[gull-annonces] Résumé SecurityFocus Newsletter #310

Marc SCHAEFER schaefer at alphanet.ch
Sun Aug 14 22:26:28 CEST 2005


No-Brainer SMTP Client log_msg() Remote Format String Vulnerability
BugTraq ID: 14441
Remote: Yes
Date Published: 2005-08-01
Relevant URL: http://www.securityfocus.com/bid/14441
Summary:
A remote format string vulnerability affects the message logging 
functionality of nbSMTP. This issue is due to a failure of the application 
to properly sanitize user-supplied input prior to passing it as the format 
specifier to a formatted printing function.

A remote attacker may leverage this issue to write to arbitrary process 
memory, facilitating code execution.

Info-ZIP unzip chmod(2) File Permission Modification Race Condition Weakness
BugTraq ID: 14450
Remote: No
Date Published: 2005-08-02
Relevant URL: http://www.securityfocus.com/bid/14450
Summary:
Info-ZIP unzip is reported prone to a security weakness; the issue is only 
present when an archive is extracted into a world or group writable 
directory. It is reported that unzip employs non-atomic procedures to write 
a file and later change the permissions on the newly extracted file.

A local attacker may leverage this issue to modify file permissions of 
target files.

Metasploit Framework MSFWeb Defanged Mode Restriction Bypass 
Vulnerability
BugTraq ID: 14455
Remote: Yes
Date Published: 2005-08-02
Relevant URL: http://www.securityfocus.com/bid/14455
Summary:
Metasploit Framework is susceptible to a restriction bypass vulnerability in 
msfweb. This issue is due to a failure of the application to properly 
implement access control restrictions.

This issue allows remote attackers to bypass security restrictions in the 
affected Web server. Attackers may exploit this issue to attack arbitrary 
computers using the Metasploit Framework, while originating the attacks from 
the computer hosting the vulnerable msfweb process.

Attackers may also interact with the payload features in the Metasploit 
Framework to manipulate files on the hosting computer, likely leading to 
executing arbitrary commands and then complete system compromise.

It should be noted that the Metasploit Framework documentation specifies 
that msfweb should not be globally accessible, due to potential security 
problems.

[ http://www.metasploit.com/projects/Framework/ ]

Debian apt-cacher Remote Command Execution Vulnerability
BugTraq ID: 14459
Remote: Yes
Date Published: 2005-08-03
Relevant URL: http://www.securityfocus.com/bid/14459
Summary:
apt-cacher is prone to a remote command execution vulnerability.

Specifically, the vulnerability can allow remote attackers to execute 
arbitrary commands on a computer that is acting as a caching host with the 
privileges of 'www-data'.

This may allow an attacker to gain unauthorized access to a vulnerable 
computer.

[ http://www.debian.org/security/2005/dsa-772 ]

Karrigell KS File Arbitrary Python Command Execution Vulnerability
BugTraq ID: 14463
Remote: Yes
Date Published: 2005-07-31
Relevant URL: http://www.securityfocus.com/bid/14463
Summary:
Karrigell is susceptible to an arbitrary Python command execution 
vulnerability. This issue is due to a design flaw that allows remote 
attackers to execute Python commands that they are not intended to have 
access to.

Attackers may exploit this vulnerability to execute arbitrary Python 
commands in the context of the Web server hosting the Karrigell framework. 
This allows remote malicious users to cause denial of service conditions, 
create or overwrite arbitrary files, and likely compromise the hosting 
computer.

[ Python WWW server, GPL ]

Linux Kernel Stack Fault Exceptions Unspecified Local Denial of Service 
Vulnerability
BugTraq ID: 14467
Remote: No
Date Published: 2005-08-03
Relevant URL: http://www.securityfocus.com/bid/14467
Summary:
Linux kernel is reported prone to an unspecified local denial of service 
vulnerability.

It was reported that this issue arises when a local user triggers stack 
fault exceptions. A local attacker may exploit this issue to carry out a 
denial of service attack against a vulnerable computer by crashing the 
kernel.

Linux Kernel NFSACL Protocol XDR Data Remote Denial of Service 
Vulnerability
BugTraq ID: 14470
Remote: Yes
Date Published: 2005-08-04
Relevant URL: http://www.securityfocus.com/bid/14470
Summary:
Linux Kernel is affected by a remote denial of service vulnerability when 
handling XDR data for the nfsacl protocol.

Specific details about this issue were not disclosed.  It is conjectured 
that an attacker crafts malformed XDR data that contains large string values 
to corrupt kernel memory.

This may result in a denial of service condition.

McDATA E/OS Remote Denial Of Service Vulnerability
BugTraq ID: 14475
Remote: Yes
Date Published: 2005-08-04
Relevant URL: http://www.securityfocus.com/bid/14475
Summary:
McDATA Sphereon 4300, and 4500 Fabric Switches, Intrepid 6064, and 6140 
Director Switches are susceptible to a remote denial of service 
vulnerability when running E/OS versions prior to 6.0.0. This issue is due 
to the affected devices failing to properly handle network broadcast storms.

Hosts utilizing the SAN for storage may loose complete access to the 
attached storage.

This vulnerability allows attackers to simultaneously deny storage service 
to potentially numerous servers connected to a SAN.

Versions of E/OS prior to 6.0.0 are affected by this vulnerability.

[ FibreChannel switches ]

Linux Kernel XFRM Array Index Buffer Overflow Vulnerability
BugTraq ID: 14477
Remote: No
Date Published: 2005-08-05
Relevant URL: http://www.securityfocus.com/bid/14477
Summary:
Linux kernel is prone to an array index buffer overflow vulnerability.  This 
issue exists due to insufficient validation of user-supplied data.  The 
vulnerability exists in the XFRM network architecture code.  
A successful attack can allow a local attacker to trigger an overflow, which 
may lead to a denial of service condition due to memory corruption.  
Arbitrary code execution may be possible, however, this has not been 
confirmed.

This issue affects Linux Kernel versions 2.6.x.

Lantronix Secure Console Server SCS820/SCS1620 Multiple Local 
Vulnerabilities
BugTraq ID: 14486
Remote: No
Date Published: 2005-08-05
Relevant URL: http://www.securityfocus.com/bid/14486
Summary:
Lantronix Secure Console Server SCS820/SCS1620 devices are susceptible to 
multiple local vulnerabilities.

The first issue is an insecure default permission vulnerability. Attackers 
may exploit this vulnerability to write data to arbitrary files with 
superuser privileges. Other attacks are also possible.

The second issue is a directory traversal vulnerability in the command-line 
interface. Attackers may exploit this vulnerability to gain inappropriate 
access to the underlying operating system.

The third issue is a privilege escalation vulnerability in the command-line 
interface. Local users with 'sysadmin' access to the device can escape the 
command-line interface to gain superuser privileges in the underlying 
operating system.

The last issue is a buffer overflow vulnerability in the 'edituser' binary. 
Attackers may exploit this vulnerability to execute arbitrary machine code 
with superuser privileges.

The reporter of these issues states that firmware versions prior to 4.4 are 
vulnerable.

[ firmware ]




More information about the gull-annonces mailing list