full Advisory:
http://secunia.com/advisories/16060/

[SA16057] Red Hat update for krb5
Critical: Highly critical
Where: From remote
Impact: Manipulation of data, Exposure of system information, DoS,
System access
Released: 2005-07-13
Red Hat has issued an update for krb5. This fixes some vulnerabilities,
which can be exploited by malicious people to cause a DoS (Denial of
Service), overwrite arbitrary files on a user's system, gain knowledge
of various information, or potentially compromise a vulnerable system.
Full Advisory:
http://secunia.com/advisories/16057/

[SA16054] Fedora update for krb5
Critical: Highly critical
Where: From remote
Impact: Manipulation of data, Exposure of system information, DoS,
System access
Released: 2005-07-13
Fedora has issued an update for krb5. This fixes some vulnerabilities,
which can be exploited by malicious people to cause a DoS (Denial of
Service), to overwrite arbitrary files on a user's system, to gain
knowledge of various information, or potentially compromise a
vulnerable system.
Full Advisory:
http://secunia.com/advisories/16054/

[SA16052] Gentoo update for mit-krb5
Critical: Highly critical
Where: From remote
Impact: DoS, System access
Released: 2005-07-13
Gentoo has issued an update for mit-krb5. This fixes some
vulnerabilities, which can be exploited by malicious people to cause a
DoS (Denial of Service) or potentially compromise a vulnerable system.
Full Advisory:
http://secunia.com/advisories/16052/

[SA16050] SUSE update for multiple packages
Critical: Highly critical
Where: From remote
Impact: Security Bypass, Manipulation of data, DoS, System access
Released: 2005-07-13
SUSE has issued updates for multiple packages. This fixes some
vulnerabilities, which can be exploited by malicious people to cause a
DoS (Denial of Service), bypass certain security restrictions, or
compromise a user's system.
Full Advisory:
http://secunia.com/advisories/16050/

[SA16041] Kerberos V5 Multiple Vulnerabilities
Critical: Highly critical
Where: From remote
Impact: DoS, System access
Released: 2005-07-13
Some vulnerabilities have been reported in Kerberos, which can be
exploited by malicious people to cause a DoS (Denial of Service) or
potentially compromise a vulnerable system.
Full Advisory:
http://secunia.com/advisories/16041/

[SA16034] Mandriva update for krb5
Critical: Highly critical
Where: From remote
Impact: Manipulation of data, Exposure of system information, DoS,
System access
Released: 2005-07-14
Mandriva has issued an update for krb5. This fixes some
vulnerabilities, which can be exploited by malicious people to cause a
DoS (Denial of Service), overwrite arbitrary files on a user's system,
gain knowledge of various information, or potentially compromise a
vulnerable system.
Full Advisory:
http://secunia.com/advisories/16034/

[SA16029] Debian update for phpgroupware
Critical: Highly critical
Where: From remote
Impact: System access
Released: 2005-07-14
Debian has issued an update for phpgroupware. This fixes a
vulnerability, which can be exploited by malicious people to compromise
a vulnerable system.
Full Advisory:
http://secunia.com/advisories/16029/

[SA16027] Gentoo update for phpwebsite
Critical: Highly critical
Where: From remote
Impact: Security Bypass, Manipulation of data, Exposure of
sensitive information, System access
Released: 2005-07-11
Gentoo has issued an update for phpwebsite. This fixes some
vulnerabilities, which can be exploited by malicious people to conduct
SQL injection attacks, disclose sensitive information and compromise a
vulnerable system.
Full Advisory:
http://secunia.com/advisories/16027/

[SA16025] Gentoo update for acroread
Critical: Highly critical
Where: From remote
Impact: System access
Released: 2005-07-11
Gentoo has issued an update for acroread. This fixes a vulnerability,
which can be exploited by malicious people to compromise a user's
system.
Full Advisory:
http://secunia.com/advisories/16025/

[SA16023] Trustix update for zlib
Critical: Highly critical
Where: From remote
Impact: DoS, System access
Released: 2005-07-11
Trustix has issued an update for zlib. This fixes a vulnerability,
which can be exploited by malicious people to conduct a DoS (Denial of
Service) against a vulnerable application or potentially to compromise
a vulnerable system.
Full Advisory:
http://secunia.com/advisories/16023/

[SA16018] Slackware update for php
Critical: Highly critical
Where: From remote
Impact: System access
Released: 2005-07-12
Slackware has issued an update for php. This fixes a vulnerability,
which can be exploited by malicious people to compromise a vulnerable
system.
Full Advisory:
http://secunia.com/advisories/16018/

[SA16017] Mandriva update for mplayer
Critical: Highly critical
Where: From remote
Impact: System access
Released: 2005-07-12
Mandriva has issued an update for mplayer. This fixes two
vulnerabilities, which potentially can be exploited by malicious people
to compromise a user's system.
Full Advisory:
http://secunia.com/advisories/16017/

[SA16015] Red Hat update for Adobe Acrobat Reader
Critical: Highly critical
Where: From remote
Impact: Exposure of sensitive information, System access
Released: 2005-07-11
Red Hat has issued an update for Adobe Acrobat Reader. This fixes two
vulnerabilities, which can be exploited by malicious, local users to
gain knowledge of sensitive information or by malicious people to
potentially compromise a user's system.
Full Advisory:
http://secunia.com/advisories/16015/

