LinuxQuestions.org
Review your favorite Linux distribution.
Go Back   LinuxQuestions.org > Forums > Linux Forums > Linux - Security
User Name
Password
Linux - Security This forum is for all security related questions.
Questions, tips, system compromises, firewalls, etc. are all included here.

Notices


Closed Thread
  Search this Thread
Old 09-26-2004, 07:06 AM   #1
unSpawn
Moderator
 
Registered: May 2001
Posts: 29,415
Blog Entries: 55

Rep: Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600
LQ Security Report - September 26th 2004


Sep 24th 2004
11 issues handled out of 13 instances(LAW)
cups
cvs
foomatic
gdk-pixbuf/gtk+2 image loading vulnerabilities
gtk2, gdk-pixbuf remote code execution
heimdal
login_radius
lukemftpd
mozilla, firefox, thunderbird, epiphany new releases fix
mpg123
snipsnap
xfree86-libs, xshared remote command execution

Sep 23th 2004
61 issues handled (SN)
Conectiva update for qt3
Gentoo update for xine-lib
Mandrake update for mpg123
Mandrake update for ImageMagick
Debian update for imlib2
Gentoo update for gtk+ / gdk-pixbuf
Debian netkit-telnet-ssl Buffer Overflow Vulnerability
Gentoo update for Mozilla/Firefox/Thunderbird/Epiphany
xine-lib Multiple Buffer Overflow Vulnerabilities
Sun Java Enterprise System NSS Library Vulnerability
FreeBSD update for CVS
SuSE update for gtk2 and gdk-pixbuf
Debian update for gtk+2.0
Mandrake update for XFree86
SuSE update for XFree86
Apple Mac OS X Security Update Fixes iChat Vulnerability
OpenBSD update for Xpm
Debian update for imlib
Red Hat update for gtk2
Gentoo update for mpg123
Debian update for gdk-pixbuf
Debian update for imagemagick
Gentoo update for freeradius
Debian update for lukemftpd
Debian update for wv
Gentoo update for snipsnap
FreeRADIUS Multiple Unspecified Denial of Service
Gentoo update for heimdal
sdd Unspecified RMT Client Vulnerability
Conectiva update for spamassassin
Gentoo update for apache2 and mod_dav
Gentoo update for phpGroupWare
Fedora update for apr-util
Red Hat redhat-config-nfs Incorrect Share Permissions
Red Hat update for samba
Slackware update for CUPS
OpenBSD Radius Authentication "login_radius" Security Bypass
Gentoo update for CUPS
Red Hat update for CUPS
Debian update for cupsys
Mandrake update for webmin
Fedora update for foomatic
RsyncX Privilege Escalation Vulnerabilities
sudo Arbitrary File Reading Vulnerability
getmail Privilege Escalation Vulnerability
Gentoo update for foomatic
Mandrake update for printer-drivers
SMC Broadband Routers Session Handling Security Bypass
Apache "Satisfy" Directive Access Control Bypass Security
TUTOS SQL Injection and Cross-Site Scripting Vulnerabilities
ReMOSitory "filecatid" SQL Injection Vulnerability
YaBB Cross-Site Scripting and Security Bypass
Snitz Forums 2000 HTTP Response Splitting Vulnerability
SnipSnap HTTP Response Splitting Vulnerability
MyServer Directory Traversal Vulnerability
PHP Memory Leak and Arbitrary File Location Upload
Subversion "mod_authz_svn" Unreadable Path Information
YaBB Input Validation Vulnerabilities
Mozilla / Mozilla Firefox Cross-Domain Cookie Injection
Symantec ON Command CCM Default Database Administrator
CA UniCenter Management Portal Username Disclosure Weakness
 
Old 09-26-2004, 07:08 AM   #2
unSpawn
Moderator
 
Registered: May 2001
Posts: 29,415

Original Poster
Blog Entries: 55

Rep: Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600
Sep 23th 2004 (SN)

Secunia


[SA12630] Conectiva update for qt3

Critical: Highly critical
Where: From remote
Impact: DoS, System access
Released: 2004-09-23

Conectiva has issued an update for qt3. This fixes a vulnerability,
which potentially can be exploited by malicious people to compromise a
vulnerable system.

