Security 10912 Published by Philipp Esselbach 0

A new security update for Debian GNU/Linux is available

DSA-247-1 courier-ssl -- missing input sanitizing
The developers of courier, an integrated user side mail server, discovered a problem in the PostgreSQL auth module. Not all potentially malicious characters were sanitized before the username was passed to the PostgreSQL engine. An attacker could inject arbitrary SQL commands and queries exploiting this vulnerability. The MySQL auth module is not affected.
Read more

Security 10912 Published by Philipp Esselbach 0

A cvs package secuity update for Gentoo Linux has been released:

By sending a malformed directory name it is possible to trigger an error condition that will make the function return at a point where a global pointer variable is already freed and has not got a new value assigned yet. This will result in a classical double-free() when the next Directory request is handled. With the help of other CVS requests it is possible to either leak some information that could be used to determine the heap position or to execute arbitrary code on systems that are known to be vulnerable to this kind of bugs.

SOLUTION

It is recommended that all Gentoo Linux users who are running dev-util/cvs upgrade to cvs-1.11.5 as follows:

emerge sync
emerge -u cvs
emerge clean

Security 10912 Published by 0

Three new security updates for Gentoo Linux are available:

PACKAGE : fnord

fnord 1.6 contained a buffer overrun in the CGI code. However, since the function does not return, this does not appear to be exploitable

Read more

PACKAGE : dhcp

The Internet Software Consortium (ISC) has discovered several buffer overflow vulnerabilities in their implementation of DHCP (ISC DHCPD). These vulnerabilities may allow remote attackers to execute arbitrary code on affected systems. At this time, we are not aware of any exploits.

Read more

PACKAGE : kde-2.2.x

In some instances KDE fails to properly quote parameters of instructions passed to a command shell for execution.

These parameters may incorporate data such as URLs, filenames and e-mail addresses, and this data may be provided remotely to a victim in an e-mail, a webpage or files on a network filesystem or other untrusted source.

Read more

Security 10912 Published by Philipp Esselbach 0

MandrakeSoft has released the follow security updates for Mandrake Linux:

MDKSA-2003:007 : dhcp

Several potential vulnerabilities were detected by the ISC (Internet Software Consortium) in their dhcp server software. The vulnerabilities affect the minires library and may be exploitable as stack buffer overflows, which could lead to remote code execution. All Mandrake Linux users are encouraged to upgrade; only Mandrake Linux 8.0 came with dhcp 2.x and is not vulnerable.

Read more

MDKSA-2003:004-1 : kde

Multiple instances of improperly quoted shell command execution exist in KDE 2.x up to and including KDE 3.0.5. KDE fails to properly quote parameters of instructions passed to the shell for execution. These parameters may contain data such as filenames, URLs, email address, and so forth; this data may be provided remotely to a victim via email, web pages, files on a network filesystem, or other untrusted sources.

Read more

Security 10912 Published by Philipp Esselbach 0

Two new security updates for Debian GNU/Linux has been released:

DSA-231-1 dhcp3 -- stack overflows
The Internet Software Consortium discoverd several vulnerabilities during an audit of the ISC DHCP Daemon. The vulnerabilities exist in error handling routines within the minires library and may be exploitable as stack overflows. This could allow a remote attacker to execute arbitrary code under the user id the dhcpd runs under, usually root. Other DHCP servers than dhcp3 doesn't seem to be affected.

Read more

DSA-230-1 bugzilla -- insecure permissions, spurious backup files

Two vulnerabilities have been discovered in Bugzilla, a web-based bug tracking system, by its authors.

Read more