[SA16014] SUSE update for php/pear XML::RPC
Critical: Highly critical
Where: From remote
Impact: System access
Released: 2005-07-11
SUSE has issued an update for php/pear XML::RPC. This fixes a
vulnerability, which can be exploited by malicious people to compromise
a vulnerable system.
Full Advisory:
http://secunia.com/advisories/16014/

[SA16012] Slackware update for zlib
Critical: Highly critical
Where: From remote
Impact: DoS, System access
Released: 2005-07-11
Slackware has issued an update for zlib. This fixes a vulnerability,
which can be exploited by malicious people to cause a DoS (Denial of
Service) against a vulnerable application or potentially compromise a
vulnerable system.
Full Advisory:
http://secunia.com/advisories/16012/

[SA16002] Debian update for drupal
Critical: Highly critical
Where: From remote
Impact: System access
Released: 2005-07-11
Debian has issued an update for drupal. This fixes two vulnerabilities,
which can be exploited by malicious people to compromise a vulnerable
system.
Full Advisory:
http://secunia.com/advisories/16002/

[SA15999] Debian update for egroupware
Critical: Highly critical
Where: From remote
Impact: System access
Released: 2005-07-11
Debian has issued an update for egroupware. This fixes a vulnerability,
which can be exploited by malicious people to compromise a vulnerable
system.
Full Advisory:
http://secunia.com/advisories/15999/

[SA15993] Gentoo update for phpgroupware/egroupware
Critical: Highly critical
Where: From remote
Impact: System access
Released: 2005-07-11
Gentoo has issued an update for phpgroupware and egroupware. This fixes
a vulnerability, which can be exploited by malicious people to
compromise a vulnerable system.
Full Advisory:
http://secunia.com/advisories/15993/

[SA15987] MMS Ripper MMST Streams Buffer Overflow Vulnerability
Critical: Highly critical
Where: From remote
Impact: System access
Released: 2005-07-11
A vulnerability has been reported in MMS Ripper, which potentially can
be exploited by malicious people to compromise a user's system.
Full Advisory:
http://secunia.com/advisories/15987/

[SA15985] USANet Creations Products Shell Command Injection Vulnerability
Critical: Highly critical
Where: From remote
Impact: System access
Released: 2005-07-13
blahplok has reported a vulnerability in various USANet Creations
products, which can be exploited by malicious people to compromise a
vulnerable system.
Full Advisory:
http://secunia.com/advisories/15985/

[SA15981] pngcntrp "kaiseki.cgi" Shell Command Injection Vulnerability
Critical: Highly critical
Where: From remote
Impact: System access
Released: 2005-07-08
blahplok has reported a vulnerability in pngcntrp, which can be
exploited by malicious people to compromise a vulnerable system.
Full Advisory:
http://secunia.com/advisories/15981/

[SA15978] OpenBSD update for zlib
Critical: Highly critical
Where: From remote
Impact: DoS, System access
Released: 2005-07-08
OpenBSD has issued an update for zlib. This fixes a vulnerability,
which can be exploited by malicious people to conduct a DoS (Denial of
Service) against a vulnerable application, or potentially to execute
arbitrary code.
Full Advisory:
http://secunia.com/advisories/15978/

[SA16063] Debian update for tiff
Critical: Moderately critical
Where: From remote
Impact: System access
Released: 2005-07-13
Debian has issued an update for tiff. This fixes a vulnerability, which
potentially can be exploited by malicious people to compromise a
vulnerable system.
Full Advisory:
http://secunia.com/advisories/16063/

[SA16047] Apple Mac OS X Two Vulnerabilities
Critical: Moderately critical
Where: From remote
Impact: Manipulation of data, DoS
Released: 2005-07-13
Two vulnerabilities have been reported in Mac OS X, which can be
exploited by malicious people to cause a DoS (Denial of Service) or
replace system widgets on a user's system.
Full Advisory:
http://secunia.com/advisories/16047/

[SA16045] Mandriva update for ruby
Critical: Moderately critical
Where: From remote
Impact: Security Bypass
Released: 2005-07-13
Mandriva has issued an update for ruby. This fixes a vulnerability,
which can be exploited by malicious people to bypass certain security
restrictions.
Full Advisory:
http://secunia.com/advisories/16045/

[SA16026] Debian update for hteditor
Critical: Moderately critical
Where: From remote
Impact: System access
Released: 2005-07-11
Debian has issued an update for hteditor. This fixes two
vulnerabilities, which potentially can be exploited by malicious people
to compromise a user's system.
Full Advisory:
http://secunia.com/advisories/16026/

[SA16020] Gentoo update for ruby
Critical: Moderately critical
Where: From remote
Impact: Security Bypass
Released: 2005-07-12
Gentoo has issued an update for ruby. This fixes a vulnerability, which
potentially can be exploited by malicious people to bypass certain
security restrictions.
Full Advisory:
http://secunia.com/advisories/16020/

[SA16000] Debian update for ettercap
Critical: Moderately critical
Where: From remote
Impact: System access
Released: 2005-07-11
Debian has issued an update for ettercap. This fixes a vulnerability,
which can be exploited by malicious people to compromise a vulnerable
system.
Full Advisory:
http://secunia.com/advisories/16000/
 
