LinuxQuestions.org
Help answer threads with 0 replies.
Go Back   LinuxQuestions.org > Forums > Linux Forums > Linux - Security
User Name
Password
Linux - Security This forum is for all security related questions.
Questions, tips, system compromises, firewalls, etc. are all included here.

Notices


Closed Thread
  Search this Thread
Old 08-16-2004, 10:18 PM   #1
Capt_Caveman
Senior Member
 
Registered: Mar 2003
Distribution: Fedora
Posts: 3,658

Rep: Reputation: 69
LQ - Security Report - August 16th 2004


August 10th 2004
20 issues handled (SF)
1. Mozilla and Netscape SOAPParameter Integer Overflow Vulnerab...
2. Sun Java Runtime Environment Remote XSLT Privilege Escalatio...
3. Horde IMP HTML+TIME HTML Injection Vulnerability
4. PuTTY Modpow Integer Handling Memory Corruption Vulnerabilit...
5. Linux Kernel File 64-Bit Offset Pointer Handling Kernel Memo...
6. LibPNG Graphics Library Multiple Remote Vulnerabilities
7. PHP-Nuke Delete God Admin Access Control Bypass Vulnerabilit...
8. Acme thttpd Directory Traversal Vulnerability
9. Gnome VFS 'extfs' Scripts Undisclosed Vulnerability
10. Gaim Multiple Unspecified MSN Protocol Buffer Overflow Vulne...
11. LILO gfxboot Plaintext Password Display Vulnerability
12. YaST2 Utility Library File Verification Shell Code Injection...
13. Neon WebDAV Client Library Unspecified Vulnerability
14. LibPNG Graphics Library Unspecified Remote Buffer Overflow V...
15. Opera Remote Location Object Cross-Domain Scripting Vulnerab...
16. Mozilla Browser Input Type HTML Tag Unauthorized Access Vuln...
17. Mozilla Browser/Thunderbird SendUIDL POP3 Message Handling R...
18. Mozilla Browser Non-FQDN SSL Certificate Spoofing Vulnerabil...
19. Mozilla SSL Redirect Spoofing Vulnerability
20. phpBB Login.PHP Cross-Site Scripting Vulnerability

August 13th 2004
24 issues handles over 11 distros (LAW)
1. Libpng - Multiple vulnerabilities
2. Apache - Format string vulnerability
3. Squirrelmail - Multiple vulnerabilities
4. Kernel - Multiple vulnerabilities
5. Libpng10 - Multiple vulnerabilities
6. MPlayer - Buffer overflow vulnerability
7. Courier - Cross-site scripting vulnerability
8. PuTTY - Buffer overflow vulnerability
9. Opera - Multiple vulnerabilities
10. SpamAssassin - Denial of service vulnerability
11. Horde-IMP - Input validation vulnerability denial of service vulnerability
12. Cfengine - Heap corruption vulnerability
13. Roundup - Filesystem access vulnerability
14. gv - Buffer overflow vulnerability
15. Nessus - Race condition vulnerability
16. Gaim - Buffer overflow vulnerability
17. Kdebase,kdelibs - Multiple vulnerabilities
18. Shorewall - Insecure temporary file vulnerability
19. Mozilla - Multiple vulnerabilities
20. Gnome-vfs - Multiple vulnerabilities
21. glibc - Multiple vulnerabilities
22. Ethereal - Multiple vulnerabilities
23. Imagemagick - Buffer overflow vulnerabilities
24. Sox - Buffer overflow vulnerabilities
 
Old 08-16-2004, 10:22 PM   #2
Capt_Caveman
Senior Member
 
Registered: Mar 2003
Distribution: Fedora
Posts: 3,658

Original Poster
Rep: Reputation: 69
August 10th 2004 (SF)

Security Focus

1. Mozilla and Netscape SOAPParameter Integer Overflow Vulnerab...
BugTraq ID: 10843
Remote: Yes
Date Published: Aug 02 2004
Relevant URL: http://www.securityfocus.com/bid/10843
Summary:
It is reported that Mozilla and Netscape contain an integer overflow vulnerability in the SOAPParameter object constructor. This overflow may result in the corruption of critical heap memory structures, leading to possible remote code execution. An attacker can exploit this issue by crafting a malicious web page and having unsuspecting users view the page in a vulnerable version of Mozilla or Netscape. Netscape 7.0, 7.1, and versions of Mozilla prior to 1.7.1 are known to be vulnerable to this issue. Users of affected versions of Netscape are urged to switch to Mozilla 1.7.1 or later, as new versions of Netscape are not likely to appear.

