Showing all newswire headlines

View by date, instead?

« Previous ( 1 ... 7440 7441 7442 7443 7444 7445 7446 7447 ... 7448 ) Next »

Red Hat alert: Updated mgetty packages are now available.

  • Mailing list (Posted by dave on Sep 11, 2000 10:57 AM EDT)
  • Story Type: Security; Groups: Red Hat
The mgetty-sendfax package contains a vulnerability which allows any user with access to the /var/tmp directory to destroy any file on any mounted filesystem.

Debian alert: New version of xpdf released

  • Mailing list (Posted by dave on Sep 10, 2000 5:22 AM EDT)
  • Story Type: Security; Groups: Debian
xpdf as distributed in Debian GNU/Linux 2.2 suffered from two problems: 1. creation of temporary files was not done safely which made xpdf vulnerable to a symlink attack. 2. when handling URLs in documents no checking was done for shell metacharacters before starting the browser. This makes it possible to construct a document which cause xpdf to run arbitrary commands when the user views an URL.

Debian alert: New version of horde and imp released

  • Mailing list (Posted by dave on Sep 10, 2000 5:05 AM EDT)
  • Story Type: Security; Groups: Debian
imp as distributed in Debian GNU/Linux 2.2 suffered from insufficient checking of user supplied data: the IMP webmail interface did not check the $from variable which contains the sender address for shell metacharacters. This could be used to run arbitrary commands on the server running imp.

Red Hat alert: glibc vulnerabilities in ld.so, locale and gettext

  • Mailing list (Posted by dave on Sep 7, 2000 12:37 PM EDT)
  • Story Type: Security; Groups: Red Hat
Several bugs were discovered in glibc which could allow local users to gain root privileges.

SuSE alert: apache

  • Mailing list (Posted by dave on Sep 7, 2000 10:02 AM EDT)
  • Story Type: Security; Groups: SUSE
The default package selection in SuSE distributions includes apache. The configuration file that comes with the package contains two security relevant errors:

SuSE alert: screen

  • Mailing list (Posted by dave on Sep 6, 2000 9:37 AM EDT)
  • Story Type: Security; Groups: SUSE
screen, a tty multiplexer, is installed suid root by default on SuSE Linux distributions. By supplying a thoughtfully designed string as the visual bell message, local users can obtain root privilege. Exploit information has been published on security forums.

SuSE alert: shlibs (glibc)

  • Mailing list (Posted by dave on Sep 6, 2000 2:30 AM EDT)
  • Story Type: Security; Groups: SUSE
The glibc implementations in all SuSE distributions starting with SuSE-6.0 have multiple security problems where at least one of them allows any local user to gain root access to the system.

Slackware alert: glibc 2.1.3 vulnerabilities patched

Three locale-related vulnerabilities with glibc 2.1.3 were recently reported on BugTraq. These vulnerabilities could allow local users to gain root access.

Debian alert: glibc update for Debian GNU/Linux 2.1 (update)

  • Mailing list (Posted by dave on Sep 5, 2000 6:58 AM EDT)
  • Story Type: Security; Groups: Debian
Recently two problems have been found in the glibc suite, which could be used to trick setuid applications to run arbitrary code.

Debian alert: glibc update for Debian GNU/Linux 2.1

  • Mailing list (Posted by dave on Sep 4, 2000 3:59 PM EDT)
  • Story Type: Security; Groups: Debian
Recently two problems have been found in the glibc suite, which could be used to trick setuid applications to run arbitrary code.

Debian alert: new version of screen released

  • Mailing list (Posted by dave on Sep 4, 2000 3:56 AM EDT)
  • Story Type: Security; Groups: Debian
A format string bug was recently discovered in screen which can be used to gain elevated privilages if screen is setuid. Debian 2.1 (slink) did ship screen setuid and the exploit can be used to gain root privilages. In Debian 2.2 (potato) screen is not setuid, and is not vulnerable to a root exploit. screen is, however, setgid utmp in Debian 2.2 (potato) and we recommend upgrading.

Slackware alert: Perl root exploit in Slackware 7.1 & -current

A root exploit was found in the /usr/bin/suidperl5.6.0 program that shipped with the Slackware 7.1 perl.tgz package.

Debian alert: New version of glibc released

  • Mailing list (Posted by dave on Sep 2, 2000 8:17 AM EDT)
  • Story Type: Security; Groups: Debian
Recently two problems have been found in the glibc suite, which could be used to trick setuid applications to run arbitrary code.

Debian alert: New version of Netscape Communicator/Navigator released

  • Mailing list (Posted by dave on Sep 1, 2000 5:08 PM EDT)
  • Story Type: Security; Groups: Debian
Existing Netscape Communicator/Navigator packages contain the following vulnerabilities:

Red Hat alert: glibc vulnerabilities in ld.so, locale and gettext

  • Mailing list (Posted by dave on Sep 1, 2000 11:37 AM EDT)
  • Story Type: Security; Groups: Red Hat
Several bugs were discovered in glibc which could allow local users to gain root privileges.

Debian alert: New version of xchat released (update)

  • Mailing list (Posted by dave on Aug 30, 2000 6:36 AM EDT)
  • Story Type: Security; Groups: Debian
The version of X-Chat that was distributed with Debian GNU/Linux 2.2 has a vulnerability in the URL handling code: when a user clicks on a URL X-Chat will start netscape to view its target. However it did not check the URL for shell metacharacters, and this could be abused to trick xchat into executing arbitraty commands.

Debian alert: New version of xchat released

  • Mailing list (Posted by dave on Aug 30, 2000 6:22 AM EDT)
  • Story Type: Security; Groups: Debian
The version of X-Chat that was distributed with Debian GNU/Linux 2.2 has a vulnerability in the URL handling code: when a user clicks on a URL X-Chat will start netscape to view its target. However it did not check the URL for shell metacharacters, and this could be abused to trick xchat into executing arbitraty commands.

Debian alert: New version of ntop released

  • Mailing list (Posted by dave on Aug 29, 2000 2:36 PM EDT)
  • Story Type: Security; Groups: Debian
The updated version of ntop (1.2a7-10) that was released on August 5 was found to still be insecure: it was still exploitable using buffer overflows. Using this technique it was possible to run arbitrary code as the user who ran ntop in web mode.

Red Hat alert: Updated usermode packages.

  • Mailing list (Posted by dave on Aug 29, 2000 7:32 AM EDT)
  • Story Type: Security; Groups: Red Hat
Updated usermode packages are now available for Red Hat Linux 6.0, 6.1, and 6.

SuSE alert: Netscape

  • Mailing list (Posted by dave on Aug 24, 2000 5:06 AM EDT)
  • Story Type: Security; Groups: SUSE
Due to US-American export restrictions for cryptographical software, we are unable to provide update packages on our US ftp server http://ftp.suse.com. Instead, the packages can be found on http://ftp.suse.de. For

The legal issues have been resolved: Here are the links to download the SuSE Netscape update packages from our US-American ftp server:

« Previous ( 1 ... 7440 7441 7442 7443 7444 7445 7446 7447 ... 7448 ) Next »