Old 07-17-2005, 11:45 PM   #3
Capt_Caveman
Senior Member
 
Registered: Mar 2003
Distribution: Fedora
Posts: 3,658

Original Poster
Rep: Reputation: 69
Secunia Part B

[SA15997] Debian update for ruby1.8
Critical: Moderately critical
Where: From remote
Impact: Security Bypass
Released: 2005-07-11
Debian has issued an update for ruby1.8. This fixes a vulnerability,
which potentially can be exploited by malicious people to bypass
certain security restrictions.
Full Advisory:
http://secunia.com/advisories/15997/

[SA15992] Debian update for cvs
Critical: Moderately critical
Where: From remote
Impact: System access
Released: 2005-07-08
Debian has issued an update for cvs. This fixes a vulnerability, which
can be exploited by malicious people to compromise a user's system.
Full Advisory:
http://secunia.com/advisories/15992/

[SA15988] Affix Buffer Overflow and Shell Command Injection
Vulnerabilities
Critical: Moderately critical
Where: From remote
Impact: System access
Released: 2005-07-13
Kevin Finisterre has reported two vulnerabilities in Affix, which can
be exploited by malicious people to compromise a vulnerable system.
Full Advisory:
http://secunia.com/advisories/15988/

[SA16066] Gentoo update for bugzilla
Critical: Less critical
Where: From remote
Impact: Exposure of sensitive information
Released: 2005-07-14
Gentoo has issued an update for bugzilla. This fixes two
vulnerabilities, which can be exploited by malicious users to bypass
certain security restrictions and gain knowledge of sensitive
information.
Full Advisory:
http://secunia.com/advisories/16066/

[SA16037] SGI Advanced Linux Environment Multiple Updates
Critical: Less critical
Where: From remote
Impact: Security Bypass, Exposure of system information
Released: 2005-07-12
SGI has issued a patch for SGI Advanced Linux Environment. This fixes
multiple vulnerabilities, which can be exploited malicious people to
gain knowledge of system information, or by malicious, local users to
execute arbitrary commands with escalated privileges.
Full Advisory:
http://secunia.com/advisories/16037/

[SA16036] SGI Advanced Linux Environment Multiple Updates
Critical: Less critical
Where: From remote
Impact: Manipulation of data, DoS
Released: 2005-07-12
SGI has issued a patch for SGI Advanced Linux Environment. This fixes a
vulnerability, which potentially can be exploited by malicious users to
conduct SQL injection attacks or to cause a DoS (Denial of Service).
Full Advisory:
http://secunia.com/advisories/16036/

[SA16035] SGI Advanced Linux Environment Multiple Updates
Critical: Less critical
Where: From remote
Impact: Spoofing, Exposure of system information, Exposure of
sensitive information, DoS
Released: 2005-07-12
SGI has issued a patch for SGI Advanced Linux Environment. This fixes
multiple vulnerabilities, which can be exploited malicious people to
gain knowledge of various information, cause a Denial of Service (DoS),
or spoof DNS lookups.
Full Advisory:
http://secunia.com/advisories/16035/

[SA16030] Debian update for gzip
Critical: Less critical
Where: From remote
Impact: System access
Released: 2005-07-12
Debian has issued an update for gzip. This fixes a vulnerability, which
potentially can be exploited by malicious people to compromise a user's
system.
Full Advisory:
http://secunia.com/advisories/16030/

[SA16021] Bugzilla Two Information Disclosure Vulnerabilities
Critical: Less critical
Where: From remote
Impact: Exposure of sensitive information
Released: 2005-07-11
Two vulnerabilities have been reported in Bugzilla, which can be
exploited by malicious users to bypass certain security restrictions
and gain knowledge of sensitive information.
Full Advisory:
http://secunia.com/advisories/16021/

[SA16019] Mandriva update for cpio
Critical: Less critical
Where: From remote
Impact: Security Bypass, Manipulation of data
Released: 2005-07-12
Mandriva has issued an update for cpio. This fixes a vulnerability,
which can be exploited by malicious people to cause files to be
unpacked to arbitrary locations on a user's system.
Full Advisory:
http://secunia.com/advisories/16019/

[SA16016] AIX ftpd Unspecified Denial of Service Vulnerability
Critical: Less critical
Where: From remote
Impact: DoS
Released: 2005-07-11
A vulnerability has been reported in AIX, which can be exploited by
malicious users to cause a DoS (Denial of Service).
Full Advisory:
http://secunia.com/advisories/16016/

[SA16013] Mandriva update for leafnode
Critical: Less critical
Where: From remote
Impact: DoS
Released: 2005-07-12
Mandriva has issued an update for leafnode. This fixes two security
issues and a vulnerability, which can be exploited by malicious people
to cause a DoS (Denial of Service).
Full Advisory:
http://secunia.com/advisories/16013/

[SA16010] Mandriva update for clamav
Critical: Less critical
Where: From remote
Impact: DoS
Released: 2005-07-12
Mandriva has issued an update for clamav. This fixes a vulnerability,
which can be exploited by malicious people to cause a DoS (Denial of
Service).
Full Advisory:
http://secunia.com/advisories/16010/