Full Advisory:
http://secunia.com/advisories/12630/

[SA12629] Gentoo update for xine-lib

Critical: Highly critical
Where: From remote
Impact: System access
Released: 2004-09-23

Gentoo has issued an update for xine-lib. This fixes some
vulnerabilities, which can be exploited by malicious people to
compromise a user's system.

Full Advisory:
http://secunia.com/advisories/12629/

[SA12628] Mandrake update for mpg123

Critical: Highly critical
Where: From remote
Impact: System access
Released: 2004-09-23

MandrakeSoft has issued an update for mpg123. This fixes two
vulnerabilities, which can be exploited by malicious people to
compromise a user's system.

Full Advisory:
http://secunia.com/advisories/12628/

[SA12625] Mandrake update for ImageMagick

Critical: Highly critical
Where: From remote
Impact: System access
Released: 2004-09-23

MandrakeSoft has issued an update for ImageMagick. This fixes some
vulnerabilities, which can be exploited by malicious people to
compromise a user's system.

Full Advisory:
http://secunia.com/advisories/12625/

[SA12623] Debian update for imlib2

Critical: Highly critical
Where: From remote
Impact: System access, DoS
Released: 2004-09-23

Debian has issued an update for imlib2. This fixes a vulnerability,
which potentially can be exploited by malicious people to compromise a
user's system.

Full Advisory:
http://secunia.com/advisories/12623/

[SA12615] Gentoo update for gtk+ / gdk-pixbuf

Critical: Highly critical
Where: From remote
Impact: DoS, System access
Released: 2004-09-22

Gentoo has issued updates for gdk-pixbuf and gtk+. These fix multiple
vulnerabilities, which can be exploited by malicious people to cause a
DoS (Denial of Service) and potentially compromise a vulnerable
system.

Full Advisory:
http://secunia.com/advisories/12615/

[SA12608] Debian netkit-telnet-ssl Buffer Overflow Vulnerability

Critical: Highly critical
Where: From remote
Impact: System access
Released: 2004-09-21

A very old vulnerability reportedly still affects the netkit-telnet-ssl
package for Debian Linux, which can be exploited by malicious people to
compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/12608/

[SA12607] Gentoo update for Mozilla/Firefox/Thunderbird/Epiphany

Critical: Highly critical
Where: From remote
Impact: Cross Site Scripting, Manipulation of data, Exposure of
sensitive information, System access
Released: 2004-09-21

Gentoo has issued updates for Mozilla, Firefox, Thunderbird, and
Epiphany. These fix multiple vulnerabilities, which potentially can be
exploited by malicious people to conduct cross-site scripting attacks,
access and modify sensitive information, and compromise a user's
system.

Full Advisory:
http://secunia.com/advisories/12607/

[SA12602] xine-lib Multiple Buffer Overflow Vulnerabilities

Critical: Highly critical
Where: From remote
Impact: System access
Released: 2004-09-20

Multiple vulnerabilities have been reported in xine-lib, which can be
exploited by malicious people to compromise a user's system.

Full Advisory:
http://secunia.com/advisories/12602/

[SA12599] Sun Java Enterprise System NSS Library Vulnerability

Critical: Highly critical
Where: From remote
Impact: System access
Released: 2004-09-20

Sun has acknowledged a vulnerability in the NSS library included with
Sun Java Enterprise System, which can be exploited by malicious people
to compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/12599/

[SA12598] FreeBSD update for CVS

Critical: Highly critical
Where: From remote
Impact: Exposure of system information, DoS, System access
Released: 2004-09-21

FreeBSD has issued an update for CVS. This fixes multiple
vulnerabilities, which can be exploited by malicious users to cause a
DoS (Denial of Service), compromise a vulnerable system, or gain
knowledge of certain system information.

Full Advisory:
http://secunia.com/advisories/12598/

[SA12588] SuSE update for gtk2 and gdk-pixbuf

Critical: Highly critical
Where: From remote
Impact: DoS, System access
Released: 2004-09-17

SuSE has issued updates for gdk-pixbuf and gtk2. These fix multiple
vulnerabilities, which can be exploited by malicious people to cause a
DoS (Denial of Service) and potentially compromise a vulnerable
system.

Full Advisory:
http://secunia.com/advisories/12588/

[SA12586] Debian update for gtk+2.0

Critical: Highly critical
Where: From remote
Impact: DoS, System access
Released: 2004-09-17

Debian has issued an update for gtk+2.0. This fixes multiple
vulnerabilities, which can be exploited by malicious people to cause a
DoS (Denial of Service) and potentially compromise a vulnerable
system.

