plone -- user can masquerade as a group plone 2.52.5.1_1

Plone.org reports:

PlonePAS-using Plone releases (Plone 2.5 and Plone 2.5.1) has a potential vulnerability that allows a user to masquerade as a group. Please update your sites.

21460 CVE-2006-4249 http://plone.org/products/plone-hotfix/releases/20061031 2006-11-02 2006-12-27
proftpd -- remote code execution vulnerabilities proftpd proftpd-mysql 1.3.0_5

The proftpd development team reports that several remote buffer overflows had been found in the proftpd server.

CVE-2006-5815 CVE-2006-6170 2006-11-10 2006-12-21
gzip -- multiple vulnerabilities FreeBSD 6.16.1_7 6.06.0_12 5.55.5_5 5.45.4_19 5.35.3_34 4.11_22 gzip 1.3.12

Problem Description

Multiple programming errors have been found in gzip which can be triggered when gzip is decompressing files. These errors include insufficient bounds checks in buffer use, a NULL pointer dereference, and a potential infinite loop.

Impact

The insufficient bounds checks in buffer use can cause gzip to crash, and may permit the execution of arbitrary code. The NULL pointer deference can cause gzip to crash. The infinite loop can cause a Denial-of-Service situation where gzip uses all available CPU time.

Workaround

No workaround is available.

CVE-2006-4334 CVE-2006-4335 CVE-2006-4336 CVE-2006-4337 CVE-2006-4338 SA-06:21.gzip 2006-09-19 2006-12-19 2016-08-09
bind9 -- Denial of Service in named(8) FreeBSD 6.16.1_6 6.06.0_11 5.55.5_4 5.45.4_18 5.05.3_33 bind9 9.09.3.2.1

Problem Description

For a recursive DNS server, a remote attacker sending enough recursive queries for the replies to arrive after all the interested clients have left the recursion queue will trigger an INSIST failure in the named(8) daemon. Also for a recursive DNS server, an assertion failure can occur when processing a query whose reply will contain more than one SIG(covered) RRset.

For an authoritative DNS server serving a RFC 2535 DNSSEC zone which is queried for the SIG records where there are multiple SIG(covered) RRsets (e.g. a zone apex), named(8) will trigger an assertion failure when it tries to construct the response.

Impact

An attacker who can perform recursive lookups on a DNS server and is able to send a sufficiently large number of recursive queries, or is able to get the DNS server to return more than one SIG(covered) RRsets can stop the functionality of the DNS service.

An attacker querying an authoritative DNS server serving a RFC 2535 DNSSEC zone may be able to crash the DNS server.

Workaround

A possible workaround is to only allow trusted clients to perform recursive queries.

CVE-2006-4095 CVE-2006-4096 SA-06:20.bind 2006-09-06 2006-12-19 2016-08-09
openssl -- Incorrect PKCS#1 v1.5 padding validation in crypto(3) FreeBSD 6.16.1_6 6.06.0_11 5.55.5_4 5.45.4_18 5.35.3_33 4.11_21 openssl 0.9.80.9.8c_9 0.9.7k_0

Problem Description

When verifying a PKCS#1 v1.5 signature, OpenSSL ignores any bytes which follow the cryptographic hash being signed. In a valid signature there will be no such bytes.

Impact

OpenSSL will incorrectly report some invalid signatures as valid. When an RSA public exponent of 3 is used, or more generally when a small public exponent is used with a relatively large modulus (e.g., a public exponent of 17 with a 4096-bit modulus), an attacker can construct a signature which OpenSSL will accept as a valid PKCS#1 v1.5 signature.

Workaround

No workaround is available.

CVE-2006-4339 SA-06:19.openssl 2006-09-06 2006-12-19 2016-08-09
sql-ledger -- multiple vulnerabilities sql-ledger 2.6.22

The Debian security Team reports:

Several remote vulnerabilities have been discovered in SQL Ledger, a web based double-entry accounting program, which may lead to the execution of arbitrary code. The Common Vulnerabilities and Exposures project identifies the following problems:

Chris Travers discovered that the session management can be tricked into hijacking existing sessions.

Chris Travers discovered that directory traversal vulnerabilities can be exploited to execute arbitrary Perl code.

It was discovered that missing input sanitising allows execution of arbitrary Perl code.

CVE-2006-4244 CVE-2006-4731 CVE-2006-5872 http://www.us.debian.org/security/2006/dsa-1239 2006-12-17 2006-12-18
dbus -- match_rule_equal() Weakness dbus 1.0.2

Secunia reports:

D-Bus have a weakness, which can be exploited by malicious, local users to cause a DoS (Denial of Service).

An error within the "match_rule_equal()" function can be exploited to disable the ability of other processes to receive messages by removing their matches from D-Bus.

CVE-2006-6107 http://www.freedesktop.org/wiki/Software/dbus https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=218055 http://secunia.com/advisories/23373/ 2006-12-12 2006-12-14
evince -- Buffer Overflow Vulnerability evince 0.6.1_1

Secunia reports:

A vulnerability has been discovered in Evince, which can be exploited by malicious people to compromise a user's system.

The vulnerability is caused due to a boundary error within the "get_next_text()" function in ps/ps.c. This can be exploited to cause a buffer overflow by e.g. tricking a user into opening a specially crafted PostScript file.

CVE-2006-5864 http://secunia.com/advisories/23111/ 2006-11-27 2006-12-14
tdiary -- injection vulnerability ja-tdiary tdiary 2.0.3 ja-tdiary-devel tdiary-devel 2.12.1.4_2

An undisclosed eRuby injection vulnerability had been discovered in tDiary.

http://sourceforge.net/forum/forum.php?forum_id=642685 2006-12-10 2006-12-13 2007-03-16
wv -- Multiple Integer Overflow Vulnerabilities wv 1.2.3

Secunia reports:

Some vulnerabilities have been reported in wvWare, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise an application using the library.

The vulnerabilities are caused due to integer overflows within the "wvGetLFO_records()" and "wvGetLFO_PLF()" functions. These can be exploited to cause heap-based buffer overflows by e.g. tricking a user to open a specially crafted Microsoft Word document with an application using the library.

CVE-2006-4513 http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=433 http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=434 http://secunia.com/advisories/22595/ 2006-10-26 2006-12-13
wv2 -- Integer Overflow Vulnerability wv2 0.2.3

Secunia reports:

A vulnerability has been reported in wvWare wv2 Library, which potentially can be exploited by malicious people to compromise an application using the library.

The vulnerability is caused due to an integer overflow error in "word_helper.h" when handling a Word document. This can be exploited to cause a buffer overflow and may allow arbitrary code execution via a specially crafted Word document.

CVE-2006-2197 http://secunia.com/advisories/20665/ 2006-06-12 2006-12-13
tnftpd -- Remote root Exploit tnftpd 20040810

The tnftpd port suffer from a remote stack overrun, which can lead to a root compromise.

CVE-2006-6652 http://lists.grok.org.uk/pipermail/full-disclosure/2006-December/051009.html 2006-12-01 2006-12-11 2010-05-12
clamav -- Multipart Nestings Denial of Service clamav 0.88.7 clamav-devel 20061029

Secunia reports:

Clam AntiVirus have a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service).

The vulnerability is caused due to a stack overflow when scanning messages with deeply nested multipart content. This can be exploited to crash the service by sending specially crafted emails to a vulnerable system.

CVE-2006-6481 http://secunia.com/advisories/23347/ http://www.quantenblog.net/security/virus-scanner-bypass 2006-12-06 2006-12-12 2013-06-19
libxine -- multiple buffer overflow vulnerabilities libxine 1.1.3

The libxine development team reports that several vulnerabilities had been found in the libxine library. The first vulnerability is caused by improper checking of the src/input/libreal/real.c "real_parse_sdp()" function. A remote attacker could exploit this by tricking an user to connect to a preparated server potentially causing a buffer overflow. Another buffer overflow had been found in the libmms library, potentially allowing a remote attacker to cause a denial of service vulnerability, and possible remote code execution through the following functions: send_command, string_utf16, get_data and get_media_packets. Other functions might be affected as well.

18608 21435 CVE-2006-2200 CVE-2006-6172 http://sourceforge.net/project/shownotes.php?release_id=468432 2006-05-04 2006-12-07 2006-12-09
gnupg -- remotely controllable function pointer gnupg 1.4.6

Werner Koch reports:

GnuPG uses data structures called filters to process OpenPGP messages. These filters are used in a similar way as a pipelines in the shell. For communication between these filters context structures are used. These are usually allocated on the stack and passed to the filter functions. At most places the OpenPGP data stream fed into these filters is closed before the context structure gets deallocated. While decrypting encrypted packets, this may not happen in all cases and the filter may use a void contest structure filled with garbage. An attacker may control this garbage. The filter context includes another context used by the low-level decryption to access the decryption algorithm. This is done using a function pointer. By carefully crafting an OpenPGP message, an attacker may control this function pointer and call an arbitrary function of the process. Obviously an exploit needs to prepared for a specific version, compiler, libc, etc to be successful - but it is definitely doable.

Fixing this is obvious: We need to allocate the context on the heap and use a reference count to keep it valid as long as either the controlling code or the filter code needs it.

We have checked all other usages of such a stack based filter contexts but fortunately found no other vulnerable places. This allows to release a relatively small patch. However, for reasons of code cleanness and easier audits we will soon start to change all these stack based filter contexts to heap based ones.

CVE-2006-6235 http://lists.gnupg.org/pipermail/gnupg-announce/2006q4/000246.html http://secunia.com/advisories/23245/ 2006-12-04 2006-12-07 2006-12-15
ruby -- cgi.rb library Denial of Service ruby ruby+pthreads ruby+pthreads+oniguruma ruby+oniguruma 1.8.*,11.8.5_5,1 ruby_static 1.8.*,1

The official ruby site reports:

Another vulnerability has been discovered in the CGI library (cgi.rb) that ships with Ruby which could be used by a malicious user to create a denial of service attack (DoS).

A specific HTTP request for any web application using cgi.rb causes CPU consumption on the machine on which the web application is running. Many such requests result in a denial of service.

CVE-2006-6303 http://www.ruby-lang.org/en/news/2006/12/04/another-dos-vulnerability-in-cgi-library/ 2006-12-04 2006-12-04 2010-05-12
libmusicbrainz -- multiple buffer overflow vulnerabilities libmusicbrainz 2.1.3

SecurityFocus reports about libmusicbrainz:

The libmusicbrainz library is prone to multiple buffer-overflow vulnerabilities because the application fails to check the size of the data before copying it into a finite-sized internal memory buffer.

An attacker can exploit these issues to execute arbitrary code within the context of the application or to cause a denial-of-service condition.

19508 CVE-2006-4197 http://www.securityfocus.com/bid/21185/discuss 2006-08-17 2006-12-02
tdiary -- cross site scripting vulnerability ja-tdiary tdiary 2.0.2 ja-tdiary-devel tdiary-devel 2.12.1.4_1

tDiary was vulnerable to an unspecified Cross-Site Scripting vulnerability

CVE-2006-6174 http://sourceforge.net/forum/forum.php?forum_id=638868 2006-11-26 2006-12-02 2010-05-12
ImageMagick -- SGI Image File heap overflow vulnerability ImageMagick ImageMagick-nox11 6.0.06.2.9

SecurityFocus reports about ImageMagick:

ImageMagick is prone to a remote heap-based buffer-overflow vulnerability because the application fails to properly bounds-check user-supplied input before copying it to an insufficiently sized memory buffer.

Exploiting this issue allows attackers to execute arbitrary machine code in the context of applications that use the ImageMagick library.

21185 CVE-2006-5868 http://www.securityfocus.com/bid/21185/discuss 2006-11-14 2006-12-02
gtar -- GNUTYPE_NAMES directory traversal vulnerability gtar 1.16_2

Teemu Salmela reports:

There is a tar record type, called GNUTYPE_NAMES (an obsolete GNU extension), that allows the creation of symbolic links pointing to arbitrary locations in the filesystem, which makes it possible to create/overwrite arbitrary files.

21235 CVE-2006-6097 http://archives.neohapsis.com/archives/fulldisclosure/2006-11/0344.html 2006-11-21 2006-11-30
kronolith -- arbitrary local file inclusion vulnerability kronolith 2.1.4

iDefense Labs reports:

Remote exploitation of a design error in Horde's Kronolith could allow an authenticated web mail user to execute arbitrary PHP code under the security context of the running web server.

The vulnerability specifically exists due to a design error in the way it includes certain files. Specifically, the 'lib/FBView.php' file contains a function 'Kronolith_FreeBusy_View::factory' which will include local files that are supplied via the 'view' HTTP GET request parameter.

http://lists.horde.org/archives/announce/2006/000307.html 2006-11-29 2006-11-30
gnupg -- buffer overflow gnupg 1.4.5_1

Werner Koch reports:

When running GnuPG interactively, special crafted messages may be used to crash gpg or gpg2. Running gpg in batch mode, as done by all software using gpg as a backend (e.g. mailers), is not affected by this bug.

Exploiting this overflow seems to be possible.

gpg-agent, gpgsm, gpgv or other tools from the GnuPG suite are not affected.

http://lists.gnupg.org/pipermail/gnupg-announce/2006q4/000241.html 2006-11-27 2006-11-27
proftpd -- Remote Code Execution Vulnerability proftpd proftpd-mysql 1.3.0_2

FrSIRT reports:

A vulnerability has been identified in ProFTPD, which could be exploited by attackers to cause a denial of service or execute arbitrary commands. This flaw is due to a buffer overflow error in the "main.c" file where the "cmd_buf_size" size of the buffer used to handle FTP commands sent by clients is not properly set to the size configured via the "CommandBufferSize" directive, which could be exploited by attackers to compromise a vulnerable server via a specially crafted FTP command.

http://www.frsirt.com/english/advisories/2006/4451 2006-11-10 2006-11-14 2006-11-15
unzoo -- Directory Traversal Vulnerability unzoo 4.4_1

Secunia reports:

Doubles has discovered a vulnerability in Unzoo, which potentially can be exploited by malicious people to compromise a user's system.

The vulnerability is caused due to an input validation error when unpacking archives. This can be exploited via a directory traversal attack to overwrite files outside the directory, where the files are extracted to, if a user is tricked into extracting a malicious archive using Unzoo.

11417 http://secunia.com/advisories/12857/ http://securitytracker.com/alerts/2004/Oct/1011673.html 2004-10-18 2006-11-14 2006-12-15
bugzilla -- multiple vulnerabilities bugzilla ja-bugzilla 2.*2.22.1

A Bugzilla Security Advisory reports:

  • Sometimes the information put into the <h1> and <h2> tags in Bugzilla was not properly escaped, leading to a possible XSS vulnerability.
  • Bugzilla administrators were allowed to put raw, unfiltered HTML into many fields in Bugzilla, leading to a possible XSS vulnerability. Now, the HTML allowed in those fields is limited.
  • attachment.cgi could leak the names of private attachments
  • The "deadline" field was visible in the XML format of a bug, even to users who were not a member of the "timetrackinggroup."
  • A malicious user could pass a URL to an admin, and make the admin delete or change something that he had not intended to delete or change.
  • It is possible to inject arbitrary HTML into the showdependencygraph.cgi page, allowing for a cross-site scripting attack.
CVE-2006-5453 CVE-2006-5454 CVE-2006-5455 http://www.bugzilla.org/security/2.18.5/ 2006-10-15 2006-11-11
Imlib2 -- multiple image file processing vulnerabilities imlib2 20060926_1,1

Secunia reports:

Some vulnerabilities have been reported in imlib2, which can be exploited by malicious people to cause a DoS (Denial of Service) or potentially compromise an application using the library.

The vulnerabilities are caused due to unspecified errors within the processing of JPG, ARGB, PNG, LBM, PNM, TIFF, and TGA images. This may be exploited to execute arbitrary code by e.g. tricking a user into opening a specially crafted image file with an application using imlib2.

20903 CVE-2006-4806 CVE-2006-4807 CVE-2006-4808 CVE-2006-4809 2006-11-03 2006-11-08
ruby -- cgi.rb library Denial of Service ruby ruby+pthreads ruby+pthreads+oniguruma ruby+oniguruma 1.8.*,11.8.5_4,1 ruby_static 1.8.*,1

Official ruby site reports:

A vulnerability has been discovered in the CGI library (cgi.rb) that ships with Ruby which could be used by a malicious user to create a denial of service attack (DoS). The problem is triggered by sending the library an HTTP request that uses multipart MIME encoding and as an invalid boundary specifier that begins with "-" instead of "--". Once triggered it will exhaust all available memory resources effectively creating a DoS condition.

20777 CVE-2006-5467 http://rubyforge.org/pipermail/mongrel-users/2006-October/001946.html 2006-10-25 2006-11-04 2006-12-15
screen -- combined UTF-8 characters vulnerability screen 4.0.3

A vulnerability in the handling of combined UTF-8 characters in screen may allow an user-assisted attacker to crash screen or potentially allow code execution as the user running screen. To exploit this issue the user running scren must in some way interact with the attacker.

20727 CVE-2006-4573 http://lists.gnu.org/archive/html/screen-users/2006-10/msg00028.html https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=212056 2006-10-23 2006-10-29
mysql -- database suid privilege escalation mysql-server 5.15.1.12 5.05.0.25

Dmitri Lenev reports a privilege escalation in MySQL. MySQL evaluates arguments of suid routines in the security context of the routine's definer instead of the routine's caller, which allows remote and local authenticated users to gain privileges through a routine that has been made available using GRANT EXECUTE.

CVE-2006-4227 http://bugs.mysql.com/bug.php?id=18630 2006-03-29 2006-10-29 2006-10-30
mysql -- database "case-sensitive" privilege escalation mysql-server 5.15.1.12 5.05.0.25 4.1.21

Michal Prokopiuk reports a privilege escalation in MySQL. The vulnerability causes MySQL, when run on case-sensitive filesystems, to allow remote and local authenticated users to create or access a database when the database name differs only in case from a database for which they have permissions.

19559 CVE-2006-4226 http://bugs.mysql.com/bug.php?id=17647 2006-08-09 2006-10-29
Serendipity -- XSS Vulnerabilities serendipity 1.0.1

The Serendipity Team reports:

Serendipity failed to correctly sanitize user input on the media manager administration page. The content of GET variables were written into JavaScript strings. By using standard string evasion techniques it was possible to execute arbitrary JavaScript.

Additionally Serendipity dynamically created a HTML form on the media manager administration page that contained all variables found in the URL as hidden fields. While the variable values were correctly escaped it was possible to break out by specifying strange variable names.

http://www.hardened-php.net/advisory_112006.136.htmlSerendipity http://secunia.com/advisories/22501/ 2006-10-19 2006-10-21
kdelibs -- integer overflow in khtml kdelibs kdelibs-nocups 3.5.4_4 qt qt-copy 3.3.6_3

Red Hat reports:

An integer overflow flaw was found in the way Qt handled pixmap images. The KDE khtml library uses Qt in such a way that untrusted parameters could be passed to Qt, triggering the overflow. An attacker could for example create a malicious web page that when viewed by a victim in the Konqueror browser would cause Konqueror to crash or possibly execute arbitrary code with the privileges of the victim.

CVE-2006-4811 http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=210742 http://rhn.redhat.com/errata/RHSA-2006-0720.html 2006-10-14 2006-10-22
opera -- URL parsing heap overflow vulnerability opera opera-devel linux-opera 9.*9.02

iDefense Labs reports:

Remote exploitation of a heap overflow vulnerability within version 9 of Opera Software's Opera Web browser could allow an attacker to execute arbitrary code on the affected host.

A flaw exists within Opera when parsing a tag that contains a URL. A heap buffer with a constant size of 256 bytes is allocated to store the URL, and the tag's URL is copied into this buffer without sufficient bounds checking of its length.