[SA15996] Debian update for gedit
Critical: Less critical
Where: From remote
Impact: System access
Released: 2005-07-12
Debian has issued an update for gedit. This fixes a vulnerability,
which potentially can be exploited by malicious people to compromise a
user's system.
Full Advisory:
http://secunia.com/advisories/15996/

[SA16072] Fedora update for net-snmp
Critical: Less critical
Where: From local network
Impact: Privilege escalation, DoS
Released: 2005-07-14
Fedora has issued an update for net-snmp. This fixes two
vulnerabilities, which can be exploited by malicious users to cause a
DoS (Denial of Service) or by malicious, local users to perform certain
actions on a vulnerable system with escalated privileges.
Full Advisory:
http://secunia.com/advisories/16072/

[SA16046] Mandriva update for dhcpcd
Critical: Less critical
Where: From local network
Impact: DoS
Released: 2005-07-13
Mandriva has issued an update for dhcpcd. This fixes a vulnerability,
which can be exploited by malicious people to cause a DoS (Denial of
Service).
Full Advisory:
http://secunia.com/advisories/16046/

[SA16032] Debian update for squid
Critical: Less critical
Where: From local network
Impact: Spoofing
Released: 2005-07-12
Debian has issued an update for squid. This fixes a vulnerability,
which can be exploited by malicious people to spoof DNS lookups.
Full Advisory:
http://secunia.com/advisories/16032/

[SA16006] SGI ProPack arrayd Privilege Escalation Vulnerability
Critical: Less critical
Where: From local network
Impact: Privilege escalation
Released: 2005-07-12
A vulnerability has been reported arrayd, which can be exploited by
malicious users to gain escalated privileges.
Full Advisory:
http://secunia.com/advisories/16006/

[SA15984] Debian update for dhcpcd
Critical: Less critical
Where: From local network
Impact: DoS
Released: 2005-07-11
Debian has issued an update for dhcpcd. This fixes a vulnerability,
which can be exploited by malicious people to cause a DoS (Denial of
Service).
Full Advisory:
http://secunia.com/advisories/15984/

[SA15982] dhcpcd Denial of Service Vulnerability
Critical: Less critical
Where: From local network
Impact: DoS
Released: 2005-07-11
A vulnerability has been reported in dhcpcd, which can be exploited by
malicious people to cause a DoS (Denial of Service).
Full Advisory:
http://secunia.com/advisories/15982/

[SA16053] Debian update for centericq
Critical: Less critical
Where: Local system
Impact: Privilege escalation
Released: 2005-07-13
Debian has issued an update for centericq. This fixes a vulnerability,
which can be exploited by malicious, local users to perform certain
actions on a vulnerable system with escalated privileges.
Full Advisory:
http://secunia.com/advisories/16053/

[SA16040] xpvm "xpvm.tcl" Insecure Temporary File Creation
Critical: Less critical
Where: Local system
Impact: Privilege escalation
Released: 2005-07-12
Eric Romang has reported a vulnerability in xpvm, which can be
exploited by malicious, local users to perform certain actions on a
vulnerable system with escalated privileges.
Full Advisory:
http://secunia.com/advisories/16040/

[SA16039] Heartbeat Multiple Insecure Temporary File Creation
Critical: Less critical
Where: Local system
Impact: Privilege escalation
Released: 2005-07-12
Eric Romang has reported a vulnerability in heartbeat, which can be
exploited by malicious, local users to perform certain actions on a
vulnerable system with escalated privileges.
Full Advisory:
http://secunia.com/advisories/16039/

[SA16038] SMS "mpl.sh" Insecure Temporary File Creation
Critical: Less critical
Where: Local system
Impact: Privilege escalation
Released: 2005-07-12
Eric Romang has reported a vulnerability in sms, which can be exploited
by malicious, local users to perform certain actions on a vulnerable
system with escalated privileges.
Full Advisory:
http://secunia.com/advisories/16038/

[SA16024] Debian update for fuse
Critical: Less critical
Where: Local system
Impact: Exposure of sensitive information
Released: 2005-07-11
Debian has issued an update for fuse. This fixes a vulnerability, which
can be exploited by malicious, local users to disclose potentially
sensitive information.
Full Advisory:
http://secunia.com/advisories/16024/

[SA15989] Backup Manager Unspecified Insecure Temporary File Creation
Critical: Less critical
Where: Local system
Impact: Privilege escalation
Released: 2005-07-11
A vulnerability has been reported in Backup Manager, which potentially
can be exploited by malicious, local users to perform certain actions
on a vulnerable system with escalated privileges.
Full Advisory:
http://secunia.com/advisories/15989/

[SA15980] Linux Kernel IA32 Compatibility "execve()" Buffer Overflow
Critical: Less critical
Where: Local system
Impact: Privilege escalation
Released: 2005-07-11
Ilja van Sprundel has reported a vulnerability in the Linux kernel,
which can be exploited by malicious, local users to cause a DoS (Denial
of Service) or potentially gain escalated privileges.
Full Advisory:
http://secunia.com/advisories/15980/

