Debian Essential And Critical Security Patch Updates - Page 270
Find the information you need for your favorite open source distribution .
Find the information you need for your favorite open source distribution .
This security advisory corrects DSA 458-1 which caused somesegmentation faults in gethostbyaddr with non-localhost input. Thisupdate also disables IPv6 on all architectures.
Several vulnerabilities were discovered in recent versions of Qt, acommonly used graphic widget set.
Markus Wörle discovered a cross site scripting problem in status-display (list.cgi) of the icecast internal webserver.
Jeroen van Wolffelaar discovered an insecure temporary file vulnerability in the mysqlhotcopy script when using the scp method which is part of the mysql-server package.
This can be abused by a local attacker to create or truncate arbitrary files or to prevent KDE applications from functioning correctly.
This can lead an attacker who has also shell access to the webserver to take over a session.
The rsync developers have discoverd a security related problem in rsync which offers an attacker to access files outside of the defined directory.
This patch addresses a large number of vulnerabilities in libpng.
This patch addresses multiple Cross Site Scripting and SQL Injection vulnerabilities.
This patch fixes a buffer overflow and a format string vulnerability in libapache-mod-ssl, both of which allow execution of arbitrary code.
An attacker could cause web script to be executed within the security context of the sqwebmail application.
A directory traversal vulnerability was discovered in mailreader whereby remote attackers could view arbitrary files with the privileges of the nph-mr.cgi process (by default, www-data)
This patch resolves a buffer overflow and a format string vulnerability, either of which can lead to an arbitrary code execution.
A flaw in Mailman 2.1.* allows a remote attacker to retrieve the mailman password of any subscriber by sending a carefully crafted email request to the mailman server.
Patch fixes both a vulnerability to XSS (Cross Site Scripting) and execution of arbitrary local code.
By exploting this, a remote attacker could potentially cause arbitrary code to be executed by transmitting a specially crafted packet.
Vulnerability in netkit-telnet-ssl could potentially allow a remote attacker to cause the execution of arbitrary code with the privileges of the telnet daemon.
Several denial of service vulnerabilities were discovered in ethereal, one of which could be exploited by a remote attacker to crash ethereal with aninvalid SNMP packet.
An oversized HTTP 305 response sent by a malicious server could cause arbitrary code to be executed with the privileges of the pavuk process.
This patch addresses an ACL bypass and the ability to use brute force to get IDs and passwords.