CVE-2006-4819 http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=424 http://secunia.com/advisories/22218/ http://www.opera.com/support/search/supsearch.dml?index=848 2006-10-17 2006-10-20
asterisk -- remote heap overwrite vulnerability asterisk asterisk-bristuff 1.2.13

Adam Boileau of Security-Assessment.com reports:

The Asterisk Skinny channel driver for Cisco SCCP phones (chan_skinny.so) incorrectly validates a length value in the packet header. An integer wrap-around leads to heap overwrite, and arbitrary remote code execution as root.

http://www.security-assessment.com/files/advisories/Asterisk_remote_heap_overflow.pdf http://marc.theaimsgroup.com/?l=bugtraq&m=116121567530170 2006-10-17 2006-10-20
plone -- unprotected MembershipTool methods plone 2.1.2

The Plone Team reports:

Plone 2.0.5, 2.1.2, and 2.5-beta1 does not restrict access to the:

  • changeMemberPortrait
  • deletePersonalPortrait
  • testCurrentPassword

methods, which allows remote attackers to modify portraits.

CVE-2006-1711 http://plone.org/products/plone/releases/2.1.4 https://svn.plone.org/svn/plone/PloneHotfix20060410/trunk/README.txt 2006-10-19 2006-10-19 2006-10-20
drupal -- HTML attribute injection drupal 4.6.10

The Drupal Team reports:

A malicious user may entice users to visit a specially crafted URL that may result in the redirection of Drupal form submission to a third-party site. A user visiting the user registration page via such a url, for example, will submit all data, such as his/her e-mail address, but also possible private profile data, to a third-party site.

http://drupal.org/files/sa-2006-026/advisory.txt http://drupal.org/drupal-4.7.4 2006-10-18 2006-10-18
drupal -- cross site request forgeries drupal 4.6.10

The Drupal Team reports:

Visiting a specially crafted page, anywhere on the web, may allow that page to post forms to a Drupal site in the context of the visitor's session. To illustrate; suppose one has an active user 1 session, the most powerful administrator account for a site, to a Drupal site while visiting a website created by an attacker. This website will now be able to submit any form to the Drupal site with the privileges of user 1, either by enticing the user to submit a form or by automated means.

An attacker can exploit this vulnerability by changing passwords, posting PHP code or creating new users, for example. The attack is only limited by the privileges of the session it executes in.

http://drupal.org/files/sa-2006-025/advisory.txt http://drupal.org/drupal-4.7.4 2006-10-18 2006-10-18
drupal -- multiple XSS vulnerabilities drupal 4.6.10

The Drupal Team reports:

A bug in input validation and lack of output validation allows HTML and script insertion on several pages.

Drupal's XML parser passes unescaped data to watchdog under certain circumstances. A malicious user may execute an XSS attack via a specially crafted RSS feed. This vulnerability exists on systems that do not use PHP's mb_string extension (to check if mb_string is being used, navigate to admin/settings and look under "String handling"). Disabling the aggregator module provides an immediate workaround.

The aggregator module, profile module, and forum module do not properly escape output of certain fields.

Note: XSS attacks may lead to administrator access if certain conditions are met.

http://drupal.org/files/sa-2006-024/advisory.txt http://drupal.org/drupal-4.7.4 2006-10-18 2006-10-18
ingo -- local arbitrary shell command execution ingo 1.1.2

The Horde team reports a vulnerability within Ingo, the filter management suite. The vulnerability is caused due to inadequete escaping, possibly allowing a local user to execute arbitrary shell commands via procmail.

CVE-2006-5449 http://bugs.horde.org/ticket/?id=4513 http://cvs.horde.org/diff.php/ingo/docs/CHANGES?r1=1.55.2.49&r2=1.55.2.59&ty=h http://lists.horde.org/archives/announce/2006/000296.html 2006-10-18 2006-10-18 2010-05-12
NVIDIA UNIX driver -- arbitrary root code execution vulnerability nvidia-driver 1.0.87621.0.8776

Rapid7 reports:

The NVIDIA Binary Graphics Driver for Linux is vulnerable to a buffer overflow that allows an attacker to run arbitrary code as root. This bug can be exploited both locally or remotely (via a remote X client or an X client which visits a malicious web page). A working proof-of-concept root exploit is included with this advisory.

The NVIDIA drivers for Solaris and FreeBSD are also likely to be vulnerable.

Disabling Render acceleration in the "nvidia" driver, via the "RenderAccel" X configuration option, can be used as a workaround for this issue.

147252 CVE-2006-5379 http://nvidia.custhelp.com/cgi-bin/nvidia.cfg/php/enduser/std_adp.php?p_faqid=1971 http://secunia.com/advisories/22419/ http://www.rapid7.com/advisories/R7-0025.jsp 2006-10-16 2006-10-16 2006-10-21
clamav -- CHM unpacker and PE rebuilding vulnerabilities clamav 0.88.5 clamav-devel 20060922

Secunia reports:

Two vulnerabilities have been reported in Clam AntiVirus, which potentially can be exploited by malicious people to cause a DoS (Denial of Service) or compromise a vulnerable system.

1) An unspecified error in the CHM unpacker in chmunpack.c can be exploited to cause a DoS.

2) An unspecified error in rebuildpe.c when rebuilding PE files after unpacking can be exploited to cause a heap-based buffer overflow.

http://secunia.com/advisories/22370/ http://lurker.clamav.net/message/20061016.015114.dc6a8930.en.html http://sourceforge.net/project/shownotes.php?release_id=455799 2006-10-15 2006-10-16
tkdiff -- temporary file symlink privilege escalation tkdiff 4.1.1

Javier Fernández-Sanguino Peña reports a vulnerability in tkdiff which allows local users to gain priveleges of the user running tkdiff due to insecure temporary file creation.

http://www.debian.org/security/2005/dsa-927 CVE-2005-3343 16064 http://secunia.com/advisories/18083 2005-12-20 2006-10-15
vtiger -- multiple remote file inclusion vulnerabilities vtiger 5.0

Dedi Dwianto a.k.a the_day reports:

Input passed to the "$calpath" parameter in update.php is not properly verified before being used. This can be exploited to execute arbitrary PHP code by including files from local or external resources.

CVE-2006-5289 20435 http://marc.theaimsgroup.com/?l=bugtraq&m=116049557032343 http://advisories.echo.or.id/adv/adv54-theday-2006.txt 2006-10-09 2006-10-15
google-earth -- heap overflow in the KML engine google-earth 4.0.2414

JAAScois reports:

While processing KML/KMZ data Google Earth fails to verify its size prior to copying it into a fixed-sized buffer. This can be exploited as a buffer-overflow vulnerability to cause the application to crash and/or to execute arbitrary code.

20464 http://www.jaascois.com/exploits/18602024/ 2006-10-10 2006-10-14 2007-04-13
torrentflux -- User-Agent XSS Vulnerability torrentflux 0

Steven Roddis reports that User-Agent string is not properly escaped when handled by torrentflux. This allows for arbitrary code insertion.

20371 CVE-2006-5227 http://www.stevenroddis.com.au/2006/10/06/torrentflux-user-agent-xss-vulnerability/ http://secunia.com/advisories/22293/ 2006-09-30 2006-10-07 2006-10-15
python -- buffer overrun in repr() for unicode strings python+ipv6 0 python 2.4.3_1 2.5.*2.5.c2

Benjamin C. Wiley Sittler reports:

I discovered a [buffer overrun in repr() for unicode strings]. This causes an unpatched non-debug wide (UTF-32/UCS-4) build of python to abort.

Ubuntu security team reports:

If an application uses repr() on arbitrary untrusted data, this [bug] could be exploited to execute arbitrary code with the privileges of the python application.

CVE-2006-4980 https://launchpad.net/distros/ubuntu/+source/python2.4/+bug/56633 http://www.ubuntu.com/usn/usn-359-1 http://secunia.com/advisories/22276/ 2006-08-15 2006-10-07 2006-10-08
php -- _ecalloc Integer Overflow Vulnerability php5 5.1.6_1 php5-cli php5-cgi php5-dtc php5-horde php5-nms mod_php5 55.1.6_1

Stefan Esser reports:

The PHP 5 branch of the PHP source code lacks the protection against possible integer overflows inside ecalloc() that is present in the PHP 4 branch and also for several years part of our Hardening-Patch and our new Suhosin-Patch.

It was discovered that such an integer overflow can be triggered when user input is passed to the unserialize() function. Earlier vulnerabilities in PHP's unserialize() that were also discovered by one of our audits in December 2004 are unrelated to the newly discovered flaw, but they have shown, that the unserialize() function is exposed to user-input in many popular PHP applications. Examples for applications that use the content of COOKIE variables with unserialize() are phpBB and Serendipity.

The successful exploitation of this integer overflow will result in arbitrary code execution.

CVE-2006-4812 http://www.hardened-php.net/advisory_092006.133.html http://secunia.com/advisories/22280/ 2006-09-30 2006-10-06 2013-04-01
mambo -- multiple SQL injection vulnerabilities mambo 4.6.5

James Bercegay reports:

Mambo is vulnerable to an Authentication Bypass issue that is due to an SQL Injection in the login function. The SQL Injection is possible because the $passwd variable is only sanitized when it is not passed as an argument to the function.

Omid reports:

There are several sql injections in Mambo 4.6 RC2 & Joomla 1.0.10 (and maybe other versions):

  • When a user edits a content, the "id" parameter is not checked properly in /components/com_content/content.php, which can cause 2 sql injections.
  • The "limit" parameter in the administration section is not checked. This affects many pages of administration section
  • In the administration section, while editing/creating a user, the "gid" parameter is not checked properly.
19719 19734 http://www.gulftech.org/?node=research&article_id=00116-10042006 http://seclists.org/bugtraq/2006/Aug/0491.html http://www.frsirt.com/english/advisories/2006/3918 http://mamboxchange.com/forum/forum.php?forum_id=7704 http://secunia.com/advisories/21644/ http://secunia.com/advisories/22221/ 2006-08-26 2006-10-05 2011-06-27
tin -- buffer overflow vulnerabilities tin zh-tin 1.8.2

Urs Janssen and Aleksey Salow report possible buffer overflows in tin versions 1.8.0 and 1.8.1.

OpenPKG project elaborates there is an allocation off-by-one bug in version 1.8.0 which can lead to a buffer overflow.

ftp://ftp.tin.org/pub/news/clients/tin/stable/CHANGES http://www.openpkg.org/security/advisories/OpenPKG-SA-2006.005-tin.html 2006-02-15 2006-10-05
openldap -- slapd acl selfwrite Security Issue openldap-server openldap-sasl-server 2.3.25

Howard Chu reports:

An ACL of the form 'access to dn.subtree="ou=groups, dc=example,dc=com" attr=member by * selfwrite' is intended to only allow users to add/delete their own DN to the target attribute. Currently it allows any DNs to be modified.

19832 CVE-2006-4600 http://www.openldap.org/its/index.cgi/Software%20Bugs?id=4587 http://www.openldap.org/lists/openldap-announce/200608/msg00000.html http://secunia.com/advisories/21721 http://securitytracker.com/alerts/2006/Sep/1016783.html 2006-06-14 2006-10-05
mono -- "System.CodeDom.Compiler" Insecure Temporary Creation mono 1.1.13.8.1

Sebastian Krahmer reports:

Sebastian Krahmer of the SuSE security team discovered that the System.CodeDom.Compiler classes used temporary files in an insecure way. This could allow a symbolic link attack to create or overwrite arbitrary files with the privileges of the user invoking the program. Under some circumstances, a local attacker could also exploit this to inject arbitrary code into running Mono processes.

CVE-2006-5072 http://www.ubuntu.com/usn/usn-357-1 http://secunia.com/advisories/22237/ 2006-10-04 2006-10-05
php -- open_basedir Race Condition Vulnerability php4 php5 4.4.4_1 55.1.6_2 php-suhosin 0.9.6 php4-cli php5-cli php4-cgi php5-cgi php4-dtc php5-dtc php4-horde php5-horde php4-nms php5-nms mod_php4 mod_php5 44.4.4_1 55.1.6_2

Stefan Esser reports:

PHP's open_basedir feature is meant to disallow scripts to access files outside a set of configured base directories. The checks for this are placed within PHP functions dealing with files before the actual open call is performed.

Obviously there is a little span of time between the check and the actual open call. During this time span the checked path could have been altered and point to a file that is forbidden to be accessed due to open_basedir restrictions.

Because the open_basedir restrictions often not call PHP functions but 3rd party library functions to actually open the file it is impossible to close this time span in a general way. It would only be possible to close it when PHP handles the actual opening on it's own.

While it seems hard to change the path during this little time span it is very simple with the use of the symlink() function combined with a little trick. PHP's symlink() function ensures that source and target of the symlink operation are allowed by open_basedir restrictions (and safe_mode). However it is possible to point a symlink to any file by the use of mkdir(), unlink() and at least two symlinks.

20326 CVE-2006-5178 http://www.hardened-php.net/advisory_082006.132.html http://secunia.com/advisories/22235/ 2006-10-02 2006-10-05 2013-04-01
phpbb -- NULL byte injection vulnerability phpbb zh-phpbb-tw 2.0.22

Secunia reports:

ShAnKaR has discovered a vulnerability in phpBB, which can be exploited by malicious users to compromise a vulnerable system.

Input passed to the "avatar_path" parameter in admin/admin_board.php is not properly sanitised before being used as a configuration variable to store avatar images. This can be exploited to upload and execute arbitrary PHP code by changing "avatar_path" to a file with a trailing NULL byte.

Successful exploitation requires privileges to the administration section.

20347 CVE-2006-4758 http://secunia.com/advisories/22188/ http://xforce.iss.net/xforce/xfdb/28884 http://www.security.nnov.ru/Odocument221.html 2006-09-12 2006-10-04 2006-12-24
postnuke -- admin section SQL injection postnuke 0.763

ISS X-Force reports:

PostNuke is vulnerable to SQL injection. A remote attacker could send specially-crafted SQL statements to the admin section using the hits parameter, which could allow the attacker to view, add, modify or delete information in the back-end database.

20317 CVE-2006-5121 http://xforce.iss.net/xforce/xfdb/29271 http://www.securityfocus.com/archive/1/archive/1/447361/100/0/threaded http://secunia.com/advisories/22197/ 2006-09-29 2006-10-03 2007-11-17
freetype -- LWFN Files Buffer Overflow Vulnerability freetype2 2.1.10_5

SecurityTracker reports:

A vulnerability was reported in FreeType. A remote user can cause arbitrary code to be executed on the target user's system.

A remote user can create a specially crafted font file that, when loaded by the target user's system, will trigger an integer underflow or integer overflow and crash the application or execute arbitrary code on the target system.

Chris Evans reported these vulnerabilities.

Impact: A remote user can create a file that, when loaded by the target user, will execute arbitrary code on the target user's system.

18034 CVE-2006-0747 CVE-2006-1861 CVE-2006-3467 http://securitytracker.com/alerts/2006/Jul/1016522.html 2006-07-10 2006-10-02
cscope -- Buffer Overflow Vulnerabilities cscope 15.6

Secunia reports:

Will Drewry has reported some vulnerabilities in Cscope, which potentially can be exploited by malicious people to compromise a vulnerable system.

Various boundary errors within the parsing of file lists or the expansion of environment variables can be exploited to cause stack-based buffer overflows when parsing specially crafted "cscope.lists" files or directories.

A boundary error within the parsing of command line arguments can be exploited to cause a stack-based buffer overflow when supplying an overly long "reffile" argument.

Successful exploitation may allow execution of arbitrary code.

19686 19687 CVE-2006-4262 http://secunia.com/advisories/21601 http://sourceforge.net/mailarchive/forum.php?thread_id=30266760&forum_id=33500 http://sourceforge.net/mailarchive/forum.php?thread_id=30266761&forum_id=33500 2006-08-20 2006-10-02 2006-10-11
gnutls -- RSA Signature Forgery Vulnerability gnutls gnutls-devel 1.4.4

Secunia reports:

A vulnerability has been reported in GnuTLS, which can be exploited by malicious people to bypass certain security restrictions.

The vulnerability is caused due to an error in the verification of certain signatures. If a RSA key with exponent 3 is used, it may be possible to forge PKCS #1 v1.5 signatures signed with that key.

20027 CVE-2006-4790 http://secunia.com/advisories/21937 http://lists.gnupg.org/pipermail/gnutls-dev/2006-September/001205.html 2006-09-08 2006-10-02
MT -- Search Unspecified XSS MT 3.33.33

Secunia reports:

Arai has reported a vulnerability in Movable Type and Movable Type Enterprise, which can be exploited by malicious people to conduct cross-site scripting attacks.

Some unspecified input passed via the search functionality isn't properly sanitised before being returned to the user. This can be exploited to execute arbitrary HTML and script code in a user's browser session in context of an affected site.

20228 CVE-2006-5080 http://secunia.com/advisories/22109 http://www.sixapart.com/movabletype/news/2006/09/mt_333-mte_103_updates.html 2006-09-26 2006-10-02 2006-10-15
phpmyadmin -- XSRF vulnerabilities phpMyAdmin 2.9.0.1

phpMyAdmin team reports:

We received a security advisory from Stefan Esser (sesser@hardened-php.net) and we wish to thank him for his work.

It was possible to inject arbitrary SQL commands by forcing an authenticated user to follow a crafted link.

CVE-2006-5116 CVE-2006-5117 http://www.phpmyadmin.net/home_page/security.php?issue=PMASA-2006-5 http://secunia.com/advisories/22126/ 20253 2006-09-28 2006-10-02 2006-10-03
openssh -- multiple vulnerabilities FreeBSD 6.16.1_10 6.06.0_15 5.55.5_8 5.45.4_22 5.05.3_37 4.11_25 openssh 4.4,1 openssh-portable 4.4.p1,1

Problem Description

The CRC compensation attack detector in the sshd(8) daemon, upon receipt of duplicate blocks, uses CPU time cubic in the number of duplicate blocks received. [CVE-2006-4924]

A race condition exists in a signal handler used by the sshd(8) daemon to handle the LoginGraceTime option, which can potentially cause some cleanup routines to be executed multiple times. [CVE-2006-5051]

Impact

An attacker sending specially crafted packets to sshd(8) can cause a Denial of Service by using 100% of CPU time until a connection timeout occurs. Since this attack can be performed over multiple connections simultaneously, it is possible to cause up to MaxStartups (10 by default) sshd processes to use all the CPU time they can obtain. [CVE-2006-4924]

The OpenSSH project believe that the race condition can lead to a Denial of Service or potentially remote code execution, but the FreeBSD Security Team has been unable to verify the exact impact. [CVE-2006-5051]

Workaround

The attack against the CRC compensation attack detector can be avoided by disabling SSH Protocol version 1 support in sshd_config(5).

There is no workaround for the second issue.

20216 CVE-2006-4924 CVE-2006-5051 SA-06:22.openssh http://www.openssh.com/txt/release-4.4 2006-09-25 2006-09-30
dokuwiki -- multiple vulnerabilities dokuwiki 20060309c dokuwiki-devel 20060909

Secunia reports:

rgod has discovered a vulnerability in DokuWiki, which can be exploited by malicious people to compromise a vulnerable system.

Input passed to the "TARGET_FN" parameter in bin/dwpage.php is not properly sanitised before being used to copy files. This can be exploited via directory traversal attacks in combination with DokuWiki's file upload feature to execute arbitrary PHP code.

CVE Mitre reports:

Direct static code injection vulnerability in doku.php in DokuWiki before 2006-03-09c allows remote attackers to execute arbitrary PHP code via the X-FORWARDED-FOR HTTP header, which is stored in config.php.