[SA15977] Elmo "stats_dump()" Insecure Temporary File Creation
Critical: Less critical
Where: Local system
Impact: Privilege escalation
Released: 2005-07-12
Eric Romang has reported a vulnerability in Elmo, which can be
exploited by malicious, local users to perform certain actions on a
vulnerable system with escalated privileges.
Full Advisory:
http://secunia.com/advisories/15977/

[SA16059] Mozilla Multiple Vulnerabilities
Critical: Highly critical
Where: From remote
Impact: Security Bypass, Cross Site Scripting, System access
Released: 2005-07-13
Multiple vulnerabilities have been reported in Mozilla Suite, which can
be exploited by malicious people to bypass certain security
restrictions, conduct cross-site scripting attacks and compromise a
user's system.
Full Advisory:
http://secunia.com/advisories/16059/

[SA16049] Yawp "_Yawp[conf_path]" File Inclusion Vulnerability
Critical: Highly critical
Where: From remote
Impact: System access
Released: 2005-07-13
Stefan Esser has reported a vulnerability in Yawp, which can be
exploited by malicious people to compromise a vulnerable system.
Full Advisory:
http://secunia.com/advisories/16049/

[SA16043] Firefox Multiple Vulnerabilities
Critical: Highly critical
Where: From remote
Impact: Security Bypass, Cross Site Scripting, System access
Released: 2005-07-13
Multiple vulnerabilities have been reported in Firefox, which can be
exploited by malicious people to bypass certain security restrictions,
conduct cross-site scripting attacks, and compromise a user's system.
Full Advisory:
http://secunia.com/advisories/16043/

[SA16031] iPhotoAlbum File Inclusion Vulnerabilities
Critical: Highly critical
Where: From remote
Impact: System access
Released: 2005-07-12
V4mu has discovered two vulnerabilities in iPhotoAlbum, which can be
exploited by malicious people to compromise a vulnerable system.
Full Advisory:
http://secunia.com/advisories/16031/

[SA16022] SPiD "lang_path" File Inclusion Vulnerability
Critical: Highly critical
Where: From remote
Impact: System access
Released: 2005-07-11
V4mu has discovered a vulnerability in SPiD, which can be exploited by
malicious people to compromise a vulnerable system.
Full Advisory:
http://secunia.com/advisories/16022/

[SA16011] PPA "config[ppa_root_path]" File Inclusion Vulnerability
Critical: Highly critical
Where: From remote
Impact: System access
Released: 2005-07-12
V4mu has reported a vulnerability in PPA, which can be exploited by
malicious people to compromise a vulnerable system.
Full Advisory:
http://secunia.com/advisories/16011/

[SA16009] Squito Gallery "photoroot" File Inclusion Vulnerability
Critical: Highly critical
Where: From remote
Impact: System access
Released: 2005-07-12
V4mu has discovered a vulnerability in Squito Gallery, which can be
exploited by malicious people to compromise a vulnerable system.
Full Advisory:
http://secunia.com/advisories/16009/

[SA16001] phpWebSite PEAR XML_RPC PHP Code Execution
Critical: Highly critical
Where: From remote
Impact: System access
Released: 2005-07-11
A vulnerability has been reported in phpWebSite, which can be exploited
by malicious people to compromise a vulnerable system.
Full Advisory:
http://secunia.com/advisories/16001/

[SA15994] phpSecurePages "cfgProgDir" File Inclusion Vulnerability
Critical: Highly critical
Where: From remote
Impact: System access
Released: 2005-07-08
Status-x has discovered a vulnerability in phpSecurePages, which can be
exploited by malicious people to compromise a vulnerable system.
Full Advisory:
http://secunia.com/advisories/15994/

[SA15990] PunBB SQL Injection and PHP Code Execution Vulnerabilities
Critical: Highly critical
Where: From remote
Impact: Security Bypass, Manipulation of data, System access
Released: 2005-07-08
Stefan Esser has reported some vulnerabilities in PunBB, which can be
exploited by malicious people to conduct SQL injection attacks and
compromise a vulnerable system.
Full Advisory:
http://secunia.com/advisories/15990/

[SA16028] Moodle Unspecified Vulnerabilities
Critical: Moderately critical
Where: From remote
Impact: Unknown
Released: 2005-07-12
Some potential vulnerabilities with unknown impacts have been reported
in Moodle.
Full Advisory:
http://secunia.com/advisories/16028/

[SA16003] DownloadProtect "file" Disclosure of Sensitive Information
Critical: Moderately critical
Where: From remote
Impact: Exposure of sensitive information
Released: 2005-07-11
A vulnerability has been reported in DownloadProtect, which can be
exploited by malicious people to disclose sensitive information.
Full Advisory:
http://secunia.com/advisories/16003/

[SA15991] Oracle Products Multiple Unspecified Vulnerabilities
Critical: Moderately critical
Where: From remote
Impact: Unknown, Manipulation of data, Exposure of sensitive
information
Released: 2005-07-13
47 vulnerabilities have been reported in various Oracle products. Some
have an unknown impact, and others can be exploited to gain knowledge
of sensitive information or to manipulate data.
Full Advisory:
http://secunia.com/advisories/15991/

[SA15976] Id Board free "f" SQL Injection Vulnerability
Critical: Moderately critical
Where: From remote
Impact: Manipulation of data
Released: 2005-07-11
Defa has discovered a vulnerability in Id Board free, which can be
exploited by malicious people to conduct SQL injection attacks.
Full Advisory:
http://secunia.com/advisories/15976/

