Security 10929 Published by 0

MandrakeSoft has released two security updates for Mandrake Linux:

Apache
A number of vulnerabilities were discovered in Apache versions prior to 1.3.27. The first is regarding the use of shared memory (SHM) in Apache. An attacker that is able to execute code as the UID of the webserver (typically "apache") is able to send arbitrary processes a USR1 signal as root. Using this vulnerability, the attacker can also cause the Apache process to continously span more children processes, thus causing a local DoS. Another vulnerability was discovered by Matthew Murphy regarding a cross site scripting vulnerability in the standard 404 error page. Finally, some buffer overflows were found in the "ab" benchmark program that is included with Apache.

All of these vulnerabilities were fixed in Apache 1.3.27; the packages provided have these fixes applied.
Read more

MySQL
Two vulnerabilities were discovered in all versions of MySQL prior to 3.23.53a and 4.0.5a by Stefan Esser. The first can be used by any valid MySQL user to crash the MySQL server, the other allows anyone to bypass the MySQL password check or execute arbitraty code with the privilege of the user running mysqld. Another two vulnerabilities were found, one an arbitrary size heap overflow in the mysql client library and another that allows one to write '
Read more

Security 10929 Published by Philipp Esselbach 0

SECURITY HOLES DISCOVERED in the MySQL open source database and client software could allow an attacker to launch a denial of service attack against machines running affected MySQL components or gain administrative access to the database server, according to an alert posted by German security company e-matters GmbH.

Read more

Security 10929 Published by Philipp Esselbach 0

A new security update for Debian GNU/Linux has been released

[DSA 207-1] New tetex-lib packages fix arbitrary command execution
The SuSE security team discovered a vulnerability in kpathsea library (libkpathsea) which is used by xdvi and dvips. Both programs call the system() function insecurely, which allows a remote attacker to execute arbitrary commands via cleverly crafted DVI files.
Read more

Security 10929 Published by Philipp Esselbach 0

New gtetrinet and tcpdump packages has been released for Debian GNU/Linux

DSA-206-1 tcpdump -- denial of service
The BGP decoding routines for tcpdump used incorrect bounds checking when copying data. This could be abused by introducing malicious traffic on a sniffed network for a denial of service attack against tcpdump, or possibly even remote code execution.

This has been fixed in version 3.6.2-2.2.
Read more

DSA-205-1 gtetrinet -- buffer overflow
Steve Kemp and James Antill found several buffer overflows in the gtetrinet (a multiplayer tetris-like game) package as shipped in Debian GNU/Linux 3.0, which could be abused by a malicious server.

This has been fixed in upstream version 0.4.4 and release 0.4.1-9woody1.1 of the Debian package.
Read more

Security 10929 Published by Philipp Esselbach 0

Red Hat has released the follow new security updates:

Updated Canna packages fix vulnerabilities
The Canna server, used for Japanese character input, has two security vulnerabilities including an exploitable buffer overrun allowing a local user to gain 'bin' user privileges. Updated packages for Red Hat Linux are available.
Read more

Updated Webalizer packages fix vulnerability
Updated Webalizer packages which fix an obscure buffer overflow bug in the DNS resolver code are available for Red Hat Linux 7.2.
Read more

Updated wget packages fix directory traversal bug
The wget packages shipped with Red Hat Linux 6.2 through 8.0 contain a security bug which, under certain circumstances, can cause local files to be written outside the download directory.
Read more

Security 10929 Published by Philipp Esselbach 0

The KDE team has discovered a vulnerability in the support for various network protocols via the KIO. The implementation of the rlogin and telnet protocols allows a carefully crafted URL in an HTML page, HTML email or other KIO-enabled application to execute arbitrary commands on the system using the victim's account on the vulnerable machine.

This problem has been fixed by disabling rlogin and telnet in version 2.2.2-13.woody.5 for the current stable distribution (woody). The old stable distribution (potato) is not affected since it doesn't contain KDE. A correction for the package in the unstable distribution (sid) is not yet available.

Read more

Security 10929 Published by Philipp Esselbach 0

A new security update for Debian GNU/Linux has been released:

DSA-203-1 smb2www -- arbitrary command execution
Robert Luberda found a security problem in smb2www, a Windows Network client that is accessible through a web browser. This could lead a remote attacker to execute arbitrary programs under the user id www-data on the host where smb2www is running.

This problem has been fixed in version 980804-16.1 for the current stable distribution (woody), in version 980804-8.1 of the old stable distribution (potato) and in version 980804-17 for the unstable distribution (sid).

We recommend that you upgrade your smb2www package immediately.
Read more

Security 10929 Published by Philipp Esselbach 0

Sun has released a security patch for the Cobalt RaQ4 server appliance:

SHP Removal 2.0.1
This patch removes the SHP package. Customers who installed SHP are advised to install this patch to remove serious compatibility issues.

Reboot Required: Yes

MD5 Check Sum: ca100017bc957075ba6b142f337ef0a4
Download

Security 10929 Published by Philipp Esselbach 0

MandrakeSoft has released the follow updates for Mandrake Linux:

MDKSA-2002:085 : WindowMaker
Al Viro discovered a vulnerability in the WindowMaker window manager. A function used to load images, for example when configuring a new background image or previewing themes, contains a buffer overflow. The function calculates the amount of memory necessary to load the image by doing some multiplication but does not check the results of this multiplication, which may not fit into the destination variable, resulting in a buffer overflow when the image is loaded.
Read more

MDKSA-2002:084 : pine
A vulnerability was discovered in pine while parsing and escaping characters of email addresses; not enough memory is allocated for storing the escaped mailbox part of the address. The resulting buffer overflow on the heap makes pine crash. This new version of pine, 4.50, has the vulnerability fixed. It also offers many other bug fixes and new features.
Read more

MDKA-2002:020 : galeon
A bug exists in the galeon web browser when using it with EHWM -compliant window managers such as metacity. When galeon is in fullscreen mode, the GNOME panel is below the fullscreen window and is not readable. This update fixes the problem.
Read more

Security 10929 Published by Philipp Esselbach 0

Two new security updates for Debian GNU/Linux has been released:

DSA-201-1 freeswan -- denial of service
Bindview discovered a problem in several IPSEC implementations that do not properly handle certain very short packets. IPSEC is a set of security extensions to IP which provide authentication and encryption. Free/SWan in Debian is affected by this and is said to cause a kernel panic.

This problem has been fixed in version 1.96-1.4 for the current stable distribution (woody) and in version 1.99-1 for the unstable distribution (sid). The old stable distribution (potato) does not contain Free/SWan packages.
Read more

DSA-202-1 im -- insecure temporary files
Tatsuya Kinoshita discovered that IM, which contains interface commands and Perl libraries for E-mail and NetNews, creates temporary files insecurely.

These problems have been fixed in version 141-18.1 for the current stable distribution (woody), in version 133-2.2 of the old stable distribution (potato) and in version 141-20 for the unstable distribution (sid).
Read more