+---------------------------------------------------------------------+ | LinuxSecurity.com Weekly Newsletter | | February 3rd, 2006 Volume 7, Number 5a | +---------------------------------------------------------------------+ Editors: Dave Wreski Benjamin D. Thomas dave@private ben@private Linux Advisory Watch is a comprehensive newsletter that outlines the security vulnerabilities that have been announced throughout the week. It includes pointers to updated packages and descriptions of each vulnerability. Due to several changes in our advisory archiving scripts, Linux Advisory Watch did not go out last week. This has caused an unusually high number of advisories. The purpose of this week's newsletter is to 'catch up' and ensure that every advisory has been published. We apologize for any inconvenience. Advisories were released for petris, unzip, tetex-bin, koffice, fetchmail, gpdf, tuxpaint, albatross, mantis, antiword, smstools, sudo, ClamAV, kdelibs, crawl, CUPS, trac, libapache-auth-ldap, flyspray, wine, mailman, lsh-utils, ImageMagick, drupal, hylafax, libextractor, unalz, limbmail-audit-perl, pdftohtml, mod_auth_pgsql, poppler, tetex, kdegraphics, ethereal, httpd, openssh, mozilla, firefox, Gallery, LibAST, Paros, MyDNS, xorg-x11, UUlib, SSLeay, mdkonline, gthumb, libgphoto, net-snmp, apache2, thunderbird, bzip2, gzip, libast, gd, and phpMyAdmin. The distributors include Debian, Fedora, Gentoo, Mandriva, Red Hat, and SuSE. ---- Earn an NSA recognized IA Masters Online The NSA has designated Norwich University a center of Academic Excellence in Information Security. Our program offers unparalleled Infosec management education and the case study affords you unmatched consulting experience. Using interactive e-Learning technology, you can earn this esteemed degree, without disrupting your career or home life. http://www.msia.norwich.edu/linsec ---- A Linux Security Look To The Future By: Pax Dickinson It's much the same story as last year, Windows worms and viruses continually propagate, crossbreed, and multiply while Linux remains above the fray. Sober and the other "newsmaking" viruses all infect and attack Windows while all Linux admins get out of it are a few hits to our Snort rulesets. Yes, there are worms attacking Linux, and Linux, like any other system, is certainly not immune. Linux is, however, more resistant. One reason is made clear when the internet is compared to a biosphere. Linux is a mutt. Every Linux distribution does things slightly differently, Linux runs on very varied hardware, many Linux users compile their own software. Things just aren't as standardized in the Linux world, which is viewed as a flaw by many pundits, though it has many benefits when it comes to security. A Linux security flaw may only affect a certain distribution or application, and most distributions and applications lack the massive marketshare to provide enough sustenance for a worm to really get going. Meanwhile, the applications that do possess large marketshare, such as Apache, tend to be generally secure due to their source code availability. Windows, on the other hand, lacks this genetic diversity. One copy of Windows XP is exactly like the next, and the source is closed so previously unknown flaws are discovered all the time. Yes, Windows does have a greater marketshare making it a bigger target, but I'd wager that if the marketshares of Windows and Linux were even Windows would still have more vulnerabilities. In nature, populations that lack genetic diversity run the risk of being decimated by a virulent disease, and the internet is no different. There's a reason we use biological metaphors like "worm" and "virus" to describe malware. Linux also benefits by tending to not be a primary target for malware authors because they have such a juicy target in Windows. Of course, keeping systems patched has been and will remain key, luckily most Linux distributions available today tend to be very polished in this area, with tools such as apt-get, yum, and portage providing easy application and system upgrades. So much for the good. Looking to the future, things go from bad to beyond ugly. We Linux users should realize how good we have it right now and recognize that the current security situation will not remain so benevolent for us. In an environment of dumb worms and viruses targeted at the least common denominator, Linux is well prepared to hold fast and remain generally secure. However, sinister trends are developing now that may end this state of complacency and need to be addressed. Crime related to spam, spyware, and other online illegalities is said by some experts to have recently passed international drug trafficking in dollars earned, and malicious hacking that used to be performed for fun is now a big business. Websites once hacked only so the culprit could deface them and show off are now penetrated in order to steal customer data and engage in identity theft. Botnets of more than a million compromised hosts are not unknown, used to send spam, host child pornography, and perform distributed DoS attacks. An underground market for botnets has made the creation of viruses and trojans into a thriving business opportunity for the unscrupulous. Read Entire Article: http://www.linuxsecurity.com/content/view/121230/49/ ---------------------- EnGarde Secure Community 3.0.3 Released Guardian Digital is happy to announce the release of EnGarde Secure Community 3.0.3 (Version 3.0, Release 3). This release includes several bug fixes and feature enhancements to the Guardian Digital WebTool, the SELinux policy, and the LiveCD environment. http://www.linuxsecurity.com/content/view/121150/65/ --- Linux File & Directory Permissions Mistakes One common mistake Linux administrators make is having file and directory permissions that are far too liberal and allow access beyond that which is needed for proper system operations. A full explanation of unix file permissions is beyond the scope of this article, so I'll assume you are familiar with the usage of such tools as chmod, chown, and chgrp. If you'd like a refresher, one is available right here on linuxsecurity.com. http://www.linuxsecurity.com/content/view/119415/49/ --- Buffer Overflow Basics A buffer overflow occurs when a program or process tries to store more data in a temporary data storage area than it was intended to hold. Since buffers are created to contain a finite amount of data, the extra information can overflow into adjacent buffers, corrupting or overwriting the valid data held in them. http://www.linuxsecurity.com/content/view/119087/49/ -------- --> Take advantage of the LinuxSecurity.com Quick Reference Card! --> http://www.linuxsecurity.com/docs/QuickRefCard.pdf +---------------------------------+ | Distribution: Debian | ----------------------------// +---------------------------------+ * Debian: New petris packages fix buffer overflow 27th, January, 2006 Steve Kemp from the Debian Security Audit project discovered a buffer overflow in petris, a clone of the Tetris game, which may be exploited to execute arbitary code with group games privileges. http://www.linuxsecurity.com/content/view/121285 * Debian: New unzip packages fix unauthorised permissions modification 27th, January, 2006 The unzip update in DSA 903 contained a regression so that symbolic links that are resolved later in a zip archive aren't supported anymore. This update corrects this behaviour. http://www.linuxsecurity.com/content/view/121286 * Debian: New tetex-bin packages fix arbitrary code execution 27th, January, 2006 "infamous41md" and Chris Evans discovered several heap based buffer overflows in xpdf, the Portable Document Format (PDF) suite, which is also present in tetex-bin, the binary files of teTeX, and which can lead to a denial of service by crashing the application or possibly to the execution of arbitrary code. http://www.linuxsecurity.com/content/view/121287 * Debian: New koffice packages fix arbitrary code execution 27th, January, 2006 "infamous41md" and chris Evans discovered several heap based buffer overflows in xpdf, the Portable Document Format (PDF) suite, which is also present in koffice, the KDE Office Suite, and which can lead to a denial of service by crashing the application or possibly to the execution of arbitrary code. http://www.linuxsecurity.com/content/view/121288 * Debian: New fetchmail packages fix denial of service 27th, January, 2006 Daniel Drake discovered a problem in fetchmail, an SSL enabled POP3, APOP, IMAP mail gatherer/forwarder, that can cause a crash when the program is running in multidrop mode and receives messages without headers. http://www.linuxsecurity.com/content/view/121289 * Debian: New gpdf packages fix arbitrary code execution 27th, January, 2006 "infamous41md" and Chris Evans discovered several heap based buffer overflows in xpdf, the Portable Document Format (PDF) suite, which is also present in gpdf, the GNOME version of the Portable Document Format viewer, and which can lead to a denial of service by crashing the application or possibly to the execution of arbitrary code. http://www.linuxsecurity.com/content/view/121290 * Debian: New tuxpaint packages fix insecure temporary file creation 27th, January, 2006 Javier Fern=EF=BF=BDndez-Sanguino Pe=EF=BF=BDa from the Debian Security Aud= it project discovered that a script in tuxpaint, a paint program for young children, creates a temporary file in an insecure fashion. http://www.linuxsecurity.com/content/view/121291 * Debian: New albatross packages fix arbitrary code execution 27th, January, 2006 A design error has been discovered in the Albatross web application toolkit that causes user supplied data to be used as part of template execution and hence arbitrary code execution. http://www.linuxsecurity.com/content/view/121292 * Debian: New Perl packages fix arbitrary code execution 27th, January, 2006 Jack Louis discovered an integer overflow in Perl, Larry Wall's Practical Extraction and Report Language, that allows attackers to overwrite arbitrary memory and possibly execute arbitrary code via specially crafted content that is passed to vulnerable format strings of third party software. http://www.linuxsecurity.com/content/view/121293 * Debian: New mantis packages fix several vulnerabilities 27th, January, 2006 Several security related problems have been discovered in Mantis, a web-based bug tracking system. The Common Vulnerabilities and Exposures project identifies the following problems: http://www.linuxsecurity.com/content/view/121294 * Debian: New antiword packages fix insecure temporary file creation 27th, January, 2006 Javier Fern=EF=BF=BDndez-Sanguino Pe=EF=BF=BDa from the Debian Security Aud= it project discovered that two scripts in antiword, utilities to convert Word files to text and Postscript, create a temporary file in an insecure fashion. http://www.linuxsecurity.com/content/view/121295 * Debian: New smstools packages fix format string vulnerability 27th, January, 2006 Ulf Harnhammar from the Debian Security Audit project discovered a format string attack in the logging code of smstools, which may be exploited to execute arbitary code with root privileges. http://www.linuxsecurity.com/content/view/121296 * Debian: New sudo packages fix privilege escalation 27th, January, 2006 It has been discovered that sudo, a privileged program, that provides limited super user privileges to specific users, passes several environment variables to the program that runs with elevated privileges. In the case of include paths (e.g. for Perl, Python, Ruby or other scripting languages) this can cause arbitrary code to be executed as privileged user if the attacker points to a manipulated version of a system library. http://www.linuxsecurity.com/content/view/121297 * Debian: New ClamAV packages fix heap overflow 27th, January, 2006 A heap overflow has been discovered in ClamAV, a virus scanner, which could allow an attacker to execute arbitrary code by sending a carefully crafted UPX-encoded executable to a system runnig ClamAV. In addition, other potential overflows have been corrected. http://www.linuxsecurity.com/content/view/121298 * Debian: New kdelibs packages fix buffer overflow 27th, January, 2006 Maksim Orlovich discovered that the kjs Javascript interpreter, used in the Konqueror web browser and in other parts of KDE, performs insufficient bounds checking when parsing UTF-8 encoded Uniform Resource Identifiers, which may lead to a heap based buffer overflow and the execution of arbitrary code. http://www.linuxsecurity.com/content/view/121299 * Debian: New crawl packages fix potential group games execution 27th, January, 2006 Steve Kemp from the Debian Security Audit project discovered a security related problem in crawl, another console based dungeon exploration game in the vein of nethack and rogue. The program executes commands insecurely when saving or loading games which can allow local attackers to gain group games privileges. http://www.linuxsecurity.com/content/view/121300 * Debian: New CUPS packages fix arbitrary code execution 27th, January, 2006 "infamous41md" and Chris Evans discovered several heap based buffer overflows in xpdf which are also present in CUPS, the Common UNIX Printing System, and which can lead to a denial of service by crashing the application or possibly to the execution of arbitrary code. http://www.linuxsecurity.com/content/view/121301 * Debian: New trac packages fix SQL injection and cross-site scripting 27th, January, 2006 Several vulnerabilies have been discovered in trac, an enhanced wiki and issue tracking system for software development projects. The Common Vulnerabilities and Exposures project identifie the following problems: http://www.linuxsecurity.com/content/view/121302 * Debian: New libapache-auth-ldap packages fix arbitrary code execution 27th, January, 2006 "Seregorn" discovered a format string vulnerability in the logging function of libapache-auth-ldap, an LDAP authentication module for the Apache webserver, that can lead to the execution of arbitrary code. http://www.linuxsecurity.com/content/view/121303 * Debian: New flyspray packages fix cross-site scripting 27th, January, 2006 Several cross-site scripting vulnerabilities have been discovered in flyspray, a lightweight bug tracking system, which allows attackers to insert arbitary script code into the index page. http://www.linuxsecurity.com/content/view/121304 * Debian: New wine packages fix arbitrary code execution 27th, January, 2006 H D Moore that discovered that Wine, a free implemention of the Microsoft Windows APIs, inherits a design flaw from the Windows GDI API, which may lead to the execution of code through GDI escape functions in WMF files. http://www.linuxsecurity.com/content/view/121305 * Debian: New clamav packages fix heap overflow 27th, January, 2006 A heap overflow has been discovered in ClamAV, a virus scanner, which could allow an attacker to execute arbitrary code by sending a carefully crafted UPX-encoded executable to a system runnig ClamAV. In addition, other potential overflows have been corrected. http://www.linuxsecurity.com/content/view/121306 * Debian: New xpdf packages fix arbitrary code execution 27th, January, 2006 "infamous41md" and Chris Evans discovered several heap based buffer overflows in xpdf, the Portable Document Format (PDF) suite, that can lead to a denial of service by crashing the application or possibly to the execution of arbitrary code. http://www.linuxsecurity.com/content/view/121307 * Debian: New mailman packages fix denial of service 27th, January, 2006 Two denial of service bugs were found in the mailman list server. In one, attachment filenames containing UTF8 strings were not properly parsed, which could cause the server to crash. In another, a message containing a bad date string could cause a server crash. http://www.linuxsecurity.com/content/view/121308 * Debian: New lsh-utils packages fix local vulnerabilities 27th, January, 2006 Stefan Pfetzing discovered that lshd, a Secure Shell v2 (SSH2) protocol server, leaks a couple of file descriptors, related to the randomness generator, to user shells which are started by lshd. A local attacker can truncate the server's seed file, which may prevent the server from starting, and with some more effort, maybe also crack session keys. http://www.linuxsecurity.com/content/view/121309 * Debian: New ImageMagick packages fix arbitrary command execution 27th, January, 2006 Florian Weimer discovered that delegate code in ImageMagick is vulnerable to shell command injection using specially crafted file names.=09This allows attackers to encode commands inside of graphic commands. With some user interaction, this is exploitable through Gnus and Thunderbird. http://www.linuxsecurity.com/content/view/121310 * Debian: New drupal packages fix several vulnerabilities 27th, January, 2006 Several security related problems have been discovered in drupal, a fully-featured content management/discussion engine. The Common Vulnerabilities and Exposures project identifies the following vulnerabilities: http://www.linuxsecurity.com/content/view/121311 * Debian: New kpdf packages fix arbitrary code execution 27th, January, 2006 "infamous41md" and Chris Evans discovered several heap based buffer overflows in xpdf, the Portable Document Format (PDF) suite, that can lead to a denial of service by crashing the application or possibly to the execution of arbitrary code. The same code is present in kpdf which is part of the kdegraphics package. http://www.linuxsecurity.com/content/view/121312 * Debian: New hylafax packages fix arbitrary command execution 27th, January, 2006 Patrice Fournier found that hylafax passes unsanitized user data in the notify script, allowing users with the ability to submit jobs to run arbitrary commands with the privileges of the hylafax server. http://www.linuxsecurity.com/content/view/121313 * Debian: New pound packages fix multiple vulnerabilities 27th, January, 2006 Two vulnerabilities have been discovered in Pound, a reverse proxy and load balancer for HTTP. The Common Vulnerabilities and Exposures project identifies the following problems: http://www.linuxsecurity.com/content/view/121314 * Debian: New smstools packages fix format string vulnerability 27th, January, 2006 Ulf Harnhammar from the Debian Security Audit project discovered a format string attack in the logging code of smstools, which may be exploited to execute arbitary code with root privileges. http://www.linuxsecurity.com/content/view/121315 * Debian: New libapache2-mod-auth-pgsql packages fix arbitrary code execution 27th, January, 2006 iDEFENSE reports that a format string vulnerability in mod_auth_pgsql, a library used to authenticate web users against a PostgreSQL database, could be used to execute arbitrary code with the privileges of the httpd user. http://www.linuxsecurity.com/content/view/121316 * Debian: New libextractor packages fix arbitrary code execution 27th, January, 2006 "infamous41md" and Chris Evans discovered several heap based buffer overflows in xpdf, the Portable Document Format (PDF) suite, which is also present in libextractor, a library to extract arbitrary meta-data from files, and which can lead to a denial of service by crashing the application or possibly to the execution of arbitrary code. http://www.linuxsecurity.com/content/view/121317 * Debian: New trac packages fix SQL injection and cross-site scripting 30th, January, 2006 This update corrects the search feature in trac, an enhanced wiki and issue tracking system for software development projects, which broke with the last security update. http://www.linuxsecurity.com/content/view/121444 * Debian: New unalz packages fix arbitrary code execution 30th, January, 2006 Ulf H=EF=BF=BDrnhammer from the Debian Audit Project discovered that unalz, a decompressor for ALZ archives, performs insufficient bounds checking when parsing file names. This can lead to arbitrary code execution if an attacker provides a crafted ALZ archive. http://www.linuxsecurity.com/content/view/121446 * Debian: New ImageMagick packages fix arbitrary command execution 31st, January, 2006 Florian Weimer discovered that delegate code in ImageMagick is vulnerable to shell command injection using specially crafted file names.=09This allows attackers to encode commands inside of graphic commands. With some user interaction, this is exploitable through Gnus and Thunderbird. This update filters out the '$' character as well, which was forgotton in the former update. http://www.linuxsecurity.com/content/view/121451 * Debian: New libmail-audit-perl packages fix insecure temporary file use 31st, January, 2006 Niko Tyni discovered that the Mail::Audit module, a Perl library for creating simple mail filters, logs to a temporary file with a predictable filename in an insecure fashion when logging is turned on, which is not the case by default. http://www.linuxsecurity.com/content/view/121452 * Debian: New libmail-audit-perl packages fix insecure temporary file use 31st, January, 2006 Updated package. http://www.linuxsecurity.com/content/view/121461 * Debian: New pdfkit.framework packages fix arbitrary code execution 1st, February, 2006 Updated package. http://www.linuxsecurity.com/content/view/121462 * Debian: New pdftohtml packages fix arbitrary code execution 1st, February, 2006 Updated package. http://www.linuxsecurity.com/content/view/121463 * Debian: New mydns packages fix denial of service 2nd, February, 2006 Updated package. http://www.linuxsecurity.com/content/view/121475 +---------------------------------+ | Distribution: Fedora | ----------------------------// +---------------------------------+ * Fedora Core 4 Update: cups-1.1.23-15.3 27th, January, 2006 This update fixes the pdftops filter's handling of some incorrectly-formed PDF files. Issues fixed are CVE-2005-3625, CVE-2005-3626, and CVE-2005-3627. http://www.linuxsecurity.com/content/view/121373 * Fedora Core 3 Update: cups-1.1.22-0.rc1.8.9 27th, January, 2006 This update fixes the pdftops filter's handling of some incorrectly-formed PDF files. Issues fixed are CVE-2005-3625, CVE-2005-3626, and CVE-2005-3627. http://www.linuxsecurity.com/content/view/121374 * Fedora Core 4 Update: kernel-2.6.14-1.1656_FC4 27th, January, 2006 This update fixes several low-priority security problems that were discovered during the development of 2.6.15, and backported. Notably, CVE-2005-4605. http://www.linuxsecurity.com/content/view/121377 * Fedora Core 3 Update: mod_auth_pgsql-2.0.1-6.2 27th, January, 2006 Several format string flaws were found in the way mod_auth_pgsql logs information. It may be possible for a remote attacker to execute arbitrary code as the 'apache' user if mod_auth_pgsql is used for user authentication. The Common Vulnerabilities and Exposures project assigned the name CVE-2005-3656 to this issue. Please note that this issue only affects servers which have mod_auth_pgsql installed and configured to perform user authentication against a PostgreSQL database. Red Hat would like to thank iDefense for reporting this issue. http://www.linuxsecurity.com/content/view/121378 * Fedora Core 4 Update: mod_auth_pgsql-2.0.1-8.1 27th, January, 2006 Several format string flaws were found in the way mod_auth_pgsql logs information. It may be possible for a remote attacker to execute arbitrary code as the 'apache' user if mod_auth_pgsql is used for user authentication. The Common Vulnerabilities and Exposures project assigned the name CVE-2005-3656 to this issue. Please note that this issue only affects servers which have mod_auth_pgsql installed and configured to perform user authentication against a PostgreSQL database. Red Hat would like to thank iDefense for reporting this issue. http://www.linuxsecurity.com/content/view/121379 * Fedora Core 3 Update: gpdf-2.8.2-7.2 27th, January, 2006 Chris Evans discovered several flaws in the way CUPS processes PDF files. An attacker could construct a carefully crafted PDF file that could cause CUPS to crash or possibly execute arbitrary code when opened. The Common Vulnerabilities and Exposures project assigned the names CVE-2005-3624, CVE-2005-3625, CVE-2005-3626, and CVE-2005-3627 to these issues. http://www.linuxsecurity.com/content/view/121392 * Fedora Core 4 Update: poppler-0.4.4-1.1 27th, January, 2006 Chris Evans discovered several flaws in the way poppler processes PDF files. An attacker could construct a carefully crafted PDF file that could cause poppler to crash or possibly execute arbitrary code when opened. The Common Vulnerabilities and Exposures project assigned the names CVE-2005-3624, CVE-2005-3625, CVE-2005-3626, and CVE-2005-3627 to these issues. http://www.linuxsecurity.com/content/view/121393 * Fedora Core 4 Update: xpdf-3.01-0.FC4.6 27th, January, 2006 Several flaws were discovered in Xpdf. An attacker could construct a carefully crafted PDF file that could cause xpdf to crash or possibly execute arbitrary code when opened. The Common Vulnerabilities and Exposures project assigned the name CAN-2005-3193 to these issues. Users of xpdf should upgrade to this updated package, which contains a patch to resolve these issues. http://www.linuxsecurity.com/content/view/121395 * Fedora Core 4 Update: tetex-3.0-9.FC4 27th, January, 2006 Several flaws were discovered in the way teTeX processes PDF files. An attacker could construct a carefully crafted PDF file that could cause poppler to crash or possibly execute arbitrary code when opened. The Common Vulnerabilities and Exposures project assigned the names CVE-2005-3625, CVE-2005-3626, and CVE-2005-3627 to these issues. This package also updates bindings in texdoc and causes the local texmf tree to be searched first. http://www.linuxsecurity.com/content/view/121396 * Fedora Core 3 Update: tetex-2.0.2-21.7.FC3 27th, January, 2006 Several flaws were discovered in the way teTeX processes PDF files. An attacker could construct a carefully crafted PDF file that could cause poppler to crash or possibly execute arbitrary code when opened. The Common Vulnerabilities and Exposures project assigned the names CVE-2005-3624, CVE-2005-3625, CVE-2005-3626, and CVE-2005-3627 to these issues. http://www.linuxsecurity.com/content/view/121397 * Fedora Core 4 Update: kdegraphics-3.5.0-0.2.fc4 27th, January, 2006 Several flaws were discovered in Xpdf. An attacker could construct a carefully crafted PDF file that could cause xpdf to crash or possibly execute arbitrary code when opened. The Common Vulnerabilities and Exposures project assigned the name CAN-2005-3193 to these issues. Users of kdegraphics should upgrade to this updated package, which contains a patch to resolve these issues. http://www.linuxsecurity.com/content/view/121404 * Fedora Core 3 Update: ethereal-0.10.14-1.FC3.1 27th, January, 2006 This update fixes a DoS in Ethereal. http://www.linuxsecurity.com/content/view/121408 * Fedora Core 4 Update: kdelibs-3.5.0-0.4.fc4 27th, January, 2006 A heap overflow flaw was discovered affecting kjs, the JavaScript interpreter engine used by Konqueror and other parts of KDE. An attacker could create a malicious web site containing carefully crafted JavaScript code that would trigger this flaw and possibly lead to arbitrary code execution. The Common Vulnerabilities and Exposures project assigned the name CVE-2006-0019 to this issue. Users of KDE should upgrade to these updated packages, which contain a backported patch from the KDE security team correcting this issue http://www.linuxsecurity.com/content/view/121415 * Fedora Core 4 Update: httpd-2.0.54-10.3 27th, January, 2006 This update includes fixes for three security issues in the Apache HTTP Server. http://www.linuxsecurity.com/content/view/121420 * Fedora Core 4 Update: openssh-4.2p1-fc4.10 27th, January, 2006 This is a minor security update which fixes double shell expansion in local to local and remote to remote copy with scp. It also fixes a few other minor non-security issues. http://www.linuxsecurity.com/content/view/121421 * Fedora Core 4 Update: mozilla-1.7.12-1.5.2 2nd, February, 2006 Mozilla is an open source Web browser, advanced email and newsgroup client, IRC chat client, and HTML editor. Igor Bukanov discovered a bug in the way Mozilla's JavaScript interpreter dereferences objects. If a user visits a malicious web page, Mozilla could crash or execute arbitrary code as the user running Mozilla. http://www.linuxsecurity.com/content/view/121496 * Fedora Core 4 Update: firefox-1.0.7-1.2.fc4 2nd, February, 2006 Mozilla Firefox is an open source Web browser. Igor Bukanov discovered a bug in the way Firefox's JavaScript interpreter dereferences objects. If a user visits a malicious web page, Firefox could crash or execute arbitrary code as the user running Firefox. The Common Vulnerabilities and Exposures project assigned the name CVE-2006-0292 to this issue. http://www.linuxsecurity.com/content/view/121497 +---------------------------------+ | Distribution: Gentoo | ----------------------------// +---------------------------------+ * Gentoo: HylaFAX Multiple vulnerabilities 27th, January, 2006 HylaFAX is vulnerable to arbitrary code execution and unauthorized access vulnerabilities. http://www.linuxsecurity.com/content/view/121318 * Gentoo: KPdf, KWord Multiple overflows in included Xpdf code 27th, January, 2006 KPdf and KWord both include vulnerable Xpdf code to handle PDF files, making them vulnerable to the execution of arbitrary code. http://www.linuxsecurity.com/content/view/121319 * Gentoo: xine-lib, FFmpeg Heap-based buffer overflow 27th, January, 2006 xine-lib and FFmpeg are vulnerable to a buffer overflow that may be exploited by attackers to execute arbitrary code. http://www.linuxsecurity.com/content/view/121320 * Gentoo: ClamAV Remote execution of arbitrary code 27th, January, 2006 ClamAV is vulnerable to a buffer overflow which may lead to remote execution of arbitrary code. http://www.linuxsecurity.com/content/view/121321 * Gentoo: HylaFAX Multiple vulnerabilities 27th, January, 2006 HylaFAX is vulnerable to arbitrary code execution and unauthorized access vulnerabilities. http://www.linuxsecurity.com/content/view/121322 * Gentoo: Blender Heap-based buffer overflow 27th, January, 2006 Blender is vulnerable to a buffer overflow that may be exploited by attackers to execute arbitrary code. http://www.linuxsecurity.com/content/view/121323 * Gentoo: Wine Windows Metafile SETABORTPROC vulnerability 27th, January, 2006 Fixed packages were issued to fix this vulnerability in Wine, but some of the fixed packages were missing the correct patch. All Wine users should re-emerge Wine to make sure they are safe. The corrected sections appear below. http://www.linuxsecurity.com/content/view/121324 * Gentoo: KDE kjs URI heap overflow vulnerability 27th, January, 2006 KDE fails to properly validate URIs when handling javascript, potentially resulting in the execution of arbitrary code. http://www.linuxsecurity.com/content/view/121325 * Gentoo: Trac Cross-site scripting vulnerability 27th, January, 2006 Trac is vulnerable to a cross-site scripting attack that could allow arbitrary JavaScript code execution. http://www.linuxsecurity.com/content/view/121326 * Gentoo: Gallery Cross-site scripting vulnerability 27th, January, 2006 Gallery is possibly vulnerable to a cross-site scripting attack that could allow arbitrary JavaScript code execution. http://www.linuxsecurity.com/content/view/121327 * Gentoo: mod_auth_pgsql Multiple format string vulnerabilities 27th, January, 2006 Format string vulnerabilities in mod_auth_pgsql may lead to the execution of arbitrary code. http://www.linuxsecurity.com/content/view/121328 * Gentoo: xine-lib, FFmpeg Heap-based buffer overflow 27th, January, 2006 xine-lib and FFmpeg are vulnerable to a buffer overflow that may be exploited by attackers to execute arbitrary code. http://www.linuxsecurity.com/content/view/121329 * Gentoo: VMware Workstation Vulnerability in NAT networking 27th, January, 2006 VMware guest operating systems can execute arbitrary code with elevated privileges on the host operating system through a flaw in NAT networking. http://www.linuxsecurity.com/content/view/121330 * Gentoo: ClamAV Remote execution of arbitrary code 27th, January, 2006 ClamAV is vulnerable to a buffer overflow which may lead to remote execution of arbitrary code. http://www.linuxsecurity.com/content/view/121331 * Gentoo: Blender Heap-based buffer overflow 27th, January, 2006 Blender is vulnerable to a buffer overflow that may be exploited by attackers to execute arbitrary code. http://www.linuxsecurity.com/content/view/121332 * Gentoo: Wine Windows Metafile SETABORTPROC vulnerability 27th, January, 2006 There is a flaw in Wine in the handling of Windows Metafiles (WMF) files, which could possibly result in the execution of arbitrary code. http://www.linuxsecurity.com/content/view/121333 * Gentoo: Sun and Blackdown Java Applet privilege escalation 27th, January, 2006 Sun's and Blackdown's JDK or JRE may allow untrusted applets to elevate their privileges. http://www.linuxsecurity.com/content/view/121334 * Gentoo: Wine Windows Metafile SETABORTPROC vulnerability 27th, January, 2006 There is a flaw in Wine in the handling of Windows Metafiles (WMF) files, which could possibly result in the execution of arbitrary code. http://www.linuxsecurity.com/content/view/121335 * Gentoo: LibAST Privilege escalation 29th, January, 2006 A buffer overflow in LibAST may result in execution of arbitrary code with escalated privileges. http://www.linuxsecurity.com/content/view/121434 * Gentoo: Paros Default administrator password 29th, January, 2006 Paros's database component is installed without a password, allowing execution of arbitrary system commands. http://www.linuxsecurity.com/content/view/121435 * Gentoo: MyDNS Denial of Service 30th, January, 2006 MyDNS contains a vulnerability that may lead to a Denial of Service attack. http://www.linuxsecurity.com/content/view/121447 * Gentoo: Xpdf, Poppler, GPdf, libextractor, pdftohtml Heap overflows 30th, January, 2006 Xpdf, Poppler, GPdf, libextractor and pdftohtml are vulnerable to integer overflows that may be exploited to execute arbitrary code. http://www.linuxsecurity.com/content/view/121449 +---------------------------------+ | Distribution: Mandriva | ----------------------------// +---------------------------------+ * Mandriva: Updated koffice packages fix several vulnerabilities 27th, January, 2006 Multiple heap-based buffer overflows in the DCTStream::readProgressiveSOF and DCTStream::readBaselineSOF functions in the DCT stream parsing code (Stream.cc) in xpdf 3.01 and earlier, allow user-complicit attackers to cause a denial of service (heap corruption) and possibly execute arbitrary code via a crafted PDF file with an out-of-range number of components (numComps), which is used as an array index. (CVE-2005-3191) http://www.linuxsecurity.com/content/view/121337 * Mandriva: Updated poppler packages fix several vulnerabilities 27th, January, 2006 Multiple heap-based buffer overflows in the DCTStream::readProgressiveSOF and DCTStream::readBaselineSOF functions in the DCT stream parsing code (Stream.cc) in xpdf 3.01 and earlier, allow user-complicit attackers to cause a denial of service (heap corruption) and possibly execute arbitrary code via a crafted PDF file with an out-of-range number of components (numComps), which is used as an array index. (CVE-2005-3191) http://www.linuxsecurity.com/content/view/121338 * Mandriva: Updated cups packages fix several vulnerabilities 27th, January, 2006 Multiple heap-based buffer overflows in the DCTStream::readProgressiveSOF and DCTStream::readBaselineSOF functions in the DCT stream parsing code (Stream.cc) in xpdf 3.01 and earlier, allow user-complicit attackers to cause a denial of service (heap corruption) and possibly execute arbitrary code via a crafted PDF file with an out-of-range number of components (numComps), which is used as an array index. (CVE-2005-3191) http://www.linuxsecurity.com/content/view/121340 * Mandriva: Updated tetex packages fix several vulnerabilities 27th, January, 2006 Multiple heap-based buffer overflows in the DCTStream::readProgressiveSOF and DCTStream::readBaselineSOF functions in the DCT stream parsing code (Stream.cc) in xpdf 3.01 and earlier, allow user-complicit attackers to cause a denial of service (heap corruption) and possibly execute arbitrary code via a crafted PDF file with an out-of-range number of components (numComps), which is used as an array index. (CVE-2005-3191) http://www.linuxsecurity.com/content/view/121341 * Mandriva: Updated xorg-x11 packages to address several bugs. 27th, January, 2006 Issues have been reported with display corruption for various cards, including several ATI and Nvidia cards when using the free drivers. There was also an issue with the Greek keyboard layout. These should be corrected by the upstream 6.9.0 final, which this package is based on. Updated packages should correct these issues. http://www.linuxsecurity.com/content/view/121342 * Mandriva: Updated kdegraphics packages fix several vulnerabilities 27th, January, 2006 Multiple heap-based buffer overflows in the DCTStream::readProgressiveSOF and DCTStream::readBaselineSOF functions in the DCT stream parsing code (Stream.cc) in xpdf 3.01 and earlier, allow user-complicit attackers to cause a denial of service (heap corruption) and possibly execute arbitrary code via a crafted PDF file with an out-of-range number of components (numComps), which is used as an array index. (CVE-2005-3191) http://www.linuxsecurity.com/content/view/121343 * Mandriva: Updated kolab packages fix vulnerability 27th, January, 2006 A problem exists in how the Kolab Server transports emails bigger than 8KB in size and if a dot (".") character exists in the wrong place. If these conditions are met, kolabfilter will double this dot and a modified email will be delivered, which could lead to broken clear-text signatures or broken attachments. The updated packages have been patched to correct these problems. http://www.linuxsecurity.com/content/view/121344 * Mandriva: Updated pdftohtml packages fix several vulnerabilities 27th, January, 2006 Multiple heap-based buffer overflows in the DCTStream::readProgressiveSOF and DCTStream::readBaselineSOF functions in the DCT stream parsing code (Stream.cc) in xpdf 3.01 and earlier, allow user-complicit attackers to cause a denial of service (heap corruption) and possibly execute arbitrary code via a crafted PDF file with an out-of-range number of components (numComps), which is used as an array index. (CVE-2005-3191) http://www.linuxsecurity.com/content/view/121345 * Mandriva: Updated wine packages fix WMF vulnerability 27th, January, 2006 A vulnerability was discovered by H D Moore in Wine which implements the SETABORTPROC GDI Escape function for Windows Metafile (WMF) files. This could be abused by an attacker who is able to entice a user to open a specially crafted WMF file from within a Wine-execute Windows application, possibly resulting in the execution of arbitrary code with the privileges of the user runing Wine. The updated packages have been patched to correct these problems. http://www.linuxsecurity.com/content/view/121346 * Mandriva: Updated hylafax packages fix eval injection vulnerabilities 27th, January, 2006 Patrice Fournier discovered the faxrcvd/notify scripts (executed as the uucp/fax user) run user-supplied input through eval without any attempt at sanitising it first. This would allow any user who could submit jobs to HylaFAX, or through telco manipulation control the representation of callid information presented to HylaFAX to run arbitrary commands as the uucp/fax user. (CVE-2005-3539, only 'notify' in the covered versions) Updated packages were also reviewed for vulnerability to an issue where if PAM is disabled, a user could log in with no password. (CVE-2005-3538) In addition, some fixes to the packages for permissions, and the %pre/%post scripts were backported from cooker. (#19679) The updated packages have been patched to correct these issues. http://www.linuxsecurity.com/content/view/121348 * Mandriva: Updated clamav packages fix vulnerability 27th, January, 2006 A heap-based buffer overflow was discovered in ClamAV versions prior to 0.88 which allows remote attackers to cause a crash and possibly execute arbitrary code via specially crafted UPX files. This update provides ClamAV 0.88 which corrects this issue and also fixes some other bugs. http://www.linuxsecurity.com/content/view/121349 * Mandriva: Updated mod_auth_ldap packages fix vulnerability 27th, January, 2006 A format string flaw was discovered in the way that auth_ldap logs information which may allow a remote attacker to execute arbitrary code as the apache user if auth_ldap is used for authentication. This update provides version 1.6.1 of auth_ldap which corrects the problem. Only Corporate Server 2.1 shipped with a supported auth_ldap package. http://www.linuxsecurity.com/content/view/121355 * Mandriva: Updated kernel packages fix several vulnerabilities 27th, January, 2006 A number of vulnerabilites have been corrected in the Linux kernel. http://www.linuxsecurity.com/content/view/121356 * Mandriva: Updated kdelibs packages fix vulnerability 27th, January, 2006 A heap overflow vulnerability was discovered in kjs, the KDE JavaScript interpretter engine. An attacker could create a malicious web site that contained carefully crafted JavaScript code that could trigger the flaw and potentially lead to the arbitrary execution of code as the user visiting the site. The updated packages have been patched to correct this problem. http://www.linuxsecurity.com/content/view/121357 * Mandriva: Subject: [Security Announce] Updated ipsec-tools packages fix vulnerability 27th, January, 2006 The Internet Key Exchange version 1 (IKEv1) implementation (isakmp_agg.c) in ipsec-tools racoon before 0.6.3, when running in aggressive mode, allows remote attackers to cause a denial of service (null dereference and crash) via crafted IKE packets, as demonstrated by the PROTOS ISAKMP Test Suite for IKEv1. The updated packages have been patched to correct this problem. http://www.linuxsecurity.com/content/view/121359 * Mandriva: Updated xpdf packages fix several vulnerabilities 27th, January, 2006 Multiple heap-based buffer overflows in the DCTStream::readProgressiveSOF and DCTStream::readBaselineSOF functionsin the DCT stream parsing code (Stream.cc) in xpdf 3.01 and earlier,allow user-complicit attackers to cause a denial of service (heap corruption) and possibly execute arbitrary code via a crafted PDF file with an out-of-range number of components (numComps), which is used as an array index. (CVE-2005-3191) http://www.linuxsecurity.com/content/view/121360 * Mandriva: Subject: [Security Announce] Updated mozilla-thunderbird packages fix vulnerability 27th, January, 2006 GUI display truncation vulnerability in Mozilla Thunderbird 1.0.2, 1.0.6, and 1.0.7 allows user-complicit attackers to execute arbitrary code via an attachment with a filename containing a large number of spaces ending with a dangerous extension that is not displayed by Thunderbird, along with an inconsistent Content-Type header, which could be used to trick a user into downloading dangerous content by dragging or saving the attachment. The updated packages have been patched to correct this problem. http://www.linuxsecurity.com/content/view/121361 * Mandriva: Updated perl-Convert-UUlib packages fix vulnerability 27th, January, 2006 A buffer overflow was discovered in the perl Convert::UUlib module in versions prior to 1.051, which could allow remote attackers to execute arbitrary code via a malformed parameter to a read operation. This update provides version 1.051 which is not vulnerable to this flaw. http://www.linuxsecurity.com/content/view/121362 * Mandriva: Updated perl-Net_SSLeay packages fix vulnerability 27th, January, 2006 Javier Fernandez-Sanguino Pena discovered that the perl Net::SSLeay module used the file /tmp/entropy as a fallback entropy source if a proper source was not set via the environment variable EGD_PATH. This could potentially lead to weakened cryptographic operations if an attacker was able to provide a /tmp/entropy file with known content. The updated packages have been patched to correct this problem. http://www.linuxsecurity.com/content/view/121363 * Mandriva: Updated ImageMagick packages fix vulnerabilities 27th, January, 2006 The delegate code in ImageMagick 6.2.4.x allows remote attackers to execute arbitrary commands via shell metacharacters in a filename that is processed by the display command. http://www.linuxsecurity.com/content/view/121364 * Mandriva: Updated mdkonline package provides url fixes 27th, January, 2006 The mdkonline package for MNF2 was incorrectly connecting to mandrivaonline.net rather than mandrivaonline.com. This update corrects the problem. http://www.linuxsecurity.com/content/view/121365 * Mandriva: Updated dynamic packages fix USB device and Palm detection issues 27th, January, 2006 Dynamic was not calling scripts correctly when hardware was plugged/unplugged. Plugging a digital camera (not usb mass storage, like a Canon camera) was not creating an icon on Desktop (for GNOME) or in the Devices window (for KDE). http://www.linuxsecurity.com/content/view/121366 * Mandriva: Update gthumb packages to fix corrupted UI after photo import 27th, January, 2006 A bug was discovered in gthumb were the UI (User Interface) can get corrupted when importing photos in some non-UTF8 locales (such as French). Some text strings (returned from libgphoto) where not converted into UTF-8 before being used by GTK+. Updated packages have been patched to correct the issue. http://www.linuxsecurity.com/content/view/121367 * Mandriva: Updated libgphoto packages fix bug on disconnection of digital camera 27th, January, 2006 A bug was discovered with libgphoto which was preventing the removal of icons on the desktop (in GNOME) or in the Devices window (in KDE) when a digital camera was unplugged. Updated packages have been patched to correct the issue. http://www.linuxsecurity.com/content/view/121368 * Mandriva: Updated gpdf packages fix several vulnerabilities 27th, January, 2006 Multiple heap-based buffer overflows in the DCTStream::readProgressiveSOF and DCTStream::readBaselineSOF functions in the DCT stream parsing code (Stream.cc) in xpdf 3.01 and earlier, allow user-complicit attackers to cause a denial of service (heap corruption) and possibly execute arbitrary code via a crafted PDF file with an out-of-range number of components (numComps), which is used as an array index. (CVE-2005-3191) http://www.linuxsecurity.com/content/view/121369 * Mandriva: Updated net-snmp packages fix vulnerabilities 27th, January, 2006 The fixproc application in Net-SNMP creates temporary files with predictable file names which could allow a malicious local attacker to change the contents of the temporary file by exploiting a race condition, which could possibly lead to the execution of arbitrary code. As well, a local attacker could create symbolic links in the /tmp directory that point to a valid file that would then be overwritten when fixproc is executed (CVE-2005-1740). A remote Denial of Service vulnerability was also discovered in the SNMP library that could be exploited by a malicious SNMP server to crash the agent, if the agent uses TCP sockets for communication (CVE-2005-2177). The updated packages have been patched to correct these problems. http://www.linuxsecurity.com/content/view/121370 * Mandriva: Updated apache2 packages fix vulnerabilities 27th, January, 2006 A flaw was discovered in mod_imap when using the Referer directive with image maps that could be used by a remote attacker to perform a cross-site scripting attack, in certain site configurations, if a victim could be forced to visit a malicious URL using certain web browsers (CVE-2005-3352). http://www.linuxsecurity.com/content/view/121371 * Mandriva: Updated mozilla-thunderbird packages merge dropped changes 27th, January, 2006 Recent security updates to mozilla-thunderbird did not include some changes made to the build from the community branch of 2006.0. The changes include corrections to the packaging of language files and some corrections to the uninstall scripts. New builds of the enigmail-es and enigmail-it packages are also included. Updated packages merge both of these builds. http://www.linuxsecurity.com/content/view/121433 * Mandriva: Updated bzip2 packages fix bzgrep vulnerabilities 30th, January, 2006 A bug was found in the way that bzgrep processed file names. If a user could be tricked into running bzgrep on a file with a special file name, it would be possible to execute arbitrary code with the privileges of the user running bzgrep. As well, the bzip2 package provided with Mandriva Linux 2006 did not the patch applied to correct CVE-2005-0953 which was previously fixed by MDKSA-2005:091; those packages are now properly patched. The updated packages have been patched to correct these problems. http://www.linuxsecurity.com/content/view/121448 * Mandriva: Updated gzip packages fix zgrep vulnerabilities 30th, January, 2006 Zgrep in gzip before 1.3.5 does not properly sanitize arguments, which allows local users to execute arbitrary commands via filenames that are injected into a sed script. This was previously corrected in MDKSA-2005:092, however the fix was incomplete. These updated packages provide a more comprehensive fix to the problem. http://www.linuxsecurity.com/content/view/121450 * Mandriva: Updated php packages fix XSS and response splitting vulnerabilities 1st, February, 2006 Multiple response splitting vulnerabilities in PHP allow remote attackers to inject arbitrary HTTP headers via unknown attack vectors, possibly involving a crafted Set-Cookie header, related to the (1) session extension (aka ext/session) and the (2) header function. (CVE-2006-0207) Multiple cross-site scripting (XSS) vulnerabilities in PHP allow remote attackers to inject arbitrary web script or HTML via unknown attack vectors in "certain error conditions." (CVE-2006-0208). http://www.linuxsecurity.com/content/view/121474 * Mandriva: Updated libast packages fixes buffer overflow vulnerability 2nd, February, 2006 Buffer overflow in Library of Assorted Spiffy Things (LibAST) 0.6.1 and earlier, as used in Eterm and possibly other software, allows local users to execute arbitrary code as the utmp user via a long -X argument. The updated packages have been patched to correct this issue. http://www.linuxsecurity.com/content/view/121491 * Mandriva: Updated poppler packages fixes heap-based buffer overflow vulnerability 2nd, February, 2006 Heap-based buffer overflow in Splash.cc in xpdf allows attackers to cause a denial of service and possibly execute arbitrary code via crafted splash images that produce certain values that exceed the width or height of the associated bitmap. Poppler uses a copy of the xpdf code and as such has the same issues. The updated packages have been patched to correct this issue. http://www.linuxsecurity.com/content/view/121492 * Mandriva: Updated kdegraphics packages fixes heap-based buffer overflow vulnerability 2nd, February, 2006 Heap-based buffer overflow in Splash.cc in xpdf allows attackers to cause a denial of service and possibly execute arbitrary code via crafted splash images that produce certain values that exceed the width or height of the associated bitmap. Kdegraphics-kpdf uses a copy of the xpdf code and as such has the same issues. The updated packages have been patched to correct this issue. http://www.linuxsecurity.com/content/view/121493 * Mandriva: Updated xpdf packages fixes heap-based buffer overflow vulnerability 2nd, February, 2006 Heap-based buffer overflow in Splash.cc in xpdf allows attackers to cause a denial of service and possibly execute arbitrary code via crafted splash images that produce certain values that exceed the width or height of the associated bitmap. The updated packages have been patched to correct this issue. http://www.linuxsecurity.com/content/view/121494 * Mandriva: Updated OpenOffice.org packages fix issue with disabled hyperlinks 2nd, February, 2006 OpenOffice.org 2.0 and earlier, when hyperlinks has been disabled, does not prevent the user from clicking the WWW-browser button in the Hyperlink dialog, which makes it easier for attackers to trick the user into bypassing intended security settings. Updated packages are patched to address this issue. http://www.linuxsecurity.com/content/view/121495 +---------------------------------+ | Distribution: Red Hat | ----------------------------// +---------------------------------+ * RedHat: Important: kernel security update 27th, January, 2006 Updated kernel packages that fix several security issues in the Red Hat Enterprise Linux 3 kernel are now available. http://www.linuxsecurity.com/content/view/121279 * RedHat: Moderate: tetex security update 27th, January, 2006 Updated tetex packages that fix several integer overflows are now available. http://www.linuxsecurity.com/content/view/121280 * RedHat: Critical: kdelibs security update 27th, January, 2006 Updated kdelibs packages are now available for Red Hat Enterprise Linux 4. http://www.linuxsecurity.com/content/view/121281 * RedHat: Important: kernel security update 1st, February, 2006 Updated kernel packages that fix a number of security issues as well as other bugs are now available for Red Hat Enterprise Linux 2.1 (64 bit architectures). This security advisory has been rated as having important security impact by the Red Hat Security Response Team. http://www.linuxsecurity.com/content/view/121471 * RedHat: Important: kernel security update 1st, February, 2006 Updated kernel packages that fix a number of security issues as well as other bugs are now available for Red Hat Enterprise Linux 2.1 (32 bit architectures) This security advisory has been rated as having important security impact by the Red Hat Security Response Team. http://www.linuxsecurity.com/content/view/121472 * RedHat: Moderate: gd security update 1st, February, 2006 Updated gd packages that fix several buffer overflow flaws are now available. This update has been rated as having moderate security impact by the Red Hat Security Response Team. http://www.linuxsecurity.com/content/view/121473 * RedHat: Critical: mozilla security update 2nd, February, 2006 Updated mozilla packages that fix several security bugs are now available. This update has been rated as having critical security impact by the Red Hat Security Response Team. http://www.linuxsecurity.com/content/view/121482 * RedHat: Critical: firefox security update 2nd, February, 2006 An updated firefox package that fixes several security bugs is now available. This update has been rated as having critical security impact by the Red Hat Security Response Team. http://www.linuxsecurity.com/content/view/121483 +---------------------------------+ | Distribution: SuSE | ----------------------------// +---------------------------------+ * SuSE: xpdf,kpdf,gpdf,kword 27th, January, 2006 "infamous41md", Chris Evans and Dirk Mueller discovered multiple places in xpdf code where integer variables are insufficiently checked for range or overflow. Specially crafted PDF files could lead to executing arbitrary code. http://www.linuxsecurity.com/content/view/121427 * SuSE: novell-nrm remote heap overflow 27th, January, 2006 iDEFENSE reported a security problem with the Novell Remote Manager. http://www.linuxsecurity.com/content/view/121428 * SuSE: kdelibs3 (SUSE-SA:2006:003) 27th, January, 2006 Maksim Orlovich discovered a bug in the JavaScript interpreter used by Konqueror. UTF-8 encoded URLs could lead to a buffer overflow that causes the browser to crash or execute arbitrary code. Attackers could trick users into visiting specially crafted web sites that exploit this bug (CVE-2006-0019). http://www.linuxsecurity.com/content/view/121429 * SuSE: phpMyAdmin (SUSE-SA:2006:004) 27th, January, 2006 Stefan Esser discovered a bug in in the register_globals emulation of phpMyAdmin that allowes to overwrite variables. An attacker could exploit the bug to ultimately execute code (CVE-2005-4079). http://www.linuxsecurity.com/content/view/121430 * SuSE: nfs-server/rpc.mountd remote code 27th, January, 2006 An remotely exploitable problem exists in the rpc.mountd service in the user space NFS server package "nfs-server". http://www.linuxsecurity.com/content/view/121431 ------------------------------------------------------------------------ Distributed by: Guardian Digital, Inc. LinuxSecurity.com To unsubscribe email vuln-newsletter-request@private with "unsubscribe" in the subject of the message. ------------------------------------------------------------------------ _________________________________ InfoSec News v2.0 - Coming Soon! http://www.infosecnews.org
This archive was generated by hypermail 2.1.3 : Fri Feb 03 2006 - 01:51:33 PST