Unrestricted file upload vulnerability in lib/exe/media.php in DokuWiki before 2006-03-09c allows remote attackers to upload executable files into the data/media folder via unspecified vectors.

DokuWiki before 2006-03-09c enables the debug feature by default, which allows remote attackers to obtain sensitive information by calling doku.php with the X-DOKUWIKI-DO HTTP header set to "debug".

19911 CVE-2006-4674 CVE-2006-4675 CVE-2006-4679 http://secunia.com/advisories/21819/ http://bugs.splitbrain.org/index.php?do=details&id=906 2006-09-08 2006-09-30 2006-10-02
dokuwiki -- multiple vulnerabilities dokuwiki 20060309_5 dokuwiki-devel 20060609_2

Secunia reports:

Some vulnerabilities have been reported in DokuWiki, which can be exploited by malicious people to cause a DoS (Denial of Service) or potentially compromise a vulnerable system.

Input passed to the "w" and "h" parameters in lib/exec/fetch.php is not properly sanitised before being passed as resize parameters to the "convert" application. This can be exploited to cause a DoS due to excessive CPU and memory consumption by passing very large numbers, or to inject arbitrary shell commands by passing specially crafted strings to the "w" and "h" parameter.

Successful exploitation requires that the "$conf[imconvert]" option is set.

CVE-2006-5098 CVE-2006-5099 http://secunia.com/advisories/22192/ http://secunia.com/advisories/22199/ http://bugs.splitbrain.org/?do=details&id=924 http://bugs.splitbrain.org/?do=details&id=926 2006-09-26 2006-09-30 2006-10-02
tikiwiki -- multiple vulnerabilities tikiwiki 1.9.5

Secunia reports:

Thomas Pollet has discovered a vulnerability in TikiWiki, which can be exploited by malicious people to conduct cross-site scripting attacks.

Input passed to the "highlight" parameter in tiki-searchindex.php is not properly sanitised before being returned to the user. This can be exploited to execute arbitrary HTML and script code in a user's browser session in context of an affected site.

rgod has discovered a vulnerability in TikiWiki, which can be exploited by malicious people to compromise a vulnerable system.

The vulnerability is caused due to the "jhot.php" script not correctly verifying uploaded files. This can e.g. be exploited to execute arbitrary PHP code by uploading a malicious PHP script to the "img/wiki" directory.

19654 19819 CVE-2006-4299 CVE-2006-4602 http://secunia.com/advisories/21536/ http://secunia.com/advisories/21733/ 2006-08-21 2006-09-30
punbb -- NULL byte injection vulnerability punbb 1.2.13

CVE Mitre reports:

PunBB 1.2.12 does not properly handle an avatar directory pathname ending in %00, which allows remote authenticated administrative users to upload arbitrary files and execute code, as demonstrated by a query to admin_options.php with an avatars_dir parameter ending in %00. NOTE: this issue was originally disputed by the vendor, but the dispute was withdrawn on 20060926.

CVE-2006-4759 http://forums.punbb.org/viewtopic.php?id=13255 2006-09-13 2006-09-30
freeciv -- Denial of Service Vulnerabilities freeciv freeciv-gtk freeciv-gtk2 freeciv-nox11 2.0.8_2

Secunia reports:

Luigi Auriemma has reported a vulnerability in Freeciv, which can be exploited by malicious people to cause a DoS (Denial of Service).

An error in the "generic_handle_player_attribute_chunk()" function in common/packets.c can be exploited to crash the service via a specially crafted PACKET_PLAYER_ATTRIBUTE_CHUNK packet sent to the server.

An error in the "handle_unit_orders()" function in server/unithand.c can be exploited to crash the service via a specially crafted packet.

CVE-2006-3913 19117 http://secunia.com/advisories/21171/ http://aluigi.altervista.org/adv/freecivx-adv.txt 2006-07-23 2006-09-26
freeciv -- Packet Parsing Denial of Service Vulnerability freeciv freeciv-gtk freeciv-gtk2 freeciv-nox11 2.0.8

Secunia reports:

Luigi Auriemma has reported a vulnerability in Freeciv, which can be exploited by malicious people to cause a DoS (Denial of Service).

The vulnerability is caused due to an error within the handling of the packet length in "common/packets.c". This can be exploited to crash the Freeciv server via a specially- crafted packet with the size set to "0xffff".

CVE-2006-0047 16975 http://secunia.com/advisories/19120/ http://aluigi.altervista.org/adv/freecivdos-adv.txt 2006-03-06 2006-09-26
plans -- multiple vulnerabilities plans 6.7.2

Secunia reports:

A vulnerability has been reported in Plans, which can be exploited by malicious people to conduct SQL injection attacks.

Input passed to the "evt_id" parameter in "plans.cgi" isn't properly sanitised before being used in a SQL query. This can be exploited to manipulate SQL queries by injecting arbitrary SQL code.

Successful exploitation requires that SQL database support has been enabled in "plans_config.pl" (the default setting is flat files).

Some vulnerabilities have been reported in Plans, which can be exploited by malicious people to conduct cross-site scripting attacks or gain knowledge of sensitive information.

Input passed to various unspecified parameters is not properly sanitised before being returned to users. This can be exploited to execute arbitrary HTML and script code in a user's browser session in context of a vulnerable site.

An unspecified error can be exploited to gain knowledge of the MySQL password.

14069 http://secunia.com/advisories/15167/ http://secunia.com/advisories/15854/ http://planscalendar.com/forum/viewtopic.php?t=660 2005-04-28 2006-09-26 2006-10-15
eyeOS -- multiple XSS security bugs eyeOS 0.9.1

eyeOS team reports:

[EyeOS 0.9.1] release fixes two XSS security bugs, so we recommend all users to upgrade to this new version in order to have the best security. These two bugs were discovered by Jose Carlos Norte, who is a new eyeOS developer.

20213 CVE-2006-5071 http://eyeos.blogspot.com/2006/09/eyeos-091-released.html 2006-09-25 2006-09-25 2006-10-15
zope -- restructuredText "csv_table" Information Disclosure zope 2.7.02.7.9_1 2.8.02.8.8_1

Secunia reports:

A vulnerability has been reported in Zope, which can be exploited by malicious people to disclose potentially sensitive information.

The vulnerability is caused due to an error in the use of the docutils module to parse and render "restructured" text. This can be exploited to disclose certain information via the "csv_table" reStructuredText directive.

20022 CVE-2006-4684 http://secunia.com/advisories/21947/ http://www.zope.org/Products/Zope/Hotfix-2006-08-21/Hotfix-20060821/README.txt 2006-08-21 2006-09-22 2006-12-27
libmms -- stack-based buffer overflow libmms 0.3 libxine 1.1.1

Mitre CVE reports:

Stack-based buffer overflow in libmms, as used by (a) MiMMS 0.0.9 and (b) xine-lib 1.1.0 and earlier, allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via the (1) send_command, (2) string_utf16, (3) get_data, and (4) get_media_packet functions, and possibly other functions.

CVE-2006-2200 18608 http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=374577 2006-05-04 2006-09-22
opera -- RSA Signature Forgery opera opera-devel linux-opera 9.02

Opera reports:

A specially crafted digital certificate can bypass Opera's certificate signature verification. Forged certificates can contain any false information the forger chooses, and Opera will still present it as valid. Opera will not present any warning dialogs in this case, and the security status will be the highest possible (3). This defeats the protection against "man in the middle", the attacks that SSL was designed to prevent.

There is a flaw in OpenSSL's RSA signature verification that affects digital certificates using 3 as the public exponent. Some of the certificate issuers that are on Opera's list of trusted signers have root certificates with 3 as the public exponent. The forged certificate can appear to be signed by one of these.

CVE-2006-4339 http://secunia.com/advisories/21982/ http://secunia.com/advisories/21709/ http://www.cdc.informatik.tu-darmstadt.de/securebrowser/ http://www.openssl.org/news/secadv_20060905.txt http://www.mozilla.org/security/announce/2006/mfsa2006-60.html 2006-09-18 2006-09-22
mozilla -- multiple vulnerabilities firefox 1.5.0.7,1 2.*,12.0_1,1 linux-firefox 1.5.0.7 seamonkey linux-seamonkey 1.0.5 thunderbird linux-thunderbird mozilla-thunderbird 1.5.0.7 linux-firefox-devel 3.0.a2006.09.21 linux-seamonkey-devel 1.5.a2006.09.21 linux-mozilla-devel linux-mozilla mozilla 0

The Mozilla Foundation reports of multiple security issues in Firefox, Seamonkey, and Thunderbird. Several of these issues can probably be used to run arbitrary code with the privilege of the user running the program.

  • MFSA 2006-64 Crashes with evidence of memory corruption (rv:1.8.0.7)
  • MFSA 2006-63 JavaScript execution in mail via XBL
  • MFSA 2006-62 Popup-blocker cross-site scripting (XSS)
  • MFSA 2006-61 Frame spoofing using document.open()
  • MFSA 2006-60 RSA Signature Forgery
  • MFSA 2006-59 Concurrency-related vulnerability
  • MFSA 2006-58 Auto-Update compromise through DNS and SSL spoofing
  • MFSA 2006-57 JavaScript Regular Expression Heap Corruption
20042 CVE-2006-4253 CVE-2006-4340 CVE-2006-4565 CVE-2006-4566 CVE-2006-4567 CVE-2006-4568 CVE-2006-4569 CVE-2006-4570 CVE-2006-4571 http://www.mozilla.org/security/announce/2006/mfsa2006-57.html http://www.mozilla.org/security/announce/2006/mfsa2006-58.html http://www.mozilla.org/security/announce/2006/mfsa2006-59.html http://www.mozilla.org/security/announce/2006/mfsa2006-60.html http://www.mozilla.org/security/announce/2006/mfsa2006-61.html http://www.mozilla.org/security/announce/2006/mfsa2006-62.html http://www.mozilla.org/security/announce/2006/mfsa2006-63.html http://www.mozilla.org/security/announce/2006/mfsa2006-64.html 2006-09-14 2006-09-15 2006-11-02
win32-codecs -- multiple vulnerabilities win32-codecs 3.1.0.p8_1,1

The Apple Security Team reports that there are multiple vulnerabilities within QuickTime (one of the plugins for win32-codecs). A remote attacker capable of creating a malicious SGI image, FlashPix, FLC movie, or a QuickTime movie can possibly lead to execution of arbitrary code or cause a Denial of Service (application crash).

Users who have QuickTime (/win32-codecs) as a browser plugin may be vulnerable to remote code execution by visiting a website containing a malicious SGI image, FlashPix, FLC movie or a QuickTime movie.

20138 CVE-2006-4381 CVE-2006-4382 CVE-2006-4384 CVE-2006-4385 CVE-2006-4386 CVE-2006-4388 CVE-2006-4389 http://docs.info.apple.com/article.html?artnum=304357 2006-09-08 2006-09-14 2006-10-17
php -- multiple vulnerabilities php4 php5 4.4.4 55.1.5 php4-cli php5-cli php4-cgi php5-cgi php4-dtc php5-dtc php4-horde php5-horde php4-nms php5-nms mod_php4 mod_php5 4.4.4 55.1.5

The PHP development team reports:

  • Added missing safe_mode/open_basedir checks inside the error_log(), file_exists(), imap_open() and imap_reopen() functions.
  • Fixed overflows inside str_repeat() and wordwrap() functions on 64bit systems.
  • Fixed possible open_basedir/safe_mode bypass in cURL extension and with realpath cache.
  • Fixed overflow in GD extension on invalid GIF images.
  • Fixed a buffer overflow inside sscanf() function.
  • Fixed an out of bounds read inside stripos() function.
  • Fixed memory_limit restriction on 64 bit system.
CVE-2006-4481 CVE-2006-4482 CVE-2006-4483 CVE-2006-4484 CVE-2006-4485 CVE-2006-4486 http://www.php.net/release_4_4_4.php http://www.php.net/release_5_1_5.php 2006-08-18 2006-09-13 2014-03-28
drupal-pubcookie -- authentication may be bypassed drupal-pubcookie 4.6.0_20060210

The Drupal Project reports:

It is possible for a malicious user to spoof a user's identity by bypassing the login redirection mechanism in the pubcookie module. The malicious user may gain the privileges of the user they are spoofing, including the administrative user.

CVE-2006-4717 http://drupal.org/node/83064 2006-09-08 2006-09-13 2010-05-12
linux-flashplugin7 -- arbitrary code execution vulnerabilities linux-flashplugin 7.0r68

Adobe reports:

Multiple input validation errors have been identified in Flash Player 8.0.24.0 and earlier versions that could lead to the potential execution of arbitrary code. These vulnerabilities could be accessed through content delivered from a remote location via the user?s web browser, email client, or other applications that include or reference the Flash Player. (CVE-2006-3311, CVE-2006-3587, CVE-2006-3588)

These updates include changes to prevent circumvention of the "allowScriptAccess" option. (CVE-2006-4640)

CVE-2006-3311 CVE-2006-3587 CVE-2006-3588 CVE-2006-4640 http://www.adobe.com/support/security/bulletins/apsb06-11.html 2006-09-12 2006-09-12
mailman -- Multiple Vulnerabilities mailman ja-mailman mailman-with-htdig 2.1.9.r1

Secunia reports:

Mailman can be exploited by malicious people to conduct cross-site scripting and phishing attacks, and cause a DoS (Denial of Service).

1) An error in the logging functionality can be exploited to inject a spoofed log message into the error log via a specially crafted URL.

Successful exploitation may trick an administrator into visiting a malicious web site.

2) An error in the processing of malformed headers which does not follow the RFC 2231 standard can be exploited to cause a DoS (Denial of Service).

3) Some unspecified input isn't properly sanitised before being returned to the user. This can be exploited to execute arbitrary HTML and script code in a user's browser session in context of an affected site.

19831 CVE-2006-2191 CVE-2006-2941 CVE-2006-3636 CVE-2006-4624 http://secunia.com/advisories/21732/ http://sourceforge.net/project/shownotes.php?group_id=103&release_id=444295 2006-06-09 2006-09-04 2006-10-04
hlstats -- multiple cross site scripting vulnerabilities hlstats 1.35

Kefka reports multiple cross site scripting vulnerabilities within hlstats. The vulnerabilities are caused due to improper checking of variables, allowing an attacker to perform cross site scripting.

19745 CVE-2006-4454 CVE-2006-6780 CVE-2006-6781 CVE-2007-2812 2006-08-29 2006-09-02 2011-09-03
gtetrinet -- remote code execution gtetrinet 0.7.10

The Debian Security Team reports:

Michael Gehring discovered several potential out-of-bounds index accesses in gtetrinet, a multiplayer Tetris-like game, which may allow a remote server to execute arbitrary code

19766 CVE-2006-3125 http://www.debian.org/security/2006/dsa-1163 2006-08-30 2006-09-02 2006-10-01
joomla -- multiple vulnerabilities joomla 1.0.11

The Joomla development team reports multiple vulnerabilities within the joomla application. Joomla is vulnerable to the following vulnerabilities:

http://www.joomla.org/content/view/1841/78/ 2006-08-28 2006-08-30 2010-05-12
sppp -- buffer overflow vulnerability FreeBSD 4.11_20 5.35.3_32 5.45.4_17 5.55.5_3 6.06.0_10 6.16.1_4

Problem Description

While processing Link Control Protocol (LCP) configuration options received from the remote host, sppp(4) fails to correctly validate option lengths. This may result in data being read or written beyond the allocated kernel memory buffer.

Impact

An attacker able to send LCP packets, including the remote end of a sppp(4) connection, can cause the FreeBSD kernel to panic. Such an attacker may also be able to obtain sensitive information or gain elevated privileges.

Workaround

No workaround is available, but systems which do not use sppp(4) are not vulnerable.

CVE-2006-4304 SA-06:18.ppp 2006-08-23 2006-08-23 2006-08-30
horde -- Phishing and Cross-Site Scripting Vulnerabilities horde 3.1.2 imp 4.1.2

Secunia reports:

Some vulnerabilities have been reported in Horde, which can be exploited by malicious people to conduct phishing and cross-site scripting attacks.

  1. Input passed to the "url" parameter in index.php isn't properly verified before it is being used to include an arbitrary web site in a frameset. This can e.g. be exploited to trick a user into believing certain malicious content is served from a trusted web site.
  2. Some unspecified input passed in index.php isn't properly sanitised before being returned to the user. This can be exploited to execute arbitrary HTML and script code in a user's browser session in context of an affected site.
19557 19544 http://secunia.com/advisories/21500/ http://lists.horde.org/archives/announce/2006/000292.html 2006-08-17 2006-08-17
globus -- Multiple tmpfile races globus 4.0.2_20060706

The Globus Alliance reports:

The proxy generation tool (grid-proxy-init) creates the file, secures the file to provide access only to owner and writes proxy to the file. A race condition exists between the opening of the proxy credentials file, and making sure it is safe file to write to. The checks to ensure this file is accessible only to the owner take place using the filename after the file is opened for writing, but before any data is written.

Various components of the toolkit use files in shared directories to store information, some being sensitive information. For example, the tool to create proxy certificates, stores the generated proxy certificate by default in /tmp. Specific vulnerabilities in handling such files were reported in myproxy-admin-adduser, grid-ca-sign and grid-security-config.

CVE-2006-4232 CVE-2006-4233 http://www.globus.org/mail_archive/security-announce/2006/08/msg00000.html http://www.globus.org/mail_archive/security-announce/2006/08/msg00001.html 2006-08-08 2006-08-15 2010-05-12
x11vnc -- authentication bypass vulnerability x11vnc 0.8.2

Ludwig Nussel reports that x11vnc is vulnerable to an authentication bypass vulnerability. The vulnerability is caused by an error in auth.c. This could allow a remote attacker to gain unauthorized and unauthenticated access to the system.

18977 CVE-2006-2450 http://bugs.debian.org/376824 2006-08-08 2006-08-13
alsaplayer -- multiple vulnerabilities alsaplayer 0

Luigi Auriemma reports three vulnerabilities within alsaplayer:

  • The function which handles the HTTP connections is vulnerable to a buffer-overflow that happens when it uses sscanf for copying the URL in the Location's field received from the server into the redirect buffer of only 1024 bytes declared in http_open.
  • A buffer-overflow exists in the functions which add items to the playlist when the GTK interface is used (so the other interfaces are not affected by this problem): new_list_item and CbUpdated in interface/gtk/PlaylistWindow.cpp.
  • AlsaPlayer automatically queries the CDDB server specified in its configuration (by default freedb.freedb.org) when the user choices the CDDA function for playing audio CDs. The function which queries the server uses a buffer of 20 bytes and one of 9 for storing the category and ID strings received from the server while the buffer which contains this server's response is 32768 bytes long. Naturally for exploiting this bug the attacker must have control of the freedb server specified in the AlsaPlayer's configuration.

These vulnerabilities could allow a remote attacker to execute arbitrary code, possibly gaining access to the system.

CVE-2006-4089 19450 http://aluigi.altervista.org/adv/alsapbof-adv.txt 2006-08-09 2006-08-13 2010-05-12
postgresql -- encoding based SQL injection postgresql postgresql-server ja-postgresql 7.37.3.15 7.47.4.13 8.0.08.0.8 8.1.08.1.4

The PostgreSQL development team reports:

An attacker able to submit crafted strings to an application that will embed those strings in SQL commands can use invalidly-encoded multibyte characters to bypass standard string-escaping methods, resulting in possible injection of hostile SQL commands into the database. The attacks covered here work in any multibyte encoding.