2. Sun Java Runtime Environment Remote XSLT Privilege Escalatio...
BugTraq ID: 10844
Remote: Yes
Date Published: Aug 03 2004
Relevant URL: http://www.securityfocus.com/bid/10844
Summary:
It has been reported that the Sun Java Runtime Environment is affected by an access validation vulnerability within the XSLT processor. An attacker might exploit this issue to allow an untrusted applet or application to read data from a trusted applet or application that is running within the same virtual machine. It has also been reported that this issue may facilitate privilege escalation.

3. Horde IMP HTML+TIME HTML Injection Vulnerability
BugTraq ID: 10845
Remote: Yes
Date Published: Aug 03 2004
Relevant URL: http://www.securityfocus.com/bid/10845
Summary:
Reportedly Horde IMP is affected by an HTML injection vulnerability due to insufficient sanitization of HTML+TIME script. An attacker can exploit this issue to gain access to an unsuspecting user's cookie based authentication credentials; disclosure of personal email is possible. Other attacks are also possible.

4. PuTTY Modpow Integer Handling Memory Corruption Vulnerabilit...
BugTraq ID: 10850
Remote: Yes
Date Published: Aug 04 2004
Relevant URL: http://www.securityfocus.com/bid/10850
Summary:
Reportedly PuTTY is affected by a remote, pre-authentication code execution vulnerability. An attacker might leverage this issue to execute arbitrary code on an affected system. As this issue is exploitable before any authorization and before the host key is verified, any remote attacker can exploit this to gain unauthorized access to a vulnerable computer with the privileges of the user that started the affected application.

5. Linux Kernel File 64-Bit Offset Pointer Handling Kernel Memo...
BugTraq ID: 10852
Remote: No
Date Published: Aug 04 2004
Relevant URL: http://www.securityfocus.com/bid/10852
Summary:
A vulnerability in the Linux kernel in the 64-bit file offset handling code may allow malicious users to read kernel memory. This issue is due to a design error that causes the affected code to fail to properly validate file pointers. An attacker may leverage this issue to read arbitrary Linux kernel memory. This could allow an attacker to read sensitive data such as cached passwords. This issue will certainly aid in further attacks against the affected computer. It has been reported that the Linux 2.6.X kernel, although still vulnerable, might not be exploitable. This BID will be updated when more information becomes available.

6. LibPNG Graphics Library Multiple Remote Vulnerabilities
BugTraq ID: 10857
Remote: Yes
Date Published: Aug 04 2004
Relevant URL: http://www.securityfocus.com/bid/10857
Summary:
The libpng graphics library is reported prone to multiple vulnerabilities. The following issues are reported: It is reported that a stack-based buffer overrun vulnerability exists in the libpng library (CAN-2004-0597). A remote attacker may exploit this condition, by supplying a malicious image to an unsuspecting user. When this image is viewed, the vulnerability may be triggered resulting in code execution occurring in the context of the user that viewed the malicious image. A denial of service vulnerability is also reported to affect libpng (CAN-2004-0598). A remote attacker may exploit this condition, by supplying a malicious image to an unsuspecting user. When the malicious image is viewed, a NULL pointer dereference will occur resulting in a crash of the application that is linked to the vulnerable library. Additionally several integer overrun vulnerabilities are reported to exist in png_handle_sPLT(), png_read_png() and other functions of libpng (CAN-2004-0599). A remote attacker may exploit the integer-overrun conditions, by supplying a malicious image to an unsuspecting user. When the malicious image is viewed, an integer value may wrap, or be interpreted incorrectly resulting in a crash of the application that is linked to the vulnerable library, or may potentially result in arbitrary code execution. This BID will be split into independent BIDs when further analysis of these vulnerabilities is complete.

