Showing all newswire headlines

View by date, instead?

« Previous ( 1 ... 7401 7402 7403 7404 7405 7406 7407 7408 7409 7410 7411 ... 7438 ) Next »

SuSE alert: tcpdump/libpcap

  • Mailing list (Posted by dave on May 29, 2002 4:23 AM EDT)
  • Story Type: Security; Groups: SUSE
The tcpdump program may be used to capture and decode network traffic. Tcpdump decodes certain packets such as AFS requests in a wrong way resulting in a buffer overflow. Since running tcpdump requires root privileges this may lead to a root compromise of the system running tcpdump. We strongly recommend an update for administrators using tcpdump to monitor their networks since the only safe workaround is to not use it at all. Additionally to the fixed tcpdump packages we provide new libpcap packages. Libpcap on which most network monitoring programs rely also contained overflows which however are only exploitable by local attackers if you installed programs using libpcap setuid. This is not found in a default install. More information about tcpdump and libpcap may be found at http://www.tcpdump.org

Mandrake alert: fetchmail update

A problem was discovered with versions of fetchmail prior to 5.9.10 that was triggered by retreiving mail from an IMAP server. The fetchmail client will allocate an array to store the sizes of the messages it is attempting to retrieve. This array size is determined by the number of messages the server is claiming to have, and fetchmail would not check whether or not the number of messages the server was claiming was too high. This would allow a malicious server to make the fetchmail process write data outside of the array bounds.

Mandrake alert: perl-Digest-MD5 update

A bug exists in the UTF8 interaction between the perl-Digest-MD5 module and perl that results in UTF8 strings having improper MD5 digests. The 2.20 version of the module corrects this problem.

Mandrake alert: imap update

A buffer overflow was discovered in the imap server that could allow a malicious user to run code on the server with the uid and gid of the email owner by constructing a malformed request that would trigger the buffer overflow. However, the user must successfully authenticate to the imap service in order to exploit it, which limits the scope of the vulnerability somewhat, unless you are a free mail provider or run a mail service where users do not already have shell access to the system.

Red Hat alert: Updated nss_ldap packages fix pam_ldap vulnerability

  • Mailing list (Posted by dave on May 26, 2002 11:56 PM EDT)
  • Story Type: Security; Groups: Red Hat
Updated nss_ldap packages are now available for Red Hat Linux 6.2, 7.0, 7.1,7.2, and 7.3. These packages fix a string format vulnerability in the pam_ldap module.

Red Hat alert: Buffer overflow in UW imap daemon

  • Mailing list (Posted by dave on May 24, 2002 11:00 AM EDT)
  • Story Type: Security; Groups: Red Hat
The UW imap daemon contains a buffer overflow which allows a logged in, remote user to execute commands on the server with the user's UID/GID.

Red Hat alert: Buffer overflow in UW imap daemon

  • Mailing list (Posted by dave on May 24, 2002 11:00 AM EDT)
  • Story Type: Security; Groups: Red Hat
The UW imap daemon contains a buffer overflow which allows a logged in, remote user to execute commands on the server with the user's UID/GID.

SuSE alert: dhcp/dhcp-server

  • Mailing list (Posted by dave on May 22, 2002 8:55 AM EDT)
  • Story Type: Security; Groups: SUSE
The "Dynamic Host Configuration Protocol" (DHCP) server from the Internet Software Consortium allows hosts on a TCP/IP network to request and be assigned IP addresses, and also to discover information about the network to which they are attached.

Mandrake alert: webmin update

A vulnerability exists in all versions of Webmin prior to 0.970 that allows a remote attacker to login to Webmin as any user. All users of Webmin are encouraged to upgrade immediately. Users of Mandrake Linux 8.0 and earlier will need to install some additional perl modules for this new version of webmin to work correctly.

Red Hat alert: Updated fetchmail packages available

  • Mailing list (Posted by dave on May 21, 2002 5:16 AM EDT)
  • Story Type: Security; Groups: Red Hat
Updated fetchmail packages are available for Red Hat Linux 6.2, 7, 7.1, 7.2, and 7.3 which close a remotely-exploitable vulnerability in unpatched versions of fetchmail prior to 5.9.10.

Red Hat alert: New imlib packages available

  • Mailing list (Posted by dave on May 17, 2002 12:42 PM EDT)
  • Story Type: Security; Groups: Red Hat
Updated imlib packages are now available for Red Hat Linux 6.2, 7, 7.1 and 7.2 which fix potential problems loading untrusted images.

Mandrake alert: tcpdump update

Several buffer overflows were found in the tcpdump package by FreeBSD developers during a code audit, in versions prior to 3.5. However, newer versions of tcpdump, including 3.6.2, are also vulnerable to another buffer overflow in the AFS RPC decoding functions, which was discovered by Nick Cleaton. These vulnerabilities could be used by a remote attacker to crash the the tcpdump process or possibly even be exploited to execute arbitrary code as the user running tcpdump, which is usually root. The newer libpcap 0.6 has also been audited to make it more safe by implementing better buffer boundary checks in several functions.

Mandrake alert: fileutils update

Wojciech Purczynski reported a race condition in some utilities in the GNU fileutils package that may cause root to delete the entire filesystem. This only affects version 4.1 stable and 4.1.6 development versions, and the authors have fixed this in the latest development version.

Red Hat alert: Updated mpg321 packages available

  • Mailing list (Posted by dave on May 16, 2002 10:21 AM EDT)
  • Story Type: Security; Groups: Red Hat
Updated mpg321 packages are available for Red Hat Linux 7.2, which fix a buffer overflow in the network streaming code as well as other bugs.

SuSE alert: lukemftp, nkitb, nkitserv

  • Mailing list (Posted by dave on May 16, 2002 3:42 AM EDT)
  • Story Type: Security; Groups: SUSE
Lukemftp (ftp(1), /usr/bin/ftp, /usr/bin/pftp) is a compfortable ftp client from NetBSD. A buffer overflow could be triggered by an malicious ftp server while the client parses the PASV ftp command. An attacker who control an ftp server to which a client using lukemftp is connected can gain remote access to the clients machine with the privileges of the user running lukeftp.

SuSE alert: shadow

  • Mailing list (Posted by dave on May 16, 2002 2:38 AM EDT)
  • Story Type: Security; Groups: SUSE
The shadow package contains several useful programs to maintain the entries in the /etc/passwd and /etc/shadow files. The SuSE Security Team discovered a vulnerability that allows local attackers to destroy the contents of these files or to extend the group privileges of certain users. This is possible by setting evil filesize limits before invoking one of the programs modifying the system files. Depening on the permissions of the system binaries this allows a local attacker to gain root privileges in the worst case. This however is not possible in a default installation. The bug has been fixed by ensuring the integrity of the data written to temporary files before moving them to the appropriate location of the system. There is no workaround so we recommend an update in any case. It is necessary to update the shadow package as well as the pam-modules package in order to prevent the truncation attacks.

Red Hat alert: Updated Mozilla packages fix a security issue

  • Mailing list (Posted by dave on May 15, 2002 11:15 AM EDT)
  • Story Type: Security; Groups: Red Hat
Updated packages are available which fix a security issue in Mozilla.

Red Hat alert: Updated sharutils package fixes uudecode issue

  • Mailing list (Posted by dave on May 14, 2002 6:44 AM EDT)
  • Story Type: Security; Groups: Red Hat
Updated packages for sharutils are available which fix potential privilege escalation using the uudecode utility.

Red Hat alert: perl-Digest-MD5 UTF8 bug results in incorrect MD5 sums

  • Mailing list (Posted by dave on May 10, 2002 9:33 AM EDT)
  • Story Type: Security; Groups: Red Hat
Updated perl-Digest-MD5 packages are available which work around a bug in the utf8 interaction between perl-Digest-MD5 and Perl.

Mandrake alert: temporary fix for netfilter information leak

A problem was discovered with Netfilter Network Address Translation (NAT) capabilities. It was found that iptables can leak information about how port forwarding is accomplished in unfiltered ICMP packets.

« Previous ( 1 ... 7401 7402 7403 7404 7405 7406 7407 7408 7409 7410 7411 ... 7438 ) Next »