Showing all newswire headlines

View by date, instead?

« Previous ( 1 ... 7393 7394 7395 7396 7397 7398 7399 7400 7401 7402 7403 ... 7438 ) Next »

Debian alert: New gv packages fix buffer overflow

  • Mailing list (Posted by dave on Oct 16, 2002 6:59 AM EDT)
  • Story Type: Security; Groups: Debian
Zen-parse discovered a buffer overflow in gv, a PostScript and PDF viewer for X11. This problem is triggered by scanning the PostScript file and can be exploited by an attacker sending a malformed PostScript or PDF file. The attacker is able to cause arbitrary code to be run with the privileges of the victim.

Mandrake alert: apache update

A number of vulnerabilities were discovered in Apache versions prior to 1.3.27.

Mandrake alert: Status of 7.1/Corporate Server 1.0.1 updates

With the release of Mandrake Linux 9.0, we will no longer be supporting some older distributions, particularly versions 7.1 and Corporate Server 1.0.1. If you are still using one of these distributions, we suggest you upgrade to a more recent version of Mandrake Linux.

Red Hat alert: Updated xinetd packages fix denial of service vulnerability

  • Mailing list (Posted by dave on Oct 15, 2002 9:09 AM EDT)
  • Story Type: Security; Groups: Red Hat
Xinetd contains a denial-of-service (DoS) vulnerability.

Debian alert: New syslog-ng packages fix buffer overflow

  • Mailing list (Posted by dave on Oct 15, 2002 5:36 AM EDT)
  • Story Type: Security; Groups: Debian
Péter Höltzl discovered a problem in the way syslog-ng handles macro expansion. When a macro is expanded a static length buffer is used accompanied by a counter. However, when constant chharacters are appended, the counter is not updated properly, leading to incorrect boundary checking. An attacker may be able to use specially crafted log messages inserted via UDP which overflows the buffer.

SuSE alert: Heartbeat

  • Mailing list (Posted by dave on Oct 14, 2002 8:15 AM EDT)
  • Story Type: Security; Groups: SUSE
Heartbeat is a monitoring service that is used to implement failover in high-availablity environments. It can be configured to monitor other systems via serial connections, or via UDP/IP.

Red Hat alert: Command execution vulnerability in dvips

  • Mailing list (Posted by dave on Oct 14, 2002 5:37 AM EDT)
  • Story Type: Security; Groups: Red Hat
dvips contains a vulnerability allowing print users to execute arbitrary commands

Debian alert: New heartbeat packages fix buffer overflows

  • Mailing list (Posted by dave on Oct 14, 2002 5:24 AM EDT)
  • Story Type: Security; Groups: Debian
Nathan Wallwork discovered a buffer overflow in heartbeat, a subsystem for High-Availability Linux. A remote attacker could send a specially crafted TCP packet that overflows a buffer, leaving heartbeat to execute arbitrary code as root.

Red Hat alert: Updated squirrelmail packages close cross-site scripting vulnerabilities

  • Mailing list (Posted by dave on Oct 11, 2002 12:35 AM EDT)
  • Story Type: Security; Groups: Red Hat
Updated squirrelmail packages are now available for Red Hat Linux.

Mandrake alert: tar update

A directory traversal vulnerability was discovered in GNU tar version 1.13.25 and earlier that allows attackers to overwrite arbitrary files during extraction of the archive by using a ".." (dot dot) in an extracted filename.

Mandrake alert: unzip update

A directory traversal vulnerability was discovered in unzip version 5.42 and earlier that allows attackers to overwrite arbitrary files during extraction of the archive by using a ".." (dot dot) in an extracted filename, as well as prefixing filenames in the archive with "/" (slash).

Red Hat alert: Updated packages fix PostScript and PDF security issue

  • Mailing list (Posted by dave on Oct 10, 2002 12:20 PM EDT)
  • Story Type: Security; Groups: Red Hat
Updated packages for gv and ggv fix a local buffer overflow when reading malformed PDF or PostScript(R) files.

Red Hat alert: Updated analog packages are available

  • Mailing list (Posted by dave on Oct 10, 2002 6:47 AM EDT)
  • Story Type: Security; Groups: Red Hat
Updated packages for analog are available which fix a cross-site scripting problem and a denial of service problem.

Mandrake alert: kdelibs update

A vulnerability was discovered in Konqueror's cross site scripting protection, in that it fails to initialize the domains on sub-(i)frames correctly. Because of this, javascript may access any foreign subframe which is defined in the HTML source, which can be used to steal cookies from the client and allow other cross-site scripting attacks. This also affects other KDE software that uses the KHTML rendering engine. This is fixed in KDE 3.0.3a, and the KDE team provided a patch for KDE 2.2.2. This patch has been applied to the following packages. After upgrading kdelibs, you must restart KDE in order for the fix to work.

Debian alert: New bugzilla packages fix privilege escalation

  • Mailing list (Posted by dave on Oct 9, 2002 6:35 AM EDT)
  • Story Type: Security; Groups: Debian
The developers of Bugzilla, a web-based bug tracking system, discovered a problem in the handling of more than 47 groups. When a new product is added to an installation with 47 groups or more and "usebuggroups" is enabled, the new group will be assigned a groupset bit using Perl math that is not exact beyond 2^48. This results in the new group being defined with a "bit" that has several bits set. As users are given access to the new group, those users will also gain access to spurious lower group privileges. Also, group bits were not always reused when groups were deleted.

Debian alert: New fetchmail packages fix buffer overflows

  • Mailing list (Posted by dave on Oct 8, 2002 11:58 AM EDT)
  • Story Type: Security; Groups: Debian
Package : fetchmail, fetchmail-ssl Vulnerability : buffer overflows Problem-Type : remote Debian-specific: no

Debian alert: New ht://Check packages fix cross site scripting problem

  • Mailing list (Posted by dave on Oct 8, 2002 11:58 AM EDT)
  • Story Type: Security; Groups: Debian
Package : htcheck Vulnerability : cross site scripting Problem-Type : remote Debian-specific: no

Debian alert: New tkmail packages fix insecure temporary file creation

  • Mailing list (Posted by dave on Oct 8, 2002 5:58 AM EDT)
  • Story Type: Security; Groups: Debian
It has been discovered that tkmail creates temporary files insecurely. Exploiting this an attacker with local access can easily create and overwrite files as another user.

Red Hat alert: Updated fetchmail packages fix vulnerabilities

  • Mailing list (Posted by dave on Oct 7, 2002 12:50 PM EDT)
  • Story Type: Security; Groups: Red Hat
Updated fetchmail packages are available for Red Hat Linux 6.2, 7, 7.1, 7.2, 7.3, and 8.0 which close a remotely-exploitable vulnerability in unpatched versions of fetchmail prior to 6.1.0.

SuSE alert: mod_php4

  • Mailing list (Posted by dave on Oct 7, 2002 1:28 AM EDT)
  • Story Type: Security; Groups: SUSE
PHP is a well known and widely used web programming language. If a PHP script runs in "safe mode" several restrictions are applied to it including limits on execution of external programs.

« Previous ( 1 ... 7393 7394 7395 7396 7397 7398 7399 7400 7401 7402 7403 ... 7438 ) Next »