7. PHP-Nuke Delete God Admin Access Control Bypass Vulnerabilit...
BugTraq ID: 10861
Remote: Yes
Date Published: Aug 04 2004
Relevant URL: http://www.securityfocus.com/bid/10861
Summary:
PHP-Nuke is reported prone to an access control bypass vulnerability. Reports indicate that a PHP-Nuke superuser may bypass access controls and privilege restrictions, to delete the PHP-Nuke "God Admin" account. This may be accomplished by making a specially crafted request for the "admin.php" script.

8. Acme thttpd Directory Traversal Vulnerability
BugTraq ID: 10862
Remote: Yes
Date Published: Aug 04 2004
Relevant URL: http://www.securityfocus.com/bid/10862
Summary:
It is reported that thttpd is susceptible to a directory traversal vulnerability. This issue presents itself due to insufficient sanitization of user-supplied data. This issue only exists in the Windows port of the application, as it does not correctly take into consideration the environmental attributes of file system access in applications. This issue may allow an attacker to retrieve arbitrary, potentially sensitive files, from the affected host computer, as the user that the thttpd process is running as. Version 2.07 beta 0.4 of thttpd, running on a Microsoft Windows platform is reported vulnerable to this issue.

9. Gnome VFS 'extfs' Scripts Undisclosed Vulnerability
BugTraq ID: 10864
Remote: Yes
Date Published: Aug 04 2004
Relevant URL: http://www.securityfocus.com/bid/10864
Summary:
Gnome VFSs 'extfs' scripts are reported prone to an undisclosed vulnerability. It is reported that a user that views specially crafted, attacker supplied URIs utilizing the 'extfs' VFS module may be able to execute arbitrary commands in the context of the user. This BID will be updated as further information is disclosed.

10. Gaim Multiple Unspecified MSN Protocol Buffer Overflow Vulne...
BugTraq ID: 10865
Remote: Yes
Date Published: Aug 04 2004
Relevant URL: http://www.securityfocus.com/bid/10865
Summary:
It is reported that there are multiple unspecified buffer overflow vulnerabilities in the MSN protocol module in Gaim. Due to a lack of details, further information is not available at the moment. This BID will be updated as more information becomes available.

11. LILO gfxboot Plaintext Password Display Vulnerability
BugTraq ID: 10866
Remote: No
Date Published: Aug 04 2004
Relevant URL: http://www.securityfocus.com/bid/10866
Summary:
Reportedly gfxboot is affected by a plain text password display vulnerability. This issue is due to a design error that fails to protect user passwords. The problem reportedly results in the plain text lilo boot password to be displayed when typing. An attacker might leverage this issue to read the plain text lilo boot password.

12. YaST2 Utility Library File Verification Shell Code Injection...
BugTraq ID: 10867
Remote: Yes
Date Published: Aug 04 2004
Relevant URL: http://www.securityfocus.com/bid/10867
Summary:
YaST2 utility library 'liby2util' is affected by a file verification shell code injection vulnerability. This issue is due to a design error that fails to properly validate files. An attacker could leverage this issue to inject malicious shell code into a file name being transferred using the vulnerable utility. This might facilitate privilege escalation and unauthorized access.

13. Neon WebDAV Client Library Unspecified Vulnerability
BugTraq ID: 10869
Remote: Yes
Date Published: Aug 04 2004
Relevant URL: http://www.securityfocus.com/bid/10869
Summary:
It is reported that Neon contains an unspecified vulnerability. The cause of this vulnerability is currently unknown. Due to the nature of the library, it is likely that this is a remotely exploitable issue. It is currently unknown what the affects and impacts of this issue is. This BID will be updated immediately when more information becomes available.

