|
|
Subscribe / Log in / New account

Security

Eee PC security or lack thereof

By Jake Edge
February 13, 2008

The Eee PC has garnered a lot of press for its small form factor, low weight, and solid-state disk, but it has also made a poor showing with security researchers. RISE Security released a report on the security of the Eee last week, showing that it can be subverted ("rooted") right out of the box from ASUS. Unfortunately, it is even worse than that as, even after updating an Eee using the standard mechanism, the hole is not patched.

The vulnerability identified by RISE is in the Samba daemon (smbd), version 3.0.24, which is installed and runs on stock Eee PCs. The vulnerability, CVE-2007-2446 was identified and patched last May, so the Eee is shipping with a version of Samba known to be vulnerable to an arbitrary code execution flaw for nine months or so. In itself, that is not completely surprising.

When hardware vendors install a distribution—or commercial OS like Windows—they tend to install the latest released version, which is likely to be out of date with respect to security issues. A vendor installing Fedora 8 or Debian etch today will be behind on countless security updates. But, unlike the Samba problem discovered on the Eee, updates do exist in the standard places. If the new user updates their system immediately, there is a fairly small window of vulnerability.

Unfortunately for Eee owners, the modified Xandros distribution that comes with it does not yet have an update for Samba. This leaves all Eee PCs vulnerable to being rooted by anyone on the same network. Since the Eee is meant as a mobile device, it likely spends a lot of its time connected to various public networks, especially wireless networks. The Eee makes an interesting target for attackers because it very well might have authentication information for banks or brokerages as well as other private or confidential files.

Some have seriously downplayed the threat but it is clear they don't understand it:

The root attack performed was relatively easy to do, if you like command lines. Maybe Asus or Xandros could work on a patch for this. It almost makes one wonder how many other exploits are lying under the surface just waiting to be found. But, it's not like this actually puts you in danger, just how many hackers are going to be looking for the Asus EeePC or even Xandros based system online and attack them? Probably not many.

Sales of the Eee last year was around 300,000 units; large enough to be an attractive target for the malicious. Because there is not an update to close the hole, Eee users have to rely on other means to protect themselves. This eeeuser.com comment thread provides some of the better advice for dealing with the problem. Removing the Samba package seems to be the simplest, but fairly heavy handed, way to avoid the hole—but many folks need a working Samba. There is no way to disable Samba from the Eee GUI which is the way most owners plan to interact with the machine. This whole incident makes it seem like ASUS (and perhaps Xandros) are not terribly interested in the security of the machines that they sell.

There is a larger issue here. When the normal means of getting security patches comes from the same medium that is also the biggest security threat, there will always be windows of vulnerability. Even if hardware vendors diligently update the distribution they install, there is still some shelf-life and shipping time where security updates can be released. Various studies have shown that there may not be enough time to download patches before an unpatched system succumbs to an attack.

It is a difficult problem to solve completely. Any solution must be very straightforward and consistent so that unsophisticated users can be trained to do it as a matter of course. News about security issues needs to get more widespread attention as well, so that those same users know when the procedure needs to be followed. Firewalls and other network protections only go so far if the machine needs to reach out to the internet to pick up its updates.

If distributions provided some kind of blob (tar file, .deb, .rpm, etc.) that contained all of the security updates since the release, users could grab that from a different (presumably patched or not vulnerable) machine, put it on a USB stick or some other removable media and get it to the new machine. A utility provided by the distribution could then process that blob to apply all the relevant patches—all while the vulnerable machine stayed off the net. As the world domination plan continues, threats against Linux will become more commonplace; we need to try and ensure that users, especially the unsophisticated ones, can be secure in their choice of Linux.

Comments (22 posted)

Brief items

Multi-threaded OpenSSH

The folks at the Pittsburgh Supercomputing Center have posted a special version of OpenSSH aimed at high-bandwidth applications. "This cipher mode introduces multi-threading into the OpenSSH application in order to allow it to make full use of CPU resources available on multi-core systems. As the canonical distribution of OpenSSH is unable to make use of more than one core, high performance transfers can be bottlenecked by the cryptographic overhead." It's worth noting that the OpenSSH developers fear the security implications of multi-threading the program and seem uninclined to incorporate this work.

Comments (24 posted)

New vulnerabilities

clamav: arbitrary code execution

Package(s):clamav CVE #(s):CVE-2008-0318
Created:February 13, 2008 Updated:April 18, 2008
Description:

From the CVE:

Integer overflow in libclamav in ClamAV before 0.92.1, as used in clamd, allows remote attackers to cause a denial of service and possibly execute arbitrary code via a crafted Petite packed PE file, which triggers a heap-based buffer overflow.

