Secunia
[SA16815] Debian update for centericq
Critical: Highly critical
Where: From remote
Impact: System access, DoS
Released: 2005-09-15
Debian has issued an update for centericq. This fixes some
vulnerabilities, which potentially can be exploited by malicious people
to cause a DoS (Denial of Service) or compromise a vulnerable system.
Full Advisory:
http://secunia.com/advisories/16815/
[SA16814] AzDGDatingLite "l" Local File Inclusion Vulnerability
Critical: Highly critical
Where: From remote
Impact: Exposure of sensitive information, System access
Released: 2005-09-15
rgod has reported a vulnerability in AzDGDatingLite, which can be
exploited by malicious people to disclose sensitive information and
compromise a vulnerable system.
Full Advisory:
http://secunia.com/advisories/16814/
[SA16797] Debian update for mozilla
Critical: Highly critical
Where: From remote
Impact: Security Bypass, Cross Site Scripting, Spoofing, System access
Released: 2005-09-13
Debian has issued an update for mozilla. This fixes some
vulnerabilities, which can be exploited by malicious people to bypass
certain security restrictions, conduct cross-site scripting and
spoofing attacks, and compromise a user's system.
Full Advisory:
http://secunia.com/advisories/16797/
[SA16784] Red Hat update for firefox
Critical: Highly critical
Where: From remote
Impact: DoS, System access
Released: 2005-09-12
Red Hat has issued an update for firefox. This fixes a vulnerability,
which can be exploited by malicious people to cause a DoS (Denial of
Service) or to compromise a user's system.
Full Advisory:
http://secunia.com/advisories/16784/
[SA16782] Red Hat update for mozilla
Critical: Highly critical
Where: From remote
Impact: DoS, System access
Released: 2005-09-12
Red hat has issued an update for mozilla. This fixes a vulnerability,
which can be exploited by malicious people to cause a DoS (Denial of
Service) or to compromise a user's system.
Full Advisory:
http://secunia.com/advisories/16782/
[SA16780] Fedora update for firefox
Critical: Highly critical
Where: From remote
Impact: DoS, System access
Released: 2005-09-12
Fedora has issued an update for firefox. This fixes a vulnerability,
which can be exploited by malicious people to cause a DoS (Denial of
Service) or to compromise a user's system.
Full Advisory:
http://secunia.com/advisories/16780/
[SA16779] Fedora update for mozilla
Critical: Highly critical
Where: From remote
Impact: DoS, System access
Released: 2005-09-12
Fedora has issued an update for mozilla. This fixes a vulnerability,
which can be exploited by malicious people to cause a DoS (Denial of
Service) or to compromise a user's system.
Full Advisory:
http://secunia.com/advisories/16779/
[SA16772] Ubuntu update for mozilla-browser/mozilla-firefox/mozilla-thunderbird
Critical: Highly critical
Where: From remote
Impact: DoS, System access
Released: 2005-09-12
Ubuntu has issued updates for mozilla-browser, mozilla-firefox and
mozilla-thunderbird. These fix a vulnerability, which can be exploited
by malicious people to cause a DoS (Denial of Service) and compromise a
user's system.
Full Advisory:
http://secunia.com/advisories/16772/
[SA16743] SGI Advanced Linux Environment Multiple Updates
Critical: Highly critical
Where: From remote
Impact: Security Bypass, Privilege escalation, DoS, System access
Released: 2005-09-08
SGI has issued a patch for SGI Advanced Linux Environment, which fixes
multiple vulnerabilities in various packages.
Full Advisory:
http://secunia.com/advisories/16743/
[SA16828] Red Hat update for squid
Critical: Moderately critical
Where: From remote
Impact: Exposure of system information, Exposure of sensitive
information, DoS
Released: 2005-09-15
Red Hat has issued an update for squid. This fixes some
vulnerabilities, which can be exploited by malicious people to gain
knowledge of potentially sensitive information and potentially cause a
DoS (Denial of Service).
