Bug#404267: apache-common: mod_proxy segfaults (NULL deref.) when FTP server sends back no spaces

2006-12-22 Thread Ulf Harnhammar
. This was reported to upstream a few months ago: o http://issues.apache.org/bugzilla/show_bug.cgi?id=40733 // Ulf Harnhammar metaur:~# fgrep ftpspecial /etc/services ftpspecial 1096/tcp ftpspecial 1096/udp metaur:~# tail -n2 /etc/inetd.conf ftp stream tcp nowait root /usr

Bug#292264: Here's the patch

2006-12-12 Thread Ulf Harnhammar
tags 292264 patch thanks Here's a patch for this bug. It may not be a very important one, but I like to reduce the number of ways that computer programs can crash. // Ulf --- src/options.c.old 2005-03-13 15:52:46.0 +0100 +++ src/options.c 2006-12-12 22:47:35.0 +0100 @@ -11,7

Bug#392016: Further security patching of ELOG

2006-12-02 Thread Ulf Harnhammar
/advisories/18124/ o http://secunia.com/advisories/22057/ Regards, Ulf Harnhammar --- src/elogd.c.old 2006-11-28 12:25:59.0 +0100 +++ src/elogd.c 2006-12-02 20:37:44.0 +0100 @@ -9685,7 +9685,7 @@ void show_edit_form(LOGBOOK * lbs, int m rsprintf(option value

Bug#392016: elog in stable is also vulnerable

2006-11-08 Thread Ulf Harnhammar
I've just verified that elog in stable is vulnerable to all issues mentioned in bug #392016. // Ulf -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]

Bug#392016: ELOG security audit

2006-10-31 Thread Ulf Harnhammar
as in the upstream ELOG-2.6.2 version. I haven't checked any other versions (but the upstream SVN trunk looks like it also has these bugs). // Ulf Harnhammar, Debian Security Audit Project http://www.debian.org/security/audit/ -- ___ Surf the Web

Bug#392016: Perhaps

2006-10-18 Thread Ulf Harnhammar
I'll see what I can do. // Ulf -- ___ Surf the Web in a faster, safer and easier way: Download Opera 9 at http://www.opera.com Powered by Outblaze

Bug#392010: nsca: crashes on malformed command line

2006-10-09 Thread Ulf Harnhammar
. // Ulf Harnhammar -- System Information: Debian Release: testing/unstable APT prefers testing APT policy: (500, 'testing') Architecture: i386 (i686) Shell: /bin/sh linked to /bin/bash Kernel: Linux 2.6.12-1-686 Locale: LANG=en_US, LC_CTYPE=en_US (charmap=ISO-8859-1) Versions of packages nsca

Bug#392004: python-subversion: svnshell crashes on malformed setrev command

2006-10-09 Thread Ulf Harnhammar
, in do_setrev print Error setting the revision to ' + str(rev) + '. UnboundLocalError: local variable 'rev' referenced before assignment [EMAIL PROTECTED]:~$ // Ulf Harnhammar -- System Information: Debian Release: testing/unstable APT prefers testing APT policy: (500, 'testing') Architecture: i386

Bug#391388: zabbix-server-mysql: remote security problems

2006-10-06 Thread Ulf Harnhammar
Subject: zabbix-server-mysql: remote security problems Package: zabbix-server-mysql Version: 1:1.1.2-2 Severity: grave Justification: user security hole Tags: security patch Hello, Max Vozeler and Ulf Harnhammar from the Debian Security Audit Project have found a number of format string bugs

Bug#359064: php4-cli: crashes when a script includes itself

2006-03-26 Thread Ulf Harnhammar
Segmentation fault [EMAIL PROTECTED]:~/ulf$ One solution would be to keep track of included files in a function, and not include them again. // Ulf Harnhammar -- System Information: Debian Release: testing/unstable APT prefers testing APT policy: (500, 'testing') Architecture: i386 (i686) Shell

Bug#359071: rrdtool: crashes when restoring malformed XML file

2006-03-26 Thread Ulf Harnhammar
overflow.xml [EMAIL PROTECTED]:~/recently$ /usr/bin/rrdtool restore overflow.xml overflow.rrd Segmentation fault [EMAIL PROTECTED]:~/recently$ // Ulf Harnhammar -- System Information: Debian Release: testing/unstable APT prefers testing APT policy: (500, 'testing') Architecture: i386 (i686) Shell

Bug#359081: rrdtool: crashes with malformed graph cdef command

2006-03-26 Thread Ulf Harnhammar
. // Ulf Harnhammar -- System Information: Debian Release: testing/unstable APT prefers testing APT policy: (500, 'testing') Architecture: i386 (i686) Shell: /bin/sh linked to /bin/bash Kernel: Linux 2.6.12-1-686 Locale: LANG=en_US, LC_CTYPE=en_US (charmap=ISO-8859-1) Versions of packages

Bug#304525: final patch

2006-03-26 Thread Ulf Harnhammar
Hello, if you apply this patch to the upstream IlohaMail-0.8.14-rc3 version, it should display ilohamail1.msg correctly even when Show HTML messages is on. // Ulf Harnhammar --- include/read_message_print.inc.old 2005-04-15 08:30:52.0 +0200 +++ include/read_message_print.inc 2006

Bug#304525: patch

2006-03-21 Thread Ulf Harnhammar
However you said that not all xss bugs were fixed in the new version. Could you please send a patch that fixes the remaining issue ? Sure, I'll look into that this weekend. // Ulf -- ___ Surf the Web in a faster, safer and easier way: Download

Bug#304525: New ilohamail XSS patch

2006-03-19 Thread Ulf Harnhammar
Hello, I thought I'd better improve the XSS patch for ilohamail now, before we have to celebrate birthdays for that bug.. // Ulf --- source/read_message.php.old 2004-04-08 23:16:37.0 +0200 +++ source/read_message.php 2005-04-13 20:55:40.610910256 +0200 @@ -275,9 +275,9 @@

Bug#340842: acknowledged by developer (Re: unalz: buffer overflow when extracting archives)

2006-03-16 Thread Ulf Harnhammar
The bug appears to still apply to the version of the package in unstable, and is marked as such. The bug looks closed to me. It still looks closed (in all versions) to me. Are you sure that that is what you want, instead of - say - fixing it? // Ulf --

Bug#340842: acknowledged by developer (Re: unalz: buffer overflow when extracting archives)

2006-03-15 Thread Ulf Harnhammar
This bug was fixed in a security upload to stable; marking as closed in that version. The bug appears to still apply to the version of the package in unstable, and is marked as such. The bug looks closed to me. // Ulf -- ___ Surf the Web in a

Bug#356832: unalz: directory traversal bug

2006-03-14 Thread Ulf Harnhammar
and the buffer overflow that I found quite a while ago could be in order? // Ulf Harnhammar -- ___ Surf the Web in a faster, safer and easier way: Download Opera 8 at http://www.opera.com Powered by Outblaze

Bug#355911: grunt: strange package description

2006-03-08 Thread Ulf Harnhammar
that the stdout from the commands can be sent back to the user? // Ulf Harnhammar -- ___ Surf the Web in a faster, safer and easier way: Download Opera 8 at http://www.opera.com Powered by Outblaze

Bug#354752: viewcvs: broken English in package description

2006-02-28 Thread Ulf Harnhammar
suggest the following, instead: This version also supports subversion repositories. // Ulf Harnhammar -- ___ Surf the Web in a faster, safer and easier way: Download Opera 8 at http://www.opera.com Powered by Outblaze

Bug#354461: zoo: buffer overflow when processing archives

2006-02-26 Thread Ulf Harnhammar
://seclists.org/lists/fulldisclosure/2006/Feb/0572.html The full-disclosure post includes a patch. // Ulf Harnhammar -- System Information: Debian Release: testing/unstable APT prefers testing APT policy: (500, 'testing') Architecture: i386 (i686) Shell: /bin/sh linked to /bin/bash Kernel: Linux 2.6.12

