[gull-annonces] Résumé SecurityFocus Newsletter #306

Marc SCHAEFER schaefer at alphanet.ch
Sun Jul 24 09:40:53 CEST 2005


Clam Anti-Virus clamav Cabinet File Parsing Remote Denial Of Service 
Vulnerability
BugTraq ID: 14089
Remote: Yes
Date Published: 2005-06-29
Relevant URL: http://www.securityfocus.com/bid/14089
Summary:
A remote denial of service vulnerability affects clamav.  This issue is due 
to a failure of the application to properly handle malicious Cab file 
content.

An attacker may leverage this issue to crash the Clam Anti-Virus daemon, 
potentially leaving an affected computer open to infection by malicious code.

Clam Anti-Virus clamav MS-Expand File Parsing Remote Denial Of Service 
Vulnerability
BugTraq ID: 14090
Remote: Yes
Date Published: 2005-06-29
Relevant URL: http://www.securityfocus.com/bid/14090
Summary:
A remote denial of service vulnerability affects clamav.  This issue is due 
to a failure of the application to properly handle MS-Expand files.

An attacker may leverage this issue to cause the Clam Anti-Virus daemon to 
cease functioning correctly, leaving an affected computer open to infection 
by malicious code.

Cisco IOS AAA RADIUS Authentication Bypass Vulnerability
BugTraq ID: 14092
Remote: Yes
Date Published: 2005-06-29
Relevant URL: http://www.securityfocus.com/bid/14092
Summary:
Cisco IOS Remote Authentication Dial In User Service (RADIUS) is prone to a 
remote authentication bypass vulnerability. 
The issue manifests when Cisco IOS is configured to employ AAA RADIUS 
authentication and is configured to use 'none' as a fallback method.

A remote attacker may exploit this issue to bypass authentication and gain 
unauthorized access to the affected service.

[ firmware ]

FreeBSD IPFW Address Table Lookup Atomicity Error Firewall Rule Bypass 
Vulnerability
BugTraq ID: 14102
Remote: Yes
Date Published: 2005-06-29
Relevant URL: http://www.securityfocus.com/bid/14102
Summary:
FreeBSD IPFW is prone to an atomicity error that might result in erroneous 
lookup table matching under certain circumstances. Reports indicate the 
issue exists on SMP (Symmetric Multi-Processor) based platforms, or on UP 
(Uni Processor) platforms that have a system kernel configured with 
'PREEMPTION' functionality enabled. (Note: This is not a default 
configuration).

This issue may be leveraged to aid in attacks launched against target 
computers that are protected by the affected firewall.

FreeBSD TCP Stack Established Connection Denial of Service Vulnerability
BugTraq ID: 14104
Remote: Yes
Date Published: 2005-06-29
Relevant URL: http://www.securityfocus.com/bid/14104
Summary:
FreeBSD TCP stack is affected by a remote denial of service vulnerability.

This issue arises when an affected computer with an established connection 
receives a TCP packet with the SYN flag set and accepts it.

A successful attack can deny service for a target connection. 

All FreeBSD releases are vulnerable to this issue.

Apache HTTP Request Smuggling Vulnerability
BugTraq ID: 14106
Remote: Yes
Date Published: 2005-06-30
Relevant URL: http://www.securityfocus.com/bid/14106
Summary:
Apache is prone to an HTTP request smuggling attack.

A specially crafted request with a 'Transfer-Encoding: chunked' header and a 
'Content-Length' can cause the server to forward a reassembled request with 
the original 'Content-Length' header.  Due to this, the malicious request 
may piggyback with the valid HTTP request.

It is possible that this attack may result in cache poisoning, cross-site 
scripting, session hijacking and other attacks. 
This issue was originally described in BID 13873 (Multiple Vendor Multiple 
HTTP Request Smuggling Vulnerabilities).  Due to the availability of more 
details and vendor confirmation, it is being assigned a new BID.

NetBSD CLCS / EMUXKI Audio Driver Local Denial of Service Vulnerability
BugTraq ID: 14122
Remote: No
Date Published: 2005-06-30
Relevant URL: http://www.securityfocus.com/bid/14122
Summary:
NetBSD has reported a local denial of service condition due to a 
kernel-level bug in the clcs and emuxki audio drivers.  NetBSD versions 1.6 
to 2.0.2 are affected.  
Local users with access to the audio device can cause a kernel failure on 
systems with specific hardware.  The devices associated with the drivers are:

CS4280/4281, SB Live, or SB PC 512 

This is a vulnerability on multi-user systems where local users have access 
to the audio device.  In anticipation of systems where users do not, 
multimedia applications may be installed with setuid permissions.  These may 
provide channels of attack if they themselves have vulnerabilities of their 
own.

OpenLDAP TLS Plaintext Password Vulnerability
BugTraq ID: 14125
Remote: Yes
Date Published: 2005-07-01
Relevant URL: http://www.securityfocus.com/bid/14125
Summary:
OpenLDAP is affected by a password disclosure vulnerability when used with 
TLS.

This issue arises when a connection to a slave is established using TLS and 
the client is referred to a master.  TLS is not used with this connection, 
which can allow an attacker to sniff network traffic and obtain user 
credentials.

OpenLDAP 2.1.25 is known to be vulnerable at the moment.  Other versions may 
be affected as well.

PADL Software PAM_LDAP TLS Plaintext Password Vulnerability
BugTraq ID: 14126
Remote: Yes
Date Published: 2005-07-01
Relevant URL: http://www.securityfocus.com/bid/14126
Summary:
PAM_LDAP is affected by a password disclosure vulnerability when used with 
TLS.

This issue arises when a connection to a slave is established using TLS and 
the client is referred to a master.  TLS is not used with this connection, 
which can allow an attacker to sniff network traffic and obtain user 
credentials.

PAM_LDAP build 166 is known to be vulnerable at the moment. Other versions 
may be affected as well.

osTicket Multiple Input Validation Vulnerabilities
BugTraq ID: 14127
Remote: Yes
Date Published: 2005-07-01
Relevant URL: http://www.securityfocus.com/bid/14127
Summary:
osTicket is affected by multiple input validation vulnerabilities.  These 
issues arise due to insufficient sanitization of user-supplied data.

The following specific issues were identified:

The application is prone to an SQL injection vulnerability.  Successful 
exploitation could result in a compromise of the application, disclosure or 
modification of data, or may permit an attacker to exploit vulnerabilities 
in the underlying database implementation.

osTicket is also prone to a local file include vulnerability.  An attacker 
may leverage this issue to execute arbitrary server-side script code that 
resides on an affected computer with the privileges of the Web server 
process. This may potentially facilitate unauthorized access. 
osTicket 1.3.1 beta and prior versions are affected.




More information about the gull-annonces mailing list