Full Advisory:
http://secunia.com/advisories/12586/

[SA12583] Mandrake update for XFree86

Critical: Highly critical
Where: From remote
Impact: System access
Released: 2004-09-17

MandrakeSoft has issued an update for XFree86. This fixes multiple
vulnerabilities, which potentially can be exploited by malicious people
to compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/12583/

[SA12579] SuSE update for XFree86

Critical: Highly critical
Where: From remote
Impact: System access
Released: 2004-09-18

SuSE has issued an update for XFree86. This fixes multiple
vulnerabilities, which potentially can be exploited by malicious people
to compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/12579/

[SA12575] Apple Mac OS X Security Update Fixes iChat Vulnerability

Critical: Highly critical
Where: From remote
Impact: System access
Released: 2004-09-17

Apple has issued a security update for Mac OS X iChat client. This
fixes a vulnerability, which can be exploited by malicious people to
compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/12575/

[SA12574] OpenBSD update for Xpm

Critical: Highly critical
Where: From remote
Impact: System access
Released: 2004-09-17

OpenBSD has issued an update for Xpm. This fixes multiple
vulnerabilities, which potentially can be exploited by malicious people
to compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/12574/

[SA12573] Debian update for imlib

Critical: Highly critical
Where: From remote
Impact: DoS, System access
Released: 2004-09-16

Debian has issued an update for imlib. This fixes a vulnerability,
which potentially can be exploited by malicious people to compromise a
user's system.

Full Advisory:
http://secunia.com/advisories/12573/

[SA12568] Red Hat update for gtk2

Critical: Highly critical
Where: From remote
Impact: DoS, System access
Released: 2004-09-16

Red Hat has issued an update for gtk2. This fixes multiple
vulnerabilities, which can be exploited by malicious people to cause a
DoS (Denial of Service) and potentially compromise a vulnerable
system.

Full Advisory:
http://secunia.com/advisories/12568/

[SA12565] Gentoo update for mpg123

Critical: Highly critical
Where: From remote
Impact: System access
Released: 2004-09-16

Gentoo has issued an update for mpg123. This fixes a vulnerability,
which can be exploited by malicious people to compromise a user's
system.

Full Advisory:
http://secunia.com/advisories/12565/

[SA12564] Debian update for gdk-pixbuf

Critical: Highly critical
Where: From remote
Impact: System access, DoS
Released: 2004-09-16

Debian has issued an update for gdk-pixbuf. This fixes multiple
vulnerabilities, which can be exploited by malicious people to cause a
DoS (Denial of Service) and potentially compromise a vulnerable
system.

Full Advisory:
http://secunia.com/advisories/12564/

[SA12563] Debian update for imagemagick
Critical: Highly critical
Where: From remote
Impact: System access
Released: 2004-09-20

Debian has issued an update for ImageMagick. This fixes a
vulnerability, which potentially can be exploited by malicious people
to compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/12563/

[SA12619] Gentoo update for freeradius

Critical: Moderately critical
Where: From remote
Impact: DoS
Released: 2004-09-23

Gentoo has issued an update for freeradius. This fixes multiple
vulnerabilities, which can be exploited by malicious people to cause a
DoS (Denial of Service).

Full Advisory:
http://secunia.com/advisories/12619/

[SA12614] Debian update for lukemftpd

Critical: Moderately critical
Where: From remote
Impact: Privilege escalation, System access
Released: 2004-09-22

Debian has issued an update for lukemftpd. This fixes some
vulnerabilities, which potentially can be exploited by malicious users
to gain escalated privileges or compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/12614/

[SA12592] Debian update for wv

Critical: Moderately critical
Where: From remote
Impact: System access
Released: 2004-09-21

Debian has issued an update for wv. This fixes a vulnerability, which
potentially can be exploited by malicious people to compromise a user's
system.

Full Advisory:
http://secunia.com/advisories/12592/

[SA12582] Gentoo update for snipsnap

Critical: Moderately critical
Where: From remote
Impact: Cross Site Scripting
Released: 2004-09-20

Gentoo has issued an update for snipsnap. This fixes a vulnerability,
which can be exploited by malicious people to conduct script insertion
and cross-site scripting attacks.

