Debian Essential And Critical Security Patch Updates - Page 294

Find the information you need for your favorite open source distribution .

Debian: 'gzip' Potential buffer overflow

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

GOBBLES found a buffer overflow in gzip that occurs when compressingfiles with really long filenames. Even though GOBBLES claims to havedeveloped an exploit to take advantage of this bug, it has been saidby others that this problem is not likely to be exploitable as othersecurity incidents.

Debian: 'wu-ftpd' remote root exploit

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

CORE ST reports that an exploit has been found for a bug in the wu-ftpdglob code (this is the code that handles filename wildcard expansion).Any logged in user (including anonymous ftp users) can exploit the bugto gain root privilege on the server.

Debian: 'w3m' buffer overflow

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

In SNS Advisory No. 32 a buffer overflow vulnerability has been reported in the routine which parses MIME headers that are returned from web servers. A malicious web server administrator could exploit this and let the client web browser execute arbitrary code.