[gull-annonces] Résumé SecurityFocus Newsletter #305
Marc SCHAEFER
schaefer at alphanet.ch
Tue Jul 5 11:30:02 CEST 2005
Heimdal telnetd Remote Buffer Overflow Vulnerability
BugTraq ID: 13989
Remote: Yes
Date Published: 2005-06-20
Relevant URL: http://www.securityfocus.com/bid/13989
Summary:
Heimdal telnetd is susceptible to a remote buffer overflow vulnerability.
This issue is due to a failure of the application to properly bounds check
user-supplied data prior to copying it to an insufficiently sized memory
buffer.
This vulnerability may be exploited by remote attackers to influence the
proper flow of execution of the application, resulting in attacker-supplied
machine code being executed in the context of the affected network service.
[ impl. de Kerberos 5 ]
Cisco VPN Concentrator Groupname Enumeration Weakness
BugTraq ID: 13992
Remote: Yes
Date Published: 2005-06-20
Relevant URL: http://www.securityfocus.com/bid/13992
Summary:
Cisco VPN Concentrator is affected by a remote groupname enumeration
weakness. This issue is due to a design error that could assist a remote
attacker in enumerating groupnames.
Reportedly, once the attacker has verified a groupname they can obtain a
password hash from an affected device and carry out bruteforce attacks
against the password hash.
A valid groupname and password pair can allow the attacker to complete IKE
Phase-1 authentication and carry out man-in-the-middle attacks against other
users. This may ultimately allow the attacker to gain unauthorized access
to the network.
All Cisco VPN Concentrator 3000 series products running groupname
authentication are considered vulnerable to this issue.
[ firmware ]
Todd Miller sudo Local Race Condition Vulnerability
BugTraq ID: 13993
Remote: No
Date Published: 2005-06-20
Relevant URL: http://www.securityfocus.com/bid/13993
Summary:
sudo is prone to a local race condition vulnerability. The issue only
manifests under certain conditions, specifically, when the sudoers
configuration file contains a pseudo-command 'ALL' that directly follows a
users sudoers entry.
When the aforementioned configuration exists, this issue may be leveraged by
local attackers to execute arbitrary executables with escalated privileges.
This may be accomplished by creating symbolic links to target files.
Mozilla/Firefox Browsers Dialog Box Origin Spoofing Vulnerability
BugTraq ID: 14008
Remote: Yes
Date Published: 2005-06-21
Relevant URL: http://www.securityfocus.com/bid/14008
Summary:
Mozilla/Firefox browsers are prone to a dialog box origin spoofing
vulnerability.
An attacker may exploit this vulnerability to spoof an interface of a
trusted web site. This issue may allow a remote attacker to carry out
phishing style attacks.
[ vague, verifiez l'empreinte des certificats, c'est tout ce qui compte ]
Enterasys Networks Vertical Horizon Default Backdoor Account
Vulnerability
BugTraq ID: 14014
Remote: Yes
Date Published: 2005-06-21
Relevant URL: http://www.securityfocus.com/bid/14014
Summary:
Enterasys Networks Vertical Horizon switch firmware has a built-in
administrative account that cannot be disabled.
This vulnerability reportedly allows remote attackers to gain unauthorized
administrative access to a target switch.
[ firmware ]
Yukihiro Matsumoto Ruby XMLRPC Server Unspecified Command Execution
Vulnerability
BugTraq ID: 14016
Remote: Yes
Date Published: 2005-06-21
Relevant URL: http://www.securityfocus.com/bid/14016
Summary:
Ruby is affected by an unspecified command execution vulnerability.
Reportedly, this issue affects the XMLRPC server.
It may be possible for an attacker to gain unauthorized access to an
affected computer by exploiting this issue.
Ruby 1.8.2 is known to be vulnerable to this vulnerability, however, other
versions may be affected as well.
[ ruby est un langage de programmation similaire a Perl ]
Tor Arbitrary Memory Information Disclosure Vulnerability
BugTraq ID: 14024
Remote: Yes
Date Published: 2005-06-21
Relevant URL: http://www.securityfocus.com/bid/14024
Summary:
Tor is prone to an arbitrary memory information disclosure vulnerability.