Full Advisory:
http://secunia.com/advisories/12582/

[SA12570] FreeRADIUS Multiple Unspecified Denial of Service
Vulnerabilities

Critical: Moderately critical
Where: From remote
Impact: DoS
Released: 2004-09-20

Multiple unspecified vulnerabilities have been reported in FreeRADIUS,
which can be exploited by malicious people to cause a DoS (Denial of
Service).

Full Advisory:
http://secunia.com/advisories/12570/

[SA12562] Gentoo update for heimdal

Critical: Moderately critical
Where: From remote
Impact: System access, Privilege escalation
Released: 2004-09-16

Gentoo has issued an update for heimdal. This fixes some
vulnerabilities, which potentially can be exploited by malicious users
to gain escalated privileges or compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/12562/

[SA12584] sdd Unspecified RMT Client Vulnerability

Critical: Moderately critical
Where: From local network
Impact: Unknown
Released: 2004-09-18

A vulnerability with an unknown impact has been reported in sdd.

Full Advisory:
http://secunia.com/advisories/12584/

[SA12624] Conectiva update for spamassassin

Critical: Less critical
Where: From remote
Impact: DoS
Released: 2004-09-23
Connectiva has issued an update for spamassassin. This fixes a
vulnerability, which can be exploited by malicious people to cause a
DoS (Denial of Service).

Full Advisory:
http://secunia.com/advisories/12624/

[SA12577] Gentoo update for apache2 and mod_dav

Critical: Less critical
Where: From remote
Impact: Privilege escalation, DoS
Released: 2004-09-17

Gentoo has issued updates for apache2 and mod_dav. These fix multiple
vulnerabilities, which can be exploited to cause a DoS (Denial of
Service) or gain escalated privileges.

Full Advisory:
http://secunia.com/advisories/12577/

[SA12576] Gentoo update for phpGroupWare

Critical: Less critical
Where: From remote
Impact: Cross Site Scripting
Released: 2004-09-17

Gentoo has issued an update for phpGroupWare. This fixes a
vulnerability, which can be exploited by malicious people to conduct
cross-site scripting attacks.

Full Advisory:
http://secunia.com/advisories/12576/

[SA12572] Fedora update for apr-util

Critical: Less critical
Where: From remote
Impact: DoS
Released: 2004-09-16

Fedora has issued an update for apr-util. This fixes a vulnerability
which can be exploited by malicious people to cause a DoS (Denial of
Service).

Full Advisory:
http://secunia.com/advisories/12572/

[SA12632] Red Hat redhat-config-nfs Incorrect Share Permissions
Security Issue

Critical: Less critical
Where: From local network
Impact: Security Bypass
Released: 2004-09-23

John Buswell has reported a security issue in redhat-config-nfs, which
may result in users having more permissions than expected on exported
resources.

Full Advisory:
http://secunia.com/advisories/12632/

[SA12631] Red Hat update for samba

Critical: Less critical
Where: From local network
Impact: DoS
Released: 2004-09-23

Red Hat has issued an update for samba. This fixes two vulnerabilities,
which can be exploited by malicious people to cause a DoS (Denial of
Service).

Full Advisory:
http://secunia.com/advisories/12631/

[SA12626] Slackware update for CUPS

Critical: Less critical
Where: From local network
Impact: DoS
Released: 2004-09-23

Slackware has issued an update for CUPS. This fixes a vulnerability,
which can be exploited by malicious people to cause a DoS (Denial of
Service).

Full Advisory:
http://secunia.com/advisories/12626/

[SA12617] OpenBSD Radius Authentication "login_radius" Security Bypass

Critical: Less critical
Where: From local network
Impact: Security Bypass
Released: 2004-09-22

Eilko Bos has reported a vulnerability in OpenBSD, which can be
exploited by malicious people to bypass certain security restrictions.

Full Advisory:
http://secunia.com/advisories/12617/

[SA12603] Gentoo update for CUPS

Critical: Less critical
Where: From local network
Impact: DoS
Released: 2004-09-21

Gentoo has issued an update for CUPS. This fixes a vulnerability, which
can be exploited by malicious people to cause a DoS (Denial of
Service).

Full Advisory:
http://secunia.com/advisories/12603/

[SA12571] Red Hat update for CUPS

Critical: Less critical
Where: From local network
Impact: DoS
Released: 2004-09-16

Red Hat has issued an update for CUPS. This fixes a vulnerability,
which can be exploited by malicious people to cause a DoS (Denial of
Service).

