[gull-annonces] Résumé SecurityFocus Newsletter #311
Marc SCHAEFER
schaefer at alphanet.ch
Sun Aug 21 20:14:44 CEST 2005
Wine WineLauncher.IN Local Insecure File Creation Vulnerability
BugTraq ID: 14496
Remote: No
Date Published: 2005-08-08
Relevant URL: http://www.securityfocus.com/bid/14496
Summary:
A local insecure file creation vulnerability affects Wine. This issue is
likely due to a design error that causes the application to fail to verify
the existence of a file before writing to it.
The details available regarding this issue are not sufficient to provide an
in depth technical description. This BID will be updated when more
information becomes available.
An attacker may leverage this issue to overwrite arbitrary files with the
privileges of an unsuspecting user that activates the vulnerable application.
This issue is reported in version 20050725; other version may also be
affected.
FFTW Insecure Temporary File Creation Vulnerability
BugTraq ID: 14501
Remote: No
Date Published: 2005-08-08
Relevant URL: http://www.securityfocus.com/bid/14501
Summary:
FFTW creates temporary files in an insecure manner. An attacker with local
access could potentially exploit this issue to overwrite files in the
context of the application. The vulnerability is due to the program creating
temporary files with a predictable name in the '/tmp' directory.
A local attacker most likely takes advantage of this vulnerability by
creating a malicious symbolic link in a directory where the temporary files
will be created. When the program attempts to perform an operation on a
temporary file, it will instead perform the operation on the file pointed to
by the malicious symbolic link.
Exploitation would most likely result in loss of data or a denial of service
if critical files are overwritten in the attack. Other attacks may be
possible as well.
This issue is reported in version 3.0.1 of the FFTW library; other versions
may also be affected.
[ semble être ça: http://www.fftw.org/, mais c'est étrange. Bibliothèque
pour FFT (Fast Fourier Transform) ]
MySQL User-Defined Function Buffer Overflow Vulnerability
BugTraq ID: 14509
Remote: Yes
Date Published: 2005-08-08
Relevant URL: http://www.securityfocus.com/bid/14509
Summary:
MySQL is prone to a buffer overflow vulnerability. This issue is due to
insufficient bounds checking of data supplied as an argument in a
user-defined function.
This issue could be exploited by a database user with sufficient access to
create a user-defined function. It may also be possible to exploit this
issue trhough latent SQL injection vulnerabilities in third-party
applications that use the database as a backend.
Successful exploitation will result in execution of arbitrary code in the
context of the database server process.
Linux Kernel Non-Zero Keyring Local Denial of Service Vulnerability
BugTraq ID: 14517
Remote: No
Date Published: 2005-08-09
Relevant URL: http://www.securityfocus.com/bid/14517
Summary:
The Linux kernel is reported prone to a local denial of service
vulnerability.
This issue arises if a user attempts to add a keyring that does not contain
an empty payload.
A successful attack can allow a local attacker to deny service to legitimate
users due to a kernel oops.
Linux Kernel Session Keyring Allocation Local Denial of Service
Vulnerability
BugTraq ID: 14521
Remote: No
Date Published: 2005-08-09
Relevant URL: http://www.securityfocus.com/bid/14521
Summary:
The Linux kernel is reported prone to a local denial of service
vulnerability.
Specifically, the vulnerability presents itself when a user attempts to
allocate a new session keyring and some exceptional conditions arise.
This can allow a local attacker to deny service to legitimate users.
Inkscape Insecure Temporary File Creation Vulnerability
BugTraq ID: 14522
Remote: No
Date Published: 2005-08-09
Relevant URL: http://www.securityfocus.com/bid/14522
Summary:
Inkscape creates temporary files in the '/tmp' directory in an insecure
manner. An attacker with local access may overwrite or create files using
symbolic link attacks.
This type of attack can result in denial of service or loss of data within
the context of the affected application. Other attacks may be possible.
[ implémentation éditeur SVG libre, compatible Adobe Illustrator ]
AWStats Referrer Arbitrary Command Execution Vulnerability
BugTraq ID: 14525
Remote: Yes
Date Published: 2005-08-09
Relevant URL: http://www.securityfocus.com/bid/14525
Summary:
AWStats is affected by an arbitrary command execution vulnerability. This
issue is due to a failure in the application to properly sanitize
user-supplied input.