A remote attacker could exploit this vulnerability to gain sensitive
information, possibly private keys.
This issue is reported to affect Tor versions prior to 0.1.0.10.
[ anonymizer http://tor.eff.org/ ]
Asterisk Manager Interface Command Processing Remote Buffer Overflow
Vulnerability
BugTraq ID: 14031
Remote: Yes
Date Published: 2005-06-22
Relevant URL: http://www.securityfocus.com/bid/14031
Summary:
Asterisk manager interface is prone to a remote buffer overflow
vulnerability. The issue manifests due to a lack of sufficient boundary
checks performed by command line interface processing routines. Reports
indicate that the issue may only be exploited if the manager interface is
accessible and an attacker is able to write commands to the interface.
Under certain circumstances a remote attacker may exploit this issue to
execute arbitrary code in the context of the affected software.
Linux Kernel Unauthorized SCSI Command Vulnerability
BugTraq ID: 14040
Remote: No
Date Published: 2005-06-23
Relevant URL: http://www.securityfocus.com/bid/14040
Summary:
Linux kernel is reported susceptible to an unauthorized SCSI command
vulnerability.
Commands sent to a SCSI device may render the device's state inconsistent or
change the drive parameters so that other users find the drive to be
unusable.
It is possible that this issue is related to BID 11784 (SuSE Linux Kernel
Unauthorized SCSI Command Vulnerability). This is not confirmed at the
moment, however, this BID will be updated or the two BIDs will be combined
into one when further analysis is completed.
[ pour envoyer des commandes SCSI il faut avoir acces au peripherique
concerne (donc usuellement groupe disk), ou alors a l'interface
generique /dev/sgX, que l'on n'ouvre que pour les scanners p.ex. si
on veut eviter xsane suid root
]
Sendmail Milter Remote Denial Of Service Weakness
BugTraq ID: 14047
Remote: Yes
Date Published: 2005-06-23
Relevant URL: http://www.securityfocus.com/bid/14047
Summary:
Sendmail is susceptible to a remote denial of service weakness in its milter
interface. This issue is due to overly long default timeouts configured for
milters.
This issue is demonstrated with ClamAV versions prior to 0.86. Any other
milter that utilizes similar operating methods as the older ClamAV milter
will also expose this vulnerability in Sendmail.
Depending on the configuration of the milter interface, attackers may either
exploit this issue to bypass milters, or to deny further email delivery on
affected sites.
Linux Kernel 64 Bit AR-RSC Register Access Validation Vulnerability
BugTraq ID: 14051
Remote: No
Date Published: 2005-06-24
Relevant URL: http://www.securityfocus.com/bid/14051
Summary:
The Linux Kernel for 64 Bit architectures is prone to an access validation
vulnerability. The issue manifests due to a failure to restrict access to
the 'ar.rsc' register (register stack engine control register) by the
'restore_sigcontext' function.
Immediate consequences of exploitation would likely be a denial of service,
other attacks are also possible.
Linux Kernel Subthread Exec Local Denial Of Service Vulnerability
BugTraq ID: 14054
Remote: No
Date Published: 2005-06-24
Relevant URL: http://www.securityfocus.com/bid/14054
Summary:
The Linux kernel is prone to a local denial of service vulnerability. The
issue manifests when a call to exec is made for a subthread that has a timer
pending.
A local attacker may exploit this issue to crash the kernel effectively
denying service for legitimate users.
Clam Anti-Virus ClamAV Unspecified Quantum Decompressor Denial Of
Service Vulnerability
BugTraq ID: 14058
Remote: Yes
Date Published: 2005-06-24
Relevant URL: http://www.securityfocus.com/bid/14058
Summary:
ClamAV is prone to a denial of service vulnerability. The issue manifests in
the Quantum decompressor, the exact cause of this issue is not known.
It is conjectured that a remote attacker may exploit this condition using a
malicious file to crash a target ClamAV server.
More information about the gull-annonces
mailing list