Full Advisory:
http://secunia.com/advisories/12571/

[SA12566] Debian update for cupsys

Critical: Less critical
Where: From local network
Impact: DoS
Released: 2004-09-16

Debian has issued an update for cupsys. This fixes a vulnerability,
which can be exploited by malicious people to cause a DoS (Denial of
Service).

Full Advisory:
http://secunia.com/advisories/12566/

[SA12627] Mandrake update for webmin

Critical: Less critical
Where: Local system
Impact: Privilege escalation
Released: 2004-09-23

MandrakeSoft has issued an update for webmin. This fixes a
vulnerability, which potentially can be exploited by malicious, local
user to perform certain actions on a system with escalated privileges.

Full Advisory:
http://secunia.com/advisories/12627/

[SA12610] Fedora update for foomatic

Critical: Less critical
Where: Local system
Impact: Privilege escalation
Released: 2004-09-22

Fedora has issued an update for foomatic. This fixes a vulnerability,
which can be exploited by malicious, local users to gain escalated
privileges.

Full Advisory:
http://secunia.com/advisories/12610/

[SA12600] RsyncX Privilege Escalation Vulnerabilities

Critical: Less critical
Where: Local system
Impact: Privilege escalation
Released: 2004-09-20

Matt Johnston has reported two vulnerabilities in RsyncX, which can be
exploited by malicious, local users to gain escalated privileges.

Full Advisory:
http://secunia.com/advisories/12600/

[SA12596] sudo Arbitrary File Reading Vulnerability

Critical: Less critical
Where: Local system
Impact: Exposure of sensitive information
Released: 2004-09-20

Reznic Valery has reported a vulnerability in sudo, which can be
exploited by malicious, local users to read arbitrary files.

Full Advisory:
http://secunia.com/advisories/12596/

[SA12594] getmail Privilege Escalation Vulnerability

Critical: Less critical
Where: Local system
Impact: Privilege escalation
Released: 2004-09-20

David Watson has reported a vulnerability in getmail, which can be
exploited by malicious, local users to gain escalated privileges.

Full Advisory:
http://secunia.com/advisories/12594/

[SA12591] Gentoo update for foomatic

Critical: Less critical
Where: Local system
Impact: Privilege escalation
Released: 2004-09-21

Gentoo has issued an update for foomatic. This fixes a vulnerability,
which can be exploited by malicious, local users to gain escalated
privileges.

Full Advisory:
http://secunia.com/advisories/12591/

[SA12567] Mandrake update for printer-drivers

Critical: Less critical
Where: Local system
Impact: Privilege escalation
Released: 2004-09-16

MandrakeSoft has issued an update for printer-drivers. This fixes a
vulnerability, which can be exploited by malicious, local users to gain
escalated privileges.

Full Advisory:
http://secunia.com/advisories/12567/


Other:

[SA12601] SMC Broadband Routers Session Handling Security Bypass

Critical: Less critical
Where: From local network
Impact: Security Bypass
Released: 2004-09-20

Jimmy Scott has reported a vulnerability in SMC broadband routers,
which can be exploited by malicious people to bypass certain security
restrictions.

Full Advisory:
http://secunia.com/advisories/12601/


Cross Platform:

[SA12633] Apache "Satisfy" Directive Access Control Bypass Security
Issue

Critical: Moderately critical
Where: From remote
Impact: Security Bypass
Released: 2004-09-23

A security issue has been reported in Apache, which may allow malicious
people to bypass configured access controls.

Full Advisory:
http://secunia.com/advisories/12633/

[SA12606] TUTOS SQL Injection and Cross-Site Scripting Vulnerabilities

Critical: Moderately critical
Where: From remote
Impact: Cross Site Scripting, Manipulation of data
Released: 2004-09-21

Joxean Koret has reported some vulnerabilities, which can be exploited
to conduct SQL injection and cross-site scripting attacks.

Full Advisory:
http://secunia.com/advisories/12606/

[SA12597] ReMOSitory "filecatid" SQL Injection Vulnerability

Critical: Moderately critical
Where: From remote
Impact: Manipulation of data
Released: 2004-09-20

khoai has reported a vulnerability in the ReMOSitory add-on for Mambo,
which can be exploited by malicious people to conduct SQL injection
attacks.