Successful exploitation of this vulnerability will permit an attacker to
execute arbitrary Perl code on the system hosting the affected application
in the security context of the Web server process. This may aid in further
attacks against the underlying system; other attacks are also possible.
It should be noted this vulnerability is only possible if the affected
application has at least one URLPlugin enabled.
Mozilla Firefox And Thunderbird Long URI Obfuscation Weakness
BugTraq ID: 14526
Remote: Yes
Date Published: 2005-08-09
Relevant URL: http://www.securityfocus.com/bid/14526
Summary:
A weakness is reported in Mozilla Firefox and Thunderbird that may allow an
attacker to obfuscate the URI of a link. This could facilitate the
impersonation of legitimate Web sites in order to steal sensitive
information from unsuspecting users.
It is reported that the weakness exists when URIs presented to the
vulnerable application are overly long. When a URI as described is
displayed, it is reported that the text in the address bar goes completely
white, making the URI invisible to the user.
This may facilitate other attacks by hiding the URI from the targeted user.
Mozilla Firefox 1.0.6, and Thunderbird 1.0 are affected by this issue. Other
versions and products may also be affected.
Easy Software Products CUPS Denial of Service Vulnerability
BugTraq ID: 14527
Remote: Yes
Date Published: 2005-08-09
Relevant URL: http://www.securityfocus.com/bid/14527
Summary:
CUPS is affected by a denial of service vulnerability. This issue manifests
when the application fails to do proper bounds checking when handling
malformed PDF files.
An attacker can exploit this vulnerability by supplying a malformed PDF file
to the affected application resulting in an endless loop, thus denying
service to legitimate users.
XPDF Loca Table Verification Remote Denial of Service Vulnerability
BugTraq ID: 14529
Remote: Yes
Date Published: 2005-08-09
Relevant URL: http://www.securityfocus.com/bid/14529
Summary:
XPDF is prone to a remote denial of service vulnerability.
The vulnerability presents itself when the application attempts to verify
the validity of a malformed 'loca' table in PDF files.
This issue can result in disk consumption and ultimately lead to a denial of
service condition.
kpdf, gpdf and CUPS are vulnerable to this issue as well.
GNOME Evolution Multiple Format String Vulnerabilities
BugTraq ID: 14532
Remote: Yes
Date Published: 2005-08-10
Relevant URL: http://www.securityfocus.com/bid/14532
Summary:
Evolution is affected by multiple format string vulnerabilities.
These issues can allow remote attackers to execute arbitrary code in the
context of the client.
Evolution versions 1.5 to 2.3.6.1 are affected.
Grandstream BudgeTone Denial Of Service Vulnerability
BugTraq ID: 14539
Remote: Yes
Date Published: 2005-08-10
Relevant URL: http://www.securityfocus.com/bid/14539
Summary:
Grandstream BudgeTone telephones are prone to a denial of service
vulnerability.
This particular attack will cause a Grandstream Budge Tone telephone to
malfunction by aborting any call currently in progress, rendering the
display on the telephone inoperable, and causing the integrated HTTP server
to stop responding. Switching the telephone off and on again will resume
normal operation.
[ firmware ]
HP Proliant DL585 Server Unauthorized Remote Access Vulnerability
BugTraq ID: 14540
Remote: Yes
Date Published: 2005-08-10
Relevant URL: http://www.securityfocus.com/bid/14540
Summary:
HP Proliant DL585 Server is affected by an unauthorized access vulnerability.
When the server is powered down, a remote attacker can gain access to the
server controls.
Very little information is available on this issue; this BID will be updated
as more information becomes available.
[ firmware/BIOS/wake-on-LAN probably ]
Mentor ADSL-FR4II Multiple Vulnerabilities
BugTraq ID: 14557
Remote: Yes
Date Published: 2005-08-13
Relevant URL: http://www.securityfocus.com/bid/14557
Summary:
Mentor ADSL-FR4II is prone to multiple vulnerabilities which could allow
unauthorized remote access or result in a denial of service.
Specifically, the backup configuration files downloaded from the device
contain the administrator password in clear text.
The device is also prone to a denial of service when a number of connections
to various ports on the device are made.
[ firmware ]
More information about the gull-annonces
mailing list