Security 10929 Published by Philipp Esselbach 0

Cheetaweb has released an unofficial Sendmail patch for Red Hat Linux 7.2:

Download and install the following RPM's with rpm -Uvh

sendmail-8.11.6-24.72.i386.rpm
sendmail-cf-8.11.6-24.72.i386.rpm
sendmail-devel-8.11.6-24.72.i386.rpm
sendmail-doc-8.11.6-24.72.i386.rpm

MD5 Checksums:

f94ea1591d6a6d129f78feaeae912ff0 sendmail-8.11.6-24.72.i386.rpm
02d64303522d2462bc10c273eb8be06b sendmail-cf-8.11.6-24.72.i386.rpm
6ecd6c126e8c7f2521dfe85d81912848 sendmail-devel-8.11.6-24.72.i386.rpm
c6e93505c859a6672f3119ef2ea171a5 sendmail-doc-8.11.6-24.72.i386.rpm

Security 10929 Published by Philipp Esselbach 0

A new security update for Debian GNU/Linux has been released

DSA-274-1 mutt -- buffer overflow

Byrial Jensen discovered a couple of off-by-one buffer overflow in the IMAP code of Mutt, a text-oriented mail reader supporting IMAP, MIME, GPG, PGP and threading. This problem could potentially allow a remote malicious IMAP server to cause a denial of service (crash) and possibly execute arbitrary code via a specially crafted mail folder.

Read more

Security 10929 Published by Philipp Esselbach 0

Two new security updates for Debian GNU/Linux are available:

DSA-273-1 krb4 -- Cryptographic weakness

A cryptographic weakness in version 4 of the Kerberos protocol allows an attacker to use a chosen-plaintext attack to impersonate any principal in a realm. Additional cryptographic weaknesses in the krb4 implementation permit the use of cut-and-paste attacks to fabricate krb4 tickets for unauthorized client principals if triple-DES keys are used to key krb4 services. These attacks can subvert a site's entire Kerberos authentication infrastructure.

Read more

DSA-272-1 dietlibc -- integer overflow

eEye Digital Security discovered an integer overflow in the xdrmem_getbytes() function of glibc, that is also present in dietlibc, a small libc useful especially for small and embedded systems. This function is part of the XDR encoder/decoder derived from Sun's RPC implementation. Depending upon the application, this vulnerability can cause buffer overflows and could possibly be exploited to execute arbitray code.

Read more

Security 10929 Published by Philipp Esselbach 0

Two new security updates for Debian GNU/Linux has been released:

DSA-271-1 ecartis -- unauthorized password change

A problem has been discovered in ecartis, a mailing list manager, formerly known as listar. This vulnerability enables an attacker to reset the password of any user defined on the list server, including the list admins.

Read more

DSA-270-1 linux-kernel-mips -- local privilege escalation

The kernel module loader in Linux 2.2 and Linux 2.4 kernels has a flaw in ptrace. This hole allows local users to obtain root privileges by using ptrace to attach to a child process that is spawned by the kernel. Remote exploitation of this hole is not possible.

This advisory only covers kernel packages for the big and little endian MIPS architectures. Other architectures will be covered by separate advisories.

Read more

Security 10929 Published by Philipp Esselbach 0

Another security update for Debian GNU/Linux has been released:

DSA-267-1 lpr -- buffer overflow

A buffer overflow has been discovered in lpr, a BSD lpr/lpd line printer spooling system. This problem can be exploited by a local user to gain root privileges, even if the printer system is set up properly.

For the stable distribution (woody) this problem has been fixed in version 2000.05.07-4.3.

For the old stable distribution (potato) this problem has been fixed in version 0.48-1.1.

For the unstable distribution (sid) this problem has been fixed in version 2000.05.07-4.20.

We recommend that you upgrade your lpr package immediately.

Download