Full Advisory:
http://secunia.com/advisories/16828/
[SA16811] Debian update for turqstat
Critical: Moderately critical
Where: From remote
Impact: System access
Released: 2005-09-15
Debian has issued an update for turqstat. This fixes a vulnerability,
which potentially can be exploited by malicious people to compromise a
user's system.
Full Advisory:
http://secunia.com/advisories/16811/
[SA16810] Turquoise SuperStat Date Parser Buffer Overflow
Critical: Moderately critical
Where: From remote
Impact: System access
Released: 2005-09-15
A vulnerability has been reported in Turquoise SuperStat, which
potentially can be exploited by malicious people to compromise a user's
system.
Full Advisory:
http://secunia.com/advisories/16810/
[SA16808] Apple Mac OS X update for Java
Critical: Moderately critical
Where: From remote
Impact: Hijacking, Security Bypass, Manipulation of data,
Privilege escalation
Released: 2005-09-14
Some vulnerabilities have been reported in Java for Mac OS X, which can
be exploited by malicious, local users to manipulate certain data,
disclose sensitive information and gain escalated privileges, and by
malicious people to bypass certain security restrictions.
Full Advisory:
http://secunia.com/advisories/16808/
[SA16807] Ubuntu update for squid
Critical: Moderately critical
Where: From remote
Impact: DoS
Released: 2005-09-13
Ubuntu has issued an update for squid. This fixes two vulnerabilities,
which potentially can be exploited by malicious people to cause a DoS
(Denial of Service).
Full Advisory:
http://secunia.com/advisories/16807/
[SA16804] SUSE Updates for Multiple Packages
Critical: Moderately critical
Where: From remote
Impact: Unknown, Exposure of sensitive information, DoS, System access
Released: 2005-09-13
SUSE has issued updates for multiple packages. These fix various
vulnerabilities, which can be exploited by malicious people to cause a
DoS (Denial of Service), gain knowledge of sensitive information and
potentially compromise a vulnerable system.
Full Advisory:
http://secunia.com/advisories/16804/
[SA16800] Gentoo update for python
Critical: Moderately critical
Where: From remote
Impact: DoS, System access
Released: 2005-09-13
Gentoo has issued an update for python. This fixes a vulnerability,
which potentially can be exploited by malicious people to compromise a
vulnerable system.
Full Advisory:
http://secunia.com/advisories/16800/
[SA16789] Trustix update for multiple packages
Critical: Moderately critical
Where: From remote
Impact: Security Bypass, Privilege escalation, DoS
Released: 2005-09-12
Trustix has issued updates for multiple packages. These fix some
vulnerabilities, which can be exploited malicious users to gain
escalated privileges or bypass certain security restrictions and by
malicious people to cause a DoS (Denial of Service) or potentially
bypass certain security restrictions.
Full Advisory:
http://secunia.com/advisories/16789/
[SA16783] GNU Mailutils imap4d "SEARCH" Format String Vulnerability
Critical: Moderately critical
Where: From remote
Impact: System access
Released: 2005-09-12
A vulnerability has been reported in GNU Mailutils, which can be
exploited by malicious users to compromise a vulnerable system.
Full Advisory:
http://secunia.com/advisories/16783/
[SA16781] pam-per-user Cached PAM "subrequest" Vulnerability
Critical: Moderately critical
Where: From remote
Impact: Security Bypass
Released: 2005-09-13
A vulnerability has been reported in pam-per-user, which can be
exploited by malicious users to bypass certain security restrictions.
Full Advisory:
http://secunia.com/advisories/16781/
[SA16771] Debian update for libapache-mod-ssl
Critical: Moderately critical
Where: From remote
Impact: Security Bypass
Released: 2005-09-13
Debian has issued an update for libapache-mod-ssl. This fixes a
security issue, which potentially can be exploited by malicious people
to bypass certain security restrictions.
Full Advisory:
http://secunia.com/advisories/16771/
[SA16769] SUSE update for apache2
Critical: Moderately critical
Where: From remote
Impact: Security Bypass, Privilege escalation, DoS
Released: 2005-09-12
SUSE has issued an update for apache2. This fixes some vulnerabilities,
which can be exploited by malicious, local users to gain escalated
privileges and by malicious people to bypass certain security
restrictions and cause a DoS (Denial of Service).
