[gull-annonces] Résumé SecurityFocus Newsletter #308
Marc SCHAEFER
schaefer at alphanet.ch
Sun Jul 31 18:07:03 CEST 2005
PowerDNS LDAP Backend Query Escape Failure Vulnerability
BugTraq ID: 14290
Remote: Yes
Date Published: 2005-07-17
Relevant URL: http://www.securityfocus.com/bid/14290
Summary:
The PowerDNS LDAP back-end did not adequately escape requests prior to
version 2.9.18. As a result, it was possible for requests to fail without
answering questions. This may have security implications in environments
where PowerDNS and LDAP are used. The vendor has fixed this in version
2.9.18.
PowerDNS Recursive Query Denial of Service Vulnerability
BugTraq ID: 14291
Remote: Yes
Date Published: 2005-07-17
Relevant URL: http://www.securityfocus.com/bid/14291
Summary:
A denial of service vulnerability affects PowerDNS. The vulnerability
allows for remote attackers from external networks to cause lookups for
authorized hosts to fail. The technical details of this vulnerability are
not yet available. The condition occurs when PowerDNS is configured to
allow only hosts from specific IP address ranges to perform recursive
queries.
Shorewall MACLIST Firewall Rules Bypass Vulnerability
BugTraq ID: 14292
Remote: Yes
Date Published: 2005-07-18
Relevant URL: http://www.securityfocus.com/bid/14292
Summary:
Shorewall is susceptible to a firewall rules bypass vulnerability. This
issue is due to a failure of the software to properly implement expected
firewall rules for MAC address-based filtering.
This issue arrises when 'MACLIST_TTL' is greater than 0, or
'MACLIST_DISPOSITION' is configured as 'ACCEPT'.
This vulnerability allows attackers to bypass firewall rules, letting them
attack protected services and computers without further restriction.
This also issue leads to a false sense of security by firewall
administrators.
KDE Kate, KWrite Local Backup File Information Disclosure Vulnerability
BugTraq ID: 14297
Remote: No
Date Published: 2005-07-18
Relevant URL: http://www.securityfocus.com/bid/14297
Summary:
KDE kate, and kwrite are susceptible to a local information disclosure
vulnerability. This issue is due to a failure of the applications to
maintain secure file permissions when creating backup files.
This vulnerability allows local attackers to gain access to the contents of
potentially sensitive files.
Note: Since these applications are network-aware, under some unknown
circumstances, this issue may not be restricted to local attackers.
MRV Communications In-Reach Console Servers Access Control Bypass
Vulnerability
BugTraq ID: 14300
Remote: Yes
Date Published: 2005-07-18
Relevant URL: http://www.securityfocus.com/bid/14300
Summary:
In-Reach console servers are affected by an access control bypass
vulnerability.
Under certain circumstances, the vulnerable devices fail to verify port
based access controls and allows a user to access any port or console.
This issue affects In-Reach LX-8000, 4000 and 1000 series devices running
software version 3.5.0. Other models may be vulnerable as well.
[ firmware ]
EKG Insecure Temporary File Creation Vulnerability
BugTraq ID: 14307
Remote: No
Date Published: 2005-07-18
Relevant URL: http://www.securityfocus.com/bid/14307
Summary:
ekg is reported prone to an unspecified insecure temporary file creation
vulnerability. This issue is likely due to a design error that causes the
application to fail to verify the existence of a file before writing to it.
The details available regarding this issue are not sufficient to provide an
in depth technical description. This BID will be updated when more
information becomes available.
An attacker may leverage this issue to overwrite arbitrary files with the
privileges of an unsuspecting user that activates the vulnerable
application.
EKG Unspecified Command Execution Vulnerability
BugTraq ID: 14308
Remote: Yes
Date Published: 2005-07-18
Relevant URL: http://www.securityfocus.com/bid/14308
Summary:
ekg is affected by an unspecified command execution vulnerability.
A successful attack would involve executing shell commands in the context of
the application. It may be possible for an attacker to gain unauthorized
access to an affected computer by exploiting this issue.
Mozilla Firefox Weak Authentication Mechanism Vulnerability
BugTraq ID: 14325
Remote: Yes
Date Published: 2005-07-19
Relevant URL: http://www.securityfocus.com/bid/14325
Summary:
Firefox is affected by a vulnerability that may result in sending
authentication credentials across the network in plaintext format.
By default, the browser chooses basic authentication even if other
authentication schemas such as Digest or NTLM are available from the server.
Mozilla Firefox 1.0.4 and 1.0.5 running on Windows are confirmed to be
vulnerable. Other versions on different platforms may be affected as well.
FreeBSD Jail() Devfs Ruleset Bypass Vulnerability
BugTraq ID: 14334
Remote: No
Date Published: 2005-07-20
Relevant URL: http://www.securityfocus.com/bid/14334
Summary:
FreeBSD is prone to a vulnerability that may allow local attackers to gain
access to restricted resources on a computer.
This issue allows local attackers to access hidden device nodes on devfs
file systems from within a jail. The attacker can create sensitive device
nodes in the jail with default access permissions.
A successful attack can lead to information disclosure and privilege
escalation.
Greasemonkey Multiple Remote Information Disclosure Vulnerabilities
BugTraq ID: 14336
Remote: Yes
Date Published: 2005-07-20
Relevant URL: http://www.securityfocus.com/bid/14336
Summary:
Greasemonkey is susceptible to multiple remote information disclosure
vulnerabilities. These issues are due to a design error allowing insecure
JavaScript functions to be executed by remote Web sites.
The specified issues exist in the 'GM_xmlhttpRequest()', 'GM_setValue()',
and 'GM_scripts()' functions.
Other GM_* functions also likely to be affected, but the exact functions are
not known at this time.
These vulnerabilities allow remote attackers to retrieve the contents of
arbitrary files, retrieve directory listings from arbitrary locations, and
retrieve the contents of various private Greasemonkey data structures. This
aids them in further attacks.
Zlib Compression Library Decompression Denial Of Service Vulnerability
BugTraq ID: 14340
Remote: Yes
Date Published: 2005-07-21
Relevant URL: http://www.securityfocus.com/bid/14340
Summary:
Zlib is susceptible to a denial of service vulnerability. This issue is due
to a failure of the library to properly handle unexpected input to its
decompression routines.
Certain values used during decompression are incorrectly specified, allowing
invalid inflate input to crash the library.
This vulnerability allows attackers to crash applications that utilize the
affected library.
EKG LIbGadu Multiple Remote Integer Overflow Vulnerabilities
BugTraq ID: 14345
Remote: Yes
Date Published: 2005-07-21
Relevant URL: http://www.securityfocus.com/bid/14345
Summary:
EKG libgadu is susceptible to multiple remote integer overflow
vulnerabilities. These issues are due to a failure of the application to
properly sanitize user-supplied input data prior to using it in memory
allocation and copy operations.
Attackers may exploit these vulnerabilities to execute arbitrary machine
code in the context of applications that utilize the affected library.
Failed exploitation attempts likely result in crashed applications.
Fetchmail POP3 Client Buffer Overflow Vulnerability
BugTraq ID: 14349
Remote: Yes
Date Published: 2005-07-21
Relevant URL: http://www.securityfocus.com/bid/14349
Summary:
Fetchmail POP3 client is prone to a buffer overflow vulnerability. This
issue presents itself because the application fails to perform boundary
checks prior to copying user-supplied data into sensitive process buffers.
This includes POP variants such as APOP, and others.
A successful attack can result in overflowing a finite sized buffer and
ultimately leading to arbitrary code execution in the context of the
fetchmail process. This may allow the attacker to gain elevated privileges.
More information about the gull-annonces
mailing list