[SA16062] Mozilla Thunderbird XBL Controls Script Execution Vulnerability
Critical: Less critical
Where: From remote
Impact: Security Bypass
Released: 2005-07-13
moz_bug_r_a4 has reported a vulnerability in Thunderbird, which can be
exploited by malicious people to bypass certain security restrictions.
Full Advisory:
http://secunia.com/advisories/16062/

[SA15983] Blog Torrent User Credentials Disclosure Security Issue
Critical: Less critical
Where: From remote
Impact: Exposure of sensitive information
Released: 2005-07-12
LazyCrs and pjphem have reported a security issue in Blog Torrent,
which can be exploit by malicious people to gain knowledge of sensitive
information.
Full Advisory:
http://secunia.com/advisories/15983/
 
Old 07-17-2005, 11:47 PM   #4
Capt_Caveman
Senior Member
 
Registered: Mar 2003
Distribution: Fedora
Posts: 3,658

Original Poster
Rep: Reputation: 69
July 15th 2005 (LAW)

Linux Advisory Watch

Distribution: Debian

* Debian: New ht packages fix arbitrary code execution
8th, July, 2005
Several problems have been discovered in ht, a viewer, editor and
analyser for various executables, that may lead to the execution of
arbitrary code.
http://www.linuxsecurity.com/content/view/119530

* Debian: New fuse packages fix information disclosure
8th, July, 2005
Sven Tantau discovered a security problem in fuse, a filesystem in
userspace, that can be exploited by malicious local users to disclose
potentially sensitive information.
http://www.linuxsecurity.com/content/view/119532

* Debian: New drupal package fixes multiple vulnerabilities
9th, July, 2005
Two input validation errors were discovered in drupal and its bundled
xmlrpc module. These errors can lead to the execution of arbitrary
commands on the web server running drupal.
http://www.linuxsecurity.com/content/view/119537

* Debian: New egroupware packages fix remote command execution
10th, July, 2005
A vulnerability has been identified in the xmlrpc library included in
the egroupware package. This vulnerability could lead to the execution
of arbitrary commands on the server running egroupware.
http://www.linuxsecurity.com/content/view/119539

* Debian: New ettercap packages fix arbitrary code execution
10th, July, 2005
A vulnerability was discovered in the ettercap package which could allow
a remote attacker to execute arbitrary code on the system running ettercap.
http://www.linuxsecurity.com/content/view/119540

* Debian: New dhcpcd packages fix denial of service
11th, July, 2005
dhcpcd, a DHCP client for automatically
configuring IPv4 networking, can be tricked into reading past the end
of the supplied DHCP buffer which could lead to the daemon crashing.
http://www.linuxsecurity.com/content/view/119543

* Debian: New ruby1.8 packages fix arbitrary command execution
11th, July, 2005
A vulnerability has been discovered in ruby1.8 that could allow arbitrary
command execution on a server running the ruby xmlrpc server.
http://www.linuxsecurity.com/content/view/119544

* Debian: New squid packages fix IP spoofing vulnerability
11th, July, 2005
The upstream developers have discovered a bug in the DNS lookup code
of Squid, the popular WWW proxy cache.
http://www.linuxsecurity.com/content/view/119550

* Debian: New gzip packages fix several vulnerabilities
11th, July, 2005
Two problems have been discovered in gzip, the GNU compression
utility.
http://www.linuxsecurity.com/content/view/119551

* Debian: New gedit packages fix denial of service
12th, July, 2005
A format string vulnerability has been discovered in gedit, a
light-weight text editor for GNOME, that may allow attackers to cause
a denial of service (application crash) via a binary file with format
string specifiers in the filename.
http://www.linuxsecurity.com/content/view/119565

* Debian: centericq 4.20.0
13th, July, 2005
Eric Romang discovered that centericq, a text-mode multi-protocol
instant messenger client, creates some temporary files with
predictable filenames and is hence vulnerable to symlink attacks by
local attackers.
http://www.linuxsecurity.com/content/view/119584

* Debian: New tiff packages fix arbitrary code execution
13th, July, 2005
Frank Warmerdam discovered a stack-based buffer overflow in libtiff,
the Tag Image File Format library for processing TIFF graphics files
that can lead to the executionof arbitrary code via malformed TIFF
files.
http://www.linuxsecurity.com/content/view/119585

* Debian: New squirrelmail packages fix several vulnerabilities
13th, July, 2005
Several vulnerabilities have been discovered in Squirrelmail, a
commonly used webmail system.
http://www.linuxsecurity.com/content/view/119594

* Debian: New packages fix remote command execution in phpgroupware
13th, July, 2005
A vulnerability had been identified in the xmlrpc library included
with phpgroupware, a web-based application including email, calendar
and other groupware functionality. This vulnerability could lead to
the execution of arbitrary commands on the server running
phpgroupware.
http://www.linuxsecurity.com/content/view/119602


Distribution: Fedora

* Fedora Core 4 Update: kdegraphics-3.4.1-0.fc4.2
11th, July, 2005
The new package fixes the rendering problem in kdvi.
http://www.linuxsecurity.com/content/view/119552

