Bug#347894: php5: Two security problems in PHP5

2006-01-13 Thread Moritz Muehlenhoff
Package: php5 Severity: grave Tags: security Justification: user security hole Two security problems have been found in PHP5. For details please see http://www.hardened-php.net/advisory_012006.112.html http://www.hardened-php.net/advisory_022006.113.html PHP 4 is not affected, so this only affec

Bug#347416: libapache-auth-ldap: Multiple Format Strings Vulnerability

2006-01-15 Thread Moritz Muehlenhoff
Ola Westin wrote: > Package: libapache-auth-ldap > Version: 1.6.0-8 > Severity: grave > Tags: security > Justification: user security hole > > > auth_ldap version 1.6.0 contains a remote security vulnerability. > See http://www.digitalarmaments.com/2006090173928420.html for details. > A fixed ver

Bug#348407: pine: security hole in imap support

2006-01-18 Thread Moritz Muehlenhoff
Santiago Vila wrote: > How exactly this is dangerous in *pine*? (not in the IMAP server) The problem is that we have another case of an embedded code copy, something we should get rid of for Etch for as many packages as possible. > You gain access to the system if you are running pine? That would

Bug#349002: Recent kernel bugs CAN-2005-2709, CAN-2004-1057, CAN-2005-2973...

2006-01-22 Thread Moritz Muehlenhoff
Christian Hammers wrote: > There were some kernel security announcements on bugtrag the last couple > of days. As those CAN Ids do not show up on the cross reference > or the nonvuln list, I wonder if Debian is affected and when fixed packages > can be expected. See http://svn.debian.org/wsvn/kern

Bug#349555: komi - FTBFS: cannot find -lgp

2006-01-25 Thread Moritz Muehlenhoff
Steve Kemp wrote: > On Wed, Jan 25, 2006 at 12:29:32PM +0100, Thierry Reding wrote: > > * Bastian Blank wrote: > > > > Package: komi > > > Version: 1.03-4 > > > Severity: serious > > > > > > There was an error while trying to autobuild your package: > > > > > > I've investigated this a bit, and

Bug#349528: your mail

2006-01-27 Thread Moritz Muehlenhoff
Recai Okta? wrote: > elog (2.5.7+r1558-4+sarge1) stable-security; urgency=high > > * Major security update (big thanks to Florian Weimer) > + Backport r1333 from upstream's Subversion repository: > "Fixed crashes with very long (revisions) attributes" > + Backport r1335

Bug#349528: Security bugs in elog

2006-01-28 Thread Moritz Muehlenhoff
Recai Okta? wrote: > Debdiff is attached and here is the new changelog for your convenience: > > elog (2.5.7+r1558-4+sarge1) stable-security; urgency=critical > > * Major security update (big thanks to Florian Weimer) > + Backport r1333 from upstream's Subversion repository: >

Bug#291566: libavcodec-dev: Multiple integer overflows, some of them may lead to arbitrary code execution

2005-01-21 Thread Moritz Muehlenhoff
Package: libavcodec-dev Version: 0.cvs20050106-1 Severity: grave Tags: security Justification: user security hole [Cc'ing security@, as at least xine-lib embeds libavcodec, there may be more, I haven't investigated whether they are affected, but I assume it's the case] The most recent ffmpeg-cvs-

Bug#318328: affix: Missing input sanitising in btobex/btsrv

2005-07-14 Thread Moritz Muehlenhoff
Package: affix Severity: grave Tags: security patch Justification: user security hole btsrv sanitises input inproperly. I haven't yet checked whether this is exploitable in the Debian package configuration as well. Please see the advisory at http://www.digitalmunition.com/DMA[2005-0712b].txt Patch

Bug#318327: affix: Buffer overflow in btftp client

2005-07-14 Thread Moritz Muehlenhoff
Package: affix Severity: grave Tags: security patch Justification: user security hole An exploitable buffer overflow in the btftp userspace client has been reported. Please see http://www.digitalmunition.com/DMA[2005-0712a].txt for an advisory. Patches are available at http://affix.sourceforge.net

Bug#318633: tutos: Multiple security problems (CAN-2005-2162 and CAN-2005-2161)

2005-07-16 Thread Moritz Muehlenhoff
Package: tutos Severity: grave Tags: security Justification: user security hole Multiple security problems have been reported on TUTOS, including SQL injection and cross-site-scripting. Please see http://www.securityfocus.com/archive/1/375757 for details. All issues seem to be fixed in current CVS

Bug#318062: CVE Ids for the vulnerabilities

2005-07-17 Thread Moritz Muehlenhoff
The Mozilla vulnerabilities have been assigned these CVE ids: CAN-2005-2270: Code execution through shared function objects CAN-2005-2269: XHTML node spoofing CAN-2005-2268: Javascript prompt origin spoofing CAN-2005-2266: Same origin violation: frame calling top.focus() CAN-2005-2265: Possible ex

