Debian Essential And Critical Security Patch Updates - Page 294
Find the information you need for your favorite open source distribution .
Find the information you need for your favorite open source distribution .
GOBBLES found a buffer overflow in gzip that occurs when compressingfiles with really long filenames. Even though GOBBLES claims to havedeveloped an exploit to take advantage of this bug, it has been saidby others that this problem is not likely to be exploitable as othersecurity incidents.
libgtop_daemon runs as user nobody both bugs could be usedto gain access as the nobody user to a system running libgtop_daemon.
The sparc binary for the mutt security fix described in DSA-096-1is now available.
The bug's effect is that, instead of obeying the correctpipe command, a broken Exim runs the command encoded in the local partof the address.
Joost Pol found a buffer overflow in the address handling code ofmutt (a popular mail user agent). Even though this is a one byteoverflow this is exploitable.
Among other problems, the gpm-root program contains a format stringvulnerability, which allows an attacker to gain root privileges.
Barry A. Warsaw reported several cross-site scripting security holesin Mailman, due to non-existent escaping of CGI variables.
Wietse Venema reported he found a denial of service vulnerability inpostfix. The SMTP session log that postfix keeps for debugging purposescould grow to an unreasonable size.
Nicolas Boullis found a nasty security problem in the wmtv (adockable video4linux tv player for windowmaker) package asdistributed in Debian GNU/Linux 2.2.
If the UseLogin feature is enabled in for ssh local users couldpass environment variables (including variables like LD_PRELOAD)to the login process.
The xtel (a X emulator for minitel) package as distributed with DebianGNU/Linux 2.2 has two possible symlink attacks.
The icecast-server (a streaming music server) package as distributedin Debian GNU/Linux 2.2 has several security problems including a remote root vulnerability.
The fml (a mailing list package) as distributed in Debian GNU/Linux 2.2suffers from a cross-site scripting problem.
CORE ST reports that an exploit has been found for a bug in the wu-ftpdglob code (this is the code that handles filename wildcard expansion).Any logged in user (including anonymous ftp users) can exploit the bugto gain root privilege on the server.
We have received reports that the "SSH CRC-32 compensation attackdetector vulnerability" is being actively exploited. This is the sameinteger type error previously corrected for OpenSSH in DSA-027-1.OpenSSH (the Debian ssh package) was fixed at that time, butssh-nonfree and ssh-socks were not.
When a filename is saved, it ought to get displayed on the screen.The routine handling this didn't escape format strings.
Version 2.0.6a of gftp displays thepassword in plain text on the screen within the log window when it islogging into an ftp server.
Using older versions of procmail it was possible to make procmail crash by sending it signals. On systems where procmail is installed setuid this could be exploited to obtain unauthorized privileges.
In SNS Advisory No. 32 a buffer overflow vulnerability has been reported in the routine which parses MIME headers that are returned from web servers. A malicious web server administrator could exploit this and let the client web browser execute arbitrary code.
Christophe Bailleux reported on bugtraq that Xvt is vulnerable to a buffer overflow in its argument handling.