Security 10943 Published by Philipp Esselbach 0

A new security update for Debian GNU/Linux is available

DSA-264-1 lxr -- missing filename sanitizing

Upstream developers of lxr, a general hypertext cross-referencing tool, have been alerted of a vulnerability that allows a remote attacker to read arbitrary files on the host system as user www-data. This could disclose local files that were not meant to be shared with the public.

For the stable distribution (woody) this problem has been fixed in version 0.3-3.

The old stable distribution (potato) is not affected since it does not contain an lxr package.

For the unstable distribution (sid) this problem has been fixed in version 0.3-4.

Read more

Security 10943 Published by 0

A new security update for Debian GNU/Linux has been released

DSA-263-1 netpbm-free -- math overflow errors

Al Viro and Alan Cox discovered several maths overflow errors in NetPBM, a set of graphics conversion tools. These programs are not installed setuid root but are often installed to prepare data for processing. These vulnerabilities may allow remote attackers to cause a denial of service or execute arbitrary code.

For the stable distribution (woody) this problem has been fixed in version 9.20-8.2.

The old stable distribution (potato) does not seem to be affected by this problem.

For the unstable distribution (sid) this problem has been fixed in version 9.20-9.

Read more

Security 10943 Published by Philipp Esselbach 0

Red Hat has release the following security updates for Red Hat Linux:

Updated rxvt packages fix various vulnerabilites

Updated rxvt packages are available which fix a number of vulnerabilities in the handling of escape sequences.

Read more

Updated 2.4 kernel fixes vulnerability

Updated kernel packages for Red Hat Linux 7.1, 7.2, 7.3, and 8.0 are now available. These packages fix a ptrace-related vulnerability that can lead to elevated (root) privileges.

Read more

Security 10943 Published by Philipp Esselbach 0

A new security update for Gentoo Linux is out

PACKAGE : samba

The SuSE security audit team, in particular Sebastian Krahmer , has found a flaw in the Samba main smbd code which could allow an external attacker to remotely and anonymously gain Super User (root) privileges on a server running a Samba server.

Read more

Security 10943 Published by Philipp Esselbach 0

Thanks Toby. From the Samba website:
(14th Mar, 2003) Security Release - Samba 2.2.8

A flaw has been detected in the Samba main smbd code which could allow an external attacker to remotely and anonymously gain Super User (root) privileges on a server running a Samba server. This flaw exists in previous versions of Samba from 2.0.x to 2.2.7a inclusive. This is a serious problem and all sites should either upgrade to Samba 2.2.8 immediately or prohibit access to TCP ports 139 and 445.

Read more

Security 10943 Published by Philipp Esselbach 0

Two new security updates for Debian GNU/Linux has been released:

DSA-259-1 qpopper -- mail user privilege escalation

Florian Heinz heinz@cronon-ag.de posted to the Bugtraq mailing list an exploit for qpopper based on a bug in the included vsnprintf implementation. The sample exploit requires a valid user account and password, and overflows a string in the pop_msg() function to give the user "mail" group privileges and a shell on the system. Since the Qvsnprintf function is used elsewhere in qpopper, additional exploits may be possible.

The qpopper package in Debian 2.2 (potato) does not include the vulnerable snprintf implementation. For Debian 3.0 (woody) an updated package is available in version 4.0.4-2.woody.3. Users running an unreleased version of Debian should upgrade to 4.0.4-9 or newer. We recommend you upgrade your qpopper package immediately.

Read more

DSA-260-1 file -- buffer overflow

iDEFENSE discovered a buffer overflow vulnerability in the ELF format parsing of the "file" command, one which can be used to execute arbitrary code with the privileges of the user running the command. The vulnerability can be exploited by crafting a special ELF binary which is then input to file. This could be accomplished by leaving the binary on the file system and waiting for someone to use file to identify it, or by passing it to a service that uses file to classify input. (For example, some printer filters run file to determine how to process input going to a printer.)

Fixed packages are available in version 3.28-1.potato.1 for Debian 2.2 (potato) and version 3.37-3.1.woody.1 for Debian 3.0 (woody). We recommend you upgrade your file package immediately.

Read more

Security 10943 Published by Philipp Esselbach 0

The following new security updates for Gentoo Linux are available:

PACKAGE : mysqlcc

Versions prior to 0.8.9 had all configuration and connection files world readable.

Read more

PACKAGE : netscape-flash

The cumulative security patch is available today and addresses the potential for exploits surrounding buffer overflows (read/write) and sandbox integrity within the player, which might allow malicious users to gain access to a user's computer.

Read more

PACKAGE : ethereal

The SOCKS dissector in Ethereal 0.9.9 is susceptible to a format string overflow.

Read more

Security 10943 Published by Philipp Esselbach 0

A new security update for Debian GNU/Linux has been released:

DSA-258-1 ethereal -- format string vulnerability

Georgi Guninski discovered a problem in ethereal, a network traffic analyzer. The program contains a format string vulnerability that could probably lead to execution of arbitrary code.

For the stable distribution (woody) this problem has been fixed in version 0.9.4-1woody3.

The old stable distribution (potato) does not seem to be affected by this problem.

For the unstable distribution (sid) this problem has been fixed in version 0.9.9-2.

Read more

Security 10943 Published by Philipp Esselbach 0

MandrakeSoft has released two security updates for Mandrake Linux

MDKSA-2003:029 : snort

A buffer overflow was discovered in the snort RPC normalization routines by ISS-XForce which can cause snort to execute arbitrary code embedded within sniffed network packets. The rpc_decode preprocessor is enabled by default. The snort developers have released version 1.9.1 to correct this behaviour; snort versions from 1.8 up to 1.9.0 are vulnerable.

Read more

MDKSA-2003:030 : file

A memory allocation problem in file was found by Jeff Johnson, and a stack overflow corruption problem was found by David Endler. These problems have been corrected in file version 3.41 and likely affect all previous version. These problems pose a security threat as they can be used to execute arbitrary code by an attacker under the privileges of another user. Note that the attacker must first somehow convince the target user to execute file against a specially crafted file that triggers the buffer overflow in file.

Read more