Jump to content

aru

Members
  • Posts

    2022
  • Joined

  • Last visited

Everything posted by aru

  1. Mandriva Security Advisories MDKSA-2005:150 : bluez-utils Updated bluez-utils packages fix vulnerability August 25th, 2005 A vulnerability in bluez-utils was discovered by Henryk Plotz.Due to missing input sanitizing, it was possible for an attacker to execute arbitrary commands supplied as a device name from the remote bluetooth device. The updated packages have been patched to correct this problem. The released versions of Mandriva GNU/Linux affected are: 10.0 10.1 CS3.0 10.2 Full information about this advisory, including the updated packages, is available at: www.mandriva.com/security/advisories?name=MDKSA-2005:150 Other references: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2547 Posted automatically by aru (mdksec2mub v: mdksec2mub,v 0.14 2005/05/15 18:06:11 aru Exp aru $)
  2. Mandriva Security Advisories MDKSA-2005:149 : lm_sensors Updated lm_sensors packages fix temporary file vulnerability August 25th, 2005 Javier Fernandez-Sanguino Pena discovered that the pwmconfig script in the lm_sensors package created temporary files in an insecure manner. This could allow a symlink attack to create or overwrite arbitrary files with full root privileges because pwmconfig is typically executed by root. The updated packages have been patched to correct this problem by using mktemp to create the temporary files. The released versions of Mandriva GNU/Linux affected are: 10.0 10.1 CS3.0 10.2 Full information about this advisory, including the updated packages, is available at: www.mandriva.com/security/advisories?name=MDKSA-2005:149 Other references: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2672 Posted automatically by aru (mdksec2mub v: mdksec2mub,v 0.14 2005/05/15 18:06:11 aru Exp aru $)
  3. Mandriva Security Advisories MDKSA-2005:148 : vim Updated vim packages fix vulnerability August 22nd, 2005 A vulnerability was discovered in the way that vim processed modelines. If a user with modelines enabled opened a textfile with a specially crafted modeline, arbitrary commands could be executed. The released versions of Mandriva GNU/Linux affected are: 10.0 10.1 CS2.1 CS3.0 MNF2.0 10.2 Full information about this advisory, including the updated packages, is available at: www.mandriva.com/security/advisories?name=MDKSA-2005:148 Other references: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2368 Posted automatically by aru (mdksec2mub v: mdksec2mub,v 0.14 2005/05/15 18:06:11 aru Exp aru $)
  4. Mandriva Security Advisories MDKSA-2005:147 : slocate Updated slocate packages fix vulnerability August 22nd, 2005 A bug was discovered in the way that slocate processes very long paths. A local user could create a carefully crafted directory structure that would prevent updatedb from completing its filesystem scan, resulting in an incomplete database. The released versions of Mandriva GNU/Linux affected are: 10.0 10.1 CS2.1 CS3.0 10.2 Full information about this advisory, including the updated packages, is available at: www.mandriva.com/security/advisories?name=MDKSA-2005:147 Other references: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2499 Posted automatically by aru (mdksec2mub v: mdksec2mub,v 0.14 2005/05/15 18:06:11 aru Exp aru $)
  5. Mandriva Security Advisories MDKSA-2005:146 : php-pear Updated php-pear packages fix more PEAR XML-RPC vulnerabilities August 22nd, 2005 A problem was discovered in the PEAR XML-RPC Server package included in the php-pear package.If a PHP script which implements the XML-RPC Server is used, it would be possible for a remote attacker to construct an XML-RPC request which would cause PHP to execute arbitrary commands as the 'apache' user. The released versions of Mandriva GNU/Linux affected are: 10.0 10.1 CS3.0 10.2 Full information about this advisory, including the updated packages, is available at: www.mandriva.com/security/advisories?name=MDKSA-2005:146 Other references: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2498 Posted automatically by aru (mdksec2mub v: mdksec2mub,v 0.14 2005/05/15 18:06:11 aru Exp aru $)
