Red Hat has released updated KDE packages to fix security issues in Red Hat Linux 7.2, 7.3, and 8.0
A new security update for Debian GNU/Linux has been released:
DSA-203-1 smb2www -- arbitrary command execution
DSA-203-1 smb2www -- arbitrary command execution
Robert Luberda found a security problem in smb2www, a Windows Network client that is accessible through a web browser. This could lead a remote attacker to execute arbitrary programs under the user id www-data on the host where smb2www is running.Read more
This problem has been fixed in version 980804-16.1 for the current stable distribution (woody), in version 980804-8.1 of the old stable distribution (potato) and in version 980804-17 for the unstable distribution (sid).
We recommend that you upgrade your smb2www package immediately.
Sun has released a security patch for the Cobalt RaQ4 server appliance:
SHP Removal 2.0.1
SHP Removal 2.0.1
This patch removes the SHP package. Customers who installed SHP are advised to install this patch to remove serious compatibility issues.Download
Reboot Required: Yes
MD5 Check Sum: ca100017bc957075ba6b142f337ef0a4
MandrakeSoft has released the follow updates for Mandrake Linux:
MDKSA-2002:085 : WindowMaker
MDKSA-2002:084 : pine
MDKA-2002:020 : galeon
MDKSA-2002:085 : WindowMaker
Al Viro discovered a vulnerability in the WindowMaker window manager. A function used to load images, for example when configuring a new background image or previewing themes, contains a buffer overflow. The function calculates the amount of memory necessary to load the image by doing some multiplication but does not check the results of this multiplication, which may not fit into the destination variable, resulting in a buffer overflow when the image is loaded.Read more
MDKSA-2002:084 : pine
A vulnerability was discovered in pine while parsing and escaping characters of email addresses; not enough memory is allocated for storing the escaped mailbox part of the address. The resulting buffer overflow on the heap makes pine crash. This new version of pine, 4.50, has the vulnerability fixed. It also offers many other bug fixes and new features.Read more
MDKA-2002:020 : galeon
A bug exists in the galeon web browser when using it with EHWM -compliant window managers such as metacity. When galeon is in fullscreen mode, the GNOME panel is below the fullscreen window and is not readable. This update fixes the problem.Read more
Two new security updates for Debian GNU/Linux has been released:
DSA-201-1 freeswan -- denial of service
DSA-202-1 im -- insecure temporary files
DSA-201-1 freeswan -- denial of service
Bindview discovered a problem in several IPSEC implementations that do not properly handle certain very short packets. IPSEC is a set of security extensions to IP which provide authentication and encryption. Free/SWan in Debian is affected by this and is said to cause a kernel panic.Read more
This problem has been fixed in version 1.96-1.4 for the current stable distribution (woody) and in version 1.99-1 for the unstable distribution (sid). The old stable distribution (potato) does not contain Free/SWan packages.
DSA-202-1 im -- insecure temporary files
Tatsuya Kinoshita discovered that IM, which contains interface commands and Perl libraries for E-mail and NetNews, creates temporary files insecurely.Read more
These problems have been fixed in version 141-18.1 for the current stable distribution (woody), in version 133-2.2 of the old stable distribution (potato) and in version 141-20 for the unstable distribution (sid).
Red Hat has released updated Webalizer packages for Red Hat Linux 7.2
An updated xinetd package has been released for Red Hat Linux
MandrakeSoft has released a sendmail update for Mandrake Linux
SuSE has released a security update for Pine
A samba security update for Debian GNU/Linux has been released
Red Hat has released new samba packages for Red Hat 7.3/8.0 to fix a potential security vulnerability
MandrakeSoft has released updated kdelibs/kdenetwork packages
kdelibs
Vulnerabilities were discovered in the KIO subsystem support for various network protocols. The implementation of the rlogin protocol affects all KDE versions from 2.1 up to 3.0.4, while the flawed implementation of the telnet protocol only affects KDE 2.x. They allow a carefully crafted URL in an HTML page, HTML email, or other KIO-enabled application to execute arbitrary commands as the victim with their privilege.
Read more
kdenetwork
The SuSE security team discovered two vulnerabilities in the KDE lanbrowsing service during an audit. The LISa network daemon and "reslisa", a restricted version of LISa are used to identify servers on the local network by using the URL type "lan://" and "rlan://" respectively. A buffer overflow was discovered in the lisa daemon that can be exploited by an attacker on the local network to obtain root privilege on a machine running the lisa daemon. Another buffer overflow was found in the lan:// URL handler, which can be exploited by a remote attacker to gain access to the victim user's account.
Read more
kdelibs
Vulnerabilities were discovered in the KIO subsystem support for various network protocols. The implementation of the rlogin protocol affects all KDE versions from 2.1 up to 3.0.4, while the flawed implementation of the telnet protocol only affects KDE 2.x. They allow a carefully crafted URL in an HTML page, HTML email, or other KIO-enabled application to execute arbitrary commands as the victim with their privilege.
Read more
kdenetwork
The SuSE security team discovered two vulnerabilities in the KDE lanbrowsing service during an audit. The LISa network daemon and "reslisa", a restricted version of LISa are used to identify servers on the local network by using the URL type "lan://" and "rlan://" respectively. A buffer overflow was discovered in the lisa daemon that can be exploited by an attacker on the local network to obtain root privilege on a machine running the lisa daemon. Another buffer overflow was found in the lan:// URL handler, which can be exploited by a remote attacker to gain access to the victim user's account.
Read more
SuSE has released a Samba update for SuSE Linux 7.2, 7.3, 8.0, and 8.1
A new security update for Debian GNU/Linux is available
MandrakeSoft has released an updated ypserv package for Mandrake Linux
A new nullmailer package for Debian GNU/Linux has been released
Solarspeed.net has released another unofficial Bind update for the Sun Cobalt RaQ 3/4 server appliances.
Two new security updates are available for Debian GNU/Linux
BIND
ISS X-Force has discovered several serious vulnerabilities in the Berkeley Internet Name Domain Server (BIND). BIND is the most common implementation of the DNS (Domain Name Service) protocol, which is used on the vast majority of DNS servers on the Internet. DNS is a vital Internet protocol that maintains a database of easy-to-remember domain names (host names) and their corresponding numerical IP addresses.
Read more
Courier
A problem in the Courier sqwebmail package, a CGI program to grant authenticated access to local mailboxes, has been discovered. The program did not drop permissions fast enough upon startup under certain circumstances so a local shell user can execute the sqwebmail binary and manage to read an arbitrary file on the local filesystem.
Read more
BIND
ISS X-Force has discovered several serious vulnerabilities in the Berkeley Internet Name Domain Server (BIND). BIND is the most common implementation of the DNS (Domain Name Service) protocol, which is used on the vast majority of DNS servers on the Internet. DNS is a vital Internet protocol that maintains a database of easy-to-remember domain names (host names) and their corresponding numerical IP addresses.
Read more
Courier
A problem in the Courier sqwebmail package, a CGI program to grant authenticated access to local mailboxes, has been discovered. The program did not drop permissions fast enough upon startup under certain circumstances so a local shell user can execute the sqwebmail binary and manage to read an arbitrary file on the local filesystem.
Read more
A new kernel update is available for Red Hat Linux
An apparent delay in the availability of patches for the vulnerabilities in BIND that were disclosed earlier this week is once again highlighting the seemingly endless debate over when and to whom vulnerability data should be released.
Read more
Read more