Bug#318728: mozilla-thunderbird: Multiple security problems

2005-07-17 Thread Moritz Muehlenhoff
Package: mozilla-thunderbird Severity: grave Tags: security Justification: user security hole Thunderbird 1.0.5 fixes these nine security issues, some of which are classified as critical by the Mozilla developers: CAN-2005-2270: Code execution through shared function objects CAN-2005-2269: XHTML

Bug#318633: Wrong CVE Ids

2005-07-18 Thread Moritz Muehlenhoff
Doh! This should be CAN-2004-2161 and CAN-2004-2162, not -2005- Cheers, Moritz -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Bug#319858: Buffer overflow in bundled zlib (CAN-2005-2096)

2005-07-25 Thread Moritz Muehlenhoff
Package: mysql-dfsg-4.1 Version: 4.1.12-1 (not installed) Severity: grave Tags: security patch MySQL bundles a copy of zlib, which is vulnerable to DoS and potential arbitrary code execution due to a buffer overflow in the inflate function. This is fixed in latest 4.1.13 upstream or in the Bitkee

Bug#320183: ethereal: Multiple security issues in various dissectors

2005-07-27 Thread Moritz Muehlenhoff
Package: ethereal Severity: grave Tags: security Justification: user security hole Multiple security problems have been found in Ethereal and fixed in latest upstream release 0.10.12. Full details are described at http://www.ethereal.com/appnotes/enpa-sa-00020.html Cheers, Moritz -- Syst

Bug#322133: mysql-dfsg: Buffer overflow in user defined functions

2005-08-09 Thread Moritz Muehlenhoff
Package: mysql-dfsg Severity: grave Tags: security Justification: user security hole A buffer overflow in user defined functions can be exploited to possibly execute arbitrary code by user that have been granted the privilege to create user defined functions. For full details please see http://www

Bug#322535: evolution: Multiple format string vulnerabilities in Evolution

2005-08-11 Thread Moritz Muehlenhoff
Package: evolution Severity: grave Tags: security Multiple exploitable format string vulnerabilities have been found in Evolution. Please see http://www.securityfocus.com/archive/1/407789/30/0/threaded for details. 2.3.7 fixes all these issues. Cheers, Moritz -- System Information: Debi

Bug#309308: [Secure-testing-team] Re: Bug#309308: kernel-image-2.6.8-2-686-smp: VLAN Oops fix for 2.6.8

2005-08-11 Thread Moritz Muehlenhoff
Horms wrote: > > below patch has been slurped into the Debian patches for 2.6.8, but the > > error posted looks like the same error I suffered when hitting this bug. > > > > Patch from http://lists.osdl.org/pipermail/bridge/2004-September/000638.html > > > > Cut and paste from the web archive, so

Bug#309308: [Secure-testing-team] Re: Bug#309308: kernel-image-2.6.8-2-686-smp: VLAN Oops fix for 2.6.8

2005-08-12 Thread Moritz Muehlenhoff
Horms wrote: > > > There is no public CVE assignment for this issue. If's it easily > > > reproducable > > > for non-root, it might account as a local DoS vulnerability. > > > > mii-tool's IOCTL is only allowed by root. > > > > The remote DoS comes from the fact that snmpd will call this IOCTL w

Bug#322133: MySQL 4.0 fix for CAN-2005-2558

2005-09-09 Thread Moritz Muehlenhoff
Hi, MySQL has now published information about the isolated security fix: http://mysql.bkbits.net:8080/mysql-4.0/[EMAIL PROTECTED] Cheers, Moritz -- Moritz Muehlenhoff [EMAIL PROTECTED] fon: +49 421 22 232- 0 DevelopmentLinux for Your Business fax: +49 421 22 232-99

Bug#327424: mailutils-imap4d: Remotely exploitable format string vulnerability in SEARCH command

2005-09-09 Thread Moritz Muehlenhoff
Package: mailutils-imap4d Severity: grave Tags: security Justification: user security hole A remotely exploitable format string vulnerability has been found in GNU mailutils' imap4d server. Please see the iDefense advisory at www.idefense.com/application/poi/display?id=303&type=vulnerabilities for

Bug#322236: fbi / exif soname bump

2005-09-14 Thread Moritz Muehlenhoff
Hi, fbi only requires a re-compile to fix this bug. I've tried it and I can verify that it works without problems. Cheers, Moritz -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Bug#316973: Patch for CAN-2005-2069

2005-09-14 Thread Moritz Muehlenhoff
tags 316973 patch thanks Hi, attached you can find upstream's patch to address this problem. Cheers, Moritz diff -Naur libnss-ldap-238.orig/ldap-nss.c libnss-ldap-238/ldap-nss.c --- libnss-ldap-238.orig/ldap-nss.c 2005-09-14 23:46:27.0 +0200 +++ libnss-ldap-238/ldap-nss.c 200

Bug#316972: libpam-ldap DSA-785 fixed CAN-2005-2069 w/o mentioning it

2005-09-14 Thread Moritz Muehlenhoff
Dear Joey/security team, when preparing a patch for #316972 in sid I noticed that the sid version (which is identical to the Sarge version from DSA-785) already contained the required patch. But it isn't mentioned neither in the changelog nor in the DSA-785. Can you please fix it in the web version

Bug#329343: lincity-ng: Saved game can't be pause after loaded. When save my game is on accelerate mode.

2005-09-21 Thread Moritz Muehlenhoff
Welly Hartanto wrote: > Package: lincity-ng > Version: 1.0.1-1 > Severity: serious > Justification: 4 > > I'm new to lincity-ng nad found the game exciting. > After playing a while I save my game. While saving, my game > was on accelerate mode ( by clicking the yellow arrow ). > I opened the saved

Bug#329778: mozilla: Multiple security issues fixed in 1.7.12

2005-09-23 Thread Moritz Muehlenhoff
Package: mozilla Version: 2:1.7.11-1 Severity: grave Tags: security Justification: user security hole As usual Mozilla 1.7.12 fixes several security issues. I'm copying the bug descriptions from a Red Hat advisory, because they are not yet public on the Mozilla website: <--> A bug was found in th

Bug#330627: Gentoo had an advisory for this

2005-09-29 Thread Moritz Muehlenhoff
Hi, there has been a Gentoo advisory about insecure temp files in rkhunter, which got assigned CAN-2005-1270: http://www.gentoo.org/security/en/glsa/glsa-200504-25.xml So please check, whether the mentioned check_update.sh script is vulnerable in the Debian package as well. Cheers, Moritz

Bug#330682: mantis: Several vulnerabilities in Mantis

2005-09-29 Thread Moritz Muehlenhoff
Package: mantis Severity: grave Tags: security Justification: user security hole mantis 1.0.0-rc2 fixed these security problems, that seem to be missing in the latest DSA upload that fixed several others: - 0006097: [security] user ID is cached indefinately (thraxisp) - 0006189: [security] List o

Bug#331206: bugzilla: Two information disclosure vulnerabilities in Bugzilla

2005-10-02 Thread Moritz Muehlenhoff
Package: bugzilla Version: 2.18.3-2 Severity: grave Tags: security Justification: user security hole Two information disclosure vulnerabilities have been found in Bugzilla: + It is possible to bypass the "user visibility groups" restrictions if user-matching is turned on in "substring" mode. +

Bug#330295: Please downgrade this

2005-10-05 Thread Moritz Muehlenhoff
Hi, this potential license problem is blocking (among others) the transition of 1.0.7-1, which fixes several serious security problems. As the problems some debian-legal people seem to have spotted haven't been noticed by noone else since the MPL is in use and triple-licensing is already being prep

Bug#332408: mediawiki: Multiple vulnerabilities in Mediawiki

2005-10-06 Thread Moritz Muehlenhoff
Package: mediawiki Severity: grave Tags: security Justification: user security hole 1.4.11 fixes two security problems: CAN-2005-3167: Incomplete blacklist vulnerability in MediaWiki before 1.4.11 does not properly remove certain CSS inputs (HTML inline style attributes) that are processed as act

Bug#332424: CAN-2005-3150: Format string vulnerability in log_flush function

2005-10-06 Thread Moritz Muehlenhoff
Package: weex Severity: grave Tags: security Justification: user security hole A remotely exploitable format string vulnerability has been found in weex. Please see http://www.freebsd.org/cgi/query-pr.cgi?pr=ports/86833 for details and a patch. Please mention the CVE assignment CAN-2005-3150 in t

Bug#332434: storebackup: Several security problems (already fixed in sid/testing)

2005-10-06 Thread Moritz Muehlenhoff
Package: storebackup Version: 1.18.4-2 Severity: grave Tags: security Justification: user security hole Although it's not really mentioned in the changelog storebackup 1.19 fixed several security problems, which are still present in Sarge, they've been assigned CAN-2005-3150, CAN-2005-3149 and CAN

Bug#332434: storebackup: Several security problems (already fixed in sid/testing)

2005-10-06 Thread Moritz Muehlenhoff
Arthur Korn wrote: BTW, I made an error in my initial bug report, it's CAN-2005-314[876]. > 1.19-1 source and binary packages work on stable, and the > differences to 1.18.4-2 are all local bugfixes, so I figure it > doesn't make any sense to separate bugfixes from bugfixes for a > special securi

Bug#332524: xloadimage: Exploitable buffer overflow in NIFF loading code

2005-10-06 Thread Moritz Muehlenhoff
Package: xloadimage Severity: grave Tags: security Justification: user security hole A report about several buffer overflows in the xloadimage code for processing NIFF images has been posted to Bugtraq. Please see http://msgs.securepoint.com/cgi-bin/get/bugtraq0510/57.html for details and a demo e

Bug#332524: Exploits attached

2005-10-06 Thread Moritz Muehlenhoff
The demonstation exploits are stripped off in the Bugtraq archives, I've attached them. Cheers, Moritz large.niff.bz2 Description: Binary data small.niff.bz2 Description: Binary data

Bug#332434: storebackup: Several security problems (already fixed in sid/testing)

2005-10-07 Thread Moritz Muehlenhoff
Martin Schulze wrote: > > I'm not sure about > > http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-3148, > > which would require some more studying of the code. > > It's the chown call. > > It seems that the old version executed "chown uid gid link" which doesn't > work. The new version ex

Bug#332919: CAN-2005-2967: Format string vulnerability in xine-lib's CDDB response parsing

2005-10-09 Thread Moritz Muehlenhoff
Package: xine-lib Severity: grave Tags: security Justification: user security hole A format string vulnerability in xine-lib's CDDB response parsing has been found. Exploitation is quite unlikely, as it would require a rogue CDDB server, but it should be fixed nevertheless, as the fix is trivial.

Bug#332919: No

2005-10-11 Thread Moritz Muehlenhoff
Ulf Harnhammar wrote: > No, you don't need to set up a rogue CDDB server, as CDDB servers let anyone > add or modify information about records. But according to the freedb.org FAQs every submission is reviewed before being applied to the database. So it seems quite unlikely submissions of crafted

Bug#333497: CAN-2005-2971: Heap overflow in kword's RTF import

2005-10-12 Thread Moritz Muehlenhoff
Package: kword Version: 1:1.3.5-4.3 Severity: grave Tags: security Justification: user security hole An exploitable heap overflow has been found in kword's RTF import function. Please see http://www.kde.org/info/security/advisory-20051011-1.txt for more information and a patch against 1.3.5. This

Bug#333734: curl: Buffer overflow in NTLM authentication

2005-10-13 Thread Moritz Muehlenhoff
Package: curl Version: 7.14.1-5 Severity: grave Tags: security Justification: user security hole Another buffer overflow has been found in curl's NTLM authentication code. (This one is different from CAN-2005-0490 and doesn't seem to have a CVE assignment yet). Please see http://www.mail-archive.

Bug#334113: [Secure-testing-team] kernel allows loadkeys to be used by any user, allowing for local root compromise

2005-10-18 Thread Moritz Muehlenhoff
Horms wrote: > > The non-suid command "loadkeys" can be used by any local user having > > console access. It does not just apply to the current virtual console > > but to all virtual consoles and its effect persists even after logout. This has been assigned CAN-2005-3257. Cheers, Moritz

Bug#334880: ethereal 0.10.13 fixes lots of vulnerabilities

2005-10-20 Thread Moritz Muehlenhoff
Package: ethereal Version: 0.10.12-6 Severity: grave Tags: security Justification: user security hole As usual ethereal 0.10.13 fixes lots of vulnerabilities, most of them are only denial-of- service, but some can lead to execution of arbitrary code. Affecting only sid: o The ISAKMP dissect

Bug#334606: Debian's version doesn't seem to be affected

2005-10-20 Thread Moritz Muehlenhoff
Hi, as the attack is based on overflowing buf1[] through crafted len values taken from the packet header in BoGetDirection() and this function isn't present in 2.3 Debian doesn't seem to vulnerable. Cheers, Moritz -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscr

Bug#330682: mantis: Several vulnerabilities in Mantis

2005-10-20 Thread Moritz Muehlenhoff
Hilko Bengen wrote: > >> mantis 1.0.0-rc2 fixed these security problems, that seem to be missing in > >> the latest DSA upload that fixed several others: > >> > >> - 0006097: [security] user ID is cached indefinately (thraxisp) > >> - 0006189: [security] List of users (in filter) visible for unaut

Bug#334616: This doesn't seem to be a serious security problem

2005-10-21 Thread Moritz Muehlenhoff
Hi, while I agree that running yiff with lesser privileges is desirable I can't see a RC security problem in this case. You can't crash a system be reading from /dev, /proc or /sys, even reading from raw hard disk devices doesn't cause harm. If you know such a scenario please describe it, otherwise

Bug#335497: CVE-2005-3278: Local root exploit in Postscript handling

2005-10-24 Thread Moritz Muehlenhoff
Package: bmv Version: 1.2-17 Severity: grave Tags: security Justification: user security hole An integer overflow in bmv can lead to a local privilege escalation. Please see http://felinemenace.org/advisories/bmv_advisory.txt for details. This has been assigned CVE-2005-3278, please mention so in

Bug#335938: mantis: Mantis "t_core_path" File Inclusion Vulnerability

2005-10-26 Thread Moritz Muehlenhoff
Package: mantis Version: 0.19.2-4 Severity: grave Tags: security Justification: user security hole Another security problem has been found in mantis. Insufficient input sanitising of the t_core_path parameter may be exploited to perform arbitrary file inclusion. Please see http://secunia.com/secu

Bug#335997: flyspray: Multiple XSS vulnerabilities

2005-10-27 Thread Moritz Muehlenhoff
Package: flyspray Severity: grave Tags: security Justification: user security hole Multiple Cross-Site-Scripting vulnerabilties have been found in Flyspray. Have a look at http://lostmon.blogspot.com/2005/10/flyspray-bug-killer-multiple-variable.html for more details. This has been assigned CVE-2

Bug#335938: mantis: Mantis 't_core_path' File Inclusion Vulnerability

2005-10-27 Thread Moritz Muehlenhoff
Thijs Kinkhorst wrote: > > Another security problem has been found in mantis. Insufficient > > input sanitising of the t_core_path parameter may be exploited to perform > > arbitrary file inclusion. Please see > > http://secunia.com/secunia_research/2005-46/advisory/ for details. > > Hello Moritz,

Bug#335998: CVE-2005-3325: SQL injection vulnerability

2005-10-27 Thread Moritz Muehlenhoff
Package: acidbase Severity: grave Tags: security Justification: user security hole A SQL injection vulnerability has been found in BASE. Please see http://www.frsirt.com/english/advisories/2005/2188 for details. This has been assigned CVE-2005-3325, please mention so in the changelog, when fixing

Bug#335938: mantis: Mantis 't_core_path' File Inclusion Vulnerability

2005-10-27 Thread Moritz Muehlenhoff
Martin Schulze wrote: > > Thijs Kinkhorst wrote: > > > > Another security problem has been found in mantis. Insufficient > > > > input sanitising of the t_core_path parameter may be exploited to > > > > perform > > > > arbitrary file inclusion. Please see > > > > http://secunia.com/secunia_researc

Bug#335938: mantis: Mantis 't_core_path' File Inclusion Vulnerability

2005-10-31 Thread Moritz Muehlenhoff
Thijs Kinkhorst wrote: > > All affect Sarge. > > I've prepared updated packages for sarge. My updated package for sid is > still pending with my sponsor Luk Claes. The updated packages for sarge > are available here: > http://www.a-eskwadraat.nl/~kink/mantis_sec/ > > They are not signed since I'

Bug#335938: mantis: Mantis 't_core_path' File Inclusion Vulnerability

2005-10-31 Thread Moritz Muehlenhoff
Thijs Kinkhorst wrote: > On Mon, October 31, 2005 16:07, Moritz Muehlenhoff wrote: > > The included patches look fine and correlate to what I extracted from the > > interdiff. But where's the fix for CVE-2005-3337 aka mantis bug 5959? > > > > The mantis bug is

Bug#336751: openvpn: Format string vulnerability in config parsing code

2005-11-01 Thread Moritz Muehlenhoff
Package: openvpn Severity: grave Tags: security Justification: user security hole A format string vulnerability has been found in openvpn's option parsing code, which indirectly may be exploited remotely as well. Please see http://cert.uni-stuttgart.de/archive/bugtraq/2005/10/msg00393.html for mo

Bug#336751: CVE assignment

2005-11-01 Thread Moritz Muehlenhoff
Hi, this has been assigned CVE-2005-3393, please mention so in the changelog when fixing this. Cheers, Moritz -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Bug#336645: More vulnerabilities

2005-11-01 Thread Moritz Muehlenhoff
Just for the record, PHP 4.4.1 fixes more security problems besides the ones discovered by the Hardened PHP Project. I'm including the CVE assignments: * Fixed multiple safe_mode/open_basedir bypass vulnerabilities in ext/curl and ext/gd that could lead to exposure of files normally not acces

Bug#304793: junkbuster issue was already adressed by DSA-713

2005-11-02 Thread Moritz Muehlenhoff
Hi, this issue is CVE-2005-1109 and was addressed by DSA-713 from 2005-04-13. Do you have reason to believe that the fix used there was incomplete? Cheers, Moritz -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Bug#336985: fix for graphviz in sid

2005-11-02 Thread Moritz Muehlenhoff
Hi, the DSA text is indeed incorrect, this is unfixed in sid. Attached is the patch from the DSA. Cheers, Moritz diff -u graphviz-2.2.1/debian/changelog graphviz-2.2.1/debian/changelog --- graphviz-2.2.1/debian/changelog +++ graphviz-2.2.1/debian/changelog @@ -1,3 +1,11 @@ +graphviz (2.2.1

Bug#296678: libcurl3: NTLM Authentication buffer overflow (CAN-2005-0490)

2005-02-23 Thread Moritz Muehlenhoff
Package: libcurl3 Version: 7.13.0-1 Severity: grave Tags: patch Justification: user security hole iDefense discovered a buffer overflow in NTLM authentication that may lead to arbitrary code execution. This is CAN-2005-0490. Woody is not affected, as it doesn't contain the vulnerable NTLM code. (I

Bug#298183: lesstif1-1: Further unfixed XPM buffer overflows (CAN-2005-0605)

2005-03-05 Thread Moritz Muehlenhoff
Package: lesstif1-1 Severity: grave Tags: security, patch Justification: user security hole Quoting from a recent Gentoo security advisory: > Chris Gilbert discovered potentially exploitable buffer overflow cases > in libXpm that weren't fixed in previous libXpm security advisories. This has been

Bug#299029: Mysql insecure temporary file creation with CREATE TEMPORARY TABLE privilege escalation

2005-03-11 Thread Moritz Muehlenhoff
Package: mysql-dfsg Version: unavailable; reported 2005-03-11 Severity: grave Tags: security Stefano Di Paola discovered that MySQL is vulnerable to a symlink attack if an authenticated user has CREATE TEMPORARY TABLE privileges on any existent database. There does not seem to be a CVE assignment

Bug#299030: Mysql CREATE FUNCTION mysql.func table arbitrary library injection

2005-03-11 Thread Moritz Muehlenhoff
Package: mysql-dfsg Version: 4.0.23-10 Severity: grave Tags: security Stefano Di Paola discovered that it's possible to use a library located in an arbitrary directory, if an authenticated user has INSERT and DELETE privileges on the 'mysql' administrative database. There does not seem to be a CV

Bug#299031: Mysql CREATE FUNCTION libc arbitrary code execution.

2005-03-11 Thread Moritz Muehlenhoff
Package: mysql-dfsg Version: 4.0.23-10 Severity: grave Tags: security Stefano Di Paola discovered that it's possible to gain extended MySQL user privileges by abusing the interaction between MySQL's CREATE FUNCTION functionality and the libc. This only applies for authenticated users with INSERT a

Bug#299846: openslp: Several non-descript buffer overflows and out-of-bounds memory access

2005-03-16 Thread Moritz Muehlenhoff
Package: openslp Severity: grave Tags: security Justification: user security hole SuSE Security has found several buffer overflows and out-of-memory access possibilities during a code audit. Neither the original SuSE nor the Mandrake advisory contain detailed information, openslp.org lacks usable

Bug#300306: wine: Insecure world readable storage of Wine registry

2005-03-18 Thread Moritz Muehlenhoff
Package: wine Version: 0.0.20050211-1 Severity: grave Tags: security Justification: user security hole [ Note; feel free to downgrade the severity, I chose it under the assumption that a user runs applications which store sensitive data in the registry and that Sarge should not include this vu

Bug#300634: limewire: Probable remote access to arbitrary files in Limewire

2005-03-20 Thread Moritz Muehlenhoff
Package: limewire Version: 3.4.5-2 Severity: grave Tags: security Justification: user security hole Secunia reports two vulnerabilities in Limewire that allow attackers remote access to arbitrary files. For full details see http://secunia.com/advisories/14555 Note: Limewire has been orphaned for

Bug#301243: [CAN-2005-0399][CAN-2005-0401][CAN-2005-0402] Three security vulnerabilities in Firefox 1.0.1

2005-03-24 Thread Moritz Muehlenhoff
Package: mozilla-firefox Version: 1.0-2.37.200411220627 Severity: grave Tags: security Three security vulnerabilities have been found in Firefox: I'm write a collective bugreport for all three vulnerabilities, as you'll they're all fixed in 1.0.2: CAN-2005-0399: An GIF processing error when pars

Bug#301368: icecast2: Several vulnerabilities in Icecast2

2005-03-25 Thread Moritz Muehlenhoff
Package: icecast2 Severity: grave Tags: security Justification: user security hole Several security issues have been reported for Icecast2. Please refer to the CAN Ids in the changelog when fixing them: CAN-2005-0838: Multiple buffer overflows in the XSL parser may cause DoS and possibly remote c

Bug#301372: kernel-source-2.6.8: [CAN-2005-0839] Insecure restriction of access to the N_MOUSE line disciple for TTYs

2005-03-25 Thread Moritz Muehlenhoff
Package: kernel-source-2.6.8 Version: 2.6.8-15 Severity: grave Tags: security Kernels before 2.6.11 do not properly restrict access to the N_MOUSE line disciple for TTYs, which allows local users to inject mouse or keyboard events into other's users sessions and possibly gain extended privileges.

Bug#301428: smail: Remote and local vulnerabilities can be exploited to obtain root access

2005-03-25 Thread Moritz Muehlenhoff
Package: smail Severity: grave Tags: security patch Justification: user security hole [Dear security-team, this should affect Woody as well] Sean <[EMAIL PROTECTED] has discovered two vulnerabilities in smail, that can be exploited to obtain root privileges: 1. A heap overflow in RFC 821 header

Bug#301428: Exploit posted to Bugtraq

2005-03-29 Thread Moritz Muehlenhoff
Hola, a POC exploit has been posted to Bugtraq. I don't have a smail setup to test this against, though. It's attached for your convenience. Cheers, Moritz -- http://unpythonic.net/~jepler/cgi-bin/rottenflesh.cgi smail-heap-overflow-remote-exploit-poc.c.gz Description: GNU Zip compresse

Bug#302704: CAN-2005-0750: Possible local root exploit through insufficient range checking in af_bluetooth

2005-04-02 Thread Moritz Muehlenhoff
Package: kernel-source-2.4.27 Severity: grave Tags: security Justification: user security hole CAN-2005-0750: Insufficient range checking in af_bluetooth allows local root exploit. This is the full advisory: http://lists.grok.org.uk/pipermail/full-disclosure/ attachments/20050327/3f128a09/adv1.

Bug#302893: ogre: FTBFS: Missing build dependency?

