Showing all newswire headlines

View by date, instead?

« Previous ( 1 ... 7240 7241 7242 7243 7244 7245 7246 7247 7248 7249 7250 ... 7264 ) Next »

Red Hat alert: New bugzilla packages are available

  • Mailing list (Posted by dave on Sep 10, 2001 11:42 AM EDT)
  • Story Type: Security; Groups: Red Hat
The updated bugzilla package fixes numerous security issues which were present in previous releases of bugzilla.

Red Hat alert: New bugzilla packages are available

  • Mailing list (Posted by dave on Sep 10, 2001 11:42 AM EDT)
  • Story Type: Security; Groups: Red Hat
The updated bugzilla package fixes numerous security issues which were present in previous releases of bugzilla.

Red Hat alert: New bugzilla packages are available

  • Mailing list (Posted by dave on Sep 10, 2001 11:42 AM EDT)
  • Story Type: Security; Groups: Red Hat
The updated bugzilla package fixes numerous security issues which were present in previous releases of bugzilla.

SuSE alert: apache-contrib

  • Mailing list (Posted by dave on Sep 10, 2001 9:17 AM EDT)
  • Story Type: Security; Groups: SUSE
The Apache module mod_auth_mysql 1.4,which is shipped since SuSE Linux 7.1, was found vulnerable to possible bypass authentication by MySQL command injection. An adversary could insert MySQL commands along with a password and these commands will be interpreted by MySQL while mod_auth_mysql is doing the password lookup in the database. A positive authentication could be returned.

Red Hat alert: Updated xinetd package available for Red Hat Linux 7 and 7.1

  • Mailing list (Posted by dave on Sep 10, 2001 8:09 AM EDT)
  • Story Type: Security; Groups: Red Hat
A security audit has been done by Solar Designer on xinetd, and the results are now being made available as a preemptive measure.

Red Hat alert: Updated xinetd package available for Red Hat Linux 7 and 7.1

  • Mailing list (Posted by dave on Sep 10, 2001 8:09 AM EDT)
  • Story Type: Security; Groups: Red Hat
A security audit has been done by Solar Designer on xinetd, and the results are now being made available as a preemptive measure.

Red Hat alert: Updated xinetd package available for Red Hat Linux 7 and 7.1

  • Mailing list (Posted by dave on Sep 10, 2001 8:09 AM EDT)
  • Story Type: Security; Groups: Red Hat
A security audit has been done by Solar Designer on xinetd, and the results are now being made available as a preemptive measure.

Red Hat alert: Updated xinetd package available for Red Hat Linux 7 and 7.1

  • Mailing list (Posted by dave on Sep 10, 2001 8:09 AM EDT)
  • Story Type: Security; Groups: Red Hat
A security audit has been done by Solar Designer on xinetd, and the results are now being made available as a preemptive measure.

Red Hat alert: New sendmail packages available which fix a local root exploit

  • Mailing list (Posted by dave on Sep 10, 2001 8:08 AM EDT)
  • Story Type: Security; Groups: Red Hat
An input validation error in the debugging functionality of all currently released versions of sendmail can enable a local user to gain root access. New packages that fix this problem are available for Red Hat Linux 5.2, 6.2, 7.0, and 7.1.

Red Hat alert: New sendmail packages available which fix a local root exploit

  • Mailing list (Posted by dave on Sep 10, 2001 8:08 AM EDT)
  • Story Type: Security; Groups: Red Hat
An input validation error in the debugging functionality of all currently released versions of sendmail can enable a local user to gain root access. New packages that fix this problem are available for Red Hat Linux 5.2, 6.2, 7.0, and 7.1.

Red Hat alert: New sendmail packages available which fix a local root exploit

  • Mailing list (Posted by dave on Sep 10, 2001 8:08 AM EDT)
  • Story Type: Security; Groups: Red Hat
An input validation error in the debugging functionality of all currently released versions of sendmail can enable a local user to gain root access. New packages that fix this problem are available for Red Hat Linux 5.2, 6.2, 7.0, and 7.1.

Red Hat alert: Updated fetchmail packages available

  • Mailing list (Posted by dave on Sep 10, 2001 8:07 AM EDT)
  • Story Type: Security; Groups: Red Hat
Updated fetchmail packages are now available for Red Hat Linux 5.2, 6.2, 7, and 7.1. These packages close a remotely-exploitable vulnerability in fetchmail.

Red Hat alert: Updated fetchmail packages available

  • Mailing list (Posted by dave on Sep 10, 2001 8:07 AM EDT)
  • Story Type: Security; Groups: Red Hat
Updated fetchmail packages are now available for Red Hat Linux 5.2, 6.2, 7, and 7.1. These packages close a remotely-exploitable vulnerability in fetchmail.

Red Hat alert: Updated fetchmail packages available

  • Mailing list (Posted by dave on Sep 10, 2001 8:07 AM EDT)
  • Story Type: Security; Groups: Red Hat
Updated fetchmail packages are now available for Red Hat Linux 5.2, 6.2, 7, and 7.1. These packages close a remotely-exploitable vulnerability in fetchmail.

SuSE alert: screen

  • Mailing list (Posted by dave on Sep 5, 2001 8:31 AM EDT)
  • Story Type: Security; Groups: SUSE
screen is a terminal multiplexer program that allows reattaching to a detached session as well as multi-attached (shared) sessions.

SuSE alert: nkitb/nkitserv/telnetd

  • Mailing list (Posted by dave on Sep 3, 2001 4:53 AM EDT)
  • Story Type: Security; Groups: SUSE
The telnet server which is shipped with SuSE distributions contains a remotely exploitable buffer-overflow within its telnet option negotiation code. This bug is wide-spread on UN*X systems and affects almost all implementations of telnet daemons available. SuSE 7.2 distribution ships the telnet-server package which contains the vulnerable telnet daemon. This package has been fixed.

SuSE alert: sendmail

  • Mailing list (Posted by dave on Aug 23, 2001 8:34 AM EDT)
  • Story Type: Security; Groups: SUSE
Cade Cairns of Securityfocus discovered a vulnerability in the sendmail program, the widely spread MTA used in Unix- and Unix-like systems. A local user can write arbitrary data to the process memory, resulting in user-controlled code to be executed as user root. Please note that this is a _local_ vulnerability: Local shell access is needed for the attacker to be able to take advantage of this error. The /usr/sbin/sendmail program is installed set-uid root in most installations. This special privilege is needed for the sendmail program to operate properly. The attack pattern involves running sendmail to make use of the setuid-bit. Please note that this is the first sendmail security problem since 1997.

SuSE alert: adb

  • Mailing list (Posted by dave on Aug 20, 2001 5:34 AM EDT)
  • Story Type: Security; Groups: SUSE
Sdbsearch.cgi is Perl script which is part of the sdb package of SuSE Linux was found vulnerable by using untrustworthy client input (HTTP_REFERER). By exploiting this trust an attacker could force the sdbsearch.cgi script to open a malicious keylist file which includes keywords and filenames. By replacing the filename in the keylist file with the Perl pipe followed by arbitrary shell commands the sdbsearch.cgi would execute these commands when trying to open these 'filenames'. Note, that the attacker needs local access to the machine to store the keylist file on the server running sdbsearch.cgi. Misconfigured ftp accounts, trojan tar balls or RPM files could also be used.

SuSE alert: fetchmail

  • Mailing list (Posted by dave on Aug 17, 2001 12:15 AM EDT)
  • Story Type: Security; Groups: SUSE
Fetchmail is a tool for retrieving and forwarding mail. Two vulnerabilities in the code of fetchmail were found in the last weeks. 1.) By sending a header with a large "To:" line a buffer overflow will be triggered in the header parsing code. 2.) By impersonating a pop3 or imap server by using DNS spoofing or getting control over the pop3/imap server an attacker could trigger a buffer overflow in the pop3 and imap code of fetchmail. All the attacker has to do is to fake a LIST response message and providing two integers. One will used as index for a stack array and the other one is the value written to this index. Both vulnerabilities could be used to get remote access to the system with the privilege of the user running fetchmail.

Debian alert: telnetd-ssl AYT buffer overflow

  • Mailing list (Posted by dave on Aug 14, 2001 2:19 PM EDT)
  • Story Type: Security; Groups: Debian
This is a followup to the problem described in DSA 075-1. Please read the original advisory to find out more about the security problem. This advisory and upload only fixes a problem with binary packages for sparc that were mistakenly linked to the wrong library.

« Previous ( 1 ... 7240 7241 7242 7243 7244 7245 7246 7247 7248 7249 7250 ... 7264 ) Next »