SuSE: Weekly Summary 2010:005
Summary
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
______________________________________________________________________________
SUSE Security Summary Report
Announcement ID: SUSE-SR:2010:005
Date: Tue, 23 Feb 2010 14:00:00 +0000
Cross-References: CVE-2008-5624, CVE-2008-5625, CVE-2008-5814
CVE-2008-7248, CVE-2009-2625, CVE-2009-2626
CVE-2009-2687, CVE-2009-3546, CVE-2009-3560
CVE-2009-3602, CVE-2009-4017, CVE-2009-4142
CVE-2009-4214, CVE-2010-0283, CVE-2010-0562
Content of this advisory:
1) Solved Security Vulnerabilities:
- fetchmail
- krb5
- rubygem-actionpack-2_1
- libexpat0
- unbound
- apache2-mod_php5/php5
2) Pending Vulnerabilities, Solutions, and Work-Arounds:
none
3) Authenticity Verification and Additional Information
______________________________________________________________________________
1) Solved Security Vulnerabilities
To avoid flooding mailing lists with SUSE Security Announcements for minor
issues, SUSE Security releases weekly summary reports for the low profile
vulnerability fixes. The SUSE Security Summary Reports do not list or
download URLs like the SUSE Security Announcements that are released for
more severe vulnerabilities.
Fixed packages for the following incidents are already available on our FTP
server and via the YaST Online Update.
- fetchmail
This update fixes a heap-based overflow in fetchmail's sdump() function.
It can be exploited while displaying detailed X.509 certification in-
formation to cause a crash or to probably execute arbitrary code too.
(CVE-2010-0562: CVSS v2 Base Score: 4.0)
Affected products: openSUSE 11.2
- krb5
Invalid requests by unauthenticated attackers could crash the kerberos
server. (CVE-2010-0283: CVSS v2 Base Score: 7.8)
Affected products: openSUSE 11.2
- rubygem-actionpack-2_1
This update of rubygems fixes two vulnerabilities:
- CVE-2008-7248: CVSS v2 Base Score: 4.3
Rails CSRF protection can be bypassed by using special content-types
for a HTTP request.
- CVE-2009-4214: CVSS v2 Base Score: 4.3
The method strip_tags does not completely protect agains XSS attacks.
Affected products: SLE11
- libexpat0
Specially crafted XML files could crash applications that use expat to
parse such files.
(CVE-2009-2625: CVSS v2 Base Score: 5.0, CVE-2009-3560: CVSS v2 Base
Score: 5.0)
Affected products: openSUSE 11.0-11.2
- unbound
Unbound did not check signatures on NSEC3 records which allowed
attackers who could spoof DNS responses to bypass DNSSEC.
(CVE-2009-3602: CVSS v2 Base Score: 7.5)
Affected products: openSUSE 11.1-11.2
- apache2-mod_php5/php5
This update of php5 fixes:
CVE-2008-5624: CVSS v2 Base Score: 7.5: bypass safe_mode
CVE-2008-5625: CVSS v2 Base Score: 7.5: bypass safe_mode
CVE-2008-5814: CVSS v2 Base Score: 2.6: Cross-Site Scripting
CVE-2009-2626: CVSS v2 Base Score: 6.4: Information Leak
CVE-2009-2687: CVSS v2 Base Score: 4.3: Input Validation
CVE-2009-3546: CVSS v2 Base Score: 4.4: Buffer Overflow in gd
CVE-2009-4017: CVSS v2 Base Score: 5.0: Denial of Service
CVE-2009-4142: CVSS v2 Base Score: 4.3: Cross-Site Scripting
Affected products: openSUSE 11.0-11.2, SLE10-11
______________________________________________________________________________
2) Pending Vulnerabilities, Solutions, and Work-Arounds
none
______________________________________________________________________________
3) Authenticity Verification and Additional Information
- Announcement authenticity verification:
SUSE security announcements are published via mailing lists and on Web
sites. The authenticity and integrity of a SUSE security announcement is
guaranteed by a cryptographic signature in each announcement. All SUSE
security announcements are published with a valid signature.
To verify the signature of the announcement, save it as text into a file
and run the command
gpg --verify
References