Debian Essential And Critical Security Patch Updates - Page 276

Find the information you need for your favorite open source distribution .

Debian: nd Buffer overflow vulnerability

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Multiple vulnerabilities were discovered in nd, a command-line WebDAVinterface, whereby long strings received from the remote server couldoverflow fixed-length buffers. This vulnerability could be exploitedby a remote attacker in control of a malicious WebDAV server toexecute arbitrary code if the server was accessed by a vulnerableversion of nd.

Debian: libnids Buffer overflow vulnerability

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

A vulnerability was discovered in libnids, a library used to analyzeIP network traffic, whereby a carefully crafted TCP datagram couldcause memory corruption and potentially execute arbitrary code withthe privileges of the user executing a program which uses libnids(such as dsniff).

Debian: BIND Cache poisoning vulnerability

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

A vulnerability was discovered in BIND, a domain name server, wherebya malicious name server could return authoritative negative responseswith a large TTL (time-to-live) value, thereby rendering a domain nameunreachable. A successful attack would require that a vulnerable BINDinstance submit a query to a malicious nameserver.