14. LibPNG Graphics Library Unspecified Remote Buffer Overflow V...
BugTraq ID: 10872
Remote: Yes
Date Published: Aug 05 2004
Relevant URL: http://www.securityfocus.com/bid/10872
Summary:
Reportedly LibPNG contains a buffer offset calculation error that may facilitate a buffer overflow vulnerability. This issue is due to a logical design error. This vulnerability may allow an attacker to crash applications utilizing the library, or potentially allow code execution. Please note that vulnerabilities previously outlined in this BID have been described in the LibPNG Graphics Library Multiple Remote Vulnerabilities outlined in BID 10857.

15. Opera Remote Location Object Cross-Domain Scripting Vulnerab...
BugTraq ID: 10873
Remote: Yes
Date Published: Aug 05 2004
Relevant URL: http://www.securityfocus.com/bid/10873
Summary:
Opera is affected by a remote location object cross-domain scripting vulnerability. This issue is due to a failure to properly validate methods that a user can access. An attacker might leverage this issue to steal cookie based authentication credentials, conduct phishing attacks along with other attacks. Furthermore, provided there is an HTML script invoking "location' methods local to a victim's computer (such as c:/winnt/help/ciadmin.htm in most Microsoft Windows implementations) an attacker can exploit this issue to gain read access to directory contents, files and email read using Opera's email utilities. Although this issue is reported to affect versions 1.52 and 1.53 of the affected software, it is likely that earlier versions are also affected.

16. Mozilla Browser Input Type HTML Tag Unauthorized Access Vuln...
BugTraq ID: 10874
Remote: Yes
Date Published: Aug 05 2004
Relevant URL: http://www.securityfocus.com/bid/10874
Summary:
Mozilla browser is reportedly affected by an input type HTML tag unauthorized access vulnerability. This issue is due to an access validation error that allows access to arbitrary files on an unsuspecting user's system. This issue will allow an attacker to obtain arbitrary files residing on the computer of an unsuspecting user that activates a malicious script.

17. Mozilla Browser/Thunderbird SendUIDL POP3 Message Handling R...
BugTraq ID: 10875
Remote: Yes
Date Published: Aug 05 2004
Relevant URL: http://www.securityfocus.com/bid/10875
Summary:
Mozilla and Mozilla Thunderbird are reported prone to a remote heap overflow vulnerability. The issue is reported to exist due to a lack of sufficient boundary checks performed on POP3 data handled by SendUidl(). An attacker controlled POP3 mail server may exploit this condition by sending a specifically crafted email message to the affected mail client. This will result in the corruption of heap-based memory.

18. Mozilla Browser Non-FQDN SSL Certificate Spoofing Vulnerabil...
BugTraq ID: 10876
Remote: Yes
Date Published: Aug 05 2004
Relevant URL: http://www.securityfocus.com/bid/10876
Summary:
Mozilla browser is reportedly vulnerable to an SSL certificate spoofing vulnerability in the 'cert_TestHostName()' function. This issue is due to a design error that fails to properly validate certified host names. This issue would allow an attacker to spoof a trusted certificate from a third party site, facilitating phishing style attacks by luring an unsuspecting user to enter information on what is apparently a trusted site.

19. Mozilla SSL Redirect Spoofing Vulnerability
BugTraq ID: 10880
Remote: Yes
Date Published: Aug 05 2004
Relevant URL: http://www.securityfocus.com/bid/10880
Summary:
It is reported that Mozilla, and products derived from Mozilla are susceptible to an SSL redirect spoofing vulnerability. By exploiting this vulnerability, an attacker can ensure that the victims browser contains the SSL lock icon, and will display the SSL certificate information of a legitimate site when the lock is clicked on. This vulnerability may aid in Phishing style attacks. Mozilla prior to 1.7, Mozilla Firebird 0.7, Mozilla Firefox prior to 0.9, and Mozilla Thunderbird prior to 0.7 are all reported vulnerable.