2005-04-03 Thread Moritz Muehlenhoff
Kurt Roeckx wrote: > This looks like a missing build dependency or something, > but I have no idea on what package since nothing in debian > seems to have them. It's missing a build-dep on libcegui-mk2-dev, which should hit the archive with the next dinstall run. Cheers, Moritz -- To

Bug#323040: wordpress: Arbitrary code execution through inproper input sanitising in cookie handling

2005-08-14 Thread Moritz Muehlenhoff
Package: wordpress Severity: grave Tags: security patch Justification: user security hole Hi, a vulnerability in Wordpress' cookie handling has been reported that allows arbitrary PHP command execution, if register_globals is enabled in the PHP config. Please see http://www.securiteam.com/unixfocu

Bug#323185: centericq: Multiple security problems in libgadu

2005-08-15 Thread Moritz Muehlenhoff
Package: centericq Severity: grave Tags: security Justification: user security hole Multiple security problems have been fixed in ekg and it's libgadu library: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2448 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2370 http://cve.mitre.o

Bug#323347: Another XMLRPC issue in drupal

2005-08-16 Thread Moritz Muehlenhoff
Package: drupal Severity: grave Tags: security Justification: user security hole [I'm pretty sure you are already aware of it; but here it is anyway] Another XMLRPC vulnerability has been detected that affects Drupal as well. Please see http://www.hardened-php.net/advisory_142005.66.html for info

Bug#323350: egroupware: Another XMLRPC vulnerability

2005-08-16 Thread Moritz Muehlenhoff
Package: egroupware Severity: grave Tags: security Justification: user security hole Hi, another vulnerability has been found in the XMLRPC code. Please see http://www.hardened-php.net/advisory_142005.66.html for more information. egroupware was affected by July's vulnerability, so it might now be

Bug#323349: phpgroupware: Another vulnerability in XMLRPC code

2005-08-16 Thread Moritz Muehlenhoff
Package: phpgroupware Severity: grave Tags: security Justification: user security hole Hi, another vulnerability has been found in the XMLRPC code. Please see http://www.hardened-php.net/advisory_142005.66.html for more information. phpgroupware was affected by July's vulnerability, so it might be

Bug#323365: bluez-utils: Arbitrary command execution through inproper escaping in hcid's security.c

2005-08-16 Thread Moritz Muehlenhoff
Package: bluez-utils Severity: grave Tags: security patch Justification: user security hole A vulnerability in hcid has been found. Please see this URL for details: http://sourceforge.net/mailarchive/forum.php?thread_id=7893206&forum_id=1881 https://bugs.gentoo.org/show_bug.cgi?id=101557 Upstream

Bug#325285: gallery: XSS in EXIF tag handling

2005-08-27 Thread Moritz Muehlenhoff
Package: gallery Severity: grave Tags: security Justification: user security hole gallery doesn't sanitize EXIF tags when displaying them. Please see http://cedri.cc/advisories/EXIF_XSS.txt for more information. gallery2 might be affected as well. Cheers, Moritz -- System Information: De

Bug#323347: Another XMLRPC issue in drupal

2005-08-30 Thread Moritz Muehlenhoff
Moritz Muehlenhoff wrote: > Package: drupal > Severity: grave > Tags: security > Justification: user security hole > > [I'm pretty sure you are already aware of it; but here it is anyway] > > Another XMLRPC vulnerability has been detected that affects Drup

Bug#327039: CAN-2005-2494: Insecure lockfile handling permits potential local root privilege escalation

2005-09-07 Thread Moritz Muehlenhoff
Package: kdebase-bin Version: 3.4.2-2 Severity: grave Tags: security Justification: user security hole Please see http://www.kde.org/info/security/advisory-20050905-1.txt for details and a patch. Cheers, Moritz -- System Information: Debian Release: testing/unstable APT prefers unstabl

Bug#303142: phpmyadmin: Cross-Site-Scriping vulnerability in convcharset

2005-04-04 Thread Moritz Muehlenhoff
Package: phpmyadmin Severity: grave Tags: security Justification: user security hole [Might affect stable, packages.d.o is currently unreachable, so I can't check] There's a cross-site-scripting vulnerability in phpmyadmin due to inproper input validation of convcharset data. For full details pl

Bug#291244: CAN-2005-0064 fix incomplete

2005-04-04 Thread Moritz Muehlenhoff
reopen 291244 tags 291244 patch thanks Hi, the security fix for CAN-2005-0064 was taken from xpdf, which didn't fix the issue completely. Attached you can find a patch that provides the complete solution as provided in xpdf 3.00-13 (relative to the current NMUed fix). Cheers, Moritz diff

Bug#291250: CAN-2005-0064 for pdftohtml fix incomplete

2005-04-05 Thread Moritz Muehlenhoff
reopen 291250 thanks Hi, the previous fix for CAN-2005-0064 was taken from xpdf, which didn't address this vulnerability completely. Attached you can find a dpatch that adds the missing range limitation. Cheers, Moritz #!/bin/sh -e ## Additional fix for CAN-2005-0064 ## ## DP: Patch to fi

Bug#303238: kpdf fix for CAN-2005-0064 (bug 291251) was incomplete

2005-04-05 Thread Moritz Muehlenhoff
Package: kpdf Version: 4:3.3.2-1 Severity: grave Tags: security patch Justification: user security hole Dear KDE maintainers, the security fix for CAN-2005-0064 was derived from xpdf 3.00-12, which in fact turned out to be incomplete wrt to a missing range check in XRef.cc. Attached you can find a

