Debian Essential And Critical Security Patch Updates - Page 300
Find the information you need for your favorite open source distribution .
Find the information you need for your favorite open source distribution .
The version of BIND shipped with Debian GNU/Linux 2.2 is vulnerable toa remote denial of service attack
Proton reported on bugtraq that tcsh did not handle in-here documentscorrectly. The version of tcsh that is distributed with Debian GNU/Linux2.2r0 also suffered from this problem.
The version of gnupg that was distributed in Debian GNU/Linux 2.2 hada logic error in the code that checks for valid signatures which couldcause false positive results:
The version of nis as distributed in Debian GNU/Linux 2.1 and 2.2 contains an ypbind package with a security problem.
In versions of the PHP 4 packages before version 4.0.3, several format string bugs could allow properly crafted requests to execute code.
In versions of the PHP 3 packages before version 3.0.17, several formatstring bugs could allow properly crafted requests to execute code as theuser running PHP scripts on the web server, particularly if error loggingwas enabled.
The version of curl as distributed with Debian GNU/Linux 2.2 had a bug in the error logging code.
In versions of boa before 0.94.8.3, it is possible to access files outside of the server's document root by the use of properly constructed URL requests.
Debian is phasing out support for Debian 2.1 (slink) and are looking for feedback.
libpam-smb contains a buffer overflow that can be used to execute arbitrary commands with root privilege.
Several vulnerabilities exist with xpdf that could allow the creation of unsafe termporary files and the running of arbitrary shell commands.
A vulnerability exists that could allow a user to run arbitrary commands on the server.
Recently two problems have been found in the glibc suite, which could beused to trick setuid applications to run arbitrary code.
A format string bug was recently discovered in screen which can be used to gain elevated privilages if screen is setuid.
Recently two problems have been found in the glibc suite, which could beused to trick setuid applications to run arbitrary code.
An updated netscape package now exists to fix several remote exploit vulnerabilities.
The version of X-Chat that was distributed with Debian GNU/Linux 2.2 has a vulnerability in the URL handling code.
Ntop was still exploitable using bufferoverflows. Using this technique it was possible to run arbitrary codeas the user who ran ntop in web mode.