* Fedora Core 4 Update: dlm-kernel-2.6.11.5-20050601.152643.FC4.9
11th, July, 2005
Update for latest FC4 kernel.
http://www.linuxsecurity.com/content/view/119554

* Fedora Core 4 Update: gnbd-kernel-2.6.11.2-20050420.133124.FC4.42
11th, July, 2005
Updated for latest kernel.
http://www.linuxsecurity.com/content/view/119555

* Fedora Core 4 Update: cman-kernel-2.6.11.5-20050601.152643.FC4.8
11th, July, 2005
Update for latest kernel.
http://www.linuxsecurity.com/content/view/119556

* Fedora Core 4 Update: GFS-kernel-2.6.11.8-20050601.152643.FC4.1
11th, July, 2005
Update for latest kernel.
http://www.linuxsecurity.com/content/view/119557

* Fedora Core 4 Update: GFS-kernel-2.6.11.8-20050601.152643.FC4.1
11th, July, 2005
Update for latest kernel.
http://www.linuxsecurity.com/content/view/119558

* Fedora Core 4 Update: procps-3.2.5-6.3
11th, July, 2005
Package updated.
http://www.linuxsecurity.com/content/view/119559

* Fedora Core 3 Update: procps-3.2.3-5.3
11th, July, 2005
Package updated.
http://www.linuxsecurity.com/content/view/119560

* Fedora Core 4 Update: libwnck-2.10.0-4.fc4
11th, July, 2005
Package updated.
http://www.linuxsecurity.com/content/view/119561

* Fedora Core 4 Update: metacity-2.10.0-2.fc4
11th, July, 2005
Package updated.
http://www.linuxsecurity.com/content/view/119562

* Fedora Core 4 Update: gaim-1.4.0-4.fc4
11th, July, 2005
Package updated.
http://www.linuxsecurity.com/content/view/119563

* Fedora Core 3 Update: gaim-1.4.0-4.fc3
11th, July, 2005
Package updated.
http://www.linuxsecurity.com/content/view/119564

* Fedora Core 4 Update: audit-0.9.15-1.FC4
12th, July, 2005
This update adds interpretive mode for ausearch utility to make
results easier to read, sighup support, big performance improvements,
lots of bug fixes, more documentation in man pages, and more syslog
information for failure conditions.
http://www.linuxsecurity.com/content/view/119570

* Fedora Core 4 Update: libxml2-2.6.20-1.FC4
12th, July, 2005
This update fixes 162837 about XPath and XSLT problems with 2.6.19 as
well as a number of bug fixes upstream, especially on W3C XML Schemas
conformance.
http://www.linuxsecurity.com/content/view/119571

* Fedora Core 3 Update: dhcp-3.0.1-44_FC3
12th, July, 2005
Updated package released.
http://www.linuxsecurity.com/content/view/119572

* Fedora Core 4 Update: dhcp-3.0.2-14.FC4
12th, July, 2005
Updated package released.
http://www.linuxsecurity.com/content/view/119573

* Fedora Core 3 Update: lam-7.1.1-6.FC3
12th, July, 2005
Updated package released.
http://www.linuxsecurity.com/content/view/119576

* Fedora Core 4 Update: lam-7.1.1-6.FC4
12th, July, 2005
Updated package released.
http://www.linuxsecurity.com/content/view/119577

* Fedora Core 3 Update: vixie-cron-4.1-36.FC3
12th, July, 2005
Updated package released.
http://www.linuxsecurity.com/content/view/119579

* Fedora Core 4 Update: vixie-cron-4.1-36.FC4
12th, July, 2005
Updated package released.
http://www.linuxsecurity.com/content/view/119580

* Fedora Core 3 Update: krb5-1.3.6-7
12th, July, 2005
A double-free flaw was found in the krb5_recvauth() routine which may
be triggered by a remote unauthenticated attacker. Fedora Core 3
contains checks within glibc that detect double-free flaws.
Therefore, on Fedora Core 3, successful exploitation of this issue
can only lead to a denial of service (KDC crash).
http://www.linuxsecurity.com/content/view/119581

* Fedora Core 4 Update: krb5-1.4.1-5
12th, July, 2005
A double-free flaw was found in the krb5_recvauth() routine which may
be triggered by a remote unauthenticated attacker. Fedora Core 4
contains checks within glibc that detect double-free flaws.
Therefore, on Fedora Core 4, successful exploitation of this issue
can only lead to a denial of service (KDC crash).
http://www.linuxsecurity.com/content/view/119582

* Fedora Core 4 Update: net-snmp-5.2.1.2-fc4.1
13th, July, 2005
A security vulnerability has been found in Net-SNMP releases that
could allow a denial of service attack against Net-SNMP agent"s which
have opened a stream based protocol (EG, TCP but not UDP; it should
be noted that Net-SNMP does not by default open a TCP port).
http://www.linuxsecurity.com/content/view/119591

* Fedora Core 3 Update: net-snmp-5.2.1.2-FC3.1
13th, July, 2005
Fixes DoS bug (#162908).
http://www.linuxsecurity.com/content/view/119592

* Fedora Core 4 Update: selinux-policy-targeted-1.25.1-9
13th, July, 2005
Fix saslauthd.
http://www.linuxsecurity.com/content/view/119593

