[gull-annonces] Résumé SecurityFocus Newsletter #313

Marc SCHAEFER schaefer at alphanet.ch
Sat Sep 3 17:15:46 CEST 2005


Elm Expires Header Remote Buffer Overflow Vulnerability
BugTraq ID: 14613
Remote: Yes
Date Published: 2005-08-20
Relevant URL: http://www.securityfocus.com/bid/14613
Summary:
Elm is prone to a buffer overflow vulnerability which could allow an 
attacker to execute malicious code.  This issue is due to a failure in the 
application to perform proper bounds checking on user-supplied data.

A successful attack can result in overflowing a finite sized buffer and may 
ultimately lead to arbitrary code execution in the context of the affected 
application.

PCRE Regular Expression Heap Overflow Vulnerability
BugTraq ID: 14620
Remote: Yes
Date Published: 2005-08-20
Relevant URL: http://www.securityfocus.com/bid/14620
Summary:
PCRE is prone to a heap overflow vulnerability.  This issue is due to a 
failure of the library to properly bounds check user-supplied input prior to 
copying data to an internal memory buffer. 
The impact of successful exploitation of this vulnerability depends on the 
application and the user credentials utilizing the vulnerable library.  
Successful attack may ultimately permit an attacker to control the contents 
of critical memory control structures and write arbitrary data to arbitrary 
memory locations.

lm_sensors pwmonfig Insecure Temporary File Creation Vulnerability
BugTraq ID: 14624
Remote: No
Date Published: 2005-08-22
Relevant URL: http://www.securityfocus.com/bid/14624
Summary:
lm_sensors creates temporary files in an insecure manner. The issue exists 
in the 'pwmconfig' script.

Exploitation would most likely result in loss of data or a denial of service 
if critical files are overwritten in the attack. Other attacks may be 
possible as well.

lm_sensors version 2.9.1 is reportedly affected, however, other versions may 
be vulnerable as well.

slLocate Local Database Corruption Vulnerability
BugTraq ID: 14640
Remote: No
Date Published: 2005-08-23
Relevant URL: http://www.securityfocus.com/bid/14640
Summary:
slocate is susceptible to a local database corruption vulnerability. This 
issue is due to a failure of the application to handle unexpected directory 
and filename input.

This issue presents itself when the affected utility attempts to index 
specially crafted directory structures. The utility fails to handle the 
directory structure, and fails to complete the indexing process.

This vulnerability allows local attackers to cause the premature failure of 
the index process, resulting in an incomplete database. If the database is 
used in further security, backup, or other critical functions, incomplete 
data may result in the failure of services dependent on it.

This issue is reported in version 2.7 of slocate, but other versions may 
also be affected.

PADL Software pam_ldap Authentication Bypass Vulnerability
BugTraq ID: 14649
Remote: Yes
Date Published: 2005-08-24
Relevant URL: http://www.securityfocus.com/bid/14649
Summary:
pam_ldap is prone to an authentication bypass vulnerability when handling 
new password policy control.  This could allow an unauthorized user to 
bypass authentication.

This vulnerability was reported to affect pam_ldap builds 169 through 179.

MPlayer Audio Header Buffer Overflow Vulnerability
BugTraq ID: 14652
Remote: Yes
Date Published: 2005-08-24
Relevant URL: http://www.securityfocus.com/bid/14652
Summary:
A buffer overflow vulnerability affects MPlayer. This issue is due to a 
failure of the application to properly validate the length of user-supplied 
strings prior to copying them into static process buffers.

The problem presents itself when the affected application attempts to 
process audio streams that contain overly large values in their header.

An attacker may exploit this issue to execute arbitrary code with the 
privileges of the user that activated the vulnerable application. This may 
facilitate unauthorized access or privilege escalation.

Tor Cryptographic Handshake Remote Information Disclosure Vulnerability
BugTraq ID: 14659
Remote: Yes
Date Published: 2005-08-25
Relevant URL: http://www.securityfocus.com/bid/14659
Summary:
Tor is susceptible to a remote information disclosure vulnerability. This 
issue is due to a flaw in the implementation of the Diffie-Hellman key 
exchange protocol.

Specifically, certain values used during the Diffie-Hellman key exchange 
protocol are insecure, and when used, lead to the ability of attackers to 
access the negotiated encryption keys.

This vulnerability allows attackers to gain access to the negotiated keys 
used to encrypt the communications between Tor servers and clients. This 
allows attackers to read or modify all the traffic that is sent from the 
targeted user over the Tor network. The anonymity, confidentiality, and 
integrity guarantees of the network are lost through the exploitation of 
this issue.

[ r?seau ? acc?s de contenu proxifi? de telle mani?re ? ce que le fait
  que deux machines ?changent du contenu, m?me ind?termin?, ne soit pas
  d?tectable.
]

Apache CGI Byterange Request Denial of Service Vulnerability
BugTraq ID: 14660
Remote: Yes
Date Published: 2005-08-25
Relevant URL: http://www.securityfocus.com/bid/14660
Summary:
Apache is prone to a denial of service when handling large CGI byterange 
requests.  
44. Linux Kernel 64 Bit ELF Header Processing Memory Leak Local Denial Of 
Service Vulnerability
BugTraq ID: 14661
Remote: No
Date Published: 2005-08-25
Relevant URL: http://www.securityfocus.com/bid/14661
Summary:
A local denial of service vulnerability affects the Linux kernel's ELF 
header processing functionality on 64 bit x86 platforms.

A successful attack can allow a local attacker to trigger a denial of 
service condition in the kernel.

This issue may be related to BID 11846 (Linux Kernel 64 Bit ELF Header Local 
Denial Of Service Vulnerability).  Due to a lack of information, this cannot 
be confirmed at the moment.  This BID will be retired if further analysis 
reveals that the issues are identical.

Astaro Security Linux HTTP CONNECT Unauthorized Access Weakness
BugTraq ID: 14665
Remote: Yes
Date Published: 2005-08-25
Relevant URL: http://www.securityfocus.com/bid/14665
Summary:
Astaro Security Linux is prone to a weakness that may allow remote attackers 
to connect to arbitrary ports on a vulnerable computer.

This weakness may be combined with other attacks to exploit latent 
vulnerabilities.  An attacker can bypass access controls implemented by the 
application through this attack.

Astaro Security Linux 6.001 is prone to this weakness.

simpleproxy Remote Syslog() Format String Vulnerability
BugTraq ID: 14666
Remote: Yes
Date Published: 2005-08-26
Relevant URL: http://www.securityfocus.com/bid/14666
Summary:
It is reported that simpleproxy contains a format string vulnerability. This 
issue is due to a failure of the applications to properly sanitize 
user-supplied input before using it as the format specifier in a formatted 
printing function.

Successful exploitation of this issue will allow an attacker to execute 
arbitrary code on the affected computer with the privileges of the affected 
package. This application may be run as the superuser in order to proxy 
privileged TCP ports.

Versions of simpleproxy prior to 3.4 are reported susceptible to this 
vulnerability.

ntpd Insecure Privileges Vulnerability
BugTraq ID: 14673
Remote: Yes
Date Published: 2005-08-27
Relevant URL: http://www.securityfocus.com/bid/14673
Summary:
ntpd is prone to an insecure privileges vulnerability.

The application may be started with the effective permissions of a 
privileged user, and if the application is compromised by some other means, 
may allow an attacker to conduct further exploits.




More information about the gull-annonces mailing list