20. phpBB Login.PHP Cross-Site Scripting Vulnerability
BugTraq ID: 10883
Remote: Yes
Date Published: Aug 06 2004
Relevant URL: http://www.securityfocus.com/bid/10883
Summary:
phpBB is affected by a cross-site scripting vulnerability in the 'login.php' script. This issue is due to a failure of the application to properly sanitize user-supplied URI input. This can be exploited by constructing links that pass malicious strings through the affected URI parameter. If an unsuspecting user visits such a link, the malicious, externally created content supplied in the link will be rendered (or executed, in the case of script code) as part of the 'login.php' document and within the context of the vulnerable website (including the phpBB forum). Attackers may exploit this vulnerability to obtain the authentication credentials of other forum users. If the domain hosts other applications, their credentials and/or other sensitive information (session IDs, etc) may be exposed.
 
Old 08-16-2004, 10:25 PM   #3
Capt_Caveman
Senior Member
 
Registered: Mar 2003
Distribution: Fedora
Posts: 3,658

Original Poster
Rep: Reputation: 69
August 13th 2004 (LAW)

Linux Advisory Watch

Distribution: Conectiva

8/11/2004 - libpng
Multiple vulnerabilities
Chris Evans found several vulnerabilities in unpatched libpng versions pior to 1.0.16rc1 and 1.2.6rc1
http://www.linuxsecurity.com/advisor...sory-4655.html

8/11/2004 - apache
Format string vulnerability
Ralf S. Engelschall found[1] a dangerous call[2] to ssl_log function in ssl_engine_log.c that could allow remote attackers to execute arbitrary messages
http://www.linuxsecurity.com/advisor...sory-4656.html

8/13/2004 - squirrelmail
Multiple vulnerabilities
This patch addresses four vulnerabilities in SquirrelMail, including XSS and SQL injection attacks.
http://www.linuxsecurity.com/advisor...sory-4669.html


Distribution: Debian

8/11/2004 - squirrelmail
Multiple vulnerabilities
This patch addresses multiple Cross Site Scripting and SQL Injection vulnerabilities.
http://www.linuxsecurity.com/advisor...sory-4653.html

8/11/2004 - libpng
Multiple vulnerabilities
This patch addresses a large number of vulnerabilities in libpng.
http://www.linuxsecurity.com/advisor...sory-4654.html


Distribution: Fedora

8/11/2004 - kernel
Multiple vulnerabilities
This update kernel for Fedora Core 2 contains the security fixes as found by Paul Starzetz from isec.pl.
http://www.linuxsecurity.com/advisor...sory-4657.html

8/11/2004 - libpng10
Multiple vulnerabilities
Multiple libpng vulnerabilities are backpatched to the old 1.0.x libpng libraries.
http://www.linuxsecurity.com/advisor...sory-4658.html

8/11/2004 - libpng
Multiple vulnerabilities
This patch fixes numerous buffer overflow and pointer dereference vulnerabilities that a security audit turned up in libpng 1.2.x
http://www.linuxsecurity.com/advisor...sory-4659.html

8/11/2004 - kernel
Unsafe pointer vulnerabilities
A local unprivileged user could make use of these flaws to access large portions of kernel memory.
http://www.linuxsecurity.com/advisor...sory-4660.html


Distribution: Gentoo

8/11/2004 - MPlayer
Buffer overflow vulnerability
When compiled with GUI support MPlayer is vulnerable to a remotely exploitable buffer overflow attack.
http://www.linuxsecurity.com/advisor...sory-4645.html

8/11/2004 - Courier
Cross-site scripting vulnerability
The SqWebMail web application, included in the Courier suite, is vulnerable to cross-site scripting attacks.
http://www.linuxsecurity.com/advisor...sory-4646.html

8/11/2004 - libpng
Multiple vulnerabilities
libpng contains numerous vulnerabilities potentially allowing an attacker to perform a Denial of Service attack or even execute arbitrary code.
http://www.linuxsecurity.com/advisor...sory-4647.html

8/11/2004 - PuTTY
Buffer overflow vulnerability
PuTTY contains a vulnerability allowing a SSH server to execute arbitrary code on the connecting client.
http://www.linuxsecurity.com/advisor...sory-4648.html

8/11/2004 - Opera
Multiple vulnerabilities
Several new vulnerabilities were found and fixed in Opera, including one allowing an attacker to read the local filesystem remotely.
http://www.linuxsecurity.com/advisor...sory-4649.html

