SuSE Essential and Critical Security Patch Updates - Page 810
Find the information you need for your favorite open source distribution .
Find the information you need for your favorite open source distribution .
Remote attackers can insert certain characters in CGI queries to the susehelp system tricking it into executing arbitrary code as the "wwwrun" user.
Due to wrong calculation of some loop offset values a buffer overflow can occur.
Within the MySQL server the password checking and a signedness issue has been fixed.
There are several security issues with CUPS that can lead to local and remote root compromise.
Stefan Esser of e-matters reported a bug in fetchmail's mail address expanding code which can lead to remote system compromise.
The cyrus imapd contains a buffer overflow which could be exploited by remote attackers prior to logging in.
Multiple buffer overflow vulnerabilities exist in OpenLDAP2.
While parsing and escaping characters of eMail addresses pine does not allocate enough memory for storing the escaped mailbox part of an address.
There was a bug in the length checking for encrypted password change requests from clients.
The security research company ISS (Internet Security Services) has discovered several vulnerabilities in the BIND8 name server, including a remotely exploitable buffer overflow.
Traceroute-nanog requires root privilege to open a raw socket. It does not relinquish these privileges after doing so. This allows a malicious user to gain root access by exploiting a buffer overflow at a later point.
It is possible for a local attacker to exploit a buffer overflow condition in resLISa, a restricted version of KLISa.
This package contains a security hole which allows remote attackers to execute arbitrary commands in certain circumstances.
There is a vulnerability where local attackers can pass certain commandline arguments to lpr running as root, fooling it to execute arbitrary commands as root.
Syslog-ng contained buffer overflows in its macro expansion routines.
The PostgreSQL Object-Relational DBMS was found vulnerable to several security related buffer overflow problems.
A remote attacker could send a speciallycrafted TCP packet that overflows a buffer, leaving heartbeat to execute arbitrary code as root.
Multiple vulnerabilities including improper behavior and XSS exploits have been fixed.
The logging function of faxgetty prior version 4.1.3 was vulnerable to a format string bug when handling the TSI value of a received facsimile.
While doing so several possible buffer overflows and other bugs have been uncovered and fixed.