Bug#303288: tetex-bin: CAN-2005-0064 fix was incomplete

2005-04-05 Thread Moritz Muehlenhoff
Package: tetex-bin Version: 2.0.2-27 Severity: grave Tags: security patch Justification: user security hole Dear TeX maintainers, the patch you used to fix CAN-2005-0064 in -26 seems to have been derived from xpdf 3.00-12, which unfortunately was missing a portion of the security fix (the one that

Bug#304390: postfix-gld: Multiple remotely exploitable vulnerabilities

2005-04-12 Thread Moritz Muehlenhoff
Package: postfix-gld Severity: grave Tags: security Justification: user security hole dong-hun you <[EMAIL PROTECTED]> posted a report about several remotely exploitable security issues to the vuln-watch mailing list. As I couldn't find a proper WWW reference I'm posting the advisory verbose. Che

Bug#304465: kdelibs4: Invalid calculation of PCX image properties possibly permits arbitrary code execution

2005-04-13 Thread Moritz Muehlenhoff
Package: kdelibs4 Severity: grave Tags: security Justification: user security hole Invalid range checking in PCX header parsing possibly permits execution of arbitrary code. Please see http://bugs.kde.org/show_bug.cgi?id=102328 for a full description, a crafted test image and a patch from Waldo Ba

Bug#304468: wordpress: Wordpress XSS and HTML code injection

2005-04-13 Thread Moritz Muehlenhoff
Package: wordpress Severity: grave Tags: security Justification: user security hole Nicolas Montoza <[EMAIL PROTECTED]> reported two security vulnerabilities in Wordpress, which insert verbose, as I could not find a public WWW reference for them. Cheers, Moritz ==

Bug#304469: openoffice.org: Invalid range checking in DOC header parsing leading to possible heap overflow

2005-04-13 Thread Moritz Muehlenhoff
Package: openoffice.org Version: 1.1.3-8 Severity: grave Tags: security Justification: user security hole Lee Xioajun <[EMAIL PROTECTED]> reported an issue with invalid input checks in DOC header parsing, which can possibly be exploited with remote code execution. I'm including his advisory verbos

Bug#304799: libcdaudio: CAN-2005-0706: Bufferoverflow in CDDB lookup parsing

2005-04-15 Thread Moritz Muehlenhoff
Package: libcdaudio Severity: grave Tags: security patch Justification: user security hole CAN-2005-0706 describes a buffer overflow in grip CDDB response parsing that can potentially be exploited to execute arbitrary code. libcdaudio contains the vulnerable code as well. Attached you can find a

Bug#305068: Integer and heap overflow in gocr

2005-04-17 Thread Moritz Muehlenhoff
Package: gocr Severity: grave Tags: security Justification: user security hole Two security vulnerabilities have been reported on gocr that may be exploited to execute arbitrary code. For full details please have a look at http://www.overflow.pl/adv/gocr.txt Cheers, Moritz -- System Info

Bug#305072: CAN-2005-0706: Bufferoverflow in CDDB response parsing

2005-04-17 Thread Moritz Muehlenhoff
Package: gnome-vfs2 Severity: grave Tags: security patch Justification: user security hole [ Dear security team; this seems to affect stable as well ] CAN-2005-0706 describes a buffer overflow in grip CDDB response parsing that can potentially be exploited to execute arbitrary code. gnome-vfs2 c

Bug#305254: cvs: Several security issues in CVS

2005-04-18 Thread Moritz Muehlenhoff
Package: cvs Version: 1:1.12.9-11 Severity: grave Tags: security Justification: user security hole CVS 1.12.12 fixes several security issues: * Thanks to a report from Alen Zukich <[EMAIL PROTECTED]>, several minor security issues have been addressed. One was a buffer overflow that is potent

Bug#305343: Exploitable buffer overflow in RTSP streaming code

2005-04-19 Thread Moritz Muehlenhoff
Package: libxine1 Version: 1.0-1 Severity: grave Tags: security Two streaming related security issues have been reported in MPlayer. At least one of them is present in xine-lib as well. The MPlayer reports can be found at http://www.mplayerhq.hu/homepage/design7/news.html. The vulnerable MMST code

Bug#305576: Multiple security issues in egroupware

2005-04-20 Thread Moritz Muehlenhoff
Package: egroupware Severity: grave Tags: security Justification: user security hole Multiple security issues have been reported for egroupware that have been adressed in the new 1.0.0.007 release. See this advisory for full details: Cheers, Moritz From: GulfTech Security Research <[EMAI

Bug#305574: heimdal: Telnet vulnerabilities (CAN-2005-0469)

2005-04-20 Thread Moritz Muehlenhoff
Package: heimdal Severity: grave Tags: security Justification: user security hole Heimdal is vulnerable to CAN-2005-0469, the slc_add_reply buffer overflow reported for multiple telnet clients. Heimdal 0.6.4 fixes this issue. Cheers, Moritz -- System Information: Debian Release: 3.1 A

  1   2   3   4   >