[gull-annonces] Résumé SecurityFocus Newsletter #307
Marc SCHAEFER
schaefer at alphanet.ch
Sun Jul 24 09:46:41 CEST 2005
Linux Kernel IA32 execve() Local Buffer Overflow Vulnerability
BugTraq ID: 14205
Remote: No
Date Published: 2005-07-11
Relevant URL: http://www.securityfocus.com/bid/14205
Summary:
The Linux kernel is susceptible to a local buffer overflow vulnerability.
This issue is due to a race condition in an ia32 emulation system call that
leads to a memory copy operation that overflows a previously allocated
memory buffer.
During the time between two function calls to obtain buffer sizes, there
exists a window of opportunity for attackers to alter memory contents. This
race condition allows local attackers to overwrite critical kernel memory,
facilitating kernel-level machine code execution and privilege escalation.
On multiprocessor computers, attackers can directly alter the memory
contents to exploit this race condition. On uniprocessor computers, a
blocking function call allows attackers to exploit the race condition.
Versions of Linux 2.4 prior to 2.4.32-pre1, and Linux 2.4, prior to 2.6.7
are susceptible to this issue.
This vulnerability only affects computers running on either the ia64, or the
amd64 hardware platforms with ia32 emulation enabled.
dhcpcd Remote Denial of Service Vulnerability
BugTraq ID: 14206
Remote: Yes
Date Published: 2005-07-11
Relevant URL: http://www.securityfocus.com/bid/14206
Summary:
dhcpcd is prone to a remote denial of service vulnerability.
The issue presents itself when the application handles malformed data and
accesses out of bounds memory.
dhcpcd 1.3.22pl4 is reported to be affected. It is possible that older
versions are vulnerable as well.
Backup Manager Insecure Temporary File Creation Vulnerability
BugTraq ID: 14210
Remote: No
Date Published: 2005-07-11
Relevant URL: http://www.securityfocus.com/bid/14210
Summary:
Backup Manager is affected by an insecure temporary file creation
vulnerability.
The issue arises when a user burns a CDR. This issue may allow an attacker
to create a malicious symbolic link that will be written to by the
vulnerable utility when an unsuspecting user executes it.
Backup Manager versions prior to 0.5.8b are affected.
SGI ArrayD arshell Remote Privilege Escalation Vulnerability
BugTraq ID: 14218
Remote: Yes
Date Published: 2005-07-12
Relevant URL: http://www.securityfocus.com/bid/14218
Summary:
SGI arshell is susceptible to a remote unspecified privilege escalation
vulnerability.
In certain unspecified circumstances, users executing arshell may be able to
execute commands on remote array computers with superuser privileges.
This vulnerability allows attackers to gain superuser privileges on any
computer in an array or cluster.
Further details are not currently available. This BID will be updated as
more information is disclosed.
[ ici array == cluster de calcul p.ex. ]
xpvm Insecure Temporary File Creation Vulnerability
BugTraq ID: 14228
Remote: No
Date Published: 2005-07-12
Relevant URL: http://www.securityfocus.com/bid/14228
Summary:
xpvm creates temporary files in an insecure manner.
A local attacker would most likely take advantage of this vulnerability by
creating a malicious symbolic link in a directory where the temporary files
will be created. When the program attempts to perform an operation on a
temporary file, it will instead perform the operation on the file pointed to
by the malicious symbolic link.
Exploitation would most likely result in loss of data or a denial of service
if critical files are overwritten in the attack. Other attacks may be
possible as well.
Nokia Affix BTFTP Client Filename Remote Buffer Overflow Vulnerability
BugTraq ID: 14230
Remote: Yes
Date Published: 2005-07-12
Relevant URL: http://www.securityfocus.com/bid/14230
Summary:
The Nokia Affix btftp client software is prone to a remote client-side
buffer overflow vulnerability. The issue exists due to a lack of sufficient
boundary checks that are performed on filename data before this data is
copied into a finite memory buffer.
This issue may be exploited by an attacker that is under control of an OBEX
File Transfer server, to execute arbitrary code in the context of the
affected clients that connect to the malicious server, and request a
directory listing.
Nokia Affix BTSRV/BTOBEX Remote Command Execution Vulnerability
BugTraq ID: 14232
Remote: Yes
Date Published: 2005-07-12
Relevant URL: http://www.securityfocus.com/bid/14232
Summary:
Nokia Affix btsrv/btobex are reported prone to a remote command execution
vulnerability. The issue exists due to a lack of input sanitization that is
performed before using attacker-controlled data in a 'system()' call.
Because the affected services run with superuser privileges, this issue may
be exploited to fully compromise a target computer that is running the
affected software.
Linux-HA heartbeat Insecure Temporary File Creation Vulnerability
BugTraq ID: 14233
Remote: No
Date Published: 2005-07-12
Relevant URL: http://www.securityfocus.com/bid/14233
Summary:
heartbeat creates temporary files in an insecure manner.
A local attacker would most likely take advantage of this vulnerability by
creating a malicious symbolic link in a directory where the temporary files
will be created. When the program attempts to perform an operation on a
temporary file, it will instead perform the operation on the file pointed to
by the malicious symbolic link.
Exploitation would most likely result in loss of data or a denial of service
if critical files are overwritten in the attack. Other attacks may be
possible as well.
MIT Kerberos 5 Key Distribution Center Remote Single Byte Heap Overflow
Vulnerability
BugTraq ID: 14236
Remote: Yes
Date Published: 2005-07-12
Relevant URL: http://www.securityfocus.com/bid/14236
Summary:
The Kerberos 5 Key Distribution Center (KDC) implementation is affected by a
remote single-byte heap overflow vulnerability.
A remote unauthenticated attacker can exploit this vulnerability by sending
malformed data through a request over TCP or UDP to an affected computer.
This may result in memory corruption and lead to an overflow condition.
If arbitrary code execution occurs, the attacker may gain complete access to
an entire Kerberos realm.
All MIT Kerberos 5 releases up to and including krb5-1.4.1 are vulnerable.
Third party application servers employing Kerberos 5 may be affected as well.
MIT Kerberos 5 KRB5_Recvauth Remote Pre-Authentication Double-Free
Vulnerability
BugTraq ID: 14239
Remote: Yes
Date Published: 2005-07-12
Relevant URL: http://www.securityfocus.com/bid/14239
Summary:
MIT Kerberos 5 is prone to a remote double-free vulnerability; the issue can
be triggered by remote attackers prior to any authentication whatsoever. The
issue exists in the 'revcauth_common()' helper function.
A remote attacker may trigger this issue prior to authentication. Because of
the code path taken in the vulnerable function, exploitation may be
hindered. However, it is conjectured that this issue may be ultimately
leveraged to execute arbitrary code in the context of the affected service.
It should be noted that successful exploitation of this issue on a Kerberos
Key Distribution Center (KDC) computer, may result in the compromise of an
entire Kerberos realm.
MIT Kerberos 5 Key Distribution Center Remote Denial of Service
Vulnerability
BugTraq ID: 14240
Remote: Yes
Date Published: 2005-07-12
Relevant URL: http://www.securityfocus.com/bid/14240
Summary:
The Kerberos 5 Key Distribution Center (KDC) implementation is affected by a
remote denial of service vulnerability. This issue arises because the
application attempts to free uninitialized memory at a random address when
handling a remote request over TCP.
Specifically, the vulnerability arises when the application handles a
principle name consisting of zero components.
All MIT Kerberos 5 releases up to and including krb5-1.4.1 are vulnerable.
Third party application servers employing Kerberos 5 may be affected as well.
Mozilla Suite, Firefox And Thunderbird Multiple Vulnerabilities
BugTraq ID: 14242
Remote: Yes
Date Published: 2005-07-13
Relevant URL: http://www.securityfocus.com/bid/14242
Summary:
The Mozilla Foundation has released 12 security advisories specifying
security vulnerabilities in Mozilla Suite, Firefox, and Thunderbird.
These vulnerabilities allow attackers to execute arbitrary machine code in
the context of the vulnerable application, bypass security checks, execute
script code in the context of targeted Web sites to disclose confidential
information; other attacks are also possible.
These vulnerabilities have been addressed in Firefox version 1.0.5, Mozilla
Suite 1.7.9. Mozilla Thunderbird has not been fixed at this time.
The issues described here will be split into individual BIDs as further
analysis is completed. This BID will then be retired.
Reportedly, Netscape is also vulnerable to the issue described in MFSA
2005-47. Due to the nature of Netscape's fork from the Mozilla codebase, it
is likely that Netscape is also affected by most, or all of the issues that
affect Mozilla Firefox. This has not been confirmed at this time.
Easy Software Products CUPS Access Control List Bypass Vulnerability
BugTraq ID: 14265
Remote: Yes
Date Published: 2005-07-14
Relevant URL: http://www.securityfocus.com/bid/14265
Summary:
CUPS is susceptible to an ACL (Access Control List) bypass vulnerability.
This issue is due to a failure of the application to properly apply ACLs to
incoming print jobs.
This vulnerability allows attackers to bypass configured ACLs, allowing them
to print jobs on printers, skipping any configured authentication checks or
IP restrictions.
More information about the gull-annonces
mailing list