The widely-used practice of escaping ASCII single quote "'" by turning it into "\'" is unsafe when operating in multibyte encodings that allow 0x5c (ASCII code for backslash) as the trailing byte of a multibyte character; this includes at least SJIS, BIG5, GBK, GB18030, and UHC. An application that uses this conversion while embedding untrusted strings in SQL commands is vulnerable to SQL-injection attacks if it communicates with the server in one of these encodings. While the standard client libraries used with PostgreSQL have escaped "'" in the safe, SQL-standard way of "''" for some time, the older practice remains common.

18092 CVE-2006-2313 CVE-2006-2314 http://www.postgresql.org/docs/techdocs.50 2006-05-11 2006-08-13
postgresql -- multiple vulnerabilities postgresql postgresql-server ja-postgresql 7.27.2.7 7.37.3.9 7.47.4.7 8.0.08.0.1

Multiple vulnerabilities had been reported in various versions of PostgreSQL:

CVE-2005-0244 CVE-2005-0245 CVE-2005-0246 http://secunia.com/advisories/12948 2005-02-01 2006-08-13
mysql -- format string vulnerability mysql-server 5.15.1.6 5.05.0.19 4.14.1.18

Jean-David Maillefer reports a Denial of Service vulnerability within MySQL. The vulnerability is caused by improper checking of the data_format routine, which cause the MySQL server to crash. The crash is triggered by the following code:
"SELECT date_format('%d%s', 1);

19032 CVE-2006-3469 http://bugs.mysql.com/bug.php?id=20729 2006-06-27 2006-08-13
squirrelmail -- random variable overwrite vulnerability ja-squirrelmail 1.4.01.4.8,2 squirrelmail 1.4.01.4.8

The SquirrelMail developers report:

A logged in user could overwrite random variables in compose.php, which might make it possible to read/write other users' preferences or attachments.

CVE-2006-4019 http://www.squirrelmail.org/security/issue/2006-08-11 2006-08-11 2006-08-12
rubygem-rails -- evaluation of ruby code rubygem-rails 1.1.01.1.3 1.1.41.1.6

The Ruby on Rails blog reports:

With Rails 1.1.0 through 1.1.5 (minus the short-lived 1.1.3), you can trigger the evaluation of Ruby code through the URL because of a bug in the routing code of Rails. This means that you can essentially take down a Rails process by starting something like /script/profiler, as the code will run for a long time and that process will be hung while it happens. Other URLs can even cause data loss.

http://weblog.rubyonrails.org/2006/8/10/rails-1-1-6-backports-and-full-disclosure 2006-08-09 2006-08-10
clamav -- heap overflow vulnerability clamav 0.88.10.88.4 clamav-devel 20060808

Clamav team reports:

A heap overflow vulnerability was discovered in libclamav which could cause a denial of service or allow the execution of arbitrary code.

The problem is specifically located in the PE file rebuild function used by the UPX unpacker.

Relevant code from libclamav/upx.c:

memcpy(dst, newbuf, foffset); *dsize = foffset; free(newbuf); cli_dbgmsg("UPX: PE structure rebuilt from compressed file\n"); return 1;

Due to improper validation it is possible to overflow the above memcpy() beyond the allocated memory block.

CVE-2006-4018 http://www.clamav.net/security/0.88.4.html 2006-08-07 2006-08-08
drupal -- XSS vulnerability drupal 4.6.9

The Drupal project reports:

A malicious user can execute a cross site scripting attack by enticing someone to visit a Drupal site via a specially crafted link.

http://drupal.org/files/sa-2006-011/advisory.txt 2006-08-02 2006-08-02 2006-08-08
gnupg -- 2 more possible memory allocation attacks gnupg 1.4.5

Author reports:

Fixed 2 more possible memory allocation attacks. They are similar to the problem we fixed with 1.4.4. This bug can easily be exploted for a DoS; remote code execution is not entirely impossible.

http://lists.gnupg.org/pipermail/gnupg-announce/2006q3/000229.html 2006-08-01 2006-08-02
ruby -- multiple vulnerabilities ruby ruby_static 1.6.*1.8.* 1.8.*1.8.4_9,1

Secunia reports:

Two vulnerabilities have been reported in Ruby, which can be exploited by malicious people to bypass certain security restrictions.

  1. An error in the handling of the "alias" functionality can be exploited to bypass the safe level protection and replace methods called in the trusted level.
  2. An error caused due to directory operations not being properly checked can be exploited to bypass the safe level protection and close untainted directory streams.
18944 CVE-2006-3694 http://secunia.com/advisories/21009/ http://jvn.jp/jp/JVN%2383768862/index.html http://jvn.jp/jp/JVN%2313947696/index.html 2006-07-12 2006-07-29 2006-07-30
apache -- mod_rewrite buffer overflow vulnerability apache 1.3.281.3.36_1 2.0.462.0.58_2 2.2.02.2.2_1 apache+mod_perl 1.3.281.3.36_1 apache+ipv6 1.3.281.3.37 apache_fp 0 ru-apache 1.3.281.3.37+30.23 ru-apache+mod_ssl 1.3.281.3.34.1.57_2 apache+ssl 1.3.281.3.34.1.57_2 apache+mod_ssl apache+mod_ssl+ipv6 apache+mod_ssl+mod_accel apache+mod_ssl+mod_accel+ipv6 apache+mod_ssl+mod_accel+mod_deflate apache+mod_ssl+mod_accel+mod_deflate+ipv6 apache+mod_ssl+mod_deflate apache+mod_ssl+mod_deflate+ipv6 apache+mod_ssl+mod_snmp apache+mod_ssl+mod_snmp+mod_accel apache+mod_ssl+mod_snmp+mod_accel+ipv6 apache+mod_ssl+mod_snmp+mod_deflate apache+mod_ssl+mod_snmp+mod_deflate+ipv6 apache+mod_ssl+mod_snmp+mod_accel+mod_deflate+ipv6 1.3.281.3.36+2.8.27_1

The Apache Software Foundation and The Apache HTTP Server Project reports:

An off-by-one flaw exists in the Rewrite module, mod_rewrite, as shipped with Apache 1.3 since 1.3.28, 2.0 since 2.0.46, and 2.2 since 2.2.0.

Depending on the manner in which Apache HTTP Server was compiled, this software defect may result in a vulnerability which, in combination with certain types of Rewrite rules in the web server configuration files, could be triggered remotely. For vulnerable builds, the nature of the vulnerability can be denial of service (crashing of web server processes) or potentially allow arbitrary code execution. This issue has been rated as having important security impact by the Apache HTTP Server Security Team.

This flaw does not affect a default installation of Apache HTTP Server. Users who do not use, or have not enabled, the Rewrite module mod_rewrite are not affected by this issue. This issue only affects installations using a Rewrite rule with the following characteristics:

  • The RewriteRule allows the attacker to control the initial part of the rewritten URL (for example if the substitution URL starts with $1)
  • The RewriteRule flags do NOT include any of the following flags: Forbidden (F), Gone (G), or NoEscape (NE).

Please note that ability to exploit this issue is dependent on the stack layout for a particular compiled version of mod_rewrite. If the compiler used to compile Apache HTTP Server has added padding to the stack immediately after the buffer being overwritten, it will not be possible to exploit this issue, and Apache HTTP Server will continue operating normally.

The Apache HTTP Server project thanks Mark Dowd of McAfee Avert Labs for the responsible reporting of this vulnerability.

395412 CVE-2006-3747 http://marc.theaimsgroup.com/?l=apache-httpd-announce&m=115409818602955 2006-07-27 2006-07-28 2006-11-01
mozilla -- multiple vulnerabilities firefox 1.5.0.5,1 2.*,12.0_1,1 linux-firefox 1.5.0.5 linux-firefox-devel 3.0.a2006.07.26 seamonkey linux-seamonkey 1.0.3 thunderbird linux-thunderbird mozilla-thunderbird 1.5.0.5 mozilla linux-mozilla linux-mozilla-devel 0

A Mozilla Foundation Security Advisory reports of multiple issues. Several of which can be used to run arbitrary code with the privilege of the user running the program.

  • MFSA 2006-56 chrome: scheme loading remote content
  • MFSA 2006-55 Crashes with evidence of memory corruption (rv:1.8.0.5)
  • MFSA 2006-54 XSS with XPCNativeWrapper(window).Function(...)
  • MFSA 2006-53 UniversalBrowserRead privilege escalation
  • MFSA 2006-52 PAC privilege escalation using Function.prototype.call
  • MFSA 2006-51 Privilege escalation using named-functions and redefined "new Object()"
  • MFSA 2006-50 JavaScript engine vulnerabilities
  • MFSA 2006-49 Heap buffer overwrite on malformed VCard
  • MFSA 2006-48 JavaScript new Function race condition
  • MFSA 2006-47 Native DOM methods can be hijacked across domains
  • MFSA 2006-46 Memory corruption with simultaneous events
  • MFSA 2006-45 Javascript navigator Object Vulnerability
  • MFSA 2006-44 Code execution through deleted frame reference
CVE-2006-3113 CVE-2006-3677 CVE-2006-3801 CVE-2006-3802 CVE-2006-3803 CVE-2006-3804 CVE-2006-3805 CVE-2006-3806 CVE-2006-3807 CVE-2006-3808 CVE-2006-3809 CVE-2006-3810 CVE-2006-3811 CVE-2006-3812 http://www.mozilla.org/projects/security/known-vulnerabilities.html#seamonkey1.0.3 http://www.mozilla.org/security/announce/2006/mfsa2006-44.html http://www.mozilla.org/security/announce/2006/mfsa2006-45.html http://www.mozilla.org/security/announce/2006/mfsa2006-46.html http://www.mozilla.org/security/announce/2006/mfsa2006-47.html http://www.mozilla.org/security/announce/2006/mfsa2006-48.html http://www.mozilla.org/security/announce/2006/mfsa2006-49.html http://www.mozilla.org/security/announce/2006/mfsa2006-50.html http://www.mozilla.org/security/announce/2006/mfsa2006-51.html http://www.mozilla.org/security/announce/2006/mfsa2006-52.html http://www.mozilla.org/security/announce/2006/mfsa2006-53.html http://www.mozilla.org/security/announce/2006/mfsa2006-54.html http://www.mozilla.org/security/announce/2006/mfsa2006-55.html http://www.mozilla.org/security/announce/2006/mfsa2006-56.html 2006-07-25 2006-07-27 2006-11-02
zope -- information disclosure vulnerability zope 2.7.02.7.9 2.8.02.8.7 2.9.02.9.3

Zope team reports:

Unspecified vulnerability in (Zope2) allows local users to obtain sensitive information via unknown attack vectors related to the docutils module and "restructured text".

CVE-2006-3458 http://www.zope.org/Products/Zope/Hotfix-2006-07-05/Hotfix-2006-07-05/view 2006-07-05 2006-07-14
drupal -- multiple vulnerabilities drupal 4.6.8

The Drupal team reports:

Vulnerability: XSS Vulnerability in taxonomy module

It is possible for a malicious user to insert and execute XSS into terms, due to lack of validation on output of the page title. The fix wraps the display of terms in check_plain().

CVE-2006-2833 http://drupal.org/node/66767 2006-05-18 2006-07-13 2006-07-14
shoutcast -- cross-site scripting, information exposure shoutcast linux-shoutcast 1.9.7

Goober's advisory reports reports that shoutcast is vulnerable to an arbitrary file reading vulnerability:

Impact of the vulnerability depends on the way the product was installed. In general, the vulnerability allows the attacker to read any file which can be read by the Shoutcast server process.

CVE-2006-3007 http://secunia.com/advisories/20524/ http://people.ksp.sk/~goober/advisory/001-shoutcast.html 2006-06-09 2006-07-11
samba -- memory exhaustion DoS in smbd samba ja-samba 3.0.1,13.0.23,1

The Samba Team reports:

The smbd daemon maintains internal data structures used track active connections to file and printer shares. In certain circumstances an attacker may be able to continually increase the memory usage of an smbd process by issuing a large number of share connection requests. This defect affects all Samba configurations.

CVE-2006-3403 http://www.samba.org/samba/security/CAN-2006-3403.html 2006-07-10 2006-07-10
twiki -- multiple file extensions file upload vulnerability twiki 4.0.4,1

A TWiki Security Alert reports:

The TWiki upload filter already prevents executable scripts such as .php, .php1, .phps, .pl from potentially getting executed by appending a .txt suffix to the uploaded filename. However, PHP and some other types allows additional file suffixes, such as .php.en, .php.1, and .php.2. TWiki does not check for these suffixes, e.g. it is possible to upload php scripts with such suffixes without the .txt filename padding.

This issue can also be worked around with a restrictive web server configuration. See the TWiki Security Alert for more information about how to do this.

18854 CVE-2006-3336 http://secunia.com/advisories/20992/ http://twiki.org/cgi-bin/view/Codev/SecurityAlertSecureFileUploads 2006-07-05 2006-07-10
trac -- reStructuredText breach of privacy and denial of service vulnerability trac ja-trac 0.9.6

The Trac 0.9.6 Release Notes reports:

Fixed reStructuredText breach of privacy and denial of service vulnerability found by Felix Wiemann.

The discovered vulnerability requires docutils to be installed and enabled. Systems that do not have docutils installed or enabled are not vulnerable. As of this version version 0.3.9 or greater of docutils is required for using reStructuredText markup in Trac.

CVE-2005-3980 CVE-2005-4305 CVE-2005-4065 http://projects.edgewall.com/trac/wiki/ChangeLog http://lists.edgewall.com/archive/trac-announce/2006-July/000013.html 2006-07-06 2006-07-07 2010-05-12
horde -- various problems in dereferrer horde horde-php5 3.1.2

Horde 3.1.2 release announcement:

Security Fixes:

  • Closed XSS problems in dereferrer (IE only), help viewer and problem reporting screen.
  • Removed unused image proxy code from dereferrer.
CVE-2006-3548 http://lists.horde.org/archives/announce/2006/000288.html 2006-06-28 2006-07-05 2010-05-12
mambo -- SQL injection vulnerabilities mambo 4.5.4

The Team Mambo reports that two SQL injection vulnerabilities have been found in Mambo. The vulnerabilities exists due to missing sanitation of the title and catid parameters in the weblinks.php page and can lead to execution of arbitrary SQL code.

16775 CVE-2006-0871 CVE-2006-1794 CVE-2006-3262 CVE-2006-3263 http://marc.theaimsgroup.com/?l=bugtraq&m=115056811230529 http://secunia.com/advisories/18935/ http://secunia.com/advisories/20745/ http://www.mamboserver.com/?option=com_content&task=view&id=207 http://www.gulftech.org/?node=research&article_id=00104-02242006 2006-06-19 2006-07-05 2006-10-05
phpmyadmin -- cross site scripting vulnerability phpMyAdmin 2.8.2

phpmyadmin Site reports:

It was possible to craft a request that contains XSS by attacking the "table" parameter.

http://www.phpmyadmin.net/home_page/security.php?issue=PMASA-2006-4 http://securitynews.ir/advisories/phpmyadmin281.txt 2006-06-30 2006-07-03 2007-10-16
webmin, usermin -- arbitrary file disclosure vulnerability webmin 1.290 usermin 1.220

The webmin development team reports:

An attacker without a login to Webmin can read the contents of any file on the server using a specially crafted URL. All users should upgrade to version 1.290 as soon as possible, or setup IP access control in Webmin.

18744 http://www.webmin.com/security.html 2006-06-30 2006-07-02
mutt -- Remote Buffer Overflow Vulnerability mutt mutt-lite 1.4.2.1_2 mutt-devel mutt-devel-lite 1.5.11_2 ja-mutt 1.4.2.1.j1 zh-mutt-devel 1.5.11_20040617 ja-mutt-devel 1.5.6.j1_2 mutt-ng 20060501

SecurityFocus reports:

Mutt is prone to a remote buffer-overflow vulnerability. This issue is due to the application's failure to properly bounds-check user-supplied input before copying it to an insufficiently sized memory buffer.

This issue may allow remote attackers to execute arbitrary machine code in the context of the affected application. Failed exploit attempts will likely crash the application, denying further service to legitimate users.

18642 http://dev.mutt.org/cgi-bin/gitweb.cgi?p=mutt/.git;a=commit;h=dc0272b749f0e2b102973b7ac43dbd3908507540 2006-06-26 2006-06-30
Joomla -- multiple vulnerabilities joomla 1.0.10

Joomla Site reports:

  • Secured "Remember Me" functionality against SQL injection attacks
  • Secured "Related Items" module against SQL injection attacks
  • Secured "Weblinks" submission against SQL injection attacks
  • Secured SEF from XSS vulnerability
  • Hardened frontend submission forms against spoofing
  • Secured mosmsg from misuse
  • Hardened mosgetparam by setting variable type to integer if default value is detected as numeric
  • Secured com_messages from XSS vulnerability
  • Secured getUserStateFromRequest() from XSS vulnerability
http://secunia.com/advisories/20746/ http://www.joomla.org/content/view/1510/74/ 2006-06-26 2006-06-30
hashcash -- heap overflow vulnerability hashcash 1.22

Andreas Seltenreich reports that hashcash is prone to a heap overflow vulnerability. This vulnerability is caused by improper checking of memory allocations within the "array_push()" function. An attacker could trigger this vulnerability by passing a lot of "-r" or "-j" flags from the command line, this only applies when the application is configured to allow command line options, or by passing a lot of resource names when the application was started with the "-m" flag set. This could lead to a Denial or Service or could allow remote access to the targeted system.

http://secunia.com/advisories/20800/ http://www.hashcash.org/source/CHANGELOG 2006-06-27 2006-06-27
gnupg -- user id integer overflow vulnerability gnupg 1.4.4

If GnuPG processes a userid with a very long packet length, GnuPG can crash due to insufficient bounds check. This can result in a denial-of-service condition or potentially execution of arbitrary code with the privileges of the user running GnuPG.

18554 CVE-2006-3082 http://marc.theaimsgroup.com/?l=gnupg-users&m=115124706210430 http://marc.theaimsgroup.com/?l=full-disclosure&m=114907659313360 http://cvs.gnupg.org/cgi-bin/viewcvs.cgi/trunk/g10/parse-packet.c?rev=4157&r1=4141&r2=4157 2006-05-31 2006-06-25
horde -- multiple parameter cross site scripting vulnerabilities horde horde-php5 3.1.1

FrSIRT advisory ADV-2006-2356 reports:

Multiple vulnerabilities have been identified in Horde Application Framework, which may be exploited by attackers to execute arbitrary scripting code. These flaws are due to input validation errors in the "test.php" and "templates/problem/problem.inc" scripts that do not validate the "url", "name", "email", "subject" and "message" parameters, which could be exploited by attackers to cause arbitrary scripting code to be executed by the user's browser in the security context of an affected Web site.

CVE-2006-2195 http://www.frsirt.com/english/advisories/2006/2356 http://cvs.horde.org/diff.php?f=horde%2Ftest.php&r1=1.145&r2=1.146 http://cvs.horde.org/diff.php?f=horde%2Ftemplates%2Fproblem%2Fproblem.inc&r1=2.25&r2=2.26 2006-06-10 2006-06-17
WebCalendar -- information disclosure vulnerability WebCalendar 1.0.4

Secunia reports:

socsam has discovered a vulnerability in WebCalendar, which can be exploited by malicious people to bypass certain security restrictions and disclose sensitive information.

Input passed to the "includedir" parameter isn't properly verified, before it is used in an "fopen()" call. This can be exploited to load an arbitrary setting file from an external web site.

This can further be exploited to disclose the content of arbitrary files by defining the "user_inc" variable in a malicious setting file.

Successful exploitation requires that "register_globals" is enabled.

18175 CVE-2006-2762 http://www.securityfocus.com/archive/1/435379 http://www.securityfocus.com/archive/1/436263 2006-05-30 2006-06-16 2006-06-17
sendmail -- Incorrect multipart message handling FreeBSD 4.114.11_19 5.35.3_31 5.45.4_16 5.55.5_2 6.06.0_9 6.16.1_2

Problem Description

A suitably malformed multipart MIME message can cause sendmail to exceed predefined limits on its stack usage.

Impact

An attacker able to send mail to, or via, a server can cause queued messages on the system to not be delivered, by causing the sendmail process which handles queued messages to crash. Note that this will not stop new messages from entering the queue (either from local processes, or incoming via SMTP).

Workaround

No workaround is available, but systems which do not receive email from untrusted sources are not vulnerable.

CVE-2006-1173 SA-06:17.sendmail 2006-06-14 2006-06-14
dokuwiki -- multiple vulnerabilities dokuwiki 20060309_2

Multiple vulnerabilities have been reported within dokuwiki. dokuwiki is proven vulnerable to:

http://bugs.splitbrain.org/index.php?do=details&id=820 http://bugs.splitbrain.org/index.php?do=details&id=823 http://bugs.splitbrain.org/index.php?do=details&id=825 2006-05-31 2006-06-11 2006-06-12
libxine -- buffer overflow vulnerability libxine 1.1.1_6

A Secunia Advisory reports:

Federico L. Bossi Bonin has discovered a weakness in xine-lib, which can be exploited by malicious people to crash certain applications on a user's system.

The weakness is cause due to a heap corruption within the "xineplug_inp_http.so" plugin when handling an overly large reply from the HTTP server. This can be exploited to crash an application that uses the plugin (e.g. gxine).

http://secunia.com/advisories/20369 CVE-2006-2802 18187 2006-05-31 2006-06-11
smbfs -- chroot escape FreeBSD 4.104.10_24 4.114.11_18 5.35.3_30 5.45.4_15 5.55.5_1 6.06.0_8 6.16.1_1

Problem Description

smbfs does not properly sanitize paths containing a backslash character; in particular the directory name '..\' is interpreted as the parent directory by the SMB/CIFS server, but smbfs handles it in the same manner as any other directory.

Impact

When inside a chroot environment which resides on a smbfs mounted file-system it is possible for an attacker to escape out of this chroot to any other directory on the smbfs mounted file-system.

Workaround

Mount the smbfs file-systems which need to be used with chroot on top, in a way so the chroot directory is exactly on the mount point and not a sub directory

CVE-2006-2654 SA-06:16.smbfs 2006-05-31 2006-06-09
ypserv -- Inoperative access controls in ypserv FreeBSD 5.35.3_30 5.45.4_15 5.55.5_1 6.06.0_8 6.16.1_1

Problem Description

There are two documented methods of restricting access to NIS maps through ypserv(8): through the use of the /var/yp/securenets file, and through the /etc/hosts.allow file. While both mechanisms are implemented in the server, a change in the build process caused the "securenets" access restrictions to be inadvertantly disabled.

Impact

ypserv(8) will not load or process any of the networks or hosts specified in the /var/yp/securenets file, rendering those access controls ineffective.

Workaround

One possible workaround is to use /etc/hosts.allow for access control, as shown by examples in that file.

Another workaround is to use a firewall (e.g., ipfw(4), ipf(4), or pf(4)) to limit access to RPC functions from untrusted systems or networks, but due to the complexities of RPC, it might be difficult to create a set of firewall rules which accomplish this without blocking all access to the machine in question.

CVE-2006-2655 SA-06:15.ypserv 2006-05-31 2006-06-09
freeradius -- multiple vulnerabilities freeradius 1.0.01.0.4

The freeradious development team reports:

Multiple issues exist with version 1.0.4, and all prior versions of the server. Externally exploitable vulnerabilities exist only for sites that use the rlm_sqlcounter module. Those sites may be vulnerable to SQL injection attacks, similar to the issues noted below. All sites that have not deployed the rlm_sqlcounter module are not vulnerable to external exploits.

The issues are:
SQL Injection attack in the rlm_sqlcounter module.
Buffer overflow in the rlm_sqlcounter module, that may cause a server crash.
Buffer overflow while expanding %t, that may cause a server crash.

17171 CVE-2005-4744 2005-09-09 2006-06-08
freeradius -- authentication bypass vulnerability freeradius 1.0.01.1.0

The freeradius development team reports:

A validation issue exists with the EAP-MSCHAPv2 module in all versions from 1.0.0 (where the module first appeared) to 1.1.0. Insufficient input validation was being done in the EAP-MSCHAPv2 state machine. A malicious attacker could manipulate their EAP-MSCHAPv2 client state machine to potentially convince the server to bypass authentication checks. This bypassing could also result in the server crashing

17293 CVE-2006-1354 2006-06-03 2006-06-08
squirrelmail -- plugin.php local file inclusion vulnerability squirrelmail 1.4.6_1

The SquirrelMail Project Team reports:

A security issue has been uncovered in functions/plugin.php that could allow a remote user to access local files on the server without requiring login. This issue manifests itself if register_globals is enabled, and magic_quotes_gpc is disabled.

http://www.squirrelmail.org/security/issue/2006-06-01 http://secunia.com/advisories/20406/ 2006-06-01 2006-06-05 2006-06-06
dokuwiki -- spellchecker remote PHP code execution dokuwiki 20060309_1

Stefan Esser reports:

During the evaluation of DokuWiki for a german/korean wiki of mine a flaw in DokuWiki's spellchecker was discovered, that allows injecting arbitrary PHP commands, by requesting a spellcheck on PHP commands in 'complex curly syntax'.

Because the spellchecker is written as part of the AJAX functionality of DokuWiki, it can be directly called by any website visitor, without the need for a wiki account.

http://www.hardened-php.net/advisory_042006.119.html http://bugs.splitbrain.org/index.php?do=details&id=823 http://secunia.com/advisories/20429/ 2006-06-05 2006-06-05
drupal -- multiple vulnerabilities drupal 4.6.7

The Drupal team reports:

Vulnerability: SQL injection

A security vulnerability in the database layer allowed certain queries to be submitted to the database without going through Drupal's query sanitizer.

Vulnerability: Execution of arbitrary files

Certain -- alas, typical -- configurations of Apache allows execution of carefully named arbitrary scripts in the files directory. Drupal now will attempt to automatically create a .htaccess file in your "files" directory to protect you.

CVE-2006-2742 CVE-2006-2743 http://drupal.org/node/65357 http://drupal.org/node/65409 2006-05-18 2006-06-05
MySQL -- SQL-injection security vulnerability mysql-server 5.15.1.9 5.05.0.22 4.14.1.20

MySQL reports:

An SQL-injection security hole has been found in multibyte encoding processing. An SQL-injection security hole can include a situation whereby when inserting user supplied data into a database, the user might inject his own SQL statements that the server will execute. With regards to this vulnerability discovered, when character set unaware escaping is used (e.g., addslashes() in PHP), it is possible to bypass it in some multibyte character sets (e.g., SJIS, BIG5 and GBK). As a result, a function like addslashes() is not able to prevent SQL injection attacks. It is impossible to fix this on the server side. The best solution is for applications to use character set aware escaping offered in a function like mysql_real_escape().

Workarounds:

One can use NO_BACKSLASH_ESCAPES mode as a workaround for a bug in mysql_real_escape_string(), if you cannot upgrade your server for some reason. It will enable SQL standard compatibility mode, where backslash is not considered a special character.

http://lists.mysql.com/announce/364 http://lists.mysql.com/announce/365 2006-05-31 2006-06-01
MySQL -- Information Disclosure and Buffer Overflow Vulnerabilities mysql-server 4.04.0.27 4.14.1.19 5.15.1.9

Secunia reports:

MySQL have some vulnerabilities, which can be exploited by malicious users to disclose potentially sensitive information and compromise a vulnerable system.

1) An error within the code that generates an error response to an invalid COM_TABLE_DUMP packet can be exploited by an authenticated client to disclosure certain memory content of the server process.

2) A boundary error within the handling of specially crafted invalid COM_TABLE_DUMP packets can be exploited by an authenticated client to cause a buffer overflow and allows arbitrary code execution.

3) An error within the handling of malformed login packets can be exploited to disclosure certain memory content of the server process in the error messages.

CVE-2006-1516 CVE-2006-1517 CVE-2006-1518 602457 http://www.wisec.it/vulns.php?page=7 http://www.wisec.it/vulns.php?page=8 http://dev.mysql.com/doc/refman/4.1/en/news-4-0-27.html http://dev.mysql.com/doc/refman/4.1/en/news-4-1-19.html http://dev.mysql.com/doc/refman/5.1/en/news-5-1-10.html http://secunia.com/advisories/19929/ http://www.vuxml.org/freebsd/a8d8713e-dc83-11da-a22b-000c6ec775d9.html 2006-05-02 2006-06-01
frontpage -- cross site scripting vulnerability frontpage mod_frontpage13 mod_frontpage20 mod_frontpage21 mod_frontpage22 5.0.2.4803

Esteban Martinez Fayo reports:

The FrontPage Server Extensions 2002 (included in Windows Sever 2003 IIS 6.0 and available as a separate download for Windows 2000 and XP) has a web page /_vti_bin/_vti_adm/fpadmdll.dll that is used for administrative purposes. This web page is vulnerable to cross site scripting attacks allowing an attacker to run client-side script on behalf of an FPSE user. If the victim is an administrator, the attacker could take complete control of a Front Page Server Extensions 2002 server.

To exploit the vulnerability an attacker can send a specially crafted e-mail message to a FPSE user and then persuade the user to click a link in the e-mail message.

In addition, this vulnerability can be exploited if an attacker hosts a malicious website and persuade the user to visit it.

CVE-2006-0015 http://marc.theaimsgroup.com/?l=bugtraq&m=114487846329000 http://www.microsoft.com/technet/security/bulletin/MS06-017.mspx http://www.rtr.com/fpsupport/fpse_release_may_2_2006.htm 2006-04-12 2006-05-23
cscope -- buffer overflow vulnerabilities cscope 15.5_2

Jason Duell reports:

Cscope contains an alarming number of buffer overflow vulnerabilities. By a rough count, there are at least 48 places where we blindly sprintf() a file name into a fixed-length buffer of size PATHLEN without checking to see if the file's name is <= PATHLEN. We do similar things with environment variable values.

CVE-2004-2541 http://sourceforge.net/tracker/index.php?func=detail&aid=1064875&group_id=4664&atid=104664 http://secunia.com/advisories/13237 2004-11-11 2006-05-23
coppermine -- Multiple File Extensions Vulnerability coppermine 1.4.6

Secunia reports:

Coppermine Photo Gallery have a vulnerability, which can be exploited by malicious users to compromise a vulnerable system.

The vulnerability is caused due to an error in the handling of file uploads where a filename has multiple file extensions. This can be exploited to upload malicious script files inside the web root (e.g. a PHP script).

Successful exploitation may allow execution of script code depending on the HTTP server configuration (it requires e.g. an Apache server with the "mod_mime" module installed).

http://sourceforge.net/project/shownotes.php?group_id=89658&release_id=418266 http://secunia.com/advisories/20211/ 2006-05-22 2006-05-22
coppermine -- "file" Local File Inclusion Vulnerability coppermine 1.4.5

Secunia reports:

Coppermine Photo Gallery have a vulnerability, which can be exploited by malicious people to disclose sensitive information.

Input passed to the "file" parameter in "index.php" isn't properly verified, before it is used to include files. This can be exploited to include arbitrary files from local resources.

Example: http://[host]/index.php?file=.//././/././/././/./[file]%00

Successful exploitation requires that "magic_quotes_gpc" is disabled.

CVE-2006-1909 http://coppermine-gallery.net/forum/index.php?topic=30655.0 http://myimei.com/security/2006-04-14/copperminephotogallery144-plugininclusionsystemindexphp-remotefileinclusion-attack.html http://secunia.com/advisories/19665/ 2006-04-19 2006-05-22
coppermine -- File Inclusion Vulnerabilities coppermine 1.4.4

Secunia reports:

Coppermine Photo Gallery have a vulnerability, which can be exploited by malicious people and by malicious users to compromise a vulnerable system.

1) Input passed to the "lang" parameter in include/init.inc.php isn't properly verified, before it is used to include files. This can be exploited to include arbitrary files from local resources. The vulnerability can be further exploited by users who are allowed to upload image files to execute arbitrary PHP code.

2) Input passed to the "f" parameter in docs/showdoc.php isn't properly verified, before it is used to include files. This can be exploited to include arbitrary files from local resources on the Windows platform, and remote files from Windows shared folders.

CVE-2006-0872 CVE-2006-0873 http://retrogod.altervista.org/cpg_143_adv.html http://secunia.com/advisories/18941/ 2006-02-20 2006-05-22
phpmyadmin -- XSRF vulnerabilities phpMyAdmin 2.8.1

phpMyAdmin security team reports:

It was possible to inject arbitrary SQL commands by forcing an authenticated user to follow a crafted link.

Such issue is quite common in many PHP applications and users should take care what links they follow. We consider these vulnerabilities to be quite dangerous.

CVE-2006-1804 http://www.phpmyadmin.net/home_page/security.php?issue=PMASA-2006-3 http://secunia.com/advisories/19659 2006-05-20 2006-05-21
vnc -- authentication bypass vulnerability vnc 4.1.1

RealVNC is susceptible to an authentication-bypass vulnerability. A malicious VNC client can cause a VNC server to allow it to connect without any authentication regardless of the authentication settings configured in the server. Exploiting this issue allows attackers to gain unauthenticated, remote access to the VNC servers.

17978 http://www.securityfocus.com/archive/1/433994/30/0/threaded 2006-05-15 2006-05-18
phpldapadmin -- Cross-Site Scripting and Script Insertion vulnerabilities phpldapadmin098 0.9.8.3

Secunia reports:

phpLDAPadmin have some vulnerabilities, which can be exploited by malicious users to conduct script insertion attacks and by malicious people to conduct cross-site scripting attacks.

1) Some input isn't properly sanitised before being returned to the user. This can be exploited to execute arbitrary HTML and script code in a user's browser session in context of an affected site.

2) Input passed to the "Container DN", "Machine Name", and "UID Number" parameters in "template_engine.php" isn't properly sanitised before being used. This can be exploited to inject arbitrary HTML and script code, which will be executed in a user's browser session in context of an affected site when the malicious user data is viewed.

CVE-2006-2016 http://pridels.blogspot.com/2006/04/phpldapadmin-multiple-vuln.html http://www.frsirt.com/english/advisories/2006/1450 http://secunia.com/advisories/19747/ 2006-04-21 2006-05-14
fswiki -- XSS vulnerability fswiki 3.5.11

JVN reports:

FreeStyleWiki has XSS vulnerability.

http://jvn.jp/jp/JVN%2335274905/ 2006-04-18 2006-05-06
mysql50-server -- COM_TABLE_DUMP arbitrary code execution mysql-server 5.05.0.21

Stefano Di Paola reports:

An authenticated user could remotely execute arbitrary commands by taking advantage of a stack overflow.

To take advantage of these flaws an attacker should have direct access to MySQL server communication layer (port 3306 or unix socket). But if used in conjuction with some web application flaws (i.e. php code injection) an attacker could use socket programming (i.e. php sockets) to gain access to that layer.

CVE-2006-1518 http://www.wisec.it/vulns.php?page=8 http://marc.theaimsgroup.com/?l=bugtraq&m=114659633220473 http://dev.mysql.com/doc/refman/5.0/en/news-5-0-21.html 2006-05-02 2006-05-06
awstats -- arbitrary command execution vulnerability awstats 6.5_2,1

OS Reviews reports:

If the update of the stats via web front-end is allowed, a remote attacker can execute arbitrary code on the server using a specially crafted request involving the migrate parameter. Input starting with a pipe character ("|") leads to an insecure call to Perl's open function and the rest of the input being executed in a shell. The code is run in the context of the process running the AWStats CGI.

Arbitrary code can be executed by uploading a specially crafted configuration file if an attacker can put a file on the server with chosen file name and content (e.g. by using an FTP account on a shared hosting server). In this configuration file, the LogFile directive can be used to execute shell code following a pipe character. As above, an open call on unsanitized input is the source of this vulnerability.

http://awstats.sourceforge.net/awstats_security_news.php http://secunia.com/advisories/19969/ http://www.osreviews.net/reviews/comm/awstats 2006-05-03 2006-05-05 2006-11-15
phpwebftp -- "language" Local File Inclusion phpwebftp 3.3

Secunia reports:

phpWebFTP have a vulnerability, which can be exploited by malicious people to disclose sensitive information.

Input passed to the "language" parameter in index.php isn't properly verified, before it is used to include files. This can be exploited to include arbitrary files from local resources.

Successful exploitation requires that "magic_quotes_gpc" is disabled.

CVE-2006-1812 CVE-2006-1813 https://sourceforge.net/forum/forum.php?forum_id=566199 http://secunia.com/advisories/19706/ 2006-04-18 2006-05-03
firefox -- denial of service vulnerability firefox 1.5.*,11.5.0.3,1 linux-firefox 1.5.0.3

A Mozilla Foundation Security Advisory reports for deleted object reference when designMode="on"

Martijn Wargers and Nick Mott each described crashes that were discovered to ultimately stem from the same root cause: attempting to use a deleted controller context when designMode was turned on. This generally results in crashing the browser, but in theory references to deleted objects can be abused to run malicious code.

"splices" reported the same crash at the fan site MozillaZine and on Bugtraq, incorrectly describing it as a buffer overflow.

CVE-2006-1993 http://www.mozilla.org/security/announce/2006/mfsa2006-30.html 2006-05-02 2006-05-03 2006-05-05
trac -- Wiki Macro Script Insertion Vulnerability trac ja-trac 0.9.5

Secunia reports:

A vulnerability has been reported, which can be exploited by malicious people to conduct script insertion attacks.

Input passed using the wiki macro isn't properly sanitised before being used. This can be exploited to inject arbitrary HTML and script code, which will be executed in a user's browser session in context of an affected site when the malicious user data is viewed.

http://projects.edgewall.com/trac/wiki/ChangeLog http://jvn.jp/jp/JVN%2384091359/index.html http://secunia.com/advisories/19870/ 2006-04-28 2006-05-02
clamav -- Freshclam HTTP Header Buffer Overflow Vulnerability clamav 0.800.88.2 clamav-devel 2004082620060502

Secunia reports:

A vulnerability has been reported in ClamAV, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially to compromise a vulnerable system.

The vulnerability is caused due to a boundary error within the HTTP client in the Freshclam command line utility. This can be exploited to cause a stack-based buffer overflow when the HTTP headers received from a web server exceeds 8KB.

Successful exploitation requires that Freshclam is used to download virus signature updates from a malicious mirror web server e.g. via DNS poisoning.

CVE-2006-1989 http://www.clamav.net/security/0.88.2.html http://secunia.com/advisories/19880/ 2006-05-01 2006-05-03
jabberd -- SASL Negotiation Denial of Service Vulnerability jabberd 2.0.11

Secunia reports:

A vulnerability has been reported in jabberd, which can be exploited by malicious people to cause a DoS (Denial of Service).

The vulnerability is caused due to an error within the handling of SASL negotiation. This can be exploited to cause a crash by sending a "response" stanza before an "auth" stanza.

CVE-2006-1329 http://article.gmane.org/gmane.network.jabber.admin/27372 http://jabberstudio.org/projects/jabberd2/releases/view.php?id=826 http://secunia.com/advisories/19281/ 2006-03-20 2006-05-01
cacti -- ADOdb "server.php" Insecure Test Script Security Issue cacti 0.8.6h

Secunia reports:

Cacti have a security issue, which can be exploited by malicious people to execute arbitrary SQL code and potentially compromise a vulnerable system.