  6. Mandriva Security Advisories MDKSA-2005:145 : openvpn Updated openvpn packages fix several vulnerabilities August 22nd, 2005 A number of vulnerabilities were discovered in OpenVPN that were fixed in the 2.0.1 release: A DoS attack against the server when run with "verb 0" and without "tls-auth" when a client connection to the server fails certificate verification, the OpenSSL error queue is not properly flushed.This could result in another unrelated client instance on the server seeing the error and responding to it, resulting in a disconnection of the unrelated client (CAN-2005-2531). A DoS attack against the server by an authenticated client that sends a packet which fails to decrypt on the server, the OpenSSL error queue was not properly flushed.This could result in another unrelated client instance on the server seeing the error and responding to it, resulting in a disconnection of the unrelated client (CAN-2005-2532). A DoS attack against the server by an authenticated client is possible in "dev tap" ethernet bridging mode where a malicious client could theoretically flood the server with packets appearing to come from hundreds of thousands of different MAC addresses, resulting in the OpenVPN process exhausting system virtual memory (CAN-2005-2533). If two or more client machines tried to connect to the server at the same time via TCP, using the same client certificate, a race condition could crash the server if --duplicate-cn is not enabled on the server (CAN-2005-2534). This update provides OpenVPN 2.0.1 which corrects these issues as well as a number of other bugs. The released versions of Mandriva GNU/Linux affected are: MNF2.0 Full information about this advisory, including the updated packages, is available at: www.mandriva.com/security/advisories?name=MDKSA-2005:145 Other references: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2531 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2532 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2533 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2534 Posted automatically by aru (mdksec2mub v: mdksec2mub,v 0.14 2005/05/15 18:06:11 aru Exp aru $)
  7. Mandriva Security Advisories MDKSA-2005:144 : wxPythonGTK Updated wxPythonGTK packages several vulnerabilities August 18th, 2005 Wouter Hanegraaff discovered that the TIFF library did not sufficiently validate the "YCbCr subsampling" value in TIFF image headers. Decodinga malicious image with a zero value resulted in an arithmetic exception,which can cause a program that uses the TIFF library to crash. wxPythonGTK uses an embedded libtiff source tree, and as such has the same vulnerability. The updated packages have been rebuilt using the system libraries and should now incorporate all the updates to libjpeg, libpng, libtiff and zlib. The released versions of Mandriva GNU/Linux affected are: 10.1 CS3.0 10.2 Full information about this advisory, including the updated packages, is available at: www.mandriva.com/security/advisories?name=MDKSA-2005:144 Other references: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2452 Posted automatically by aru (mdksec2mub v: mdksec2mub,v 0.14 2005/05/15 18:06:11 aru Exp aru $)
  8. Mandriva Security Advisories MDKSA-2005:143 : kdegraphics Updated kdegraphics packages fix kfax vulnerability August 17th, 2005 Wouter Hanegraaff discovered that the TIFF library did not sufficiently validate the "YCbCr subsampling" value in TIFF image headers. Decodinga malicious image with a zero value resulted in an arithmetic exception,which can cause a program that uses the TIFF library to crash. Kdegraphics < 3.3 uses an embedded libtiff source tree for kfax, andas such has the same vulnerability. The updated packages are patched to protect against this vulnerability. The released versions of Mandriva GNU/Linux affected are: 10.1 CS3.0 Full information about this advisory, including the updated packages, is available at: www.mandriva.com/security/advisories?name=MDKSA-2005:143 Other references: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2452 Posted automatically by aru (mdksec2mub v: mdksec2mub,v 0.14 2005/05/15 18:06:11 aru Exp aru $)
  9. Mandriva Security Advisories MDKSA-2005:142 : libtiff Updated libtiff packages fixes vulnerability August 17th, 2005 Wouter Hanegraaff discovered that the TIFF library did not sufficiently validate the "YCbCr subsampling" value in TIFF image headers. Decodinga malicious image with a zero value resulted in an arithmetic exception,which can cause a program that uses the TIFF library to crash. The updated packages are patched to protect against this vulnerability. The released versions of Mandriva GNU/Linux affected are: 10.0 10.1 CS2.1 CS3.0 MNF2.0 10.2 Full information about this advisory, including the updated packages, is available at: www.mandriva.com/security/advisories?name=MDKSA-2005:142 Other references: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2452 Posted automatically by aru (mdksec2mub v: mdksec2mub,v 0.14 2005/05/15 18:06:11 aru Exp aru $)
  10. Mandriva Security Advisories MDKSA-2005:141 : evolution Updated evolution packages fixes format string vulnerabilities August 17th, 2005 Multiple format string vulnerabilities in Evolution 1.5 through 2.3.6.1 allow remote attackers to cause a denial of service (crash) and possiblyexecute arbitrary code via (1) full vCard data, (2) contact data fromremote LDAP servers, or (3) task list data from remote servers. (CAN-2005-2549) A format string vulnerability in Evolution 1.4 through 2.3.6.1 allowsremote attackers to cause a denial of service (crash) and possibly execute arbitrary code via the calendar entries such as task lists, which are not properly handled when the user selects the Calendars tab. (CAN-2005-2550) The released versions of Mandriva GNU/Linux affected are: 10.1 CS3.0 10.2 Full information about this advisory, including the updated packages, is available at: www.mandriva.com/security/advisories?name=MDKSA-2005:141 Other references: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2549 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2550 Posted automatically by aru (mdksec2mub v: mdksec2mub,v 0.14 2005/05/15 18:06:11 aru Exp aru $)
  11. Mandriva Security Advisories MDKA-2005:039 : indexhtml Updated indexhtml packages provide updated URLs August 17th, 2005 Updated indexhtml packages are available to reflect the new URLs for the various Mandriva domain names. The released versions of Mandriva GNU/Linux affected are: 10.0 10.1 CS2.1 CS3.0 10.2 Full information about this advisory, including the updated packages, is available at: www.mandriva.com/security/advisories?name=MDKA-2005:039 Posted automatically by aru (mdksec2mub v: mdksec2mub,v 0.14 2005/05/15 18:06:11 aru Exp aru $)
  12. Mandriva Security Advisories MDKSA-2005:140 : proftpd Updated proftpd packages fix format string vulnerabilities August 15th, 2005 Two format string vulnerabilities were discovered in ProFTPD.The first exists when displaying a shutdown message containin the name of the current directory.This could be exploited by a user who creates a directory containing format specifiers and sets the directory as the current directory when the shutdown message is being sent. The second exists when displaying response messages to the cleint using information retreived from a database using mod_sql.Note that mod_sql support is not enabled by default, but the contrib source file has been patched regardless. The updated packages have been patched to correct these problems. The released versions of Mandriva GNU/Linux affected are: 10.0 10.1 CS3.0 10.2 Full information about this advisory, including the updated packages, is available at: www.mandriva.com/security/advisories?name=MDKSA-2005:140 Other references: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2390 http://secunia.com/advisories/16181 Posted automatically by aru (mdksec2mub v: mdksec2mub,v 0.14 2005/05/15 18:06:11 aru Exp aru $)
  13. Mandriva Security Advisories MDKSA-2005:139 : gaim Updated gaim packages fix yet more vulnerabilities August 15th, 2005 Yet more vulnerabilities have been discovered in the gaim IM client.Invalid characters in a sent file can cause Gaim to crash on some systems (CAN-2005-2102); a remote AIM or ICQ user can cause a buffer overflow in Gaim by setting an away message containing many AIM substitution strings (CAN-2005-2103); a memory alignment bug in the library used by Gaim to access the Gadu-Gadu network can result in a buffer overflow on non-x86 architecture systems (CAN-2005-2370). These problems have been corrected in gaim 1.5.0 which is provided with this update. The released versions of Mandriva GNU/Linux affected are: 10.1 CS3.0 10.2 Full information about this advisory, including the updated packages, is available at: www.mandriva.com/security/advisories?name=MDKSA-2005:139 Other references: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2102 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2103 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CNA-2005-2370 Posted automatically by aru (mdksec2mub v: mdksec2mub,v 0.14 2005/05/15 18:06:11 aru Exp aru $)
  14. Mandriva Security Advisories MDKA-2005:038 : ghostscript Updated ghostscript packages fix potential crash on 64bit platforms August 15th, 2005 Ghostscript 8.15 on 64bit platform can crash and dump core processing carefully crafted .pdf file. The updated packages have been patched to correct this problem. The released versions of Mandriva GNU/Linux affected are: 10.2 Full information about this advisory, including the updated packages, is available at: www.mandriva.com/security/advisories?name=MDKA-2005:038 Posted automatically by aru (mdksec2mub v: mdksec2mub,v 0.14 2005/05/15 18:06:11 aru Exp aru $)
  15. Mandriva Security Advisories MDKA-2005:037 : rpmdrake Updated rpmdrake packages use new Mandriva URLs August 15th, 2005 Due to the changeover of the Mandriva domain names and the unavailability of the old Mandrake Linux domains, rpmdrake needed an update in order to update the mirrors list file. The released versions of Mandriva GNU/Linux affected are: 10.0 10.1 CS2.1 CS3.0 Full information about this advisory, including the updated packages, is available at: www.mandriva.com/security/advisories?name=MDKA-2005:037 Posted automatically by aru (mdksec2mub v: mdksec2mub,v 0.14 2005/05/15 18:06:11 aru Exp aru $)
  16. Mandriva Security Advisories MDKSA-2005:138 : cups Updated cups packages fix vulnerability August 11th, 2005 A vulnerability was discovered in the CUPS printing package where when processing a PDF file, bounds checking was not correctly performed on some fields.As a result, this could cause the pdtops filter to crash. The updated packages have been patched to correct this problem. The released versions of Mandriva GNU/Linux affected are: 10.0 10.1 CS2.1 CS3.0 10.2 Full information about this advisory, including the updated packages, is available at: www.mandriva.com/security/advisories?name=MDKSA-2005:138 Other references: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2097 Posted automatically by aru (mdksec2mub v: mdksec2mub,v 0.14 2005/05/15 18:06:11 aru Exp aru $)
  17. Mandriva Security Advisories MDKSA-2005:137 : ucd-snmp Updated ucd-snmp packages fix a DoS vulnerability August 11th, 2005 A Denial of Service vulnerability was discovered in the way that ucd-snmp uses network stream protocols.A remote attacker could send a ucd-snmp agent a specially crafted packet that would cause the agent to crash. The updated packages have been patched to correct this problem. The released versions of Mandriva GNU/Linux affected are: 10.0 10.1 CS2.1 CS3.0 Full information about this advisory, including the updated packages, is available at: www.mandriva.com/security/advisories?name=MDKSA-2005:137 Other references: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2177 Posted automatically by aru (mdksec2mub v: mdksec2mub,v 0.14 2005/05/15 18:06:11 aru Exp aru $)
  18. Mandriva Security Advisories MDKSA-2005:136 : gpdf Updated gpdf packages fix vulnerability August 11th, 2005 A vulnerability in the gpdf PDF viewer was discovered.An attacker could construct a malicious PDF file that would cause gpdf to consume all available disk space in /tmp when opened. The updated packages have been patched to correct this problem. The released versions of Mandriva GNU/Linux affected are: 10.2 Full information about this advisory, including the updated packages, is available at: www.mandriva.com/security/advisories?name=MDKSA-2005:136 Other references: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2097 Posted automatically by aru (mdksec2mub v: mdksec2mub,v 0.14 2005/05/15 18:06:11 aru Exp aru $)
  19. Mandriva Security Advisories MDKSA-2005:135 : kdegraphics Updated kdegraphics packages fix vulnerability August 11th, 2005 A vulnerability in the kpdf KDE PDF viewer was discovered.An attacker could construct a malicious PDF file that would cause kpdf to consume all available disk space in /tmp when opened. The updated packages have been patched to correct this problem. The released versions of Mandriva GNU/Linux affected are: 10.2 Full information about this advisory, including the updated packages, is available at: www.mandriva.com/security/advisories?name=MDKSA-2005:135 Other references: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2097 Posted automatically by aru (mdksec2mub v: mdksec2mub,v 0.14 2005/05/15 18:06:11 aru Exp aru $)
  20. Mandriva Security Advisories MDKSA-2005:134 : xpdf Updated xpdf packages fix vulnerability August 11th, 2005 A vulnerability in the xpdf PDF viewer was discovered.An attacker could construct a malicious PDF file that would cause xpdf to consume all available disk space in /tmp when opened. The updated packages have been patched to correct this problem. The released versions of Mandriva GNU/Linux affected are: 10.1 CS3.0 10.2 Full information about this advisory, including the updated packages, is available at: www.mandriva.com/security/advisories?name=MDKSA-2005:134 Other references: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2097 Posted automatically by aru (mdksec2mub v: mdksec2mub,v 0.14 2005/05/15 18:06:11 aru Exp aru $)
  21. Mandriva Security Advisories MDKSA-2005:133 : netpbm Updated netpbm packages fix temporary file vulnerabilities August 9th, 2005 Max Vozeler discovered that pstopnm, a part of the netpbm graphics utility suite, would call the GhostScript interpreter on untrusted PostScript files without using the -dSAFER option when converting a PostScript file into a PBM, PGM, or PNM file.This could result in the execution of arbitrary commands with the privileges of the user running pstopnm if they could be convinced to try to convert a malicious PostScript file. The updated packages have been patched to correct this problem. The released versions of Mandriva GNU/Linux affected are: 10.0 10.1 CS2.1 CS3.0 10.2 Full information about this advisory, including the updated packages, is available at: www.mandriva.com/security/advisories?name=MDKSA-2005:133 Other references: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2471 http://secunia.com/advisories/16184/ Posted automatically by aru (mdksec2mub v: mdksec2mub,v 0.14 2005/05/15 18:06:11 aru Exp aru $)
  22. Mandriva Security Advisories MDKSA-2005:132 : heartbeat Updated heartbeat packages fix temporary file vulnerabilities August 9th, 2005 Eric Romang discovered that Heartbeat would create temporary files with predictable filenames.This could allow a local attacker to create symbolic links in the temporary file directory pointing to a valid file on the filesystem which could lead to the file being overwritten by the rights of the user running the vulnerable script. The updated packages have been patched to correct this problem. The released versions of Mandriva GNU/Linux affected are: CS3.0 Full information about this advisory, including the updated packages, is available at: www.mandriva.com/security/advisories?name=MDKSA-2005:132 Other references: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2231 Posted automatically by aru (mdksec2mub v: mdksec2mub,v 0.14 2005/05/15 18:06:11 aru Exp aru $)
  23. Mandriva Security Advisories MDKSA-2005:131 : ethereal Updated ethereal packages fix multiple vulnerabilities August 4th, 2005 A number of vulnerabilities were discovered in versions of Ethereal prior to version 0.10.12, including: The SMB dissector could overflow a buffer or exhaust memory (CAN-2005-2365). iDefense discovered that several dissectors are vulnerable to format string overflows (CAN-2005-2367). A number of other portential crash issues in various dissectors have also been corrected. This update provides Ethereal 0.10.12 which is not vulnerable to these issues. The released versions of Mandriva GNU/Linux affected are: 10.1 10.2 Full information about this advisory, including the updated packages, is available at: www.mandriva.com/security/advisories?name=MDKSA-2005:131 Other references: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2360 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2361 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2362 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2363 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2364 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2365 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2366 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2367 http://www.ethereal.com/appnotes/enpa-sa-00020.html Posted automatically by aru (mdksec2mub v: mdksec2mub,v 0.14 2005/05/15 18:06:11 aru Exp aru $)
  24. Mandriva Security Advisories MDKSA-2005:130 : apache Updated apache packages fix vulnerabilities August 3rd, 2005 Watchfire reported a flaw that occured when using the Apache server as a HTTP proxy.A remote attacker could send an HTTP request with both a "Transfer-Encoding: chunked" header and a "Content-Length" header which would cause Apache to incorrectly handle and forward the body of the request in a way that the receiving server processed it as a separate HTTP request.This could be used to allow the bypass of web application firewall protection or lead to cross-site scripting (XSS) attacks (CAN-2005-2088). The updated packages have been patched to prevent these issues. The released versions of Mandriva GNU/Linux affected are: 10.0 10.1 CS2.1 CS3.0 10.2 Full information about this advisory, including the updated packages, is available at: www.mandriva.com/security/advisories?name=MDKSA-2005:130 Other references: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2088 Posted automatically by aru (mdksec2mub v: mdksec2mub,v 0.14 2005/05/15 18:06:11 aru Exp aru $)
  25. Mandriva Security Advisories MDKSA-2005:129 : apache2 Updated apache2 packages fix vulnerabilities August 3rd, 2005 Marc Stern reported an off-by-one overflow in the mod_ssl CRL verification callback which can only be exploited if the Apache server is configured to use a malicious certificate revocation list (CAN-2005-1268). Watchfire reported a flaw that occured when using the Apache server as a HTTP proxy.A remote attacker could send an HTTP request with both a "Transfer-Encoding: chunked" header and a "Content-Length" header which would cause Apache to incorrectly handle and forward the body of the request in a way that the receiving server processed it as a separate HTTP request.This could be used to allow the bypass of web application firewall protection or lead to cross-site scripting (XSS) attacks (CAN-2005-2088). The updated packages have been patched to prevent these issues. The released versions of Mandriva GNU/Linux affected are: 10.0 10.1 CS3.0 MNF2.0 10.2 Full information about this advisory, including the updated packages, is available at: www.mandriva.com/security/advisories?name=MDKSA-2005:129 Other references: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1268 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2088 Posted automatically by aru (mdksec2mub v: mdksec2mub,v 0.14 2005/05/15 18:06:11 aru Exp aru $)
×
×
  • Create New...