Alerts:
Mandriva MDVSA-2008:088 clamav 2007-04-17
SuSE SUSE-SR:2008:004 xdg-utils, clamav, wireshark, pcre 2008-02-22
Gentoo 200802-09 clamav 2008-02-21
Debian DSA-1497-1 clamav 2008-02-16
Fedora FEDORA-2008-1625 clamav 2008-02-13
Fedora FEDORA-2008-1608 clamav 2008-02-13

Comments (1 posted)

Doomsday: multiple vulnerabilities

Package(s):Doomsday CVE #(s):CVE-2007-4642 CVE-2007-4643 CVE-2007-4644
Created:February 7, 2008 Updated:February 13, 2008
Description: From the Gentoo alert:

Luigi Auriemma discovered multiple buffer overflows in the D_NetPlayerEvent() function, the Msg_Write() function and the NetSv_ReadCommands() function. He also discovered errors when handling chat messages that are not NULL-terminated (CVE-2007-4642) or contain a short data length, triggering an integer underflow (CVE-2007-4643). Furthermore a format string vulnerability was discovered in the Cl_GetPackets() function when processing PSV_CONSOLE_TEXT messages (CVE-2007-4644).

This vulnerability can be used for the execution of arbitrary code or to create a denial of service.

Alerts:
Gentoo 200802-02 Doomsday 2008-02-06

Comments (none posted)

duplicity: password disclosure

Package(s):duplicity CVE #(s):CVE-2007-5201
Created:February 13, 2008 Updated:February 13, 2008
Description:

From the CVE:

The FTP backend for Duplicity sends the password as a command line argument when calling ncftp, which might allow local users to read the password by listing the process and its arguments.

Alerts:
Fedora FEDORA-2008-1521 duplicity 2008-02-13
Fedora FEDORA-2008-1584 duplicity 2008-02-13

Comments (1 posted)

firefox: multiple vulnerabilities

Package(s):firefox seamonkey thunderbird CVE #(s):CVE-2008-0412 CVE-2008-0413 CVE-2008-0415 CVE-2008-0417 CVE-2008-0418 CVE-2008-0419 CVE-2008-0591 CVE-2008-0592 CVE-2008-0593
Created:February 8, 2008 Updated:May 21, 2008
Description: From the Red Hat advisory:
Several flaws were found in the way Firefox processed certain malformed web content. A webpage containing malicious content could cause Firefox to crash, or potentially execute arbitrary code as the user running Firefox. (CVE-2008-0412, CVE-2008-0413, CVE-2008-0415, CVE-2008-0419)

Several flaws were found in the way Firefox displayed malformed web content. A webpage containing specially-crafted content could trick a user into surrendering sensitive information. (CVE-2008-0591, CVE-2008-0593)

A flaw was found in the way Firefox stored password data. If a user saves login information for a malicious website, it could be possible to corrupt the password database, preventing the user from properly accessing saved password data. (CVE-2008-0417)

A flaw was found in the way Firefox handles certain chrome URLs. If a user has certain extensions installed, it could allow a malicious website to steal sensitive session data. Note: this flaw does not affect a default installation of Firefox. (CVE-2008-0418)

A flaw was found in the way Firefox saves certain text files. If a website offers a file of type "plain/text", rather than "text/plain", Firefox will not show future "text/plain" content to the user in the browser, forcing them to save those files locally to view the content. (CVE-2008-0592)

Alerts:
Gentoo 200805-18 mozilla-firefox 2008-05-20
Fedora FEDORA-2008-2830 seamonkey 2008-04-01
Fedora FEDORA-2008-2812 seamonkey 2008-04-01
Debian DSA-1506-2 iceape 2008-03-20
Debian DSA-1485-2 icedove 2008-03-17
rPath rPSA-2008-0093-1 thunderbird 2008-02-29
Mandriva MDVSA-2008:048 mozilla-firefox 2007-02-22
Fedora FEDORA-2008-1535 gnome-web-photo 2008-02-13
Fedora FEDORA-2008-1535 blam 2008-02-13
Fedora FEDORA-2008-1435 openvrml 2008-02-13
Fedora FEDORA-2008-1535 Miro 2008-02-13
Fedora FEDORA-2008-1435 Miro 2008-02-13
Fedora FEDORA-2008-1535 yelp 2008-02-13
Fedora FEDORA-2008-1435 epiphany 2008-02-13
Mandriva MDVSA-2008:062 mozilla-thunderbird 2007-03-06
Slackware SSA:2008-061-01 thunderbird 2008-03-03
Fedora FEDORA-2008-2118 thunderbird 2008-02-28
Debian DSA-1506-1 iceape 2008-02-24
SuSE SUSE-SA:2008:008 MozillaFirefox,seamonkey 2008-02-15
Fedora FEDORA-2008-1535 openvrml 2008-02-13
Fedora FEDORA-2008-1435 yelp 2008-02-13
Fedora FEDORA-2008-1535 kazehakase 2008-02-13
Fedora FEDORA-2008-1435 kazehakase 2008-02-13
Fedora FEDORA-2008-1535 liferea 2008-02-13
Fedora FEDORA-2008-1435 liferea 2008-02-13
Fedora FEDORA-2008-1535 epiphany 2008-02-13
Fedora FEDORA-2008-1435 ruby-gnome2 2008-02-13
Fedora FEDORA-2008-1535 galeon 2008-02-13
Fedora FEDORA-2008-1435 galeon 2008-02-13
Fedora FEDORA-2008-1535 gnome-python2-extras 2008-02-13
Ubuntu USN-582-2 thunderbird 2008-03-06
Ubuntu USN-582-1 thunderbird 2008-02-29
Fedora FEDORA-2008-2060 thunderbird 2008-02-28
Red Hat RHSA-2008:0105-02 thunderbird 2008-02-27
Fedora FEDORA-2008-1535 ruby-gnome2 2008-02-13
Fedora FEDORA-2008-1435 gnome-python2-extras 2008-02-13
Fedora FEDORA-2008-1535 gtkmozembedmm 2008-02-13
Fedora FEDORA-2008-1435 gtkmozembedmm 2008-02-13
Fedora FEDORA-2008-1535 devhelp 2008-02-13
Fedora FEDORA-2008-1435 devhelp 2008-02-13
Fedora FEDORA-2008-1535 firefox 2008-02-13
Fedora FEDORA-2008-1435 firefox 2008-02-13
Fedora FEDORA-2008-1535 epiphany-extensions 2008-02-13
Fedora FEDORA-2008-1435 epiphany-extensions 2008-02-13
Fedora FEDORA-2008-1459 seamonkey 2008-02-13
Fedora FEDORA-2008-1669 seamonkey 2008-02-13
Fedora FEDORA-2008-1535 chmsee 2008-02-13
Fedora FEDORA-2008-1435 chmsee 2008-02-13
Foresight FLEA-2008-0001-1 firefox 2008-02-11
rPath rPSA-2008-0051-1 firefox 2008-02-08
Debian DSA-1489-1 iceweasel 2008-02-10
Debian DSA-1485-1 icedove 2008-02-10
Debian DSA-1484-1 xulrunner 2008-02-10
Ubuntu USN-576-1 firefox 2008-02-08
Red Hat RHSA-2008:0105-01 thunderbird 2008-02-07
Red Hat RHSA-2008:0104-01 seamonkey 2008-02-07
Red Hat RHSA-2008:0103-01 firefox 2008-02-07

Comments (2 posted)

firefox: multiple vulnerabilities

Package(s):firefox CVE #(s):CVE-2008-0414 CVE-2008-0416 CVE-2008-0420 CVE-2008-0594
Created:February 8, 2008 Updated:May 21, 2008
Description: From the Ubuntu advisory:
Flaws were discovered in the file upload form control. A malicious website could force arbitrary files from the user's computer to be uploaded without consent. (CVE-2008-0414)

Various flaws were discovered in character encoding handling. If a user were ticked into opening a malicious web page, an attacker could perform cross-site scripting attacks. (CVE-2008-0416)

Flaws were discovered in the BMP decoder. By tricking a user into opening a specially crafted BMP file, an attacker could obtain sensitive information. (CVE-2008-0420)

Emil Ljungdahl and Lars-Olof Moilanen discovered that a web forgery warning dialog wasn't displayed under certain circumstances. A malicious website could exploit this to conduct phishing attacks against the user. (CVE-2008-0594)

Alerts:
Gentoo 200805-18 mozilla-firefox 2008-05-20
Ubuntu USN-592-1 firefox 2008-03-26
Debian DSA-1485-2 icedove 2008-03-17
Debian DSA-1506-2 iceape 2008-03-20
Fedora FEDORA-2008-1535 gnome-web-photo 2008-02-13
Fedora FEDORA-2008-1535 blam 2008-02-13
Fedora FEDORA-2008-1435 openvrml 2008-02-13
Fedora FEDORA-2008-1435 Miro 2008-02-13
Ubuntu USN-582-1 thunderbird 2008-02-29
Fedora FEDORA-2008-2060 thunderbird 2008-02-28
Fedora FEDORA-2008-2118 thunderbird 2008-02-28
Debian DSA-1506-1 iceape 2008-02-24
Fedora FEDORA-2008-1535 openvrml 2008-02-13
Fedora FEDORA-2008-1535 Miro 2008-02-13
Fedora FEDORA-2008-1535 yelp 2008-02-13
Fedora FEDORA-2008-1435 yelp 2008-02-13
Fedora FEDORA-2008-1535 kazehakase 2008-02-13
Fedora FEDORA-2008-1435 kazehakase 2008-02-13
Fedora FEDORA-2008-1535 liferea 2008-02-13
Fedora FEDORA-2008-1435 ruby-gnome2 2008-02-13
Fedora FEDORA-2008-1535 galeon 2008-02-13
Fedora FEDORA-2008-1435 galeon 2008-02-13
Ubuntu USN-582-2 thunderbird 2008-03-06
Red Hat RHSA-2008:0105-02 thunderbird 2008-02-27
Mandriva MDVSA-2008:048 mozilla-firefox 2007-02-22
SuSE SUSE-SA:2008:008 MozillaFirefox,seamonkey 2008-02-15
Fedora FEDORA-2008-1435 liferea 2008-02-13
Fedora FEDORA-2008-1535 epiphany 2008-02-13
Fedora FEDORA-2008-1435 epiphany 2008-02-13
Fedora FEDORA-2008-1535 ruby-gnome2 2008-02-13
Fedora FEDORA-2008-1535 gnome-python2-extras 2008-02-13
Fedora FEDORA-2008-1435 gnome-python2-extras 2008-02-13
Fedora FEDORA-2008-1535 gtkmozembedmm 2008-02-13
Fedora FEDORA-2008-1435 gtkmozembedmm 2008-02-13
Fedora FEDORA-2008-1535 devhelp 2008-02-13
Fedora FEDORA-2008-1435 devhelp 2008-02-13
Fedora FEDORA-2008-1535 firefox 2008-02-13
Fedora FEDORA-2008-1435 firefox 2008-02-13
Fedora FEDORA-2008-1535 epiphany-extensions 2008-02-13
Fedora FEDORA-2008-1435 epiphany-extensions 2008-02-13
Fedora FEDORA-2008-1459 seamonkey 2008-02-13
Fedora FEDORA-2008-1669 seamonkey 2008-02-13
Fedora FEDORA-2008-1535 chmsee 2008-02-13
Fedora FEDORA-2008-1435 chmsee 2008-02-13
Foresight FLEA-2008-0001-1 firefox 2008-02-11
rPath rPSA-2008-0051-1 firefox 2008-02-08
Debian DSA-1489-1 iceweasel 2008-02-10
Debian DSA-1485-1 icedove 2008-02-10
Debian DSA-1484-1 xulrunner 2008-02-10
Ubuntu USN-576-1 firefox 2008-02-08

Comments (none posted)

glib2: buffer overflow

Package(s):glib2 CVE #(s):
Created:February 13, 2008 Updated:February 13, 2008
Description:

From the Fedora advisory:

PCRE 7.6 fixed following bug: A character class containing a very large number of characters with codepoints greater than 255 (in UTF-8 mode, of course) caused a buffer overflow. The GLib release 2.14.6 updates the included copy of PCRE to version 7.6.

Alerts:
Fedora FEDORA-2008-1533 glib2 2008-02-13

Comments (none posted)

gnumeric: arbitrary code execution

Package(s):gnumeric CVE #(s):CVE-2008-0668
Created:February 13, 2008 Updated:August 8, 2008
Description:

From the CVE:

The excel_read_HLINK function in plugins/excel/ms-excel-read.c in Gnome Office Gnumeric before 1.8.1 allows user-assisted remote attackers to execute arbitrary code via a crafted XLS file containing XLS HLINK opcodes, possibly because of an integer signedness error that leads to an integer overflow. NOTE: some of these details are obtained from third party information.

Alerts:
SuSE SUSE-SR:2008:016 moodle, opera, libxcrypt, acroread, gnumeric 2008-08-08
Ubuntu USN-604-1 gnumeric 2008-04-22
Debian DSA-1546-1 gnumeric 2008-04-10
Gentoo 200802-05 gnumeric 2008-02-12
Mandriva MDVSA-2008:056 gnumeric 2007-02-28

Comments (none posted)

gnumeric: integer overflow and signedness errors

Package(s):gnumeric CVE #(s):
Created:February 8, 2008 Updated:February 13, 2008
Description: Gnumeric has an integer overflow and signedness errors in the XLS processing, with unknown consequences.
Alerts:
Fedora FEDORA-2008-1403 gnumeric 2008-02-05
Fedora FEDORA-2008-1313 gnumeric 2008-02-05

Comments (none posted)

java: multiple vulnerabilities

Package(s):java-1.5.0-sun CVE #(s):CVE-2008-0657
Created:February 12, 2008 Updated:April 25, 2008
Description: Multiple unspecified vulnerabilities in the Java Runtime Environment in Sun JDK and JRE 6 Update 1 and earlier, and 5.0 Update 13 and earlier, allow context-dependent attackers to gain privileges via an untrusted (1) application or (2) applet, as demonstrated by an application or applet that grants itself privileges to (a) read local files, (b) write to local files, or (c) execute local programs.
Alerts:
SuSE SUSE-SA:2008:025 IBMJava2,IBMJava5,java-1_4_2-ibm,java-1_5_0-ibm 2008-04-25
Gentoo 200804-20 sun-jre, sun-jdk 2008-04-17
Red Hat RHSA-2008:0210-01 java-1.5.0-ibm 2008-04-03
Red Hat RHSA-2008:0156-02 java-1.5.0-bea 2008-03-05
Red Hat RHSA-2008:0123-01 java-1.5.0-sun 2008-02-12

Comments (none posted)

kernel: insufficient range checks

Package(s):kernel CVE #(s):CVE-2008-0007
Created:February 8, 2008 Updated:January 8, 2009
Description: From the SUSE advisory: Insufficient range checks in certain fault handlers could be used by local attackers to potentially read or write kernel memory.
Alerts:
Red Hat RHSA-2008:0787-01 kernel 2009-01-05
Red Hat RHSA-2009:0001-01 kernel 2009-01-08
Mandriva MDVSA-2008:174 kernel 2008-08-19
Ubuntu USN-618-1 linux-source-2.6.15/20/22 2008-06-19
Mandriva MDVSA-2008:112 kernel 2007-06-12
CentOS CESA-2008:0237 kernel 2008-05-09
CentOS CESA-2008:0233 kernel 2008-05-09
CentOS CESA-2008:0211 kernel 2008-05-07
Red Hat RHSA-2008:0233-01 kernel 2008-05-07
Red Hat RHSA-2008:0237-01 kernel 2008-05-07
Red Hat RHSA-2008:0211-01 kernel 2008-05-07
Debian DSA-1565-1 linux-2.6 2008-05-01
SuSE SUSE-SA:2008:017 kernel 2008-03-28
Mandriva MDVSA-2008:072 kernel 2008-03-20
Debian DSA-1504 kernel-source-2.6.8 2008-02-22
Debian DSA-1503-2 kernel-source-2.4.27 2008-03-06
Debian DSA-1503 kernel-source-2.4.27 2008-02-22
Mandriva MDVSA-2008:044 kernel 2008-02-12
rPath rPSA-2008-0048-1 kernel 2008-02-08
SuSE SUSE-SA:2008:006 kernel 2008-02-07

Comments (none posted)

kernel: local root privilege escalation

Package(s):linux-2.6 CVE #(s):CVE-2008-0010 CVE-2008-0600
Created:February 11, 2008 Updated:June 23, 2008
Description:

From the Debian advisory:

The vmsplice system call did not properly verify address arguments passed by user space processes, which allowed local attackers to overwrite arbitrary kernel memory, gaining root privileges (CVE-2008-0010, CVE-2008-0600).

Alerts:
SuSE SUSE-SA:2008:030 kernel 2008-06-20
Fedora FEDORA-2008-4043 kernel 2008-05-17
Fedora FEDORA-2008-3873 kernel 2008-05-14
SuSE SUSE-SA:2008:013 kernel-rt 2008-03-06
Ubuntu USN-577-1 linux-source-2.6.17/20/22 2008-02-12
Slackware SSA:2008-042-01 kernel 2008-02-13
rPath rPSA-2008-0052-1 kernel 2008-02-12
Red Hat RHSA-2008:0129-01 kernel 2008-02-12
Fedora FEDORA-2008-1433 kernel-xen-2.6 2008-02-13
Fedora FEDORA-2008-1629 kernel-xen-2.6 2008-02-13
Debian DSA-1494-2 linux-2.6 2008-02-12
SuSE SUSE-SA:2008:007 kernel 2008-02-12
Mandriva MDVSA-2008:044 kernel 2008-02-12
Mandriva MDVSA-2008:043 kernel 2007-02-11
Debian DSA-1494-1 linux-2.6 2008-02-11
Fedora FEDORA-2008-1423 kernel 2008-02-11
Fedora FEDORA-2008-1422 kernel 2008-02-11

Comments (1 posted)

kernel: memory access violation

Package(s):linux-2.6 CVE #(s):CVE-2008-0163
Created:February 11, 2008 Updated:February 13, 2008
Description:

From the Debian advisory:

In the vserver-enabled kernels, a missing access check on certain symlinks in /proc enabled local attackers to access resources in other vservers (CVE-2008-0163).

Alerts:
Slackware SSA:2008-042-01 kernel 2008-02-13
Debian DSA-1494-2 linux-2.6 2008-02-12
Debian DSA-1494-1 linux-2.6 2008-02-11

Comments (none posted)

mailman: cross-site scripting

Package(s):mailman CVE #(s):CVE-2008-0564
Created:February 13, 2008 Updated:April 15, 2011
Description:

From the Red Hat bugzilla entry:

Multiple cross-site scripting (XSS) vulnerabilities in Mailman before 2.1.10b1 allow remote attackers to inject arbitrary web script or HTML via unspecified vectors related to (1) editing templates and (2) the list's "info attribute" in the web administrator interface, a different vulnerability than CVE-2006-3636.

Alerts:
CentOS CESA-2011:0307 mailman 2011-04-14
CentOS CESA-2011:0307 mailman 2011-03-02
Red Hat RHSA-2011:0307-01 mailman 2011-03-01
SuSE SUSE-SR:2008:017 powerdns, dnsmasq, python, mailman, ruby, Opera, neon, rxvt-unicode, perl, wireshark, namazu, gnome-screensaver, mysql 2008-08-29
Ubuntu USN-586-1 mailman 2008-03-15
Fedora FEDORA-2008-1334 mailman 2008-02-13
Fedora FEDORA-2008-1356 mailman 2008-02-13
rPath rPSA-2008-0056-1 mailman 2008-02-15
Mandriva MDVSA-2008:061 mailman 2007-03-06

Comments (none posted)

moin: file overwrite via crafted cookie

Package(s):moin CVE #(s):
Created:February 13, 2008 Updated:February 13, 2008
Description:

From the Fedora advisory:

It was discovered that moin allowed to overwrite arbitrary files writable by the user running moin using a crafted cookie with certain user IDs via a directory traversal flaw. This updated package fixes this issue.

Alerts:
Fedora FEDORA-2008-1486 moin 2008-02-13
Fedora FEDORA-2008-1562 moin 2008-02-13

Comments (none posted)

mozilla: multiple vulnerabilities

Package(s):mozilla CVE #(s):
Created:February 13, 2008 Updated:July 29, 2008
Description:
Here are the details from the Slackware 12.0 ChangeLog:
+--------------------------+
patches/packages/mozilla-firefox-2.0.0.12-i686-1.tgz:
  Upgraded to firefox-2.0.0.12.
  This upgrade fixes some more security bugs.
  For more information, see:
    http://www.mozilla.org/projects/security/known-vulnerabil...
  (* Security fix *)
patches/packages/seamonkey-1.1.8-i486-1_slack12.0.tgz:
  Upgraded to seamonkey-1.1.8.
  This upgrade fixes some more security bugs.
  For more information, see:
    http://www.mozilla.org/projects/security/known-vulnerabil...
  (* Security fix *)
+--------------------------+
Alerts:
Slackware SSA:2008-210-05 mozilla 2008-07-29
Slackware SSA:2008-043-01 mozilla 2008-02-13

Comments (none posted)

mplayer: multiple vulnerabilities

Package(s):mplayer CVE #(s):CVE-2008-0485 CVE-2008-0486 CVE-2008-0629 CVE-2008-0630
Created:February 13, 2008 Updated:August 7, 2008
Description:

From the Debian advisory:

Several buffer overflows have been discovered in the MPlayer movie player, which might lead to the execution of arbitrary code. The Common Vulnerabilities and Exposures project identifies the following problems:

CVE-2008-0485: Felipe Manzano and Anibal Sacco discovered a buffer overflow in the demuxer for MOV files.

CVE-2008-0486: Reimar Doeffinger discovered a buffer overflow in the FLAC header parsing.

CVE-2008-0629: Adam Bozanich discovered a buffer overflow in the CDDB access code.

CVE-2008-0630: Adam Bozanich discovered a buffer overflow in URL parsing.

Alerts:
Ubuntu USN-635-1 xine-lib 2008-08-06
Debian DSA-1536-1 xine-lib 2008-03-31
Gentoo 200802-12 xine-lib 2008-02-26
Mandriva MDVSA-2008:045 mplayer 2007-02-14
SuSE SUSE-SR:2008:006 sarg, phpMyAdmin, xine, bind, dbus-1, silc-toolkit, boost 2008-03-14
Gentoo 200803-16 mplayer 2008-03-10
Mandriva MDVSA-2008:046-1 xine-lib 2007-02-20
Mandriva MDVSA-2008:046 xine-lib 2007-02-15
Fedora FEDORA-2008-1543 xine-lib 2008-02-13
Fedora FEDORA-2008-1581 xine-lib 2008-02-13
Debian DSA-1496-1 mplayer 2008-02-12

Comments (none posted)

netpbm: buffer overflow

Package(s):netpbm CVE #(s):CVE-2008-0554
Created:February 8, 2008 Updated:November 7, 2008
Description: From the Mandriva advisory: A buffer overflow in the giftopnm utility in netpbm prior to version 10.27 could allow attackers to have an unknown impact via a specially crafted GIF file.
Alerts:
Ubuntu USN-665-1 netpbm-free 2008-11-06
Debian DSA-1579-1 netpbm-free 2008-05-18
Red Hat RHSA-2008:0131-01 netpbm 2008-02-28
Debian DSA-1493-1 sdl-image1.2 2008-02-10
Mandriva MDVSA-2008:039 netpbm 2008-02-07

Comments (none posted)

openldap: denial of service

Package(s):openldap CVE #(s):CVE-2007-6698
Created:February 8, 2008 Updated:April 25, 2008
Description: From the CVE entry: The BDB backend for slapd in OpenLDAP before 2.3.36, allows remote authenticated users to cause a denial of service (crash) via a potentially-successful modify operation with the NOOP control set to critical, possibly due to a double free vulnerability.
Alerts:
SuSE SUSE-SR:2008:010 licq, libpng, asterisk, openldap2, audit, blender 2008-04-25
Debian DSA-1541-1 openldap2.3 2008-04-08
Mandriva MDVSA-2008:058 openldap 2007-03-05
Fedora FEDORA-2008-1616 openldap 2008-02-13
rPath rPSA-2008-0059-1 openldap 2008-02-12
Ubuntu USN-584-1 openldap2.2, openldap2.3 2008-03-05
Red Hat RHSA-2008:0110-01 openldap 2008-02-21
Fedora FEDORA-2008-1307 openldap 2008-02-05

Comments (none posted)

openldap: denial of service

Package(s):openldap CVE #(s):CVE-2008-0658
Created:February 13, 2008 Updated:July 3, 2008
Description:

From the rPath advisory:

Previous versions of the openldap package are vulnerable to a Denial of Service attack in which authenticated users can crash the slapd server.

Alerts:
Fedora FEDORA-2008-6029 openldap 2008-07-03
SuSE SUSE-SR:2008:010 licq, libpng, asterisk, openldap2, audit, blender 2008-04-25
Debian DSA-1541-1 openldap2.3 2008-04-08
Gentoo 200803-28 openldap 2008-03-19
Mandriva MDVSA-2008:058 openldap 2007-03-05
Fedora FEDORA-2008-1568 openldap 2008-02-13
Fedora FEDORA-2008-1616 openldap 2008-02-13
rPath rPSA-2008-0059-1 openldap 2008-02-12
Ubuntu USN-584-1 openldap2.2, openldap2.3 2008-03-05
Red Hat RHSA-2008:0110-01 openldap 2008-02-21

Comments (none posted)

phpbb2: multiple vulnerabilities

Package(s):phpbb2 CVE #(s):CVE-2006-4758 CVE-2006-6839 CVE-2006-6840 CVE-2006-6508 CVE-2006-6841 CVE-2008-0471
Created:February 11, 2008 Updated:February 13, 2008
Description:

From the Debian advisory:

CVE-2008-0471: Private messaging allowed cross site request forgery, making it possible to delete all private messages of a user by sending them to a crafted web page.

CVE-2006-6841 / CVE-2006-6508: Cross site request forgery enabled an attacker to perform various actions on behalf of a logged in user. (Applies to sarge only)

CVE-2006-6840: A negative start parameter could allow an attacker to create invalid output. (Applies to sarge only)

CVE-2006-6839: Redirection targets were not fully checked, leaving room for unauthorised external redirections via a phpBB forum. (Applies to sarge only)

CVE-2006-4758: An authenticated forum administrator may upload files of any type by using specially crafted filenames. (Applies to sarge only)

Alerts:
Debian DSA-1488-1 phpbb2 2008-02-09

Comments (none posted)

SDL_image: buffer overflows

Package(s):SDL_image CVE #(s):CVE-2007-6697 CVE-2008-0544
Created:February 8, 2008 Updated:March 27, 2008
Description: From the Mandriva advisory: The LWZReadByte() and IMG_LoadLBM_RW() functions in SDL_image contain a boundary error that could be triggered to cause a static buffer overflow and a heap-based buffer overflow. If a user using an application linked against the SDL_image library were to open a carefully crafted GIF or IFF ILBM file, the application could crash or possibly allow for the execution of arbitrary code.
Alerts:
Ubuntu USN-595-1 sdl-image1.2 2008-03-26
Debian DSA-1493-2 sdl-image1.2 2008-03-16
rPath rPSA-2008-0061-1 SDL_image 2008-02-13
Debian DSA-1493-1 sdl-image1.2 2008-02-10
Mandriva MDVSA-2008:040 SDL_image 2007-02-07

Comments (none posted)

tk: buffer overflow

Package(s):tk CVE #(s):CVE-2008-0553
Created:February 8, 2008 Updated:November 6, 2008
Description: From the Mandriva advisory: The ReadImage() function in Tk did not check CodeSize read from GIF images prior to initializing the append array, which could lead to a buffer overflow with unknown impact.
Alerts:
Gentoo 201412-08 insight, perl-tk, sourcenav, tk, partimage, bitdefender-console, mlmmj, acl, xinit, gzip, ncompress, liblzw, splashutils, m4, kdm, gtk+, kget, dvipng, beanstalkd, pmount, pam_krb5, gv, lftp, uzbl, slim, iputils, dvbstreamer 2014-12-11
Ubuntu USN-664-1 tk8.0, tk8.3, tk8.4 2008-11-06
Debian DSA-1598-1 libtk-img 2008-06-19
SuSE SUSE-SR:2008:013 thunderbird, xulrunner, tkimg, cups, qemu, gstreamer010-plugins-good, pan, libxslt 2008-06-13
Fedora FEDORA-2008-3621 tkimg 2008-05-13
Fedora FEDORA-2008-3545 tkimg 2008-05-09
SuSE SUSE-SR:2008:008 wireshark, otrs, xine, xgl, silc-toolkit, lighttpd, tk 2008-04-04
rPath rPSA-2008-0054-1 tk 2008-02-12
Red Hat RHSA-2008:0135-02 tk 2008-02-22
Red Hat RHSA-2008:0136-01 tk 2008-02-21
Red Hat RHSA-2008:0135-01 tk 2008-02-21
Red Hat RHSA-2008:0134-01 tcltk 2008-02-21
Debian DSA-1491-1 tk8.4 2008-02-10
Debian DSA-1490-1 tk8.3 2008-02-10
Fedora FEDORA-2008-1122 tk 2008-02-05
Fedora FEDORA-2008-1131 tk 2008-02-05
Fedora FEDORA-2008-1384 perl-Tk 2008-02-05
Fedora FEDORA-2008-1323 perl-Tk 2008-02-05
Mandriva MDVSA-2008:041 tk 2007-02-07

Comments (none posted)

tomcat: multiple vulnerabilities

Package(s):tomcat5 CVE #(s):CVE-2007-5342 CVE-2007-5333 CVE-2007-6286 CVE-2007-1355 CVE-2007-1358 CVE-2008-0002
Created:February 13, 2008 Updated:September 13, 2010
Description: Refer to the CVE entries for more information.
Alerts:
Mandriva MDVSA-2010:176 tomcat5 2010-09-12
CentOS CESA-2009:1164 tomcat 2009-07-29
Red Hat RHSA-2009:1563-01 tomcat 2009-11-09
Red Hat RHSA-2009:1164-01 tomcat 2009-07-21
Red Hat RHSA-2009:1562-01 tomcat 2009-11-09
SuSE SUSE-SR:2009:004 apache, audacity, dovecot, libtiff-devel, libvirt, mediawiki, netatalk, novell-ipsec-tools,opensc, perl, phpPgAdmin, sbl, sblim-sfcb, squirrelmail, swfdec, tomcat5, virtualbox, websphere-as_ce, wine, xine-devel 2009-02-17
Red Hat RHSA-2008:0862-02 tomcat 2008-10-02
Mandriva MDVSA-2009:018 tomcat5 2009-01-16
Fedora FEDORA-2008-8130 tomcat5 2008-09-16
Mandriva MDVSA-2008:188 tomcat5 2008-09-05
Red Hat RHSA-2008:0195-01 tomcat 2008-04-28
Gentoo 200804-10 tomcat 2008-04-10
Red Hat RHSA-2008:0042-01 tomcat 2008-03-11
Fedora FEDORA-2008-1603 tomcat5 2008-02-13
Fedora FEDORA-2008-1467 tomcat5 2008-02-13

Comments (none posted)

wml: multiple file overwrite vulnerabilities

Package(s):wml CVE #(s):CVE-2008-0665 CVE-2008-0666
Created:February 11, 2008 Updated:April 28, 2008
Description:

From the Debian advisory:

Frank Lichtenheld and Nico Golde discovered that WML, an off-line HTML generation toolkit, creates insecure temporary files in the eperl and ipp backends and in the wmg.cgi script, which could lead to local denial of service by overwriting files.

Alerts:
Debian DSA-1492-2 wml 2008-04-27
Mandriva MDVSA-2008:076 wml 2007-03-26
Gentoo 200803-23 wml 2008-03-15
Debian DSA-1492-1 wml 2008-02-10

Comments (none posted)

wordpress: remote editing via unknown vectors

Package(s):wordpress CVE #(s):CVE-2008-0664
Created:February 13, 2008 Updated:July 4, 2008
Description:

From the CVE:

The XML-RPC implementation (xmlrpc.php) in WordPress before 2.3.3, when registration is enabled, allows remote attackers to edit posts of other blog users via unknown vectors.

Alerts:
Debian DSA-1601-1 wordpress 2008-07-04
Fedora FEDORA-2008-1559 wordpress 2008-02-13
Fedora FEDORA-2008-1512 wordpress 2008-02-13

Comments (none posted)

Page editor: Jake Edge
Next page: Kernel development>>


Copyright © 2008, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds