Articles / Debian

All articles tagged with Debian

October 08, 2012 05:33 Debian: Security update for TYPO3

0

Several vulnerabilities were discovered in TYPO3, a content management system. An insecure call to unserialize in the help system enables arbitrary code execution by authenticated users. The TYPO3 backend contains several cross-site scripting vulnerabilities.

Authenticated users who can access the configuration module can obtain the encryption key, allowing them to escalate their privileges. The RemoveXSS HTML sanitizer did not remove several HTML5 JavaScript, thus failing to mitigate the impact of cross-site scripting vulnerabilities.

Updated packages are available from security.debian.org.

October 08, 2012 05:32 Debian: Security update for otrs2

0

It was discovered that otrs2, a ticket request system, contains a cross-site scripting vulnerability when email messages are viewed using Internet Explorer. This update also improves the HTML security filter to detect tag nesting. Updated packages are available from security.debian.org.

October 08, 2012 05:29 Debian: Security update for rtfm

0

It was discovered that rtfm, the Request Tracker FAQ Manager, contains multiple cross-site scripting vulnerabilities in the topic administration page. Updated packages are available from security.debian.org.

October 04, 2012 08:49 Debian: Security update for PostgreSQL

0

Two vulnerabilities related to XML processing were discovered in PostgreSQL, an SQL database. contrib/xml2’s xslt_process() can be used to read and write external files and URLs. xml_parse() fetches external files or URLs to resolve DTD and entity references in XML values. Updated packages are available from security.debian.org.

October 04, 2012 08:48 Debian: Security update for The Gimp

0

This update of The Gimp fixes a heap overflow that could have been exploited by attackers to cause a Denial of Service (application crash) or to potentially execute arbitrary code. Updated packages are available from security.debian.org.

October 04, 2012 08:46 Debian: Security update for Performance Co-Pilot

0

It was discovered that Performance Co-Pilot (pcp), a framework for performance monitoring, contains several vulnerabilites. Multiple buffer overflows in the PCP protocol decoders can cause PCP clients and servers to crash or, potentially, execute arbitrary code while processing crafted PDUs. The “linux” PMDA used by the pmcd daemon discloses sensitive information from the /proc file system to unauthenticated clients.

Multiple memory leaks processing crafted requests can cause pmcd to consume large amounts of memory and eventually crash. Incorrect event-driven programming allows malicious clients to prevent other clients from accessing the pmcd daemon.

Updated packages are available from security.debian.org.

October 01, 2012 07:49 Debian: Security update for Performance Co-Pilot

0

It was discovered that Performance Co-Pilot (pcp), a framework for performance monitoring, contains several vulnerabilites. Multiple buffer overflows in the PCP protocol decoders can cause PCP clients and servers to crash or, potentially, execute arbitrary code while processing crafted PDUs. The “linux” PMDA used by the pmcd daemon discloses sensitive information from the /proc file system to unauthenticated clients. Multiple memory leaks processing crafted requests can cause pmcd to consume large amounts of memory and eventually crash.

Incorrect event-driven programming allows malicious clients to prevent other clients from accessing the pmcd daemon. Updated packages are available from security.debian.org.

October 01, 2012 07:41 Debian: Security update for libapache2-mod-rpaf

0

Sebastien Bocahu discovered that the reverse proxy add forward module for the Apache webserver is vulnerable to a denial of service attack through a single crafted request with many headers. Updated packages are available from security.debian.org.

September 28, 2012 06:30 Debian: Security update for Xen

0

Several denial-of-service vulnerabilities have been discovered in Xen, the popular virtualization software. Guest mode unprivileged code, which has been granted the privilege to access MMIO regions, may leverage that access to crash the whole guest. Since this be used to crash a client from within, this vulnerability is consider with low impact. A guest kernel can cause the host to become unresponsive for a period of time, potentially leading to a DoS. Since an attacker with full control in the guest can impact on the host, this vulnerability is consider with high impact.

Updated packages are available from security.debian.org.

September 26, 2012 07:17 Debian: Security update for rssh

0

Henrik Erkkonen discovered that rssh, a restricted shell for SSH, does not properly restrict shell access. Updated packages are available from security.debian.org.

September 26, 2012 07:16 Debian: Security update for Django

0

Jeroen Dekkers and others reported several vulnerabilities in Django, a Python Web framework. Two functions do not validate the scheme of a redirect target, which might allow remote attackers to conduct cross-site scripting (XSS) attacks via a data: URL. The ImageField class completely decompresses image data during image validation, which allows remote attackers to cause a denial of service (memory consumption) by uploading an image file.

The get_image_dimensions function in the image-handling functionality uses a constant chunk size in all attempts to determine dimensions, which allows remote attackers to cause a denial of service (process or thread consumption) via a large TIFF image.

Updated packages are available from security.debian.org.

September 26, 2012 07:15 Debian: Security update for Icedove

0

Several vulnerabilities were discovered in Icedove, Debian’s version of the Mozilla Thunderbird mail and news client. Multiple unspecified vulnerabilities in the browser engine were fixed. The underlying browser engine allows address bar spoofing through drag-and-drop. A use-after-free vulnerability in the nsDocument::AdoptNode function allows remote attackers to cause a denial of service (heap memory corruption) or possibly execute arbitrary code.

An error in the implementation of the Javascript sandbox allows execution of Javascript code with improper privileges using javascript: URLs.

Updated packages are available from security.debian.org.

September 24, 2012 12:56 Debian: Security update for PHP

0

Several vulnerabilities have been discovered in PHP, the web scripting language. A buffer overflow in the scandir() function could lead to denial of service of the execution of arbitrary code. It was discovered that inconsistent parsing of PDO prepared statements could lead to denial of service. Updated packages are available from security.debian.org.

September 24, 2012 12:54 Ubuntu: Security update for libotr

0

Just Ferguson discovered that libotr, an off-the-record (OTR) messaging library, can be forced to perform zero-length allocations for heap buffers that are used in base64 decoding routines. An attacker can exploit this flaw by sending crafted messages to an application that is using libotr to perform denial of service attacks or potentially execute arbitrary code. Updated packages are available from security.debian.org.

September 19, 2012 22:01 Debian: Security update for Expat

0

It was discovered that Expat, a C library to parse XML, is vulnerable to denial of service through hash collisions and a memory leak in pool handling. Updated packages are available from security.debian.org.

September 19, 2012 21:58 Debian: Security update for OpenTTD

0

Two denial of service vulnerabilities have been discovered in the server component of OpenTTD, a free reimplementation of Transport Tycoon Deluxe. Updated packages are available from security.debian.org.

September 17, 2012 07:38 Debian: Security update for GridFTP

0

It was discovered that the GridFTP component from the Globus Toolkit, a toolkit used for building Grid systems and applications performed insufficient validation of a name lookup, which could lead to privilege escalation. Updated packages are available from security.debian.org.

September 17, 2012 07:36 Debian: Security update for FCKeditor

0

Emilio Pinna discovered a cross site scripting vulnerability in the spellchecker.php page of FCKeditor, a popular html/text editor for the web. Updated packages are available from security.debian.org.

September 17, 2012 07:33 Debian: Security update for libxml

0

Jueri Aedla discovered several integer overflows in libxml, which could lead to the execution of arbitrary code or denial of service. Updated packages are available from security.debian.org.

September 14, 2012 13:46 Debian: Security update for OpenOffice.org

0

Timo Warns from PRE-CERT discovered multiple heap-based buffer overflows in OpenOffice.org, an office productivity suite. The issues lies in the XML manifest encryption tag parsing code. Using specially crafted files, an attacker can cause application crash and could cause arbitrary code execution. Updated packages are available from security.debian.org.

September 12, 2012 07:37 Debian: Security update for ISC dhcpd

0

Several security vulnerabilities affecting ISC dhcpd, a server for automatic IP address assignment, have been discovered. BlueCat Networks discovered that it is possible to crash DHCP servers configured to evaluate requests with regular expressions via crafted DHCP request packets. Markus Hietava of the Codenomicon CROSS project discovered that it is possible to force the server to enter an infinite loop via messages with malformed client identifiers.

Glen Eustace discovered that DHCP servers running in DHCPv6 mode and possibly DHCPv4 mode suffer of memory leaks while processing messages. An attacker can use this flaw to exhaust resources and perform denial of service attacks.

Updated packages are available from security.debian.org.

September 10, 2012 06:44 Debian: Security update for Kerberos

0

Emmanuel Bouillon from NCI Agency discovered multiple vulnerabilities in MIT Kerberos, a daemon implementing the network authentication protocol. By sending specially crafted AS-REQ (Authentication Service Request) to a KDC (Key Distribution Center), an attacker could make it free an uninitialized pointer, corrupting the heap. This can lead to process crash or even arbitrary code execution. By sending specially crafted AS-REQ to a KDC, an attacker could make it dereference an uninitialized pointer, leading to process crash or even arbitrary code execution

Updated packages are available from security.debian.org.

September 07, 2012 07:03 Ubuntu: Security update for bind9

0

Einar Lonn discovered that under certain conditions bind9, a DNS server, may use cached data before initialization. As a result, an attacker can trigger and assertion failure on servers under high query load that do DNSSEC validation. Updated packages are available from security.debian.org.

September 05, 2012 11:56 Debian: Security update for ISC DHCP

0

Markus Hietava of the Codenomicon CROSS project discovered that it is possible to force the server to enter an infinite loop via messages with malformed client identifiers. Glen Eustace discovered that DHCP servers running in DHCPv6 mode and possibly DHCPv4 mode suffer of memory leaks while processing messages. An attacker can use this flaw to exhaust resources and perform denial of service attacks.

Updated packages are available from security.debian.org.

September 03, 2012 06:42 Debian: Security update for FreeBSD

0

Rafal Wojtczuk from Bromium discovered that FreeBSD wasn’t handling correctly uncanonical return addresses on Intel amd64 CPUs, allowing privilege escalation to kernel for local users. Updated packages are available from security.debian.org.

August 31, 2012 06:06 Debian: Security update for NSD

0

Marek Vavruša and Lubos Slovak discovered that NSD, an authoritative domain name server, is not properly handling non-standard DNS packets. his can result in a NULL pointer dereference and crash the handling process. A remote attacker can abuse this flaw to perform denial of service attacks. Updated packages are available from security.debian.org.

August 27, 2012 11:36 Debian: Security update for Iceweasel

0

Several vulnerabilities have been discovered in Iceweasel, a web browser based on Firefox. The included XULRunner library provides rendering services for several other applications. Benoit Jacob, Jesse Ruderman, Christian Holler, and Bill McCloskey identified several memory safety problems that may lead to the execution of arbitrary code. Mario Gomes and Code Audit Labs discovered that it is possible to force iceweasel to display the URL of the previous entered site through drag and drop actions to the address bar. This can be abused to perform phishing attacks.

Abhishek Arya discovered a use-after-free problem in nsDocument::AdoptNode that may lead to the execution of arbitrary code. moz_bug_r_a4 discovered that it is possible to perform cross-site scripting attacks through the context menu when using data: URLs. moz_bug_r_a4 discovered that in certain cases, javascript: URLs can be executed so that scripts can escape the JavaScript sandbox and run with elevated privileges.

Updated packages are available from security.debian.org.

August 24, 2012 08:00 Debian: Security update for Iceape

0

Several vulnerabilities have been found in the Iceape internet suite, an unbranded version of Seamonkey. Benoit Jacob, Jesse Ruderman, Christian Holler, and Bill McCloskey identified several memory safety problems that may lead to the execution of arbitrary code. Abhishek Arya discovered a use-after-free problem in nsDocument::AdoptNode that may lead to the execution of arbitrary code. moz_bug_r_a4 discovered that in certain cases, javascript:: URLs can be executed so that scripts can escape the JavaScript sandbox and run with elevated privileges. This can lead to arbitrary code execution.

Updated packages are available from security.debian.org.

August 22, 2012 09:28 Debian: Security update for eXtplorer

0

John Leitch has discovered a vulnerability in eXtplorer, a very feature rich web server file manager, which can be exploited by malicious people to conduct cross-site request forgery attacks. The vulnerability allows users to perform certain actions via HTTP requests without performing any validity checks to verify the request. This can be exploited for example, to create an administrative user account by tricking an logged administrator to visiting an attacker-defined web link.

Updated packages are available from security.debian.org.

August 22, 2012 09:27 Debian: Security update for Mono

0

Marcus Meissner discovered that the web server included in Mono performed insufficient sanitising of requests, resulting in cross-site scripting. Updated packages are available from security.debian.org.

Screenshot

Project Spotlight

JFreeSVG

A fast, lightweight SVG generator for Java.

Screenshot

Project Spotlight

PHP MIME Mail decoder class

A PHP class to decode email messages.