8/11/2004 - SpamAssassin
Denial of service vulnerability
SpamAssassin is vulnerable to a Denial of Service attack when handling certain malformed messages.
http://www.linuxsecurity.com/advisor...sory-4650.html

8/11/2004 - Horde-IMP Input validation vulnerability
Denial of service vulnerability
Horde-IMP fails to properly sanitize email messages that contain malicious HTML or script code so that it is not safe for users of Internet Explorer when using the inline MIME viewer for HTML messages.
http://www.linuxsecurity.com/advisor...sory-4651.html

8/11/2004 - Cfengine
Heap corruption vulnerability
Cfengine is vulnerable to a remote root exploit from clients in AllowConnectionsFrom.
http://www.linuxsecurity.com/advisor...sory-4652.html

8/13/2004 - Roundup
Filesystem access vulnerability
Roundup will make files owned by the user that it's running as accessable to a remote attacker.
http://www.linuxsecurity.com/advisor...sory-4664.html

8/13/2004 - gv
Buffer overflow vulnerability
gv contains an exploitable buffer overflow that allows an attacker to execute arbitrary code.
http://www.linuxsecurity.com/advisor...sory-4665.html

8/13/2004 - Nessus
Race condition vulnerability
Nessus contains a vulnerability allowing a user to perform a privilege escalation attack using "adduser".
http://www.linuxsecurity.com/advisor...sory-4666.html

8/13/2004 - Gaim
Buffer overflow vulnerability
Gaim contains a remotely exploitable buffer overflow vulnerability in the MSN-protocol parsing code that may allow remote execution of arbitrary code.
http://www.linuxsecurity.com/advisor...sory-4667.html

8/13/2004 - kdebase,kdelibs Multiple vulnerabilities
Buffer overflow vulnerability
KDE contains three security issues that can allow an attacker to compromise system accounts, cause a Denial of Service, or spoof websites via frame injection.
http://www.linuxsecurity.com/advisor...sory-4668.html


Distribution: Mandrake

8/11/2004 - libpng
Buffer overflow vulnerabilities
Chris Evans discovered numerous vulnerabilities in the libpng graphics library.
http://www.linuxsecurity.com/advisor...sory-4643.html

8/11/2004 - shorewall
Insecure temporary file vulnerability
The shorewall package has a vulnerability when creating temporary files and directories, which could allow non-root users to overwrite arbitrary files on the system.
http://www.linuxsecurity.com/advisor...sory-4644.html

8/13/2004 - gaim
Buffer overflow vulnerabilities
Sebastian Krahmer discovered two remotely exploitable buffer overflow vunerabilities in the gaim instant messenger.
http://www.linuxsecurity.com/advisor...sory-4662.html

8/13/2004 - mozilla
Multiple vulnerabilities
A large number of Mozilla vulnerabilites is addressed by this update.
http://www.linuxsecurity.com/advisor...sory-4663.html


Distribution: Openwall

8/11/2004 - kernel
Multiple vulnerabilities
his corrects the access control check in the Linux kernel which previously wrongly allowed any local user to change the group ownership of arbitrary NFS-exported/imported files.
http://www.linuxsecurity.com/advisor...sory-4642.html


Distribution: Red Hat

8/11/2004 - kernel
Multiple vulnerabilities
Updated kernel packages that fix potential information leaks and a incorrect driver permission for Red Hat Enterprise Linux 2.1 are now available.
http://www.linuxsecurity.com/advisor...sory-4635.html

8/11/2004 - kernel
Multiple vulnerabilities
Updated kernel packages that fix several security issues in Red Hat Enterprise Linux 3 are now available.
http://www.linuxsecurity.com/advisor...sory-4636.html

8/11/2004 - libpng
Buffer overflow vulnerabilities
An attacker could create a carefully crafted PNG file in such a way that it would cause an application linked with libpng to execute arbitrary code when the file was opened by a victim.
http://www.linuxsecurity.com/advisor...sory-4637.html