Full Advisory:
http://secunia.com/advisories/12597/

[SA12593] YaBB Cross-Site Scripting and Security Bypass
Vulnerabilities

Critical: Moderately critical
Where: From remote
Impact: Security Bypass, Cross Site Scripting
Released: 2004-09-21

GulfTech Security has discovered two vulnerabilities in YaBB, which can
be exploited by malicious people to conduct cross-site scripting attacks
and bypass certain security restrictions.

Full Advisory:
http://secunia.com/advisories/12593/

[SA12590] Snitz Forums 2000 HTTP Response Splitting Vulnerability

Critical: Moderately critical
Where: From remote
Impact: Cross Site Scripting
Released: 2004-09-20

Maestro has reported a vulnerability in Snitz Forums 2000, which can be
exploited by malicious people to conduct script insertion and cross-site
scripting attacks.

Full Advisory:
http://secunia.com/advisories/12590/

[SA12569] SnipSnap HTTP Response Splitting Vulnerability

Critical: Moderately critical
Where: From remote
Impact: Cross Site Scripting
Released: 2004-09-20

Maestro De-Seguridad has reported a vulnerability has been reported in
SnipSnap, which can be exploited by malicious people to conduct script
insertion and cross-site scripting attacks.

Full Advisory:
http://secunia.com/advisories/12569/

[SA12561] MyServer Directory Traversal Vulnerability

Critical: Moderately critical
Where: From remote
Impact: Exposure of system information, Exposure of sensitive
information
Released: 2004-09-16

Arnaud Jacques has reported a vulnerability in MyServer, which can be
exploited by malicious people to access sensitive information.

Full Advisory:
http://secunia.com/advisories/12561/

[SA12560] PHP Memory Leak and Arbitrary File Location Upload
Vulnerabilities

Critical: Moderately critical
Where: From remote
Impact: Exposure of sensitive information, System access
Released: 2004-09-18

Two vulnerabilities have been reported in PHP, which can be exploited
by malicious people to disclose sensitive information or potentially
compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/12560/

[SA12621] Subversion "mod_authz_svn" Unreadable Path Information
Disclosure

Critical: Less critical

Where: From remote
Impact: Exposure of system information, Exposure of sensitive
information
Released: 2004-09-23

A security issue has been reported in Subversion, which can be
exploited by malicious people to disclose potentially sensitive
information.

Full Advisory:
http://secunia.com/advisories/12621/

[SA12609] YaBB Input Validation Vulnerabilities

Critical: Less critical
Where: From remote
Impact: Cross Site Scripting, Manipulation of data
Released: 2004-09-22

Two vulnerabilities have been reported in YaBB, which can be exploited
to conduct cross-site scripting attacks and manipulate certain files.

Full Advisory:
http://secunia.com/advisories/12609/

[SA12580] Mozilla / Mozilla Firefox Cross-Domain Cookie Injection
Vulnerability

Critical: Less critical
Where: From remote
Impact: Hijacking
Released: 2004-09-18

WESTPOINT has reported a vulnerability in Mozilla / Mozilla Firefox,
which potentially can be exploited by malicious people to conduct
session fixation attacks.

Full Advisory:
http://secunia.com/advisories/12580/

[SA12604] Symantec ON Command CCM Default Database Administrator
Accounts

Critical: Less critical
Where: From local network
Impact: Security Bypass
Released: 2004-09-22

Jonas Olsson has reported a security issue in ON Command CCM, which can
be exploited by malicious people to access sensitive information.

Full Advisory:
http://secunia.com/advisories/12604/

[SA12620] CA UniCenter Management Portal Username Disclosure Weakness

Critical: Not critical
Where: From local network
Impact: Exposure of system information
Released: 2004-09-22

Thomas Adams has reported a weakness in UniCenter Management Portal,
which can be exploited by malicious people to disclose system
information.

