Security 10944 Published by Philipp Esselbach 0

A new security update for Debian GNU/Linux is available:

DSA-254-1 traceroute-nanog -- buffer overflow

A vulnerability has been discovered in NANOG traceroute, an enhanced version of the Van Jacobson/BSD traceroute program. A buffer overflow occurs in the 'get_origin()' function. Due to insufficient bounds checking performed by the whois parser, it may be possible to corrupt memory on the system stack. This vulnerability can be exploited by a remote attacker to gain root privileges on a target host. Though, most probably not in Debian.

Read more

Security 10944 Published by Philipp Esselbach 0

MandrakeSoft has released new security updates for Mandrake Linux:

MDKSA-2003:022 : vnc

A vulnerability was discovered in the VNC server script that generates an X cookie, used by X authentication. The script generated a cookie that was not strong enough and allow an attacker to more easily guess the authentication cookie, thus obtaining unauthorized access to the VNC server.

Read more

MDKSA-2003:023 : lynx

A vulnerability was discovered in lynx, a text-mode web browser. The HTTP queries that lynx constructs are from arguments on the command line or the $WWW_HOME environment variable, but lynx does not properly sanitize special characters such as carriage returns or linefeeds. Extra headers can be inserted into the request because of this, which can cause scripts that use lynx to fetch data from the wrong site from servers that use virtual hosting.

Read more

MDKSA-2003:024 : MNF8.2

The following packages are now available for Multi Network Firewall 8.2 and bring it up to the same errata level as Mandrake Linux 8.2 with all patches and updates available to date applied. In order to bring your MNF8.2 configuration up to date, you will have to follow a few steps.

Read more

Security 10944 Published by Philipp Esselbach 0

MandrakeSoft S.A. has released three new security updates for Mandrake Linux:

MDKSA-2003:019 : php
A buffer overflow was discovered in the wordwrap() function in versions of PHP greater than 4.1.2 and less than 4.3.0. Under certain circumstances, this buffer overflow can be used to overwite heap memory and could potentially lead to remote system compromise.

Read more

MDKSA-2003:020 : openssl
In an upcoming paper, Brice Canvel (EPFL), Alain Hiltgen (UBS), Serge Vaudenay (EPFL), and Martin Vuagnoux (EPFL, Ilion) describe and demonstrate a timing-based attack on CBC ciphersuites in SSL and TLS. New versions of openssl have been released in response to this vulnerability (0.9.6i and 0.9.7a).

Read more

MDKSA-2003:021 : krb5
A vulnerability was discovered in the Kerberos FTP client. When the client retrieves a file that has a filename beginning with a pipe character, the FTP client will pass that filename to the command shell in a system() call. This could allow a malicious remote FTP server to write to files outside of the current directory or even execute arbitrary commands as the user using the FTP client.

Read more

Security 10944 Published by Philipp Esselbach 0

A new security update for Debian GNU/Linux has been released

DSA-252-1 slocate -- buffer overflow
A problem has been discovered in slocate, a secure locate replacement. A buffer overflow in the setuid program slocate can be used to execute arbitrary code as superuser.

For the stable distribution (woody) this problem has been fixed in version 2.6-1.3.1.
The old stable distribution (potato) is not affected by this problem.

For the unstable distribution (sid) this problem has been fixed in version 2.7-1.

We recommend that you upgrade your slocate package immediately.

Read more

Security 10944 Published by 0

New security updates for Gentoo Linux are available:

mod_php
PHP contains code for preventing direct access to the CGI binary with configure option "--enable-force-cgi-redirect" and php.ini option "cgi.force_redirect". In PHP 4.3.0 there is a bug which renders these options useless.

Read more

NetHack
Overflowing a buffer in nethack may lead to privelige escalation to games uid.

Read more

w3m
Hironori SAKAMOTO found another security vulnerability in w3m 0.3.2.x that w3m will miss to escape html tag in img alt attribute, so malicious frame html may deceive you to access your local files, cookies and so on.

Read more

SYSLINUX
Security flaws have been found in the SYSLINUX installer when running
setuid root.

Read more

Mailmain
The email variable and the default error page in mailmain 2.1 contains cross site scripting vulnerabilities.

Read more

bitchx
A denial of service vulnerability exists in BitchX. Sending a malformed RPL_NAMREPLY numeric 353 causes BitchX to segfault.

Read more

Security 10944 Published by Philipp Esselbach 0

MandrakeSoft has released two new security updates for Mandrake Linux

MDKSA-2003:018 : apcupsd

A remote root vulnerability in slave setups and some buffer overflows in the network information server code were discovered by the apcupsd developers. They have been fixed in the latest unstable version, 3.10.5 which contains additional enhancements like USB support, and the latest stable version, 3.8.6.

There are a few changes that need to be noted, such as the port has changed from port 7000 to post 3551 for NIS, and the new config only allows access from the localhost. Users may need to modify their configuration files appropriately, depending upon their configuration.

Read more

MDKSA-2003:017 : pam

Andreas Beck discovered that the pam_xauth module would forward authorization information from the root account to unprivileged users. This can be exploited by a local attacker to gain access to the root user's X session. In order for it to be successfully exploited, the attacker would have to somehow get the root user to su to the account belonging to the attacker.

Read more

Security 10944 Published by Philipp Esselbach 0

For the new software, called VirusSafe, Lindows.com took Central Command's Vexira Antivirus for Linux Workstation software and adjusted it to integrate it with the LindowsOS operating system, said John Bromhead, Lindows.com's marketing vice president.

Read more

Security 10944 Published by Philipp Esselbach 0

A new security update for Debian GNU/Linux has been released:

DSA-250-1 w3mmee-ssl -- missing HTML quoting

Hironori Sakamoto, one of the w3m developers, found two security vulnerabilities in w3m and associated programs. The w3m browser does not properly escape HTML tags in frame contents and img alt attributes. A malicious HTML frame or img alt attribute may deceive a user to send his local cookies which are used for configuration. The information is not leaked automatically, though.

Read more