8/11/2004 - gnome-vfs
VFS Multiple vulnerabilities
An attacker who is able to influence a user to open a specially-crafted URI using gnome-vfs could perform actions as that user.
http://www.linuxsecurity.com/advisor...sory-4638.html

8/11/2004 - glibc
Multiple vulnerabilities
Updated glibc packages that fix a security flaw in the resolver as well as dlclose handling are now available.
http://www.linuxsecurity.com/advisor...sory-4639.html

8/11/2004 - mozilla
Multiple vulnerabilities
Updated mozilla packages based on version 1.4.3 that fix a number of security issues for Red Hat Enterprise Linux are now available.
http://www.linuxsecurity.com/advisor...sory-4640.html

8/11/2004 - Ethereal
Multiple vulnerabilities
Updated Ethereal packages that fix various security vulnerabilities are now available.
http://www.linuxsecurity.com/advisor...sory-4641.html


Distribution: Slackware

8/11/2004 - libpng
Buffer overflow vulnerabilities
Exploitation could cause program crashes, or possibly allow arbitrary code embedded in a malicious PNG image to execute.
http://www.linuxsecurity.com/advisor...sory-4631.html

8/11/2004 - mozilla
Multiple vulnerabilities
This is a full upgrade of Mozilla, put in place to remove security vulnerabilities whose fixes were not backported.
http://www.linuxsecurity.com/advisor...sory-4632.html

8/11/2004 - imagemagick
Buffer overflow vulnerabilities
This imagemagick patch fixes issues with PNG images.
http://www.linuxsecurity.com/advisor...sory-4633.html

8/11/2004 - sox
Buffer overflow vulnerabilities
Fixes buffer overflow security issues that could allow a malicious WAV file to execute arbitrary code.
http://www.linuxsecurity.com/advisor...sory-4634.html


Distribution: Suse

8/6/2004 - libpng
Multiple vulnerabilities
Several different security vulnerabilities were found in the PNG library which is used by applications to support the PNG image format.
http://www.linuxsecurity.com/advisor...sory-4626.html

8/11/2004 - kernel
Multiple vulnerabilities
This patch fixes a large number of kernel vulnerabilities, including a recently discovered race condition that can be exploited for access to kernel memory.
http://www.linuxsecurity.com/advisor...sory-4630.html

8/12/2004 - gaim
Buffer overflow vulnerabilities
Remote attackers can execute arbitrary code as the user running the gaim client.
http://www.linuxsecurity.com/advisor...sory-4661.html


Distribution: Trustix

8/6/2004 - libpng
Multiple vulnerabilities
This is a roundup patch that fixes all known vulnerabilites with respect to libpng.
http://www.linuxsecurity.com/advisor...sory-4627.html

8/11/2004 - kernel
Multiple vulnerabilities
This roundup patch fixes a large number of kernel vulnerabilites.
http://www.linuxsecurity.com/advisor...sory-4629.html


Distribution: Turbolinux

8/11/2004 - libpng
Multiple vulnerabilities
Multiple buffer overflows and a potential NULL pointer dereference in libpng allow remote attackers to execute arbitrary code via malformed PNG images.
http://www.linuxsecurity.com/advisor...sory-4628.html
 
  


Closed Thread


Thread Tools Search this Thread
Search this Thread:

Advanced Search

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
LQ Security Report - August 5th 2005 Capt_Caveman Linux - Security 3 08-05-2005 09:34 AM
LQ Security Report - August 29th 2004 Capt_Caveman Linux - Security 3 08-29-2004 10:43 PM
LQ - Security Report - August 24th 2004 Capt_Caveman Linux - Security 2 08-24-2004 04:27 AM
LQ Security Report - May 8th 2004 Capt_Caveman Linux - Security 3 05-08-2004 11:39 AM
LQ security report - April 16th 2004 Capt_Caveman Linux - Security 3 04-17-2004 11:09 AM

LinuxQuestions.org > Forums > Linux Forums > Linux - Security

All times are GMT -5. The time now is 10:10 AM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Facebook: linuxquestions Google+: linuxquestions
Open Source Consulting | Domain Registration