Jump to content

paul

Admin
  • Posts

    5611
  • Joined

  • Last visited

  • Days Won

    8

Posts posted by paul

  1. Security issues were identified and fixed in firefox:

     

    Security researchers Yosuke Hasegawa and Masatoshi Kimura reported that

    the x-mac-arabic, x-mac-farsi and x-mac-hebrew character encodings are

    vulnerable to XSS attacks due to some characters being converted to

    angle brackets when displayed by the rendering engine. Sites using

    these character encodings would thus be potentially vulnerable to

    script injection attacks if their script filtering code fails to

    strip out these specific characters (CVE-2010-3770).

     

    Google security researcher Michal Zalewski reported that when a

    window was opened to a site resulting in a network or certificate

    error page, the opening site could access the document inside the

    opened window and inject arbitrary content. An attacker could use

    this bug to spoof the location bar and trick a user into thinking

    they were on a different site than they actually were (CVE-2010-3774).

     

    Mozilla security researcher moz_bug_r_a4 reported that the fix for

    CVE-2010-0179 could be circumvented permitting the execution of

    arbitrary JavaScript with chrome privileges (CVE-2010-3773).

     

    Security researcher regenrecht reported via TippingPoint's Zero

    Day Initiative that JavaScript arrays were vulnerable to an integer

    overflow vulnerability. The report demonstrated that an array could

    be constructed containing a very large number of items such that when

    memory was allocated to store the array items, the integer value used

    to calculate the buffer size would overflow resulting in too small a

    buffer being allocated. Subsequent use of the array object could then

    result in data being written past the end of the buffer and causing

    memory corruption (CVE-2010-3767).

     

    Security researcher regenrecht reported via TippingPoint's Zero Day

    Initiative that a nsDOMAttribute node can be modified without informing

    the iterator object responsible for various DOM traversals. This

    flaw could lead to a inconsistent state where the iterator points

    to an object it believes is part of the DOM but actually points to

    some other object. If such an object had been deleted and its memory

    reclaimed by the system, then the iterator could be used to call into

    attacker-controlled memory (CVE-2010-3766).

     

    Security researcher Gregory Fleischer reported that when a Java

    LiveConnect script was loaded via a data: URL which redirects via a

    meta refresh, then the resulting plugin object was created with the

    wrong security principal and thus received elevated privileges such

    as the abilities to read local files, launch processes, and create

    network connections (CVE-2010-3775).

     

    Mozilla added the OTS font sanitizing library to prevent downloadable

    fonts from exposing vulnerabilities in the underlying OS font

    code. This library mitigates against several issues independently

    reported by Red Hat Security Response Team member Marc Schoenefeld

    and Mozilla security researcher Christoph Diehl (CVE-2010-3768).

     

    Security researcher wushi of team509 reported that when a XUL

    tree had an HTML <div> element nested inside a

    element then code attempting to display content in the XUL tree would

    incorrectly treat the <div> element as a parent node to tree content

    underneath it resulting in incorrect indexes being calculated for the

    child content. These incorrect indexes were used in subsequent array

    operations which resulted in writing data past the end of an allocated

    buffer. An attacker could use this issue to crash a victim's browser

    and run arbitrary code on their machine (CVE-2010-3772).

     

    Security researcher echo reported that a web page could open a window

    with an about:blank location and then inject an element

    into that page which upon submission would redirect to a chrome:

    document. The effect of this defect was that the original page would

    wind up with a reference to a chrome-privileged object, the opened

    window, which could be leveraged for privilege escalation attacks

    (CVE-2010-3771).

     

    Dirk Heinrich reported that on Windows platforms when document.write()

    was called with a very long string a buffer overflow was caused in line

    breaking routines attempting to process the string for display. Such

    cases triggered an invalid read past the end of an array causing a

    crash which an attacker could potentially use to run arbitrary code

    on a victim's computer (CVE-2010-3769).

     

    Mozilla developers identified and fixed several memory safety

    bugs in the browser engine used in Firefox and other Mozilla-based

    products. Some of these bugs showed evidence of memory corruption

    under certain circumstances, and we presume that with enough effort

    at least some of these could be exploited to run arbitrary code

    (CVE-2010-3776, CVE-2010-3777).

     

    Packages for 2009.0 are provided as of the Extended Maintenance

    Program. Please visit this link to learn more:

    http://store.mandriva.com/product_info.php?cPath=149&products_id=490

     

    Additionally, some packages which require so, have been rebuilt and

    are being provided as updates.

  2. Security issues were identified and fixed in firefox:

     

    Security researchers Yosuke Hasegawa and Masatoshi Kimura reported that

    the x-mac-arabic, x-mac-farsi and x-mac-hebrew character encodings are

    vulnerable to XSS attacks due to some characters being converted to

    angle brackets when displayed by the rendering engine. Sites using

    these character encodings would thus be potentially vulnerable to

    script injection attacks if their script filtering code fails to

    strip out these specific characters (CVE-2010-3770).

     

    Google security researcher Michal Zalewski reported that when a

    window was opened to a site resulting in a network or certificate

    error page, the opening site could access the document inside the

    opened window and inject arbitrary content. An attacker could use

    this bug to spoof the location bar and trick a user into thinking

    they were on a different site than they actually were (CVE-2010-3774).

     

    Mozilla security researcher moz_bug_r_a4 reported that the fix for

    CVE-2010-0179 could be circumvented permitting the execution of

    arbitrary JavaScript with chrome privileges (CVE-2010-3773).

     

    Security researcher regenrecht reported via TippingPoint's Zero

    Day Initiative that JavaScript arrays were vulnerable to an integer

    overflow vulnerability. The report demonstrated that an array could

    be constructed containing a very large number of items such that when

    memory was allocated to store the array items, the integer value used

    to calculate the buffer size would overflow resulting in too small a

    buffer being allocated. Subsequent use of the array object could then

    result in data being written past the end of the buffer and causing

    memory corruption (CVE-2010-3767).

     

    Security researcher regenrecht reported via TippingPoint's Zero Day

    Initiative that a nsDOMAttribute node can be modified without informing

    the iterator object responsible for various DOM traversals. This

    flaw could lead to a inconsistent state where the iterator points

    to an object it believes is part of the DOM but actually points to

    some other object. If such an object had been deleted and its memory

    reclaimed by the system, then the iterator could be used to call into

    attacker-controlled memory (CVE-2010-3766).

     

    Security researcher Gregory Fleischer reported that when a Java

    LiveConnect script was loaded via a data: URL which redirects via a

    meta refresh, then the resulting plugin object was created with the

    wrong security principal and thus received elevated privileges such

    as the abilities to read local files, launch processes, and create

    network connections (CVE-2010-3775).

     

    Mozilla added the OTS font sanitizing library to prevent downloadable

    fonts from exposing vulnerabilities in the underlying OS font

    code. This library mitigates against several issues independently

    reported by Red Hat Security Response Team member Marc Schoenefeld

    and Mozilla security researcher Christoph Diehl (CVE-2010-3768).

     

    Security researcher wushi of team509 reported that when a XUL tree

    had an HTML <div> element nested inside a element then

    code attempting to display content in the XUL tree would incorrectly

    treat the <div> element as a parent node to tree content underneath

    it resulting in incorrect indexes being calculated for the child

    content. These incorrect indexes were used in subsequent array

    operations which resulted in writing data past the end of an allocated

    buffer. An attacker could use this issue to crash a victim's browser

    and run arbitrary code on their machine (CVE-2010-3772).

     

    Security researcher echo reported that a web page could open a window

    with an about:blank location and then inject an element

    into that page which upon submission would redirect to a chrome:

    document. The effect of this defect was that the original page would

    wind up with a reference to a chrome-privileged object, the opened

    window, which could be leveraged for privilege escalation attacks

    (CVE-2010-3771).

     

    Dirk Heinrich reported that on Windows platforms when document.write()

    was called with a very long string a buffer overflow was caused in line

    breaking routines attempting to process the string for display. Such

    cases triggered an invalid read past the end of an array causing a

    crash which an attacker could potentially use to run arbitrary code

    on a victim's computer (CVE-2010-3769).

     

    Mozilla developers identified and fixed several memory safety

    bugs in the browser engine used in Firefox and other Mozilla-based

    products. Some of these bugs showed evidence of memory corruption

    under certain circumstances, and we presume that with enough effort

    at least some of these could be exploited to run arbitrary code

    (CVE-2010-3776, CVE-2010-3777).

     

    Packages for 2009.0 are provided as of the Extended Maintenance

    Program. Please visit this link to learn more:

    http://store.mandriva.com/product_info.php?cPath=149&products_id=490

     

    Additionally, some packages which require so, have been rebuilt and

    are being provided as updates.

  3. A vulnerability was discovered and corrected in perl-CGI-Simple:

     

    The multipart_init function in (1) CGI.pm before 3.50 and (2) Simple.pm

    in CGI::Simple 1.112 and earlier uses a hardcoded value of the MIME

    boundary string in multipart/x-mixed-replace content, which allows

    remote attackers to inject arbitrary HTTP headers and conduct HTTP

    response splitting attacks via crafted input that contains this value,

    a different vulnerability than CVE-2010-3172 (CVE-2010-2761).

     

    The updated packages have been patched to correct this issue.

  4. Due to a bug in the keychain package the '--noask' option wasn't always

    used, this caused the Qt4 ssh-askpass dialogue to get loaded before a

    window manager was fully-started, preventing the user from entering the

    passphrase as the dialogue never gets focus without a window manager

    running. This update fixes this issue by insuring the '--noask'

    option is used when logging into a DE (the Qt4 ssh-askpass dialogue

    is only shown when the user opens a new terminal emulator window).

  5. Multiple vulnerabilities were discovered and corrected in clamav:

     

    Multiple unspecified vulnerabilities in pdf.c in libclamav in ClamAV

    before 0.96.5 allow remote attackers to cause a denial of service

    (application crash) or possibly execute arbitrary code via a crafted

    PDF document (CVE-2010-4260, (CVE-2010-4479).

     

    Off-by-one error in the icon_cb function in pe_icons.c in libclamav

    in ClamAV before 0.96.5 allows remote attackers to cause a denial of

    service (memory corruption and application crash) or possibly execute

    arbitrary code via unspecified vectors. NOTE: some of these details

    are obtained from third party information (CVE-2010-4261).

     

    Packages for 2009.0 are provided as of the Extended Maintenance

    Program. Please visit this link to learn more:

    http://store.mandriva.com/product_info.php?cPath=149&products_id=490

     

    The updated clamav packages have been upgraded to the 0.96.5 version

    that is not vulnerable to these issues.

  6. A vulnerability was discovered and corrected in openssl:

     

    OpenSSL before 0.9.8q, and 1.0.x before 1.0.0c, when

    SSL_OP_NETSCAPE_REUSE_CIPHER_CHANGE_BUG is enabled, does not properly

    prevent modification of the ciphersuite in the session cache, which

    allows remote attackers to force the use of an unintended cipher

    via vectors involving sniffing network traffic to discover a session

    identifier (CVE-2010-4180).

     

    Packages for 2009.0 are provided as of the Extended Maintenance

    Program. Please visit this link to learn more:

    http://store.mandriva.com/product_info.php?cPath=149&products_id=490

     

    The updated packages have been patched to correct this issue.

  7. A vulnerability was discovered and corrected in the Linux 2.6 kernel:

     

    The compat_alloc_user_space functions in include/asm/compat.h files

    in the Linux kernel before 2.6.36-rc4-git2 on 64-bit platforms do

    not properly allocate the userspace memory required for the 32-bit

    compatibility layer, which allows local users to gain privileges by

    leveraging the ability of the compat_mc_getsockopt function (aka the

    MCAST_MSFILTER getsockopt support) to control a certain length value,

    related to a stack pointer underflow issue, as exploited in the wild

    in September 2010. (CVE-2010-3081)

     

    The IA32 system call emulation functionality in

    arch/x86/ia32/ia32entry.S in the Linux kernel before 2.6.36-rc4-git2

    on the x86_64 platform does not zero extend the %eax register after

    the 32-bit entry path to ptrace is used, which allows local users to

    gain privileges by triggering an out-of-bounds access to the system

    call table using the %rax register. NOTE: this vulnerability exists

    because of a CVE-2007-4573 regression. (CVE-2010-3301)

     

    Integer overflow in the ext4_ext_get_blocks function in

    fs/ext4/extents.c in the Linux kernel before 2.6.34 allows local

    users to cause a denial of service (BUG and system crash) via a

    write operation on the last block of a large file, followed by a sync

    operation. (CVE-2010-3015)

     

    Additionally, the kernel has been updated to the stable version

    2.6.31.14. A timeout bug in bnx2 has been fixed. Muting and unmuting

    on VT1812/VT2002P now should work correctly. A fix for ACL decoding

    on NFS was added. Rebooting on Dell Precision WorkStation T7400 was

    corrected. Read balancing with RAID0 and RAID1 on drives larger then

    2TB was also fixed. A more detailed description is available in the

    package changelog and related tickets.

     

    Thanks to Thomas Backlund and Herton Ronaldo Krzesinski for

    contributions in this update.

     

    To update your kernel, please follow the directions located at:

     

    http://www.mandriva.com/en/security/kernelupdate

  8. Multiple vulnerabilities were discovered and corrected in krb5:

     

    An unauthenticated remote attacker could alter a SAM-2 challenge,

    affecting the prompt text seen by the user or the kind of response

    sent to the KDC. Under some circumstances, this can negate the

    incremental security benefit of using a single-use authentication

    mechanism token. An unauthenticated remote attacker has a 1/256

    chance of forging KRB-SAFE messages in an application protocol if the

    targeted pre-existing session uses an RC4 session key. Few application

    protocols use KRB-SAFE messages (CVE-2010-1323).

     

    An unauthenticated remote attacker can forge GSS tokens that

    are intended to be integrity-protected but unencrypted, if the

    targeted pre-existing application session uses a DES session key. An

    authenticated remote attacker can forge PACs if using a KDC that does

    not filter client-provided PAC data. This can result in privilege

    escalation against a service that relies on PAC contents to make

    authorization decisions. An unauthenticated remote attacker has a 1/256

    chance of swapping a client-issued KrbFastReq into a different KDC-REQ,

    if the armor key is RC4. The consequences are believed to be minor

    (CVE-2010-1324).

     

    An authenticated remote attacker that controls a legitimate service

    principal has a 1/256 chance of forging the AD-SIGNEDPATH signature

    if the TGT key is RC4, allowing it to use self-generated evidence

    tickets for S4U2Proxy, instead of tickets obtained from the user or

    with S4U2Self. Configurations using RC4 for the TGT key are believed

    to be rare. An authenticated remote attacker has a 1/256 chance of

    forging AD-KDC-ISSUED signatures on authdata elements in tickets

    having an RC4 service key, resulting in privilege escalation against

    a service that relies on these signatures. There are no known uses

    of the KDC-ISSUED authdata container at this time (CVE-2010-4020.

     

    An authenticated remote attacker that controls a legitimate service

    principal could obtain a valid service ticket to itself containing

    valid KDC-generated authorization data for a client whose TGS-REQ

    it has intercepted. The attacker could then use this ticket for

    S4U2Proxy to impersonate the targeted client even if the client never

    authenticated to the subverted service. The vulnerable configuration

    is believed to be rare (CVE-2010-4021).

     

    The updated packages have been patched to correct this issue.

  9. A vulnerability was discovered and corrected in krb5:

     

    An unauthenticated remote attacker could alter a SAM-2 challenge,

    affecting the prompt text seen by the user or the kind of response

    sent to the KDC. Under some circumstances, this can negate the

    incremental security benefit of using a single-use authentication

    mechanism token. An unauthenticated remote attacker has a 1/256

    chance of forging KRB-SAFE messages in an application protocol if the

    targeted pre-existing session uses an RC4 session key. Few application

    protocols use KRB-SAFE messages (CVE-2010-1323).

     

    Packages for 2009.0 are provided as of the Extended Maintenance

    Program. Please visit this link to learn more:

    http://store.mandriva.com/product_info.php?cPath=149&products_id=490

     

    The updated packages have been patched to correct this issue.

  10. A vulnerability was discovered and corrected in libxml2:

     

    libxml2 before 2.7.8 reads from invalid memory locations

    during processing of malformed XPath expressions, which allows

    context-dependent attackers to cause a denial of service (application

    crash) via a crafted XML document (CVE-2010-4008).

     

    Packages for 2009.0 are provided as of the Extended Maintenance

    Program. Please visit this link to learn more:

    http://store.mandriva.com/product_info.php?cPath=149&products_id=490

     

    The updated packages have been patched to correct these issues.

  11. This advisory updates wireshark to the latest version (1.2.13),

    fixing one security issue:

     

    Heap-based buffer overflow in the dissect_ldss_transfer function

    (epan/dissectors/packet-ldss.c) in the LDSS dissector in Wireshark

    1.2.0 through 1.2.12 and 1.4.0 through 1.4.1 allows remote attackers

    to cause a denial of service (crash) and possibly execute arbitrary

    code via an LDSS packet with a long digest line that triggers memory

    corruption (CVE-2010-4300).

  12. A vulnerability was discovered and corrected in gnucash:

     

    gnc-test-env in GnuCash 2.3.15 and earlier places a zero-length

    directory name in the LD_LIBRARY_PATH, which allows local users to

    gain privileges via a Trojan horse shared library in the current

    working directory (CVE-2010-3999).

     

    The affected /usr/bin/gnc-test-env file has been removed to mitigate

    the CVE-2010-3999 vulnerability as gnc-test-env is only used for

    tests and while building gnucash.

     

    Additionally for Mandriva 2010.1 gnucash-2.2.9 was not compatible

    with guile. This update adapts gnucash to the new API of guile.

  13. A vulnerability was discovered and corrected in mono:

     

    Untrusted search path vulnerability in metadata/loader.c in Mono 2.8

    and earlier allows local users to gain privileges via a Trojan horse

    shared library in the current working directory (CVE-2010-4159).

     

    Packages for 2009.0 are provided as of the Extended Maintenance

    Program. Please visit this link to learn more:

    http://store.mandriva.com/product_info.php?cPath=149&products_id=490

     

    The updated packages have been patched to correct this issue.

  14. This is a maintenance and bugfix release of firefox that upgrades

    firefox to the 3.6.12 version and adds missing localization packages

    for the Georgian, Kurdish, Occitan and Serbian languages.

     

    Packages for 2009.0 are provided as of the Extended Maintenance

    Program. Please visit this link to learn more:

    http://store.mandriva.com/product_info.php?cPath=149&products_id=490

     

    Additionally, some packages which require so, have been rebuilt and

    are being provided as updates.

×
×
  • Create New...