SuSE: Weekly Summary 2009:003
Summary
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
______________________________________________________________________________
SUSE Security Summary Report
Announcement ID: SUSE-SR:2009:003
Date: Mon, 02 Feb 2009 16:30:00 +0000
Cross-References: CVE-2008-1149, CVE-2008-1567, CVE-2008-1924
CVE-2008-2383, CVE-2008-2960, CVE-2008-3197
CVE-2008-4096, CVE-2008-4309, CVE-2008-4326
CVE-2008-5081, CVE-2008-5432, CVE-2008-5621
CVE-2008-5622, CVE-2008-5824, CVE-2008-5902
CVE-2008-5903, CVE-2008-5904, CVE-2008-5907
CVE-2009-0125, CVE-2009-0126, CVE-2009-0135
CVE-2009-0136
Content of this advisory:
1) Solved Security Vulnerabilities:
- boinc-client
- xrdp
- phpMyAdmin
- libnasl
- moodle
- xrdp
- net-snmp
- audiofile
- XFree86/xterm
- amarok
- libpng
- sudo
- avahi
2) Pending Vulnerabilities, Solutions, and Work-Arounds:
none
3) Authenticity Verification and Additional Information
______________________________________________________________________________
1) Solved Security Vulnerabilities
To avoid flooding mailing lists with SUSE Security Announcements for minor
issues, SUSE Security releases weekly summary reports for the low profile
vulnerability fixes. The SUSE Security Summary Reports do not list or
download URLs like the SUSE Security Announcements that are released for
more severe vulnerabilities.
Fixed packages for the following incidents are already available on our FTP
server and via the YaST Online Update.
- boinc-client
The boinc-client was missing return value checks for openssl function
calls. (CVE-2009-0126)
Affected products: openSUSE 11.1
- xrdp
This update fixes multiple buffer overflows that can be exploited
remotely to execute arbitrary code. (CVE-2008-5902, CVE-2008-5903,
CVE-2008-5904)
Additionally xrdp does not register remote session as local anymore.
Affected products: openSUSE 11.1
- phpMyAdmin
A version upgrade to phpMyAdmin 2.11.9.4 to fix various security
bugs. (CVE-2008-2960, CVE-2008-3197, CVE-2008-1149, CVE-2008-1567,
CVE-2008-1924, CVE-2008-4096, CVE-2008-4326, CVE-2008-5621, CVE-2008-5622)
Affected products: openSUSE 10.3-11.0
- libnasl
This update of libnasl adds missing return value checks for openssl
function calls. (CVE-2009-0125)
Affected products: openSUSE 10.3-11.0
- moodle
Insufficient quoting of wiki page titles allowed attackers to
conduct cross site scripting (XSS) attacks. (CVE-2008-5432)
Affected products: openSUSE 10.3-11.0
- net-snmp
Remote attackers could crash net-snmp via GETBULK-Request
(CVE-2008-4309).
In addition the following non-security issues have been fixed:
- typo in error message
- make OIDs longer than 256 chars work
- typo in the snmpd init script to really load all agents
- logrotate config to restart the snmptrapd as well
Affected products: SLES9, NLD9, SLES10, SLED 10
- audiofile
A heap-overflow in libaudiofile was fixed. The overflow existsed
in the WAV processing code and can be exploited to execute arbi-
trary code. (CVE-2008-5824)
Affected products: openSUSE 10.3-11.1, OES, SLES9, NLD9, SLES 10,
SLED10
- XFree86/xterm
XTerm evaluated various ANSI Escape sequences so that command
execution was possible if an attacker could pipe raw data to an
xterm. (CVE-2008-2383)
(It is usually not recommended to display raw data on an xterm.)
Support for Matrox G200EV/G200WB cards was added.
Affected products: OES, SLES9, NLD9
- amarok
This update of amarok fixes several integer overflows and unchecked
memory allocations that can be exploited by malformed Audible digital
audio files. These bugs could be used in a user-assisted attack sce-
nario to execute arbitrary code remotely. (CVE-2009-0135, CVE-2009-
0136)
Affected products: openSUSE 10.3-11.1, SLES10, SLED10
- libpng
This update of libpng fixes the function png_check_keyword() that
allowed setting arbitrary bytes in the process memory to 0.
(CVE-2008-5907)
Affected products: openSUSE 10.3-11.1, OES, SLES9, NLD9, SLES 10,
SLED10
- sudo
This update of sudo fixes a bug that allowed - depending on the
sudoers rules - a sudo-user to execute arbitrary shell commands as
root. (CVE-2009-0034)
Affected products: openSUSE 10.3-11.1
- avahi
Specially crafted mDNS packets could crash the Avahi daemon
(CVE-2008-5081).
Affected products: openSUSE 10.3-11.1, SLED10
______________________________________________________________________________
2) Pending Vulnerabilities, Solutions, and Work-Arounds
none
______________________________________________________________________________
3) Authenticity Verification and Additional Information
- Announcement authenticity verification:
SUSE security announcements are published via mailing lists and on Web
sites. The authenticity and integrity of a SUSE security announcement is
guaranteed by a cryptographic signature in each announcement. All SUSE
security announcements are published with a valid signature.
To verify the signature of the announcement, save it as text into a file
and run the command
gpg --verify
References