The problem is caused due to the presence of the insecure "server.php" test script.

http://secunia.com/advisories/18276/ http://secunia.com/advisories/17418/ 2006-01-09 2006-04-27
amaya -- Attribute Value Buffer Overflow Vulnerabilities amaya 9.5

Secunia reports:

Amaya have two vulnerabilities, which can be exploited by malicious people to compromise a user's system.

The vulnerabilities are caused due to boundary errors within the parsing of various attribute values. This can be exploited to cause stack-based buffer overflows when a user opens a specially crafted HTML document containing certain tags with overly long attribute values.

Successful exploitation allows execution of arbitrary code.

CVE-2006-1900 http://morph3us.org/advisories/20060412-amaya-94.txt http://morph3us.org/advisories/20060412-amaya-94-2.txt http://secunia.com/advisories/19670/ 2006-04-14 2006-04-27
lifetype -- ADOdb "server.php" Insecure Test Script Security Issue lifetype 1.0.3

Secunia reports:

A security issue has been discovered in LifeType, which can be exploited by malicious people to execute arbitrary SQL code and potentially compromise a vulnerable system.

The problem is caused due to the presence of the insecure "server.php" test script.

CVE-2006-0146 http://secunia.com/advisories/19699/ http://secunia.com/advisories/17418/ 2006-04-19 2006-04-27
ethereal -- Multiple Protocol Dissector Vulnerabilities ethereal ethereal-lite tethereal tethereal-lite 0.8.50.99.0

Secunia reports:

Multiple vulnerabilities have been reported in Ethereal, which can be exploited by malicious people to cause a DoS (Denial of Service) or compromise a vulnerable system.

The vulnerabilities are caused due to various types of errors including boundary errors, an off-by-one error, an infinite loop error, and several unspecified errors in a multitude of protocol dissectors.

Successful exploitation causes Ethereal to stop responding, consume a large amount of system resources, crash, or execute arbitrary code.

CVE-2006-1932 CVE-2006-1933 CVE-2006-1934 CVE-2006-1935 CVE-2006-1936 CVE-2006-1937 CVE-2006-1938 CVE-2006-1939 CVE-2006-1940 http://www.ethereal.com/appnotes/enpa-sa-00023.html http://secunia.com/advisories/19769/ 2006-04-25 2006-04-27
asterisk -- denial of service vulnerability, local system access asterisk 1.2.7

Emmanouel Kellenis reports a denial of service vulnerability within asterisk. The vulnerability is caused by a buffer overflow in "format_jpeg.c". A large JPEG image could trigger this bug, potentially allowing a local attacker to execute arbitrary code.

17561 CVE-2006-1827 http://www.cipher.org.uk/index.php?p=advisories/Asterisk_Codec_Integer_Overflow_07-04-2006.advisory 2006-04-07 2006-04-25
zgv, xzgv -- heap overflow vulnerability zgv 5.9_1 xzgv 0.9

Gentoo reports:

Andrea Barisani of Gentoo Linux discovered xzgv and zgv allocate insufficient memory when rendering images with more than 3 output components, such as images using the YCCK or CMYK colour space. When xzgv or zgv attempt to render the image, data from the image overruns a heap allocated buffer.

An attacker may be able to construct a malicious image that executes arbitrary code with the permissions of the xzgv or zgv user when attempting to render the image.

17409 CVE-2006-1060 http://www.gentoo.org/security/en/glsa/glsa-200604-10.xml 2006-04-21 2006-04-23 2010-03-22
crossfire-server -- denial of service and remote code execution vulnerability crossfire-server 1.9.0

FRSIRT reports:

A vulnerability has been identified in CrossFire, which could be exploited by remote attackers to execute arbitrary commands or cause a denial of service. This flaw is due to a buffer overflow error in the "oldsocketmode" module that fails to properly handle overly large requests, which could be exploited by a malicious client to crash or compromise a vulnerable system.

16883 CVE-2006-1010 http://www.frsirt.com/english/advisories/2006/0760 2006-02-28 2006-04-23
p5-DBI -- insecure temporary file creation vulnerability p5-DBI-137 0 p5-DBI 1.37_1 1.381.48

Javier Fernández-Sanguino Peña reports:

The DBI library, the Perl5 database interface, creates a temporary PID file in an insecure manner. This can be exploited by a malicious user to overwrite arbitrary files owned by the person executing the parts of the library.

12360 CAN-2005-0077 http://www.debian.org/security/2005/dsa-658 2005-01-25 2006-04-23 2006-05-11
wordpress -- full path disclosure wordpress 1.5.2

Dedi Dwianto reports:

A remote user can access the file directly to cause the system to display an error message that indicates the installation path. The resulting error message will disclose potentially sensitive installation path information to the remote attacker.

CVE-2005-4463 http://echo.or.id/adv/adv24-theday-2005.txt 2005-12-20 2006-04-23
xine -- multiple remote string vulnerabilities xine 0.99.4_4

c0ntexb reports:

There are 2 format string bugs in the latest version of Xine that could be exploited by a malicious person to execute code on the system of a remote user running the media player against a malicious playlist file. By passing a format specifier in the path of a file that is embedded in a remote playlist, it is possible to trigger this bug.

17579 CVE-2006-1905 http://www.open-security.org/advisories/16 2006-04-18 2006-04-23
cyrus-sasl -- DIGEST-MD5 Pre-Authentication Denial of Service cyrus-sasl 2.*2.1.21

Unspecified vulnerability in the CMU Cyrus Simple Authentication and Security Layer (SASL) library, has unknown impact and remote unauthenticated attack vectors, related to DIGEST-MD5 negotiation.

CVE-2006-1721 2006-04-11 2006-04-22
FreeBSD -- FPU information disclosure FreeBSD 6.06.0_7 5.45.4_14 5.35.3_29 55.3 4.114.11_17 4.104.10_23 4.10

Problem Description

On "7th generation" and "8th generation" processors manufactured by AMD, including the AMD Athlon, Duron, Athlon MP, Athlon XP, Athlon64, Athlon64 FX, Opteron, Turion, and Sempron, the fxsave and fxrstor instructions do not save and restore the FOP, FIP, and FDP registers unless the exception summary bit (ES) in the x87 status word is set to 1, indicating that an unmasked x87 exception has occurred.

This behaviour is consistent with documentation provided by AMD, but is different from processors from other vendors, which save and restore the FOP, FIP, and FDP registers regardless of the value of the ES bit. As a result of this discrepancy remaining unnoticed until now, the FreeBSD kernel does not restore the contents of the FOP, FIP, and FDP registers between context switches.

Impact

On affected processors, a local attacker can monitor the execution path of a process which uses floating-point operations. This may allow an attacker to steal cryptographic keys or other sensitive information.

Workaround

No workaround is available, but systems which do not use AMD Athlon, Duron, Athlon MP, Athlon XP, Athlon64, Athlon64 FX, Opteron, Turion, or Sempron processors are not vulnerable.

CVE-2006-1056 SA-06:14.fpu 2006-04-19 2006-04-19 2016-08-09
plone -- "member_id" Parameter Portrait Manipulation Vulnerability plone 2.1.2_1

Secunia reports:

The vulnerability is caused due to missing security declarations in "changeMemberPortrait" and "deletePersonalPortrait". This can be exploited to manipulate or delete another user's portrait via the "member_id" parameter.

CVE-2006-1711 http://dev.plone.org/plone/ticket/5432 http://www.debian.org/security/2006/dsa-1032 http://secunia.com/advisories/19633/ 2006-04-13 2006-04-18
mozilla -- multiple vulnerabilities firefox 1.0.8,1 1.5.*,11.5.0.2,1 linux-firefox 1.5.0.2 mozilla 1.7.13,2 1.8.*,2 linux-mozilla 1.7.13 linux-mozilla-devel 0 seamonkey linux-seamonkey 1.0.1 thunderbird mozilla-thunderbird 1.5.0.2

A Mozilla Foundation Security Advisory reports of multiple issues. Several of which can be used to run arbitrary code with the privilege of the user running the program.

  • MFSA 2006-29 Spoofing with translucent windows
  • MFSA 2006-28 Security check of js_ValueToFunctionObject() can be circumvented
  • MFSA 2006-26 Mail Multiple Information Disclosure
  • MFSA 2006-25 Privilege escalation through Print Preview
  • MFSA 2006-24 Privilege escalation using crypto.generateCRMFRequest
  • MFSA 2006-23 File stealing by changing input type
  • MFSA 2006-22 CSS Letter-Spacing Heap Overflow Vulnerability
  • MFSA 2006-20 Crashes with evidence of memory corruption (rv:1.8.0.2)
  • MFSA 2006-19 Cross-site scripting using .valueOf.call()
  • MFSA 2006-18 Mozilla Firefox Tag Order Vulnerability
  • MFSA 2006-17 cross-site scripting through window.controllers
  • MFSA 2006-16 Accessing XBL compilation scope via valueOf.call()
  • MFSA 2006-15 Privilege escalation using a JavaScript function's cloned parent
  • MFSA 2006-14 Privilege escalation via XBL.method.eval
  • MFSA 2006-13 Downloading executables with "Save Image As..."
  • MFSA 2006-12 Secure-site spoof (requires security warning dialog)
  • MFSA 2006-11 Crashes with evidence of memory corruption (rv:1.8)
  • MFSA 2006-10 JavaScript garbage-collection hazard audit
  • MFSA 2006-09 Cross-site JavaScript injection using event handlers
179014 252324 329500 350262 488774 736934 813230 842094 932734 935556 968814 CVE-2006-0749 CVE-2006-1045 CVE-2006-1529 CVE-2006-1530 CVE-2006-1531 CVE-2006-1723 CVE-2006-1724 CVE-2006-1725 CVE-2006-1726 CVE-2006-1727 CVE-2006-1728 CVE-2006-1729 CVE-2006-1730 CVE-2006-1731 CVE-2006-1732 CVE-2006-1733 CVE-2006-1734 CVE-2006-1735 CVE-2006-1736 CVE-2006-1737 CVE-2006-1738 CVE-2006-1739 CVE-2006-1740 CVE-2006-1741 CVE-2006-1742 CVE-2006-1790 http://www.mozilla.org/security/announce/2006/mfsa2006-09.html http://www.mozilla.org/security/announce/2006/mfsa2006-10.html http://www.mozilla.org/security/announce/2006/mfsa2006-11.html http://www.mozilla.org/security/announce/2006/mfsa2006-12.html http://www.mozilla.org/security/announce/2006/mfsa2006-13.html http://www.mozilla.org/security/announce/2006/mfsa2006-14.html http://www.mozilla.org/security/announce/2006/mfsa2006-15.html http://www.mozilla.org/security/announce/2006/mfsa2006-16.html http://www.mozilla.org/security/announce/2006/mfsa2006-17.html http://www.mozilla.org/security/announce/2006/mfsa2006-18.html http://www.mozilla.org/security/announce/2006/mfsa2006-19.html http://www.mozilla.org/security/announce/2006/mfsa2006-20.html http://www.mozilla.org/security/announce/2006/mfsa2006-22.html http://www.mozilla.org/security/announce/2006/mfsa2006-23.html http://www.mozilla.org/security/announce/2006/mfsa2006-25.html http://www.mozilla.org/security/announce/2006/mfsa2006-26.html http://www.mozilla.org/security/announce/2006/mfsa2006-28.html http://www.mozilla.org/security/announce/2006/mfsa2006-29.html http://www.zerodayinitiative.com/advisories/ZDI-06-010.html TA06-107A 2006-04-13 2006-04-16 2006-04-27
mailman -- Private Archive Script Cross-Site Scripting mailman ja-mailman mailman-with-htdig 2.1.8

Secunia reports:

A vulnerability has been reported in Mailman, which can be exploited by malicious people to conduct cross-site scripting attacks.

Unspecified input passed to the private archive script is not properly sanitised before being returned to users. This can be exploited to execute arbitrary HTML and script code in a user's browser session in context of a vulnerable site.

CVE-2006-1712 http://mail.python.org/pipermail/mailman-announce/2006-April/000084.html http://secunia.com/advisories/19558/ 2006-04-07 2006-04-16
f2c -- insecure temporary files f2c 20060506

Javier Fernández-Sanguino Peña reports two temporary file vulnerability within f2c. The vulnerabilities are caused due to weak temporary file handling. An attacker could create an symbolic link, causing a local user running f2c to overwrite the symlinked file. This could give the attacker elevated privileges.

1280 CAN-2005-0017 2005-01-27 2006-04-10 2006-08-15
mplayer -- Multiple integer overflows mplayer mplayer-esound mplayer-gtk mplayer-gtk2 mplayer-gtk-esound mplayer-gtk2-esound 0.99.7_12

Secunia reports:

The vulnerabilities are caused due to integer overflow errors in "libmpdemux/asfheader.c" within the handling of an ASF file, and in "libmpdemux/aviheader.c" when parsing the "indx" chunk in an AVI file. This can be exploited to cause heap-based buffer overflows via a malicious ASF file, or via a AVI file with specially-crafted "wLongsPerEntry" and "nEntriesInUse" values in the "indx" chunk.

CVE-2006-1502 http://www.xfocus.org/advisories/200603/11.html http://secunia.com/advisories/19418/ 2006-03-29 2006-04-07
kaffeine -- buffer overflow vulnerability kaffeine 0.4.20.8.0

The KDE team reports:

Kaffeine can produce a buffer overflow in http_peek() while creating HTTP request headers for fetching remote playlists, which under certain circumstances could be used to crash the application and/or execute arbitrary code.

17372 CVE-2006-0051 http://www.kde.org/info/security/advisory-20060404-1.txt 2006-04-04 2006-04-07
thunderbird -- javascript execution thunderbird mozilla-thunderbird 1.0.7

Renaud Lifchitz reports a vulnerability within thunderbird. The vulnerability is caused by improper checking of javascript scripts. This could lead to javascript code execution which can lead to information disclosure or a denial of service (application crash). This vulnerability is present even if javascript had been disabled in the preferences.

16770 CAN-2006-0884 2006-02-22 2006-04-07
phpmyadmin -- XSS vulnerabilities phpMyAdmin 2.8.0.3

phpMyAdmin security announcement:

It was possible to conduct an XSS attack with a direct call to some scripts under the themes directory.

http://www.phpmyadmin.net/home_page/security.php?issue=PMASA-2006-1 http://secunia.com/advisories/19556/ 2006-04-06 2006-04-06 2006-04-07
phpmyadmin -- 'set_theme' Cross-Site Scripting phpMyAdmin 2.8.0.2

Secunia reports:

A vulnerability has been reported in phpMyAdmin, which can be exploited by malicious people to conduct cross-site scripting attacks.

Input passed to the "set_theme" parameter isn't properly sanitised before being returned to the user. This can be exploited to execute arbitrary HTML and script code in a user's browser session in context of an affected site.

CVE-2006-1258 http://secunia.com/advisories/19277 2006-03-17 2006-04-06
clamav -- Multiple Vulnerabilities clamav 0.88.1 clamav-devel 20051104_1

Secunia reports:

Some vulnerabilities have been reported in ClamAV, which potentially can be exploited by malicious people to cause a DoS (Denial of Service) and compromise a vulnerable system.

An unspecified integer overflow error exists in the PE header parser in "libclamav/pe.c". Successful exploitation requires that the ArchiveMaxFileSize option is disabled.

Some format string errors in the logging handling in "shared/output.c" may be exploited to execute arbitrary code.

An out-of-bounds memory access error in the "cli_bitset_test()" function in "ibclamav/others.c" may be exploited to cause a crash.

CVE-2006-1614 CVE-2006-1615 CVE-2006-1630 http://secunia.com/advisories/19534/ http://www.us.debian.org/security/2006/dsa-1024 2006-04-06 2006-04-06
mediawiki -- hardcoded placeholder string security bypass vulnerability mediawiki 1.5.4

The mediawiki development team reports a vulnerability within the mediawiki application. The vulnerability is caused by improper checking of inline style attributes. This could result in the execution of arbitrary javascript code in Microsoft Internet Explorer. It appears that other browsers are not affected by this vulnerability.

16032 CAN-2005-4501 http://sourceforge.net/project/shownotes.php?release_id=379951 2005-12-22 2006-04-05
netpbm -- buffer overflow in pnmtopng netpbm 10.26

Ubuntu reports:

A buffer overflow was found in the "pnmtopng" conversion program. By tricking an user (or automated system) to process a specially crafted PNM image with pnmtopng, this could be exploited to execute arbitrary code with the privileges of the user running pnmtopng.

15128 CAN-2005-2978 http://www.ubuntulinux.org/support/documentation/usn/usn-210-1 2005-10-18 2006-04-05
zoo -- stack based buffer overflow zoo 2.10.1_2

Jean-Sébastien Guay-Leroux report a vulnerability within the zoo archiver. The vulnerability which is present in the fullpath() function (from the misc.c file) is caused by improper checking of user supplied data. The data returned to the buffer can be up to 512 bytes, while the buffer is created to hold 256 bytes. This could result in a buffer overflow which could allow remote code execution.

16790 CVE-2006-0855 http://www.guay-leroux.com/projects/zoo-advisory.txt 2006-02-22 2006-04-05 2006-04-06
mediawiki -- cross site scripting vulnerability mediawiki 1.41.4.14 1.51.5.7

The mediawiki development team reports that there is an site scripting vulnerability within mediawiki. The vulnerability is caused by improper checking of encoded links which could allow the injection of html in the output generated by mediawiki. This could lead to cross site scripting attacks against mediawiki installations.

17269 CVE-2006-1498 http://mail.wikipedia.org/pipermail/mediawiki-announce/2006-March/000040.html 2006-03-27 2006-04-05
dia -- XFig Import Plugin Buffer Overflow dia dia-gnome 0.86_10.94_6,1

Secunia reports:

Some vulnerabilities have been reported in Dia, which potentially can be exploited by malicious people to compromise a user's system.

The vulnerabilities are caused due to boundary errors within the XFig import plugin. This can be exploited to cause buffer overflows and may allow arbitrary code execution when a specially-crafted FIG file is imported.

CVE-2006-1550 http://secunia.com/advisories/19469/ http://mail.gnome.org/archives/dia-list/2006-March/msg00149.html 2006-03-31 2006-04-05
openvpn -- LD_PRELOAD code execution on client through malicious or compromised server openvpn 2.02.0.6

Hendrik Weimer reports:

OpenVPN clients are a bit too generous when accepting configuration options from a server. It is possible to transmit environment variables to client-side shell scripts. There are some filters in place to prevent obvious nonsense, however they don't catch the good old LD_PRELOAD trick. All we need is to put a file onto the client under a known location (e.g. by returning a specially crafted document upon web access) and we have a remote root exploit. But since the attack may only come from authenticated servers, this threat is greatly reduced.

CVE-2006-1629 http://www.osreviews.net/reviews/security/openvpn-print http://openvpn.net/changelog.html http://sourceforge.net/mailarchive/message.php?msg_id=15298074 2006-04-03 2006-04-05 2006-04-06
samba -- Exposure of machine account credentials in winbind log files samba 3.0.21a,13.0.22,1 ja-samba 3.0.21a,13.0.22,1

Samba Security Advisory:

The machine trust account password is the secret shared between a domain controller and a specific member server. Access to the member server machine credentials allows an attacker to impersonate the server in the domain and gain access to additional information regarding domain users and groups.

The winbindd daemon writes the clear text of server's machine credentials to its log file at level 5. The winbindd log files are world readable by default and often log files are requested on open mailing lists as tools used to debug server misconfigurations.

This affects servers configured to use domain or ads security and possibly Samba domain controllers as well (if configured to use winbindd).

CVE-2006-1059 http://us1.samba.org/samba/security/CAN-2006-1059.html http://secunia.com/advisories/19455/ 2006-03-30 2006-04-05
mod_pubcookie -- cross site scripting vulnerability mod_pubcookie 3.3.0

Nathan Dors of the Pubcookie Project reports:

Non-persistent XSS vulnerabilities were found in the Pubcookie Apache module (mod_pubcookie) and ISAPI filter. These components mishandle untrusted data when printing responses to the browser. This makes them vulnerable to carefully crafted requests containing script or HTML. If an attacker can lure an unsuspecting user to visit carefully staged content, the attacker can use it to redirect the user to a vulnerable Pubcookie application server and attempt to exploit the XSS vulnerabilities.

These vulnerabilities are classified as *high* due to the nature and purpose of Pubcookie application servers for user authentication and Web Single Sign-on (SSO). An attacker who injects malicious script through the vulnerabilities might steal private Pubcookie data including a user's authentication assertion ("granting") cookies and application session cookies.

314540 2006-03-06 2006-04-05
pubcookie-login-server -- cross site scripting vulnerability pubcookie-login-server 3.3.0

Nathan Dors of the Pubcookie Project reports:

Multiple non-persistent XSS vulnerabilities were found in the Pubcookie login server's compiled binary "index.cgi" CGI program. The CGI program mishandles untrusted data when printing responses to the browser. This makes the program vulnerable to carefully crafted requests containing script or HTML. If an attacker can lure an unsuspecting user to visit carefully staged content, the attacker can use it to redirect the user to his or her local Pubcookie login page and attempt to exploit the XSS vulnerabilities.

These vulnerabilities are classified as *critical* due to the nature and purpose of the Pubcookie login server for user authentication and Web Single Sign-on (SSO). Specific threats include:

  • An attacker who injects malicious script through the vulnerabilities might steal senstive user data including a user's authentication credentials (usernames and passwords);
  • An attacker who injects malicious script through the vulnerabilities might steal private Pubcookie data including a user's authentication assertion ("granting") cookies and SSO ("login") session cookies;
  • An attacker who injects HTML tags through the vulnerabilities might deface a site's Pubcookie login page for a single visit by a single user (i.e. a non-persistent defacement).

At the heart of these threats lies a violation of the user's trust in the Pubcookie login server.

337585 2006-03-06 2006-04-05
freeradius -- EAP-MSCHAPv2 Authentication Bypass freeradius 1.0.01.1.1

Freeradius Security Contact reports:

Insufficient input validation was being done in the EAP-MSCHAPv2 state machine. A malicious attacker could manipulate their EAP-MSCHAPv2 client state machine to potentially convince the server to bypass authentication checks. This bypassing could also result in the server crashing.

CVE-2006-1354 http://www.freeradius.org/security.html#1.1.0 http://secunia.com/advisories/19300/ 2006-03-21 2006-03-29
horde -- remote code execution vulnerability in the help viewer horde horde-php5 3.1.1

Horde 3.1.1 release announcement:

Major changes compared to Horde 3.1 are:

  • Fix for remote code execution vulnerability in the help viewer, discovered by Jan Schneider from the Horde team.
17292 CVE-2006-1491 http://lists.horde.org/archives/announce/2006/000271.html 2006-03-28 2006-03-28 2006-03-30
linux-realplayer -- buffer overrun linux-realplayer 10.0.110.0.7.785.20060201

Secunia Advisories Reports:

A boundary error when processing SWF files can be exploited to cause a buffer overflow. This may allow execution of arbitrary code on the user's system.

CVE-2006-0323 http://service.real.com/realplayer/security/03162006_player/en/ http://secunia.com/advisories/19358/ 2006-03-23 2006-03-27
linux-realplayer -- heap overflow linux-realplayer 10.0.110.0.6

iDefense Reports:

Remote exploitation of a heap-based buffer overflow in RealNetwork Inc's RealPlayer could allow the execution of arbitrary code in the context of the currently logged in user.

In order to exploit this vulnerability, an attacker would need to entice a user to follow a link to a malicious server. Once the user visits a website under the control of an attacker, it is possible in a default install of RealPlayer to force a web-browser to use RealPlayer to connect to an arbitrary server, even when it is not the default application for handling those types, by the use of embedded object tags in a webpage. This may allow automated exploitation when the page is viewed.

CVE-2005-2922 http://service.real.com/realplayer/security/03162006_player/en/ http://www.idefense.com/intelligence/vulnerabilities/display.php?id=404 http://secunia.com/advisories/19358/ 2006-03-23 2006-03-27
sendmail -- race condition vulnerability sendmail 8.138.13.6 FreeBSD 6.06.0_6 5.45.4_13 5.35.3_28 4.114.11_16 4.104.10_22

Problem Description

A race condition has been reported to exist in the handling by sendmail of asynchronous signals.

Impact

A remote attacker may be able to execute arbitrary code with the privileges of the user running sendmail, typically root.

Workaround

There is no known workaround other than disabling sendmail.

CVE-2006-0058 SA-06:13.sendmail 2006-03-22 2006-03-24 2006-06-09
OPIE -- arbitrary password change FreeBSD 6.06.0_6 5.45.4_13 5.35.3_28 4.114.11_16 4.104.10_22

Problem Description

The opiepasswd(1) program uses getlogin(2) to identify the user calling opiepasswd(1). In some circumstances getlogin(2) will return "root" even when running as an unprivileged user. This causes opiepasswd(1) to allow an unpriviled user to configure OPIE authentication for the root user.

Impact

In certain cases an attacker able to run commands as a non privileged users which have not explicitly logged in, for example CGI scripts run by a web server, is able to configure OPIE access for the root user. If the attacker is able to authenticate as root using OPIE authentication, for example if "PermitRootLogin" is set to "yes" in sshd_config or the attacker has access to a local user in the "wheel" group, the attacker can gain root privileges.

Workaround

Disable OPIE authentication in PAM:

# sed -i "" -e /opie/s/^/#/ /etc/pam.d/*

or

Remove the setuid bit from opiepasswd:

# chflags noschg /usr/bin/opiepasswd
# chmod 555 /usr/bin/opiepasswd
# chflags schg /usr/bin/opiepasswd
CVE-2006-1283 SA-06:12.opie 2006-03-22 2006-03-24 2006-06-09
ipsec -- reply attack vulnerability FreeBSD 6.06.0_6 5.45.4_13 5.35.3_28 4.114.11_16 4.104.10_22

Problem Description

IPsec provides an anti-replay service which when enabled prevents an attacker from successfully executing a replay attack. This is done through the verification of sequence numbers. A programming error in the fast_ipsec(4) implementation results in the sequence number associated with a Security Association not being updated, allowing packets to unconditionally pass sequence number verification checks.

Impact

An attacker able to intercept IPSec packets can replay them. If higher level protocols which do not provide any protection against packet replays (e.g., UDP) are used, this may have a variety of effects.

Workaround

No workaround is available.

CVE-2006-0905 SA-06:11.ipsec 2006-03-22 2006-03-24 2006-06-09
xorg-server -- privilege escalation xorg-server 6.9.0

Daniel Stone of X.Org reports:

During the analysis of results from the Coverity code review of X.Org, we discovered a flaw in the server that allows local users to execute arbitrary code with root privileges, or cause a denial of service by overwriting files on the system, again with root privileges.

CVE-2006-0745 https://bugs.freedesktop.org/show_bug.cgi?id=6213 2006-03-20 2006-03-21
heimdal -- Multiple vulnerabilities heimdal 0.6.6

A Project heimdal Security Advisory reports:

The telnet client program in Heimdal has buffer overflows in the functions slc_add_reply() and env_opt_add(), which may lead to remote code execution.

The telnetd server program in Heimdal has buffer overflows in the function getterminaltype, which may lead to remote code execution.

The rshd server in Heimdal has a privilege escalation bug when storing forwarded credentials. The code allowes a user to overwrite a file with its credential cache, and get ownership of the file.

CVE-2005-0469 CVE-2005-2040 CVE-2006-0582 CVE-2006-0677 http://www.pdc.kth.se/heimdal/advisory/2005-04-20 http://www.pdc.kth.se/heimdal/advisory/2005-06-20 http://www.pdc.kth.se/heimdal/advisory/2006-02-06 2006-02-06 2006-03-20
curl -- TFTP packet buffer overflow vulnerability curl linux-curl 7.14.17.15.3

A Project cURL Security Advisory reports:

libcurl uses the given file part of a TFTP URL in a manner that allows a malicious user to overflow a heap-based memory buffer due to the lack of boundary check.

This overflow happens if you pass in a URL with a TFTP protocol prefix ("tftp://"), using a valid host and a path part that is longer than 512 bytes.

The affected flaw can be triggered by a redirect, if curl/libcurl is told to follow redirects and an HTTP server points the client to a tftp URL with the characteristics described above.

CVE-2006-1061 http://curl.haxx.se/docs/adv_20060320.html 2006-03-20 2006-03-20 2006-10-05
drupal -- multiple vulnerabilities drupal 3.6.6

Drupal reports:

Mail header injection vulnerability.

Linefeeds and carriage returns were not being stripped from email headers, raising the possibility of bogus headers being inserted into outgoing email.

This could lead to Drupal sites being used to send unwanted email.

Session fixation vulnerability.

If someone creates a clever enough URL and convinces you to click on it, and you later log in but you do not log off then the attacker may be able to impersonate you.

XSS vulnerabilities.

Some user input sanity checking was missing. This could lead to possible cross-site scripting (XSS) attacks.

XSS can lead to user tracking and theft of accounts and services.

Security bypass in menu.module.

If you use menu.module to create a menu item, the page you point to will be accessible to all, even if it is an admin page.

http://drupal.org/node/53806 http://drupal.org/node/53805 http://drupal.org/node/53803 http://drupal.org/node/53796 2006-03-13 2006-03-17
horde -- "url" disclosure of sensitive information vulnerability horde horde-php5 3.1

Secunia advisory SA19246:

Paul Craig has discovered a vulnerability in Horde, which can be exploited by malicious people to disclose sensitive information. Input passed to the "url" parameter in "services/go.php" isn't properly verified, before it is used in a "readfile()" call. This can be exploited to disclose the content of arbitrary files via e.g. the "php://" protocol wrapper.

The vulnerability has been confirmed in version 3.0.9 and has also been reported in prior versions.

Provided and/or discovered by: Paul Craig, Security-Assessment.com.

http://secunia.com/advisories/19246/ 2006-03-15 2006-03-15
linux-flashplugin -- arbitrary code execution vulnerability linux-flashplugin 7.0r63

Adobe reports:

Critical vulnerabilities have been identified in Flash Player that could allow an attacker who successfully exploits these vulnerabilities to take control of the affected system. A malicious SWF must be loaded in Flash Player by the user for an attacker to exploit these vulnerabilities.

Flash Player 8 update (8.0.24.0), and Flash Player 7 update (7.0.63.0) address security vulnerabilities in previous versions of Flash Player, which could lead to the potential execution of arbitrary code. These vulnerabilities could be accessed through content delivered from a remote location via the users web browser, email client, or other applications that include or reference the Flash Player.

CVE-2006-0024 http://www.macromedia.com/devnet/security/security_zone/apsb06-03.html 2006-03-14 2006-03-15
nfs -- remote denial of service FreeBSD 6.06.0_5 5.45.4_12 5.35.3_27 4.114.11_15 4.104.10_21

Problem description:

A part of the NFS server code charged with handling incoming RPC messages via TCP had an error which, when the server received a message with a zero-length payload, would cause a NULL pointer dereference which results in a kernel panic. The kernel will only process the RPC messages if a userland nfsd daemon is running.

Impact:

The NULL pointer deference allows a remote attacker capable of sending RPC messages to an affected FreeBSD system to crash the FreeBSD system.

Workaround:

  1. Disable the NFS server: set the nfs_server_enable variable to "NO" in /etc/rc.conf, and reboot.

    Alternatively, if there are no active NFS clients (as listed by the showmount(8) utility), simply killing the mountd and nfsd processes should suffice.

  2. Add firewall rules to block RPC traffic to the NFS server from untrusted hosts.

CVE-2006-0900 SA-06:10.nfs 2006-03-01 2006-03-12 2016-08-09
openssh -- remote denial of service FreeBSD 5.45.4_12 5.35.3_27

Problem description:

Because OpenSSH and OpenPAM have conflicting designs (one is event- driven while the other is callback-driven), it is necessary for OpenSSH to fork a child process to handle calls to the PAM framework. However, if the unprivileged child terminates while PAM authentication is under way, the parent process incorrectly believes that the PAM child also terminated. The parent process then terminates, and the PAM child is left behind.

Due to the way OpenSSH performs internal accounting, these orphaned PAM children are counted as pending connections by the master OpenSSH server process. Once a certain number of orphans has accumulated, the master decides that it is overloaded and stops accepting client connections.

Impact:

By repeatedly connecting to a vulnerable server, waiting for a password prompt, and closing the connection, an attacker can cause OpenSSH to stop accepting client connections until the system restarts or an administrator manually kills the orphaned PAM processes.

Workaround:

The following command will show a list of orphaned PAM processes:

# pgrep -lf 'sshd.*\[pam\]'

The following command will kill orphaned PAM processes:

# pkill -f 'sshd.*\[pam\]'

To prevent OpenSSH from leaving orphaned PAM processes behind, perform one of the following:

  1. Disable PAM authentication in OpenSSH. Users will still be able to log in using their Unix password, OPIE or SSH keys.

    To do this, execute the following commands as root:

    # echo 'UsePAM no' >>/etc/ssh/sshd_config
    # echo 'PasswordAuthentication yes' >>/etc/ssh/sshd_config
    # /etc/rc.d/sshd restart
  2. If disabling PAM is not an option - if, for instance, you use RADIUS authentication, or store user passwords in an SQL database - you may instead disable privilege separation. However, this may leave OpenSSH vulnerable to hitherto unknown bugs, and should be considered a last resort.

    To do this, execute the following commands as root:

    # echo 'UsePrivilegeSeparation no' >>/etc/ssh/sshd_config
    # /etc/rc.d/sshd restart
CVE-2006-0883 SA-06:09.openssh 2006-03-01 2006-03-12 2016-08-09
GnuPG does not detect injection of unsigned data gnupg 1.4.2.2

Werner Koch reports:

In the aftermath of the false positive signature verfication bug (announced 2006-02-15) more thorough testing of the fix has been done and another vulnerability has been detected. This new problem affects the use of *gpg* for verification of signatures which are _not_ detached signatures. The problem also affects verification of signatures embedded in encrypted messages; i.e. standard use of gpg for mails.

CVE-2006-0049 http://lists.gnupg.org/pipermail/gnupg-announce/2006q1/000216.html 2006-03-09 2006-03-10 2006-03-11
mplayer -- heap overflow in the ASF demuxer mplayer mplayer-gtk mplayer-esound mplayer-gtk-esound 0.99.7_11

The Mplayer team reports:

A potential buffer overflow was found in the ASF demuxer. Arbitrary remote code execution is possible (under the user ID running the player) when streaming an ASF file from a malicious server or local code execution (under the user ID running the player) if a malicious ASF file is played locally.

CVE-2006-0579 http://www.mplayerhq.hu/design7/news.html#vuln13 http://secunia.com/advisories/18718 http://bugs.gentoo.org/show_bug.cgi?id=122029 2006-02-15 2006-03-09
SSH.COM SFTP server -- format string vulnerability ssh2 ssh2-nox11 3.2.9.1_5

SSH Communications Security Corp reports a format string vulnerability in their SFTP server. This vulnerability could cause a user with SCP/SFTP access only to get permission to execute also other commands. It could also allow user A to create a special file that when accessed by user B allows user A to execute commands as user B.

CVE-2006-0705 16640 http://www.ssh.com/company/newsroom/article/715/ http://www.frsirt.com/english/advisories/2006/0554 http://securitytracker.com/id?1015619 http://secunia.com/advisories/18828 http://xforce.iss.net/xforce/xfdb/24651 2006-02-13 2006-03-04 2006-03-06
gtar -- invalid headers buffer overflow gtar 1.15.1_2

GNU tar is vulnerable to a buffer overflow, caused by improper bounds checking of the PAX extended headers. By tricking an user into processing a specially crafted tar archive, this could be exploited to execute arbitrary code with the privileges of the user.

16764 CVE-2006-0300 2006-02-22 2006-03-03
bugzilla -- multiple vulnerabilities bugzilla ja-bugzilla 2.17.12.20.1

Some vulnerabilities have been reported in Bugzilla, which can be exploited by malicious users to conduct SQL injection attacks, and by malicious people to disclose sensitive information and conduct script insertion attacks.

CVE-2006-2420 CVE-2006-0916 CVE-2006-0915 CVE-2006-0914 CVE-2006-0913 http://www.bugzilla.org/security/2.18.4/ 2006-02-20 2006-02-27 2006-11-11
squirrelmail -- multiple vulnerabilities squirrelmail 1.4.6

Multiple vulnerabilities has been discovered since 1.4.5, including IMAP injection as well as some XSS issues.

CVE-2006-0377 CVE-2006-0195 CVE-2006-0188 2006-02-23 2006-02-24
gedit -- format string vulnerability gedit 2.10.3

Yan Feng reports a format string vulnerability in gedit. This vulnerability could cause a denial of service with a binary file that contains format string characters within the filename. It had been reported that web browsers and email clients can be configured to provide a filename as an argument to gedit.:

CAN-2005-1686 :http://marc.theaimsgroup.com/?l=bugtraq&m=111661117701398 2005-05-20 2006-02-20
WebCalendar -- unauthorized access vulnerability WebCalendar 1.0.0

SecurityFocus reports that WebCalendar is affected by an unauthorized access vulnerability. The vulnerability is caused by improper checking of the authentication mechanism before access is being permitted to the "assistant_edit.php" file.

14072 CAN-2005-2320 2005-06-27 2006-02-20
abiword, koffice -- stack based buffer overflow vulnerabilities koffice 1.2.01.4.1_1,1 abiword 2.2.11

Chris Evans reports that AbiWord is vulnerable to multiple stack-based buffer overflow vulnerabilities. This is caused by improper checking of the user-supplied data before it is being copied to an too small buffer. The vulnerability is triggered when someone is importing RTF files.

15096 CAN-2005-2972 http://scary.beasts.org/security/CESA-2005-006.txt http://www.abisource.com/changelogs/2.2.11.phtml http://www.kde.org/info/security/advisory-20051011-1.txt 2005-10-14 2006-02-20 2006-02-20
postgresql81-server -- SET ROLE privilege escalation postgresql-server 8.1.08.1.3

The PostgreSQL team reports:

Due to inadequate validity checking, a user could exploit the special case that SET ROLE normally uses to restore the previous role setting after an error. This allowed ordinary users to acquire superuser status, for example.

CVE-2006-0553 http://www.postgresql.org/docs/8.1/static/release.html#RELEASE-8-1-3 2006-02-14 2006-02-18 2006-08-13
gnupg -- false positive signature verification gnupg 1.4.2.1

Werner Koch reports:

The Gentoo project identified a security related bug in GnuPG. When using any current version of GnuPG for unattended signature verification (e.g. by scripts and mail programs), false positive signature verification of detached signatures may occur.

This problem affects the tool *gpgv*, as well as using "gpg --verify" to imitate gpgv, if only the exit code of the process is used to decide whether a detached signature is valid. This is a plausible mode of operation for gpgv.

If, as suggested, the --status-fd generated output is used to decide whether a signature is valid, no problem exists. In particular applications making use of the GPGME library[2] are not affected.

CVE-2006-0455 http://marc.theaimsgroup.com/?l=gnupg-devel&m=113999098729114 2006-02-15 2006-02-17
rssh -- privilege escalation vulnerability rssh 2.3.0

Pizzashack reports:

Max Vozeler has reported a problem whereby rssh can allow users who have shell access to systems where rssh is installed (and rssh_chroot_helper is installed SUID) to gain root access to the system, due to the ability to chroot to arbitrary locations. There are a lot of potentially mitigating factors, but to be safe you should upgrade immediately.

16050 CVE-2005-3345 http://www.pizzashack.org/rssh/security.shtml 2005-12-18 2006-02-16
tor -- malicious tor server can locate a hidden service tor 0.1.0.12

Roger Dingledine reports:

If you offer a Tor hidden service, an adversary who can run a fast Tor server and who knows some basic statistics can find the location of your hidden service in a matter of minutes to hours.

CVE-2006-0414 http://archives.seul.org/or/announce/Jan-2006/msg00001.html 2006-01-12 2006-02-16
sudo -- arbitrary command execution sudo 1.6.8.10

Tavis Ormandy reports:

The bash shell uses the value of the PS4 environment variable (after expansion) as a prefix for commands run in execution trace mode. Execution trace mode (xtrace) is normally set via bash's -x command line option or interactively by running "set -o xtrace". However, it may also be enabled by placing the string "xtrace" in the SHELLOPTS environment variable before bash is started.

A malicious user with sudo access to a shell script that uses bash can use this feature to run arbitrary commands for each line of the script.

15191 CVE-2005-2959 http://www.courtesan.com/sudo/alerts/bash_env.html 2005-10-25 2006-02-16
libtomcrypt -- weak signature scheme with ECC keys libtomcrypt 1.02

The Secure Science Corporation reports that libtomcrypt is vulnerable to a weak signature scheme. This allows an attacker to create a valid random signature and use that to sign arbitrary messages without requiring the private key.

http://marc.theaimsgroup.com/?l=bugtraq&m=111540819703204 2005-05-01 2006-02-16
mantis -- "view_filters_page.php" cross site scripting vulnerability mantis 1.0.0a4

r0t reports:

Mantis contains a flaw that allows a remote cross site scripting attack. This flaw exists because input passed to "target_field" parameter in "view_filters_page.php" is not properly sanitised before being returned to the user. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.

CAN-2005-4238 http://pridels.blogspot.com/2005/12/mantis-bugtracking-system-xss-vuln.html 2005-12-13 2006-02-16
phpbb -- multiple vulnerabilities phpbb zh-phpbb-tw 2.0.18

Multiple vulnerabilities have been reported within phpbb. phpbb is proven vulnerable to:

15170 15243 CVE-2005-3310 CVE-2005-3415 CVE-2005-3416 CVE-2005-3417 CVE-2005-3418 CVE-2005-3419 CVE-2005-3420 CVE-2005-3536 CVE-2005-3537 http://marc.theaimsgroup.com/?l=bugtraq&m=113017003617987 http://www.hardened-php.net/advisory_172005.75.html 2005-10-24 2006-02-16
postgresql -- character conversion and tsearch2 vulnerabilities postgresql 7.2.07.2.8 7.3.07.3.10 7.4.07.4.8 8.0.08.0.3

The postgresql development team reports:

The more severe of the two errors is that the functions that support client-to-server character set conversion can be called from SQL commands by unprivileged users, but these functions are not designed to be safe against malicious choices of argument values. This problem exists in PostgreSQL 7.3.* through 8.0.*. The recommended fix is to disable public EXECUTE access for these functions. This does not affect normal usage of the functions for character set conversion, but it will prevent misuse.

The other error is that the contrib/tsearch2 module misdeclares several functions as returning type "internal" when they do not have any "internal" argument. This breaks the type safety of "internal" by allowing users to construct SQL commands that invoke other functions accepting "internal" arguments. The consequences of this have not been investigated in detail, but it is certainly at least possible to crash the backend.

CAN-2005-1409 CAN-2005-1410 http://www.postgresql.org/about/news.315 2005-05-02 2006-02-16
heartbeat -- insecure temporary file creation vulnerability heartbeat 1.2.4

Eric Romang reports a temporary file creation vulnerability within heartbeat. The vulnerability is caused by hardcoded temporary file usage. This can cause an attacker to create an arbitrary symlink causing the application to overwrite the symlinked file with the permissions of the user executing the application.

CAN-2005-2231 http://www.zataz.net/adviso/heartbeat-06272005.txt 2005-07-12 2006-02-16 2006-04-16
kpdf -- heap based buffer overflow kdegraphics 3.5.1_1

The KDE team reports:

kpdf, the KDE pdf viewer, shares code with xpdf. xpdf contains a heap based buffer overflow in the splash rasterizer engine that can crash kpdf or even execute arbitrary code.

CVE-2006-0301 http://www.kde.org/info/security/advisory-20060202-1.txt 2006-02-02 2006-02-15
perl, webmin, usermin -- perl format string integer wrap vulnerability perl 5.6.05.6.2 5.8.05.8.7_1 webmin 1.250 usermin 1.180

The Perl Development page reports:

Dyad Security recently released a security advisory explaining how in certain cases, a carefully crafted format string passed to sprintf can cause a buffer overflow. This buffer overflow can then be used by an attacker to execute code on the machine. This was discovered in the context of a design problem with the Webmin administration package that allowed a malicious user to pass unchecked data into sprintf.

15629 CVE-2005-3912 CVE-2005-3962 http://dev.perl.org/perl5/news/2005/perl_patches_fix_sprintf_buffer.html http://www.dyadsecurity.com/perl-0002.html http://www.dyadsecurity.com/webmin-0001.html http://www.webmin.com/security.html 2005-09-23 2006-02-15
phpicalendar -- cross site scripting vulnerability phpicalendar 2.1

Francesco Ongaro reports that phpicalendar is vulnerable for a cross site scripting attack. The vulnerability is caused by improper validation of the index.php file allowing attackers to include an arbitrary file with the .php extension

15193 CVE-2005-3366 http://www.ush.it/2005/10/25/php-icalendar-css/ 2005-10-25 2006-02-15
phpicalendar -- file disclosure vulnerability phpicalendar 2.21

The phpicalendar team reports that there is an unspecified vulnerability within phpicalendar. This seems to be a file disclosure vulnerability caused by improper checking of the template parsing function. This would allow an attacker to disclose any file readable by the user under which the webserver runs.

http://phpicalendar.net/forums/viewtopic.php?t=396 2006-02-08 2006-02-15
FreeBSD -- Infinite loop in SACK handling FreeBSD 5.45.4_11 5.35.3_26

Problem description:

When insufficient memory is available to handle an incoming selective acknowledgement, the TCP/IP stack may enter an infinite loop.

Impact:

By opening a TCP connection and sending a carefully crafted series of packets, an attacker may be able to cause a denial of service.

Workaround:

On FreeBSD 5.4, the net.inet.tcp.sack.enable sysctl can be used to disable the use of SACK:

# sysctl net.inet.tcp.sack.enable=0

No workaround is available for FreeBSD 5.3.

CVE-2006-0433 SA-06:08.sack 2006-02-01 2006-02-14 2016-08-09
pf -- IP fragment handling panic FreeBSD 6.06.0_4 5.45.4_10 5.35.3_25

Problem description:

A logic bug in pf's IP fragment cache may result in a packet fragment being inserted twice, violating a kernel invariant.

Impact:

By sending carefully crafted sequence of IP packet fragments, a remote attacker can cause a system running pf with a ruleset containing a 'scrub fragment crop' or 'scrub fragment drop-ovl' rule to crash.

Workaround:

Do not use 'scrub fragment crop' or 'scrub fragment drop-ovl' rules on systems running pf. In most cases, such rules can be replaced by 'scrub fragment reassemble' rules; see the pf.conf(5) manual page for more details.

Systems which do not use pf, or use pf but do not use the aforementioned rules, are not affected by this issue.

CVE-2006-0381 SA-06:07.pf 2006-01-25 2006-02-14 2016-08-09
FreeBSD -- Local kernel memory disclosure FreeBSD 6.06.0_4

Problem description:

A buffer allocated from the kernel stack may not be completely initialized before being copied to userland. [CVE-2006-0379]

A logic error in computing a buffer length may allow too much data to be copied into userland. [CVE-2006-0380]

Impact:

Portions of kernel memory may be disclosed to local users. Such memory might contain sensitive information, such as portions of the file cache or terminal buffers. This information might be directly useful, or it might be leveraged to obtain elevated privileges in some way. For example, a terminal buffer might include a user-entered password.

Workaround:

No workaround is available.

CVE-2006-0379 CVE-2006-0380 SA-06:06.kmem 2006-01-25 2006-02-14 2016-08-09
IEEE 802.11 -- buffer overflow FreeBSD 6.06.0_3

Problem description:

An integer overflow in the handling of corrupt IEEE 802.11 beacon or probe response frames when scanning for existing wireless networks can result in the frame overflowing a buffer.

Impact:

An attacker able broadcast a carefully crafted beacon or probe response frame may be able to execute arbitrary code within the context of the FreeBSD kernel on any system scanning for wireless networks.

Workaround:

No workaround is available, but systems without IEEE 802.11 hardware or drivers loaded are not vulnerable.

CVE-2006-0226 SA-06:05.80211 2006-01-18 2006-02-14 2016-08-09
ipfw -- IP fragment denial of service FreeBSD 6.06.0_2

Problem description:

The firewall maintains a pointer to layer 4 header information in the event that it needs to send a TCP reset or ICMP error message to discard packets. Due to incorrect handling of IP fragments, this pointer fails to get initialized.

Impact:

An attacker can cause the firewall to crash by sending ICMP IP fragments to or through firewalls which match any reset, reject or unreach actions.

Workaround:

Change any reset, reject or unreach actions to deny. It should be noted that this will result in packets being silently discarded.

CVE-2006-0054 SA-06:04.ipfw 2006-01-11 2006-02-14 2016-08-09
kpopup -- local root exploit and local denial of service kpopup 0.9.10.9.5

Mitre CVE reports:

Format string vulnerability in main.cpp in kpopup 0.9.1-0.9.5pre2 allows local users to cause a denial of service (segmentation fault) and possibly execute arbitrary code via format string specifiers in command line arguments.

misc.cpp in KPopup 0.9.1 trusts the PATH variable when executing killall, which allows local users to elevate their privileges by modifying the PATH variable to reference a malicious killall program.

SecurityFocus credits "b0f" b0fnet@yahoo.com

CVE-2003-1170 8918 CVE-2003-1167 8915 http://www.securityfocus.com/archive/1/342736 http://www.henschelsoft.de/kpopup_en.html 2003-10-28 2006-02-07
cpio -- multiple vulnerabilities FreeBSD 6.06.0_2 5.45.4_9 5.35.3_24 4.114.11_14 4.104.10_20

Problem description:

A number of issues has been discovered in cpio:

When creating a new file, cpio closes the file before setting its permissions. (CVE-2005-1111)

When extracting files cpio does not properly sanitize file names to filter out ".." components, even if the --no-absolute-filenames option is used. (CVE-2005-1229)

When adding large files (larger than 4 GB) to a cpio archive on 64-bit platforms an internal buffer might overflow. (CVE-2005-4268)

Impact

The first problem can allow a local attacker to change the permissions of files owned by the user executing cpio providing that they have write access to the directory in which the file is being extracted. (CVE-2005-1111)

The lack of proper file name sanitation can allow an attacker to overwrite arbitrary local files when extracting files from a cpio archive. (CVE-2005-1229)

The buffer-overflow on 64-bit platforms could lead cpio to a Denial-of-Service situation (crash) or possibly execute arbitrary code with the permissions of the user running cpio. (CVE-2005-4268)

Workaround

Use a different utility to create and extract cpio archives, for example pax(1) or (on FreeBSD 5.3 or later) tar(1). If this is not possible, do not extract untrusted archives and when running on 64-bit platforms do not add untrusted files to cpio archives.

CVE-2005-1111 CVE-2005-1229 CVE-2005-4268 SA-06:03.cpio 2006-01-11 2006-01-27
ee -- temporary file privilege escalation FreeBSD 6.06.0_2 5.45.4_9 5.35.3_24 4.114.11_14 4.104.10_20

Problem description

The ispell_op function used by ee(1) while executing spell check operations employs an insecure method of temporary file generation. This method produces predictable file names based on the process ID and fails to confirm which path will be over written with the user.
It should be noted that ispell does not have to be installed in order for this to be exploited. The option simply needs to be selected.

Impact

These predictable temporary file names are problematic because they allow an attacker to take advantage of a race condition in order to execute a symlink attack, which could allow them to overwrite files on the system in the context of the user running the ee(1) editor.

Workaround

Instead of invoking ispell through ee(1), invoke it directly.

16207 CVE-2006-0055 SA-06:02.ee 2006-01-11 2006-01-27
texindex -- temporary file privilege escalation FreeBSD 6.06.0_2 5.45.4_9 5.35.3_24 4.114.11_14 4.104.10_20

Problem description

The "sort_offline" function used by texindex(1) employs the "maketempname" function, which produces predictable file names and fails to validate that the paths do not exist.

Impact

These predictable temporary file names are problematic because they allow an attacker to take advantage of a race condition in order to execute a symlink attack, which could enable them to overwrite files on the system in the context of the user running the texindex(1) utility.

Workaround

No workaround is available, but the problematic code is only executed if the input file being processed is 500kB or more in length; as a result, users working with documents of less than several hundred pages are very unlikely to be affected.

14854 CAN-2005-3011 SA-06:01.texindex 2006-01-11 2006-01-27
cvsbug -- race condition FreeBSD 5.45.4_7 5.35.3_22 4.114.11_12 4.104.10_18 cvs+ipv6 1.11.17_1

Problem description

A temporary file is created, used, deleted, and then re-created with the same name. This creates a window during which an attacker could replace the file with a link to another file. While cvsbug(1) is based on the send-pr(1) utility, this problem does not exist in the version of send-pr(1) distributed with FreeBSD.
In FreeBSD 4.10 and 5.3, some additional problems exist concerning temporary file usage in both cvsbug(1) and send-pr(1).

Impact

A local attacker could cause data to be written to any file to which the user running cvsbug(1) (or send-pr(1) in FreeBSD 4.10 and 5.3) has write access. This may cause damage in itself (e.g., by destroying important system files or documents) or may be used to obtain elevated privileges.

Workaround

Do not use the cvsbug(1) utility on any system with untrusted users.
Do not use the send-pr(1) utility on a FreeBSD 4.10 or 5.3 system with untrusted users.

CAN-2005-2693 SA-05:20.cvsbug 2005-09-07 2006-01-27 2006-11-08
sge -- local root exploit in bundled rsh executable sge sgeee 5.3.6.20040330_1 6.*6.0.7.1

Sun Microsystems reports:

The SGE 6.0u7_1 release fixes a security bug which can allow malicious users to gain root access.

http://gridengine.sunsource.net/project/gridengine/news/SGE60u7_1-announce.html 2005-12-23 2006-01-23
fetchmail -- crash when bouncing a message fetchmail 6.3.06.3.2

Matthias Andree reports:

Fetchmail contains a bug that causes itself to crash when bouncing a message to the originator or to the local postmaster. The crash happens after the bounce message has been sent, when fetchmail tries to free the dynamic array of failed addresses, and calls the free() function with an invalid pointer.

CVE-2006-0321 http://www.fetchmail.info/fetchmail-SA-2006-01.txt http://bugs.debian.org/348747 2006-01-22 2006-01-23
clamav -- possible heap overflow in the UPX code clamav 0.88 clamav-devel 20060110

The Zero Day Initiative reports:

This vulnerability allows remote attackers to execute arbitrary code on vulnerable Clam AntiVirus installations. Authentication is not required to exploit this vulnerability.

This specific flaw exists within libclamav/upx.c during the unpacking of executable files compressed with UPX. Due to an invalid size calculation during a data copy from the user-controlled file to heap allocated memory, an exploitable memory corruption condition is created.

16191 CVE-2006-0162 http://lurker.clamav.net/message/20060109.213247.a16ae8db.en.html http://www.zerodayinitiative.com/advisories/ZDI-06-001.html http://secunia.com/advisories/18379/ 2006-01-09 2006-01-10 2006-01-15
milter-bogom -- headerless message crash milter-bogom 1.8.2

Juan J. Marítnez reports:

The milter crashes while processing a headerless message

Impact: bogom crashes and sendmail moves it to error state

http://www.usebox.net/jjm/bogom/errata/bogom-errata-2006-1.txt http://alf.dyndns.ws/pipermail/milter/2006-January/000076.html 2006-01-05 2006-01-09
bogofilter -- heap corruption through excessively long words bogofilter 0.96.20.96.3

Matthias Andree reports:

Bogofilter's/bogolexer's input handling in version 0.96.2 was not keeping track of its output buffers properly and could overrun a heap buffer if the input contained words whose length exceeded 16,384 bytes, the size of flex's input buffer. A "word" here refers to a contiguous run of input octets that was not '_' and did not match at least one of ispunct(), iscntrl() or isspace().

CVE-2005-4592 http://bogofilter.sourceforge.net/security/bogofilter-SA-2005-02 2005-10-23 2006-01-07
bogofilter -- heap corruption through malformed input bogofilter 0.93.50.96.3

Matthias Andree reports:

When using Unicode databases (default in more recent bogofilter installations), upon encountering invalid input sequences, bogofilter or bogolexer could overrun a malloc()'d buffer, corrupting the heap, while converting character sets. Bogofilter would usually be processing untrusted data received from the network at that time.

This problem was aggravated by an unrelated bug that made bogofilter process binary attachments as though they were text, and attempt charset conversion on them. Given the MIME default character set, US-ASCII, all input octets in the range 0x80...0xff were considered invalid input sequences and could trigger the heap corruption.

CVE-2005-4591 http://bogofilter.sourceforge.net/security/bogofilter-SA-2005-01 2005-10-22 2006-01-07
rxvt-unicode -- restore permissions on tty devices rxvt-unicode 6.3

A rxvt-unicode changelog reports:

SECURITY FIX: on systems using openpty, permissions were not correctly updated on the tty device and were left as world-readable and world-writable (likely in original rxvt, too), and were not restored properly. Affected are only systems where non-unix ptys were used (such as most BSDs). Found, patched and debugged by Ryan Beasley.

http://dist.schmorp.de/rxvt-unicode/Changes 2005-12-31 2006-01-04
apache -- mod_imap cross-site scripting flaw apache 1.31.3.34_3 2.0.352.0.55_2 2.12.1.9_3 2.22.2.0_3 apache+mod_perl 1.3.34_1 apache_fp 0 apache+ipv6 1.3.37 ru-apache 1.3.34+30.22_1 ru-apache+mod_ssl 1.3.34+30.22+2.8.25_1 apache+ssl 1.3.01.3.33.1.55_2 apache+mod_ssl apache+mod_ssl+ipv6 apache+mod_ssl+mod_accel apache+mod_ssl+mod_accel+ipv6 apache+mod_ssl+mod_accel+mod_deflate apache+mod_ssl+mod_accel+mod_deflate+ipv6 apache+mod_ssl+mod_deflate apache+mod_ssl+mod_deflate+ipv6 apache+mod_ssl+mod_snmp apache+mod_ssl+mod_snmp+mod_accel apache+mod_ssl+mod_snmp+mod_accel+ipv6 apache+mod_ssl+mod_snmp+mod_deflate apache+mod_ssl+mod_snmp+mod_deflate+ipv6 apache+mod_ssl+mod_snmp+mod_accel+mod_deflate+ipv6 1.3.34+2.8.25_1

The Apache HTTP Server Project reports:

A flaw in mod_imap when using the Referer directive with image maps. In certain site configurations a remote attacker could perform a cross-site scripting attack if a victim can be forced to visit a malicious URL using certain web browsers.

CVE-2005-3352 15834 http://www.apacheweek.com/features/security-13 http://www.apacheweek.com/features/security-20 2005-11-01 2006-01-01 2009-01-23