Full Advisory:
http://secunia.com/advisories/12620/
 
Old 09-26-2004, 07:10 AM   #3
unSpawn
Moderator
 
Registered: May 2001
Posts: 29,415

Original Poster
Blog Entries: 55

Rep: Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600
Sep 24th 2004 (LAW)

Linux Advisory Watch
Distribution: Debian

9/21/2004 - lukemftpd
fix arbitrary code execution

Przemyslaw Frasunek discovered a vulnerability in tnftpd or
lukemftpd respectively, the enhanced ftp daemon from NetBSD. An
attacker could utilise this to execute arbitrary code on the
server.
http://www.linuxsecurity.com/advisor...sory-4837.html


Distribution: FreeBSD

9/20/2004 - cvs
number of vulnerabilities

A number of vulnerabilities were discovered in CVS by Stefan
Esser, Sebastian Krahmer, and Derek Price.
http://www.linuxsecurity.com/advisor...sory-4826.html


Distribution: Gentoo

9/19/2004 - Heimdal
ftpd root escalation

Several bugs exist in the Heimdal ftp daemon which could allow a
remote attacker to gain root privileges.
http://www.linuxsecurity.com/advisor...sory-4828.html

9/21/2004 - mpg123
Buffer overflow vulnerability

mpg123 decoding routines contain a buffer overflow bug that might
lead to arbitrary code execution.
http://www.linuxsecurity.com/advisor...sory-4829.html

9/17/2004 - SnipSnap
HTTP response splitting

SnipSnap is vulnerable to HTTP response splitting attacks such as
web cache poisoning, cross-user defacement, and cross-site
scripting.
http://www.linuxsecurity.com/advisor...sory-4832.html

9/20/2004 - Foomatic
Arbitrary command execution

The foomatic-rip filter in foomatic-filters contains a
vulnerability which may allow arbitrary command execution on the
print server.
http://www.linuxsecurity.com/advisor...sory-4833.html

9/20/2004 - CUPS
Denial of service vulnerability

A vulnerability in CUPS allows remote attackers to cause a denial
of service when sending a carefully-crafted UDP packet to the IPP
port.
http://www.linuxsecurity.com/advisor...sory-4834.html

9/20/2004 - Mozilla, Firefox, Thunderbird, Epiphany New releases fix
vulnerabilities
Denial of service vulnerability

New releases of Mozilla, Epiphany, Mozilla Thunderbird, and
Mozilla Firefox fix several vulnerabilities, including the remote
execution of arbitrary code.
http://www.linuxsecurity.com/advisor...sory-4835.html


Distribution: Mandrake

9/17/2004 - gdk-pixbuf/gtk+2 image loading vulnerabilities
Denial of service vulnerability

A vulnerability was found in the gdk-pixbug bmp loader where a bad
BMP image could send the bmp loader into an infinite loop
(CAN-2004-0753).
http://www.linuxsecurity.com/advisor...sory-4824.html

9/17/2004 - gdk-pixbuf/gtk+2 image loading vulnerabilities
Denial of service vulnerability

A vulnerability was found in the gdk-pixbug bmp loader where a bad
BMP image could send the bmp loader into an infinite loop
(CAN-2004-0753).
http://www.linuxsecurity.com/advisor...sory-4825.html


Distribution: OpenBSD

9/21/2004 - login_radius
security flaw

Eilko Bos has reported that radius authentication, as implemented
by login_radius(8), was not checking the shared secret used for
replies sent by the radius server.
http://www.linuxsecurity.com/advisor...sory-4838.html


Distribution: SuSE

9/17/2004 - gtk2, gdk-pixbuf remote code execution
security flaw

Chris Evans has discovered a heap based, a stack based and an
integer overflow in the XPM and ICO loaders of those libraries.
http://www.linuxsecurity.com/advisor...sory-4813.html

9/17/2004 - XFree86-libs, xshared remote command execution
security flaw

Chris Evans reported three vulnerabilities in libXpm which can be
exploited remotely by providing malformed XPM image files.
http://www.linuxsecurity.com/advisor...sory-4814.html
 
  


Closed Thread


Thread Tools Search this Thread
Search this Thread:

Advanced Search

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
LQ Security Report - September 25th 2005 Capt_Caveman Linux - Security 3 09-25-2005 10:51 PM
LQ Security Report - September 19th 2005 Capt_Caveman Linux - Security 3 09-19-2005 11:18 PM
LQ Security Report - September 5th 2005 Capt_Caveman Linux - Security 3 09-05-2005 06:27 PM
LQ Security Report - September 18th 2004 unSpawn Linux - Security 2 09-18-2004 07:55 AM
LQ Security Report - September 8th 2004 unSpawn Linux - Security 2 09-11-2004 10:38 AM

LinuxQuestions.org > Forums > Linux Forums > Linux - Security

All times are GMT -5. The time now is 02:28 PM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration