SuSE Essential and Critical Security Patch Updates - Page 808
Find the information you need for your favorite open source distribution .
Find the information you need for your favorite open source distribution .
A remotely exploitable buffer overflow within the authentication code of MySQL has been reported.
There are buffer overflow vulnerabilities that allow attackers to execute arbitrary code as root on un-patched systems.
A remotely exploitable buffer overflow has been found in all versions of sendmail that come with SuSE products. These versions include sendmail-8.11 and sendmail-8.12 releases.
A programming error has been found in code responsible for buffer management.
A programming error has been found in code responsible for buffer management. If exploited by a (remote) attacker, the error may lead to unauthorized access to the system, allowing the execution of arbitrary commands.
The well known and widely used mail client pine is vulnerable to a buffer overflow. The vulnerability exists in the code processing 'message/external-body' type messages.
Dave Airlie informed us about a bug in the authentication code of pam_smb that allows a remote attacker to gain access to a system using pam_smb by issuing a too long password string.
When sendmail receives an invalid DNS response it tries to call free on random data which results in a process crash.
Michal Zalewski has reported problems in postfix which can lead to a remote DoS attack or allow attackers to bounce-scan private networks.
There is a single byte buffer overflow in the WU ftp daemon (wuftpd), a widely used ftp server for Linux-like systems.
There is an off-by-one bug in the xlog() function used by the rpc.mountd. It is possible for remote attackers to use this off-by-one overflow to execute arbitrary code as root.
radiusd-cistron contains a bug allowing a buffer overflow when a long NAS-Port attribute is received.
The PPTP daemon contains a remotely exploitable buffer overflow which was introduced due to a integer overflow in the third argument passed to the read() library call. This bug has been fixed.
The CUPS daemon will stop serving clients if the second carriage return in a request is not sent to complete the header.
The KDE team discoverd a vulnerability in the way KDE uses Ghostscript software for processing of PostScript (PS) and PDF files.
There is a buffer overflow in the samba file server, the widely spread implementation of the SMB protocol.
Researchers have discovered certain weaknesses in OpenSSL's RSA decryption algorithm.
The nature of the flaw is a stack overflow in a function that is called frequently throughout the sendmail source code.