SuSE: Weekly Summary 2009:020
Summary
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
______________________________________________________________________________
SUSE Security Summary Report
Announcement ID: SUSE-SR:2009:020
Date: Tue, 12 Jan 2010 10:00:00 +0000
Cross-References: CVE-2008-4360, CVE-2008-5519, CVE-2009-0668
CVE-2009-0669, CVE-2009-0689, CVE-2009-0791
CVE-2009-2560, CVE-2009-2820, CVE-2009-3025
CVE-2009-3026, CVE-2009-3050, CVE-2009-3083
CVE-2009-3084, CVE-2009-3085, CVE-2009-3549
CVE-2009-3550, CVE-2009-3551, CVE-2009-3553
CVE-2009-3560, CVE-2009-3563, CVE-2009-3607
CVE-2009-3608, CVE-2009-3615, CVE-2009-3627
CVE-2009-3720, CVE-2009-3829, CVE-2009-3938
CVE-2009-3979, CVE-2009-3981, CVE-2009-3983
CVE-2009-3984, CVE-2009-3985, CVE-2009-3986
CVE-2009-3987, CVE-2009-4032, CVE-2009-4035
CVE-2009-4112, MFSA 2009-65, MFSA 2009-68
MFSA 2009-69, MFSA 2009-70, MFSA 2009-71
Content of this advisory:
1) Solved Security Vulnerabilities:
- apache2-mod_jk
- cacti
- cups
- expat
- finch/pidgin
- htmldoc
- kdelibs3/kdelibs4
- libpoppler/poppler
- lighttpd
- opera
- perl-HTML-Parser
- pyxml
- seamonkey
- wireshark/ethereal
- xntp
- zope/zope3
2) Pending Vulnerabilities, Solutions, and Work-Arounds:
none
3) Authenticity Verification and Additional Information
______________________________________________________________________________
1) Solved Security Vulnerabilities
To avoid flooding mailing lists with SUSE Security Announcements for minor
issues, SUSE Security releases weekly summary reports for the low profile
vulnerability fixes. The SUSE Security Summary Reports do not list or
download URLs like the SUSE Security Announcements that are released for
more severe vulnerabilities.
Fixed packages for the following incidents are already available on our FTP
server and via the YaST Online Update.
- apache2-mod_jk
Certain HTTP request could confuse the JK connector in Apache Tomcat
which could result in a user seeing responses destined for other users (CVE-2008-5519).
Affected products: SLE11
- cacti
The package cacti was updated to fix four cross-site-scripting
vulnerabilities (CVE-2009-4032: CVSS v2 Base Score: 4.9) and one
privilege escalation bug (CVE-2009-4112).
Affected products: openSUSE 11.0
- cups
The cups web interface was prone to Cross-Site Scripting (XSS)
problems (CVE-2009-2820).
A use-after-free problem in cupsd allowed remote attackers to crash
the cups server (CVE-2009-3553).
Affected products: SLES9, SLE10-SP2, SLE10-SP3, OES, NLD,
openSUSE 11.0-11.2
- expat
Specially crafted XML documents could make expat run into an enless loop,
therefore locking up applications using expat
(CVE-2009-3720: CVSS v2 Base Score: 5.0).
Affected products: SLES9, NLD, OES, SLE10-SP2, SLE10-SP3, SLE11,
openSUSE 11.0-11.2
Note: This update may cause regressions in the XML parser which will be
solved by following update packages.
- finch/pidgin
This update of pidgin fixes the following issues:
- CVE-2009-3026: CVSS v2 Base Score: 5.0
Allowed to send confidential data unencrypted even if SSL was chosen by
user.
- CVE-2009-3025: CVSS v2 Base Score: 4.3
Remote denial of service in yahoo IM plug-in.
- CVE-2009-3083: CVSS v2 Base Score: 5.0
Remote denial of service in MSN plug-in.
- CVE-2009-3084: CVSS v2 Base Score: 5.0
Remote denial of service in MSN plug-in.
- CVE-2009-3085: CVSS v2 Base Score: 5.0
Remote denial of service in XMPP plug-in.
- CVE-2009-3615: CVSS v2 Base Score: 5.0
Remote denial of service in ICQ plug-in.
Affected products: SLE10-SP2, SLE10-SP3, SLE11, openSUSE 11.0-11.2
- htmldoc
Specially crafted files could cause a buffer overflow in htmldoc
(CVE-2009-3050).
Affected products: SLES9, SLE10-SP2, SLE10-SP3, SLE11, openSUSE 11.0-11.2
- kdelibs3/kdelibs4
KDE KDELibs Remote Array Overrun (Arbitrary code execution),
CVE-2009-0689
Affected products: SLES9, NLD, OES, SLE10-SP2, SLE10-SP3, SLE11,
openSUSE 11.0-11.2
- libpoppler/poppler
This update of poppler fixes several security issues:
- CVE-2009-0791: Fix multiple integer overflows in "pdftops" filter that
could be used by attackers to execute code.
- CVE-2009-3607: Integer overflow in the
create_surface_from_thumbnail_data
function in glib/poppler-page.cc in Poppler 0.x allows remote attackers to cause a denial of service (memory corruption) or possibly execute
arbitrary code via a crafted PDF document that triggers a heap-based
buffer overflow. NOTE: some of these details are obtained from third
party information.
- CVE-2009-3608: Integer overflow in the ObjectStream::ObjectStream
function in XRef.cc in Xpdf 3.x before 3.02pl4 and Poppler before
0.12.1, as used in GPdf, kdegraphics KPDF, CUPS pdftops, and teTeX,
might allow remote attackers to execute arbitrary code via a crafted
PDF document that triggers a heap-based buffer overflow.
- CVE-2009-3938: Buffer overflow in the ABWOutputDev::endWord function
in poppler/ABWOutputDev.cc in Poppler (aka libpoppler) 0.10.6, 0.12.0,
and possibly other versions, as used by the Abiword pdftoabw utility,
allows user-assisted remote attackers to cause a denial of service and
possibly execute arbitrary code via a crafted PDF file.
- CVE-2009-4035: A indexing error in FoFiType1::parse() was fixed that
could be used by attackers to corrupt memory and potentially execute
code.
Affected products: SLE10-SP3, SLE11, openSUSE 11.0-11.2
- lighttpd
This update fixes a regression caused by the last security update for
CVE-2008-4360.
Affected products: SLE11, openSUSE 11.0-11.1
- opera
Opera was upgraded to version 10.10 to fix the following security bugs:
- CVE-2009-0689: CVSS v2 Base Score: 6.8
A heap buffer overflow in string to number conversion.
- Error messages could leak information.
- Another, yet unspecified, vulnerability reported by Chris Evans.
Affected products: openSUSE 11.0-11.2
- perl-HTML-Parser
Specially crafted HTML documents could cause perl-HTML-Parser to run into
an endless loop (CVE-2009-3627).
Affected products: SLE10-SP2, SLE10-SP3, SLE11, openSUSE 11.0-11.1
- pyxml
Specially crafted XML documents could make pyxml run into an enless loop,
therefore locking up applications using pyxml (CVE-2009-3720,
CVE-2009-3560).
Affected products: SLE10-SP2, SLE10-SP3, SLE11, openSUSE 11.0-11.2
- seamonkey
The Mozilla Seamonkey browser suite was updated to version 2.0.1, fixing
lots of bugs and various security issues.
The following issues were fixed:
- MFSA 2009-65/CVE-2009-3979/CVE-2009-3981
Crashes with evidence of memory corruption (1.9.0.16)
- MFSA 2009-68/CVE-2009-3983 (bmo#487872)
NTLM reflection vulnerability
- MFSA 2009-69/CVE-2009-3984/CVE-2009-3985 (bmo#521461,bmo#514232)
Location bar spoofing vulnerabilities
- MFSA 2009-70/CVE-2009-3986 (bmo#522430)
Privilege escalation via chrome window.opener
- MFSA 2009-71/CVE-2009-3987: COM object enumeration only affects Windows
operating systems.
Affected products: openSUSE 11.2
- wireshark/ethereal
Version upgrade of wireshark fix multiple vulnerabilities:
- CVE-2009-3549: CVSS v2 Base Score: 5.0 (MEDIUM)
The Paltalk dissector could crash on alignment-sensitive processors.
- CVE-2009-3550: CVSS v2 Base Score: 4.3 (MEDIUM)
The DCERPC/NT dissector could crash.
- CVE-2009-3551: CVSS v2 Base Score: 5.0 (MEDIUM)
The SMB dissector could crash.
- CVE-2009-2560: CVSS v2 Base Score: 5.0 (MEDIUM)
The RADIUS dissector could crash.
- CVE-2009-3829 CVSS v2 Base Score: 9.3 (HIGH)
Fix for an integer overflow in wiretap/erf.c that allowed remote
attackers to execute arbitrary code via a crafted ERF file. This does
not affect SLE products (wireshark only).
Affected products: SLES9, OES, SLE10-SP2, SLE10-SP3, SLE11,
openSUSE 11.0-11.2
- xntp
By sending specially crafted NTP packets attackers could make ntpd flood
it's log file with error messages or even run into an endless loop
(CVE-2009-3563).
Affected products: SLES9, NLD, OES, SLE10-SP3
- zope/zope3
Zope's implementation of the ZEO network protocol allowed authentication
bypass (CVE-2009-0669) as well as executing arbitrary python code
remotely (CVE-2009-0668).
Affected products: SLES9, SLE10-SP2, SLE10-SP3
______________________________________________________________________________
2) Pending Vulnerabilities, Solutions, and Work-Arounds
none
______________________________________________________________________________
3) Authenticity Verification and Additional Information
- Announcement authenticity verification:
SUSE security announcements are published via mailing lists and on Web
sites. The authenticity and integrity of a SUSE security announcement is
guaranteed by a cryptographic signature in each announcement. All SUSE
security announcements are published with a valid signature.
To verify the signature of the announcement, save it as text into a file
and run the command
gpg --verify
References