Bug#352482: It's a vuln

2006-02-22 Thread Ulf Harnhammar
This is CVE-2006-0709 now. Additionally, Red Hat sound confident that this is exploitable: This issue is a pretty standard heap based buffer overflow. -- https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=181665 They have issued a security advisory with severity set to important:

Bug#353527: mrtg: rateup crashes with long basename

2006-02-19 Thread Ulf Harnhammar
by the system administrator who is trusted. I have attached a patch that corrects this problem. I have Cc'ed upstream, as the latest upstream version is affected as well. // Ulf Harnhammar -- System Information: Debian Release: testing/unstable APT prefers testing APT policy: (500, 'testing

Bug#353539: metamail: crashes with very long filenames in messages

2006-02-19 Thread Ulf Harnhammar
) Segmentation fault [EMAIL PROTECTED]:~/recently$ I have attached a patch and a test message. // Ulf Harnhammar -- System Information: Debian Release: testing/unstable APT prefers testing APT policy: (500, 'testing

Bug#352482: metamail: crashes with very long boundaries in messages

2006-02-13 Thread Ulf Harnhammar
BTW, what is in ./metamail, rather than ./src/metamail/?? I don't know. I noticed that the source is included twice, but I haven't looked into why that is the case. FWIW, if you just patch the source in src and not in ., the resulting binaries seem to be fixed. I have found that metamail

Bug#352482: metamail: crashes with very long boundaries in messages

2006-02-12 Thread Ulf Harnhammar
: [EMAIL PROTECTED]:~$ /usr/bin/metamail metamail.txt From: [EMAIL PROTECTED] To: [EMAIL PROTECTED] Subject: metamail crash bug *** glibc detected *** free(): invalid next size (normal): 0x0805fc30 *** Aborted [EMAIL PROTECTED]:~$ I have attached a test message, as well as a patch. // Ulf

Bug#352369: buffer overflow in /usr/share/doc/netcat/examples/data/rservice.c

2006-02-11 Thread Ulf Harnhammar
$ ./rservice a b c | cat -A [EMAIL PROTECTED]@[EMAIL PROTECTED]@$ [EMAIL PROTECTED]:~/netcat.data$ ./rservice `perl -e 'print U x 1995;'` a b Segmentation fault [EMAIL PROTECTED]:~/netcat.data$ Feel free to patch it, remove the file from the package, or ignore this bug. // Ulf Harnhammar, Debian

Bug#352450: snarf: crashes when parsing bad PASV response from server

2006-02-11 Thread Ulf Harnhammar
server, if you want to test it. // Ulf Harnhammar -- System Information: Debian Release: testing/unstable APT prefers testing APT policy: (500, 'testing') Architecture: i386 (i686) Shell: /bin/sh linked to /bin/bash Kernel: Linux 2.6.12-1-686 Locale: LANG=en_US, LC_CTYPE=en_US (charmap=ISO

Bug#343877: webalizer: various buffer overflows

2005-12-18 Thread Ulf Harnhammar
Subject: webalizer: various buffer overflows Package: webalizer Version: 2.01.10-27 Severity: important Tags: patch Hello, I have found some more buffer overflows in webalizer. People from Debian seem to have worked on this earlier on, and here are some more bugs to fix. None of them seem to

Bug#340842: unalz: buffer overflow when extracting archives

2005-11-26 Thread Ulf Harnhammar
information oflow333.alz Description: Binary data oflow1621.alz Description: Binary data #!/usr/bin/perl -- # alzgen # by Ulf Harnhammar in 2005 # I hereby place this program in the public domain. die usage: $0 length filename\n unless @ARGV == 2; $len = shift; $lenhi = int($len / 256); $lenlo

Bug#332919: No

2005-10-12 Thread Ulf Harnhammar
No, you don't need to set up a rogue CDDB server, as CDDB servers let anyone add or modify information about records. But according to the freedb.org FAQs every submission is reviewed before being applied to the database. So it seems quite unlikely submissions of crafted entries to

Bug#332919: No

2005-10-11 Thread Ulf Harnhammar
No, you don't need to set up a rogue CDDB server, as CDDB servers let anyone add or modify information about records. http://www.freedb.org/modules.php?name=Sectionssop=viewarticleartid=26 // Ulf -- ___ Surf the Web in a faster, safer and easier

Bug#323092: supertux: New upstream version

2005-08-14 Thread Ulf Harnhammar
Subject: supertux: New upstream version Package: supertux Version: 0.1.2-4 Severity: wishlist Hello, there's a new upstream version (0.1.3) of supertux at their new homepage: o http://developer.berlios.de/project/showfiles.php?group_id=3467 Please consider packaging it. // Ulf Harnhammar

Bug#323099: wget: non-free documentation [NONFREE-DOC:GFDL-1.2]

2005-08-14 Thread Ulf Harnhammar
to the DFSG, so these files must be removed from main. As an aside, the debian/copyright file for wget only lists the license for the wget program and not the license for the wget documentation. // Ulf Harnhammar -- System Information: Debian Release: testing/unstable APT prefers testing APT policy

Bug#322535: Patch

2005-08-13 Thread Ulf Harnhammar
If you don't want to upgrade to 2.3.7, which is unstable, you can use our unofficial patch: o http://www.sitic.se/dokument/evolution.formatstring.patch // Ulf -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]

Bug#319273: popularity-contest: should be able to send copies to From address

2005-07-23 Thread Ulf Harnhammar
On Sat, Jul 23, 2005 at 10:02:39PM +0200, Petter Reinholdtsen wrote: Why do you make it so complex? I would believe it was sufficient to add this line to /etc/popularity-contest.conf if you wanted to send email both to the normal MAILTO address and the MAILFROM address.

Bug#319273: popularity-contest: should be able to send copies to From address

2005-07-20 Thread Ulf Harnhammar
that sends a copy of the e-mails to the From address, if COPYTOFROMADDRESS is set to yes. Please consider including this patch in the program. // Ulf Harnhammar -- System Information: Debian Release: testing/unstable APT prefers testing APT policy: (500, 'testing') Architecture: i386 (i686

Bug#305255: the gzip patch

2005-05-21 Thread Ulf Harnhammar
I'm still not sure if the user of basename() instead of base_name() is the correct thing to do here. It's the same function, so it should be correct. // Ulf -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]

Bug#308282: [phpbb2 #308282] upstream patch

2005-05-10 Thread Ulf Harnhammar
(Sorry for not doing this as a real reply with the correct mail headers, but I'm not subscribed to debian-security, I only read it on the web.) | + $text = preg_replace('#(script|about|applet|activex|chrome):#is', \\1#058;, $text); It looks like this is about preventing URL's like img

Bug#304525: Someone forgot something

2005-05-04 Thread Ulf Harnhammar
I have tested the *upstream* 0.8.14-rc3, and it fixes almost all issues mentioned in this bug report. If you select Show HTML messages under Options and then view the message ilohamail1.msg, there will still be an XSS bug. // Ulf Harnhammar -- To UNSUBSCRIBE, email to [EMAIL PROTECTED

Bug#305255: Better patch

2005-04-27 Thread Ulf Harnhammar
Hello, here is a better patch. It removes the directory part of the filename when it is read from the .gz file, and not when opening it, so the earlier side effects should disappear now. // Ulf --- gzip.c.old 2005-04-28 01:45:23.405819616 +0200 +++ gzip.c 2005-04-28 02:10:35.386963544

Bug#306164: unzoo: directory traversal security bug

2005-04-24 Thread Ulf Harnhammar
Subject: unzoo: directory traversal security bug Package: unzoo Version: 4.4-2 Severity: important Tags: security Hello, unzoo suffers from an old security bug that hasn't been patched. When unpacking .zoo archives, there's no check for ../.. constructs in the file names, which makes it possible

Bug#305702: bitchx: local buffer overflow

2005-04-21 Thread Ulf Harnhammar
Subject: bitchx: local buffer overflow Package: bitchx Version: 1:1.0-0c19.20030512-2 Severity: normal Some guy on the Full-Disclosure mailing list posted this local buffer overflow exploit: http://www.g-0.org/code/bx-xp.c (also attached) The exploit works on my machine in that it gives a

Bug#305708: chkrootkit: new version available

2005-04-21 Thread Ulf Harnhammar
Subject: chkrootkit: new version available Package: chkrootkit Version: 0.44-2 Severity: wishlist Hello, there's a 0.45 version out now since February 2005. Please consider packaging that. It's important to keep this type of program updated. // Ulf Härnhammar -- System Information: Debian

Bug#305255: suggestion

2005-04-20 Thread Ulf Harnhammar
Pawel, would it help if I changed the patch so it only does this when decompressing? // Ulf Härnhammar

Bug#305240: rats: doesn't escape HTML tags found in the C code

2005-04-18 Thread Ulf Harnhammar
Subject: rats: doesn't escape HTML tags found in the C code Package: rats Version: 2.1-3 Severity: normal Tags: patch When using the options --context and --html, rats doesn't escape HTML code found in the C code when creating HTML reports. Here is an example: [EMAIL PROTECTED]:~/rats-test$

Bug#305255: gzip: dir traversal bug when using gunzip -N

2005-04-18 Thread Ulf Harnhammar
Subject: gzip: dir traversal bug when using gunzip -N Package: gzip Version: 1.3.5-9 Severity: important Tags: security patch A directory traversal bug exists in multiple versions of gzip. When compressing a file, gzip saves its original name but not its path inside the compressed file. When

Bug#304525: ilohamail: XSS security bugs

2005-04-13 Thread Ulf Harnhammar
Subject: ilohamail: XSS security bugs Package: ilohamail Version: 0.8.14-0rc3 Severity: important Tags: security patch Hello, I have found a bunch of XSS (cross-site scripting) security problems in ilohamail. If a victim opens an e-mail message from an attacker in ilohamail, the attacker may

Bug#302454: trackballs: Follows symlinks as gid games

2005-03-31 Thread Ulf Harnhammar
~/.trackballs $ ln -s /var/games/gnometris.scores ~/.trackballs/metaur.gmr $ ln -s /tmp/testing ~/.trackballs/settings $ ls -al /tmp/testing ls: /tmp/testing: No such file or directory $ cat /var/games/gnometris.scores 31.00 1105059399 Ulf Harnhammar $ ls -al ~/.trackballs/ total 12 drwxr-xr-x 2

Bug#302493: buggy bug fix

2005-03-31 Thread Ulf Harnhammar
Subject: bumprace: 290706 isn't really closed Package: bumprace Version: 1.4.6-3 Severity: normal 1.4.6-3 doesn't fix bug #290706, which is archived by now. Try the perl command and the attached .bumprace file and you'll see that it still crashes in both cases. // Ulf Härnhammar -- System

Bug#297646: bug still exists

2005-03-06 Thread Ulf Harnhammar
reopen 297646 thanks The 1.0.0-8 version doesn't fix the bug. // Ulf Härnhammar

Bug#297644: icebreaker: crashes when high score names contain %n%n%n%n

2005-03-01 Thread Ulf Harnhammar
Subject: icebreaker: crashes when high score names contain %n%n%n%n Package: icebreaker Version: 1.21-9 Severity: normal Tags: patch Hello, icebreaker crashes when high score names contain strings like %n%n%n%n. It is caused by a bunch of bad snprintf() calls in hiscore.c. You can test the bug

Bug#297646: trackballs: crashes when $USER contains %n%n%n%n%n%n

2005-03-01 Thread Ulf Harnhammar
Subject: trackballs: crashes when $USER contains %n%n%n%n%n%n Package: trackballs Version: 1.0.0-7 Severity: normal Tags: patch Hello, trackballs crashes when the USER environment variable contains strings like %n%n%n%n%n%n. It is caused by a bad snprintf() call. I have attached a patch. [EMAIL

Bug#289784: xshisen: buffer overflow when handling GECOS field

2005-01-10 Thread Ulf Harnhammar
earlier buffer overflows in xshisen that Steve Kemp found in 2003: http://bugs.debian.org/213957 // Ulf Harnhammar for the Debian Security Audit Project http://www.debian.org/security/audit/ -- System Information: Debian Release: 3.1 APT prefers testing APT policy: (500, 'testing