Security 10912 Published by Philipp Esselbach 0

Two security patches for Debian GNU/Linux has been released:

DSA-255-1 tcpdump -- infinite loop

Andrew Griffiths and iDEFENSE Labs discovered a problem in tcpdump, a powerful tool for network monitoring and data acquisition. An attacker is able to send a specially crafted network packet which causes tcpdump to enter an infinite loop.

In addition to the above problem the tcpdump developers discovered a potential infinite loop when parsing malformed BGP packets. They also discovered a buffer overflow that can be exploited with certain malformed NFS packets.

For the stable distribution (woody) these problems have been fixed in version 3.6.2-2.3.

For the old stable distribution (potato) does not seem to be affected by this problem.

For the unstable distribution (sid) these problems have been fixed in version 3.7.1-1.2.

Read more

DSA-256-1 mhc -- insecure temporary file

Security 10912 Published by Philipp Esselbach 0

A new security update for Debian GNU/Linux is available:

DSA-254-1 traceroute-nanog -- buffer overflow

A vulnerability has been discovered in NANOG traceroute, an enhanced version of the Van Jacobson/BSD traceroute program. A buffer overflow occurs in the 'get_origin()' function. Due to insufficient bounds checking performed by the whois parser, it may be possible to corrupt memory on the system stack. This vulnerability can be exploited by a remote attacker to gain root privileges on a target host. Though, most probably not in Debian.

Read more

Security 10912 Published by Philipp Esselbach 0

MandrakeSoft has released new security updates for Mandrake Linux:

MDKSA-2003:022 : vnc

A vulnerability was discovered in the VNC server script that generates an X cookie, used by X authentication. The script generated a cookie that was not strong enough and allow an attacker to more easily guess the authentication cookie, thus obtaining unauthorized access to the VNC server.

Read more

MDKSA-2003:023 : lynx

A vulnerability was discovered in lynx, a text-mode web browser. The HTTP queries that lynx constructs are from arguments on the command line or the $WWW_HOME environment variable, but lynx does not properly sanitize special characters such as carriage returns or linefeeds. Extra headers can be inserted into the request because of this, which can cause scripts that use lynx to fetch data from the wrong site from servers that use virtual hosting.

Read more

MDKSA-2003:024 : MNF8.2

The following packages are now available for Multi Network Firewall 8.2 and bring it up to the same errata level as Mandrake Linux 8.2 with all patches and updates available to date applied. In order to bring your MNF8.2 configuration up to date, you will have to follow a few steps.

Read more