Debian Essential And Critical Security Patch Updates - Page 274
Find the information you need for your favorite open source distribution .
Find the information you need for your favorite open source distribution .
Remote user-owned setuid programs can be accessed via "smbmnt" and used to gain local root privileges.
Overflow allows users with any specific superuser privileges in /etc/calife.auth to gain general superuser privileges.
A local user can exploit this problem and execute arbitrary commands under the GID utmp.
Crafted symlinks can be used to make systat write to/read from arbitrary files.
A crafted IPv6 address can overwrite memory in the stack.
These vulnerabilities allow a malicious user to bypass directory access restrictions and execute arbitrary code.
This is the Kernel 2.2.19 backported version of the mremap fix that prevents a local root exploit.
When fetching a remote resource via FTP or HTTP, the library uses special parsing routines which can overflow a buffer if passed a very long URL.
This is the alpha-chip version of the kernel 2.2.x patch Debian released yesterday.
It turned out that a second (sort of) vulnerability is indeed exploitable in 2.2.x, but not in 2.4.x, with a different exploit.
Fixes a bug which allows a malformed query string to crash the corresponding Apache child process.
can be exploited by a local attacker to gain gid "games".
Several local root exploits have been discovered recently in the Linux 2.4.x kernel.
An attacker could create a carefully-crafted mail message which will execute arbitrary code as the victim when it is opened and parsed through metamail.
This library is most notably used in several applications implementing theH.323 teleconferencing protocol, including the OpenH323 suite, gnomemeeting and asterisk.
An attacker, able to create files on a remote server, could potentially execute arbitrary code with the privileges of the user invoking hsftp.
This type of vulnerability can usually be easily exploited to execute arbitary code with root privileges by various means.
Patch for cross-site scripting and denial of service vulnerabilities.
This bug could be exploited by a local attacker to gain the privileges of group "games".
This patch is for the ia64 architecture.