Full Advisory:
http://secunia.com/advisories/16769/
[SA16768] Debian update for squid
Critical: Moderately critical
Where: From remote
Impact: DoS
Released: 2005-09-13
Debian has issued an update for squid. This fixes some vulnerabilities,
which potentially can be exploited by malicious people to cause a DoS
(Denial of Service).
Full Advisory:
http://secunia.com/advisories/16768/
[SA16763] UnixWare update for racoon
Critical: Moderately critical
Where: From remote
Impact: DoS
Released: 2005-09-09
SCO has issued an update for racoon. This fixes a vulnerability, which
can be exploited by malicious people to cause a DoS (Denial of
Service).
Full Advisory:
http://secunia.com/advisories/16763/
[SA16760] Mandriva update for squid
Critical: Moderately critical
Where: From remote
Impact: DoS
Released: 2005-09-13
Mandriva has issued an update for squid. This fixes some
vulnerabilities, which potentially can be exploited by malicious people
to cause a DoS (Denial of Service).
Full Advisory:
http://secunia.com/advisories/16760/
[SA16758] Red Hat update for pcre
Critical: Moderately critical
Where: From remote
Impact: System access
Released: 2005-09-09
Red Hat has issued an update for pcre. This fixes a vulnerability,
which potentially can be exploited by malicious people to compromise a
vulnerable system.
Full Advisory:
http://secunia.com/advisories/16758/
[SA16754] Debian update for apache2
Critical: Moderately critical
Where: From remote
Impact: Security Bypass, Cross Site Scripting, Manipulation of
data, DoS
Released: 2005-09-09
Debian has issued an update for apache2. This fixes three
vulnerabilities and a security issue, which can be exploited by
malicious people to cause a DoS (Denial of Service), conduct HTTP
request smuggling attacks, and potentially bypass certain security
restrictions.
Full Advisory:
http://secunia.com/advisories/16754/
[SA16753] Mandriva update for apache2
Critical: Moderately critical
Where: From remote
Impact: Security Bypass, DoS
Released: 2005-09-09
Mandriva has issued an update for apache2. This fixes a vulnerability
and a security issue, which can be exploited by malicious people to
cause a DoS (Denial of Service) and potentially bypass certain security
restrictions.
Full Advisory:
http://secunia.com/advisories/16753/
[SA16752] Textbased MSN Client (TMSNC) Format String Vulnerability
Critical: Moderately critical
Where: From remote
Impact: Unknown
Released: 2005-09-12
A vulnerability has been reported in TMSNC, with an unknown impact.
Full Advisory:
http://secunia.com/advisories/16752/
[SA16751] OS/400 osp-cert Certificate Handling Vulnerabilities
Critical: Moderately critical
Where: From remote
Impact: Unknown
Released: 2005-09-09
Some vulnerabilities have been reported in OS/400, with unknown
impacts.
Full Advisory:
http://secunia.com/advisories/16751/
[SA16748] Slackware update for mod_ssl
Critical: Moderately critical
Where: From remote
Impact: Security Bypass
Released: 2005-09-09
Slackware has issued an update for mod_ssl. This fixes a vulnerability
which potentially can be exploited by malicious people to bypass
certain security restrictions.
Full Advisory:
http://secunia.com/advisories/16748/
[SA16746] Fedora update for httpd
Critical: Moderately critical
Where: From remote
Impact: Security Bypass, DoS
Released: 2005-09-08
Fedora has issued an update for httpd. This fixes a vulnerability and a
security issue, which can be exploited by malicious people to cause a
DoS (Denial of Service) and potentially bypass certain security
restrictions.
Full Advisory:
http://secunia.com/advisories/16746/
[SA16787] Debian update for tdiary
Critical: Less critical
Where: From remote
Impact: Hijacking
Released: 2005-09-13
Debian has issued an update for tdiary. This fixes a vulnerability,
which can be exploited by malicious people to conduct cross-site
request forgery attacks.
Full Advisory:
http://secunia.com/advisories/16787/
[SA16794] Slackware update for dhcpcd
Critical: Less critical
Where: From local network
Impact: DoS
Released: 2005-09-13
Slackware has issued an update for dhcpcd. This fixes a vulnerability,
which can be exploited by malicious people to cause a DoS (Denial of
Service).
Full Advisory:
http://secunia.com/advisories/16794/
[SA16774] rdiff-backup "--restrict" Security Bypass Vulnerability
Critical: Less critical
Where: From local network
Impact: Security Bypass
Released: 2005-09-12
A vulnerability has been reported in rdiff-backup, which can be
exploited by malicious users to bypass certain security restrictions.
Full Advisory:
http://secunia.com/advisories/16774/
[SA16747] Linux Kernel Multiple Vulnerabilities
Critical: Less critical
Where: From local network
Impact: Exposure of sensitive information, Privilege escalation,
DoS
Released: 2005-09-09
Some vulnerabilities have been reported in the Linux kernel, which
potentially can be exploited by malicious, local users to disclose
certain sensitive information, cause a DoS (Denial of Service) and gain
escalated privileges, or by malicious people to cause a DoS.
Full Advisory:
http://secunia.com/advisories/16747/
[SA16823] Debian update for common-lisp-controller
Critical: Less critical
Where: Local system
Impact: Privilege escalation
Released: 2005-09-14
Debian has issued an update for common-lisp-controller. This fixes a
vulnerability, which can be exploited by malicious, local users to gain
escalated privileges.
Full Advisory:
http://secunia.com/advisories/16823/
[SA16822] common-lisp-controller Cache Directory Privilege Escalation
Critical: Less critical
Where: Local system
Impact: Privilege escalation
Released: 2005-09-14
Francois-Rene Rideau has reported a vulnerability in
common-lisp-controller, which can be exploited by malicious, local
users to gain escalated privileges.
Full Advisory:
http://secunia.com/advisories/16822/
[SA16821] Mandriva update for XFree86
Critical: Less critical
Where: Local system
Impact: Privilege escalation
Released: 2005-09-14
Mandriva has issued an update for XFree86. This fixes a vulnerability,
which potentially can be exploited by malicious, local users to gain
escalated privileges.
Full Advisory:
http://secunia.com/advisories/16821/
[SA16817] LineControl Java Client Log Messages Password Disclosure
Critical: Less critical
Where: Local system
Impact: Exposure of sensitive information
Released: 2005-09-14
A vulnerability has been reported in LineControl Java Client, which can
be exploited by malicious, local users to disclose certain sensitive
information.
Full Advisory:
http://secunia.com/advisories/16817/
[SA16816] GNU Texinfo Insecure Temporary File Creation
Critical: Less critical
Where: Local system
Impact: Privilege escalation
Released: 2005-09-15
Frank Lichtenheld has reported a vulnerability in texindex, which can
be exploited by malicious, local users to perform certain actions on a
vulnerable system with escalated privileges.
Full Advisory:
http://secunia.com/advisories/16816/
[SA16812] Red Hat update for xorg-x11
Critical: Less critical
Where: Local system
Impact: Privilege escalation
Released: 2005-09-14
Red Hat has issued an update for xorg-x11. This fixes a vulnerability,
which potentially can be exploited by malicious, local users to gain
escalated privileges.
Full Advisory:
http://secunia.com/advisories/16812/
[SA16803] Ubuntu update for xserver-xfree86/xserver-xorg
Critical: Less critical
Where: Local system
Impact: Privilege escalation
Released: 2005-09-13
Ubuntu has issued updates for xserver-xfree86 and xserver-xorg. These
fix a vulnerability, which potentially can be exploited by malicious,
local users to gain escalated privileges.
Full Advisory:
http://secunia.com/advisories/16803/
[SA16799] Red Hat update for XFree86
Critical: Less critical
Where: Local system
Impact: Privilege escalation
Released: 2005-09-13
Red Hat has issued an update for XFree86. This fixes a vulnerability,
which potentially can be exploited by malicious, local users to gain
escalated privileges.
Full Advisory:
http://secunia.com/advisories/16799/
[SA16791] Gentoo update for xorg-x11
Critical: Less critical
Where: Local system
Impact: Privilege escalation
Released: 2005-09-13
Gentoo has issued an update for xorg-x11. This fixes a vulnerability,
which potentially can be exploited by malicious, local users to gain
escalated privileges.
Full Advisory:
http://secunia.com/advisories/16791/
[SA16790] X11 Pixmap Creation Integer Overflow Vulnerability
Critical: Less critical
Where: Local system
Impact: Privilege escalation
Released: 2005-09-13
A vulnerability has been reported in X11, which potentially can be
exploited by malicious, local users to gain escalated privileges.
Full Advisory:
http://secunia.com/advisories/16790/
[SA16777] XFree86 Pixmap Creation Integer Overflow Vulnerability
Critical: Less critical
Where: Local system
Impact: Privilege escalation
Released: 2005-09-13
Luke Hutchison has reported a vulnerability in XFree86, which
potentially can be exploited by malicious, local users to gain
escalated privileges.
Full Advisory:
http://secunia.com/advisories/16777/
[SA16755] Red Hat update for exim
Critical: Less critical
Where: Local system
Impact: Privilege escalation
Released: 2005-09-09
Red Hat has issued an update for exim. This fixes a vulnerability,
which potentially can be exploited by malicious, local users to gain
escalated privileges.
Full Advisory:
http://secunia.com/advisories/16755/
[SA16750] Ubuntu update for kernel
Critical: Less critical
Where: Local system
Impact: Security Bypass, Exposure of sensitive information,
Privilege escalation, DoS
Released: 2005-09-09
Ubuntu has issued an update for kernel. This fixes some
vulnerabilities, which can be exploited by malicious, local users to
disclose certain sensitive information, cause a DoS (Denial of
Service), bypass certain security restrictions and gain escalated
privileges.
Full Advisory:
http://secunia.com/advisories/16750/
[SA16749] Slackware update for kdebase
Critical: Less critical
Where: Local system
Impact: Privilege escalation
Released: 2005-09-09
Slackware has issued an update for kdebase. This fixes a vulnerability,
which potentially can be exploited by malicious, local users to gain
escalated privileges.
Full Advisory:
http://secunia.com/advisories/16749/
[SA16745] Debian update for kdelibs
Critical: Less critical
Where: Local system
Impact: Exposure of sensitive information
Released: 2005-09-08
Debian has issued an update for kdelibs. This fixes a security issue,
which can be exploited by malicious, local users to gain knowledge of
certain information.
Full Advisory:
http://secunia.com/advisories/16745/
[SA16825] Fedora update for util-linux
Critical: Not critical
Where: Local system
Impact: Privilege escalation
Released: 2005-09-15
Fedora has issued an update for util-linux. This fixes a vulnerability,
which potentially can be exploited by malicious, local users to gain
escalated privileges.
Full Advisory:
http://secunia.com/advisories/16825/
[SA16795] Slackware update for util-linux
Critical: Not critical
Where: Local system
Impact: Privilege escalation
Released: 2005-09-13
Slackware has issued an update for util-linux. This fixes a security
issue, which potentially can be exploited by malicious, local users to
gain escalated privileges.
Full Advisory:
http://secunia.com/advisories/16795/
[SA16785] util-linux umount "-r" Re-Mounting Security Issue
Critical: Not critical
Where: Local system
Impact: Privilege escalation
Released: 2005-09-13
David Watson has reported a security issue in util-linux, which
potentially can be exploited by malicious, local users to gain
escalated privileges.
Full Advisory:
http://secunia.com/advisories/16785/
[SA16765] Debian update for gcvs
Critical: Not critical
Where: Local system
Impact: Privilege escalation
Released: 2005-09-09
Debian has issued an update for gcvs. This fixes a security issue,
which potentially can be exploited by malicious, local users to perform
certain actions on a vulnerable system with escalated privileges.
Full Advisory:
http://secunia.com/advisories/16765/