* Fedora Core 3 Update: bind-9.2.5-2
13th, July, 2005
New package released.
http://www.linuxsecurity.com/content/view/119595

* Fedora Core 4 Update: bind-9.3.1-6.FC4
13th, July, 2005
New package released.
http://www.linuxsecurity.com/content/view/119596

* Fedora Core 4 Update: rpm-4.4.1-22
13th, July, 2005
This update corrects security problem CAN-2005-2096, a zlib fix.
http://www.linuxsecurity.com/content/view/119597

* Fedora Core 4 Update: openssh-4.1p1-3.1
13th, July, 2005
This update rebases openssh to 4.1p1 upstream. This upstream release
is only a bug fix release so the changes should be minimal. Also /etc/nologin
processing has been changed so it is not done twice.
http://www.linuxsecurity.com/content/view/119599

* Fedora Core 4 Update: pam-0.79-9.1
13th, July, 2005
This update fixes a regression in XAUTHORITY handling and updates
auditing support. It requires audit-libs update due to changes in its API.
http://www.linuxsecurity.com/content/view/119600


Distribution: Gentoo

* Gentoo: phpWebSite Multiple vulnerabilities
10th, July, 2005
phpWebSite is vulnerable to the remote execution of arbitrary PHP
script code and to other, yet undisclosed, vulnerabilities.
http://www.linuxsecurity.com/content/view/119538

* Gentoo: phpGroupWare, eGroupWare PHP script injection vulnerability
10th, July, 2005
phpGroupWare and eGroupWare include an XML-RPC implementation which
allows remote attackers to execute arbitrary PHP script commands.
http://www.linuxsecurity.com/content/view/119541

* Gentoo: Adobe Acrobat Reader Buffer overflow vulnerability
11th, July, 2005
Adobe Acrobat Reader is vulnerable to a buffer overflow that could lead
to remote execution of arbitrary code.
http://www.linuxsecurity.com/content/view/119548

* Gentoo: Ruby Arbitrary command execution through XML-RPC
11th, July, 2005
A vulnerability in XMLRPC.iPIMethods allows remote attackers to execute
arbitrary commands.
http://www.linuxsecurity.com/content/view/119549

* Gentoo: MIT Kerberos 5 Multiple vulnerabilities
12th, July, 2005
MIT Kerberos 5 is vulnerable to a Denial of Service attack and remote
execution of arbitrary code, possibly leading to the compromise of
the entire Kerberos realm.
http://www.linuxsecurity.com/content/view/119578

* Gentoo: Bugzilla Unauthorized access and information
13th, July, 2005
Multiple vulnerabilities in Bugzilla could allow remote users to
modify bug flags or gain sensitive information.
http://www.linuxsecurity.com/content/view/119601

* Gentoo: pam_ldap and nss_ldap Plain text authentication
14th, July, 2005
The pam_ldap and nss_ldap modules fail to restart TLS when following
a referral, possibly leading to credentials being sent in plain text.
http://www.linuxsecurity.com/content/view/119604

* Gentoo: Mozilla Firefox Multiple Vulnerabilities
15th, July, 2005
Several vulnerabilities in Mozilla Firefox allow attacks ranging from
execution of script code with elevated privileges to information leak.
http://www.linuxsecurity.com/content/view/119617


Distribution: RedHat

* RedHat: Critical: Adobe Acrobat Reader security update
8th, July, 2005
Updated acroread packages that fix a security issue are now available.
This update has been rated as having critical security impact by the Red
Hat Security Response Team.
http://www.linuxsecurity.com/content/view/119535

* RedHat: Critical: krb5 security update
12th, July, 2005
Updated krb5 packages which fix multiple security issues are now
available for Red Hat Enterprise Linux 2.1 and 3. This update has
been rated as having critical security impact by the Red Hat Security
Response Team.
http://www.linuxsecurity.com/content/view/119574

* RedHat: Important: krb5 security update
12th, July, 2005
Updated krb5 packages that fix multiple security issues are now
available for Red Hat Enterprise Linux 4. This update has been rated
as having important security impact by the Red Hat Security Response
Team.
http://www.linuxsecurity.com/content/view/119575

* RedHat: cups security update
14th, July, 2005
Updated CUPS packages that fix a security issue are now available for
Red Hat Enterprise Linux 3.
This update has been rated as having moderate security impact by the
Red Hat Security Response Team.
http://www.linuxsecurity.com/content/view/119613
 
  


Closed Thread



Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
LQ Security Report Oct 2005 unSpawn Linux - Security 5 11-09-2005 03:16 PM
LQ Security Report - September 19th 2005 Capt_Caveman Linux - Security 3 09-19-2005 11:18 PM
LQ Security Report - May 8th 2005 Capt_Caveman Linux - Security 3 05-08-2005 10:08 PM
LQ Security Report - February 27th 2005 Capt_Caveman Linux - Security 3 02-27-2005 10:10 PM
LQ Security Report - July 12th 2004 Capt_Caveman Linux - Security 5 07-12-2004 01:40 AM

LinuxQuestions.org > Forums > Linux Forums > Linux - Security

All times are GMT -5. The time now is 04:56 AM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration