|
|
Subscribe / Log in / New account

Security

A desktop "secrets" API

By Jake Edge
July 29, 2009

There is often a fair amount of secret information that a Linux user might store on their computer—things like passwords for sensitive sites, private ssh keys, and Swiss bank account numbers. If multiple applications, typically desktop applications, need to access that information, there are solutions in the form of GNOME Keyring and KDE Wallet, but those solutions are only available to applications written for those specific desktop environments. A new freedesktop.org initiative, started by the developers of those two solutions, aims to create a "Secrets API" that can be used across desktop environments so that users can have access to their secrets from any application, regardless of which desktop it comes from.

The project was announced by KDE Wallet developer Michael Leupold on the XDG mailing list (as well as on his blog). The basic idea is fairly straightforward: users will still run Keyring or Wallet as part of their login session—which will depend on the desktop they use—but there will be an API that allows applications to extract these secrets without caring which secret storage program is providing them.

Not surprisingly, given that it is a cross-desktop API, D-Bus will be used to implement a protocol for extracting the needed secrets. Applications will then use the new API so that they are insulated from the underlying secret storage service. In his blog posting, Leupold notes that he will be trying to provide backward compatibility: "While I expect a new client-side API (which I imagine to be more OO style than KWallet::Wallet), I'll keep an eye on providing something the current class can wrap so even applications using the old API will be able to use the new system." It seems likely that Stef Walter, the Keyring developer, will do something similar for GNOME applications.

In the Secrets API, secrets are just arrays of bytes that get transferred, possibly encrypted, between the application and the storage facility. Each secret is associated with a simple dictionary (i.e. set of name, value pairs) called "lookup attributes", which are to be used to find the secret. In addition, secrets have a label and properties associated with them. Secrets can then be grouped into "collections", which more or less correspond to today's keyrings or wallets.

Items and collections can be locked, such that an unlocking process needs to happen before they can be accessed. In practice, that would generally mean that the user was prompted for a password before the item or collection could be retrieved by the application.

Clients can negotiate encryption of the secret information as it is transferred to or from the storage service. While that may seem like a good idea overall, the API documentation comes with some fairly strong caveats:

The encryption is not envisioned to withstand man in the middle attacks, or other active attacks. It is envisioned to minimize storage of plain text secrets in memory and prevent plain text storage of secrets in a swap file or other caching mechanism.

Many client applications may choose not to make use of the provisions to encrypt secrets in transit. In fact for applications unable to prevent their own memory from being paged to disk (eg: Java, C# or Python apps), [transferring] encrypted secrets would be an [exercise] of questionable value.

There are more details, of course, and the API specification is being discussed and revised on the freedesktop.org Authentication mailing list. In addition, there is discussion of higher-level topics on the list, such as how browsers will identify their secrets so that moving between browsers, while still being able to use the password information stored for the user, is easy. As Leupold notes that is one of the most likely scenarios for users needing the Secrets API.

With this API in place, GNOME users could use Konqueror and still have access to their passwords, and the same goes for KDE users and Epiphany. As Leupold points out in his blog posting, though, Mozilla has not shown any interest, at least yet. Integrating with the Linux desktop has not really ever been a priority for Mozilla, so one might expect Firefox, et al. to lag in this area.

Even for those not running one of the "big two" desktop environments, a suitably configured system—with D-Bus and one of the secret storage services enabled—could take advantage of the Secrets API. Interoperability between desktop environments is a good thing, and not having to store passwords somewhere external, so that one can "browser hop" can only be a good thing as well. As it matures, other applications needing to store secrets will presumably use it too. Having a single, hopefully well-vetted, location for storing this kind of information—encrypted and password-protected—may also lead to better security for users.

Comments (14 posted)

Brief items

BIND 9 denial of service being actively exploited

Internet Systems Consortium, the developers of the BIND DNS server, is reporting a denial of service vulnerability that is being actively exploited. "Receipt of a specially-crafted dynamic update message to a zone for which the server is the master may cause BIND 9 servers to exit. Testing indicates that the attack packet has to be formulated against a zone for which that machine is a master. Launching the attack against slave zones does not trigger the assert. [...] This vulnerability affects all servers that are masters for one or more zones – it is not limited to those that are configured to allow dynamic updates. Access controls will not provide an effective workaround." ISC is urgently suggesting that everyone upgrade BIND to 9.4.3-P3, 9.5.1-P3, or 9.6.1-P1.

Comments (9 posted)

Finding Linux Bugs Before they Become Exploits (internetnews.com)

Over at internetnews.com, there is a look at the role the Coverity scanner played in finding the bad code that allowed the recent kernel NULL pointer exploit. "The issue of patching aside, the public exploit could easily have been a zero day exploit on the Linux kernel itself, were it not for the fact that the bug that enables the exploit was caught by a scan from code scanning vendor Coverity. The Linux kernel has been actively scanned by Coverity since at least 2004 in an effort to find bugs and improve code quality."

Comments (13 posted)

New vulnerabilities

bind: denial of service

Package(s):bind9 bind CVE #(s):CVE-2009-0696
Created:July 29, 2009 Updated:January 21, 2010
Description: Bind 9 fails to validate certain dynamic DNS update packets, causing the server to crash. This vulnerability is being actively exploited.
Alerts:
Fedora FEDORA-2010-0861 bind 2010-01-20
Gentoo 200908-02 bind 2009-08-01
CentOS CESA-2009:1180 bind 2009-07-30
SuSE SUSE-SA:2009:040 bind 2009-07-30
Slackware SSA:2009-210-01 bind 2009-07-30
rPath rPSA-2009-0113-1 bind 2009-07-29
Red Hat RHSA-2009:1179-02 bind 2009-07-29
Red Hat RHSA-2009:1180-01 bind 2009-07-29
Red Hat RHSA-2009:1181-01 bind 2009-07-29
Mandriva MDVSA-2009:181 bind 2009-07-29
CentOS CESA-2009:1179 bind 2009-07-30
CentOS CESA-2009:1181 bind 2009-07-29
Fedora FEDORA-2009-8119 bind 2009-07-30
Fedora FEDORA-2009-8119 bind 2009-07-30
Ubuntu USN-808-1 bind9 2009-07-29
Debian DSA-1847-1 bind9 2009-07-29

Comments (none posted)

bugzilla: privilege escalation

Package(s):bugzilla CVE #(s):
Created:July 28, 2009 Updated:July 29, 2009
Description: From the bugzilla security advisory: Bug reporters could confirm their bugs and change their bugs' statuses, even if they didn't have the appropriate permissions.
Alerts:
Fedora FEDORA-2009-7669 bugzilla 2009-07-15
Fedora FEDORA-2009-7687 bugzilla 2009-07-15

Comments (none posted)

compface: buffer overflow

Package(s):compface CVE #(s):CVE-2009-2286
Created:July 29, 2009 Updated:July 29, 2009
Description: Compface 1.5.2 contains a buffer overflow which can be exploited to (at least) crash the process. It's worth noting that, while this is a 2009 CVE, Fedora fixed the bug in 2006.
Alerts:
Mandriva MDVSA-2009:180 compface 2009-07-29

Comments (none posted)

firefox: denial of service

Package(s):firefox CVE #(s):CVE-2009-2478
Created:July 23, 2009 Updated:July 29, 2009
Description: From the National Vulnerability Database entry: "Mozilla Firefox 3.5 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via unspecified vectors, related to a "flash bug.""
Alerts:
Gentoo 201301-01 firefox 2013-01-07
Fedora FEDORA-2009-7898 chmsee 2009-07-22
Fedora FEDORA-2009-7898 eclipse 2009-07-22
Fedora FEDORA-2009-7898 hulahop 2009-07-22
Fedora FEDORA-2009-7898 blam 2009-07-22
Fedora FEDORA-2009-7898 epiphany 2009-07-22
Fedora FEDORA-2009-7898 epiphany-extensions 2009-07-22
Fedora FEDORA-2009-7898 evolution-rss 2009-07-22
Fedora FEDORA-2009-7898 firefox 2009-07-22
Fedora FEDORA-2009-7898 galeon 2009-07-22
Fedora FEDORA-2009-7898 gnome-python2-extras 2009-07-22
Fedora FEDORA-2009-7898 gnome-web-photo 2009-07-22
Fedora FEDORA-2009-7898 kazehakase 2009-07-22
Fedora FEDORA-2009-7898 Miro 2009-07-22
Fedora FEDORA-2009-7898 mozvoikko 2009-07-22
Fedora FEDORA-2009-7898 perl-Gtk2-MozEmbed 2009-07-22
Fedora FEDORA-2009-7898 ruby-gnome2 2009-07-22
Fedora FEDORA-2009-7898 xulrunner 2009-07-22
Fedora FEDORA-2009-7898 yelp 2009-07-22
Fedora FEDORA-2009-7898 java-1.6.0-openjdk 2009-07-22
Fedora FEDORA-2009-7898 google-gadgets 2009-07-22
Fedora FEDORA-2009-7898 yelp 2009-07-22

Comments (none posted)

firefox: denial of service

Package(s):firefox CVE #(s):CVE-2009-2479
Created:July 23, 2009 Updated:July 29, 2009
Description: From the National Vulnerability Database entry: "Mozilla Firefox 3.0.x, 3.5, and 3.5.1 on Windows allows remote attackers to cause a denial of service (uncaught exception and application crash) via a long Unicode string argument to the write method. NOTE: this was originally reported as a stack-based buffer overflow. NOTE: on Linux and Mac OS X, a crash resulting from this long string reportedly occurs in an operating-system library, not in Firefox."
Alerts:
Gentoo 201301-01 firefox 2013-01-07
Fedora FEDORA-2009-7898 chmsee 2009-07-22
Fedora FEDORA-2009-7898 eclipse 2009-07-22
Fedora FEDORA-2009-7898 hulahop 2009-07-22
Fedora FEDORA-2009-7898 blam 2009-07-22
Fedora FEDORA-2009-7898 epiphany 2009-07-22
Fedora FEDORA-2009-7898 epiphany-extensions 2009-07-22
Fedora FEDORA-2009-7898 evolution-rss 2009-07-22
Fedora FEDORA-2009-7898 firefox 2009-07-22
Fedora FEDORA-2009-7898 galeon 2009-07-22
Fedora FEDORA-2009-7898 gnome-python2-extras 2009-07-22
Fedora FEDORA-2009-7898 gnome-web-photo 2009-07-22
Fedora FEDORA-2009-7898 kazehakase 2009-07-22
Fedora FEDORA-2009-7898 Miro 2009-07-22
Fedora FEDORA-2009-7898 mozvoikko 2009-07-22
Fedora FEDORA-2009-7898 perl-Gtk2-MozEmbed 2009-07-22
Fedora FEDORA-2009-7898 ruby-gnome2 2009-07-22
Fedora FEDORA-2009-7898 xulrunner 2009-07-22
Fedora FEDORA-2009-7898 yelp 2009-07-22
Fedora FEDORA-2009-7898 java-1.6.0-openjdk 2009-07-22
Fedora FEDORA-2009-7898 google-gadgets 2009-07-22
Fedora FEDORA-2009-7898 yelp 2009-07-22

Comments (none posted)

firefox: arbitrary code execution

Package(s):firefox CVE #(s):CVE-2009-2477
Created:July 23, 2009 Updated:July 29, 2009
Description: From the National Vulnerability Database entry: "js/src/jstracer.cpp in the Just-in-time (JIT) JavaScript compiler (aka TraceMonkey) in Mozilla Firefox 3.5 before 3.5.1 allows remote attackers to execute arbitrary code via certain use of the escape function that triggers access to uninitialized memory locations, as originally demonstrated by a document containing P and FONT elements."
Alerts:
Gentoo 201301-01 firefox 2013-01-07
Fedora FEDORA-2009-7898 chmsee 2009-07-22
Fedora FEDORA-2009-7898 eclipse 2009-07-22
Fedora FEDORA-2009-7898 hulahop 2009-07-22
Fedora FEDORA-2009-7898 blam 2009-07-22
Fedora FEDORA-2009-7898 epiphany 2009-07-22
Fedora FEDORA-2009-7898 epiphany-extensions 2009-07-22
Fedora FEDORA-2009-7898 evolution-rss 2009-07-22
Fedora FEDORA-2009-7898 firefox 2009-07-22
Fedora FEDORA-2009-7898 galeon 2009-07-22
Fedora FEDORA-2009-7898 gnome-python2-extras 2009-07-22
Fedora FEDORA-2009-7898 gnome-web-photo 2009-07-22
Fedora FEDORA-2009-7898 kazehakase 2009-07-22
Fedora FEDORA-2009-7898 Miro 2009-07-22
Fedora FEDORA-2009-7898 mozvoikko 2009-07-22
Fedora FEDORA-2009-7898 perl-Gtk2-MozEmbed 2009-07-22
Fedora FEDORA-2009-7898 ruby-gnome2 2009-07-22
Fedora FEDORA-2009-7898 xulrunner 2009-07-22
Fedora FEDORA-2009-7898 yelp 2009-07-22
Fedora FEDORA-2009-7898 java-1.6.0-openjdk 2009-07-22
Fedora FEDORA-2009-7898 google-gadgets 2009-07-22
Fedora FEDORA-2009-7898 yelp 2009-07-22

Comments (none posted)

kdelibs: denial of service

Package(s):kdelibs CVE #(s):CVE-2009-1725 CVE-2009-2537
Created:July 28, 2009 Updated:January 25, 2011
Description: From the CVE entries:

WebKit in Apple Safari before 4.0.2 does not properly handle numeric character references, which allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted HTML document. (CVE-2009-1725)

KDE Konqueror allows remote attackers to cause a denial of service (memory consumption) via a large integer value for the length property of a Select object, a related issue to CVE-2009-1692. (CVE-2009-2537)

Alerts:
openSUSE openSUSE-SU-2011:0024-1 webkit 2011-01-12
SUSE SUSE-SR:2011:002 ed, evince, hplip, libopensc2/opensc, libsmi, libwebkit, perl, python, sssd, sudo, wireshark 2011-01-25
openSUSE openSUSE-SU-2010:1036-1 kdelibs 2010-12-09
Debian DSA-1988-1 qt4-x11 2010-02-02
Mandriva MDVSA-2010:027 kdelibs4 2010-01-27
Mandriva MDVSA-2010:028 kdelibs4 2010-01-27
Mandriva MDVSA-2009:346 kde 2009-12-29
Debian DSA-1950 webkit 2009-12-12
Mandriva MDVSA-2009:330 kdelibs 2009-12-10
Ubuntu USN-836-1 webkit 2009-09-23
Fedora FEDORA-2009-9391 kdelibs3 2009-09-09
Fedora FEDORA-2009-9400 kdelibs3 2009-09-09
Fedora FEDORA-2009-8800 qt 2009-08-20
Fedora FEDORA-2009-8802 qt 2009-08-20
Fedora FEDORA-2009-8020 kdelibs3 2009-07-27
Fedora FEDORA-2009-8046 kdelibs3 2009-07-27
Fedora FEDORA-2009-8049 kdelibs 2009-07-27
Fedora FEDORA-2009-8039 kdelibs 2009-07-27
Ubuntu USN-857-1 qt4-x11 2009-11-10

Comments (none posted)

kernel: privilege escalation

Package(s):kernel CVE #(s):CVE-2009-1897
Created:July 27, 2009 Updated:October 5, 2009
Description:

From the CVE entry:

The tun_chr_poll function in drivers/net/tun.c in the tun subsystem in the Linux kernel 2.6.30 and 2.6.30.1, when the -fno-delete-null-pointer-checks gcc option is omitted, allows local users to gain privileges via vectors involving a NULL pointer dereference and an mmap of /dev/net/tun, a different vulnerability than CVE-2009-1894.

Alerts:
Fedora FEDORA-2009-9044 kernel 2009-08-27
Fedora FEDORA-2009-8649 kernel 2009-08-15
Fedora FEDORA-2009-8647 kernel 2009-08-15
Fedora FEDORA-2009-8684 kernel 2009-08-17
Fedora FEDORA-2009-8144 kernel 2009-07-31
Fedora FEDORA-2009-8264 kernel 2009-08-04
rPath rPSA-2009-0111-1 kernel 2009-07-24
Fedora FEDORA-2009-10165 kernel 2009-10-03

Comments (none posted)

kernel: privilege escalation

Package(s):kernel CVE #(s):CVE-2009-1895
Created:July 27, 2009 Updated:March 21, 2011
Description:

From the CVE entry:

The personality subsystem in the Linux kernel before 2.6.31-rc3 has a PER_CLEAR_ON_SETID setting that does not clear the ADDR_COMPAT_LAYOUT and MMAP_PAGE_ZERO flags when executing a setuid or setgid program, which makes it easier for local users to leverage the details of memory usage to (1) conduct NULL pointer dereference attacks, (2) bypass the mmap_min_addr protection mechanism, or (3) defeat address space layout randomization (ASLR).

Alerts:
Mandriva MDVSA-2011:051 kernel 2011-03-18
Red Hat RHSA-2010:0079-01 kernel 2010-02-02
CentOS CESA-2009:1438 kernel 2009-09-15
Red Hat RHSA-2009:1438-01 kernel 2009-09-15
Red Hat RHSA-2009:1540-01 kernel-rt 2009-11-03
Fedora FEDORA-2009-9044 kernel 2009-08-27
SuSE SUSE-SA:2009:045 kernel 2009-08-20
Fedora FEDORA-2009-8649 kernel 2009-08-15
Fedora FEDORA-2009-8647 kernel 2009-08-15
Fedora FEDORA-2009-8684 kernel 2009-08-17
Fedora FEDORA-2009-8144 kernel 2009-07-31
Fedora FEDORA-2009-8264 kernel 2009-08-04
CentOS CESA-2009:1193 kernel 2009-08-05
Red Hat RHSA-2009:1193-01 kernel 2009-08-04
Debian DSA-1845-1 linux-2.6 2009-06-28
Debian DSA-1844-1 linux-2.6.24 2009-07-28
Ubuntu USN-807-1 linux, linux-source-2.6.15 2009-07-28
rPath rPSA-2009-0111-1 kernel 2009-07-24
CentOS CESA-2009:1550 kernel 2009-11-04
Red Hat RHSA-2009:1550-01 kernel 2009-11-03
Mandriva MDVSA-2009:289 kernel 2009-10-27
Fedora FEDORA-2009-10165 kernel 2009-10-03

Comments (none posted)

kernel: multiple vulnerabilities

Package(s):kernel, linux, linux-source-2.6.15 CVE #(s):CVE-2009-2287 CVE-2009-2406 CVE-2009-2407
Created:July 28, 2009 Updated:February 18, 2011
Description: From the Ubuntu advisory:

Matt T. Yourst discovered that KVM did not correctly validate the page table root. A local attacker could exploit this to crash the system, leading to a denial of service. Ubuntu 6.06 was not affected. (CVE-2009-2287)

Ramon de Carvalho Valle discovered that eCryptfs did not correctly validate certain buffer sizes. A local attacker could create specially crafted eCryptfs files to crash the system or gain elevated privileges. Ubuntu 6.06 was not affected. (CVE-2009-2406, CVE-2009-2407)

Alerts:
Mandriva MDVSA-2011:029 kernel 2011-02-17
Mandriva MDVSA-2010:188 kernel 2010-09-23
Mandriva MDVSA-2010:198 kernel 2010-10-07
SuSE SUSE-SR:2009:015 OpenOffice_org, OpenOffice_org-math, dnsmasq, gnutls, ia32el, ib-bonding-kmp-rt/kernel-rt, libxml, opera, perl-IO-Socket-SSL, xen 2009-09-15
Fedora FEDORA-2009-9044 kernel 2009-08-27
SuSE SUSE-SA:2009:045 kernel 2009-08-20
Fedora FEDORA-2009-8649 kernel 2009-08-15
Fedora FEDORA-2009-8647 kernel 2009-08-15
Fedora FEDORA-2009-8684 kernel 2009-08-17
Fedora FEDORA-2009-8144 kernel 2009-07-31
Fedora FEDORA-2009-8264 kernel 2009-08-04
CentOS CESA-2009:1193 kernel 2009-08-05
Red Hat RHSA-2009:1193-01 kernel 2009-08-04
Debian DSA-1846-1 kvm 2009-07-28
Debian DSA-1845-1 linux-2.6 2009-06-28
Debian DSA-1844-1 linux-2.6.24 2009-07-28
Ubuntu USN-807-1 linux, linux-source-2.6.15 2009-07-28
Mandriva MDVSA-2009:289 kernel 2009-10-27
Fedora FEDORA-2009-10165 kernel 2009-10-03

Comments (none posted)

mysql: denial of service and "unspecified other impact"

Package(s):mysql CVE #(s):CVE-2009-2446
Created:July 27, 2009 Updated:March 8, 2010
Description:

From the Mandriva advisory:

Multiple format string vulnerabilities in the dispatch_command function in libmysqld/sql_parse.cc in mysqld in MySQL 4.0.0 through 5.0.83 allow remote authenticated users to cause a denial of service (daemon crash) and possibly have unspecified other impact via format string specifiers in a database name in a (1) COM_CREATE_DB or (2) COM_DROP_DB request. NOTE: some of these details are obtained from third party information (CVE-2009-2446).

Alerts:
Ubuntu USN-1397-1 mysql-5.1, mysql-dfsg-5.0, mysql-dfsg-5.1 2012-03-12
Gentoo 201201-02 mysql 2012-01-05
rPath rPSA-2010-0014-1 mysql 2010-03-07
Ubuntu USN-897-1 mysql-dfsg-5.0, mysql-dfsg-5.1 2010-02-10
Mandriva MDVSA-2009:326 mysql 2009-12-07
CentOS CESA-2010:0110 mysql 2010-02-17
Red Hat RHSA-2010:0110-01 mysql 2010-02-16
Red Hat RHSA-2009:1461-01 Red Hat Application Stack 2009-09-23
CentOS CESA-2009:1289 mysql 2009-09-15
Debian DSA-1877-1 mysql-dfsg-5.0 2009-09-02
Red Hat RHSA-2009:1289-02 mysql 2009-09-02
SuSE SUSE-SR:2009:014 dnsmasq, icu, libcurl3/libcurl2/curl/compat-curl2, Xerces-c/xerces-j2, tiff/libtiff, acroread_ja, xpdf, xemacs, mysql, squirrelmail, OpenEXR, wireshark 2009-09-01
Mandriva MDVSA-2009:179 mysql 2009-07-29
Mandriva MDVSA-2009:159 mysql 2009-07-27

Comments (none posted)

openexr: several vulnerabilities

Package(s):openexr CVE #(s):CVE-2009-1720 CVE-2009-1721 CVE-2009-1722
Created:July 28, 2009 Updated:December 9, 2013
Description: From the Debian advisory: Several vulnerabilities have been discovered in the OpenEXR image library, which can lead to the execution of arbitrary code. The Common Vulnerabilities and Exposures project identifies the following problems:

Drew Yao discovered integer overflows in the preview and compression code. (CVE-2009-1720)

Drew Yao discovered that an uninitialised pointer could be freed in the decompression code. (CVE-2009-1721)

A buffer overflow was discovered in the compression code. (CVE-2009-1722)

Alerts:
Gentoo 201312-07 openexr 2013-12-09
Mandriva MDVSA-2009:191-1 OpenEXR 2009-12-08
Ubuntu USN-831-1 openexr 2009-09-14
SuSE SUSE-SR:2009:014 dnsmasq, icu, libcurl3/libcurl2/curl/compat-curl2, Xerces-c/xerces-j2, tiff/libtiff, acroread_ja, xpdf, xemacs, mysql, squirrelmail, OpenEXR, wireshark 2009-09-01
Mandriva MDVSA-2009:191 OpenEXR 2009-08-02
Mandriva MDVSA-2009:190 OpenEXR 2009-08-02
Fedora FEDORA-2009-8132 OpenEXR 2009-07-31
Fedora FEDORA-2009-8136 OpenEXR 2009-07-31
Debian DSA-1842-1 openexr 2009-07-28

Comments (none posted)

php: missing input validation

Package(s):php CVE #(s):
Created:July 28, 2009 Updated:July 29, 2009
Description: From the php bug report: There seems to be a problem in exif_read_data(), where some fields representing offsets(?) are taken directly from the file without being validated, resulting in a segmentation fault.
Alerts:
Mandriva MDVSA-2009:167 php 2009-07-28

Comments (none posted)

squid: several vulnerabilities

Package(s):squid CVE #(s):
Created:July 28, 2009 Updated:July 29, 2009
Description: From the Mandriva advisory: Multiple vulnerabilities has been found and corrected in squid:

Due to incorrect buffer limits and related bound checks Squid is vulnerable to a denial of service attack when processing specially crafted requests or responses.

Due to incorrect data validation Squid is vulnerable to a denial of service attack when processing specially crafted responses.

See this Squid advisory for more details.

Alerts:
Mandriva MDVSA-2009:178 squid 2009-07-29
Debian DSA-1843-1 squid3 2009-07-28
Mandriva MDVSA-2009:161 squid 2009-07-27

Comments (none posted)

znc: directory traversal

Package(s):znc CVE #(s):
Created:July 29, 2009 Updated:August 3, 2009
Description: A directory traversal vulnerability in znc can enable a remote IRC user, with inadvertent local cooperation, to overwrite local files.
Alerts:
Debian DSA-1848-1 znc 2009-08-02
Fedora FEDORA-2009-7952 znc 2009-07-23
Fedora FEDORA-2009-7937 znc 2009-07-23

Comments (none posted)

Page editor: Jake Edge
Next page: Kernel development>>


Copyright © 2009, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds