Ubuntu Essential and Critical Security Patch Updates - Page 369
Find the information you need for your favorite open source distribution .
Find the information you need for your favorite open source distribution .
It was discovered that OpenLDAP did not correctly handle SSL certificates with zero bytes in the Common Name. A remote attacker could exploit this to perform a man in the middle attack to view sensitive information or alter encrypted communications. [More...]
USN-853-1 fixed vulnerabilities in Firefox and Xulrunner. The upstream changes introduced regressions that could lead to crashes when processing certain malformed GIF images, fonts and web pages. This update fixes the problem. [More...]
It was discovered that QtWebKit did not properly handle certain SVGPathList data structures. If a user were tricked into viewing a malicious website, an attacker could exploit this to execute arbitrary code with the privileges of the user invoking the program. (CVE-2009-0945) [More...]
Aaron Sigel discovered that the CUPS web interface incorrectly protected against cross-site scripting (XSS) and cross-site request forgery (CSRF) attacks. If an authenticated user were tricked into visiting a malicious website while logged into CUPS, a remote attacker could modify the CUPS configuration and possibly steal confidential data. [More...]
Mark Martinec discovered that HTML::Parser incorrectly handled strings with incomplete entities. An attacker could send specially crafted input to applications that use HTML::Parser and cause a denial of service. [More...]
Tomas Hoger discovered that the GD library did not properly handle the number of colors in certain malformed GD images. If a user or automated system were tricked into processing a specially crafted GD image, an attacker could cause a denial of service or possibly execute arbitrary code. (CVE-2009-3546) [More...]
USN-850-1 fixed vulnerabilities in poppler. This update provides the corresponding updates for Ubuntu 9.10.
Alin Rad Pop discovered a heap-based buffer overflow in Firefox when itconverted strings to floating point numbers. If a user were tricked intoviewing a malicious website, a remote attacker could cause a denial of serviceor possibly execute arbitrary code with the privileges of the user invoking theprogram. (CVE-2009-1563) [More...]
USN-850-1 fixed vulnerabilities in poppler. The security fix for CVE-2009-3605 introduced a regression that would cause certain applications, such as Okular, to segfault when opening certain PDF files. [More...]
Solar Designer discovered that the z90crypt driver did not correctly check capabilities. A local attacker could exploit this to shut down the device, leading to a denial of service. Only affected Ubuntu 6.06. (CVE-2009-1883) [More...]
Teemu Salmela discovered that Elinks did not properly validate input whenprocessing smb:// URLs. If a user were tricked into viewing a maliciouswebsite and had smbclient installed, a remote attacker could executearbitrary code with the privileges of the user invoking the program.(CVE-2006-5925) [More...]
It was discovered that poppler contained multiple security issues when parsing malformed PDF documents. If a user or automated system were tricked into opening a crafted PDF file, an attacker could cause a denial of service or execute arbitrary code with privileges of the user invoking the program. [More...]
Tobias Klein discovered a heap-based buffer overflow in libsndfile. If auser or automated system processed a crafted VOC file, an attacker couldcause a denial of service via application crash, or possibly executearbitrary code with the privileges of the user invoking the program.(CVE-2009-1788) [More...]
It was discovered that the Zope Object Database (ZODB) database server (ZEO) improperly filtered certain commands when a database is shared among multiple applications or application instances. A remote attacker could send malicious commands to the server and execute arbitrary code. (CVE-2009-0668) [More...]
USN-847-1 fixed vulnerabilities in devscripts. This update provides thecorresponding updates for Ubuntu 6.06 LTS.
Raphael Geissert discovered that uscan, a part of devscripts, did notproperly sanitize its input when processing pathnames. If uscan processed acrafted filename for a file on a remote server, an attacker could executearbitrary code with the privileges of the user invoking the program. [More...]
It was discovered that ICU did not properly handle invalid byte sequencesduring Unicode conversion. If an application using ICU processed crafteddata, content security mechanisms could be bypassed, potentially leading tocross-site scripting (XSS) attacks. [More...]
Pavel Polischouk discovered that Pan incorrectly handled certain data structures. If a user were tricked into viewing malicious nntp data, a remote attacker could cause a denial of service or possibly execute arbitrary code with the privileges of the user invoking the program. [More...]
Chris Evans discovered that mimeTeX incorrectly handled certain long tags. An attacker could exploit this with a crafted mimeTeX expression and cause a denial of service or possibly execute arbitrary code. (CVE-2009-1382) [More...]
It was discovered that BackupPC did not restrict normal users from setting the ClientNameAlias parameter. An authenticated user could exploit this to gain access to unauthorized hosts. This update fixed the issue by preventing normal users from modifying the ClientNameAlias configuration parameter. [More...]