e14ed8232d
modify tidy.xsl to make it generates manually the xml declaration xsl is not able to generate a list of entity otherwise. Remove copyright form included files, they are redudundant anyway and in the end only the vuln.xml file is distribued with entities expanded Rework a bit the entity declaration in order for the document to look great after expansion (as it did before we introduced the expansion mechanism) All validation are now processed direcly on the flattened file. This is based on a patch from mfechner here Submitted by: mfechner Differential Revision: https://reviews.freebsd.org/D28299
8745 lines
307 KiB
XML
8745 lines
307 KiB
XML
<vuln vid="f4ff7434-9505-11db-9ddc-0011098b2f36">
|
|
<topic>plone -- user can masquerade as a group</topic>
|
|
<affects>
|
|
<package>
|
|
<name>plone</name>
|
|
<range><gt>2.5</gt><lt>2.5.1_1</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>Plone.org reports:</p>
|
|
<blockquote cite="http://plone.org/products/plone-hotfix/releases/20061031">
|
|
<p>PlonePAS-using Plone releases (Plone 2.5 and Plone 2.5.1) has a
|
|
potential vulnerability that allows a user to masquerade as a group.
|
|
Please update your sites.</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<bid>21460</bid>
|
|
<cvename>CVE-2006-4249</cvename>
|
|
<url>http://plone.org/products/plone-hotfix/releases/20061031</url>
|
|
</references>
|
|
<dates>
|
|
<discovery>2006-11-02</discovery>
|
|
<entry>2006-12-27</entry>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="3f851b22-89fb-11db-a937-003048116330">
|
|
<topic>proftpd -- remote code execution vulnerabilities</topic>
|
|
<affects>
|
|
<package>
|
|
<name>proftpd</name>
|
|
<name>proftpd-mysql</name>
|
|
<range><lt>1.3.0_5</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>The proftpd development team reports that several
|
|
remote buffer overflows had been found in the
|
|
proftpd server.</p>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<cvename>CVE-2006-5815</cvename>
|
|
<cvename>CVE-2006-6170</cvename>
|
|
</references>
|
|
<dates>
|
|
<discovery>2006-11-10</discovery>
|
|
<entry>2006-12-21</entry>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="11a84092-8f9f-11db-ab33-000e0c2e438a">
|
|
<topic>gzip -- multiple vulnerabilities</topic>
|
|
<affects>
|
|
<package>
|
|
<name>FreeBSD</name>
|
|
<range><ge>6.1</ge><lt>6.1_7</lt></range>
|
|
<range><ge>6.0</ge><lt>6.0_12</lt></range>
|
|
<range><ge>5.5</ge><lt>5.5_5</lt></range>
|
|
<range><ge>5.4</ge><lt>5.4_19</lt></range>
|
|
<range><ge>5.3</ge><lt>5.3_34</lt></range>
|
|
<range><lt>4.11_22</lt></range>
|
|
</package>
|
|
<package>
|
|
<name>gzip</name>
|
|
<range><lt>1.3.12</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<h1>Problem Description</h1>
|
|
<p>Multiple programming errors have been found in gzip which
|
|
can be triggered when gzip is decompressing files. These
|
|
errors include insufficient bounds checks in buffer use, a
|
|
NULL pointer dereference, and a potential infinite loop.</p>
|
|
<h1>Impact</h1>
|
|
<p>The insufficient bounds checks in buffer use can cause gzip
|
|
to crash, and may permit the execution of arbitrary code.
|
|
The NULL pointer deference can cause gzip to crash. The
|
|
infinite loop can cause a Denial-of-Service situation where
|
|
gzip uses all available CPU time.</p>
|
|
<h1>Workaround</h1>
|
|
<p>No workaround is available.</p>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<cvename>CVE-2006-4334</cvename>
|
|
<cvename>CVE-2006-4335</cvename>
|
|
<cvename>CVE-2006-4336</cvename>
|
|
<cvename>CVE-2006-4337</cvename>
|
|
<cvename>CVE-2006-4338</cvename>
|
|
<freebsdsa>SA-06:21.gzip</freebsdsa>
|
|
</references>
|
|
<dates>
|
|
<discovery>2006-09-19</discovery>
|
|
<entry>2006-12-19</entry>
|
|
<modified>2016-08-09</modified>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="ef3306fc-8f9b-11db-ab33-000e0c2e438a">
|
|
<topic>bind9 -- Denial of Service in named(8)</topic>
|
|
<affects>
|
|
<package>
|
|
<name>FreeBSD</name>
|
|
<range><ge>6.1</ge><lt>6.1_6</lt></range>
|
|
<range><ge>6.0</ge><lt>6.0_11</lt></range>
|
|
<range><ge>5.5</ge><lt>5.5_4</lt></range>
|
|
<range><ge>5.4</ge><lt>5.4_18</lt></range>
|
|
<range><ge>5.0</ge><lt>5.3_33</lt></range>
|
|
</package>
|
|
<package>
|
|
<name>bind9</name>
|
|
<range><ge>9.0</ge><lt>9.3.2.1</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<h1>Problem Description</h1>
|
|
<p>For a recursive DNS server, a remote attacker sending enough
|
|
recursive queries for the replies to arrive after all the
|
|
interested clients have left the recursion queue will trigger
|
|
an INSIST failure in the named(8) daemon. Also for a
|
|
recursive DNS server, an assertion failure can occur when
|
|
processing a query whose reply will contain more than one
|
|
SIG(covered) RRset.</p>
|
|
<p>For an authoritative DNS server serving a RFC 2535 DNSSEC
|
|
zone which is queried for the SIG records where there are
|
|
multiple SIG(covered) RRsets (e.g. a zone apex), named(8)
|
|
will trigger an assertion failure when it tries to construct
|
|
the response.</p>
|
|
<h1>Impact</h1>
|
|
<p>An attacker who can perform recursive lookups on a DNS server
|
|
and is able to send a sufficiently large number of recursive
|
|
queries, or is able to get the DNS server to return more than
|
|
one SIG(covered) RRsets can stop the functionality of the DNS
|
|
service.</p>
|
|
<p>An attacker querying an authoritative DNS server serving a
|
|
RFC 2535 DNSSEC zone may be able to crash the DNS server.</p>
|
|
<h1>Workaround</h1>
|
|
<p>A possible workaround is to only allow trusted clients to
|
|
perform recursive queries.</p>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<cvename>CVE-2006-4095</cvename>
|
|
<cvename>CVE-2006-4096</cvename>
|
|
<freebsdsa>SA-06:20.bind</freebsdsa>
|
|
</references>
|
|
<dates>
|
|
<discovery>2006-09-06</discovery>
|
|
<entry>2006-12-19</entry>
|
|
<modified>2016-08-09</modified>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="077c2dca-8f9a-11db-ab33-000e0c2e438a">
|
|
<topic>openssl -- Incorrect PKCS#1 v1.5 padding validation in crypto(3)</topic>
|
|
<affects>
|
|
<package>
|
|
<name>FreeBSD</name>
|
|
<range><ge>6.1</ge><lt>6.1_6</lt></range>
|
|
<range><ge>6.0</ge><lt>6.0_11</lt></range>
|
|
<range><ge>5.5</ge><lt>5.5_4</lt></range>
|
|
<range><ge>5.4</ge><lt>5.4_18</lt></range>
|
|
<range><ge>5.3</ge><lt>5.3_33</lt></range>
|
|
<range><lt>4.11_21</lt></range>
|
|
</package>
|
|
<package>
|
|
<name>openssl</name>
|
|
<range><gt>0.9.8</gt><lt>0.9.8c_9</lt></range>
|
|
<range><lt>0.9.7k_0</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<h1>Problem Description</h1>
|
|
<p>When verifying a PKCS#1 v1.5 signature, OpenSSL ignores any
|
|
bytes which follow the cryptographic hash being signed. In
|
|
a valid signature there will be no such bytes.</p>
|
|
<h1>Impact</h1>
|
|
<p>OpenSSL will incorrectly report some invalid signatures as
|
|
valid. When an RSA public exponent of 3 is used, or more
|
|
generally when a small public exponent is used with a
|
|
relatively large modulus (e.g., a public exponent of 17 with
|
|
a 4096-bit modulus), an attacker can construct a signature
|
|
which OpenSSL will accept as a valid PKCS#1 v1.5 signature.</p>
|
|
<h1>Workaround</h1>
|
|
<p>No workaround is available.</p>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<cvename>CVE-2006-4339</cvename>
|
|
<freebsdsa>SA-06:19.openssl</freebsdsa>
|
|
</references>
|
|
<dates>
|
|
<discovery>2006-09-06</discovery>
|
|
<entry>2006-12-19</entry>
|
|
<modified>2016-08-09</modified>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="0679deeb-8eaf-11db-abc9-0003476f14d3">
|
|
<topic>sql-ledger -- multiple vulnerabilities</topic>
|
|
<affects>
|
|
<package>
|
|
<name>sql-ledger</name>
|
|
<range><lt>2.6.22</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>The Debian security Team reports:</p>
|
|
<blockquote cite="http://www.us.debian.org/security/2006/dsa-1239">
|
|
<p>Several remote vulnerabilities have been discovered in SQL
|
|
Ledger, a web based double-entry accounting program, which may
|
|
lead to the execution of arbitrary code. The Common
|
|
Vulnerabilities and Exposures project identifies the following
|
|
problems:</p>
|
|
<p>Chris Travers discovered that the session management can be
|
|
tricked into hijacking existing sessions.</p>
|
|
<p>Chris Travers discovered that directory traversal
|
|
vulnerabilities can be exploited to execute arbitrary Perl
|
|
code.</p>
|
|
<p>It was discovered that missing input sanitising allows
|
|
execution of arbitrary Perl code.</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<cvename>CVE-2006-4244</cvename>
|
|
<cvename>CVE-2006-4731</cvename>
|
|
<cvename>CVE-2006-5872</cvename>
|
|
<url>http://www.us.debian.org/security/2006/dsa-1239</url>
|
|
</references>
|
|
<dates>
|
|
<discovery>2006-12-17</discovery>
|
|
<entry>2006-12-18</entry>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="5b47b70d-8ba9-11db-81d5-00123ffe8333">
|
|
<topic>dbus -- match_rule_equal() Weakness</topic>
|
|
<affects>
|
|
<package>
|
|
<name>dbus</name>
|
|
<range><lt>1.0.2</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>Secunia reports:</p>
|
|
<blockquote cite="http://secunia.com/advisories/23373/">
|
|
<p>D-Bus have a weakness, which can be exploited by malicious, local
|
|
users to cause a DoS (Denial of Service).</p>
|
|
<p>An error within the "match_rule_equal()" function can be
|
|
exploited to disable the ability of other processes to receive
|
|
messages by removing their matches from D-Bus.</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<cvename>CVE-2006-6107</cvename>
|
|
<url>http://www.freedesktop.org/wiki/Software/dbus</url>
|
|
<url>https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=218055</url>
|
|
<url>http://secunia.com/advisories/23373/</url>
|
|
</references>
|
|
<dates>
|
|
<discovery>2006-12-12</discovery>
|
|
<entry>2006-12-14</entry>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="779a2d55-8ba8-11db-81d5-00123ffe8333">
|
|
<topic>evince -- Buffer Overflow Vulnerability</topic>
|
|
<affects>
|
|
<package>
|
|
<name>evince</name>
|
|
<range><lt>0.6.1_1</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>Secunia reports:</p>
|
|
<blockquote cite="http://secunia.com/advisories/23111/">
|
|
<p>A vulnerability has been discovered in Evince, which can be
|
|
exploited by malicious people to compromise a user's system.</p>
|
|
<p>The vulnerability is caused due to a boundary error within the
|
|
"get_next_text()" function in ps/ps.c. This can be exploited to
|
|
cause a buffer overflow by e.g. tricking a user into opening a
|
|
specially crafted PostScript file.</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<cvename>CVE-2006-5864</cvename>
|
|
<url>http://secunia.com/advisories/23111/</url>
|
|
</references>
|
|
<dates>
|
|
<discovery>2006-11-27</discovery>
|
|
<entry>2006-12-14</entry>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="fefd93d8-8af5-11db-9d01-0016179b2dd5">
|
|
<topic>tdiary -- injection vulnerability</topic>
|
|
<affects>
|
|
<package>
|
|
<name>ja-tdiary</name>
|
|
<name>tdiary</name>
|
|
<range><le>2.0.3</le></range>
|
|
</package>
|
|
<package>
|
|
<name>ja-tdiary-devel</name>
|
|
<name>tdiary-devel</name>
|
|
<range><gt>2.1</gt><lt>2.1.4_2</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>An undisclosed eRuby injection vulnerability had been discovered in
|
|
tDiary.</p>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<url>http://sourceforge.net/forum/forum.php?forum_id=642685</url>
|
|
</references>
|
|
<dates>
|
|
<discovery>2006-12-10</discovery>
|
|
<entry>2006-12-13</entry>
|
|
<modified>2007-03-16</modified>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="d29dc506-8aa6-11db-bd0d-00123ffe8333">
|
|
<topic>wv -- Multiple Integer Overflow Vulnerabilities</topic>
|
|
<affects>
|
|
<package>
|
|
<name>wv</name>
|
|
<range><lt>1.2.3</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>Secunia reports:</p>
|
|
<blockquote cite="http://secunia.com/advisories/22595/">
|
|
<p>Some vulnerabilities have been reported in wvWare, which can be
|
|
exploited by malicious people to cause a DoS (Denial of Service)
|
|
and potentially compromise an application using the library.</p>
|
|
<p>The vulnerabilities are caused due to integer overflows within
|
|
the "wvGetLFO_records()" and "wvGetLFO_PLF()" functions. These can
|
|
be exploited to cause heap-based buffer overflows by e.g. tricking
|
|
a user to open a specially crafted Microsoft Word document with an
|
|
application using the library.</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<cvename>CVE-2006-4513</cvename>
|
|
<url>http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=433</url>
|
|
<url>http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=434</url>
|
|
<url>http://secunia.com/advisories/22595/</url>
|
|
</references>
|
|
<dates>
|
|
<discovery>2006-10-26</discovery>
|
|
<entry>2006-12-13</entry>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="b9044cc2-8aa5-11db-bd0d-00123ffe8333">
|
|
<topic>wv2 -- Integer Overflow Vulnerability</topic>
|
|
<affects>
|
|
<package>
|
|
<name>wv2</name>
|
|
<range><lt>0.2.3</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>Secunia reports:</p>
|
|
<blockquote cite="http://secunia.com/advisories/20665/">
|
|
<p>A vulnerability has been reported in wvWare wv2 Library, which
|
|
potentially can be exploited by malicious people to compromise an
|
|
application using the library.</p>
|
|
<p>The vulnerability is caused due to an integer overflow error in
|
|
"word_helper.h" when handling a Word document. This can be
|
|
exploited to cause a buffer overflow and may allow arbitrary code
|
|
execution via a specially crafted Word document.</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<cvename>CVE-2006-2197</cvename>
|
|
<url>http://secunia.com/advisories/20665/</url>
|
|
</references>
|
|
<dates>
|
|
<discovery>2006-06-12</discovery>
|
|
<entry>2006-12-13</entry>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="e969e6cb-8911-11db-9d01-0016179b2dd5">
|
|
<topic>tnftpd -- Remote root Exploit</topic>
|
|
<affects>
|
|
<package>
|
|
<name>tnftpd</name>
|
|
<range><lt>20040810</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>The tnftpd port suffer from a remote stack overrun,
|
|
which can lead to a root compromise.</p>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<cvename>CVE-2006-6652</cvename>
|
|
<url>http://lists.grok.org.uk/pipermail/full-disclosure/2006-December/051009.html</url>
|
|
</references>
|
|
<dates>
|
|
<discovery>2006-12-01</discovery>
|
|
<entry>2006-12-11</entry>
|
|
<modified>2010-05-12</modified>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="eb5124a4-8a20-11db-b033-00123ffe8333">
|
|
<topic>clamav -- Multipart Nestings Denial of Service</topic>
|
|
<affects>
|
|
<package>
|
|
<name>clamav</name>
|
|
<range><lt>0.88.7</lt></range>
|
|
</package>
|
|
<package>
|
|
<name>clamav-devel</name>
|
|
<range><le>20061029</le></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>Secunia reports:</p>
|
|
<blockquote cite="http://secunia.com/advisories/23347/">
|
|
<p>Clam AntiVirus have a vulnerability, which can be exploited by
|
|
malicious people to cause a DoS (Denial of Service).</p>
|
|
<p>The vulnerability is caused due to a stack overflow when scanning
|
|
messages with deeply nested multipart content. This can be
|
|
exploited to crash the service by sending specially crafted emails
|
|
to a vulnerable system.</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<cvename>CVE-2006-6481</cvename>
|
|
<url>http://secunia.com/advisories/23347/</url>
|
|
<url>http://www.quantenblog.net/security/virus-scanner-bypass</url>
|
|
</references>
|
|
<dates>
|
|
<discovery>2006-12-06</discovery>
|
|
<entry>2006-12-12</entry>
|
|
<modified>2013-06-19</modified>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="1b043693-8617-11db-93b2-000e35248ad7">
|
|
<topic>libxine -- multiple buffer overflow vulnerabilities</topic>
|
|
<affects>
|
|
<package>
|
|
<name>libxine</name>
|
|
<range><lt>1.1.3</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>The libxine development team reports that several
|
|
vulnerabilities had been found in the libxine library. The
|
|
first vulnerability is caused by improper checking of the
|
|
src/input/libreal/real.c "real_parse_sdp()" function.
|
|
A remote attacker could exploit this by tricking an user to
|
|
connect to a preparated server potentially causing a buffer
|
|
overflow. Another buffer overflow had been found in the
|
|
libmms library, potentially allowing a remote attacker to
|
|
cause a denial of service vulnerability, and possible remote
|
|
code execution through the following functions: send_command,
|
|
string_utf16, get_data and get_media_packets. Other functions
|
|
might be affected as well.</p>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<bid>18608</bid>
|
|
<bid>21435</bid>
|
|
<cvename>CVE-2006-2200</cvename>
|
|
<cvename>CVE-2006-6172</cvename>
|
|
<url>http://sourceforge.net/project/shownotes.php?release_id=468432</url>
|
|
</references>
|
|
<dates>
|
|
<discovery>2006-05-04</discovery>
|
|
<entry>2006-12-07</entry>
|
|
<modified>2006-12-09</modified>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="4db1669c-8589-11db-ac4f-02e081235dab">
|
|
<topic>gnupg -- remotely controllable function pointer</topic>
|
|
<affects>
|
|
<package>
|
|
<name>gnupg</name>
|
|
<range><lt>1.4.6</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>Werner Koch reports:</p>
|
|
<blockquote cite="http://lists.gnupg.org/pipermail/gnupg-announce/2006q4/000491.html">
|
|
<p>GnuPG uses data structures called filters to process
|
|
OpenPGP messages. These filters are used in a similar
|
|
way as a pipelines in the shell. For communication
|
|
between these filters context structures are used. These
|
|
are usually allocated on the stack and passed to the
|
|
filter functions. At most places the OpenPGP data stream
|
|
fed into these filters is closed before the context
|
|
structure gets deallocated. While decrypting encrypted
|
|
packets, this may not happen in all cases and the filter
|
|
may use a void contest structure filled with garbage. An
|
|
attacker may control this garbage. The filter context
|
|
includes another context used by the low-level decryption
|
|
to access the decryption algorithm. This is done using a
|
|
function pointer. By carefully crafting an OpenPGP
|
|
message, an attacker may control this function pointer and
|
|
call an arbitrary function of the process. Obviously an
|
|
exploit needs to prepared for a specific version,
|
|
compiler, libc, etc to be successful - but it is
|
|
definitely doable.</p>
|
|
<p>Fixing this is obvious: We need to allocate the context on
|
|
the heap and use a reference count to keep it valid as
|
|
long as either the controlling code or the filter code
|
|
needs it.</p>
|
|
<p>We have checked all other usages of such a stack based
|
|
filter contexts but fortunately found no other vulnerable
|
|
places. This allows to release a relatively small patch.
|
|
However, for reasons of code cleanness and easier audits
|
|
we will soon start to change all these stack based filter
|
|
contexts to heap based ones.</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<cvename>CVE-2006-6235</cvename>
|
|
<url>http://lists.gnupg.org/pipermail/gnupg-announce/2006q4/000246.html</url>
|
|
<url>http://secunia.com/advisories/23245/</url>
|
|
</references>
|
|
<dates>
|
|
<discovery>2006-12-04</discovery>
|
|
<entry>2006-12-07</entry>
|
|
<modified>2006-12-15</modified>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="a8674c14-83d7-11db-88d5-0012f06707f0">
|
|
<topic>ruby -- cgi.rb library Denial of Service</topic>
|
|
<affects>
|
|
<package>
|
|
<name>ruby</name>
|
|
<name>ruby+pthreads</name>
|
|
<name>ruby+pthreads+oniguruma</name>
|
|
<name>ruby+oniguruma</name>
|
|
<range><ge>1.8.*,1</ge><lt>1.8.5_5,1</lt></range>
|
|
</package>
|
|
<package>
|
|
<name>ruby_static</name>
|
|
<range><ge>1.8.*,1</ge></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>The official ruby site reports:</p>
|
|
<blockquote cite="http://www.ruby-lang.org/en/news/2006/12/04/another-dos-vulnerability-in-cgi-library/">
|
|
<p>Another vulnerability has been discovered in the CGI library
|
|
(cgi.rb) that ships with Ruby which could be used by a malicious
|
|
user to create a denial of service attack (DoS).</p>
|
|
<p>A specific HTTP request for any web application using cgi.rb
|
|
causes CPU consumption on the machine on which the web application
|
|
is running. Many such requests result in a denial of service.</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<cvename>CVE-2006-6303</cvename>
|
|
<url>http://www.ruby-lang.org/en/news/2006/12/04/another-dos-vulnerability-in-cgi-library/</url>
|
|
</references>
|
|
<dates>
|
|
<discovery>2006-12-04</discovery>
|
|
<entry>2006-12-04</entry>
|
|
<modified>2010-05-12</modified>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="ed124f8c-82a2-11db-b46b-0012f06707f0">
|
|
<topic>libmusicbrainz -- multiple buffer overflow vulnerabilities</topic>
|
|
<affects>
|
|
<package>
|
|
<name>libmusicbrainz</name>
|
|
<range><lt>2.1.3</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>SecurityFocus reports about libmusicbrainz:</p>
|
|
<blockquote cite="http://www.securityfocus.com/bid/19508/discuss">
|
|
<p>The libmusicbrainz library is prone to multiple buffer-overflow
|
|
vulnerabilities because the application fails to check the size of
|
|
the data before copying it into a finite-sized internal memory
|
|
buffer.</p>
|
|
<p>An attacker can exploit these issues to execute arbitrary code
|
|
within the context of the application or to cause a
|
|
denial-of-service condition.</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<bid>19508</bid>
|
|
<cvename>CVE-2006-4197</cvename>
|
|
<url>http://www.securityfocus.com/bid/21185/discuss</url>
|
|
</references>
|
|
<dates>
|
|
<discovery>2006-08-17</discovery>
|
|
<entry>2006-12-02</entry>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="666b8c9e-8212-11db-851e-0016179b2dd5">
|
|
<topic>tdiary -- cross site scripting vulnerability</topic>
|
|
<affects>
|
|
<package>
|
|
<name>ja-tdiary</name>
|
|
<name>tdiary</name>
|
|
<range><le>2.0.2</le></range>
|
|
</package>
|
|
<package>
|
|
<name>ja-tdiary-devel</name>
|
|
<name>tdiary-devel</name>
|
|
<range><gt>2.1</gt><lt>2.1.4_1</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>tDiary was vulnerable to an unspecified Cross-Site
|
|
Scripting vulnerability</p>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<cvename>CVE-2006-6174</cvename>
|
|
<url>http://sourceforge.net/forum/forum.php?forum_id=638868</url>
|
|
</references>
|
|
<dates>
|
|
<discovery>2006-11-26</discovery>
|
|
<entry>2006-12-02</entry>
|
|
<modified>2010-05-12</modified>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="18e3a5be-81f9-11db-95a2-0012f06707f0">
|
|
<topic>ImageMagick -- SGI Image File heap overflow vulnerability</topic>
|
|
<affects>
|
|
<package>
|
|
<name>ImageMagick</name>
|
|
<name>ImageMagick-nox11</name>
|
|
<range><ge>6.0.0</ge><lt>6.2.9</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>SecurityFocus reports about ImageMagick:</p>
|
|
<blockquote cite="http://www.securityfocus.com/bid/21185/info">
|
|
<p>ImageMagick is prone to a remote heap-based buffer-overflow
|
|
vulnerability because the application fails to properly
|
|
bounds-check user-supplied input before copying it to an
|
|
insufficiently sized memory buffer.</p>
|
|
<p>Exploiting this issue allows attackers to execute arbitrary
|
|
machine code in the context of applications that use the
|
|
ImageMagick library.</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<bid>21185</bid>
|
|
<cvename>CVE-2006-5868</cvename>
|
|
<url>http://www.securityfocus.com/bid/21185/discuss</url>
|
|
</references>
|
|
<dates>
|
|
<discovery>2006-11-14</discovery>
|
|
<entry>2006-12-02</entry>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="3dd7eb58-80ae-11db-b4ec-000854d03344">
|
|
<topic>gtar -- GNUTYPE_NAMES directory traversal vulnerability</topic>
|
|
<affects>
|
|
<package>
|
|
<name>gtar</name>
|
|
<range><lt>1.16_2</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>Teemu Salmela reports:</p>
|
|
<blockquote cite="http://archives.neohapsis.com/archives/fulldisclosure/2006-11/0344.html">
|
|
<p>There is a tar record type, called GNUTYPE_NAMES (an
|
|
obsolete GNU extension), that allows the creation of
|
|
symbolic links pointing to arbitrary locations in the
|
|
filesystem, which makes it possible to create/overwrite
|
|
arbitrary files.</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<bid>21235</bid>
|
|
<cvename>CVE-2006-6097</cvename>
|
|
<url>http://archives.neohapsis.com/archives/fulldisclosure/2006-11/0344.html</url>
|
|
</references>
|
|
<dates>
|
|
<discovery>2006-11-21</discovery>
|
|
<entry>2006-11-30</entry>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="a8af7d70-8007-11db-b280-0008743bf21a">
|
|
<topic>kronolith -- arbitrary local file inclusion vulnerability</topic>
|
|
<affects>
|
|
<package>
|
|
<name>kronolith</name>
|
|
<range><lt>2.1.4</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>iDefense Labs reports:</p>
|
|
<blockquote cite="http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=445">
|
|
<p>Remote exploitation of a design error in Horde's Kronolith
|
|
could allow an authenticated web mail user to execute
|
|
arbitrary PHP code under the security context of the running
|
|
web server.</p>
|
|
<p>The vulnerability specifically exists due to a design error in the
|
|
way it includes certain files. Specifically, the 'lib/FBView.php'
|
|
file contains a function 'Kronolith_FreeBusy_View::factory' which
|
|
will include local files that are supplied via the 'view' HTTP GET
|
|
request parameter.</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<url>http://lists.horde.org/archives/announce/2006/000307.html</url>
|
|
</references>
|
|
<dates>
|
|
<discovery>2006-11-29</discovery>
|
|
<entry>2006-11-30</entry>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="34c93ae8-7e6f-11db-bf00-02e081235dab">
|
|
<topic>gnupg -- buffer overflow</topic>
|
|
<affects>
|
|
<package>
|
|
<name>gnupg</name>
|
|
<range><lt>1.4.5_1</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>Werner Koch reports:</p>
|
|
<blockquote cite="http://lists.gnupg.org/pipermail/gnupg-announce/2006q4/000241.html">
|
|
<p>When running GnuPG interactively, special crafted
|
|
messages may be used to crash gpg or gpg2. Running gpg in
|
|
batch mode, as done by all software using gpg as a backend
|
|
(e.g. mailers), is not affected by this bug.</p>
|
|
<p>Exploiting this overflow seems to be possible.</p>
|
|
<p>gpg-agent, gpgsm, gpgv or other tools from the GnuPG
|
|
suite are not affected.</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<url>http://lists.gnupg.org/pipermail/gnupg-announce/2006q4/000241.html</url>
|
|
</references>
|
|
<dates>
|
|
<discovery>2006-11-27</discovery>
|
|
<entry>2006-11-27</entry>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="cca97f5f-7435-11db-91de-0008743bf21a">
|
|
<topic>proftpd -- Remote Code Execution Vulnerability</topic>
|
|
<affects>
|
|
<package>
|
|
<name>proftpd</name>
|
|
<name>proftpd-mysql</name>
|
|
<range><le>1.3.0_2</le></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>FrSIRT reports:</p>
|
|
<blockquote cite="http://www.frsirt.com/english/advisories/2006/4451">
|
|
<p>A vulnerability has been identified in ProFTPD, which could be
|
|
exploited by attackers to cause a denial of service or execute
|
|
arbitrary commands. This flaw is due to a buffer overflow error
|
|
in the "main.c" file where the "cmd_buf_size" size of the buffer
|
|
used to handle FTP commands sent by clients is not properly set
|
|
to the size configured via the "CommandBufferSize" directive,
|
|
which could be exploited by attackers to compromise a vulnerable
|
|
server via a specially crafted FTP command.</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<url>http://www.frsirt.com/english/advisories/2006/4451</url>
|
|
</references>
|
|
<dates>
|
|
<discovery>2006-11-10</discovery>
|
|
<entry>2006-11-14</entry>
|
|
<modified>2006-11-15</modified>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="5a945904-73b1-11db-91d2-0002a5c2f4ef">
|
|
<topic>unzoo -- Directory Traversal Vulnerability</topic>
|
|
<affects>
|
|
<package>
|
|
<name>unzoo</name>
|
|
<range><lt>4.4_1</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>Secunia reports:</p>
|
|
<blockquote cite="http://secunia.com/advisories/12857/">
|
|
<p>Doubles has discovered a vulnerability in Unzoo, which
|
|
potentially can be exploited by malicious people to
|
|
compromise a user's system.</p>
|
|
<p>The vulnerability is caused due to an input validation error
|
|
when unpacking archives. This can be exploited via a
|
|
directory traversal attack to overwrite files outside the
|
|
directory, where the files are extracted to, if a user is
|
|
tricked into extracting a malicious archive using Unzoo.</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<bid>11417</bid>
|
|
<url>http://secunia.com/advisories/12857/</url>
|
|
<url>http://securitytracker.com/alerts/2004/Oct/1011673.html</url>
|
|
</references>
|
|
<dates>
|
|
<discovery>2004-10-18</discovery>
|
|
<entry>2006-11-14</entry>
|
|
<modified>2006-12-15</modified>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="6d68618a-7199-11db-a2ad-000c6ec775d9">
|
|
<topic>bugzilla -- multiple vulnerabilities</topic>
|
|
<affects>
|
|
<package>
|
|
<name>bugzilla</name>
|
|
<name>ja-bugzilla</name>
|
|
<range><gt>2.*</gt><lt>2.22.1</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>A Bugzilla Security Advisory reports:</p>
|
|
<blockquote cite="http://www.bugzilla.org/security/2.18.5/">
|
|
<ul>
|
|
<li>Sometimes the information put into the <h1> and
|
|
<h2> tags in Bugzilla was not properly escaped,
|
|
leading to a possible XSS vulnerability.</li>
|
|
<li>Bugzilla administrators were allowed to put raw,
|
|
unfiltered HTML into many fields in Bugzilla, leading to
|
|
a possible XSS vulnerability. Now, the HTML allowed in
|
|
those fields is limited.</li>
|
|
<li>attachment.cgi could leak the names of private
|
|
attachments</li>
|
|
<li>The "deadline" field was visible in the XML format of
|
|
a bug, even to users who were not a member of the
|
|
"timetrackinggroup."</li>
|
|
<li>A malicious user could pass a URL to an admin, and
|
|
make the admin delete or change something that he had
|
|
not intended to delete or change.</li>
|
|
<li>It is possible to inject arbitrary HTML into the
|
|
showdependencygraph.cgi page, allowing for a cross-site
|
|
scripting attack.</li>
|
|
</ul>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<cvename>CVE-2006-5453</cvename>
|
|
<cvename>CVE-2006-5454</cvename>
|
|
<cvename>CVE-2006-5455</cvename>
|
|
<url>http://www.bugzilla.org/security/2.18.5/</url>
|
|
</references>
|
|
<dates>
|
|
<discovery>2006-10-15</discovery>
|
|
<entry>2006-11-11</entry>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="92442c4b-6f4a-11db-bd28-0012f06707f0">
|
|
<topic>Imlib2 -- multiple image file processing vulnerabilities</topic>
|
|
<affects>
|
|
<package>
|
|
<name>imlib2</name>
|
|
<range><lt>20060926_1,1</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>Secunia reports:</p>
|
|
<blockquote cite="http://secunia.com/advisories/22732/">
|
|
<p>Some vulnerabilities have been reported in imlib2, which can be
|
|
exploited by malicious people to cause a DoS (Denial of Service)
|
|
or potentially compromise an application using the library.</p>
|
|
<p>The vulnerabilities are caused due to unspecified errors within
|
|
the processing of JPG, ARGB, PNG, LBM, PNM, TIFF, and TGA images.
|
|
This may be exploited to execute arbitrary code by e.g. tricking a
|
|
user into opening a specially crafted image file with an
|
|
application using imlib2.</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<bid>20903</bid>
|
|
<cvename>CVE-2006-4806</cvename>
|
|
<cvename>CVE-2006-4807</cvename>
|
|
<cvename>CVE-2006-4808</cvename>
|
|
<cvename>CVE-2006-4809</cvename>
|
|
</references>
|
|
<dates>
|
|
<discovery>2006-11-03</discovery>
|
|
<entry>2006-11-08</entry>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="ab8dbe98-6be4-11db-ae91-0012f06707f0">
|
|
<topic>ruby -- cgi.rb library Denial of Service</topic>
|
|
<affects>
|
|
<package>
|
|
<name>ruby</name>
|
|
<name>ruby+pthreads</name>
|
|
<name>ruby+pthreads+oniguruma</name>
|
|
<name>ruby+oniguruma</name>
|
|
<range><ge>1.8.*,1</ge><lt>1.8.5_4,1</lt></range>
|
|
</package>
|
|
<package>
|
|
<name>ruby_static</name>
|
|
<range><ge>1.8.*,1</ge></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>Official ruby site reports:</p>
|
|
<blockquote cite="http://www.ruby-lang.org/en/news/2006/11/03/CVE-2006-5467/">
|
|
<p>A vulnerability has been discovered in the CGI library (cgi.rb)
|
|
that ships with Ruby which could be used by a malicious user to
|
|
create a denial of service attack (DoS). The problem is triggered
|
|
by sending the library an HTTP request that uses multipart MIME
|
|
encoding and as an invalid boundary specifier that begins with
|
|
"-" instead of "--". Once triggered it will
|
|
exhaust all available memory resources effectively creating a DoS
|
|
condition.</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<bid>20777</bid>
|
|
<cvename>CVE-2006-5467</cvename>
|
|
<url>http://rubyforge.org/pipermail/mongrel-users/2006-October/001946.html</url>
|
|
</references>
|
|
<dates>
|
|
<discovery>2006-10-25</discovery>
|
|
<entry>2006-11-04</entry>
|
|
<modified>2006-12-15</modified>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="b318dc8c-6756-11db-83c3-000c6ec775d9">
|
|
<topic>screen -- combined UTF-8 characters vulnerability</topic>
|
|
<affects>
|
|
<package>
|
|
<name>screen</name>
|
|
<range><lt>4.0.3</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>A vulnerability in the handling of combined UTF-8
|
|
characters in screen may allow an user-assisted attacker to
|
|
crash screen or potentially allow code execution as the user
|
|
running screen. To exploit this issue the user running
|
|
scren must in some way interact with the attacker.</p>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<bid>20727</bid>
|
|
<cvename>CVE-2006-4573</cvename>
|
|
<mlist>http://lists.gnu.org/archive/html/screen-users/2006-10/msg00028.html</mlist>
|
|
<url>https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=212056</url>
|
|
</references>
|
|
<dates>
|
|
<discovery>2006-10-23</discovery>
|
|
<entry>2006-10-29</entry>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="a9c51caf-6603-11db-ab90-000e35fd8194">
|
|
<topic>mysql -- database suid privilege escalation</topic>
|
|
<affects>
|
|
<package>
|
|
<name>mysql-server</name>
|
|
<range><ge>5.1</ge><lt>5.1.12</lt></range>
|
|
<range><ge>5.0</ge><lt>5.0.25</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>Dmitri Lenev reports a privilege escalation in
|
|
MySQL. MySQL evaluates arguments of suid routines in the
|
|
security context of the routine's definer instead of the
|
|
routine's caller, which allows remote and local
|
|
authenticated users to gain privileges through a routine
|
|
that has been made available using GRANT EXECUTE.</p>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<cvename>CVE-2006-4227</cvename>
|
|
<url>http://bugs.mysql.com/bug.php?id=18630</url>
|
|
</references>
|
|
<dates>
|
|
<discovery>2006-03-29</discovery>
|
|
<entry>2006-10-29</entry>
|
|
<modified>2006-10-30</modified>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="a0e92718-6603-11db-ab90-000e35fd8194">
|
|
<topic>mysql -- database "case-sensitive" privilege escalation</topic>
|
|
<affects>
|
|
<package>
|
|
<name>mysql-server</name>
|
|
<range><ge>5.1</ge><lt>5.1.12</lt></range>
|
|
<range><ge>5.0</ge><lt>5.0.25</lt></range>
|
|
<range><lt>4.1.21</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>Michal Prokopiuk reports a privilege escalation in MySQL.
|
|
The vulnerability causes MySQL, when run on case-sensitive
|
|
filesystems, to allow remote and local authenticated users
|
|
to create or access a database when the database name
|
|
differs only in case from a database for which they have
|
|
permissions.</p>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<bid>19559</bid>
|
|
<cvename>CVE-2006-4226</cvename>
|
|
<url>http://bugs.mysql.com/bug.php?id=17647</url>
|
|
</references>
|
|
<dates>
|
|
<discovery>2006-08-09</discovery>
|
|
<entry>2006-10-29</entry>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="96ed277b-60e0-11db-ad2d-0016179b2dd5">
|
|
<topic>Serendipity -- XSS Vulnerabilities</topic>
|
|
<affects>
|
|
<package>
|
|
<name>serendipity</name>
|
|
<range><lt>1.0.1</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>The Serendipity Team reports:</p>
|
|
<blockquote cite="http://blog.s9y.org/archives/147-Serendipity-1.0.2-and-1.1-beta5-released.html">
|
|
<p>Serendipity failed to correctly sanitize user input on the
|
|
media manager administration page. The content of GET variables
|
|
were written into JavaScript strings. By using standard string
|
|
evasion techniques it was possible to execute arbitrary
|
|
JavaScript.</p>
|
|
<p>Additionally Serendipity dynamically created a HTML form on
|
|
the media manager administration page that contained all
|
|
variables found in the URL as hidden fields. While the variable
|
|
values were correctly escaped it was possible to break out
|
|
by specifying strange variable names.</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<url>http://www.hardened-php.net/advisory_112006.136.htmlSerendipity</url>
|
|
<url>http://secunia.com/advisories/22501/</url>
|
|
</references>
|
|
<dates>
|
|
<discovery>2006-10-19</discovery>
|
|
<entry>2006-10-21</entry>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="d8fbf13a-6215-11db-a59e-0211d85f11fb">
|
|
<topic>kdelibs -- integer overflow in khtml</topic>
|
|
<affects>
|
|
<package>
|
|
<name>kdelibs</name>
|
|
<name>kdelibs-nocups</name>
|
|
<range><lt>3.5.4_4</lt></range>
|
|
</package>
|
|
<package>
|
|
<name>qt</name>
|
|
<name>qt-copy</name>
|
|
<range><lt>3.3.6_3</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>Red Hat reports:</p>
|
|
<blockquote cite="http://rhn.redhat.com/errata/RHSA-2006-0720.html">
|
|
<p>An integer overflow flaw was found in the way Qt handled pixmap
|
|
images. The KDE khtml library uses Qt in such a way that untrusted
|
|
parameters could be passed to Qt, triggering the overflow.
|
|
An attacker could for example create a malicious web page that when
|
|
viewed by a victim in the Konqueror browser would cause Konqueror
|
|
to crash or possibly execute arbitrary code with the privileges of
|
|
the victim.</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<cvename>CVE-2006-4811</cvename>
|
|
<url>http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=210742</url>
|
|
<url>http://rhn.redhat.com/errata/RHSA-2006-0720.html</url>
|
|
</references>
|
|
<dates>
|
|
<discovery>2006-10-14</discovery>
|
|
<entry>2006-10-22</entry>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="4867ae85-608d-11db-8faf-000c6ec775d9">
|
|
<topic>opera -- URL parsing heap overflow vulnerability</topic>
|
|
<affects>
|
|
<package>
|
|
<name>opera</name>
|
|
<name>opera-devel</name>
|
|
<name>linux-opera</name>
|
|
<range><gt>9.*</gt><lt>9.02</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>iDefense Labs reports:</p>
|
|
<blockquote cite="http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=424">
|
|
<p>Remote exploitation of a heap overflow vulnerability
|
|
within version 9 of Opera Software's Opera Web browser
|
|
could allow an attacker to execute arbitrary code on the
|
|
affected host.</p>
|
|
<p>A flaw exists within Opera when parsing a tag that
|
|
contains a URL. A heap buffer with a constant size of 256
|
|
bytes is allocated to store the URL, and the tag's URL is
|
|
copied into this buffer without sufficient bounds checking
|
|
of its length.</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<cvename>CVE-2006-4819</cvename>
|
|
<url>http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=424</url>
|
|
<url>http://secunia.com/advisories/22218/</url>
|
|
<url>http://www.opera.com/support/search/supsearch.dml?index=848</url>
|
|
</references>
|
|
<dates>
|
|
<discovery>2006-10-17</discovery>
|
|
<entry>2006-10-20</entry>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="1c0def84-5fb1-11db-b2e9-0008c79fa3d2">
|
|
<topic>asterisk -- remote heap overwrite vulnerability</topic>
|
|
<affects>
|
|
<package>
|
|
<name>asterisk</name>
|
|
<name>asterisk-bristuff</name>
|
|
<range><lt>1.2.13</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>Adam Boileau of Security-Assessment.com reports:</p>
|
|
<blockquote cite="http://www.security-assessment.com/files/advisories/Asterisk_remote_heap_overflow.pdf">
|
|
<p>The Asterisk Skinny channel driver for Cisco SCCP phones
|
|
(chan_skinny.so) incorrectly validates a length value in
|
|
the packet header. An integer wrap-around leads to heap
|
|
overwrite, and arbitrary remote code execution as root.</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<url>http://www.security-assessment.com/files/advisories/Asterisk_remote_heap_overflow.pdf</url>
|
|
<mlist msgid="4536A2F2.2020902@security-assessment.com">http://marc.theaimsgroup.com/?l=bugtraq&m=116121567530170</mlist>
|
|
</references>
|
|
<dates>
|
|
<discovery>2006-10-17</discovery>
|
|
<entry>2006-10-20</entry>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="b6c18956-5fa3-11db-ad2d-0016179b2dd5">
|
|
<topic>plone -- unprotected MembershipTool methods</topic>
|
|
<affects>
|
|
<package>
|
|
<name>plone</name>
|
|
<range><lt>2.1.2</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>The Plone Team reports:</p>
|
|
<blockquote cite="http://dev.plone.org/plone/ticket/5432">
|
|
<p>Plone 2.0.5, 2.1.2, and 2.5-beta1 does not restrict
|
|
access to the:</p>
|
|
<ul>
|
|
<li>changeMemberPortrait</li>
|
|
<li>deletePersonalPortrait</li>
|
|
<li>testCurrentPassword</li>
|
|
</ul>
|
|
<p>methods, which allows remote attackers to modify portraits.</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<cvename>CVE-2006-1711</cvename>
|
|
<url>http://plone.org/products/plone/releases/2.1.4</url>
|
|
<url>https://svn.plone.org/svn/plone/PloneHotfix20060410/trunk/README.txt</url>
|
|
</references>
|
|
<dates>
|
|
<discovery>2006-10-19</discovery>
|
|
<entry>2006-10-19</entry>
|
|
<modified>2006-10-20</modified>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="19207592-5f17-11db-ae08-0008743bf21a">
|
|
<topic>drupal -- HTML attribute injection</topic>
|
|
<affects>
|
|
<package>
|
|
<name>drupal</name>
|
|
<range><lt>4.6.10</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>The Drupal Team reports:</p>
|
|
<blockquote cite="http://drupal.org/files/sa-2006-026/advisory.txt">
|
|
<p>A malicious user may entice users to visit a specially
|
|
crafted URL that may result in the redirection of Drupal
|
|
form submission to a third-party site. A user visiting the
|
|
user registration page via such a url, for example, will
|
|
submit all data, such as his/her e-mail address, but also
|
|
possible private profile data, to a third-party site.</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<url>http://drupal.org/files/sa-2006-026/advisory.txt</url>
|
|
<url>http://drupal.org/drupal-4.7.4</url>
|
|
</references>
|
|
<dates>
|
|
<discovery>2006-10-18</discovery>
|
|
<entry>2006-10-18</entry>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="937d5911-5f16-11db-ae08-0008743bf21a">
|
|
<topic>drupal -- cross site request forgeries</topic>
|
|
<affects>
|
|
<package>
|
|
<name>drupal</name>
|
|
<range><lt>4.6.10</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>The Drupal Team reports:</p>
|
|
<blockquote cite="http://drupal.org/files/sa-2006-025/advisory.txt">
|
|
<p>Visiting a specially crafted page, anywhere on the web, may
|
|
allow that page to post forms to a Drupal site in the
|
|
context of the visitor's session. To illustrate; suppose
|
|
one has an active user 1 session, the most powerful
|
|
administrator account for a site, to a Drupal site while
|
|
visiting a website created by an attacker. This website
|
|
will now be able to submit any form to the Drupal site with
|
|
the privileges of user 1, either by enticing the user to
|
|
submit a form or by automated means.</p>
|
|
<p>An attacker can exploit this vulnerability by changing
|
|
passwords, posting PHP code or creating new users, for
|
|
example. The attack is only limited by the privileges of
|
|
the session it executes in.</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<url>http://drupal.org/files/sa-2006-025/advisory.txt</url>
|
|
<url>http://drupal.org/drupal-4.7.4</url>
|
|
</references>
|
|
<dates>
|
|
<discovery>2006-10-18</discovery>
|
|
<entry>2006-10-18</entry>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="b2383758-5f15-11db-ae08-0008743bf21a">
|
|
<topic>drupal -- multiple XSS vulnerabilities</topic>
|
|
<affects>
|
|
<package>
|
|
<name>drupal</name>
|
|
<range><lt>4.6.10</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>The Drupal Team reports:</p>
|
|
<blockquote cite="http://drupal.org/files/sa-2006-024/advisory.txt">
|
|
<p>A bug in input validation and lack of output validation
|
|
allows HTML and script insertion on several pages.</p>
|
|
<p>Drupal's XML parser passes unescaped data to watchdog
|
|
under certain circumstances. A malicious user may execute
|
|
an XSS attack via a specially crafted RSS feed. This
|
|
vulnerability exists on systems that do not use PHP's
|
|
mb_string extension (to check if mb_string is being used,
|
|
navigate to admin/settings and look under "String
|
|
handling"). Disabling the aggregator module provides an
|
|
immediate workaround.</p>
|
|
<p>The aggregator module, profile module, and forum module do
|
|
not properly escape output of certain fields.</p>
|
|
<p>Note: XSS attacks may lead to administrator access if
|
|
certain conditions are met.</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<url>http://drupal.org/files/sa-2006-024/advisory.txt</url>
|
|
<url>http://drupal.org/drupal-4.7.4</url>
|
|
</references>
|
|
<dates>
|
|
<discovery>2006-10-18</discovery>
|
|
<entry>2006-10-18</entry>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="18a14baa-5ee5-11db-ae08-0008743bf21a">
|
|
<topic>ingo -- local arbitrary shell command execution</topic>
|
|
<affects>
|
|
<package>
|
|
<name>ingo</name>
|
|
<range><lt>1.1.2</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>The Horde team reports a vulnerability within Ingo, the
|
|
filter management suite. The vulnerability is caused due to
|
|
inadequete escaping, possibly allowing a local user to execute
|
|
arbitrary shell commands via procmail.</p>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<cvename>CVE-2006-5449</cvename>
|
|
<url>http://bugs.horde.org/ticket/?id=4513</url>
|
|
<url>http://cvs.horde.org/diff.php/ingo/docs/CHANGES?r1=1.55.2.49&r2=1.55.2.59&ty=h</url>
|
|
<url>http://lists.horde.org/archives/announce/2006/000296.html</url>
|
|
</references>
|
|
<dates>
|
|
<discovery>2006-10-18</discovery>
|
|
<entry>2006-10-18</entry>
|
|
<modified>2010-05-12</modified>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="a6d9da4a-5d5e-11db-8faf-000c6ec775d9">
|
|
<topic>NVIDIA UNIX driver -- arbitrary root code execution vulnerability</topic>
|
|
<affects>
|
|
<package>
|
|
<name>nvidia-driver</name>
|
|
<range><ge>1.0.8762</ge><lt>1.0.8776</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>Rapid7 reports:</p>
|
|
<blockquote cite="http://www.rapid7.com/advisories/R7-0025.jsp">
|
|
<p>The NVIDIA Binary Graphics Driver for Linux is vulnerable
|
|
to a buffer overflow that allows an attacker to run
|
|
arbitrary code as root. This bug can be exploited both
|
|
locally or remotely (via a remote X client or an X client
|
|
which visits a malicious web page). A working
|
|
proof-of-concept root exploit is included with this
|
|
advisory.</p>
|
|
<p>The NVIDIA drivers for Solaris and FreeBSD are also
|
|
likely to be vulnerable.</p>
|
|
</blockquote>
|
|
<p>Disabling Render acceleration in the "nvidia" driver, via
|
|
the "RenderAccel" X configuration option, can be used as a
|
|
workaround for this issue.</p>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<certvu>147252</certvu>
|
|
<cvename>CVE-2006-5379</cvename>
|
|
<url>http://nvidia.custhelp.com/cgi-bin/nvidia.cfg/php/enduser/std_adp.php?p_faqid=1971</url>
|
|
<url>http://secunia.com/advisories/22419/</url>
|
|
<url>http://www.rapid7.com/advisories/R7-0025.jsp</url>
|
|
</references>
|
|
<dates>
|
|
<discovery>2006-10-16</discovery>
|
|
<entry>2006-10-16</entry>
|
|
<modified>2006-10-21</modified>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="8012a79d-5d21-11db-bb8d-00123ffe8333">
|
|
<topic>clamav -- CHM unpacker and PE rebuilding vulnerabilities</topic>
|
|
<affects>
|
|
<package>
|
|
<name>clamav</name>
|
|
<range><lt>0.88.5</lt></range>
|
|
</package>
|
|
<package>
|
|
<name>clamav-devel</name>
|
|
<range><le>20060922</le></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>Secunia reports:</p>
|
|
<blockquote cite="http://secunia.com/advisories/22370/">
|
|
<p>Two vulnerabilities have been reported in Clam AntiVirus, which
|
|
potentially can be exploited by malicious people to cause a DoS
|
|
(Denial of Service) or compromise a vulnerable system.</p>
|
|
<p>1) An unspecified error in the CHM unpacker in chmunpack.c can be
|
|
exploited to cause a DoS.</p>
|
|
<p>2) An unspecified error in rebuildpe.c when rebuilding PE files
|
|
after unpacking can be exploited to cause a heap-based buffer
|
|
overflow.</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<url>http://secunia.com/advisories/22370/</url>
|
|
<url>http://lurker.clamav.net/message/20061016.015114.dc6a8930.en.html</url>
|
|
<url>http://sourceforge.net/project/shownotes.php?release_id=455799</url>
|
|
</references>
|
|
<dates>
|
|
<discovery>2006-10-15</discovery>
|
|
<entry>2006-10-16</entry>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="93ba13f8-5c41-11db-a5ae-00508d6a62df">
|
|
<topic>tkdiff -- temporary file symlink privilege escalation</topic>
|
|
<affects>
|
|
<package>
|
|
<name>tkdiff</name>
|
|
<range><lt>4.1.1</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>Javier Fernández-Sanguino Peña reports a vulnerability in
|
|
tkdiff which allows local users to gain priveleges of the
|
|
user running tkdiff due to insecure temporary file creation.</p>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<url>http://www.debian.org/security/2005/dsa-927</url>
|
|
<cvename>CVE-2005-3343</cvename>
|
|
<bid>16064</bid>
|
|
<url>http://secunia.com/advisories/18083</url>
|
|
</references>
|
|
<dates>
|
|
<discovery>2005-12-20</discovery>
|
|
<entry>2006-10-15</entry>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="2c8a84d9-5bee-11db-a5ae-00508d6a62df">
|
|
<topic>vtiger -- multiple remote file inclusion vulnerabilities</topic>
|
|
<affects>
|
|
<package>
|
|
<name>vtiger</name>
|
|
<range><lt>5.0</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>Dedi Dwianto a.k.a the_day reports:</p>
|
|
<blockquote cite="http://www.milw0rm.com/exploits/2508">
|
|
<p>Input passed to the "$calpath" parameter in update.php is
|
|
not properly verified before being used. This can be
|
|
exploited to execute arbitrary PHP code by including files
|
|
from local or external resources.</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<cvename>CVE-2006-5289</cvename>
|
|
<bid>20435</bid>
|
|
<mlist msgid="20061009094328.15530.qmail@securityfocus.com">http://marc.theaimsgroup.com/?l=bugtraq&m=116049557032343</mlist>
|
|
<url>http://advisories.echo.or.id/adv/adv54-theday-2006.txt</url>
|
|
</references>
|
|
<dates>
|
|
<discovery>2006-10-09</discovery>
|
|
<entry>2006-10-15</entry>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="5c9a2769-5ade-11db-a5ae-00508d6a62df">
|
|
<topic>google-earth -- heap overflow in the KML engine</topic>
|
|
<affects>
|
|
<package>
|
|
<name>google-earth</name>
|
|
<range><lt>4.0.2414</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>JAAScois reports:</p>
|
|
<p>While processing KML/KMZ data Google Earth fails to verify
|
|
its size prior to copying it into a fixed-sized buffer.
|
|
This can be exploited as a buffer-overflow vulnerability to
|
|
cause the application to crash and/or to execute arbitrary
|
|
code.</p>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<bid>20464</bid>
|
|
<url>http://www.jaascois.com/exploits/18602024/</url>
|
|
</references>
|
|
<dates>
|
|
<discovery>2006-10-10</discovery>
|
|
<entry>2006-10-14</entry>
|
|
<modified>2007-04-13</modified>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="72f21372-55e4-11db-a5ae-00508d6a62df">
|
|
<topic>torrentflux -- User-Agent XSS Vulnerability</topic>
|
|
<affects>
|
|
<package>
|
|
<name>torrentflux</name>
|
|
<range><ge>0</ge></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<blockquote cite="http://www.stevenroddis.com.au/2006/10/06/torrentflux-user-agent-xss-vulnerability/">
|
|
<p>Steven Roddis reports that User-Agent string is not
|
|
properly escaped when handled by torrentflux. This allows
|
|
for arbitrary code insertion.</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<bid>20371</bid>
|
|
<cvename>CVE-2006-5227</cvename>
|
|
<url>http://www.stevenroddis.com.au/2006/10/06/torrentflux-user-agent-xss-vulnerability/</url>
|
|
<url>http://secunia.com/advisories/22293/</url>
|
|
</references>
|
|
<dates>
|
|
<discovery>2006-09-30</discovery>
|
|
<entry>2006-10-07</entry>
|
|
<modified>2006-10-15</modified>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="fe83eb5b-55e1-11db-a5ae-00508d6a62df">
|
|
<topic>python -- buffer overrun in repr() for unicode strings</topic>
|
|
<affects>
|
|
<package>
|
|
<name>python+ipv6</name>
|
|
<range><ge>0</ge></range>
|
|
</package>
|
|
<package>
|
|
<name>python</name>
|
|
<range><lt>2.4.3_1</lt></range>
|
|
<range><gt>2.5.*</gt><lt>2.5.c2</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>Benjamin C. Wiley Sittler reports:</p>
|
|
<blockquote cite="https://launchpad.net/distros/ubuntu/+source/python2.4/+bug/56633">
|
|
<p>I discovered a [buffer overrun in repr() for unicode
|
|
strings]. This causes an unpatched non-debug wide
|
|
(UTF-32/UCS-4) build of python to abort.</p>
|
|
</blockquote>
|
|
<p>Ubuntu security team reports:</p>
|
|
<blockquote cite="http://www.ubuntu.com/usn/usn-359-1">
|
|
<p>If an application uses repr() on arbitrary untrusted data,
|
|
this [bug] could be exploited to execute arbitrary code
|
|
with the privileges of the python application.</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<cvename>CVE-2006-4980</cvename>
|
|
<url>https://launchpad.net/distros/ubuntu/+source/python2.4/+bug/56633</url>
|
|
<url>http://www.ubuntu.com/usn/usn-359-1</url>
|
|
<url>http://secunia.com/advisories/22276/</url>
|
|
</references>
|
|
<dates>
|
|
<discovery>2006-08-15</discovery>
|
|
<entry>2006-10-07</entry>
|
|
<modified>2006-10-08</modified>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="e329550b-54f7-11db-a5ae-00508d6a62df">
|
|
<topic>php -- _ecalloc Integer Overflow Vulnerability</topic>
|
|
<affects>
|
|
<package>
|
|
<name>php5</name>
|
|
<range><lt>5.1.6_1</lt></range>
|
|
</package>
|
|
<package>
|
|
<name>php5-cli</name>
|
|
<name>php5-cgi</name>
|
|
<name>php5-dtc</name>
|
|
<name>php5-horde</name>
|
|
<name>php5-nms</name>
|
|
<name>mod_php5</name>
|
|
<range><ge>5</ge><lt>5.1.6_1</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>Stefan Esser reports:</p>
|
|
<blockquote cite="http://www.hardened-php.net/advisory_092006.133.html">
|
|
<p>The PHP 5 branch of the PHP source code lacks the
|
|
protection against possible integer overflows inside
|
|
ecalloc() that is present in the PHP 4 branch and also for
|
|
several years part of our Hardening-Patch and our new
|
|
Suhosin-Patch.</p>
|
|
<p>It was discovered that such an integer overflow can be
|
|
triggered when user input is passed to the unserialize()
|
|
function. Earlier vulnerabilities in PHP's unserialize()
|
|
that were also discovered by one of our audits in December
|
|
2004 are unrelated to the newly discovered flaw, but they
|
|
have shown, that the unserialize() function is exposed to
|
|
user-input in many popular PHP applications. Examples for
|
|
applications that use the content of COOKIE variables with
|
|
unserialize() are phpBB and Serendipity.</p>
|
|
<p>The successful exploitation of this integer overflow will
|
|
result in arbitrary code execution.</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<cvename>CVE-2006-4812</cvename>
|
|
<url>http://www.hardened-php.net/advisory_092006.133.html</url>
|
|
<url>http://secunia.com/advisories/22280/</url>
|
|
</references>
|
|
<dates>
|
|
<discovery>2006-09-30</discovery>
|
|
<entry>2006-10-06</entry>
|
|
<modified>2013-04-01</modified>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="8a5770b4-54b5-11db-a5ae-00508d6a62df">
|
|
<topic>mambo -- multiple SQL injection vulnerabilities</topic>
|
|
<affects>
|
|
<package>
|
|
<name>mambo</name>
|
|
<range><lt>4.6.5</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>James Bercegay reports:</p>
|
|
<blockquote cite="http://www.gulftech.org/?node=research&article_id=00116-10042006">
|
|
<p>Mambo is vulnerable to an Authentication Bypass issue that
|
|
is due to an SQL Injection in the login function. The SQL
|
|
Injection is possible because the $passwd variable is only
|
|
sanitized when it is not passed as an argument to the
|
|
function.</p>
|
|
</blockquote>
|
|
<p>Omid reports:</p>
|
|
<blockquote cite="http://seclists.org/bugtraq/2006/Aug/0491.html">
|
|
<p>There are several sql injections in Mambo 4.6 RC2 &
|
|
Joomla 1.0.10 (and maybe other versions):</p>
|
|
<ul>
|
|
<li>When a user edits a content, the "id" parameter is not
|
|
checked properly in /components/com_content/content.php,
|
|
which can cause 2 sql injections.</li>
|
|
<li>The "limit" parameter in the administration section is
|
|
not checked. This affects many pages of administration
|
|
section</li>
|
|
<li>In the administration section, while editing/creating a
|
|
user, the "gid" parameter is not checked properly.</li>
|
|
</ul>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<bid>19719</bid>
|
|
<bid>19734</bid>
|
|
<url>http://www.gulftech.org/?node=research&article_id=00116-10042006</url>
|
|
<url>http://seclists.org/bugtraq/2006/Aug/0491.html</url>
|
|
<url>http://www.frsirt.com/english/advisories/2006/3918</url>
|
|
<url>http://mamboxchange.com/forum/forum.php?forum_id=7704</url>
|
|
<url>http://secunia.com/advisories/21644/</url>
|
|
<url>http://secunia.com/advisories/22221/</url>
|
|
</references>
|
|
<dates>
|
|
<discovery>2006-08-26</discovery>
|
|
<entry>2006-10-05</entry>
|
|
<modified>2011-06-27</modified>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="19a92df1-548d-11db-8f1a-000a48049292">
|
|
<topic>tin -- buffer overflow vulnerabilities</topic>
|
|
<affects>
|
|
<package>
|
|
<name>tin</name>
|
|
<name>zh-tin</name>
|
|
<range><lt>1.8.2</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<blockquote cite="ftp://ftp.tin.org/pub/news/clients/tin/stable/CHANGES">
|
|
<p>Urs Janssen and Aleksey Salow report possible buffer
|
|
overflows in tin versions 1.8.0 and 1.8.1.</p>
|
|
</blockquote>
|
|
<blockquote cite="http://www.openpkg.org/security/advisories/OpenPKG-SA-2006.005-tin.html">
|
|
<p>OpenPKG project elaborates there is an allocation
|
|
off-by-one bug in version 1.8.0 which can lead to a buffer
|
|
overflow.</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<url>ftp://ftp.tin.org/pub/news/clients/tin/stable/CHANGES</url>
|
|
<url>http://www.openpkg.org/security/advisories/OpenPKG-SA-2006.005-tin.html</url>
|
|
</references>
|
|
<dates>
|
|
<discovery>2006-02-15</discovery>
|
|
<entry>2006-10-05</entry>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="ae7124ff-547c-11db-8f1a-000a48049292">
|
|
<topic>openldap -- slapd acl selfwrite Security Issue</topic>
|
|
<affects>
|
|
<package>
|
|
<name>openldap-server</name>
|
|
<name>openldap-sasl-server</name>
|
|
<range><lt>2.3.25</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>Howard Chu reports:</p>
|
|
<blockquote cite="http://www.openldap.org/its/index.cgi/Software%20Bugs?id=4587">
|
|
<p>An ACL of the form 'access to dn.subtree="ou=groups,
|
|
dc=example,dc=com" attr=member by * selfwrite' is intended
|
|
to only allow users to add/delete their own DN to the
|
|
target attribute. Currently it allows any DNs to be
|
|
modified.</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<bid>19832</bid>
|
|
<cvename>CVE-2006-4600</cvename>
|
|
<url>http://www.openldap.org/its/index.cgi/Software%20Bugs?id=4587</url>
|
|
<url>http://www.openldap.org/lists/openldap-announce/200608/msg00000.html</url>
|
|
<url>http://secunia.com/advisories/21721</url>
|
|
<url>http://securitytracker.com/alerts/2006/Sep/1016783.html</url>
|
|
</references>
|
|
<dates>
|
|
<discovery>2006-06-14</discovery>
|
|
<entry>2006-10-05</entry>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="5a39a22e-5478-11db-8f1a-000a48049292">
|
|
<topic>mono -- "System.CodeDom.Compiler" Insecure Temporary Creation</topic>
|
|
<affects>
|
|
<package>
|
|
<name>mono</name>
|
|
<range><lt>1.1.13.8.1</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>Sebastian Krahmer reports:</p>
|
|
<blockquote cite="http://www.ubuntu.com/usn/usn-357-1">
|
|
<p>Sebastian Krahmer of the SuSE security team discovered
|
|
that the System.CodeDom.Compiler classes used temporary
|
|
files in an insecure way. This could allow a symbolic link
|
|
attack to create or overwrite arbitrary files with the
|
|
privileges of the user invoking the program. Under some
|
|
circumstances, a local attacker could also exploit this to
|
|
inject arbitrary code into running Mono processes.</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<cvename>CVE-2006-5072</cvename>
|
|
<url>http://www.ubuntu.com/usn/usn-357-1</url>
|
|
<url>http://secunia.com/advisories/22237/</url>
|
|
</references>
|
|
<dates>
|
|
<discovery>2006-10-04</discovery>
|
|
<entry>2006-10-05</entry>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="edabe438-542f-11db-a5ae-00508d6a62df">
|
|
<topic>php -- open_basedir Race Condition Vulnerability</topic>
|
|
<affects>
|
|
<package>
|
|
<name>php4</name>
|
|
<name>php5</name>
|
|
<range><lt>4.4.4_1</lt></range>
|
|
<range><ge>5</ge><lt>5.1.6_2</lt></range>
|
|
</package>
|
|
<package>
|
|
<name>php-suhosin</name>
|
|
<range><lt>0.9.6</lt></range>
|
|
</package>
|
|
<package>
|
|
<name>php4-cli</name>
|
|
<name>php5-cli</name>
|
|
<name>php4-cgi</name>
|
|
<name>php5-cgi</name>
|
|
<name>php4-dtc</name>
|
|
<name>php5-dtc</name>
|
|
<name>php4-horde</name>
|
|
<name>php5-horde</name>
|
|
<name>php4-nms</name>
|
|
<name>php5-nms</name>
|
|
<name>mod_php4</name>
|
|
<name>mod_php5</name>
|
|
<range><ge>4</ge><lt>4.4.4_1</lt></range>
|
|
<range><ge>5</ge><lt>5.1.6_2</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>Stefan Esser reports:</p>
|
|
<blockquote cite="http://www.hardened-php.net/advisory_082006.132.html">
|
|
<p>PHP's open_basedir feature is meant to disallow scripts to
|
|
access files outside a set of configured base directories.
|
|
The checks for this are placed within PHP functions dealing
|
|
with files before the actual open call is performed.</p>
|
|
<p>Obviously there is a little span of time between the check
|
|
and the actual open call. During this time span the checked
|
|
path could have been altered and point to a file that is
|
|
forbidden to be accessed due to open_basedir restrictions.</p>
|
|
<p>Because the open_basedir restrictions often not call PHP
|
|
functions but 3rd party library functions to actually open
|
|
the file it is impossible to close this time span in a
|
|
general way. It would only be possible to close it when PHP
|
|
handles the actual opening on it's own.</p>
|
|
<p>While it seems hard to change the path during this little
|
|
time span it is very simple with the use of the symlink()
|
|
function combined with a little trick. PHP's symlink()
|
|
function ensures that source and target of the symlink
|
|
operation are allowed by open_basedir restrictions (and
|
|
safe_mode). However it is possible to point a symlink to
|
|
any file by the use of mkdir(), unlink() and at least two
|
|
symlinks.</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<bid>20326</bid>
|
|
<cvename>CVE-2006-5178</cvename>
|
|
<url>http://www.hardened-php.net/advisory_082006.132.html</url>
|
|
<url>http://secunia.com/advisories/22235/</url>
|
|
</references>
|
|
<dates>
|
|
<discovery>2006-10-02</discovery>
|
|
<entry>2006-10-05</entry>
|
|
<modified>2013-04-01</modified>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="86526ba4-53c8-11db-8f1a-000a48049292">
|
|
<topic>phpbb -- NULL byte injection vulnerability</topic>
|
|
<affects>
|
|
<package>
|
|
<name>phpbb</name>
|
|
<name>zh-phpbb-tw</name>
|
|
<range><lt>2.0.22</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>Secunia reports:</p>
|
|
<blockquote cite="http://secunia.com/advisories/22188/">
|
|
<p>ShAnKaR has discovered a vulnerability in phpBB, which can
|
|
be exploited by malicious users to compromise a vulnerable
|
|
system.</p>
|
|
<p>Input passed to the "avatar_path" parameter in
|
|
admin/admin_board.php is not properly sanitised before
|
|
being used as a configuration variable to store avatar
|
|
images. This can be exploited to upload and execute
|
|
arbitrary PHP code by changing "avatar_path" to a file with
|
|
a trailing NULL byte.</p>
|
|
<p>Successful exploitation requires privileges to the
|
|
administration section.</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<bid>20347</bid>
|
|
<cvename>CVE-2006-4758</cvename>
|
|
<url>http://secunia.com/advisories/22188/</url>
|
|
<url>http://xforce.iss.net/xforce/xfdb/28884</url>
|
|
<url>http://www.security.nnov.ru/Odocument221.html</url>
|
|
</references>
|
|
<dates>
|
|
<discovery>2006-09-12</discovery>
|
|
<entry>2006-10-04</entry>
|
|
<modified>2006-12-24</modified>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="35f2679f-52d7-11db-8f1a-000a48049292">
|
|
<topic>postnuke -- admin section SQL injection</topic>
|
|
<affects>
|
|
<package>
|
|
<name>postnuke</name>
|
|
<range><lt>0.763</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>ISS X-Force reports:</p>
|
|
<blockquote cite="http://xforce.iss.net/xforce/xfdb/29271">
|
|
<p>PostNuke is vulnerable to SQL injection. A remote attacker
|
|
could send specially-crafted SQL statements to the admin
|
|
section using the hits parameter, which could allow the
|
|
attacker to view, add, modify or delete information in the
|
|
back-end database.</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<bid>20317</bid>
|
|
<cvename>CVE-2006-5121</cvename>
|
|
<url>http://xforce.iss.net/xforce/xfdb/29271</url>
|
|
<url>http://www.securityfocus.com/archive/1/archive/1/447361/100/0/threaded</url>
|
|
<url>http://secunia.com/advisories/22197/</url>
|
|
</references>
|
|
<dates>
|
|
<discovery>2006-09-29</discovery>
|
|
<entry>2006-10-03</entry>
|
|
<modified>2007-11-17</modified>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="b975763f-5210-11db-8f1a-000a48049292">
|
|
<topic>freetype -- LWFN Files Buffer Overflow Vulnerability</topic>
|
|
<affects>
|
|
<package>
|
|
<name>freetype2</name>
|
|
<range><lt>2.1.10_5</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>SecurityTracker reports:</p>
|
|
<blockquote cite="http://securitytracker.com/alerts/2006/Jul/1016522.html">
|
|
<p>A vulnerability was reported in FreeType. A remote user
|
|
can cause arbitrary code to be executed on the target
|
|
user's system.</p>
|
|
<p>A remote user can create a specially crafted font file
|
|
that, when loaded by the target user's system, will trigger
|
|
an integer underflow or integer overflow and crash the
|
|
application or execute arbitrary code on the target system.</p>
|
|
<p>Chris Evans reported these vulnerabilities.</p>
|
|
<p>Impact: A remote user can create a file that, when loaded
|
|
by the target user, will execute arbitrary code on the
|
|
target user's system.</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<bid>18034</bid>
|
|
<cvename>CVE-2006-0747</cvename>
|
|
<cvename>CVE-2006-1861</cvename>
|
|
<cvename>CVE-2006-3467</cvename>
|
|
<url>http://securitytracker.com/alerts/2006/Jul/1016522.html</url>
|
|
</references>
|
|
<dates>
|
|
<discovery>2006-07-10</discovery>
|
|
<entry>2006-10-02</entry>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="74ff10f6-520f-11db-8f1a-000a48049292">
|
|
<topic>cscope -- Buffer Overflow Vulnerabilities</topic>
|
|
<affects>
|
|
<package>
|
|
<name>cscope</name>
|
|
<range><lt>15.6</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>Secunia reports:</p>
|
|
<blockquote cite="http://secunia.com/advisories/21601">
|
|
<p>Will Drewry has reported some vulnerabilities in Cscope,
|
|
which potentially can be exploited by malicious people to
|
|
compromise a vulnerable system.</p>
|
|
<p>Various boundary errors within the parsing of file lists
|
|
or the expansion of environment variables can be exploited
|
|
to cause stack-based buffer overflows when parsing
|
|
specially crafted "cscope.lists" files or directories.</p>
|
|
<p>A boundary error within the parsing of command line
|
|
arguments can be exploited to cause a stack-based buffer
|
|
overflow when supplying an overly long "reffile" argument.</p>
|
|
<p>Successful exploitation may allow execution of arbitrary
|
|
code.</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<bid>19686</bid>
|
|
<bid>19687</bid>
|
|
<cvename>CVE-2006-4262</cvename>
|
|
<url>http://secunia.com/advisories/21601</url>
|
|
<url>http://sourceforge.net/mailarchive/forum.php?thread_id=30266760&forum_id=33500</url>
|
|
<url>http://sourceforge.net/mailarchive/forum.php?thread_id=30266761&forum_id=33500</url>
|
|
</references>
|
|
<dates>
|
|
<discovery>2006-08-20</discovery>
|
|
<entry>2006-10-02</entry>
|
|
<modified>2006-10-11</modified>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="64bf6234-520d-11db-8f1a-000a48049292">
|
|
<topic>gnutls -- RSA Signature Forgery Vulnerability</topic>
|
|
<affects>
|
|
<package>
|
|
<name>gnutls</name>
|
|
<name>gnutls-devel</name>
|
|
<range><lt>1.4.4</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>Secunia reports:</p>
|
|
<blockquote cite="http://secunia.com/advisories/21937">
|
|
<p>A vulnerability has been reported in GnuTLS, which can be
|
|
exploited by malicious people to bypass certain security
|
|
restrictions.</p>
|
|
<p>The vulnerability is caused due to an error in the
|
|
verification of certain signatures. If a RSA key with
|
|
exponent 3 is used, it may be possible to forge PKCS #1
|
|
v1.5 signatures signed with that key.</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<bid>20027</bid>
|
|
<cvename>CVE-2006-4790</cvename>
|
|
<url>http://secunia.com/advisories/21937</url>
|
|
<url>http://lists.gnupg.org/pipermail/gnutls-dev/2006-September/001205.html</url>
|
|
</references>
|
|
<dates>
|
|
<discovery>2006-09-08</discovery>
|
|
<entry>2006-10-02</entry>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="350a5bd9-520b-11db-8f1a-000a48049292">
|
|
<topic>MT -- Search Unspecified XSS</topic>
|
|
<affects>
|
|
<package>
|
|
<name>MT</name>
|
|
<range><ge>3.3</ge><lt>3.33</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>Secunia reports:</p>
|
|
<blockquote cite="http://secunia.com/advisories/22109">
|
|
<p>Arai has reported a vulnerability in Movable Type and
|
|
Movable Type Enterprise, which can be exploited by
|
|
malicious people to conduct cross-site scripting attacks.</p>
|
|
<p>Some unspecified input passed via the search functionality
|
|
isn't properly sanitised before being returned to the user.
|
|
This can be exploited to execute arbitrary HTML and script
|
|
code in a user's browser session in context of an affected
|
|
site.</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<bid>20228</bid>
|
|
<cvename>CVE-2006-5080</cvename>
|
|
<url>http://secunia.com/advisories/22109</url>
|
|
<url>http://www.sixapart.com/movabletype/news/2006/09/mt_333-mte_103_updates.html</url>
|
|
</references>
|
|
<dates>
|
|
<discovery>2006-09-26</discovery>
|
|
<entry>2006-10-02</entry>
|
|
<modified>2006-10-15</modified>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="19b17ab4-51e0-11db-a5ae-00508d6a62df">
|
|
<topic>phpmyadmin -- XSRF vulnerabilities</topic>
|
|
<affects>
|
|
<package>
|
|
<name>phpMyAdmin</name>
|
|
<range><lt>2.9.0.1</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>phpMyAdmin team reports:</p>
|
|
<blockquote cite="http://www.phpmyadmin.net/home_page/security.php?issue=PMASA-2006-5">
|
|
<p>We received a security advisory from Stefan Esser
|
|
(sesser@hardened-php.net) and we wish to thank him for his
|
|
work.</p>
|
|
<p>It was possible to inject arbitrary SQL commands by
|
|
forcing an authenticated user to follow a crafted link.</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<cvename>CVE-2006-5116</cvename>
|
|
<cvename>CVE-2006-5117</cvename>
|
|
<url>http://www.phpmyadmin.net/home_page/security.php?issue=PMASA-2006-5</url>
|
|
<url>http://secunia.com/advisories/22126/</url>
|
|
<bid>20253</bid>
|
|
</references>
|
|
<dates>
|
|
<discovery>2006-09-28</discovery>
|
|
<entry>2006-10-02</entry>
|
|
<modified>2006-10-03</modified>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="32db37a5-50c3-11db-acf3-000c6ec775d9">
|
|
<topic>openssh -- multiple vulnerabilities</topic>
|
|
<affects>
|
|
<package>
|
|
<name>FreeBSD</name>
|
|
<range><ge>6.1</ge><lt>6.1_10</lt></range>
|
|
<range><ge>6.0</ge><lt>6.0_15</lt></range>
|
|
<range><ge>5.5</ge><lt>5.5_8</lt></range>
|
|
<range><ge>5.4</ge><lt>5.4_22</lt></range>
|
|
<range><ge>5.0</ge><lt>5.3_37</lt></range>
|
|
<range><lt>4.11_25</lt></range>
|
|
</package>
|
|
<package>
|
|
<name>openssh</name>
|
|
<range><lt>4.4,1</lt></range>
|
|
</package>
|
|
<package>
|
|
<name>openssh-portable</name>
|
|
<range><lt>4.4.p1,1</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<h1>Problem Description</h1>
|
|
<p>The CRC compensation attack detector in the sshd(8) daemon,
|
|
upon receipt of duplicate blocks, uses CPU time cubic in the
|
|
number of duplicate blocks received. [CVE-2006-4924]</p>
|
|
<p>A race condition exists in a signal handler used by the
|
|
sshd(8) daemon to handle the LoginGraceTime option, which
|
|
can potentially cause some cleanup routines to be executed
|
|
multiple times. [CVE-2006-5051]</p>
|
|
<h1>Impact</h1>
|
|
<p>An attacker sending specially crafted packets to sshd(8)
|
|
can cause a Denial of Service by using 100% of CPU time
|
|
until a connection timeout occurs. Since this attack can be
|
|
performed over multiple connections simultaneously, it is
|
|
possible to cause up to MaxStartups (10 by default) sshd
|
|
processes to use all the CPU time they can obtain.
|
|
[CVE-2006-4924]</p>
|
|
<p>The OpenSSH project believe that the race condition can
|
|
lead to a Denial of Service or potentially remote code
|
|
execution, but the FreeBSD Security Team has been unable to
|
|
verify the exact impact. [CVE-2006-5051]</p>
|
|
<h1>Workaround</h1>
|
|
<p>The attack against the CRC compensation attack detector can
|
|
be avoided by disabling SSH Protocol version 1 support in
|
|
sshd_config(5).</p>
|
|
<p>There is no workaround for the second issue.</p>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<bid>20216</bid>
|
|
<cvename>CVE-2006-4924</cvename>
|
|
<cvename>CVE-2006-5051</cvename>
|
|
<freebsdsa>SA-06:22.openssh</freebsdsa>
|
|
<url>http://www.openssh.com/txt/release-4.4</url>
|
|
</references>
|
|
<dates>
|
|
<discovery>2006-09-25</discovery>
|
|
<entry>2006-09-30</entry>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="fcba5764-506a-11db-a5ae-00508d6a62df">
|
|
<topic>dokuwiki -- multiple vulnerabilities</topic>
|
|
<affects>
|
|
<package>
|
|
<name>dokuwiki</name>
|
|
<range><lt>20060309c</lt></range>
|
|
</package>
|
|
<package>
|
|
<name>dokuwiki-devel</name>
|
|
<range><lt>20060909</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>Secunia reports:</p>
|
|
<blockquote cite="http://secunia.com/advisories/21819/">
|
|
<p>rgod has discovered a vulnerability in DokuWiki, which can
|
|
be exploited by malicious people to compromise a vulnerable
|
|
system.</p>
|
|
<p>Input passed to the "TARGET_FN" parameter in
|
|
bin/dwpage.php is not properly sanitised before being used
|
|
to copy files. This can be exploited via directory
|
|
traversal attacks in combination with DokuWiki's file
|
|
upload feature to execute arbitrary PHP code.</p>
|
|
</blockquote>
|
|
<p>CVE Mitre reports:</p>
|
|
<blockquote cite="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4674">
|
|
<p>Direct static code injection vulnerability in doku.php in
|
|
DokuWiki before 2006-03-09c allows remote attackers to
|
|
execute arbitrary PHP code via the X-FORWARDED-FOR HTTP
|
|
header, which is stored in config.php.</p>
|
|
</blockquote>
|
|
<blockquote cite="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4675">
|
|
<p>Unrestricted file upload vulnerability in
|
|
lib/exe/media.php in DokuWiki before 2006-03-09c allows
|
|
remote attackers to upload executable files into the
|
|
data/media folder via unspecified vectors.</p>
|
|
</blockquote>
|
|
<blockquote cite="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4679">
|
|
<p>DokuWiki before 2006-03-09c enables the debug feature by
|
|
default, which allows remote attackers to obtain sensitive
|
|
information by calling doku.php with the X-DOKUWIKI-DO HTTP
|
|
header set to "debug".</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<bid>19911</bid>
|
|
<cvename>CVE-2006-4674</cvename>
|
|
<cvename>CVE-2006-4675</cvename>
|
|
<cvename>CVE-2006-4679</cvename>
|
|
<url>http://secunia.com/advisories/21819/</url>
|
|
<url>http://bugs.splitbrain.org/index.php?do=details&id=906</url>
|
|
</references>
|
|
<dates>
|
|
<discovery>2006-09-08</discovery>
|
|
<entry>2006-09-30</entry>
|
|
<modified>2006-10-02</modified>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="450b76ee-5068-11db-a5ae-00508d6a62df">
|
|
<topic>dokuwiki -- multiple vulnerabilities</topic>
|
|
<affects>
|
|
<package>
|
|
<name>dokuwiki</name>
|
|
<range><lt>20060309_5</lt></range>
|
|
</package>
|
|
<package>
|
|
<name>dokuwiki-devel</name>
|
|
<range><lt>20060609_2</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>Secunia reports:</p>
|
|
<blockquote cite="http://secunia.com/advisories/22192/">
|
|
<p>Some vulnerabilities have been reported in DokuWiki, which
|
|
can be exploited by malicious people to cause a DoS (Denial
|
|
of Service) or potentially compromise a vulnerable system.</p>
|
|
<p>Input passed to the "w" and "h" parameters in
|
|
lib/exec/fetch.php is not properly sanitised before being
|
|
passed as resize parameters to the "convert" application.
|
|
This can be exploited to cause a DoS due to excessive CPU
|
|
and memory consumption by passing very large numbers, or to
|
|
inject arbitrary shell commands by passing specially
|
|
crafted strings to the "w" and "h" parameter.</p>
|
|
<p>Successful exploitation requires that the
|
|
"$conf[imconvert]" option is set.</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<cvename>CVE-2006-5098</cvename>
|
|
<cvename>CVE-2006-5099</cvename>
|
|
<url>http://secunia.com/advisories/22192/</url>
|
|
<url>http://secunia.com/advisories/22199/</url>
|
|
<url>http://bugs.splitbrain.org/?do=details&id=924</url>
|
|
<url>http://bugs.splitbrain.org/?do=details&id=926</url>
|
|
</references>
|
|
<dates>
|
|
<discovery>2006-09-26</discovery>
|
|
<entry>2006-09-30</entry>
|
|
<modified>2006-10-02</modified>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="e4c62abd-5065-11db-a5ae-00508d6a62df">
|
|
<topic>tikiwiki -- multiple vulnerabilities</topic>
|
|
<affects>
|
|
<package>
|
|
<name>tikiwiki</name>
|
|
<range><lt>1.9.5</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>Secunia reports:</p>
|
|
<blockquote cite="http://secunia.com/advisories/21536/">
|
|
<p>Thomas Pollet has discovered a vulnerability in TikiWiki,
|
|
which can be exploited by malicious people to conduct
|
|
cross-site scripting attacks.</p>
|
|
<p>Input passed to the "highlight" parameter in
|
|
tiki-searchindex.php is not properly sanitised before being
|
|
returned to the user. This can be exploited to execute
|
|
arbitrary HTML and script code in a user's browser session
|
|
in context of an affected site.</p>
|
|
</blockquote>
|
|
<blockquote cite="http://secunia.com/advisories/21733/">
|
|
<p>rgod has discovered a vulnerability in TikiWiki, which can
|
|
be exploited by malicious people to compromise a vulnerable
|
|
system.</p>
|
|
<p>The vulnerability is caused due to the "jhot.php" script
|
|
not correctly verifying uploaded files. This can e.g. be
|
|
exploited to execute arbitrary PHP code by uploading a
|
|
malicious PHP script to the "img/wiki" directory.</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<bid>19654</bid>
|
|
<bid>19819</bid>
|
|
<cvename>CVE-2006-4299</cvename>
|
|
<cvename>CVE-2006-4602</cvename>
|
|
<url>http://secunia.com/advisories/21536/</url>
|
|
<url>http://secunia.com/advisories/21733/</url>
|
|
</references>
|
|
<dates>
|
|
<discovery>2006-08-21</discovery>
|
|
<entry>2006-09-30</entry>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="e79876e4-5061-11db-a5ae-00508d6a62df">
|
|
<topic>punbb -- NULL byte injection vulnerability</topic>
|
|
<affects>
|
|
<package>
|
|
<name>punbb</name>
|
|
<range><lt>1.2.13</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>CVE Mitre reports:</p>
|
|
<blockquote cite="http://cve.mitre.org/cgi-bin/cvename.cgi?name=2006-4759">
|
|
<p>PunBB 1.2.12 does not properly handle an avatar directory
|
|
pathname ending in %00, which allows remote authenticated
|
|
administrative users to upload arbitrary files and execute
|
|
code, as demonstrated by a query to admin_options.php with
|
|
an avatars_dir parameter ending in %00. NOTE: this issue
|
|
was originally disputed by the vendor, but the dispute was
|
|
withdrawn on 20060926.</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<cvename>CVE-2006-4759</cvename>
|
|
<url>http://forums.punbb.org/viewtopic.php?id=13255</url>
|
|
</references>
|
|
<dates>
|
|
<discovery>2006-09-13</discovery>
|
|
<entry>2006-09-30</entry>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="2d9ad236-4d26-11db-b48d-00508d6a62df">
|
|
<topic>freeciv -- Denial of Service Vulnerabilities</topic>
|
|
<affects>
|
|
<package>
|
|
<name>freeciv</name>
|
|
<name>freeciv-gtk</name>
|
|
<name>freeciv-gtk2</name>
|
|
<name>freeciv-nox11</name>
|
|
<range><lt>2.0.8_2</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>Secunia reports:</p>
|
|
<blockquote cite="http://secunia.com/advisories/21171/">
|
|
<p>Luigi Auriemma has reported a vulnerability in Freeciv,
|
|
which can be exploited by malicious people to cause a DoS
|
|
(Denial of Service).</p>
|
|
<p>An error in the "generic_handle_player_attribute_chunk()"
|
|
function in common/packets.c can be exploited to crash the
|
|
service via a specially crafted
|
|
PACKET_PLAYER_ATTRIBUTE_CHUNK packet sent to the server.</p>
|
|
<p>An error in the "handle_unit_orders()" function in
|
|
server/unithand.c can be exploited to crash the service
|
|
via a specially crafted packet.</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<cvename>CVE-2006-3913</cvename>
|
|
<bid>19117</bid>
|
|
<url>http://secunia.com/advisories/21171/</url>
|
|
<url>http://aluigi.altervista.org/adv/freecivx-adv.txt</url>
|
|
</references>
|
|
<dates>
|
|
<discovery>2006-07-23</discovery>
|
|
<entry>2006-09-26</entry>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="339fbbc1-4d23-11db-b48d-00508d6a62df">
|
|
<topic>freeciv -- Packet Parsing Denial of Service Vulnerability</topic>
|
|
<affects>
|
|
<package>
|
|
<name>freeciv</name>
|
|
<name>freeciv-gtk</name>
|
|
<name>freeciv-gtk2</name>
|
|
<name>freeciv-nox11</name>
|
|
<range><lt>2.0.8</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>Secunia reports:</p>
|
|
<blockquote cite="http://secunia.com/advisories/19120/">
|
|
<p>Luigi Auriemma has reported a vulnerability in Freeciv, which
|
|
can be exploited by malicious people to cause a DoS (Denial of
|
|
Service).</p>
|
|
<p>The vulnerability is caused due to an error within the
|
|
handling of the packet length in "common/packets.c". This can
|
|
be exploited to crash the Freeciv server via a specially-
|
|
crafted packet with the size set to "0xffff".</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<cvename>CVE-2006-0047</cvename>
|
|
<bid>16975</bid>
|
|
<url>http://secunia.com/advisories/19120/</url>
|
|
<url>http://aluigi.altervista.org/adv/freecivdos-adv.txt</url>
|
|
</references>
|
|
<dates>
|
|
<discovery>2006-03-06</discovery>
|
|
<entry>2006-09-26</entry>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="1709084d-4d21-11db-b48d-00508d6a62df">
|
|
<topic>plans -- multiple vulnerabilities</topic>
|
|
<affects>
|
|
<package>
|
|
<name>plans</name>
|
|
<range><lt>6.7.2</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>Secunia reports:</p>
|
|
<blockquote cite="http://secunia.com/advisories/15854/">
|
|
<p>A vulnerability has been reported in Plans, which can be
|
|
exploited by malicious people to conduct SQL injection
|
|
attacks.</p>
|
|
<p>Input passed to the "evt_id" parameter in "plans.cgi"
|
|
isn't properly sanitised before being used in a SQL query.
|
|
This can be exploited to manipulate SQL queries by
|
|
injecting arbitrary SQL code.</p>
|
|
<p>Successful exploitation requires that SQL database
|
|
support has been enabled in "plans_config.pl" (the default
|
|
setting is flat files).</p>
|
|
</blockquote>
|
|
<blockquote cite="http://secunia.com/advisories/15167/">
|
|
<p>Some vulnerabilities have been reported in Plans, which
|
|
can be exploited by malicious people to conduct cross-site
|
|
scripting attacks or gain knowledge of sensitive
|
|
information.</p>
|
|
<p>Input passed to various unspecified parameters is not
|
|
properly sanitised before being returned to users. This
|
|
can be exploited to execute arbitrary HTML and script code
|
|
in a user's browser session in context of a vulnerable
|
|
site.</p>
|
|
<p>An unspecified error can be exploited to gain knowledge
|
|
of the MySQL password.</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<bid>14069</bid>
|
|
<url>http://secunia.com/advisories/15167/</url>
|
|
<url>http://secunia.com/advisories/15854/</url>
|
|
<url>http://planscalendar.com/forum/viewtopic.php?t=660</url>
|
|
</references>
|
|
<dates>
|
|
<discovery>2005-04-28</discovery>
|
|
<entry>2006-09-26</entry>
|
|
<modified>2006-10-15</modified>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="d3527663-4ccb-11db-b48d-00508d6a62df">
|
|
<topic>eyeOS -- multiple XSS security bugs</topic>
|
|
<affects>
|
|
<package>
|
|
<name>eyeOS</name>
|
|
<range><lt>0.9.1</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>eyeOS team reports:</p>
|
|
<blockquote cite="http://eyeos.blogspot.com/2006/09/eyeos-091-released.html">
|
|
<p>[EyeOS 0.9.1] release fixes two XSS security bugs, so we
|
|
recommend all users to upgrade to this new version in order
|
|
to have the best security. These two bugs were discovered by
|
|
Jose Carlos Norte, who is a new eyeOS developer.</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<bid>20213</bid>
|
|
<cvename>CVE-2006-5071</cvename>
|
|
<url>http://eyeos.blogspot.com/2006/09/eyeos-091-released.html</url>
|
|
</references>
|
|
<dates>
|
|
<discovery>2006-09-25</discovery>
|
|
<entry>2006-09-25</entry>
|
|
<modified>2006-10-15</modified>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="65a8f773-4a37-11db-a4cc-000a48049292">
|
|
<topic>zope -- restructuredText "csv_table" Information Disclosure</topic>
|
|
<affects>
|
|
<package>
|
|
<name>zope</name>
|
|
<range><ge>2.7.0</ge><lt>2.7.9_1</lt></range>
|
|
<range><ge>2.8.0</ge><lt>2.8.8_1</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>Secunia reports:</p>
|
|
<blockquote cite="http://secunia.com/advisories/21947/">
|
|
<p>A vulnerability has been reported in Zope, which can be
|
|
exploited by malicious people to disclose potentially
|
|
sensitive information.</p>
|
|
<p>The vulnerability is caused due to an error in the use of
|
|
the docutils module to parse and render "restructured"
|
|
text. This can be exploited to disclose certain information
|
|
via the "csv_table" reStructuredText directive.</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<bid>20022</bid>
|
|
<cvename>CVE-2006-4684</cvename>
|
|
<url>http://secunia.com/advisories/21947/</url>
|
|
<url>http://www.zope.org/Products/Zope/Hotfix-2006-08-21/Hotfix-20060821/README.txt</url>
|
|
</references>
|
|
<dates>
|
|
<discovery>2006-08-21</discovery>
|
|
<entry>2006-09-22</entry>
|
|
<modified>2006-12-27</modified>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="f6bff909-4a26-11db-a4cc-000a48049292">
|
|
<topic>libmms -- stack-based buffer overflow</topic>
|
|
<affects>
|
|
<package>
|
|
<name>libmms</name>
|
|
<range><lt>0.3</lt></range>
|
|
</package>
|
|
<package>
|
|
<name>libxine</name>
|
|
<range><lt>1.1.1</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>Mitre CVE reports:</p>
|
|
<blockquote cite="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2200">
|
|
<p>Stack-based buffer overflow in libmms, as used by (a)
|
|
MiMMS 0.0.9 and (b) xine-lib 1.1.0 and earlier, allows
|
|
remote attackers to cause a denial of service (application
|
|
crash) and possibly execute arbitrary code via the (1)
|
|
send_command, (2) string_utf16, (3) get_data, and (4)
|
|
get_media_packet functions, and possibly other functions.</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<cvename>CVE-2006-2200</cvename>
|
|
<bid>18608</bid>
|
|
<url>http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=374577</url>
|
|
</references>
|
|
<dates>
|
|
<discovery>2006-05-04</discovery>
|
|
<entry>2006-09-22</entry>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="1fe734bf-4a06-11db-b48d-00508d6a62df">
|
|
<topic>opera -- RSA Signature Forgery</topic>
|
|
<affects>
|
|
<package>
|
|
<name>opera</name>
|
|
<name>opera-devel</name>
|
|
<name>linux-opera</name>
|
|
<range><lt>9.02</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>Opera reports:</p>
|
|
<blockquote cite="http://www.opera.com/support/search/supsearch.dml?index=845">
|
|
<p>A specially crafted digital certificate can bypass Opera's
|
|
certificate signature verification. Forged certificates can
|
|
contain any false information the forger chooses, and Opera
|
|
will still present it as valid. Opera will not present any
|
|
warning dialogs in this case, and the security status will
|
|
be the highest possible (3). This defeats the protection
|
|
against "man in the middle", the attacks that SSL was
|
|
designed to prevent.</p>
|
|
<p>There is a flaw in OpenSSL's RSA signature verification
|
|
that affects digital certificates using 3 as the public
|
|
exponent. Some of the certificate issuers that are on
|
|
Opera's list of trusted signers have root certificates with
|
|
3 as the public exponent. The forged certificate can appear
|
|
to be signed by one of these.</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<cvename>CVE-2006-4339</cvename>
|
|
<url>http://secunia.com/advisories/21982/</url>
|
|
<url>http://secunia.com/advisories/21709/</url>
|
|
<url>http://www.cdc.informatik.tu-darmstadt.de/securebrowser/</url>
|
|
<url>http://www.openssl.org/news/secadv_20060905.txt</url>
|
|
<url>http://www.mozilla.org/security/announce/2006/mfsa2006-60.html</url>
|
|
</references>
|
|
<dates>
|
|
<discovery>2006-09-18</discovery>
|
|
<entry>2006-09-22</entry>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="e6296105-449b-11db-ba89-000c6ec775d9">
|
|
<topic>mozilla -- multiple vulnerabilities</topic>
|
|
<affects>
|
|
<package>
|
|
<name>firefox</name>
|
|
<range><lt>1.5.0.7,1</lt></range>
|
|
<range><gt>2.*,1</gt><lt>2.0_1,1</lt></range>
|
|
</package>
|
|
<package>
|
|
<name>linux-firefox</name>
|
|
<range><lt>1.5.0.7</lt></range>
|
|
</package>
|
|
<package>
|
|
<name>seamonkey</name>
|
|
<name>linux-seamonkey</name>
|
|
<range><lt>1.0.5</lt></range>
|
|
</package>
|
|
<package>
|
|
<name>thunderbird</name>
|
|
<name>linux-thunderbird</name>
|
|
<name>mozilla-thunderbird</name>
|
|
<range><lt>1.5.0.7</lt></range>
|
|
</package>
|
|
<package>
|
|
<name>linux-firefox-devel</name>
|
|
<range><lt>3.0.a2006.09.21</lt></range>
|
|
</package>
|
|
<package>
|
|
<name>linux-seamonkey-devel</name>
|
|
<range><lt>1.5.a2006.09.21</lt></range>
|
|
</package>
|
|
<package>
|
|
<name>linux-mozilla-devel</name>
|
|
<name>linux-mozilla</name>
|
|
<name>mozilla</name>
|
|
<range><gt>0</gt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>The Mozilla Foundation reports of multiple security issues
|
|
in Firefox, Seamonkey, and Thunderbird. Several of these
|
|
issues can probably be used to run arbitrary code with the
|
|
privilege of the user running the program.</p>
|
|
<blockquote cite="http://www.mozilla.org/security/announce/">
|
|
<ul>
|
|
<li>MFSA 2006-64 Crashes with evidence of memory
|
|
corruption (rv:1.8.0.7)</li>
|
|
<li>MFSA 2006-63 JavaScript execution in mail via XBL</li>
|
|
<li>MFSA 2006-62 Popup-blocker cross-site scripting (XSS)</li>
|
|
<li>MFSA 2006-61 Frame spoofing using document.open()</li>
|
|
<li>MFSA 2006-60 RSA Signature Forgery</li>
|
|
<li>MFSA 2006-59 Concurrency-related vulnerability</li>
|
|
<li>MFSA 2006-58 Auto-Update compromise through DNS and
|
|
SSL spoofing</li>
|
|
<li>MFSA 2006-57 JavaScript Regular Expression Heap
|
|
Corruption</li>
|
|
</ul>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<bid>20042</bid>
|
|
<cvename>CVE-2006-4253</cvename>
|
|
<cvename>CVE-2006-4340</cvename>
|
|
<cvename>CVE-2006-4565</cvename>
|
|
<cvename>CVE-2006-4566</cvename>
|
|
<cvename>CVE-2006-4567</cvename>
|
|
<cvename>CVE-2006-4568</cvename>
|
|
<cvename>CVE-2006-4569</cvename>
|
|
<cvename>CVE-2006-4570</cvename>
|
|
<cvename>CVE-2006-4571</cvename>
|
|
<url>http://www.mozilla.org/security/announce/2006/mfsa2006-57.html</url>
|
|
<url>http://www.mozilla.org/security/announce/2006/mfsa2006-58.html</url>
|
|
<url>http://www.mozilla.org/security/announce/2006/mfsa2006-59.html</url>
|
|
<url>http://www.mozilla.org/security/announce/2006/mfsa2006-60.html</url>
|
|
<url>http://www.mozilla.org/security/announce/2006/mfsa2006-61.html</url>
|
|
<url>http://www.mozilla.org/security/announce/2006/mfsa2006-62.html</url>
|
|
<url>http://www.mozilla.org/security/announce/2006/mfsa2006-63.html</url>
|
|
<url>http://www.mozilla.org/security/announce/2006/mfsa2006-64.html</url>
|
|
</references>
|
|
<dates>
|
|
<discovery>2006-09-14</discovery>
|
|
<entry>2006-09-15</entry>
|
|
<modified>2006-11-02</modified>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="24f6b1eb-43d5-11db-81e1-000e0c2e438a">
|
|
<topic>win32-codecs -- multiple vulnerabilities</topic>
|
|
<affects>
|
|
<package>
|
|
<name>win32-codecs</name>
|
|
<range><lt>3.1.0.p8_1,1</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>The Apple Security Team reports that there are multiple
|
|
vulnerabilities within QuickTime (one of the plugins for
|
|
win32-codecs). A remote attacker capable of creating a
|
|
malicious SGI image, FlashPix, FLC movie, or a QuickTime
|
|
movie can possibly lead to execution of arbitrary code or
|
|
cause a Denial of Service (application crash).</p>
|
|
<p>Users who have QuickTime (/win32-codecs) as a browser plugin
|
|
may be vulnerable to remote code execution by visiting a
|
|
website containing a malicious SGI image, FlashPix, FLC movie
|
|
or a QuickTime movie.</p>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<bid>20138</bid>
|
|
<cvename>CVE-2006-4381</cvename>
|
|
<cvename>CVE-2006-4382</cvename>
|
|
<cvename>CVE-2006-4384</cvename>
|
|
<cvename>CVE-2006-4385</cvename>
|
|
<cvename>CVE-2006-4386</cvename>
|
|
<cvename>CVE-2006-4388</cvename>
|
|
<cvename>CVE-2006-4389</cvename>
|
|
<url>http://docs.info.apple.com/article.html?artnum=304357</url>
|
|
</references>
|
|
<dates>
|
|
<discovery>2006-09-08</discovery>
|
|
<entry>2006-09-14</entry>
|
|
<modified>2006-10-17</modified>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="ea09c5df-4362-11db-81e1-000e0c2e438a">
|
|
<topic>php -- multiple vulnerabilities</topic>
|
|
<affects>
|
|
<package>
|
|
<name>php4</name>
|
|
<name>php5</name>
|
|
<range><lt>4.4.4</lt></range>
|
|
<range><ge>5</ge><lt>5.1.5</lt></range>
|
|
</package>
|
|
<package>
|
|
<name>php4-cli</name>
|
|
<name>php5-cli</name>
|
|
<name>php4-cgi</name>
|
|
<name>php5-cgi</name>
|
|
<name>php4-dtc</name>
|
|
<name>php5-dtc</name>
|
|
<name>php4-horde</name>
|
|
<name>php5-horde</name>
|
|
<name>php4-nms</name>
|
|
<name>php5-nms</name>
|
|
<name>mod_php4</name>
|
|
<name>mod_php5</name>
|
|
<range><lt>4.4.4</lt></range>
|
|
<range><ge>5</ge><lt>5.1.5</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>The PHP development team reports:</p>
|
|
<blockquote cite="http://www.php.net/release_5_1_5.php">
|
|
<ul>
|
|
<li>Added missing safe_mode/open_basedir checks inside the
|
|
error_log(), file_exists(), imap_open() and imap_reopen()
|
|
functions.</li>
|
|
<li>Fixed overflows inside str_repeat() and wordwrap()
|
|
functions on 64bit systems.</li>
|
|
<li>Fixed possible open_basedir/safe_mode bypass in cURL
|
|
extension and with realpath cache.</li>
|
|
<li>Fixed overflow in GD extension on invalid GIF
|
|
images.</li>
|
|
<li>Fixed a buffer overflow inside sscanf() function.</li>
|
|
<li>Fixed an out of bounds read inside stripos()
|
|
function.</li>
|
|
<li>Fixed memory_limit restriction on 64 bit system.</li>
|
|
</ul>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<cvename>CVE-2006-4481</cvename>
|
|
<cvename>CVE-2006-4482</cvename>
|
|
<cvename>CVE-2006-4483</cvename>
|
|
<cvename>CVE-2006-4484</cvename>
|
|
<cvename>CVE-2006-4485</cvename>
|
|
<cvename>CVE-2006-4486</cvename>
|
|
<url>http://www.php.net/release_4_4_4.php</url>
|
|
<url>http://www.php.net/release_5_1_5.php</url>
|
|
</references>
|
|
<dates>
|
|
<discovery>2006-08-18</discovery>
|
|
<entry>2006-09-13</entry>
|
|
<modified>2014-03-28</modified>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="c0fd7890-4346-11db-89cc-000ae42e9b93">
|
|
<topic>drupal-pubcookie -- authentication may be bypassed</topic>
|
|
<affects>
|
|
<package>
|
|
<name>drupal-pubcookie</name>
|
|
<range><le>4.6.0_20060210</le></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>The Drupal Project reports:</p>
|
|
<blockquote cite="http://drupal.org/node/83064">
|
|
<p>It is possible for a malicious user to spoof a user's
|
|
identity by bypassing the login redirection mechanism in the
|
|
pubcookie module. The malicious user may gain the privileges
|
|
of the user they are spoofing, including the administrative
|
|
user.</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<cvename>CVE-2006-4717</cvename>
|
|
<url>http://drupal.org/node/83064</url>
|
|
</references>
|
|
<dates>
|
|
<discovery>2006-09-08</discovery>
|
|
<entry>2006-09-13</entry>
|
|
<modified>2010-05-12</modified>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="7c75d48c-429b-11db-afae-000c6ec775d9">
|
|
<topic>linux-flashplugin7 -- arbitrary code execution vulnerabilities</topic>
|
|
<affects>
|
|
<package>
|
|
<name>linux-flashplugin</name>
|
|
<range><lt>7.0r68</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>Adobe reports:</p>
|
|
<blockquote cite="http://www.adobe.com/support/security/bulletins/apsb06-11.html">
|
|
<p>Multiple input validation errors have been identified in
|
|
Flash Player 8.0.24.0 and earlier versions that could lead
|
|
to the potential execution of arbitrary code. These
|
|
vulnerabilities could be accessed through content
|
|
delivered from a remote location via the user?s web
|
|
browser, email client, or other applications that include
|
|
or reference the Flash Player. (CVE-2006-3311,
|
|
CVE-2006-3587, CVE-2006-3588)</p>
|
|
<p>These updates include changes to prevent circumvention of
|
|
the "allowScriptAccess" option. (CVE-2006-4640)</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<cvename>CVE-2006-3311</cvename>
|
|
<cvename>CVE-2006-3587</cvename>
|
|
<cvename>CVE-2006-3588</cvename>
|
|
<cvename>CVE-2006-4640</cvename>
|
|
<url>http://www.adobe.com/support/security/bulletins/apsb06-11.html</url>
|
|
</references>
|
|
<dates>
|
|
<discovery>2006-09-12</discovery>
|
|
<entry>2006-09-12</entry>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="28ce7102-4039-11db-a838-00148584c7dd">
|
|
<cancelled/>
|
|
</vuln>
|
|
|
|
<vuln vid="fffa9257-3c17-11db-86ab-00123ffe8333">
|
|
<topic>mailman -- Multiple Vulnerabilities</topic>
|
|
<affects>
|
|
<package>
|
|
<name>mailman</name>
|
|
<name>ja-mailman</name>
|
|
<name>mailman-with-htdig</name>
|
|
<range><lt>2.1.9.r1</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>Secunia reports:</p>
|
|
<blockquote cite="http://secunia.com/advisories/21732/">
|
|
<p>Mailman can be exploited by malicious people to conduct cross-site
|
|
scripting and phishing attacks, and cause a DoS (Denial of
|
|
Service).</p>
|
|
<p>1) An error in the logging functionality can be exploited to
|
|
inject a spoofed log message into the error log via a specially
|
|
crafted URL.</p>
|
|
<p>Successful exploitation may trick an administrator into visiting
|
|
a malicious web site.</p>
|
|
<p>2) An error in the processing of malformed headers which does not
|
|
follow the RFC 2231 standard can be exploited to cause a DoS
|
|
(Denial of Service).</p>
|
|
<p>3) Some unspecified input isn't properly sanitised before being
|
|
returned to the user. This can be exploited to execute arbitrary
|
|
HTML and script code in a user's browser session in context of an
|
|
affected site.</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<bid>19831</bid>
|
|
<cvename>CVE-2006-2191</cvename>
|
|
<cvename>CVE-2006-2941</cvename>
|
|
<cvename>CVE-2006-3636</cvename>
|
|
<cvename>CVE-2006-4624</cvename>
|
|
<url>http://secunia.com/advisories/21732/</url>
|
|
<url>http://sourceforge.net/project/shownotes.php?group_id=103&release_id=444295</url>
|
|
</references>
|
|
<dates>
|
|
<discovery>2006-06-09</discovery>
|
|
<entry>2006-09-04</entry>
|
|
<modified>2006-10-04</modified>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="09639ccc-3abb-11db-81e1-000e0c2e438a">
|
|
<topic>hlstats -- multiple cross site scripting vulnerabilities</topic>
|
|
<affects>
|
|
<package>
|
|
<name>hlstats</name>
|
|
<range><le>1.35</le></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>Kefka reports multiple cross site scripting vulnerabilities
|
|
within hlstats. The vulnerabilities are caused due to
|
|
improper checking of variables, allowing an attacker to
|
|
perform cross site scripting.</p>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<bid>19745</bid>
|
|
<cvename>CVE-2006-4454</cvename>
|
|
<cvename>CVE-2006-6780</cvename>
|
|
<cvename>CVE-2006-6781</cvename>
|
|
<cvename>CVE-2007-2812</cvename>
|
|
</references>
|
|
<dates>
|
|
<discovery>2006-08-29</discovery>
|
|
<entry>2006-09-02</entry>
|
|
<modified>2011-09-03</modified>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="0b79743b-3ab7-11db-81e1-000e0c2e438a">
|
|
<topic>gtetrinet -- remote code execution</topic>
|
|
<affects>
|
|
<package>
|
|
<name>gtetrinet</name>
|
|
<range><lt>0.7.10</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>The Debian Security Team reports:</p>
|
|
<blockquote cite="http://www.debian.org/security/2006/dsa-1163">
|
|
<p>Michael Gehring discovered several potential out-of-bounds
|
|
index accesses in gtetrinet, a multiplayer Tetris-like game,
|
|
which may allow a remote server to execute arbitrary
|
|
code</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<bid>19766</bid>
|
|
<cvename>CVE-2006-3125</cvename>
|
|
<url>http://www.debian.org/security/2006/dsa-1163</url>
|
|
</references>
|
|
<dates>
|
|
<discovery>2006-08-30</discovery>
|
|
<entry>2006-09-02</entry>
|
|
<modified>2006-10-01</modified>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="0ab423e7-3822-11db-81e1-000e0c2e438a">
|
|
<topic>joomla -- multiple vulnerabilities</topic>
|
|
<affects>
|
|
<package>
|
|
<name>joomla</name>
|
|
<range><lt>1.0.11</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>The Joomla development team reports multiple vulnerabilities
|
|
within the joomla application. Joomla is vulnerable to the
|
|
following vulnerabilities:</p>
|
|
<ul>
|
|
<li>Improper validation of the mosMail function</li>
|
|
<li>Improper validation of the JosIsValidEmail function.</li>
|
|
<li>Remote code execution in PEAR.php</li>
|
|
<li>Zend Hash del key or index vulnerability</li>
|
|
</ul>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<url>http://www.joomla.org/content/view/1841/78/</url>
|
|
</references>
|
|
<dates>
|
|
<discovery>2006-08-28</discovery>
|
|
<entry>2006-08-30</entry>
|
|
<modified>2010-05-12</modified>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="c9d2e361-32fb-11db-a6e2-000e0c2e438a">
|
|
<topic>sppp -- buffer overflow vulnerability</topic>
|
|
<affects>
|
|
<package>
|
|
<name>FreeBSD</name>
|
|
<range><lt>4.11_20</lt></range>
|
|
<range><ge>5.3</ge><lt>5.3_32</lt></range>
|
|
<range><ge>5.4</ge><lt>5.4_17</lt></range>
|
|
<range><ge>5.5</ge><lt>5.5_3</lt></range>
|
|
<range><ge>6.0</ge><lt>6.0_10</lt></range>
|
|
<range><ge>6.1</ge><lt>6.1_4</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<h1>Problem Description</h1>
|
|
<p>While processing Link Control Protocol (LCP) configuration
|
|
options received from the remote host, sppp(4) fails to
|
|
correctly validate option lengths. This may result in data
|
|
being read or written beyond the allocated kernel memory
|
|
buffer.</p>
|
|
<h1>Impact</h1>
|
|
<p>An attacker able to send LCP packets, including the remote
|
|
end of a sppp(4) connection, can cause the FreeBSD kernel to
|
|
panic. Such an attacker may also be able to obtain
|
|
sensitive information or gain elevated privileges.</p>
|
|
<h1>Workaround</h1>
|
|
<p>No workaround is available, but systems which do not use sppp(4) are
|
|
not vulnerable.</p>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<cvename>CVE-2006-4304</cvename>
|
|
<freebsdsa>SA-06:18.ppp</freebsdsa>
|
|
</references>
|
|
<dates>
|
|
<discovery>2006-08-23</discovery>
|
|
<entry>2006-08-23</entry>
|
|
<modified>2006-08-30</modified>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="e2e8d374-2e40-11db-b683-0008743bf21a">
|
|
<topic>horde -- Phishing and Cross-Site Scripting Vulnerabilities</topic>
|
|
<affects>
|
|
<package>
|
|
<name>horde</name>
|
|
<range><le>3.1.2</le></range>
|
|
</package>
|
|
<package>
|
|
<name>imp</name>
|
|
<range><le>4.1.2</le></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>Secunia reports:</p>
|
|
<blockquote cite="http://secunia.com/advisories/21500/">
|
|
<p>Some vulnerabilities have been reported in Horde, which
|
|
can be exploited by malicious people to conduct phishing
|
|
and cross-site scripting attacks.</p>
|
|
<ol>
|
|
<li>Input passed to the "url" parameter in index.php isn't
|
|
properly verified before it is being used to include an
|
|
arbitrary web site in a frameset. This can e.g. be
|
|
exploited to trick a user into believing certain
|
|
malicious content is served from a trusted web site.</li>
|
|
<li>Some unspecified input passed in index.php isn't
|
|
properly sanitised before being returned to the user.
|
|
This can be exploited to execute arbitrary HTML and
|
|
script code in a user's browser session in context of an
|
|
affected site.</li>
|
|
</ol>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<bid>19557</bid>
|
|
<bid>19544</bid>
|
|
<url>http://secunia.com/advisories/21500/</url>
|
|
<url>http://lists.horde.org/archives/announce/2006/000292.html</url>
|
|
</references>
|
|
<dates>
|
|
<discovery>2006-08-17</discovery>
|
|
<entry>2006-08-17</entry>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="5039ae61-2c9f-11db-8401-000ae42e9b93">
|
|
<topic>globus -- Multiple tmpfile races</topic>
|
|
<affects>
|
|
<package>
|
|
<name>globus</name>
|
|
<range><lt>4.0.2_20060706</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>The Globus Alliance reports:</p>
|
|
<blockquote cite="http://www.globus.org/mail_archive/security-announce/2006/08/msg00000.html">
|
|
<p>The proxy generation tool (grid-proxy-init) creates the
|
|
file, secures the file to provide access only to owner and
|
|
writes proxy to the file. A race condition exists between
|
|
the opening of the proxy credentials file, and making sure
|
|
it is safe file to write to. The checks to ensure this
|
|
file is accessible only to the owner take place using the
|
|
filename after the file is opened for writing, but before
|
|
any data is written.</p>
|
|
</blockquote>
|
|
<blockquote cite="http://www.globus.org/mail_archive/security-announce/2006/08/msg00001.html">
|
|
<p>Various components of the toolkit use files in shared
|
|
directories to store information, some being sensitive
|
|
information. For example, the tool to create proxy
|
|
certificates, stores the generated proxy certificate by
|
|
default in /tmp. Specific vulnerabilities in handling such
|
|
files were reported in myproxy-admin-adduser, grid-ca-sign
|
|
and grid-security-config.</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<cvename>CVE-2006-4232</cvename>
|
|
<cvename>CVE-2006-4233</cvename>
|
|
<url>http://www.globus.org/mail_archive/security-announce/2006/08/msg00000.html</url>
|
|
<url>http://www.globus.org/mail_archive/security-announce/2006/08/msg00001.html</url>
|
|
</references>
|
|
<dates>
|
|
<discovery>2006-08-08</discovery>
|
|
<entry>2006-08-15</entry>
|
|
<modified>2010-05-12</modified>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="9dda3ff1-2b02-11db-a6e2-000e0c2e438a">
|
|
<topic>x11vnc -- authentication bypass vulnerability</topic>
|
|
<affects>
|
|
<package>
|
|
<name>x11vnc</name>
|
|
<range><lt>0.8.2</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>Ludwig Nussel reports that x11vnc is vulnerable to an
|
|
authentication bypass vulnerability. The vulnerability is
|
|
caused by an error in auth.c. This could allow a remote
|
|
attacker to gain unauthorized and unauthenticated access
|
|
to the system.</p>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<bid>18977</bid>
|
|
<cvename>CVE-2006-2450</cvename>
|
|
<url>http://bugs.debian.org/376824</url>
|
|
</references>
|
|
<dates>
|
|
<discovery>2006-08-08</discovery>
|
|
<entry>2006-08-13</entry>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="9855ac8e-2aec-11db-a6e2-000e0c2e438a">
|
|
<topic>alsaplayer -- multiple vulnerabilities</topic>
|
|
<affects>
|
|
<package>
|
|
<name>alsaplayer</name>
|
|
<range><gt>0</gt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>Luigi Auriemma reports three vulnerabilities within
|
|
alsaplayer:</p>
|
|
<blockquote cite="http://aluigi.altervista.org/adv/alsapbof-adv.txt">
|
|
<ul>
|
|
<li>The function which handles the HTTP connections is
|
|
vulnerable to a buffer-overflow that happens when it uses
|
|
sscanf for copying the URL in the Location's field
|
|
received from the server into the redirect buffer of only
|
|
1024 bytes declared in http_open.</li>
|
|
<li>A buffer-overflow exists in the functions which add items
|
|
to the playlist when the GTK interface is used (so the other
|
|
interfaces are not affected by this problem): new_list_item
|
|
and CbUpdated in interface/gtk/PlaylistWindow.cpp.</li>
|
|
<li>AlsaPlayer automatically queries the CDDB server
|
|
specified in its configuration (by default
|
|
freedb.freedb.org) when the user choices the CDDA function
|
|
for playing audio CDs. The function which queries the
|
|
server uses a buffer of 20 bytes and one of 9 for storing
|
|
the category and ID strings received from the server while
|
|
the buffer which contains this server's response is 32768
|
|
bytes long. Naturally for exploiting this bug the attacker
|
|
must have control of the freedb server specified in the
|
|
AlsaPlayer's configuration.</li>
|
|
</ul>
|
|
</blockquote>
|
|
<p>These vulnerabilities could allow a remote attacker to
|
|
execute arbitrary code, possibly gaining access to the
|
|
system.</p>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<cvename>CVE-2006-4089</cvename>
|
|
<bid>19450</bid>
|
|
<url>http://aluigi.altervista.org/adv/alsapbof-adv.txt</url>
|
|
</references>
|
|
<dates>
|
|
<discovery>2006-08-09</discovery>
|
|
<entry>2006-08-13</entry>
|
|
<modified>2010-05-12</modified>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="17f53c1d-2ae9-11db-a6e2-000e0c2e438a">
|
|
<topic>postgresql -- encoding based SQL injection</topic>
|
|
<affects>
|
|
<package>
|
|
<name>postgresql</name>
|
|
<name>postgresql-server</name>
|
|
<name>ja-postgresql</name>
|
|
<range><ge>7.3</ge><lt>7.3.15</lt></range>
|
|
<range><ge>7.4</ge><lt>7.4.13</lt></range>
|
|
<range><ge>8.0.0</ge><lt>8.0.8</lt></range>
|
|
<range><ge>8.1.0</ge><lt>8.1.4</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>The PostgreSQL development team reports:</p>
|
|
<blockquote cite="http://www.postgresql.org/docs/techdocs.50">
|
|
<p>An attacker able to submit crafted strings to an
|
|
application that will embed those strings in SQL commands
|
|
can use invalidly-encoded multibyte characters to bypass
|
|
standard string-escaping methods, resulting in possible
|
|
injection of hostile SQL commands into the database. The
|
|
attacks covered here work in any multibyte encoding.</p>
|
|
<p>The widely-used practice of escaping ASCII single quote
|
|
"'" by turning it into "\'" is unsafe when operating in
|
|
multibyte encodings that allow 0x5c (ASCII code for
|
|
backslash) as the trailing byte of a multibyte character;
|
|
this includes at least SJIS, BIG5, GBK, GB18030, and UHC.
|
|
An application that uses this conversion while embedding
|
|
untrusted strings in SQL commands is vulnerable to
|
|
SQL-injection attacks if it communicates with the server in
|
|
one of these encodings. While the standard client libraries
|
|
used with PostgreSQL have escaped "'" in the safe,
|
|
SQL-standard way of "''" for some time, the older practice
|
|
remains common.</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<bid>18092</bid>
|
|
<cvename>CVE-2006-2313</cvename>
|
|
<cvename>CVE-2006-2314</cvename>
|
|
<url>http://www.postgresql.org/docs/techdocs.50</url>
|
|
</references>
|
|
<dates>
|
|
<discovery>2006-05-11</discovery>
|
|
<entry>2006-08-13</entry>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="65c8ecf9-2adb-11db-a6e2-000e0c2e438a">
|
|
<topic>postgresql -- multiple vulnerabilities</topic>
|
|
<affects>
|
|
<package>
|
|
<name>postgresql</name>
|
|
<name>postgresql-server</name>
|
|
<name>ja-postgresql</name>
|
|
<range><ge>7.2</ge><lt>7.2.7</lt></range>
|
|
<range><ge>7.3</ge><lt>7.3.9</lt></range>
|
|
<range><ge>7.4</ge><lt>7.4.7</lt></range>
|
|
<range><ge>8.0.0</ge><lt>8.0.1</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>Multiple vulnerabilities had been reported in various
|
|
versions of PostgreSQL:</p>
|
|
<ul>
|
|
<li>The EXECUTE restrictions can be bypassed by using the
|
|
AGGREGATE function, which is missing a permissions check.</li>
|
|
<li>A buffer overflow exists in gram.y which could allow an
|
|
attacker to execute arbitrary code by sending a large
|
|
number of arguments to a refcursor function, found in
|
|
gram.y</li>
|
|
<li>The intagg contributed module allows an attacker to crash
|
|
the server (Denial of Service) by constructing a malicious
|
|
crafted array.</li>
|
|
</ul>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<cvename>CVE-2005-0244</cvename>
|
|
<cvename>CVE-2005-0245</cvename>
|
|
<cvename>CVE-2005-0246</cvename>
|
|
<url>http://secunia.com/advisories/12948</url>
|
|
</references>
|
|
<dates>
|
|
<discovery>2005-02-01</discovery>
|
|
<entry>2006-08-13</entry>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="fcb90eb0-2ace-11db-a6e2-000e0c2e438a">
|
|
<topic>mysql -- format string vulnerability</topic>
|
|
<affects>
|
|
<package>
|
|
<name>mysql-server</name>
|
|
<range><ge>5.1</ge><lt>5.1.6</lt></range>
|
|
<range><ge>5.0</ge><lt>5.0.19</lt></range>
|
|
<range><ge>4.1</ge><lt>4.1.18</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>Jean-David Maillefer reports a Denial of Service vulnerability
|
|
within MySQL. The vulnerability is caused by improper checking
|
|
of the data_format routine, which cause the MySQL server to
|
|
crash. The crash is triggered by the following code:<br/>
|
|
<code>"SELECT date_format('%d%s', 1);</code></p>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<bid>19032</bid>
|
|
<cvename>CVE-2006-3469</cvename>
|
|
<url>http://bugs.mysql.com/bug.php?id=20729</url>
|
|
</references>
|
|
<dates>
|
|
<discovery>2006-06-27</discovery>
|
|
<entry>2006-08-13</entry>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="21b7c550-2a22-11db-a6e2-000e0c2e438a">
|
|
<topic>squirrelmail -- random variable overwrite vulnerability</topic>
|
|
<affects>
|
|
<package>
|
|
<name>ja-squirrelmail</name>
|
|
<range><ge>1.4.0</ge><lt>1.4.8,2</lt></range>
|
|
</package>
|
|
<package>
|
|
<name>squirrelmail</name>
|
|
<range><ge>1.4.0</ge><lt>1.4.8</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>The SquirrelMail developers report:</p>
|
|
<blockquote cite="http://www.squirrelmail.org/security/issue/2006-08-11">
|
|
<p>A logged in user could overwrite random variables in
|
|
compose.php, which might make it possible to read/write
|
|
other users' preferences or attachments.</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<cvename>CVE-2006-4019</cvename>
|
|
<url>http://www.squirrelmail.org/security/issue/2006-08-11</url>
|
|
</references>
|
|
<dates>
|
|
<discovery>2006-08-11</discovery>
|
|
<entry>2006-08-12</entry>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="90064567-28b1-11db-844d-000c6ec775d9">
|
|
<topic>rubygem-rails -- evaluation of ruby code</topic>
|
|
<affects>
|
|
<package>
|
|
<name>rubygem-rails</name>
|
|
<range><ge>1.1.0</ge><lt>1.1.3</lt></range>
|
|
<range><ge>1.1.4</ge><lt>1.1.6</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>The Ruby on Rails blog reports:</p>
|
|
<blockquote cite="http://weblog.rubyonrails.org/2006/8/10/rails-1-1-6-backports-and-full-disclosure">
|
|
<p>With Rails 1.1.0 through 1.1.5 (minus the short-lived 1.1.3),
|
|
you can trigger the evaluation of Ruby code through the URL
|
|
because of a bug in the routing code of Rails. This means that
|
|
you can essentially take down a Rails process by starting
|
|
something like /script/profiler, as the code will run for a
|
|
long time and that process will be hung while it happens.
|
|
Other URLs can even cause data loss.</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<url>http://weblog.rubyonrails.org/2006/8/10/rails-1-1-6-backports-and-full-disclosure</url>
|
|
</references>
|
|
<dates>
|
|
<discovery>2006-08-09</discovery>
|
|
<entry>2006-08-10</entry>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="342d2e48-26db-11db-9275-000475abc56f">
|
|
<topic>clamav -- heap overflow vulnerability</topic>
|
|
<affects>
|
|
<package>
|
|
<name>clamav</name>
|
|
<range><ge>0.88.1</ge><lt>0.88.4</lt></range>
|
|
</package>
|
|
<package>
|
|
<name>clamav-devel</name>
|
|
<range><lt>20060808</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>Clamav team reports:</p>
|
|
<blockquote cite="http://www.clamav.net/security/0.88.4.html">
|
|
<p>A heap overflow vulnerability was discovered in libclamav
|
|
which could cause a denial of service or allow the
|
|
execution of arbitrary code.</p>
|
|
<p>The problem is specifically located in the PE file rebuild
|
|
function used by the UPX unpacker.</p>
|
|
<p>Relevant code from libclamav/upx.c:</p>
|
|
<p>
|
|
memcpy(dst, newbuf, foffset);
|
|
*dsize = foffset;
|
|
free(newbuf);
|
|
|
|
cli_dbgmsg("UPX: PE structure rebuilt from compressed file\n");
|
|
return 1;</p>
|
|
<p>Due to improper validation it is possible to overflow the above
|
|
memcpy() beyond the allocated memory block.</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<cvename>CVE-2006-4018</cvename>
|
|
<url>http://www.clamav.net/security/0.88.4.html</url>
|
|
</references>
|
|
<dates>
|
|
<discovery>2006-08-07</discovery>
|
|
<entry>2006-08-08</entry>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="c905298c-2274-11db-896e-000ae42e9b93">
|
|
<topic>drupal -- XSS vulnerability</topic>
|
|
<affects>
|
|
<package>
|
|
<name>drupal</name>
|
|
<range><lt>4.6.9</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>The Drupal project reports:</p>
|
|
<blockquote cite="http://drupal.org/files/sa-2006-011/advisory.txt">
|
|
<p>A malicious user can execute a cross site scripting attack
|
|
by enticing someone to visit a Drupal site via a specially
|
|
crafted link.</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<url>http://drupal.org/files/sa-2006-011/advisory.txt</url>
|
|
</references>
|
|
<dates>
|
|
<discovery>2006-08-02</discovery>
|
|
<entry>2006-08-02</entry>
|
|
<modified>2006-08-08</modified>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="ed529baa-21c6-11db-b625-02e081235dab">
|
|
<topic>gnupg -- 2 more possible memory allocation attacks</topic>
|
|
<affects>
|
|
<package>
|
|
<name>gnupg</name>
|
|
<range><lt>1.4.5</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>Author reports:</p>
|
|
<blockquote cite="http://lists.gnupg.org/pipermail/gnupg-announce/2006q3/000229.html">
|
|
<p>Fixed 2 more possible memory allocation attacks. They are
|
|
similar to the problem we fixed with 1.4.4. This bug can easily
|
|
be exploted for a DoS; remote code execution is not entirely
|
|
impossible.</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<url>http://lists.gnupg.org/pipermail/gnupg-announce/2006q3/000229.html</url>
|
|
</references>
|
|
<dates>
|
|
<discovery>2006-08-01</discovery>
|
|
<entry>2006-08-02</entry>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="76562594-1f19-11db-b7d4-0008743bf21a">
|
|
<topic>ruby -- multiple vulnerabilities</topic>
|
|
<affects>
|
|
<package>
|
|
<name>ruby</name>
|
|
<name>ruby_static</name>
|
|
<range><gt>1.6.*</gt><lt>1.8.*</lt></range>
|
|
<range><gt>1.8.*</gt><lt>1.8.4_9,1</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>Secunia reports:</p>
|
|
<blockquote cite="http://secunia.com/advisories/21009/">
|
|
<p>Two vulnerabilities have been reported in Ruby, which can
|
|
be exploited by malicious people to bypass certain security
|
|
restrictions.</p>
|
|
<ol>
|
|
<li>An error in the handling of the "alias" functionality
|
|
can be exploited to bypass the safe level protection and
|
|
replace methods called in the trusted level.</li>
|
|
<li>An error caused due to directory operations not being
|
|
properly checked can be exploited to bypass the safe
|
|
level protection and close untainted directory streams.</li>
|
|
</ol>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<bid>18944</bid>
|
|
<cvename>CVE-2006-3694</cvename>
|
|
<url>http://secunia.com/advisories/21009/</url>
|
|
<url>http://jvn.jp/jp/JVN%2383768862/index.html</url>
|
|
<url>http://jvn.jp/jp/JVN%2313947696/index.html</url>
|
|
</references>
|
|
<dates>
|
|
<discovery>2006-07-12</discovery>
|
|
<entry>2006-07-29</entry>
|
|
<modified>2006-07-30</modified>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="dc8c08c7-1e7c-11db-88cf-000c6ec775d9">
|
|
<topic>apache -- mod_rewrite buffer overflow vulnerability</topic>
|
|
<affects>
|
|
<package>
|
|
<name>apache</name>
|
|
<range><ge>1.3.28</ge><lt>1.3.36_1</lt></range>
|
|
<range><ge>2.0.46</ge><lt>2.0.58_2</lt></range>
|
|
<range><ge>2.2.0</ge><lt>2.2.2_1</lt></range>
|
|
</package>
|
|
<package>
|
|
<name>apache+mod_perl</name>
|
|
<range><ge>1.3.28</ge><lt>1.3.36_1</lt></range>
|
|
</package>
|
|
<package>
|
|
<name>apache+ipv6</name>
|
|
<range><ge>1.3.28</ge><lt>1.3.37</lt></range>
|
|
</package>
|
|
<package>
|
|
<name>apache_fp</name>
|
|
<range><ge>0</ge></range>
|
|
</package>
|
|
<package>
|
|
<name>ru-apache</name>
|
|
<range><ge>1.3.28</ge><lt>1.3.37+30.23</lt></range>
|
|
</package>
|
|
<package>
|
|
<name>ru-apache+mod_ssl</name>
|
|
<range><ge>1.3.28</ge><lt>1.3.34.1.57_2</lt></range>
|
|
</package>
|
|
<package>
|
|
<name>apache+ssl</name>
|
|
<range><ge>1.3.28</ge><lt>1.3.34.1.57_2</lt></range>
|
|
</package>
|
|
<package>
|
|
<name>apache+mod_ssl</name>
|
|
<name>apache+mod_ssl+ipv6</name>
|
|
<name>apache+mod_ssl+mod_accel</name>
|
|
<name>apache+mod_ssl+mod_accel+ipv6</name>
|
|
<name>apache+mod_ssl+mod_accel+mod_deflate</name>
|
|
<name>apache+mod_ssl+mod_accel+mod_deflate+ipv6</name>
|
|
<name>apache+mod_ssl+mod_deflate</name>
|
|
<name>apache+mod_ssl+mod_deflate+ipv6</name>
|
|
<name>apache+mod_ssl+mod_snmp</name>
|
|
<name>apache+mod_ssl+mod_snmp+mod_accel</name>
|
|
<name>apache+mod_ssl+mod_snmp+mod_accel+ipv6</name>
|
|
<name>apache+mod_ssl+mod_snmp+mod_deflate</name>
|
|
<name>apache+mod_ssl+mod_snmp+mod_deflate+ipv6</name>
|
|
<name>apache+mod_ssl+mod_snmp+mod_accel+mod_deflate+ipv6</name>
|
|
<range><ge>1.3.28</ge><lt>1.3.36+2.8.27_1</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>The Apache Software Foundation and The Apache HTTP Server
|
|
Project reports:</p>
|
|
<blockquote cite="http://marc.theaimsgroup.com/?l=apache-httpd-announce&m=115409818602955">
|
|
<p>An off-by-one flaw exists in the Rewrite module,
|
|
mod_rewrite, as shipped with Apache 1.3 since 1.3.28, 2.0
|
|
since 2.0.46, and 2.2 since 2.2.0.</p>
|
|
<p>Depending on the manner in which Apache HTTP Server was
|
|
compiled, this software defect may result in a
|
|
vulnerability which, in combination with certain types of
|
|
Rewrite rules in the web server configuration files, could
|
|
be triggered remotely. For vulnerable builds, the nature
|
|
of the vulnerability can be denial of service (crashing of
|
|
web server processes) or potentially allow arbitrary code
|
|
execution. This issue has been rated as having important
|
|
security impact by the Apache HTTP Server Security Team.</p>
|
|
<p>This flaw does not affect a default installation of
|
|
Apache HTTP Server. Users who do not use, or have not
|
|
enabled, the Rewrite module mod_rewrite are not affected
|
|
by this issue. This issue only affects installations using
|
|
a Rewrite rule with the following characteristics:</p>
|
|
<ul>
|
|
<li>The RewriteRule allows the attacker to control the
|
|
initial part of the rewritten URL (for example if the
|
|
substitution URL starts with $1)</li>
|
|
<li>The RewriteRule flags do NOT include any of the
|
|
following flags: Forbidden (F), Gone (G), or NoEscape
|
|
(NE).</li>
|
|
</ul>
|
|
<p>Please note that ability to exploit this issue is
|
|
dependent on the stack layout for a particular compiled
|
|
version of mod_rewrite. If the compiler used to compile
|
|
Apache HTTP Server has added padding to the stack
|
|
immediately after the buffer being overwritten, it will
|
|
not be possible to exploit this issue, and Apache HTTP
|
|
Server will continue operating normally.</p>
|
|
<p>The Apache HTTP Server project thanks Mark Dowd of McAfee
|
|
Avert Labs for the responsible reporting of this
|
|
vulnerability.</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<certvu>395412</certvu>
|
|
<cvename>CVE-2006-3747</cvename>
|
|
<mlist msgid="44CA22D9.6020200@apache.org">http://marc.theaimsgroup.com/?l=apache-httpd-announce&m=115409818602955</mlist>
|
|
</references>
|
|
<dates>
|
|
<discovery>2006-07-27</discovery>
|
|
<entry>2006-07-28</entry>
|
|
<modified>2006-11-01</modified>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="e2a92664-1d60-11db-88cf-000c6ec775d9">
|
|
<topic>mozilla -- multiple vulnerabilities</topic>
|
|
<affects>
|
|
<package>
|
|
<name>firefox</name>
|
|
<range><lt>1.5.0.5,1</lt></range>
|
|
<range><gt>2.*,1</gt><lt>2.0_1,1</lt></range>
|
|
</package>
|
|
<package>
|
|
<name>linux-firefox</name>
|
|
<range><lt>1.5.0.5</lt></range>
|
|
</package>
|
|
<package>
|
|
<name>linux-firefox-devel</name>
|
|
<range><lt>3.0.a2006.07.26</lt></range>
|
|
</package>
|
|
<package>
|
|
<name>seamonkey</name>
|
|
<name>linux-seamonkey</name>
|
|
<range><lt>1.0.3</lt></range>
|
|
</package>
|
|
<package>
|
|
<name>thunderbird</name>
|
|
<name>linux-thunderbird</name>
|
|
<name>mozilla-thunderbird</name>
|
|
<range><lt>1.5.0.5</lt></range>
|
|
</package>
|
|
<package>
|
|
<name>mozilla</name>
|
|
<name>linux-mozilla</name>
|
|
<name>linux-mozilla-devel</name>
|
|
<range><gt>0</gt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>A Mozilla Foundation Security Advisory reports of multiple
|
|
issues. Several of which can be used to run arbitrary code
|
|
with the privilege of the user running the program.</p>
|
|
<blockquote cite="http://www.mozilla.org/projects/security/known-vulnerabilities.html#seamonkey1.0.3">
|
|
<ul>
|
|
<li>MFSA 2006-56 chrome: scheme loading remote content</li>
|
|
<li>MFSA 2006-55 Crashes with evidence of memory corruption
|
|
(rv:1.8.0.5)</li>
|
|
<li>MFSA 2006-54 XSS with
|
|
XPCNativeWrapper(window).Function(...)</li>
|
|
<li>MFSA 2006-53 UniversalBrowserRead privilege escalation</li>
|
|
<li>MFSA 2006-52 PAC privilege escalation using
|
|
Function.prototype.call</li>
|
|
<li>MFSA 2006-51 Privilege escalation using named-functions
|
|
and redefined "new Object()"</li>
|
|
<li>MFSA 2006-50 JavaScript engine vulnerabilities</li>
|
|
<li>MFSA 2006-49 Heap buffer overwrite on malformed VCard</li>
|
|
<li>MFSA 2006-48 JavaScript new Function race condition</li>
|
|
<li>MFSA 2006-47 Native DOM methods can be hijacked across
|
|
domains</li>
|
|
<li>MFSA 2006-46 Memory corruption with simultaneous events</li>
|
|
<li>MFSA 2006-45 Javascript navigator Object Vulnerability</li>
|
|
<li>MFSA 2006-44 Code execution through deleted frame
|
|
reference</li>
|
|
</ul>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<cvename>CVE-2006-3113</cvename>
|
|
<cvename>CVE-2006-3677</cvename>
|
|
<cvename>CVE-2006-3801</cvename>
|
|
<cvename>CVE-2006-3802</cvename>
|
|
<cvename>CVE-2006-3803</cvename>
|
|
<cvename>CVE-2006-3804</cvename>
|
|
<cvename>CVE-2006-3805</cvename>
|
|
<cvename>CVE-2006-3806</cvename>
|
|
<cvename>CVE-2006-3807</cvename>
|
|
<cvename>CVE-2006-3808</cvename>
|
|
<cvename>CVE-2006-3809</cvename>
|
|
<cvename>CVE-2006-3810</cvename>
|
|
<cvename>CVE-2006-3811</cvename>
|
|
<cvename>CVE-2006-3812</cvename>
|
|
<url>http://www.mozilla.org/projects/security/known-vulnerabilities.html#seamonkey1.0.3</url>
|
|
<url>http://www.mozilla.org/security/announce/2006/mfsa2006-44.html</url>
|
|
<url>http://www.mozilla.org/security/announce/2006/mfsa2006-45.html</url>
|
|
<url>http://www.mozilla.org/security/announce/2006/mfsa2006-46.html</url>
|
|
<url>http://www.mozilla.org/security/announce/2006/mfsa2006-47.html</url>
|
|
<url>http://www.mozilla.org/security/announce/2006/mfsa2006-48.html</url>
|
|
<url>http://www.mozilla.org/security/announce/2006/mfsa2006-49.html</url>
|
|
<url>http://www.mozilla.org/security/announce/2006/mfsa2006-50.html</url>
|
|
<url>http://www.mozilla.org/security/announce/2006/mfsa2006-51.html</url>
|
|
<url>http://www.mozilla.org/security/announce/2006/mfsa2006-52.html</url>
|
|
<url>http://www.mozilla.org/security/announce/2006/mfsa2006-53.html</url>
|
|
<url>http://www.mozilla.org/security/announce/2006/mfsa2006-54.html</url>
|
|
<url>http://www.mozilla.org/security/announce/2006/mfsa2006-55.html</url>
|
|
<url>http://www.mozilla.org/security/announce/2006/mfsa2006-56.html</url>
|
|
</references>
|
|
<dates>
|
|
<discovery>2006-07-25</discovery>
|
|
<entry>2006-07-27</entry>
|
|
<modified>2006-11-02</modified>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="5f2a0c40-1322-11db-bd23-000475abc56f">
|
|
<topic>zope -- information disclosure vulnerability</topic>
|
|
<affects>
|
|
<package>
|
|
<name>zope</name>
|
|
<range><ge>2.7.0</ge><lt>2.7.9</lt></range>
|
|
<range><ge>2.8.0</ge><lt>2.8.7</lt></range>
|
|
<range><ge>2.9.0</ge><lt>2.9.3</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>Zope team reports:</p>
|
|
<blockquote cite="http://www.zope.org/Products/Zope/Hotfix-2006-07-05/Hotfix-2006-07-05/view">
|
|
<p>Unspecified vulnerability in (Zope2) allows local users
|
|
to obtain sensitive information via unknown attack vectors
|
|
related to the docutils module and "restructured text".</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<cvename>CVE-2006-3458</cvename>
|
|
<url>http://www.zope.org/Products/Zope/Hotfix-2006-07-05/Hotfix-2006-07-05/view</url>
|
|
</references>
|
|
<dates>
|
|
<discovery>2006-07-05</discovery>
|
|
<entry>2006-07-14</entry>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="6da7344b-128a-11db-b25f-00e00c69a70d">
|
|
<topic>drupal -- multiple vulnerabilities</topic>
|
|
<affects>
|
|
<package>
|
|
<name>drupal</name>
|
|
<range><lt>4.6.8</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>The Drupal team reports:</p>
|
|
<blockquote cite="http://drupal.org/node/66767">
|
|
<p>Vulnerability: XSS Vulnerability in taxonomy module</p>
|
|
<p>It is possible for a malicious user to insert and execute
|
|
XSS into terms, due to lack of validation on output of the
|
|
page title. The fix wraps the display of terms in
|
|
check_plain().</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<cvename>CVE-2006-2833</cvename>
|
|
<url>http://drupal.org/node/66767</url>
|
|
</references>
|
|
<dates>
|
|
<discovery>2006-05-18</discovery>
|
|
<entry>2006-07-13</entry>
|
|
<modified>2006-07-14</modified>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="67dbe99f-0f09-11db-94f8-00e029485e38">
|
|
<topic>shoutcast -- cross-site scripting, information exposure</topic>
|
|
<affects>
|
|
<package>
|
|
<name>shoutcast</name>
|
|
<name>linux-shoutcast</name>
|
|
<range><lt>1.9.7</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>Goober's advisory reports reports that shoutcast is vulnerable to an
|
|
arbitrary file reading vulnerability:</p>
|
|
<blockquote cite="http://people.ksp.sk/~goober/advisory/001-shoutcast.html">
|
|
<p>Impact of the vulnerability depends on the way the product was
|
|
installed. In general, the vulnerability allows the attacker to read
|
|
any file which can be read by the Shoutcast server process.</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<cvename>CVE-2006-3007</cvename>
|
|
<url>http://secunia.com/advisories/20524/</url>
|
|
<url>http://people.ksp.sk/~goober/advisory/001-shoutcast.html</url>
|
|
</references>
|
|
<dates>
|
|
<discovery>2006-06-09</discovery>
|
|
<entry>2006-07-11</entry>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="b168ddea-105a-11db-ac96-000c6ec775d9">
|
|
<topic>samba -- memory exhaustion DoS in smbd</topic>
|
|
<affects>
|
|
<package>
|
|
<name>samba</name>
|
|
<name>ja-samba</name>
|
|
<range><ge>3.0.1,1</ge><lt>3.0.23,1</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>The Samba Team reports:</p>
|
|
<blockquote cite="http://www.samba.org/samba/security/CAN-2006-3403.html">
|
|
<p>The smbd daemon maintains internal data structures used
|
|
track active connections to file and printer shares. In
|
|
certain circumstances an attacker may be able to
|
|
continually increase the memory usage of an smbd process
|
|
by issuing a large number of share connection requests.
|
|
This defect affects all Samba configurations.</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<cvename>CVE-2006-3403</cvename>
|
|
<url>http://www.samba.org/samba/security/CAN-2006-3403.html</url>
|
|
</references>
|
|
<dates>
|
|
<discovery>2006-07-10</discovery>
|
|
<entry>2006-07-10</entry>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="a876df84-0fef-11db-ac96-000c6ec775d9">
|
|
<topic>twiki -- multiple file extensions file upload vulnerability</topic>
|
|
<affects>
|
|
<package>
|
|
<name>twiki</name>
|
|
<range><lt>4.0.4,1</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>A TWiki Security Alert reports:</p>
|
|
<blockquote cite="http://twiki.org/cgi-bin/view/Codev/SecurityAlertSecureFileUploads">
|
|
<p>The TWiki upload filter already prevents executable
|
|
scripts such as .php, .php1, .phps, .pl from potentially
|
|
getting executed by appending a .txt suffix to the
|
|
uploaded filename. However, PHP and some other types
|
|
allows additional file suffixes, such as .php.en, .php.1,
|
|
and .php.2. TWiki does not check for these suffixes,
|
|
e.g. it is possible to upload php scripts with such
|
|
suffixes without the .txt filename padding.</p>
|
|
</blockquote>
|
|
<p>This issue can also be worked around with a restrictive web
|
|
server configuration. See the
|
|
<a href="http://twiki.org/cgi-bin/view/Codev/SecurityAlertSecureFileUploads">
|
|
TWiki Security Alert</a> for more information about how to do
|
|
this.</p>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<bid>18854</bid>
|
|
<cvename>CVE-2006-3336</cvename>
|
|
<url>http://secunia.com/advisories/20992/</url>
|
|
<url>http://twiki.org/cgi-bin/view/Codev/SecurityAlertSecureFileUploads</url>
|
|
</references>
|
|
<dates>
|
|
<discovery>2006-07-05</discovery>
|
|
<entry>2006-07-10</entry>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="b0d61f73-0e11-11db-a47b-000c2957fdf1">
|
|
<topic>trac -- reStructuredText breach of privacy and denial of service vulnerability</topic>
|
|
<affects>
|
|
<package>
|
|
<name>trac</name>
|
|
<name>ja-trac</name>
|
|
<range><lt>0.9.6</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>The Trac 0.9.6 Release Notes reports:</p>
|
|
<blockquote cite="http://lists.edgewall.com/archive/trac-announce/2006-July/000013.html">
|
|
<p>Fixed reStructuredText breach of privacy and denial of
|
|
service vulnerability found by Felix Wiemann.</p>
|
|
<p>The discovered vulnerability requires docutils to be
|
|
installed and enabled. Systems that do not have docutils
|
|
installed or enabled are not vulnerable. As of this
|
|
version version 0.3.9 or greater of docutils is required
|
|
for using reStructuredText markup in Trac.</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<cvename>CVE-2005-3980</cvename>
|
|
<cvename>CVE-2005-4305</cvename>
|
|
<cvename>CVE-2005-4065</cvename>
|
|
<url>http://projects.edgewall.com/trac/wiki/ChangeLog</url>
|
|
<mlist>http://lists.edgewall.com/archive/trac-announce/2006-July/000013.html</mlist>
|
|
</references>
|
|
<dates>
|
|
<discovery>2006-07-06</discovery>
|
|
<entry>2006-07-07</entry>
|
|
<modified>2010-05-12</modified>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="e94cb43d-0c4a-11db-9016-0050bf27ba24">
|
|
<topic>horde -- various problems in dereferrer</topic>
|
|
<affects>
|
|
<package>
|
|
<name>horde</name>
|
|
<name>horde-php5</name>
|
|
<range><lt>3.1.2</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>Horde 3.1.2 release announcement:</p>
|
|
<blockquote cite="http://lists.horde.org/archives/announce/2006/000288.html">
|
|
<p>Security Fixes:</p>
|
|
<ul>
|
|
<li>Closed XSS problems in dereferrer (IE only), help viewer
|
|
and problem reporting screen.</li>
|
|
<li>Removed unused image proxy code from dereferrer.</li>
|
|
</ul>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<cvename>CVE-2006-3548</cvename>
|
|
<url>http://lists.horde.org/archives/announce/2006/000288.html</url>
|
|
</references>
|
|
<dates>
|
|
<discovery>2006-06-28</discovery>
|
|
<entry>2006-07-05</entry>
|
|
<modified>2010-05-12</modified>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="f70d09cb-0c46-11db-aac7-000c6ec775d9">
|
|
<topic>mambo -- SQL injection vulnerabilities</topic>
|
|
<affects>
|
|
<package>
|
|
<name>mambo</name>
|
|
<range><lt>4.5.4</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>The Team Mambo reports that two SQL injection
|
|
vulnerabilities have been found in Mambo. The
|
|
vulnerabilities exists due to missing sanitation of the
|
|
<code>title</code> and <code>catid</code> parameters in the
|
|
<code>weblinks.php</code> page and can lead to execution of
|
|
arbitrary SQL code.</p>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<bid>16775</bid>
|
|
<cvename>CVE-2006-0871</cvename>
|
|
<cvename>CVE-2006-1794</cvename>
|
|
<cvename>CVE-2006-3262</cvename>
|
|
<cvename>CVE-2006-3263</cvename>
|
|
<mlist msgid="20060617123242.1684.qmail@securityfocus.com">http://marc.theaimsgroup.com/?l=bugtraq&m=115056811230529</mlist>
|
|
<url>http://secunia.com/advisories/18935/</url>
|
|
<url>http://secunia.com/advisories/20745/</url>
|
|
<url>http://www.mamboserver.com/?option=com_content&task=view&id=207</url>
|
|
<url>http://www.gulftech.org/?node=research&article_id=00104-02242006</url>
|
|
</references>
|
|
<dates>
|
|
<discovery>2006-06-19</discovery>
|
|
<entry>2006-07-05</entry>
|
|
<modified>2006-10-05</modified>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="229577a8-0936-11db-bf72-00046151137e">
|
|
<topic>phpmyadmin -- cross site scripting vulnerability</topic>
|
|
<affects>
|
|
<package>
|
|
<name>phpMyAdmin</name>
|
|
<range><lt>2.8.2</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>phpmyadmin Site reports:</p>
|
|
<blockquote cite="http://www.phpmyadmin.net/home_page/security.php?issue=PMASA-2006-4">
|
|
<p>It was possible to craft a request that contains XSS by attacking
|
|
the "table" parameter.</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<url>http://www.phpmyadmin.net/home_page/security.php?issue=PMASA-2006-4</url>
|
|
<url>http://securitynews.ir/advisories/phpmyadmin281.txt</url>
|
|
</references>
|
|
<dates>
|
|
<discovery>2006-06-30</discovery>
|
|
<entry>2006-07-03</entry>
|
|
<modified>2007-10-16</modified>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="227475c2-09cb-11db-9156-000e0c2e438a">
|
|
<topic>webmin, usermin -- arbitrary file disclosure vulnerability</topic>
|
|
<affects>
|
|
<package>
|
|
<name>webmin</name>
|
|
<range><lt>1.290</lt></range>
|
|
</package>
|
|
<package>
|
|
<name>usermin</name>
|
|
<range><lt>1.220</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>The webmin development team reports:</p>
|
|
<blockquote cite="http://www.webmin.com/security.html">
|
|
<p>An attacker without a login to Webmin can read the
|
|
contents of any file on the server using a specially
|
|
crafted URL. All users should upgrade to version
|
|
1.290 as soon as possible, or setup IP access control
|
|
in Webmin.</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<bid>18744</bid>
|
|
<url>http://www.webmin.com/security.html</url>
|
|
</references>
|
|
<dates>
|
|
<discovery>2006-06-30</discovery>
|
|
<entry>2006-07-02</entry>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="d2a43243-087b-11db-bc36-0008743bf21a">
|
|
<topic>mutt -- Remote Buffer Overflow Vulnerability</topic>
|
|
<affects>
|
|
<package>
|
|
<name>mutt</name>
|
|
<name>mutt-lite</name>
|
|
<range><le>1.4.2.1_2</le></range>
|
|
</package>
|
|
<package>
|
|
<name>mutt-devel</name>
|
|
<name>mutt-devel-lite</name>
|
|
<range><le>1.5.11_2</le></range>
|
|
</package>
|
|
<package>
|
|
<name>ja-mutt</name>
|
|
<range><le>1.4.2.1.j1</le></range>
|
|
</package>
|
|
<package>
|
|
<name>zh-mutt-devel</name>
|
|
<range><le>1.5.11_20040617</le></range>
|
|
</package>
|
|
<package>
|
|
<name>ja-mutt-devel</name>
|
|
<range><le>1.5.6.j1_2</le></range>
|
|
</package>
|
|
<package>
|
|
<name>mutt-ng</name>
|
|
<range><le>20060501</le></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>SecurityFocus reports:</p>
|
|
<blockquote cite="http://www.securityfocus.com/bid/18642">
|
|
<p>Mutt is prone to a remote buffer-overflow vulnerability.
|
|
This issue is due to the application's failure to properly
|
|
bounds-check user-supplied input before copying it to an
|
|
insufficiently sized memory buffer.</p>
|
|
<p>This issue may allow remote attackers to execute arbitrary
|
|
machine code in the context of the affected application.
|
|
Failed exploit attempts will likely crash the application,
|
|
denying further service to legitimate users.</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<bid>18642</bid>
|
|
<url>http://dev.mutt.org/cgi-bin/gitweb.cgi?p=mutt/.git;a=commit;h=dc0272b749f0e2b102973b7ac43dbd3908507540</url>
|
|
</references>
|
|
<dates>
|
|
<discovery>2006-06-26</discovery>
|
|
<entry>2006-06-30</entry>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="1f935f61-075d-11db-822b-728b50d539a3">
|
|
<topic>Joomla -- multiple vulnerabilities</topic>
|
|
<affects>
|
|
<package>
|
|
<name>joomla</name>
|
|
<range><lt>1.0.10</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>Joomla Site reports:</p>
|
|
<blockquote cite="http://www.joomla.org/content/view/1510/74/">
|
|
<ul>
|
|
<li>Secured "Remember Me" functionality against SQL injection
|
|
attacks</li>
|
|
<li>Secured "Related Items" module against SQL injection
|
|
attacks</li>
|
|
<li>Secured "Weblinks" submission against SQL injection
|
|
attacks</li>
|
|
<li>Secured SEF from XSS vulnerability</li>
|
|
<li>Hardened frontend submission forms against spoofing</li>
|
|
<li>Secured mosmsg from misuse</li>
|
|
<li>Hardened mosgetparam by setting variable type to integer if
|
|
default value is detected as numeric</li>
|
|
<li>Secured com_messages from XSS vulnerability</li>
|
|
<li>Secured getUserStateFromRequest() from XSS vulnerability</li>
|
|
</ul>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<url>http://secunia.com/advisories/20746/</url>
|
|
<url>http://www.joomla.org/content/view/1510/74/</url>
|
|
</references>
|
|
<dates>
|
|
<discovery>2006-06-26</discovery>
|
|
<entry>2006-06-30</entry>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="2be7c122-0614-11db-9156-000e0c2e438a">
|
|
<topic>hashcash -- heap overflow vulnerability</topic>
|
|
<affects>
|
|
<package>
|
|
<name>hashcash</name>
|
|
<range><lt>1.22</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>Andreas Seltenreich reports that hashcash is prone to a heap
|
|
overflow vulnerability. This vulnerability is caused by
|
|
improper checking of memory allocations within the
|
|
"array_push()" function. An attacker could trigger this
|
|
vulnerability by passing a lot of "-r" or "-j" flags from
|
|
the command line, this only applies when the application is
|
|
configured to allow command line options, or by passing a lot
|
|
of resource names when the application was started with the
|
|
"-m" flag set. This could lead to a Denial or Service or
|
|
could allow remote access to the targeted system.</p>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<url>http://secunia.com/advisories/20800/</url>
|
|
<url>http://www.hashcash.org/source/CHANGELOG</url>
|
|
</references>
|
|
<dates>
|
|
<discovery>2006-06-27</discovery>
|
|
<entry>2006-06-27</entry>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="f900bda8-0472-11db-bbf7-000c6ec775d9">
|
|
<topic>gnupg -- user id integer overflow vulnerability</topic>
|
|
<affects>
|
|
<package>
|
|
<name>gnupg</name>
|
|
<range><lt>1.4.4</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>If GnuPG processes a userid with a very long packet length,
|
|
GnuPG can crash due to insufficient bounds check. This can
|
|
result in a denial-of-service condition or potentially
|
|
execution of arbitrary code with the privileges of the user
|
|
running GnuPG.</p>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<bid>18554</bid>
|
|
<cvename>CVE-2006-3082</cvename>
|
|
<mlist msgid="87psgxic5e.fsf@wheatstone.g10code.de">http://marc.theaimsgroup.com/?l=gnupg-users&m=115124706210430</mlist>
|
|
<mlist msgid="20060531115548.A2E4923E4B6@dzeta.agava.net">http://marc.theaimsgroup.com/?l=full-disclosure&m=114907659313360</mlist>
|
|
<url>http://cvs.gnupg.org/cgi-bin/viewcvs.cgi/trunk/g10/parse-packet.c?rev=4157&r1=4141&r2=4157</url>
|
|
</references>
|
|
<dates>
|
|
<discovery>2006-05-31</discovery>
|
|
<entry>2006-06-25</entry>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="0a4cd819-0291-11db-bbf7-000c6ec775d9">
|
|
<cancelled/>
|
|
</vuln>
|
|
|
|
<vuln vid="09429f7c-fd6e-11da-b1cd-0050bf27ba24">
|
|
<topic>horde -- multiple parameter cross site scripting vulnerabilities</topic>
|
|
<affects>
|
|
<package>
|
|
<name>horde</name>
|
|
<name>horde-php5</name>
|
|
<range><le>3.1.1</le></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>FrSIRT advisory ADV-2006-2356 reports:</p>
|
|
<blockquote cite="http://www.frsirt.com/english/advisories/2006/2356">
|
|
<p>Multiple vulnerabilities have been identified in Horde
|
|
Application Framework, which may be exploited by attackers
|
|
to execute arbitrary scripting code. These flaws are due
|
|
to input validation errors in the "test.php" and
|
|
"templates/problem/problem.inc" scripts that do not
|
|
validate the "url", "name", "email", "subject" and
|
|
"message" parameters, which could be exploited by
|
|
attackers to cause arbitrary scripting code to be executed
|
|
by the user's browser in the security context of an
|
|
affected Web site.</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<cvename>CVE-2006-2195</cvename>
|
|
<url>http://www.frsirt.com/english/advisories/2006/2356</url>
|
|
<url>http://cvs.horde.org/diff.php?f=horde%2Ftest.php&r1=1.145&r2=1.146</url>
|
|
<url>http://cvs.horde.org/diff.php?f=horde%2Ftemplates%2Fproblem%2Fproblem.inc&r1=2.25&r2=2.26</url>
|
|
</references>
|
|
<dates>
|
|
<discovery>2006-06-10</discovery>
|
|
<entry>2006-06-17</entry>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="09c92f3a-fd49-11da-995c-605724cdf281">
|
|
<topic>WebCalendar -- information disclosure vulnerability</topic>
|
|
<affects>
|
|
<package>
|
|
<name>WebCalendar</name>
|
|
<range><lt>1.0.4</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>Secunia reports:</p>
|
|
<blockquote cite="http://secunia.com/advisories/20367/">
|
|
<p>socsam has discovered a vulnerability in WebCalendar,
|
|
which can be exploited by malicious people to bypass
|
|
certain security restrictions and disclose sensitive
|
|
information.</p>
|
|
<p>Input passed to the "includedir" parameter isn't properly
|
|
verified, before it is used in an "fopen()" call. This can
|
|
be exploited to load an arbitrary setting file from an
|
|
external web site.</p>
|
|
<p>This can further be exploited to disclose the content of
|
|
arbitrary files by defining the "user_inc" variable in a
|
|
malicious setting file.</p>
|
|
<p>Successful exploitation requires that "register_globals"
|
|
is enabled.</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<bid>18175</bid>
|
|
<cvename>CVE-2006-2762</cvename>
|
|
<url>http://www.securityfocus.com/archive/1/435379</url>
|
|
<url>http://www.securityfocus.com/archive/1/436263</url>
|
|
</references>
|
|
<dates>
|
|
<discovery>2006-05-30</discovery>
|
|
<entry>2006-06-16</entry>
|
|
<modified>2006-06-17</modified>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="c611be81-fbc2-11da-9156-000e0c2e438a">
|
|
<topic>sendmail -- Incorrect multipart message handling</topic>
|
|
<affects>
|
|
<package>
|
|
<name>FreeBSD</name>
|
|
<range><ge>4.11</ge><lt>4.11_19</lt></range>
|
|
<range><ge>5.3</ge><lt>5.3_31</lt></range>
|
|
<range><ge>5.4</ge><lt>5.4_16</lt></range>
|
|
<range><ge>5.5</ge><lt>5.5_2</lt></range>
|
|
<range><ge>6.0</ge><lt>6.0_9</lt></range>
|
|
<range><ge>6.1</ge><lt>6.1_2</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<h1>Problem Description</h1>
|
|
<p>A suitably malformed multipart MIME message can cause
|
|
sendmail to exceed predefined limits on its stack usage.</p>
|
|
<h1>Impact</h1>
|
|
<p>An attacker able to send mail to, or via, a server can cause
|
|
queued messages on the system to not be delivered, by causing
|
|
the sendmail process which handles queued messages to crash.
|
|
Note that this will not stop new messages from entering the
|
|
queue (either from local processes, or incoming via SMTP).</p>
|
|
<h1>Workaround</h1>
|
|
<p>No workaround is available, but systems which do not receive
|
|
email from untrusted sources are not vulnerable.</p>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<cvename>CVE-2006-1173</cvename>
|
|
<freebsdsa>SA-06:17.sendmail</freebsdsa>
|
|
</references>
|
|
<dates>
|
|
<discovery>2006-06-14</discovery>
|
|
<entry>2006-06-14</entry>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="23573650-f99a-11da-994e-00142a5f241c">
|
|
<topic>dokuwiki -- multiple vulnerabilities</topic>
|
|
<affects>
|
|
<package>
|
|
<name>dokuwiki</name>
|
|
<range><lt>20060309_2</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>Multiple vulnerabilities have been reported within dokuwiki.
|
|
dokuwiki is proven vulnerable to:</p>
|
|
<ul>
|
|
<li>arbitrary PHP code insertion via spellcheck module,</li>
|
|
<li>XSS attack via "Update your account profile,"</li>
|
|
<li>bypassing of ACL controls when enabled.</li>
|
|
</ul>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<url>http://bugs.splitbrain.org/index.php?do=details&id=820</url>
|
|
<url>http://bugs.splitbrain.org/index.php?do=details&id=823</url>
|
|
<url>http://bugs.splitbrain.org/index.php?do=details&id=825</url>
|
|
</references>
|
|
<dates>
|
|
<discovery>2006-05-31</discovery>
|
|
<entry>2006-06-11</entry>
|
|
<modified>2006-06-12</modified>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="107e2ee5-f941-11da-b1fa-020039488e34">
|
|
<topic>libxine -- buffer overflow vulnerability</topic>
|
|
<affects>
|
|
<package>
|
|
<name>libxine</name>
|
|
<range><lt>1.1.1_6</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>A Secunia Advisory reports:</p>
|
|
<blockquote cite="http://secunia.com/advisories/20369">
|
|
<p>Federico L. Bossi Bonin has discovered a weakness in xine-lib,
|
|
which can be exploited by malicious people to crash certain
|
|
applications on a user's system.</p>
|
|
<p>The weakness is cause due to a heap corruption within the
|
|
"xineplug_inp_http.so" plugin when handling an overly large
|
|
reply from the HTTP server. This can be exploited to crash
|
|
an application that uses the plugin (e.g. gxine).</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<url>http://secunia.com/advisories/20369</url>
|
|
<cvename>CVE-2006-2802</cvename>
|
|
<bid>18187</bid>
|
|
</references>
|
|
<dates>
|
|
<discovery>2006-05-31</discovery>
|
|
<entry>2006-06-11</entry>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="cf3b9a96-f7bb-11da-9156-000e0c2e438a">
|
|
<topic>smbfs -- chroot escape</topic>
|
|
<affects>
|
|
<package>
|
|
<name>FreeBSD</name>
|
|
<range><ge>4.10</ge><lt>4.10_24</lt></range>
|
|
<range><ge>4.11</ge><lt>4.11_18</lt></range>
|
|
<range><ge>5.3</ge><lt>5.3_30</lt></range>
|
|
<range><ge>5.4</ge><lt>5.4_15</lt></range>
|
|
<range><ge>5.5</ge><lt>5.5_1</lt></range>
|
|
<range><ge>6.0</ge><lt>6.0_8</lt></range>
|
|
<range><ge>6.1</ge><lt>6.1_1</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<h1>Problem Description</h1>
|
|
<p>smbfs does not properly sanitize paths containing a backslash
|
|
character; in particular the directory name '..\' is
|
|
interpreted as the parent directory by the SMB/CIFS server,
|
|
but smbfs handles it in the same manner as any other
|
|
directory.</p>
|
|
<h1>Impact</h1>
|
|
<p>When inside a chroot environment which resides on a smbfs
|
|
mounted file-system it is possible for an attacker to escape
|
|
out of this chroot to any other directory on the smbfs
|
|
mounted file-system.</p>
|
|
<h1>Workaround</h1>
|
|
<p>Mount the smbfs file-systems which need to be used with
|
|
chroot on top, in a way so the chroot directory is exactly on
|
|
the mount point and not a sub directory</p>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<cvename>CVE-2006-2654</cvename>
|
|
<freebsdsa>SA-06:16.smbfs</freebsdsa>
|
|
</references>
|
|
<dates>
|
|
<discovery>2006-05-31</discovery>
|
|
<entry>2006-06-09</entry>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="0ac1aace-f7b9-11da-9156-000e0c2e438a">
|
|
<topic>ypserv -- Inoperative access controls in ypserv</topic>
|
|
<affects>
|
|
<package>
|
|
<name>FreeBSD</name>
|
|
<range><ge>5.3</ge><lt>5.3_30</lt></range>
|
|
<range><ge>5.4</ge><lt>5.4_15</lt></range>
|
|
<range><ge>5.5</ge><lt>5.5_1</lt></range>
|
|
<range><ge>6.0</ge><lt>6.0_8</lt></range>
|
|
<range><ge>6.1</ge><lt>6.1_1</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<h1>Problem Description</h1>
|
|
<p>There are two documented methods of restricting access to
|
|
NIS maps through ypserv(8): through the use of the
|
|
/var/yp/securenets file, and through the /etc/hosts.allow file.
|
|
While both mechanisms are implemented in the server, a change
|
|
in the build process caused the "securenets" access restrictions
|
|
to be inadvertantly disabled.</p>
|
|
<h1>Impact</h1>
|
|
<p>ypserv(8) will not load or process any of the networks or
|
|
hosts specified in the /var/yp/securenets file, rendering
|
|
those access controls ineffective.</p>
|
|
<h1>Workaround</h1>
|
|
<p>One possible workaround is to use /etc/hosts.allow for access
|
|
control, as shown by examples in that file.</p>
|
|
<p>Another workaround is to use a firewall (e.g., ipfw(4),
|
|
ipf(4), or pf(4)) to limit access to RPC functions from
|
|
untrusted systems or networks, but due to the complexities of
|
|
RPC, it might be difficult to create a set of firewall rules
|
|
which accomplish this without blocking all access to the
|
|
machine in question.</p>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<cvename>CVE-2006-2655</cvename>
|
|
<freebsdsa>SA-06:15.ypserv</freebsdsa>
|
|
</references>
|
|
<dates>
|
|
<discovery>2006-05-31</discovery>
|
|
<entry>2006-06-09</entry>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="ec2f2ff5-f710-11da-9156-000e0c2e438a">
|
|
<topic>freeradius -- multiple vulnerabilities</topic>
|
|
<affects>
|
|
<package>
|
|
<name>freeradius</name>
|
|
<range><ge>1.0.0</ge><le>1.0.4</le></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>The freeradious development team reports:</p>
|
|
<blockquote cite="http://www.freeradius.org/security.html">
|
|
<p>Multiple issues exist with version 1.0.4, and all prior
|
|
versions of the server. Externally exploitable
|
|
vulnerabilities exist only for sites that use the
|
|
rlm_sqlcounter module. Those sites may be vulnerable to
|
|
SQL injection attacks, similar to the issues noted below.
|
|
All sites that have not deployed the rlm_sqlcounter module
|
|
are not vulnerable to external exploits.</p>
|
|
<p>The issues are:<br/>
|
|
SQL Injection attack in the rlm_sqlcounter module.<br/>
|
|
Buffer overflow in the rlm_sqlcounter module, that may cause
|
|
a server crash. <br/>
|
|
Buffer overflow while expanding %t, that may cause a server
|
|
crash.</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<bid>17171</bid>
|
|
<cvename>CVE-2005-4744</cvename>
|
|
</references>
|
|
<dates>
|
|
<discovery>2005-09-09</discovery>
|
|
<entry>2006-06-08</entry>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="1a216dfd-f710-11da-9156-000e0c2e438a">
|
|
<topic>freeradius -- authentication bypass vulnerability</topic>
|
|
<affects>
|
|
<package>
|
|
<name>freeradius</name>
|
|
<range><gt>1.0.0</gt><le>1.1.0</le></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>The freeradius development team reports:</p>
|
|
<blockquote cite="http://www.freeradius.org/security.html">
|
|
<p>A validation issue exists with the EAP-MSCHAPv2 module
|
|
in all versions from 1.0.0 (where the module first
|
|
appeared) to 1.1.0. Insufficient input validation was being
|
|
done in the EAP-MSCHAPv2 state machine. A malicious
|
|
attacker could manipulate their EAP-MSCHAPv2 client state
|
|
machine to potentially convince the server to bypass
|
|
authentication checks. This bypassing could also result
|
|
in the server crashing</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<bid>17293</bid>
|
|
<cvename>CVE-2006-1354</cvename>
|
|
</references>
|
|
<dates>
|
|
<discovery>2006-06-03</discovery>
|
|
<entry>2006-06-08</entry>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="00784d6e-f4ce-11da-87a1-000c6ec775d9">
|
|
<topic>squirrelmail -- plugin.php local file inclusion vulnerability</topic>
|
|
<affects>
|
|
<package>
|
|
<name>squirrelmail</name>
|
|
<range><lt>1.4.6_1</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>The SquirrelMail Project Team reports:</p>
|
|
<blockquote cite="http://www.squirrelmail.org/security/issue/2006-06-01">
|
|
<p>A security issue has been uncovered in
|
|
functions/plugin.php that could allow a remote user to
|
|
access local files on the server without requiring
|
|
login. This issue manifests itself if register_globals is
|
|
enabled, and magic_quotes_gpc is disabled.</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<url>http://www.squirrelmail.org/security/issue/2006-06-01</url>
|
|
<url>http://secunia.com/advisories/20406/</url>
|
|
</references>
|
|
<dates>
|
|
<discovery>2006-06-01</discovery>
|
|
<entry>2006-06-05</entry>
|
|
<modified>2006-06-06</modified>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="af8dba15-f4cc-11da-87a1-000c6ec775d9">
|
|
<topic>dokuwiki -- spellchecker remote PHP code execution</topic>
|
|
<affects>
|
|
<package>
|
|
<name>dokuwiki</name>
|
|
<range><lt>20060309_1</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>Stefan Esser reports:</p>
|
|
<blockquote cite="http://www.hardened-php.net/advisory_042006.119.html">
|
|
<p>During the evaluation of DokuWiki for a german/korean
|
|
wiki of mine a flaw in DokuWiki's spellchecker was
|
|
discovered, that allows injecting arbitrary PHP commands,
|
|
by requesting a spellcheck on PHP commands in 'complex
|
|
curly syntax'.</p>
|
|
<p>Because the spellchecker is written as part of the AJAX
|
|
functionality of DokuWiki, it can be directly called by
|
|
any website visitor, without the need for a wiki
|
|
account.</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<url>http://www.hardened-php.net/advisory_042006.119.html</url>
|
|
<url>http://bugs.splitbrain.org/index.php?do=details&id=823</url>
|
|
<url>http://secunia.com/advisories/20429/</url>
|
|
</references>
|
|
<dates>
|
|
<discovery>2006-06-05</discovery>
|
|
<entry>2006-06-05</entry>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="40a0185f-ec32-11da-be02-000c6ec775d9">
|
|
<topic>drupal -- multiple vulnerabilities</topic>
|
|
<affects>
|
|
<package>
|
|
<name>drupal</name>
|
|
<range><lt>4.6.7</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>The Drupal team reports:</p>
|
|
<blockquote cite="http://drupal.org/node/65357">
|
|
<p>Vulnerability: SQL injection</p>
|
|
<p>A security vulnerability in the database layer allowed
|
|
certain queries to be submitted to the database without
|
|
going through Drupal's query sanitizer.</p>
|
|
</blockquote>
|
|
<blockquote cite="http://drupal.org/node/65409">
|
|
<p>Vulnerability: Execution of arbitrary files</p>
|
|
<p>Certain -- alas, typical -- configurations of Apache
|
|
allows execution of carefully named arbitrary scripts in
|
|
the files directory. Drupal now will attempt to
|
|
automatically create a .htaccess file in your "files"
|
|
directory to protect you.</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<cvename>CVE-2006-2742</cvename>
|
|
<cvename>CVE-2006-2743</cvename>
|
|
<url>http://drupal.org/node/65357</url>
|
|
<url>http://drupal.org/node/65409</url>
|
|
</references>
|
|
<dates>
|
|
<discovery>2006-05-18</discovery>
|
|
<entry>2006-06-05</entry>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="7f8cecea-f199-11da-8422-00123ffe8333">
|
|
<topic>MySQL -- SQL-injection security vulnerability</topic>
|
|
<affects>
|
|
<package>
|
|
<name>mysql-server</name>
|
|
<range><ge>5.1</ge><le>5.1.9</le></range>
|
|
<range><ge>5.0</ge><lt>5.0.22</lt></range>
|
|
<range><ge>4.1</ge><lt>4.1.20</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>MySQL reports:</p>
|
|
<blockquote cite="http://lists.mysql.com/announce/364">
|
|
<p>An SQL-injection security hole has been found in multibyte
|
|
encoding processing. An SQL-injection security hole can include a
|
|
situation whereby when inserting user supplied data into a
|
|
database, the user might inject his own SQL statements that the
|
|
server will execute. With regards to this vulnerability discovered,
|
|
when character set unaware escaping is used (e.g., addslashes() in
|
|
PHP), it is possible to bypass it in some multibyte character sets
|
|
(e.g., SJIS, BIG5 and GBK). As a result, a function like
|
|
addslashes() is not able to prevent SQL injection attacks. It is
|
|
impossible to fix this on the server side. The best solution is for
|
|
applications to use character set aware escaping offered in a
|
|
function like mysql_real_escape().</p>
|
|
<p>Workarounds:</p>
|
|
<p>One can use NO_BACKSLASH_ESCAPES mode as a workaround for a bug
|
|
in mysql_real_escape_string(), if you cannot upgrade your server
|
|
for some reason. It will enable SQL standard compatibility mode,
|
|
where backslash is not considered a special character.</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<url>http://lists.mysql.com/announce/364</url>
|
|
<url>http://lists.mysql.com/announce/365</url>
|
|
</references>
|
|
<dates>
|
|
<discovery>2006-05-31</discovery>
|
|
<entry>2006-06-01</entry>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="4913886c-e875-11da-b9f4-00123ffe8333">
|
|
<topic>MySQL -- Information Disclosure and Buffer Overflow Vulnerabilities</topic>
|
|
<affects>
|
|
<package>
|
|
<name>mysql-server</name>
|
|
<range><gt>4.0</gt><lt>4.0.27</lt></range>
|
|
<range><gt>4.1</gt><lt>4.1.19</lt></range>
|
|
<range><gt>5.1</gt><le>5.1.9</le></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>Secunia reports:</p>
|
|
<blockquote cite="http://secunia.com/advisories/19929/">
|
|
<p>MySQL have some vulnerabilities, which can be exploited by
|
|
malicious users to disclose potentially sensitive information
|
|
and compromise a vulnerable system.</p>
|
|
<p>1) An error within the code that generates an error response
|
|
to an invalid COM_TABLE_DUMP packet can be exploited by an
|
|
authenticated client to disclosure certain memory content of the
|
|
server process.</p>
|
|
<p>2) A boundary error within the handling of specially crafted
|
|
invalid COM_TABLE_DUMP packets can be exploited by an authenticated
|
|
client to cause a buffer overflow and allows arbitrary code
|
|
execution.</p>
|
|
<p>3) An error within the handling of malformed login packets can be
|
|
exploited to disclosure certain memory content of the server
|
|
process in the error messages.</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<cvename>CVE-2006-1516</cvename>
|
|
<cvename>CVE-2006-1517</cvename>
|
|
<cvename>CVE-2006-1518</cvename>
|
|
<certvu>602457</certvu>
|
|
<url>http://www.wisec.it/vulns.php?page=7</url>
|
|
<url>http://www.wisec.it/vulns.php?page=8</url>
|
|
<url>http://dev.mysql.com/doc/refman/4.1/en/news-4-0-27.html</url>
|
|
<url>http://dev.mysql.com/doc/refman/4.1/en/news-4-1-19.html</url>
|
|
<url>http://dev.mysql.com/doc/refman/5.1/en/news-5-1-10.html</url>
|
|
<url>http://secunia.com/advisories/19929/</url>
|
|
<url>http://www.vuxml.org/freebsd/a8d8713e-dc83-11da-a22b-000c6ec775d9.html</url>
|
|
</references>
|
|
<dates>
|
|
<discovery>2006-05-02</discovery>
|
|
<entry>2006-06-01</entry>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="c0171f59-ea8a-11da-be02-000c6ec775d9">
|
|
<topic>frontpage -- cross site scripting vulnerability</topic>
|
|
<affects>
|
|
<package>
|
|
<name>frontpage</name>
|
|
<name>mod_frontpage13</name>
|
|
<name>mod_frontpage20</name>
|
|
<name>mod_frontpage21</name>
|
|
<name>mod_frontpage22</name>
|
|
<range><lt>5.0.2.4803</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>Esteban Martinez Fayo reports:</p>
|
|
<blockquote cite="http://marc.theaimsgroup.com/?l=bugtraq&m=114487846329000">
|
|
<p>The FrontPage Server Extensions 2002 (included in Windows
|
|
Sever 2003 IIS 6.0 and available as a separate download
|
|
for Windows 2000 and XP) has a web page
|
|
/_vti_bin/_vti_adm/fpadmdll.dll that is used for
|
|
administrative purposes. This web page is vulnerable to
|
|
cross site scripting attacks allowing an attacker to run
|
|
client-side script on behalf of an FPSE user. If the
|
|
victim is an administrator, the attacker could take
|
|
complete control of a Front Page Server Extensions 2002
|
|
server.</p>
|
|
<p>To exploit the vulnerability an attacker can send a
|
|
specially crafted e-mail message to a FPSE user and then
|
|
persuade the user to click a link in the e-mail
|
|
message.</p>
|
|
<p>In addition, this vulnerability can be exploited if an
|
|
attacker hosts a malicious website and persuade the user
|
|
to visit it.</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<cvename>CVE-2006-0015</cvename>
|
|
<mlist msgid="0e3f01c65e78$93c00800$de00a8c0@rigel">http://marc.theaimsgroup.com/?l=bugtraq&m=114487846329000</mlist>
|
|
<url>http://www.microsoft.com/technet/security/bulletin/MS06-017.mspx</url>
|
|
<url>http://www.rtr.com/fpsupport/fpse_release_may_2_2006.htm</url>
|
|
</references>
|
|
<dates>
|
|
<discovery>2006-04-12</discovery>
|
|
<entry>2006-05-23</entry>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="72d8df84-ea6d-11da-8a53-00123ffe8333">
|
|
<topic>cscope -- buffer overflow vulnerabilities</topic>
|
|
<affects>
|
|
<package>
|
|
<name>cscope</name>
|
|
<range><lt>15.5_2</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>Jason Duell reports:</p>
|
|
<blockquote cite="http://sourceforge.net/tracker/index.php?func=detail&aid=1064875&group_id=4664&atid=104664">
|
|
<p>Cscope contains an alarming number of buffer overflow
|
|
vulnerabilities. By a rough count, there are at least 48 places
|
|
where we blindly sprintf() a file name into a fixed-length buffer
|
|
of size PATHLEN without checking to see if the file's name
|
|
is <= PATHLEN. We do similar things with environment variable
|
|
values.</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<cvename>CVE-2004-2541</cvename>
|
|
<url>http://sourceforge.net/tracker/index.php?func=detail&aid=1064875&group_id=4664&atid=104664</url>
|
|
<url>http://secunia.com/advisories/13237</url>
|
|
</references>
|
|
<dates>
|
|
<discovery>2004-11-11</discovery>
|
|
<entry>2006-05-23</entry>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="0b628470-e9a6-11da-b9f4-00123ffe8333">
|
|
<topic>coppermine -- Multiple File Extensions Vulnerability</topic>
|
|
<affects>
|
|
<package>
|
|
<name>coppermine</name>
|
|
<range><lt>1.4.6</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>Secunia reports:</p>
|
|
<blockquote cite="http://secunia.com/advisories/20211/">
|
|
<p>Coppermine Photo Gallery have a vulnerability, which can be
|
|
exploited by malicious users to compromise a vulnerable system.</p>
|
|
<p>The vulnerability is caused due to an error in the handling of
|
|
file uploads where a filename has multiple file extensions. This
|
|
can be exploited to upload malicious script files inside the web
|
|
root (e.g. a PHP script).</p>
|
|
<p>Successful exploitation may allow execution of script code
|
|
depending on the HTTP server configuration (it requires e.g. an
|
|
Apache server with the "mod_mime" module installed).</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<url>http://sourceforge.net/project/shownotes.php?group_id=89658&release_id=418266</url>
|
|
<url>http://secunia.com/advisories/20211/</url>
|
|
</references>
|
|
<dates>
|
|
<discovery>2006-05-22</discovery>
|
|
<entry>2006-05-22</entry>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="6738977b-e9a5-11da-b9f4-00123ffe8333">
|
|
<topic>coppermine -- "file" Local File Inclusion Vulnerability</topic>
|
|
<affects>
|
|
<package>
|
|
<name>coppermine</name>
|
|
<range><lt>1.4.5</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>Secunia reports:</p>
|
|
<blockquote cite="http://secunia.com/advisories/19665/">
|
|
<p>Coppermine Photo Gallery have a vulnerability, which can be
|
|
exploited by malicious people to disclose sensitive
|
|
information.</p>
|
|
<p>Input passed to the "file" parameter in "index.php" isn't properly
|
|
verified, before it is used to include files. This can be exploited
|
|
to include arbitrary files from local resources.</p>
|
|
<p>Example:
|
|
http://[host]/index.php?file=.//././/././/././/./[file]%00</p>
|
|
<p>Successful exploitation requires that "magic_quotes_gpc" is
|
|
disabled.</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<cvename>CVE-2006-1909</cvename>
|
|
<url>http://coppermine-gallery.net/forum/index.php?topic=30655.0</url>
|
|
<url>http://myimei.com/security/2006-04-14/copperminephotogallery144-plugininclusionsystemindexphp-remotefileinclusion-attack.html</url>
|
|
<url>http://secunia.com/advisories/19665/</url>
|
|
</references>
|
|
<dates>
|
|
<discovery>2006-04-19</discovery>
|
|
<entry>2006-05-22</entry>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="77cceaef-e9a4-11da-b9f4-00123ffe8333">
|
|
<topic>coppermine -- File Inclusion Vulnerabilities</topic>
|
|
<affects>
|
|
<package>
|
|
<name>coppermine</name>
|
|
<range><lt>1.4.4</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>Secunia reports:</p>
|
|
<blockquote cite="http://secunia.com/advisories/18941/">
|
|
<p>Coppermine Photo Gallery have a vulnerability, which can be
|
|
exploited by malicious people and by malicious users to compromise
|
|
a vulnerable system.</p>
|
|
<p>1) Input passed to the "lang" parameter in include/init.inc.php
|
|
isn't properly verified, before it is used to include files. This
|
|
can be exploited to include arbitrary files from local resources.
|
|
The vulnerability can be further exploited by users who are allowed
|
|
to upload image files to execute arbitrary PHP code.</p>
|
|
<p>2) Input passed to the "f" parameter in docs/showdoc.php isn't
|
|
properly verified, before it is used to include files. This can be
|
|
exploited to include arbitrary files from local resources on the
|
|
Windows platform, and remote files from Windows shared folders.</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<cvename>CVE-2006-0872</cvename>
|
|
<cvename>CVE-2006-0873</cvename>
|
|
<url>http://retrogod.altervista.org/cpg_143_adv.html</url>
|
|
<url>http://secunia.com/advisories/18941/</url>
|
|
</references>
|
|
<dates>
|
|
<discovery>2006-02-20</discovery>
|
|
<entry>2006-05-22</entry>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="2ecd02e2-e864-11da-b9f4-00123ffe8333">
|
|
<topic>phpmyadmin -- XSRF vulnerabilities</topic>
|
|
<affects>
|
|
<package>
|
|
<name>phpMyAdmin</name>
|
|
<range><lt>2.8.1</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>phpMyAdmin security team reports:</p>
|
|
<blockquote cite="http://www.phpmyadmin.net/home_page/security.php?issue=PMASA-2006-3">
|
|
<p>It was possible to inject arbitrary SQL commands by forcing an
|
|
authenticated user to follow a crafted link.</p>
|
|
<p>Such issue is quite common in many PHP applications and users
|
|
should take care what links they follow. We consider these
|
|
vulnerabilities to be quite dangerous.</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<cvename>CVE-2006-1804</cvename>
|
|
<url>http://www.phpmyadmin.net/home_page/security.php?issue=PMASA-2006-3</url>
|
|
<url>http://secunia.com/advisories/19659</url>
|
|
</references>
|
|
<dates>
|
|
<discovery>2006-05-20</discovery>
|
|
<entry>2006-05-21</entry>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="4645b98c-e46e-11da-9ae7-00123fcc6e5c">
|
|
<topic>vnc -- authentication bypass vulnerability</topic>
|
|
<affects>
|
|
<package>
|
|
<name>vnc</name>
|
|
<range><eq>4.1.1</eq></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>RealVNC is susceptible to an authentication-bypass vulnerability.
|
|
A malicious VNC client can cause a VNC server to allow it to connect
|
|
without any authentication regardless of the authentication settings
|
|
configured in the server. Exploiting this issue allows attackers to
|
|
gain unauthenticated, remote access to the VNC servers.</p>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<bid>17978</bid>
|
|
<mlist>http://www.securityfocus.com/archive/1/433994/30/0/threaded</mlist>
|
|
</references>
|
|
<dates>
|
|
<discovery>2006-05-15</discovery>
|
|
<entry>2006-05-18</entry>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="6d78202e-e2f9-11da-8674-00123ffe8333">
|
|
<topic>phpldapadmin -- Cross-Site Scripting and Script Insertion vulnerabilities</topic>
|
|
<affects>
|
|
<package>
|
|
<name>phpldapadmin098</name>
|
|
<range><lt>0.9.8.3</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>Secunia reports:</p>
|
|
<blockquote cite="http://secunia.com/advisories/19747/">
|
|
<p>phpLDAPadmin have some vulnerabilities, which can be exploited by
|
|
malicious users to conduct script insertion attacks and by
|
|
malicious people to conduct cross-site scripting attacks.</p>
|
|
<p>1) Some input isn't properly sanitised before being returned to
|
|
the user. This can be exploited to execute arbitrary HTML and
|
|
script code in a user's browser session in context of an affected
|
|
site.</p>
|
|
<p>2) Input passed to the "Container DN", "Machine Name", and "UID
|
|
Number" parameters in "template_engine.php" isn't properly
|
|
sanitised before being used. This can be exploited to inject
|
|
arbitrary HTML and script code, which will be executed in a user's
|
|
browser session in context of an affected site when the malicious
|
|
user data is viewed.</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<cvename>CVE-2006-2016</cvename>
|
|
<url>http://pridels.blogspot.com/2006/04/phpldapadmin-multiple-vuln.html</url>
|
|
<url>http://www.frsirt.com/english/advisories/2006/1450</url>
|
|
<url>http://secunia.com/advisories/19747/</url>
|
|
</references>
|
|
<dates>
|
|
<discovery>2006-04-21</discovery>
|
|
<entry>2006-05-14</entry>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="a86f30e7-dce7-11da-bf3f-02e081235dab">
|
|
<topic>fswiki -- XSS vulnerability</topic>
|
|
<affects>
|
|
<package>
|
|
<name>fswiki</name>
|
|
<range><lt>3.5.11</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>JVN reports:</p>
|
|
<blockquote cite="http://jvn.jp/jp/JVN%2335274905/">
|
|
<p>FreeStyleWiki has XSS vulnerability.</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<url>http://jvn.jp/jp/JVN%2335274905/</url>
|
|
</references>
|
|
<dates>
|
|
<discovery>2006-04-18</discovery>
|
|
<entry>2006-05-06</entry>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="a8d8713e-dc83-11da-a22b-000c6ec775d9">
|
|
<topic>mysql50-server -- COM_TABLE_DUMP arbitrary code execution</topic>
|
|
<affects>
|
|
<package>
|
|
<name>mysql-server</name>
|
|
<range><gt>5.0</gt><lt>5.0.21</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>Stefano Di Paola reports:</p>
|
|
<blockquote cite="http://www.wisec.it/vulns.php?page=8">
|
|
<p>An authenticated user could remotely execute arbitrary
|
|
commands by taking advantage of a stack overflow.</p>
|
|
<p>To take advantage of these flaws an attacker should have
|
|
direct access to MySQL server communication layer (port
|
|
3306 or unix socket). But if used in conjuction with some
|
|
web application flaws (i.e. php code injection) an
|
|
attacker could use socket programming (i.e. php sockets)
|
|
to gain access to that layer.</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<cvename>CVE-2006-1518</cvename>
|
|
<url>http://www.wisec.it/vulns.php?page=8</url>
|
|
<mlist msgid="1146577257.5679.217.camel@first">http://marc.theaimsgroup.com/?l=bugtraq&m=114659633220473</mlist>
|
|
<url>http://dev.mysql.com/doc/refman/5.0/en/news-5-0-21.html</url>
|
|
</references>
|
|
<dates>
|
|
<discovery>2006-05-02</discovery>
|
|
<entry>2006-05-06</entry>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="2df297a2-dc74-11da-a22b-000c6ec775d9">
|
|
<topic>awstats -- arbitrary command execution vulnerability</topic>
|
|
<affects>
|
|
<package>
|
|
<name>awstats</name>
|
|
<range><lt>6.5_2,1</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>OS Reviews reports:</p>
|
|
<blockquote cite="http://www.osreviews.net/reviews/comm/awstats">
|
|
<p>If the update of the stats via web front-end is allowed,
|
|
a remote attacker can execute arbitrary code on the server
|
|
using a specially crafted request involving the migrate
|
|
parameter. Input starting with a pipe character ("|")
|
|
leads to an insecure call to Perl's open function and the
|
|
rest of the input being executed in a shell. The code is
|
|
run in the context of the process running the AWStats
|
|
CGI.</p>
|
|
<p>Arbitrary code can be executed by uploading a specially
|
|
crafted configuration file if an attacker can put a file
|
|
on the server with chosen file name and content (e.g. by
|
|
using an FTP account on a shared hosting server). In this
|
|
configuration file, the LogFile directive can be used to
|
|
execute shell code following a pipe character. As above,
|
|
an open call on unsanitized input is the source of this
|
|
vulnerability.</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<url>http://awstats.sourceforge.net/awstats_security_news.php</url>
|
|
<url>http://secunia.com/advisories/19969/</url>
|
|
<url>http://www.osreviews.net/reviews/comm/awstats</url>
|
|
</references>
|
|
<dates>
|
|
<discovery>2006-05-03</discovery>
|
|
<entry>2006-05-05</entry>
|
|
<modified>2006-11-15</modified>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="d9dc2697-dadf-11da-912f-00123ffe8333">
|
|
<topic>phpwebftp -- "language" Local File Inclusion</topic>
|
|
<affects>
|
|
<package>
|
|
<name>phpwebftp</name>
|
|
<range><lt>3.3</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>Secunia reports:</p>
|
|
<blockquote cite="http://secunia.com/advisories/19706/">
|
|
<p>phpWebFTP have a vulnerability, which can be exploited by
|
|
malicious people to disclose sensitive information.</p>
|
|
<p>Input passed to the "language" parameter in index.php isn't
|
|
properly verified, before it is used to include files. This can be
|
|
exploited to include arbitrary files from local resources.</p>
|
|
<p>Successful exploitation requires that "magic_quotes_gpc" is
|
|
disabled.</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<cvename>CVE-2006-1812</cvename>
|
|
<cvename>CVE-2006-1813</cvename>
|
|
<url>https://sourceforge.net/forum/forum.php?forum_id=566199</url>
|
|
<url>http://secunia.com/advisories/19706/</url>
|
|
</references>
|
|
<dates>
|
|
<discovery>2006-04-18</discovery>
|
|
<entry>2006-05-03</entry>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="e2476979-da74-11da-a67b-0013d4a4a40e">
|
|
<topic>firefox -- denial of service vulnerability</topic>
|
|
<affects>
|
|
<package>
|
|
<name>firefox</name>
|
|
<range><gt>1.5.*,1</gt><lt>1.5.0.3,1</lt></range>
|
|
</package>
|
|
<package>
|
|
<name>linux-firefox</name>
|
|
<range><lt>1.5.0.3</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>A Mozilla Foundation Security Advisory reports for
|
|
deleted object reference when designMode="on"</p>
|
|
<blockquote cite="http://www.mozilla.org/security/announce/2006/mfsa2006-30.html">
|
|
<p>Martijn Wargers and Nick Mott each described crashes that
|
|
were discovered to ultimately stem from the same root cause:
|
|
attempting to use a deleted controller context when designMode
|
|
was turned on. This generally results in crashing the browser,
|
|
but in theory references to deleted objects can be abused to
|
|
run malicious code.</p>
|
|
<p>"splices" reported the same crash at the fan site MozillaZine and
|
|
on Bugtraq, incorrectly describing it as a buffer overflow.</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<cvename>CVE-2006-1993</cvename>
|
|
<url>http://www.mozilla.org/security/announce/2006/mfsa2006-30.html</url>
|
|
</references>
|
|
<dates>
|
|
<discovery>2006-05-02</discovery>
|
|
<entry>2006-05-03</entry>
|
|
<modified>2006-05-05</modified>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="400d9d22-d6c5-11da-a14b-00123ffe8333">
|
|
<topic>trac -- Wiki Macro Script Insertion Vulnerability</topic>
|
|
<affects>
|
|
<package>
|
|
<name>trac</name>
|
|
<name>ja-trac</name>
|
|
<range><lt>0.9.5</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>Secunia reports:</p>
|
|
<blockquote cite="http://secunia.com/advisories/19870/">
|
|
<p>A vulnerability has been reported, which can be exploited by
|
|
malicious people to conduct script insertion attacks.</p>
|
|
<p>Input passed using the wiki macro isn't properly sanitised before
|
|
being used. This can be exploited to inject arbitrary HTML and
|
|
script code, which will be executed in a user's browser session in
|
|
context of an affected site when the malicious user data is
|
|
viewed.</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<url>http://projects.edgewall.com/trac/wiki/ChangeLog</url>
|
|
<url>http://jvn.jp/jp/JVN%2384091359/index.html</url>
|
|
<url>http://secunia.com/advisories/19870/</url>
|
|
</references>
|
|
<dates>
|
|
<discovery>2006-04-28</discovery>
|
|
<entry>2006-05-02</entry>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="af2a60ed-da3e-11da-93e0-00123ffe8333">
|
|
<cancelled/>
|
|
</vuln>
|
|
|
|
<vuln vid="b088bf48-da3b-11da-93e0-00123ffe8333">
|
|
<topic>clamav -- Freshclam HTTP Header Buffer Overflow Vulnerability</topic>
|
|
<affects>
|
|
<package>
|
|
<name>clamav</name>
|
|
<range><ge>0.80</ge><lt>0.88.2</lt></range>
|
|
</package>
|
|
<package>
|
|
<name>clamav-devel</name>
|
|
<range><ge>20040826</ge><lt>20060502</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>Secunia reports:</p>
|
|
<blockquote cite="http://secunia.com/advisories/19880/">
|
|
<p>A vulnerability has been reported in ClamAV, which can be
|
|
exploited by malicious people to cause a DoS (Denial of Service)
|
|
and potentially to compromise a vulnerable system.</p>
|
|
<p>The vulnerability is caused due to a boundary error within the
|
|
HTTP client in the Freshclam command line utility. This can be
|
|
exploited to cause a stack-based buffer overflow when the HTTP
|
|
headers received from a web server exceeds 8KB.</p>
|
|
<p>Successful exploitation requires that Freshclam is used to
|
|
download virus signature updates from a malicious mirror web
|
|
server e.g. via DNS poisoning.</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<cvename>CVE-2006-1989</cvename>
|
|
<url>http://www.clamav.net/security/0.88.2.html</url>
|
|
<url>http://secunia.com/advisories/19880/</url>
|
|
</references>
|
|
<dates>
|
|
<discovery>2006-05-01</discovery>
|
|
<entry>2006-05-03</entry>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="f4af098d-d921-11da-ad4a-00123ffe8333">
|
|
<topic>jabberd -- SASL Negotiation Denial of Service Vulnerability</topic>
|
|
<affects>
|
|
<package>
|
|
<name>jabberd</name>
|
|
<range><lt>2.0.11</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>Secunia reports:</p>
|
|
<blockquote cite="http://secunia.com/advisories/19281/">
|
|
<p>A vulnerability has been reported in jabberd, which can be
|
|
exploited by malicious people to cause a DoS (Denial of
|
|
Service).</p>
|
|
<p>The vulnerability is caused due to an error within the handling
|
|
of SASL negotiation. This can be exploited to cause a crash by
|
|
sending a "response" stanza before an "auth" stanza.</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<cvename>CVE-2006-1329</cvename>
|
|
<url>http://article.gmane.org/gmane.network.jabber.admin/27372</url>
|
|
<url>http://jabberstudio.org/projects/jabberd2/releases/view.php?id=826</url>
|
|
<url>http://secunia.com/advisories/19281/</url>
|
|
</references>
|
|
<dates>
|
|
<discovery>2006-03-20</discovery>
|
|
<entry>2006-05-01</entry>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="79c1154d-d5a5-11da-8098-00123ffe8333">
|
|
<topic>cacti -- ADOdb "server.php" Insecure Test Script Security Issue</topic>
|
|
<affects>
|
|
<package>
|
|
<name>cacti</name>
|
|
<range><lt>0.8.6h</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>Secunia reports:</p>
|
|
<blockquote cite="http://secunia.com/advisories/18276/">
|
|
<p>Cacti have a security issue, which can be exploited by malicious
|
|
people to execute arbitrary SQL code and potentially compromise a
|
|
vulnerable system.</p>
|
|
<p>The problem is caused due to the presence of the insecure
|
|
"server.php" test script.</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<url>http://secunia.com/advisories/18276/</url>
|
|
<url>http://secunia.com/advisories/17418/</url>
|
|
</references>
|
|
<dates>
|
|
<discovery>2006-01-09</discovery>
|
|
<entry>2006-04-27</entry>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="dc930435-d59f-11da-8098-00123ffe8333">
|
|
<topic>amaya -- Attribute Value Buffer Overflow Vulnerabilities</topic>
|
|
<affects>
|
|
<package>
|
|
<name>amaya</name>
|
|
<range><lt>9.5</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>Secunia reports:</p>
|
|
<blockquote cite="http://secunia.com/advisories/19670/">
|
|
<p>Amaya have two vulnerabilities, which can be exploited by
|
|
malicious people to compromise a user's system.</p>
|
|
<p>The vulnerabilities are caused due to boundary errors within the
|
|
parsing of various attribute values. This can be exploited to cause
|
|
stack-based buffer overflows when a user opens a specially crafted
|
|
HTML document containing certain tags with overly long attribute
|
|
values.</p>
|
|
<p>Successful exploitation allows execution of arbitrary code.</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<cvename>CVE-2006-1900</cvename>
|
|
<url>http://morph3us.org/advisories/20060412-amaya-94.txt</url>
|
|
<url>http://morph3us.org/advisories/20060412-amaya-94-2.txt</url>
|
|
<url>http://secunia.com/advisories/19670/</url>
|
|
</references>
|
|
<dates>
|
|
<discovery>2006-04-14</discovery>
|
|
<entry>2006-04-27</entry>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="116b0820-d59c-11da-8098-00123ffe8333">
|
|
<topic>lifetype -- ADOdb "server.php" Insecure Test Script Security Issue</topic>
|
|
<affects>
|
|
<package>
|
|
<name>lifetype</name>
|
|
<range><lt>1.0.3</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>Secunia reports:</p>
|
|
<blockquote cite="http://secunia.com/advisories/19699/">
|
|
<p>A security issue has been discovered in LifeType, which can be
|
|
exploited by malicious people to execute arbitrary SQL code and
|
|
potentially compromise a vulnerable system.</p>
|
|
<p>The problem is caused due to the presence of the insecure
|
|
"server.php" test script.</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<cvename>CVE-2006-0146</cvename>
|
|
<url>http://secunia.com/advisories/19699/</url>
|
|
<url>http://secunia.com/advisories/17418/</url>
|
|
</references>
|
|
<dates>
|
|
<discovery>2006-04-19</discovery>
|
|
<entry>2006-04-27</entry>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="21c223f2-d596-11da-8098-00123ffe8333">
|
|
<topic>ethereal -- Multiple Protocol Dissector Vulnerabilities</topic>
|
|
<affects>
|
|
<package>
|
|
<name>ethereal</name>
|
|
<name>ethereal-lite</name>
|
|
<name>tethereal</name>
|
|
<name>tethereal-lite</name>
|
|
<range><ge>0.8.5</ge><lt>0.99.0</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>Secunia reports:</p>
|
|
<blockquote cite="http://secunia.com/advisories/19769/">
|
|
<p>Multiple vulnerabilities have been reported in Ethereal, which
|
|
can be exploited by malicious people to cause a DoS (Denial of
|
|
Service) or compromise a vulnerable system.</p>
|
|
<p>The vulnerabilities are caused due to various types of errors
|
|
including boundary errors, an off-by-one error, an infinite loop
|
|
error, and several unspecified errors in a multitude of protocol
|
|
dissectors.</p>
|
|
<p>Successful exploitation causes Ethereal to stop responding,
|
|
consume a large amount of system resources, crash, or execute
|
|
arbitrary code.</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<cvename>CVE-2006-1932</cvename>
|
|
<cvename>CVE-2006-1933</cvename>
|
|
<cvename>CVE-2006-1934</cvename>
|
|
<cvename>CVE-2006-1935</cvename>
|
|
<cvename>CVE-2006-1936</cvename>
|
|
<cvename>CVE-2006-1937</cvename>
|
|
<cvename>CVE-2006-1938</cvename>
|
|
<cvename>CVE-2006-1939</cvename>
|
|
<cvename>CVE-2006-1940</cvename>
|
|
<url>http://www.ethereal.com/appnotes/enpa-sa-00023.html</url>
|
|
<url>http://secunia.com/advisories/19769/</url>
|
|
</references>
|
|
<dates>
|
|
<discovery>2006-04-25</discovery>
|
|
<entry>2006-04-27</entry>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="8b683bea-d49c-11da-a672-000e0c2e438a">
|
|
<topic>asterisk -- denial of service vulnerability, local system access</topic>
|
|
<affects>
|
|
<package>
|
|
<name>asterisk</name>
|
|
<range><lt>1.2.7</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>Emmanouel Kellenis reports a denial of service vulnerability
|
|
within asterisk. The vulnerability is caused by a buffer
|
|
overflow in "format_jpeg.c". A large JPEG image could
|
|
trigger this bug, potentially allowing a local attacker to
|
|
execute arbitrary code.</p>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<bid>17561</bid>
|
|
<cvename>CVE-2006-1827</cvename>
|
|
<url>http://www.cipher.org.uk/index.php?p=advisories/Asterisk_Codec_Integer_Overflow_07-04-2006.advisory</url>
|
|
</references>
|
|
<dates>
|
|
<discovery>2006-04-07</discovery>
|
|
<entry>2006-04-25</entry>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="a813a219-d2d4-11da-a672-000e0c2e438a">
|
|
<topic>zgv, xzgv -- heap overflow vulnerability</topic>
|
|
<affects>
|
|
<package>
|
|
<name>zgv</name>
|
|
<range><lt>5.9_1</lt></range>
|
|
</package>
|
|
<package>
|
|
<name>xzgv</name>
|
|
<range><lt>0.9</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>Gentoo reports:</p>
|
|
<blockquote cite="http://www.gentoo.org/security/en/glsa/glsa-200604-10.xml">
|
|
<p>Andrea Barisani of Gentoo Linux discovered xzgv and zgv
|
|
allocate insufficient memory when rendering images with
|
|
more than 3 output components, such as images using the
|
|
YCCK or CMYK colour space. When xzgv or zgv attempt to
|
|
render the image, data from the image overruns a heap
|
|
allocated buffer.</p>
|
|
<p>An attacker may be able to construct a malicious image that
|
|
executes arbitrary code with the permissions of the xzgv or
|
|
zgv user when attempting to render the image.</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<bid>17409</bid>
|
|
<cvename>CVE-2006-1060</cvename>
|
|
<url>http://www.gentoo.org/security/en/glsa/glsa-200604-10.xml</url>
|
|
</references>
|
|
<dates>
|
|
<discovery>2006-04-21</discovery>
|
|
<entry>2006-04-23</entry>
|
|
<modified>2010-03-22</modified>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="86cc5c6f-d2b4-11da-a672-000e0c2e438a">
|
|
<topic>crossfire-server -- denial of service and remote code execution vulnerability</topic>
|
|
<affects>
|
|
<package>
|
|
<name>crossfire-server</name>
|
|
<range><lt>1.9.0</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>FRSIRT reports:</p>
|
|
<blockquote cite="http://www.frsirt.com/english/advisories/2006/0760">
|
|
<p>A vulnerability has been identified in CrossFire, which
|
|
could be exploited by remote attackers to execute arbitrary
|
|
commands or cause a denial of service. This flaw is due to
|
|
a buffer overflow error in the "oldsocketmode" module that
|
|
fails to properly handle overly large requests, which could
|
|
be exploited by a malicious client to crash or compromise a
|
|
vulnerable system.</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<bid>16883</bid>
|
|
<cvename>CVE-2006-1010</cvename>
|
|
<url>http://www.frsirt.com/english/advisories/2006/0760</url>
|
|
</references>
|
|
<dates>
|
|
<discovery>2006-02-28</discovery>
|
|
<entry>2006-04-23</entry>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="8cfb6f42-d2b0-11da-a672-000e0c2e438a">
|
|
<topic>p5-DBI -- insecure temporary file creation vulnerability</topic>
|
|
<affects>
|
|
<package>
|
|
<name>p5-DBI-137</name>
|
|
<range><ge>0</ge></range>
|
|
</package>
|
|
<package>
|
|
<name>p5-DBI</name>
|
|
<range><lt>1.37_1</lt></range>
|
|
<range><ge>1.38</ge><lt>1.48</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>Javier Fernández-Sanguino Peña reports:</p>
|
|
<blockquote cite="http://www.debian.org/security/2005/dsa-658">
|
|
<p>The DBI library, the Perl5 database interface, creates a
|
|
temporary PID file in an insecure manner. This can be
|
|
exploited by a malicious user to overwrite arbitrary files
|
|
owned by the person executing the parts of the library.</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<bid>12360</bid>
|
|
<cvename>CAN-2005-0077</cvename>
|
|
<url>http://www.debian.org/security/2005/dsa-658</url>
|
|
</references>
|
|
<dates>
|
|
<discovery>2005-01-25</discovery>
|
|
<entry>2006-04-23</entry>
|
|
<modified>2006-05-11</modified>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="e0b342a1-d2ae-11da-a672-000e0c2e438a">
|
|
<topic>wordpress -- full path disclosure</topic>
|
|
<affects>
|
|
<package>
|
|
<name>wordpress</name>
|
|
<range><lt>1.5.2</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>Dedi Dwianto reports:</p>
|
|
<blockquote cite="http://echo.or.id/adv/adv24-theday-2005.txt">
|
|
<p>A remote user can access the file directly to cause the
|
|
system to display an error message that indicates the
|
|
installation path. The resulting error message will
|
|
disclose potentially sensitive installation path
|
|
information to the remote attacker.</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<cvename>CVE-2005-4463</cvename>
|
|
<url>http://echo.or.id/adv/adv24-theday-2005.txt</url>
|
|
</references>
|
|
<dates>
|
|
<discovery>2005-12-20</discovery>
|
|
<entry>2006-04-23</entry>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="8d4ae57d-d2ab-11da-a672-000e0c2e438a">
|
|
<topic>xine -- multiple remote string vulnerabilities</topic>
|
|
<affects>
|
|
<package>
|
|
<name>xine</name>
|
|
<range><lt>0.99.4_4</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>c0ntexb reports:</p>
|
|
<blockquote cite="http://www.open-security.org/advisories/16">
|
|
<p>There are 2 format string bugs in the latest version of
|
|
Xine that could be exploited by a malicious person to
|
|
execute code on the system of a remote user running the
|
|
media player against a malicious playlist file. By passing
|
|
a format specifier in the path of a file that is embedded
|
|
in a remote playlist, it is possible to trigger this bug.</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<bid>17579</bid>
|
|
<cvename>CVE-2006-1905</cvename>
|
|
<url>http://www.open-security.org/advisories/16</url>
|
|
</references>
|
|
<dates>
|
|
<discovery>2006-04-18</discovery>
|
|
<entry>2006-04-23</entry>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="408f6ebf-d152-11da-962f-000b972eb521">
|
|
<topic>cyrus-sasl -- DIGEST-MD5 Pre-Authentication Denial of Service</topic>
|
|
<affects>
|
|
<package>
|
|
<name>cyrus-sasl</name>
|
|
<range><ge>2.*</ge><lt>2.1.21</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>Unspecified vulnerability in the CMU Cyrus Simple
|
|
Authentication and Security Layer (SASL) library, has unknown
|
|
impact and remote unauthenticated attack vectors, related to
|
|
DIGEST-MD5 negotiation.</p>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<cvename>CVE-2006-1721</cvename>
|
|
</references>
|
|
<dates>
|
|
<discovery>2006-04-11</discovery>
|
|
<entry>2006-04-22</entry>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="1fa4c9f1-cfca-11da-a672-000e0c2e438a">
|
|
<topic>FreeBSD -- FPU information disclosure</topic>
|
|
<affects>
|
|
<package>
|
|
<name>FreeBSD</name>
|
|
<range><ge>6.0</ge><lt>6.0_7</lt></range>
|
|
<range><ge>5.4</ge><lt>5.4_14</lt></range>
|
|
<range><ge>5.3</ge><lt>5.3_29</lt></range>
|
|
<range><ge>5</ge><lt>5.3</lt></range>
|
|
<range><ge>4.11</ge><lt>4.11_17</lt></range>
|
|
<range><ge>4.10</ge><lt>4.10_23</lt></range>
|
|
<range><lt>4.10</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<h1>Problem Description</h1>
|
|
<p>On "7th generation" and "8th generation" processors
|
|
manufactured by AMD, including the AMD Athlon, Duron, Athlon
|
|
MP, Athlon XP, Athlon64, Athlon64 FX, Opteron, Turion, and
|
|
Sempron, the fxsave and fxrstor instructions do not save and
|
|
restore the FOP, FIP, and FDP registers unless the exception
|
|
summary bit (ES) in the x87 status word is set to 1,
|
|
indicating that an unmasked x87 exception has occurred.</p>
|
|
<p>This behaviour is consistent with documentation provided by
|
|
AMD, but is different from processors from other vendors,
|
|
which save and restore the FOP, FIP, and FDP registers
|
|
regardless of the value of the ES bit. As a result of this
|
|
discrepancy remaining unnoticed until now, the FreeBSD kernel
|
|
does not restore the contents of the FOP, FIP, and FDP
|
|
registers between context switches.</p>
|
|
<h1>Impact</h1>
|
|
<p>On affected processors, a local attacker can monitor the
|
|
execution path of a process which uses floating-point
|
|
operations. This may allow an attacker to steal
|
|
cryptographic keys or other sensitive information.</p>
|
|
<h1>Workaround</h1>
|
|
<p>No workaround is available, but systems which do not use AMD
|
|
Athlon, Duron, Athlon MP, Athlon XP, Athlon64, Athlon64 FX,
|
|
Opteron, Turion, or Sempron processors are not vulnerable.</p>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<cvename>CVE-2006-1056</cvename>
|
|
<freebsdsa>SA-06:14.fpu</freebsdsa>
|
|
</references>
|
|
<dates>
|
|
<discovery>2006-04-19</discovery>
|
|
<entry>2006-04-19</entry>
|
|
<modified>2016-08-09</modified>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="22c6b826-cee0-11da-8578-00123ffe8333">
|
|
<topic>plone -- "member_id" Parameter Portrait Manipulation Vulnerability</topic>
|
|
<affects>
|
|
<package>
|
|
<name>plone</name>
|
|
<range><lt>2.1.2_1</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>Secunia reports:</p>
|
|
<blockquote cite="http://secunia.com/advisories/19633/">
|
|
<p>The vulnerability is caused due to missing security declarations
|
|
in "changeMemberPortrait" and "deletePersonalPortrait". This can
|
|
be exploited to manipulate or delete another user's portrait via
|
|
the "member_id" parameter.</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<cvename>CVE-2006-1711</cvename>
|
|
<url>http://dev.plone.org/plone/ticket/5432</url>
|
|
<url>http://www.debian.org/security/2006/dsa-1032</url>
|
|
<url>http://secunia.com/advisories/19633/</url>
|
|
</references>
|
|
<dates>
|
|
<discovery>2006-04-13</discovery>
|
|
<entry>2006-04-18</entry>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="84630f4a-cd8c-11da-b7b9-000c6ec775d9">
|
|
<topic>mozilla -- multiple vulnerabilities</topic>
|
|
<affects>
|
|
<package>
|
|
<name>firefox</name>
|
|
<range><lt>1.0.8,1</lt></range>
|
|
<range><gt>1.5.*,1</gt><lt>1.5.0.2,1</lt></range>
|
|
</package>
|
|
<package>
|
|
<name>linux-firefox</name>
|
|
<range><lt>1.5.0.2</lt></range>
|
|
</package>
|
|
<package>
|
|
<name>mozilla</name>
|
|
<range><lt>1.7.13,2</lt></range>
|
|
<range><ge>1.8.*,2</ge></range>
|
|
</package>
|
|
<package>
|
|
<name>linux-mozilla</name>
|
|
<range><lt>1.7.13</lt></range>
|
|
</package>
|
|
<package>
|
|
<name>linux-mozilla-devel</name>
|
|
<range><gt>0</gt></range>
|
|
</package>
|
|
<package>
|
|
<name>seamonkey</name>
|
|
<name>linux-seamonkey</name>
|
|
<range><lt>1.0.1</lt></range>
|
|
</package>
|
|
<package>
|
|
<name>thunderbird</name>
|
|
<name>mozilla-thunderbird</name>
|
|
<range><lt>1.5.0.2</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>A Mozilla Foundation Security Advisory reports of multiple
|
|
issues. Several of which can be used to run arbitrary code
|
|
with the privilege of the user running the program.</p>
|
|
<blockquote cite="http://www.mozilla.org/security/announce/">
|
|
<ul>
|
|
<li>MFSA 2006-29 Spoofing with translucent windows</li>
|
|
<li>MFSA 2006-28 Security check of js_ValueToFunctionObject() can be circumvented</li>
|
|
<li>MFSA 2006-26 Mail Multiple Information Disclosure</li>
|
|
<li>MFSA 2006-25 Privilege escalation through Print Preview</li>
|
|
<li>MFSA 2006-24 Privilege escalation using crypto.generateCRMFRequest</li>
|
|
<li>MFSA 2006-23 File stealing by changing input type</li>
|
|
<li>MFSA 2006-22 CSS Letter-Spacing Heap Overflow Vulnerability</li>
|
|
<li>MFSA 2006-20 Crashes with evidence of memory corruption (rv:1.8.0.2)</li>
|
|
<li>MFSA 2006-19 Cross-site scripting using .valueOf.call()</li>
|
|
<li>MFSA 2006-18 Mozilla Firefox Tag Order Vulnerability</li>
|
|
<li>MFSA 2006-17 cross-site scripting through window.controllers</li>
|
|
<li>MFSA 2006-16 Accessing XBL compilation scope via valueOf.call()</li>
|
|
<li>MFSA 2006-15 Privilege escalation using a JavaScript function's cloned parent</li>
|
|
<li>MFSA 2006-14 Privilege escalation via XBL.method.eval</li>
|
|
<li>MFSA 2006-13 Downloading executables with "Save Image As..."</li>
|
|
<li>MFSA 2006-12 Secure-site spoof (requires security warning dialog)</li>
|
|
<li>MFSA 2006-11 Crashes with evidence of memory corruption (rv:1.8)</li>
|
|
<li>MFSA 2006-10 JavaScript garbage-collection hazard audit</li>
|
|
<li>MFSA 2006-09 Cross-site JavaScript injection using event handlers</li>
|
|
</ul>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<certvu>179014</certvu>
|
|
<certvu>252324</certvu>
|
|
<certvu>329500</certvu>
|
|
<certvu>350262</certvu>
|
|
<certvu>488774</certvu>
|
|
<certvu>736934</certvu>
|
|
<certvu>813230</certvu>
|
|
<certvu>842094</certvu>
|
|
<certvu>932734</certvu>
|
|
<certvu>935556</certvu>
|
|
<certvu>968814</certvu>
|
|
<cvename>CVE-2006-0749</cvename>
|
|
<cvename>CVE-2006-1045</cvename>
|
|
<cvename>CVE-2006-1529</cvename>
|
|
<cvename>CVE-2006-1530</cvename>
|
|
<cvename>CVE-2006-1531</cvename>
|
|
<cvename>CVE-2006-1723</cvename>
|
|
<cvename>CVE-2006-1724</cvename>
|
|
<cvename>CVE-2006-1725</cvename>
|
|
<cvename>CVE-2006-1726</cvename>
|
|
<cvename>CVE-2006-1727</cvename>
|
|
<cvename>CVE-2006-1728</cvename>
|
|
<cvename>CVE-2006-1729</cvename>
|
|
<cvename>CVE-2006-1730</cvename>
|
|
<cvename>CVE-2006-1731</cvename>
|
|
<cvename>CVE-2006-1732</cvename>
|
|
<cvename>CVE-2006-1733</cvename>
|
|
<cvename>CVE-2006-1734</cvename>
|
|
<cvename>CVE-2006-1735</cvename>
|
|
<cvename>CVE-2006-1736</cvename>
|
|
<cvename>CVE-2006-1737</cvename>
|
|
<cvename>CVE-2006-1738</cvename>
|
|
<cvename>CVE-2006-1739</cvename>
|
|
<cvename>CVE-2006-1740</cvename>
|
|
<cvename>CVE-2006-1741</cvename>
|
|
<cvename>CVE-2006-1742</cvename>
|
|
<cvename>CVE-2006-1790</cvename>
|
|
<url>http://www.mozilla.org/security/announce/2006/mfsa2006-09.html</url>
|
|
<url>http://www.mozilla.org/security/announce/2006/mfsa2006-10.html</url>
|
|
<url>http://www.mozilla.org/security/announce/2006/mfsa2006-11.html</url>
|
|
<url>http://www.mozilla.org/security/announce/2006/mfsa2006-12.html</url>
|
|
<url>http://www.mozilla.org/security/announce/2006/mfsa2006-13.html</url>
|
|
<url>http://www.mozilla.org/security/announce/2006/mfsa2006-14.html</url>
|
|
<url>http://www.mozilla.org/security/announce/2006/mfsa2006-15.html</url>
|
|
<url>http://www.mozilla.org/security/announce/2006/mfsa2006-16.html</url>
|
|
<url>http://www.mozilla.org/security/announce/2006/mfsa2006-17.html</url>
|
|
<url>http://www.mozilla.org/security/announce/2006/mfsa2006-18.html</url>
|
|
<url>http://www.mozilla.org/security/announce/2006/mfsa2006-19.html</url>
|
|
<url>http://www.mozilla.org/security/announce/2006/mfsa2006-20.html</url>
|
|
<url>http://www.mozilla.org/security/announce/2006/mfsa2006-22.html</url>
|
|
<url>http://www.mozilla.org/security/announce/2006/mfsa2006-23.html</url>
|
|
<url>http://www.mozilla.org/security/announce/2006/mfsa2006-25.html</url>
|
|
<url>http://www.mozilla.org/security/announce/2006/mfsa2006-26.html</url>
|
|
<url>http://www.mozilla.org/security/announce/2006/mfsa2006-28.html</url>
|
|
<url>http://www.mozilla.org/security/announce/2006/mfsa2006-29.html</url>
|
|
<url>http://www.zerodayinitiative.com/advisories/ZDI-06-010.html</url>
|
|
<uscertta>TA06-107A</uscertta>
|
|
</references>
|
|
<dates>
|
|
<discovery>2006-04-13</discovery>
|
|
<entry>2006-04-16</entry>
|
|
<modified>2006-04-27</modified>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="8be2e304-cce6-11da-a3b1-00123ffe8333">
|
|
<topic>mailman -- Private Archive Script Cross-Site Scripting</topic>
|
|
<affects>
|
|
<package>
|
|
<name>mailman</name>
|
|
<name>ja-mailman</name>
|
|
<name>mailman-with-htdig</name>
|
|
<range><lt>2.1.8</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>Secunia reports:</p>
|
|
<blockquote cite="http://secunia.com/advisories/19558/">
|
|
<p>A vulnerability has been reported in Mailman, which can be
|
|
exploited by malicious people to conduct cross-site scripting
|
|
attacks.</p>
|
|
<p>Unspecified input passed to the private archive script is not
|
|
properly sanitised before being returned to users. This can be
|
|
exploited to execute arbitrary HTML and script code in a user's
|
|
browser session in context of a vulnerable site.</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<cvename>CVE-2006-1712</cvename>
|
|
<mlist>http://mail.python.org/pipermail/mailman-announce/2006-April/000084.html</mlist>
|
|
<url>http://secunia.com/advisories/19558/</url>
|
|
</references>
|
|
<dates>
|
|
<discovery>2006-04-07</discovery>
|
|
<entry>2006-04-16</entry>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="43cb40b3-c8c2-11da-a672-000e0c2e438a">
|
|
<topic>f2c -- insecure temporary files</topic>
|
|
<affects>
|
|
<package>
|
|
<name>f2c</name>
|
|
<range><lt>20060506</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>Javier Fernández-Sanguino Peña reports two temporary file
|
|
vulnerability within f2c. The vulnerabilities are caused
|
|
due to weak temporary file handling. An attacker could
|
|
create an symbolic link, causing a local user running f2c
|
|
to overwrite the symlinked file. This could give the
|
|
attacker elevated privileges.</p>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<bid>1280</bid>
|
|
<cvename>CAN-2005-0017</cvename>
|
|
</references>
|
|
<dates>
|
|
<discovery>2005-01-27</discovery>
|
|
<entry>2006-04-10</entry>
|
|
<modified>2006-08-15</modified>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="c7526a14-c4dc-11da-9699-00123ffe8333">
|
|
<topic>mplayer -- Multiple integer overflows</topic>
|
|
<affects>
|
|
<package>
|
|
<name>mplayer</name>
|
|
<name>mplayer-esound</name>
|
|
<name>mplayer-gtk</name>
|
|
<name>mplayer-gtk2</name>
|
|
<name>mplayer-gtk-esound</name>
|
|
<name>mplayer-gtk2-esound</name>
|
|
<range><lt>0.99.7_12</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>Secunia reports:</p>
|
|
<blockquote cite="http://secunia.com/advisories/19418/">
|
|
<p>The vulnerabilities are caused due to integer overflow errors
|
|
in "libmpdemux/asfheader.c" within the handling of an ASF file,
|
|
and in "libmpdemux/aviheader.c" when parsing the "indx" chunk in
|
|
an AVI file. This can be exploited to cause heap-based buffer
|
|
overflows via a malicious ASF file, or via a AVI file with
|
|
specially-crafted "wLongsPerEntry" and "nEntriesInUse" values in
|
|
the "indx" chunk.</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<cvename>CVE-2006-1502</cvename>
|
|
<url>http://www.xfocus.org/advisories/200603/11.html</url>
|
|
<url>http://secunia.com/advisories/19418/</url>
|
|
</references>
|
|
<dates>
|
|
<discovery>2006-03-29</discovery>
|
|
<entry>2006-04-07</entry>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="4bfcd857-c628-11da-b2fb-000e0c2e438a">
|
|
<topic>kaffeine -- buffer overflow vulnerability</topic>
|
|
<affects>
|
|
<package>
|
|
<name>kaffeine</name>
|
|
<range><ge>0.4.2</ge><lt>0.8.0</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>The KDE team reports:</p>
|
|
<blockquote cite="http://www.kde.org/info/security/advisory-20060404-1.txt">
|
|
<p>Kaffeine can produce a buffer overflow in http_peek() while
|
|
creating HTTP request headers for fetching remote playlists,
|
|
which under certain circumstances could be used to crash the
|
|
application and/or execute arbitrary code.</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<bid>17372</bid>
|
|
<cvename>CVE-2006-0051</cvename>
|
|
<url>http://www.kde.org/info/security/advisory-20060404-1.txt</url>
|
|
</references>
|
|
<dates>
|
|
<discovery>2006-04-04</discovery>
|
|
<entry>2006-04-07</entry>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="61349f77-c620-11da-b2fb-000e0c2e438a">
|
|
<topic>thunderbird -- javascript execution</topic>
|
|
<affects>
|
|
<package>
|
|
<name>thunderbird</name>
|
|
<name>mozilla-thunderbird</name>
|
|
<range><le>1.0.7</le></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>Renaud Lifchitz reports a vulnerability within thunderbird.
|
|
The vulnerability is caused by improper checking of javascript
|
|
scripts. This could lead to javascript code execution which
|
|
can lead to information disclosure or a denial of service
|
|
(application crash). This vulnerability is present even if
|
|
javascript had been disabled in the preferences.</p>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<bid>16770</bid>
|
|
<cvename>CAN-2006-0884</cvename>
|
|
</references>
|
|
<dates>
|
|
<discovery>2006-02-22</discovery>
|
|
<entry>2006-04-07</entry>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="fba75b43-c588-11da-9110-00123ffe8333">
|
|
<topic>phpmyadmin -- XSS vulnerabilities</topic>
|
|
<affects>
|
|
<package>
|
|
<name>phpMyAdmin</name>
|
|
<range><lt>2.8.0.3</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>phpMyAdmin security announcement:</p>
|
|
<blockquote cite="http://www.phpmyadmin.net/home_page/security.php?issue=PMASA-2006-1">
|
|
<p>It was possible to conduct an XSS attack with a direct call
|
|
to some scripts under the themes directory.</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<url>http://www.phpmyadmin.net/home_page/security.php?issue=PMASA-2006-1</url>
|
|
<url>http://secunia.com/advisories/19556/</url>
|
|
</references>
|
|
<dates>
|
|
<discovery>2006-04-06</discovery>
|
|
<entry>2006-04-06</entry>
|
|
<modified>2006-04-07</modified>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="7b55f5c2-c58b-11da-9110-00123ffe8333">
|
|
<topic>phpmyadmin -- 'set_theme' Cross-Site Scripting</topic>
|
|
<affects>
|
|
<package>
|
|
<name>phpMyAdmin</name>
|
|
<range><lt>2.8.0.2</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>Secunia reports:</p>
|
|
<blockquote cite="http://secunia.com/advisories/19277">
|
|
<p>A vulnerability has been reported in phpMyAdmin, which can be
|
|
exploited by malicious people to conduct cross-site scripting
|
|
attacks.</p>
|
|
<p>Input passed to the "set_theme" parameter isn't properly
|
|
sanitised before being returned to the user. This can be exploited
|
|
to execute arbitrary HTML and script code in a user's browser
|
|
session in context of an affected site.</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<cvename>CVE-2006-1258</cvename>
|
|
<url>http://secunia.com/advisories/19277</url>
|
|
</references>
|
|
<dates>
|
|
<discovery>2006-03-17</discovery>
|
|
<entry>2006-04-06</entry>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="6a5174bd-c580-11da-9110-00123ffe8333">
|
|
<topic>clamav -- Multiple Vulnerabilities</topic>
|
|
<affects>
|
|
<package>
|
|
<name>clamav</name>
|
|
<range><lt>0.88.1</lt></range>
|
|
</package>
|
|
<package>
|
|
<name>clamav-devel</name>
|
|
<range><le>20051104_1</le></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>Secunia reports:</p>
|
|
<blockquote cite="http://secunia.com/advisories/19534/">
|
|
<p>Some vulnerabilities have been reported in ClamAV, which
|
|
potentially can be exploited by malicious people to cause a
|
|
DoS (Denial of Service) and compromise a vulnerable system.</p>
|
|
<p>An unspecified integer overflow error exists in the PE header
|
|
parser in "libclamav/pe.c". Successful exploitation requires that
|
|
the ArchiveMaxFileSize option is disabled.</p>
|
|
<p>Some format string errors in the logging handling in
|
|
"shared/output.c" may be exploited to execute arbitrary code.</p>
|
|
<p>An out-of-bounds memory access error in the "cli_bitset_test()"
|
|
function in "ibclamav/others.c" may be exploited to cause a
|
|
crash.</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<cvename>CVE-2006-1614</cvename>
|
|
<cvename>CVE-2006-1615</cvename>
|
|
<cvename>CVE-2006-1630</cvename>
|
|
<url>http://secunia.com/advisories/19534/</url>
|
|
<url>http://www.us.debian.org/security/2006/dsa-1024</url>
|
|
</references>
|
|
<dates>
|
|
<discovery>2006-04-06</discovery>
|
|
<entry>2006-04-06</entry>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="99015cf5-c4dd-11da-b2fb-000e0c2e438a">
|
|
<topic>mediawiki -- hardcoded placeholder string security bypass vulnerability</topic>
|
|
<affects>
|
|
<package>
|
|
<name>mediawiki</name>
|
|
<range><lt>1.5.4</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>The mediawiki development team reports a vulnerability
|
|
within the mediawiki application. The vulnerability is
|
|
caused by improper checking of inline style attributes. This
|
|
could result in the execution of arbitrary javascript code in
|
|
Microsoft Internet Explorer. It appears that other browsers
|
|
are not affected by this vulnerability.</p>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<bid>16032</bid>
|
|
<cvename>CAN-2005-4501</cvename>
|
|
<url>http://sourceforge.net/project/shownotes.php?release_id=379951</url>
|
|
</references>
|
|
<dates>
|
|
<discovery>2005-12-22</discovery>
|
|
<entry>2006-04-05</entry>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="ae9fb0d7-c4dc-11da-b2fb-000e0c2e438a">
|
|
<topic>netpbm -- buffer overflow in pnmtopng</topic>
|
|
<affects>
|
|
<package>
|
|
<name>netpbm</name>
|
|
<range><lt>10.26</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>Ubuntu reports:</p>
|
|
<blockquote cite="http://www.ubuntulinux.org/support/documentation/usn/usn-210-1">
|
|
<p>A buffer overflow was found in the "pnmtopng" conversion
|
|
program. By tricking an user (or automated system) to
|
|
process a specially crafted PNM image with pnmtopng, this
|
|
could be exploited to execute arbitrary code with the
|
|
privileges of the user running pnmtopng.</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<bid>15128</bid>
|
|
<cvename>CAN-2005-2978</cvename>
|
|
<url>http://www.ubuntulinux.org/support/documentation/usn/usn-210-1</url>
|
|
</references>
|
|
<dates>
|
|
<discovery>2005-10-18</discovery>
|
|
<entry>2006-04-05</entry>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="d9307a41-c4d7-11da-b2fb-000e0c2e438a">
|
|
<topic>zoo -- stack based buffer overflow</topic>
|
|
<affects>
|
|
<package>
|
|
<name>zoo</name>
|
|
<range><lt>2.10.1_2</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>Jean-Sébastien Guay-Leroux report a vulnerability
|
|
within the zoo archiver. The vulnerability which is present
|
|
in the fullpath() function (from the misc.c file) is caused by
|
|
improper checking of user supplied data. The data returned
|
|
to the buffer can be up to 512 bytes, while the buffer is
|
|
created to hold 256 bytes. This could result in a buffer
|
|
overflow which could allow remote code execution.</p>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<bid>16790</bid>
|
|
<cvename>CVE-2006-0855</cvename>
|
|
<url>http://www.guay-leroux.com/projects/zoo-advisory.txt</url>
|
|
</references>
|
|
<dates>
|
|
<discovery>2006-02-22</discovery>
|
|
<entry>2006-04-05</entry>
|
|
<modified>2006-04-06</modified>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="74b7403c-c4d5-11da-b2fb-000e0c2e438a">
|
|
<topic>mediawiki -- cross site scripting vulnerability</topic>
|
|
<affects>
|
|
<package>
|
|
<name>mediawiki</name>
|
|
<range><ge>1.4</ge><lt>1.4.14</lt></range>
|
|
<range><ge>1.5</ge><lt>1.5.7</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>The mediawiki development team reports that there is an
|
|
site scripting vulnerability within mediawiki. The
|
|
vulnerability is caused by improper checking of encoded
|
|
links which could allow the injection of html in the output
|
|
generated by mediawiki. This could lead to cross site
|
|
scripting attacks against mediawiki installations.</p>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<bid>17269</bid>
|
|
<cvename>CVE-2006-1498</cvename>
|
|
<url>http://mail.wikipedia.org/pipermail/mediawiki-announce/2006-March/000040.html</url>
|
|
</references>
|
|
<dates>
|
|
<discovery>2006-03-27</discovery>
|
|
<entry>2006-04-05</entry>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="b5fc63ad-c4c3-11da-9699-00123ffe8333">
|
|
<topic>dia -- XFig Import Plugin Buffer Overflow</topic>
|
|
<affects>
|
|
<package>
|
|
<name>dia</name>
|
|
<name>dia-gnome</name>
|
|
<range><gt>0.86_1</gt><lt>0.94_6,1</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>Secunia reports:</p>
|
|
<blockquote cite="http://secunia.com/advisories/19469/">
|
|
<p>Some vulnerabilities have been reported in Dia, which
|
|
potentially can be exploited by malicious people to
|
|
compromise a user's system.</p>
|
|
<p>The vulnerabilities are caused due to boundary errors
|
|
within the XFig import plugin. This can be exploited to
|
|
cause buffer overflows and may allow arbitrary code
|
|
execution when a specially-crafted FIG file is imported.</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<cvename>CVE-2006-1550</cvename>
|
|
<url>http://secunia.com/advisories/19469/</url>
|
|
<mlist msgid="1143662924.6460.60.camel@linux.site">http://mail.gnome.org/archives/dia-list/2006-March/msg00149.html</mlist>
|
|
</references>
|
|
<dates>
|
|
<discovery>2006-03-31</discovery>
|
|
<entry>2006-04-05</entry>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="be4ccb7b-c48b-11da-ae12-0002b3b60e4c">
|
|
<topic>openvpn -- LD_PRELOAD code execution on client through malicious or compromised server</topic>
|
|
<affects>
|
|
<package>
|
|
<name>openvpn</name>
|
|
<range><ge>2.0</ge><lt>2.0.6</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>Hendrik Weimer reports:</p>
|
|
<blockquote cite="http://www.osreviews.net/reviews/security/openvpn-print">
|
|
<p>OpenVPN clients are a bit too generous when accepting
|
|
configuration options from a server. It is possible to transmit
|
|
environment variables to client-side shell scripts. There are some
|
|
filters in place to prevent obvious nonsense, however they don't
|
|
catch the good old LD_PRELOAD trick. All we need is to put a file
|
|
onto the client under a known location (e.g. by returning a
|
|
specially crafted document upon web access) and we have a remote
|
|
root exploit. But since the attack may only come from authenticated
|
|
servers, this threat is greatly reduced.</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<cvename>CVE-2006-1629</cvename>
|
|
<url>http://www.osreviews.net/reviews/security/openvpn-print</url>
|
|
<url>http://openvpn.net/changelog.html</url>
|
|
<mlist msgid="4431F7C4.4030804@yonan.net">http://sourceforge.net/mailarchive/message.php?msg_id=15298074</mlist>
|
|
</references>
|
|
<dates>
|
|
<discovery>2006-04-03</discovery>
|
|
<entry>2006-04-05</entry>
|
|
<modified>2006-04-06</modified>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="92fd40eb-c458-11da-9c79-00123ffe8333">
|
|
<topic>samba -- Exposure of machine account credentials in winbind log files</topic>
|
|
<affects>
|
|
<package>
|
|
<name>samba</name>
|
|
<range><ge>3.0.21a,1</ge><lt>3.0.22,1</lt></range>
|
|
</package>
|
|
<package>
|
|
<name>ja-samba</name>
|
|
<range><ge>3.0.21a,1</ge><lt>3.0.22,1</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>Samba Security Advisory:</p>
|
|
<blockquote cite="http://us1.samba.org/samba/security/CAN-2006-1059.html">
|
|
<p>The machine trust account password is the secret
|
|
shared between a domain controller and a specific
|
|
member server. Access to the member server machine
|
|
credentials allows an attacker to impersonate the
|
|
server in the domain and gain access to additional
|
|
information regarding domain users and groups.</p>
|
|
<p>The winbindd daemon writes the clear text of server's
|
|
machine credentials to its log file at level 5.
|
|
The winbindd log files are world readable by default
|
|
and often log files are requested on open mailing
|
|
lists as tools used to debug server misconfigurations.</p>
|
|
<p>This affects servers configured to use domain or
|
|
ads security and possibly Samba domain controllers
|
|
as well (if configured to use winbindd).</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<cvename>CVE-2006-1059</cvename>
|
|
<url>http://us1.samba.org/samba/security/CAN-2006-1059.html</url>
|
|
<url>http://secunia.com/advisories/19455/</url>
|
|
</references>
|
|
<dates>
|
|
<discovery>2006-03-30</discovery>
|
|
<entry>2006-04-05</entry>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="91afa94c-c452-11da-8bff-000ae42e9b93">
|
|
<topic>mod_pubcookie -- cross site scripting vulnerability</topic>
|
|
<affects>
|
|
<package>
|
|
<name>mod_pubcookie</name>
|
|
<range><lt>3.3.0</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>Nathan Dors of the Pubcookie Project reports:</p>
|
|
<blockquote cite="http://www.pubcookie.org/news/20060306-apps-secadv.html">
|
|
<p>Non-persistent XSS vulnerabilities were found in the
|
|
Pubcookie Apache module (mod_pubcookie) and ISAPI
|
|
filter. These components mishandle untrusted data when
|
|
printing responses to the browser. This makes them
|
|
vulnerable to carefully crafted requests containing script
|
|
or HTML. If an attacker can lure an unsuspecting user to
|
|
visit carefully staged content, the attacker can use it to
|
|
redirect the user to a vulnerable Pubcookie application
|
|
server and attempt to exploit the XSS vulnerabilities.</p>
|
|
<p>These vulnerabilities are classified as *high* due to the
|
|
nature and purpose of Pubcookie application servers for user
|
|
authentication and Web Single Sign-on (SSO). An attacker
|
|
who injects malicious script through the vulnerabilities
|
|
might steal private Pubcookie data including a user's
|
|
authentication assertion ("granting") cookies and
|
|
application session cookies.</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<certvu>314540</certvu>
|
|
</references>
|
|
<dates>
|
|
<discovery>2006-03-06</discovery>
|
|
<entry>2006-04-05</entry>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="855cd9fa-c452-11da-8bff-000ae42e9b93">
|
|
<topic>pubcookie-login-server -- cross site scripting vulnerability</topic>
|
|
<affects>
|
|
<package>
|
|
<name>pubcookie-login-server</name>
|
|
<range><lt>3.3.0</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>Nathan Dors of the Pubcookie Project reports:</p>
|
|
<blockquote cite="">
|
|
<p> Multiple non-persistent XSS vulnerabilities were found
|
|
in the Pubcookie login server's compiled binary "index.cgi"
|
|
CGI program. The CGI program mishandles untrusted data when
|
|
printing responses to the browser. This makes the program
|
|
vulnerable to carefully crafted requests containing script
|
|
or HTML. If an attacker can lure an unsuspecting user to
|
|
visit carefully staged content, the attacker can use it to
|
|
redirect the user to his or her local Pubcookie login page
|
|
and attempt to exploit the XSS vulnerabilities.</p>
|
|
<p> These vulnerabilities are classified as *critical* due
|
|
to the nature and purpose of the Pubcookie login server for
|
|
user authentication and Web Single Sign-on (SSO). Specific
|
|
threats include:</p>
|
|
<ul>
|
|
<li>An attacker who injects malicious script through the
|
|
vulnerabilities might steal senstive user data including
|
|
a user's authentication credentials (usernames and
|
|
passwords);</li>
|
|
<li>An attacker who injects malicious script through the
|
|
vulnerabilities might steal private Pubcookie data
|
|
including a user's authentication assertion ("granting")
|
|
cookies and SSO ("login") session cookies;</li>
|
|
<li>An attacker who injects HTML tags through the
|
|
vulnerabilities might deface a site's Pubcookie login page
|
|
for a single visit by a single user (i.e. a non-persistent
|
|
defacement).</li>
|
|
</ul>
|
|
<p>At the heart of these threats lies a violation of the
|
|
user's trust in the Pubcookie login server.</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<certvu>337585</certvu>
|
|
</references>
|
|
<dates>
|
|
<discovery>2006-03-06</discovery>
|
|
<entry>2006-04-05</entry>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="37a5c10f-bf56-11da-b0e9-00123ffe8333">
|
|
<topic>freeradius -- EAP-MSCHAPv2 Authentication Bypass</topic>
|
|
<affects>
|
|
<package>
|
|
<name>freeradius</name>
|
|
<range><ge>1.0.0</ge><lt>1.1.1</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>Freeradius Security Contact reports:</p>
|
|
<blockquote cite="http://www.freeradius.org/security.html#1.1.0">
|
|
<p>Insufficient input validation was being done in the
|
|
EAP-MSCHAPv2 state machine. A malicious attacker could
|
|
manipulate their EAP-MSCHAPv2 client state machine to
|
|
potentially convince the server to bypass authentication
|
|
checks. This bypassing could also result in the server
|
|
crashing.</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<cvename>CVE-2006-1354</cvename>
|
|
<url>http://www.freeradius.org/security.html#1.1.0</url>
|
|
<url>http://secunia.com/advisories/19300/</url>
|
|
</references>
|
|
<dates>
|
|
<discovery>2006-03-21</discovery>
|
|
<entry>2006-03-29</entry>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="2db97aa6-be81-11da-9b82-0050bf27ba24">
|
|
<topic>horde -- remote code execution vulnerability in the help viewer</topic>
|
|
<affects>
|
|
<package>
|
|
<name>horde</name>
|
|
<name>horde-php5</name>
|
|
<range><lt>3.1.1</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>Horde 3.1.1 release announcement:</p>
|
|
<blockquote cite="http://lists.horde.org/archives/announce/2006/000271.html">
|
|
<p>Major changes compared to Horde 3.1 are:</p>
|
|
<ul>
|
|
<li>Fix for remote code execution vulnerability in the
|
|
help viewer, discovered by Jan Schneider from the Horde
|
|
team.</li>
|
|
</ul>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<bid>17292</bid>
|
|
<cvename>CVE-2006-1491</cvename>
|
|
<url>http://lists.horde.org/archives/announce/2006/000271.html</url>
|
|
</references>
|
|
<dates>
|
|
<discovery>2006-03-28</discovery>
|
|
<entry>2006-03-28</entry>
|
|
<modified>2006-03-30</modified>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="25858c37-bdab-11da-b7d4-00123ffe8333">
|
|
<topic>linux-realplayer -- buffer overrun</topic>
|
|
<affects>
|
|
<package>
|
|
<name>linux-realplayer</name>
|
|
<range><ge>10.0.1</ge><lt>10.0.7.785.20060201</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>Secunia Advisories Reports:</p>
|
|
<blockquote cite="http://secunia.com/advisories/19358/">
|
|
<p>A boundary error when processing SWF files can be exploited to
|
|
cause a buffer overflow. This may allow execution of arbitrary
|
|
code on the user's system.</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<cvename>CVE-2006-0323</cvename>
|
|
<url>http://service.real.com/realplayer/security/03162006_player/en/</url>
|
|
<url>http://secunia.com/advisories/19358/</url>
|
|
</references>
|
|
<dates>
|
|
<discovery>2006-03-23</discovery>
|
|
<entry>2006-03-27</entry>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="fe4c84fc-bdb5-11da-b7d4-00123ffe8333">
|
|
<topic>linux-realplayer -- heap overflow</topic>
|
|
<affects>
|
|
<package>
|
|
<name>linux-realplayer</name>
|
|
<range><ge>10.0.1</ge><lt>10.0.6</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>iDefense Reports:</p>
|
|
<blockquote cite="http://www.idefense.com/intelligence/vulnerabilities/display.php?id=404">
|
|
<p>Remote exploitation of a heap-based buffer overflow in
|
|
RealNetwork Inc's RealPlayer could allow the execution of
|
|
arbitrary code in the context of the currently logged in
|
|
user.</p>
|
|
<p>In order to exploit this vulnerability, an attacker would
|
|
need to entice a user to follow a link to a malicious server.
|
|
Once the user visits a website under the control of an
|
|
attacker, it is possible in a default install of RealPlayer
|
|
to force a web-browser to use RealPlayer to connect to an
|
|
arbitrary server, even when it is not the default application
|
|
for handling those types, by the use of embedded object tags
|
|
in a webpage. This may allow automated exploitation when the
|
|
page is viewed.</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<cvename>CVE-2005-2922</cvename>
|
|
<url>http://service.real.com/realplayer/security/03162006_player/en/</url>
|
|
<url>http://www.idefense.com/intelligence/vulnerabilities/display.php?id=404</url>
|
|
<url>http://secunia.com/advisories/19358/</url>
|
|
</references>
|
|
<dates>
|
|
<discovery>2006-03-23</discovery>
|
|
<entry>2006-03-27</entry>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="08ac7b8b-bb30-11da-b2fb-000e0c2e438a">
|
|
<topic>sendmail -- race condition vulnerability</topic>
|
|
<affects>
|
|
<package>
|
|
<name>sendmail</name>
|
|
<range><gt>8.13</gt><lt>8.13.6</lt></range>
|
|
</package>
|
|
<package>
|
|
<name>FreeBSD</name>
|
|
<range><ge>6.0</ge><lt>6.0_6</lt></range>
|
|
<range><ge>5.4</ge><lt>5.4_13</lt></range>
|
|
<range><ge>5.3</ge><lt>5.3_28</lt></range>
|
|
<range><ge>4.11</ge><lt>4.11_16</lt></range>
|
|
<range><ge>4.10</ge><lt>4.10_22</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<h1>Problem Description</h1>
|
|
<p>A race condition has been reported to exist in the handling
|
|
by sendmail of asynchronous signals.</p>
|
|
<h1>Impact</h1>
|
|
<p>A remote attacker may be able to execute arbitrary code with
|
|
the privileges of the user running sendmail, typically
|
|
root.</p>
|
|
<h1>Workaround</h1>
|
|
<p>There is no known workaround other than disabling
|
|
sendmail.</p>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<cvename>CVE-2006-0058</cvename>
|
|
<freebsdsa>SA-06:13.sendmail</freebsdsa>
|
|
</references>
|
|
<dates>
|
|
<discovery>2006-03-22</discovery>
|
|
<entry>2006-03-24</entry>
|
|
<modified>2006-06-09</modified>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="e93bc5b0-bb2e-11da-b2fb-000e0c2e438a">
|
|
<topic>OPIE -- arbitrary password change</topic>
|
|
<affects>
|
|
<package>
|
|
<name>FreeBSD</name>
|
|
<range><ge>6.0</ge><lt>6.0_6</lt></range>
|
|
<range><ge>5.4</ge><lt>5.4_13</lt></range>
|
|
<range><ge>5.3</ge><lt>5.3_28</lt></range>
|
|
<range><ge>4.11</ge><lt>4.11_16</lt></range>
|
|
<range><ge>4.10</ge><lt>4.10_22</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<h1>Problem Description</h1>
|
|
<p>The opiepasswd(1) program uses getlogin(2) to identify the
|
|
user calling opiepasswd(1). In some circumstances
|
|
getlogin(2) will return "root" even when running as an
|
|
unprivileged user. This causes opiepasswd(1) to allow an
|
|
unpriviled user to configure OPIE authentication for the root
|
|
user.</p>
|
|
<h1>Impact</h1>
|
|
<p>In certain cases an attacker able to run commands as a non
|
|
privileged users which have not explicitly logged in, for
|
|
example CGI scripts run by a web server, is able to configure
|
|
OPIE access for the root user. If the attacker is able to
|
|
authenticate as root using OPIE authentication, for example if
|
|
"PermitRootLogin" is set to "yes" in sshd_config or the
|
|
attacker has access to a local user in the "wheel" group, the
|
|
attacker can gain root privileges.</p>
|
|
<h1>Workaround</h1>
|
|
<p>Disable OPIE authentication in PAM:</p>
|
|
<pre># sed -i "" -e /opie/s/^/#/ /etc/pam.d/*</pre>
|
|
<p>or</p>
|
|
<p>Remove the setuid bit from opiepasswd:</p>
|
|
<pre># chflags noschg /usr/bin/opiepasswd</pre>
|
|
<pre># chmod 555 /usr/bin/opiepasswd</pre>
|
|
<pre># chflags schg /usr/bin/opiepasswd</pre>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<cvename>CVE-2006-1283</cvename>
|
|
<freebsdsa>SA-06:12.opie</freebsdsa>
|
|
</references>
|
|
<dates>
|
|
<discovery>2006-03-22</discovery>
|
|
<entry>2006-03-24</entry>
|
|
<modified>2006-06-09</modified>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="e50a7476-bb2d-11da-b2fb-000e0c2e438a">
|
|
<topic>ipsec -- reply attack vulnerability</topic>
|
|
<affects>
|
|
<package>
|
|
<name>FreeBSD</name>
|
|
<range><ge>6.0</ge><lt>6.0_6</lt></range>
|
|
<range><ge>5.4</ge><lt>5.4_13</lt></range>
|
|
<range><ge>5.3</ge><lt>5.3_28</lt></range>
|
|
<range><ge>4.11</ge><lt>4.11_16</lt></range>
|
|
<range><ge>4.10</ge><lt>4.10_22</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<h1>Problem Description</h1>
|
|
<p>IPsec provides an anti-replay service which when enabled
|
|
prevents an attacker from successfully executing a replay
|
|
attack. This is done through the verification of sequence
|
|
numbers. A programming error in the fast_ipsec(4)
|
|
implementation results in the sequence number associated with
|
|
a Security Association not being updated, allowing packets to
|
|
unconditionally pass sequence number verification checks.</p>
|
|
<h1>Impact</h1>
|
|
<p>An attacker able to intercept IPSec packets can replay
|
|
them. If higher level protocols which do not provide any
|
|
protection against packet replays (e.g., UDP) are used, this
|
|
may have a variety of effects.</p>
|
|
<h1>Workaround</h1>
|
|
<p>No workaround is available.</p>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<cvename>CVE-2006-0905</cvename>
|
|
<freebsdsa>SA-06:11.ipsec</freebsdsa>
|
|
</references>
|
|
<dates>
|
|
<discovery>2006-03-22</discovery>
|
|
<entry>2006-03-24</entry>
|
|
<modified>2006-06-09</modified>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="61534682-b8f4-11da-8e62-000e0c33c2dc">
|
|
<topic>xorg-server -- privilege escalation</topic>
|
|
<affects>
|
|
<package>
|
|
<name>xorg-server</name>
|
|
<range><eq>6.9.0</eq></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>Daniel Stone of X.Org reports:</p>
|
|
<blockquote cite="http://lists.freedesktop.org/archives/xorg/2006-March/013992.html">
|
|
<p>During the analysis of results from the Coverity code review
|
|
of X.Org, we discovered a flaw in the server that allows local
|
|
users to execute arbitrary code with root privileges, or cause
|
|
a denial of service by overwriting files on the system, again
|
|
with root privileges.</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<cvename>CVE-2006-0745</cvename>
|
|
<url>https://bugs.freedesktop.org/show_bug.cgi?id=6213</url>
|
|
</references>
|
|
<dates>
|
|
<discovery>2006-03-20</discovery>
|
|
<entry>2006-03-21</entry>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="b62c80c2-b81a-11da-bec5-00123ffe8333">
|
|
<topic>heimdal -- Multiple vulnerabilities</topic>
|
|
<affects>
|
|
<package>
|
|
<name>heimdal</name>
|
|
<range><lt>0.6.6</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>A Project heimdal Security Advisory reports:</p>
|
|
<blockquote cite="http://www.pdc.kth.se/heimdal/advisory/2005-04-20/">
|
|
<p>The telnet client program in Heimdal has buffer overflows
|
|
in the functions slc_add_reply() and env_opt_add(), which
|
|
may lead to remote code execution.</p>
|
|
</blockquote>
|
|
<blockquote cite="http://www.pdc.kth.se/heimdal/advisory/2005-06-20/">
|
|
<p>The telnetd server program in Heimdal has buffer overflows
|
|
in the function getterminaltype, which may lead to remote code
|
|
execution.</p>
|
|
</blockquote>
|
|
<blockquote cite="http://www.pdc.kth.se/heimdal/advisory/2006-02-06/">
|
|
<p>The rshd server in Heimdal has a privilege escalation bug
|
|
when storing forwarded credentials. The code allowes a user
|
|
to overwrite a file with its credential cache, and get ownership
|
|
of the file.</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<cvename>CVE-2005-0469</cvename>
|
|
<cvename>CVE-2005-2040</cvename>
|
|
<cvename>CVE-2006-0582</cvename>
|
|
<cvename>CVE-2006-0677</cvename>
|
|
<url>http://www.pdc.kth.se/heimdal/advisory/2005-04-20</url>
|
|
<url>http://www.pdc.kth.se/heimdal/advisory/2005-06-20</url>
|
|
<url>http://www.pdc.kth.se/heimdal/advisory/2006-02-06</url>
|
|
</references>
|
|
<dates>
|
|
<discovery>2006-02-06</discovery>
|
|
<entry>2006-03-20</entry>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="b8e361b8-b7ff-11da-8414-0013d4a4a40e">
|
|
<topic>curl -- TFTP packet buffer overflow vulnerability</topic>
|
|
<affects>
|
|
<package>
|
|
<name>curl</name>
|
|
<name>linux-curl</name>
|
|
<range><gt>7.14.1</gt><lt>7.15.3</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>A Project cURL Security Advisory reports:</p>
|
|
<blockquote cite="http://curl.haxx.se/docs/adv_20060320.html">
|
|
<p>libcurl uses the given file part of a TFTP URL in a manner that
|
|
allows a malicious user to overflow a heap-based memory buffer due
|
|
to the lack of boundary check.</p>
|
|
<p>This overflow happens if you pass in a URL with a TFTP
|
|
protocol prefix ("tftp://"), using a valid host and a path
|
|
part that is longer than 512 bytes.</p>
|
|
<p>The affected flaw can be triggered by a redirect, if
|
|
curl/libcurl is told to follow redirects and an HTTP
|
|
server points the client to a tftp URL with the
|
|
characteristics described above.</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<cvename>CVE-2006-1061</cvename>
|
|
<url>http://curl.haxx.se/docs/adv_20060320.html</url>
|
|
</references>
|
|
<dates>
|
|
<discovery>2006-03-20</discovery>
|
|
<entry>2006-03-20</entry>
|
|
<modified>2006-10-05</modified>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="6779e82f-b60b-11da-913d-000ae42e9b93">
|
|
<topic>drupal -- multiple vulnerabilities</topic>
|
|
<affects>
|
|
<package>
|
|
<name>drupal</name>
|
|
<range><lt>3.6.6</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>Drupal reports:</p>
|
|
<blockquote cite="http://drupal.org/node/53806">
|
|
<p>Mail header injection vulnerability.</p>
|
|
<p>Linefeeds and carriage returns were not being stripped from
|
|
email headers, raising the possibility of bogus headers
|
|
being inserted into outgoing email.</p>
|
|
<p>This could lead to Drupal sites being used to send unwanted
|
|
email.</p>
|
|
</blockquote>
|
|
<blockquote cite="http://drupal.org/node/53805">
|
|
<p>Session fixation vulnerability.</p>
|
|
<p>If someone creates a clever enough URL and convinces you to
|
|
click on it, and you later log in but you do not log off
|
|
then the attacker may be able to impersonate you.</p>
|
|
</blockquote>
|
|
<blockquote cite="http://drupal.org/node/53803">
|
|
<p>XSS vulnerabilities.</p>
|
|
<p>Some user input sanity checking was missing. This could
|
|
lead to possible cross-site scripting (XSS) attacks.</p>
|
|
<p>XSS can lead to user tracking and theft of accounts and
|
|
services.</p>
|
|
</blockquote>
|
|
<blockquote cite="http://drupal.org/node/53796">
|
|
<p>Security bypass in menu.module.</p>
|
|
<p>If you use menu.module to create a menu item, the page you
|
|
point to will be accessible to all, even if it is an admin
|
|
page.</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<url>http://drupal.org/node/53806</url>
|
|
<url>http://drupal.org/node/53805</url>
|
|
<url>http://drupal.org/node/53803</url>
|
|
<url>http://drupal.org/node/53796</url>
|
|
</references>
|
|
<dates>
|
|
<discovery>2006-03-13</discovery>
|
|
<entry>2006-03-17</entry>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="c7c09579-b466-11da-82d0-0050bf27ba24">
|
|
<topic>horde -- "url" disclosure of sensitive information vulnerability</topic>
|
|
<affects>
|
|
<package>
|
|
<name>horde</name>
|
|
<name>horde-php5</name>
|
|
<range><lt>3.1</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p> Secunia advisory SA19246:</p>
|
|
<blockquote cite="http://secunia.com/advisories/19246/">
|
|
<p>Paul Craig has discovered a vulnerability in Horde, which
|
|
can be exploited by malicious people to disclose sensitive
|
|
information.
|
|
Input passed to the "url" parameter in "services/go.php"
|
|
isn't properly verified, before it is used in a
|
|
"readfile()" call. This can be exploited to disclose the
|
|
content of arbitrary files via e.g. the "php://" protocol
|
|
wrapper.</p>
|
|
<p>The vulnerability has been confirmed in version 3.0.9 and
|
|
has also been reported in prior versions.</p>
|
|
<p>Provided and/or discovered by:
|
|
Paul Craig, Security-Assessment.com.</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<url>http://secunia.com/advisories/19246/</url>
|
|
</references>
|
|
<dates>
|
|
<discovery>2006-03-15</discovery>
|
|
<entry>2006-03-15</entry>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="83421018-b3ef-11da-a32d-000c6ec775d9">
|
|
<topic>linux-flashplugin -- arbitrary code execution vulnerability</topic>
|
|
<affects>
|
|
<package>
|
|
<name>linux-flashplugin</name>
|
|
<range><lt>7.0r63</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>Adobe reports:</p>
|
|
<blockquote cite="http://www.macromedia.com/devnet/security/security_zone/apsb06-03.html">
|
|
<p>Critical vulnerabilities have been identified in Flash
|
|
Player that could allow an attacker who successfully
|
|
exploits these vulnerabilities to take control of the
|
|
affected system. A malicious SWF must be loaded in Flash
|
|
Player by the user for an attacker to exploit these
|
|
vulnerabilities.</p>
|
|
<p>Flash Player 8 update (8.0.24.0), and Flash Player 7
|
|
update (7.0.63.0) address security vulnerabilities in
|
|
previous versions of Flash Player, which could lead to the
|
|
potential execution of arbitrary code. These
|
|
vulnerabilities could be accessed through content
|
|
delivered from a remote location via the users web
|
|
browser, email client, or other applications that include
|
|
or reference the Flash Player.</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<cvename>CVE-2006-0024</cvename>
|
|
<url>http://www.macromedia.com/devnet/security/security_zone/apsb06-03.html</url>
|
|
</references>
|
|
<dates>
|
|
<discovery>2006-03-14</discovery>
|
|
<entry>2006-03-15</entry>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="6111ecb8-b20d-11da-b2fb-000e0c2e438a">
|
|
<topic>nfs -- remote denial of service</topic>
|
|
<affects>
|
|
<package>
|
|
<name>FreeBSD</name>
|
|
<range><ge>6.0</ge><lt>6.0_5</lt></range>
|
|
<range><ge>5.4</ge><lt>5.4_12</lt></range>
|
|
<range><ge>5.3</ge><lt>5.3_27</lt></range>
|
|
<range><ge>4.11</ge><lt>4.11_15</lt></range>
|
|
<range><ge>4.10</ge><lt>4.10_21</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<h1>Problem description:</h1>
|
|
<p>A part of the NFS server code charged with handling incoming
|
|
RPC messages via TCP had an error which, when the server
|
|
received a message with a zero-length payload, would cause a
|
|
NULL pointer dereference which results in a kernel panic. The
|
|
kernel will only process the RPC messages if a userland nfsd
|
|
daemon is running.</p>
|
|
<h1>Impact:</h1>
|
|
<p>The NULL pointer deference allows a remote attacker capable
|
|
of sending RPC messages to an affected FreeBSD system to crash
|
|
the FreeBSD system.</p>
|
|
<h1>Workaround:</h1>
|
|
<ol>
|
|
<li>
|
|
<p>Disable the NFS server: set the nfs_server_enable
|
|
variable to "NO" in /etc/rc.conf, and reboot.</p>
|
|
<p>Alternatively, if there are no active NFS clients (as
|
|
listed by the showmount(8) utility), simply killing the
|
|
mountd and nfsd processes should suffice.</p>
|
|
</li>
|
|
<li>
|
|
<p>Add firewall rules to block RPC traffic to the NFS server
|
|
from untrusted hosts.</p>
|
|
</li>
|
|
</ol>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<cvename>CVE-2006-0900</cvename>
|
|
<freebsdsa>SA-06:10.nfs</freebsdsa>
|
|
</references>
|
|
<dates>
|
|
<discovery>2006-03-01</discovery>
|
|
<entry>2006-03-12</entry>
|
|
<modified>2016-08-09</modified>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="6a308e8e-b1b4-11da-b2fb-000e0c2e438a">
|
|
<topic>openssh -- remote denial of service</topic>
|
|
<affects>
|
|
<package>
|
|
<name>FreeBSD</name>
|
|
<range><ge>5.4</ge><lt>5.4_12</lt></range>
|
|
<range><ge>5.3</ge><lt>5.3_27</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<h1>Problem description:</h1>
|
|
<p>Because OpenSSH and OpenPAM have conflicting designs (one is event-
|
|
driven while the other is callback-driven), it is necessary for
|
|
OpenSSH to fork a child process to handle calls to the PAM framework.
|
|
However, if the unprivileged child terminates while PAM authentication
|
|
is under way, the parent process incorrectly believes that the PAM
|
|
child also terminated. The parent process then terminates, and the
|
|
PAM child is left behind.</p>
|
|
<p>Due to the way OpenSSH performs internal accounting, these orphaned
|
|
PAM children are counted as pending connections by the master OpenSSH
|
|
server process. Once a certain number of orphans has accumulated, the
|
|
master decides that it is overloaded and stops accepting client
|
|
connections.</p>
|
|
<h1>Impact:</h1>
|
|
<p>By repeatedly connecting to a vulnerable server, waiting for
|
|
a password prompt, and closing the connection, an attacker can
|
|
cause OpenSSH to stop accepting client connections until the
|
|
system restarts or an administrator manually kills the orphaned
|
|
PAM processes.</p>
|
|
<h1>Workaround:</h1>
|
|
<p>The following command will show a list of orphaned PAM
|
|
processes:</p>
|
|
<pre># pgrep -lf 'sshd.*\[pam\]'</pre>
|
|
<p>The following command will kill orphaned PAM processes:</p>
|
|
<pre># pkill -f 'sshd.*\[pam\]'</pre>
|
|
<p>To prevent OpenSSH from leaving orphaned PAM processes behind,
|
|
perform one of the following:</p>
|
|
<ol>
|
|
<li>
|
|
<p>Disable PAM authentication in OpenSSH. Users will still
|
|
be able to log in using their Unix password, OPIE or SSH
|
|
keys.</p>
|
|
<p>To do this, execute the following commands as root:</p>
|
|
<pre># echo 'UsePAM no' >>/etc/ssh/sshd_config</pre>
|
|
<pre># echo 'PasswordAuthentication yes' >>/etc/ssh/sshd_config</pre>
|
|
<pre># /etc/rc.d/sshd restart</pre>
|
|
</li>
|
|
<li>
|
|
<p>If disabling PAM is not an option - if, for instance, you use
|
|
RADIUS authentication, or store user passwords in an SQL database
|
|
- you may instead disable privilege separation. However, this may
|
|
leave OpenSSH vulnerable to hitherto unknown bugs, and should be
|
|
considered a last resort.</p>
|
|
<p>To do this, execute the following commands as root:</p>
|
|
<pre># echo 'UsePrivilegeSeparation no' >>/etc/ssh/sshd_config</pre>
|
|
<pre># /etc/rc.d/sshd restart</pre>
|
|
</li>
|
|
</ol>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<cvename>CVE-2006-0883</cvename>
|
|
<freebsdsa>SA-06:09.openssh</freebsdsa>
|
|
</references>
|
|
<dates>
|
|
<discovery>2006-03-01</discovery>
|
|
<entry>2006-03-12</entry>
|
|
<modified>2016-08-09</modified>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="948921ad-afbc-11da-bad9-02e081235dab">
|
|
<topic>GnuPG does not detect injection of unsigned data</topic>
|
|
<affects>
|
|
<package>
|
|
<name>gnupg</name>
|
|
<range><lt>1.4.2.2</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>Werner Koch reports:</p>
|
|
<blockquote cite="http://lists.gnupg.org/pipermail/gnupg-announce/2006q1/000216.html">
|
|
<p>In the aftermath of the false positive signature
|
|
verfication bug (announced 2006-02-15) more thorough testing
|
|
of the fix has been done and another vulnerability has been
|
|
detected. This new problem affects the use of *gpg* for
|
|
verification of signatures which are _not_ detached
|
|
signatures. The problem also affects verification of
|
|
signatures embedded in encrypted messages; i.e. standard use
|
|
of gpg for mails.</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<cvename>CVE-2006-0049</cvename>
|
|
<mlist msgid="87d5gvh2kr.fsf@wheatstone.g10code.de">http://lists.gnupg.org/pipermail/gnupg-announce/2006q1/000216.html</mlist>
|
|
</references>
|
|
<dates>
|
|
<discovery>2006-03-09</discovery>
|
|
<entry>2006-03-10</entry>
|
|
<modified>2006-03-11</modified>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="104beb63-af4d-11da-8414-0013d4a4a40e">
|
|
<topic>mplayer -- heap overflow in the ASF demuxer</topic>
|
|
<affects>
|
|
<package>
|
|
<name>mplayer</name>
|
|
<name>mplayer-gtk</name>
|
|
<name>mplayer-esound</name>
|
|
<name>mplayer-gtk-esound</name>
|
|
<range><lt>0.99.7_11</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>The Mplayer team reports:</p>
|
|
<blockquote cite="http://www.mplayerhq.hu/design7/news.html#vuln13">
|
|
<p>A potential buffer overflow was found in the ASF demuxer.
|
|
Arbitrary remote code execution is possible (under the user ID
|
|
running the player) when streaming an ASF file from a malicious
|
|
server or local code execution (under the user ID running the
|
|
player) if a malicious ASF file is played locally.</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<cvename>CVE-2006-0579</cvename>
|
|
<url>http://www.mplayerhq.hu/design7/news.html#vuln13</url>
|
|
<url>http://secunia.com/advisories/18718</url>
|
|
<url>http://bugs.gentoo.org/show_bug.cgi?id=122029</url>
|
|
</references>
|
|
<dates>
|
|
<discovery>2006-02-15</discovery>
|
|
<entry>2006-03-09</entry>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="594ad3c5-a39b-11da-926c-0800209adf0e">
|
|
<topic>SSH.COM SFTP server -- format string vulnerability</topic>
|
|
<affects>
|
|
<package>
|
|
<name>ssh2</name>
|
|
<name>ssh2-nox11</name>
|
|
<range><lt>3.2.9.1_5</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>SSH Communications Security Corp reports a format string
|
|
vulnerability in their SFTP server. This vulnerability could
|
|
cause a user with SCP/SFTP access only to get permission to
|
|
execute also other commands. It could also allow user A to
|
|
create a special file that when accessed by user B allows
|
|
user A to execute commands as user B.</p>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<cvename>CVE-2006-0705</cvename>
|
|
<bid>16640</bid>
|
|
<url>http://www.ssh.com/company/newsroom/article/715/</url>
|
|
<url>http://www.frsirt.com/english/advisories/2006/0554</url>
|
|
<url>http://securitytracker.com/id?1015619</url>
|
|
<url>http://secunia.com/advisories/18828</url>
|
|
<url>http://xforce.iss.net/xforce/xfdb/24651</url>
|
|
</references>
|
|
<dates>
|
|
<discovery>2006-02-13</discovery>
|
|
<entry>2006-03-04</entry>
|
|
<modified>2006-03-06</modified>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="6107efb9-aae3-11da-aea1-000854d03344">
|
|
<topic>gtar -- invalid headers buffer overflow</topic>
|
|
<affects>
|
|
<package>
|
|
<name>gtar</name>
|
|
<range><lt>1.15.1_2</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>GNU tar is vulnerable to a buffer overflow, caused by
|
|
improper bounds checking of the PAX extended headers. By
|
|
tricking an user into processing a specially crafted tar
|
|
archive, this could be exploited to execute arbitrary
|
|
code with the privileges of the user.</p>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<bid>16764</bid>
|
|
<cvename>CVE-2006-0300</cvename>
|
|
</references>
|
|
<dates>
|
|
<discovery>2006-02-22</discovery>
|
|
<entry>2006-03-03</entry>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="46f7b598-a781-11da-906a-fde5cdde365e">
|
|
<topic>bugzilla -- multiple vulnerabilities</topic>
|
|
<affects>
|
|
<package>
|
|
<name>bugzilla</name>
|
|
<name>ja-bugzilla</name>
|
|
<range><ge>2.17.1</ge><lt>2.20.1</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>Some vulnerabilities have been reported in Bugzilla,
|
|
which can be exploited by malicious users to conduct SQL injection
|
|
attacks, and by malicious people to disclose sensitive information
|
|
and conduct script insertion attacks.</p>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<cvename>CVE-2006-2420</cvename>
|
|
<cvename>CVE-2006-0916</cvename>
|
|
<cvename>CVE-2006-0915</cvename>
|
|
<cvename>CVE-2006-0914</cvename>
|
|
<cvename>CVE-2006-0913</cvename>
|
|
<url>http://www.bugzilla.org/security/2.18.4/</url>
|
|
</references>
|
|
<dates>
|
|
<discovery>2006-02-20</discovery>
|
|
<entry>2006-02-27</entry>
|
|
<modified>2006-11-11</modified>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="af9018b6-a4f5-11da-bb41-0011433a9404">
|
|
<topic>squirrelmail -- multiple vulnerabilities</topic>
|
|
<affects>
|
|
<package>
|
|
<name>squirrelmail</name>
|
|
<range><lt>1.4.6</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>Multiple vulnerabilities has been discovered since 1.4.5,
|
|
including IMAP injection as well as some XSS issues.</p>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<cvename>CVE-2006-0377</cvename>
|
|
<cvename>CVE-2006-0195</cvename>
|
|
<cvename>CVE-2006-0188</cvename>
|
|
</references>
|
|
<dates>
|
|
<discovery>2006-02-23</discovery>
|
|
<entry>2006-02-24</entry>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="e319da0b-a228-11da-b410-000e0c2e438a">
|
|
<topic>gedit -- format string vulnerability</topic>
|
|
<affects>
|
|
<package>
|
|
<name>gedit</name>
|
|
<range><lt>2.10.3</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>Yan Feng reports a format string vulnerability in gedit.
|
|
This vulnerability could cause a denial of service with a
|
|
binary file that contains format string characters within
|
|
the filename. It had been reported that web browsers
|
|
and email clients can be configured to provide a filename as
|
|
an argument to gedit.:</p>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<cvename>CAN-2005-1686</cvename>
|
|
<mlist msgid="20050520202628.12260.qmail@www.securityfocus.com">:http://marc.theaimsgroup.com/?l=bugtraq&m=111661117701398</mlist>
|
|
</references>
|
|
<dates>
|
|
<discovery>2005-05-20</discovery>
|
|
<entry>2006-02-20</entry>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="07ead557-a220-11da-b410-000e0c2e438a">
|
|
<topic>WebCalendar -- unauthorized access vulnerability</topic>
|
|
<affects>
|
|
<package>
|
|
<name>WebCalendar</name>
|
|
<range><lt>1.0.0</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>SecurityFocus reports that WebCalendar is affected by
|
|
an unauthorized access vulnerability. The vulnerability
|
|
is caused by improper checking of the authentication
|
|
mechanism before access is being permitted to the
|
|
"assistant_edit.php" file.</p>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<bid>14072</bid>
|
|
<cvename>CAN-2005-2320</cvename>
|
|
</references>
|
|
<dates>
|
|
<discovery>2005-06-27</discovery>
|
|
<entry>2006-02-20</entry>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="9cd52bc6-a213-11da-b410-000e0c2e438a">
|
|
<topic>abiword, koffice -- stack based buffer overflow vulnerabilities</topic>
|
|
<affects>
|
|
<package>
|
|
<name>koffice</name>
|
|
<range><gt>1.2.0</gt><lt>1.4.1_1,1</lt></range>
|
|
</package>
|
|
<package>
|
|
<name>abiword</name>
|
|
<range><lt>2.2.11</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>Chris Evans reports that AbiWord is vulnerable to multiple
|
|
stack-based buffer overflow vulnerabilities. This
|
|
is caused by improper checking of the user-supplied data
|
|
before it is being copied to an too small buffer. The
|
|
vulnerability is triggered when someone is importing RTF
|
|
files.</p>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<bid>15096</bid>
|
|
<cvename>CAN-2005-2972</cvename>
|
|
<url>http://scary.beasts.org/security/CESA-2005-006.txt</url>
|
|
<url>http://www.abisource.com/changelogs/2.2.11.phtml</url>
|
|
<url>http://www.kde.org/info/security/advisory-20051011-1.txt</url>
|
|
</references>
|
|
<dates>
|
|
<discovery>2005-10-14</discovery>
|
|
<entry>2006-02-20</entry>
|
|
<modified>2006-02-20</modified>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="0b2b4b4d-a07c-11da-be0a-000c6ec775d9">
|
|
<topic>postgresql81-server -- SET ROLE privilege escalation</topic>
|
|
<affects>
|
|
<package>
|
|
<name>postgresql-server</name>
|
|
<range><ge>8.1.0</ge><lt>8.1.3</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>The PostgreSQL team reports:</p>
|
|
<blockquote cite="http://www.postgresql.org/docs/8.1/static/release.html#RELEASE-8-1-3">
|
|
<p>Due to inadequate validity checking, a user could exploit
|
|
the special case that SET ROLE normally uses to restore
|
|
the previous role setting after an error. This allowed
|
|
ordinary users to acquire superuser status, for
|
|
example.</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<cvename>CVE-2006-0553</cvename>
|
|
<url>http://www.postgresql.org/docs/8.1/static/release.html#RELEASE-8-1-3</url>
|
|
</references>
|
|
<dates>
|
|
<discovery>2006-02-14</discovery>
|
|
<entry>2006-02-18</entry>
|
|
<modified>2006-08-13</modified>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="63fe4189-9f97-11da-ac32-0001020eed82">
|
|
<topic>gnupg -- false positive signature verification</topic>
|
|
<affects>
|
|
<package>
|
|
<name>gnupg</name>
|
|
<range><lt>1.4.2.1</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>Werner Koch reports:</p>
|
|
<blockquote cite="http://marc.theaimsgroup.com/?l=gnupg-devel&m=113999098729114">
|
|
<p>The Gentoo project identified a security related bug in
|
|
GnuPG. When using any current version of GnuPG for
|
|
unattended signature verification (e.g. by scripts and
|
|
mail programs), false positive signature verification of
|
|
detached signatures may occur.</p>
|
|
<p>This problem affects the tool *gpgv*, as well as using
|
|
"gpg --verify" to imitate gpgv, if only the exit code of
|
|
the process is used to decide whether a detached signature
|
|
is valid. This is a plausible mode of operation for
|
|
gpgv.</p>
|
|
<p>If, as suggested, the --status-fd generated output is
|
|
used to decide whether a signature is valid, no problem
|
|
exists. In particular applications making use of the
|
|
GPGME library[2] are not affected.</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<cvename>CVE-2006-0455</cvename>
|
|
<mlist msgid="87u0b1xdru.fsf@wheatstone.g10code.de">http://marc.theaimsgroup.com/?l=gnupg-devel&m=113999098729114</mlist>
|
|
</references>
|
|
<dates>
|
|
<discovery>2006-02-15</discovery>
|
|
<entry>2006-02-17</entry>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="e34d0c2e-9efb-11da-b410-000e0c2e438a">
|
|
<topic>rssh -- privilege escalation vulnerability</topic>
|
|
<affects>
|
|
<package>
|
|
<name>rssh</name>
|
|
<range><lt>2.3.0</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>Pizzashack reports:</p>
|
|
<blockquote cite="http://www.pizzashack.org/rssh/security.shtml">
|
|
<p>Max Vozeler has reported a problem whereby rssh can
|
|
allow users who have shell access to systems where rssh
|
|
is installed (and rssh_chroot_helper is installed SUID)
|
|
to gain root access to the system, due to the ability to
|
|
chroot to arbitrary locations. There are a lot of
|
|
potentially mitigating factors, but to be safe you should
|
|
upgrade immediately.</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<bid>16050</bid>
|
|
<cvename>CVE-2005-3345</cvename>
|
|
<url>http://www.pizzashack.org/rssh/security.shtml</url>
|
|
</references>
|
|
<dates>
|
|
<discovery>2005-12-18</discovery>
|
|
<entry>2006-02-16</entry>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="d38e1810-9ef7-11da-b410-000e0c2e438a">
|
|
<topic>tor -- malicious tor server can locate a hidden service</topic>
|
|
<affects>
|
|
<package>
|
|
<name>tor</name>
|
|
<range><lt>0.1.0.12</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>Roger Dingledine reports:</p>
|
|
<blockquote cite="http://archives.seul.org/or/announce/Jan-2006/msg00001.html">
|
|
<p>If you offer a Tor hidden service, an adversary who can
|
|
run a fast Tor server and who knows some basic statistics
|
|
can find the location of your hidden service in a matter of
|
|
minutes to hours.</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<cvename>CVE-2006-0414</cvename>
|
|
<url>http://archives.seul.org/or/announce/Jan-2006/msg00001.html</url>
|
|
</references>
|
|
<dates>
|
|
<discovery>2006-01-12</discovery>
|
|
<entry>2006-02-16</entry>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="1b725079-9ef6-11da-b410-000e0c2e438a">
|
|
<topic>sudo -- arbitrary command execution</topic>
|
|
<affects>
|
|
<package>
|
|
<name>sudo</name>
|
|
<range><lt>1.6.8.10</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>Tavis Ormandy reports:</p>
|
|
<blockquote cite="http://www.courtesan.com/sudo/alerts/bash_env.html">
|
|
<p>The bash shell uses the value of the PS4 environment
|
|
variable (after expansion) as a prefix for commands run
|
|
in execution trace mode. Execution trace mode (xtrace) is
|
|
normally set via bash's -x command line option or
|
|
interactively by running "set -o xtrace". However, it may
|
|
also be enabled by placing the string "xtrace" in the
|
|
SHELLOPTS environment variable before bash is started.</p>
|
|
<p>A malicious user with sudo access to a shell script that
|
|
uses bash can use this feature to run arbitrary commands
|
|
for each line of the script.</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<bid>15191</bid>
|
|
<cvename>CVE-2005-2959</cvename>
|
|
<url>http://www.courtesan.com/sudo/alerts/bash_env.html</url>
|
|
</references>
|
|
<dates>
|
|
<discovery>2005-10-25</discovery>
|
|
<entry>2006-02-16</entry>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="a78299e7-9ef3-11da-b410-000e0c2e438a">
|
|
<topic>libtomcrypt -- weak signature scheme with ECC keys</topic>
|
|
<affects>
|
|
<package>
|
|
<name>libtomcrypt</name>
|
|
<range><le>1.02</le></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>The Secure Science Corporation reports that libtomcrypt is
|
|
vulnerable to a weak signature scheme. This allows an
|
|
attacker to create a valid random signature and use that to
|
|
sign arbitrary messages without requiring the private key.</p>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<mlist msgid="4276CC31.9000307@securescience.net">http://marc.theaimsgroup.com/?l=bugtraq&m=111540819703204</mlist>
|
|
</references>
|
|
<dates>
|
|
<discovery>2005-05-01</discovery>
|
|
<entry>2006-02-16</entry>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="592815da-9eed-11da-b410-000e0c2e438a">
|
|
<topic>mantis -- "view_filters_page.php" cross site scripting vulnerability</topic>
|
|
<affects>
|
|
<package>
|
|
<name>mantis</name>
|
|
<range><lt>1.0.0a4</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>r0t reports:</p>
|
|
<blockquote cite="http://pridels.blogspot.com/2005/12/mantis-bugtracking-system-xss-vuln.html">
|
|
<p>Mantis contains a flaw that allows a remote cross site
|
|
scripting attack. This flaw exists because input passed to
|
|
"target_field" parameter in "view_filters_page.php" is not
|
|
properly sanitised before being returned to the user. This
|
|
could allow a user to create a specially crafted URL that
|
|
would execute arbitrary code in a user's browser within the
|
|
trust relationship between the browser and the server,
|
|
leading to a loss of integrity.</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<cvename>CAN-2005-4238</cvename>
|
|
<url>http://pridels.blogspot.com/2005/12/mantis-bugtracking-system-xss-vuln.html</url>
|
|
</references>
|
|
<dates>
|
|
<discovery>2005-12-13</discovery>
|
|
<entry>2006-02-16</entry>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="28c9243a-72ed-11da-8c1d-000e0c2e438a">
|
|
<topic>phpbb -- multiple vulnerabilities</topic>
|
|
<affects>
|
|
<package>
|
|
<name>phpbb</name>
|
|
<name>zh-phpbb-tw</name>
|
|
<range><lt>2.0.18</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>Multiple vulnerabilities have been reported within phpbb.
|
|
phpbb is proven vulnerable to:</p>
|
|
<ul>
|
|
<li>script insertion,</li>
|
|
<li>bypassing of protetion mechanisms,</li>
|
|
<li>multiple cross site scripting vulnerabilities,</li>
|
|
<li>SQL injection,</li>
|
|
<li>arbitrary code execution</li>
|
|
</ul>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<bid>15170</bid>
|
|
<bid>15243</bid>
|
|
<cvename>CVE-2005-3310</cvename>
|
|
<cvename>CVE-2005-3415</cvename>
|
|
<cvename>CVE-2005-3416</cvename>
|
|
<cvename>CVE-2005-3417</cvename>
|
|
<cvename>CVE-2005-3418</cvename>
|
|
<cvename>CVE-2005-3419</cvename>
|
|
<cvename>CVE-2005-3420</cvename>
|
|
<cvename>CVE-2005-3536</cvename>
|
|
<cvename>CVE-2005-3537</cvename>
|
|
<mlist msgid="20051022132217.10390.qmail@securityfocus.com">http://marc.theaimsgroup.com/?l=bugtraq&m=113017003617987</mlist>
|
|
<url>http://www.hardened-php.net/advisory_172005.75.html</url>
|
|
</references>
|
|
<dates>
|
|
<discovery>2005-10-24</discovery>
|
|
<entry>2006-02-16</entry>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="486aff57-9ecd-11da-b410-000e0c2e438a">
|
|
<topic>postgresql -- character conversion and tsearch2 vulnerabilities</topic>
|
|
<affects>
|
|
<package>
|
|
<name>postgresql</name>
|
|
<range><ge>7.2.0</ge><lt>7.2.8</lt></range>
|
|
<range><ge>7.3.0</ge><lt>7.3.10</lt></range>
|
|
<range><ge>7.4.0</ge><lt>7.4.8</lt></range>
|
|
<range><ge>8.0.0</ge><lt>8.0.3</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>The postgresql development team reports:</p>
|
|
<blockquote cite="http://www.postgresql.org/about/news.315">
|
|
<p>The more severe of the two errors is that the functions
|
|
that support client-to-server character set conversion
|
|
can be called from SQL commands by unprivileged users,
|
|
but these functions are not designed to be safe against
|
|
malicious choices of argument values. This problem exists
|
|
in PostgreSQL 7.3.* through 8.0.*. The recommended fix is
|
|
to disable public EXECUTE access for these functions. This
|
|
does not affect normal usage of the functions for character
|
|
set conversion, but it will prevent misuse.</p>
|
|
<p>The other error is that the contrib/tsearch2 module
|
|
misdeclares several functions as returning type "internal"
|
|
when they do not have any "internal" argument. This breaks
|
|
the type safety of "internal" by allowing users to
|
|
construct SQL commands that invoke other functions accepting
|
|
"internal" arguments. The consequences of this have not been
|
|
investigated in detail, but it is certainly at least possible
|
|
to crash the backend.</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<cvename>CAN-2005-1409</cvename>
|
|
<cvename>CAN-2005-1410</cvename>
|
|
<url>http://www.postgresql.org/about/news.315</url>
|
|
</references>
|
|
<dates>
|
|
<discovery>2005-05-02</discovery>
|
|
<entry>2006-02-16</entry>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="f6447303-9ec9-11da-b410-000e0c2e438a">
|
|
<topic>heartbeat -- insecure temporary file creation vulnerability</topic>
|
|
<affects>
|
|
<package>
|
|
<name>heartbeat</name>
|
|
<range><lt>1.2.4</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>Eric Romang reports a temporary file creation vulnerability
|
|
within heartbeat. The vulnerability is caused by hardcoded
|
|
temporary file usage. This can cause an attacker to create
|
|
an arbitrary symlink causing the application to overwrite the
|
|
symlinked file with the permissions of the user executing the
|
|
application.</p>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<cvename>CAN-2005-2231</cvename>
|
|
<url>http://www.zataz.net/adviso/heartbeat-06272005.txt</url>
|
|
</references>
|
|
<dates>
|
|
<discovery>2005-07-12</discovery>
|
|
<entry>2006-02-16</entry>
|
|
<modified>2006-04-16</modified>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="432bf98d-9e25-11da-b410-000e0c2e438a">
|
|
<topic>kpdf -- heap based buffer overflow</topic>
|
|
<affects>
|
|
<package>
|
|
<name>kdegraphics</name>
|
|
<range><lt>3.5.1_1</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>The KDE team reports:</p>
|
|
<blockquote cite="http://www.kde.org/info/security/advisory-20060202-1.txt">
|
|
<p>kpdf, the KDE pdf viewer, shares code with xpdf. xpdf
|
|
contains a heap based buffer overflow in the splash
|
|
rasterizer engine that can crash kpdf or even execute
|
|
arbitrary code.</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<cvename>CVE-2006-0301</cvename>
|
|
<url>http://www.kde.org/info/security/advisory-20060202-1.txt</url>
|
|
</references>
|
|
<dates>
|
|
<discovery>2006-02-02</discovery>
|
|
<entry>2006-02-15</entry>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="bb33981a-7ac6-11da-bf72-00123f589060">
|
|
<topic>perl, webmin, usermin -- perl format string integer wrap vulnerability</topic>
|
|
<affects>
|
|
<package>
|
|
<name>perl</name>
|
|
<range><ge>5.6.0</ge><lt>5.6.2</lt></range>
|
|
<range><ge>5.8.0</ge><lt>5.8.7_1</lt></range>
|
|
</package>
|
|
<package>
|
|
<name>webmin</name>
|
|
<range><lt>1.250</lt></range>
|
|
</package>
|
|
<package>
|
|
<name>usermin</name>
|
|
<range><lt>1.180</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>The Perl Development page reports:</p>
|
|
<blockquote cite="http://dev.perl.org/perl5/news/2005/perl_patches_fix_sprintf_buffer.html">
|
|
<p>Dyad Security recently released a security advisory explaining how
|
|
in certain cases, a carefully crafted format string passed to
|
|
sprintf can cause a buffer overflow. This buffer overflow can then
|
|
be used by an attacker to execute code on the machine. This was
|
|
discovered in the context of a design problem with the Webmin
|
|
administration package that allowed a malicious user to pass
|
|
unchecked data into sprintf.</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<bid>15629</bid>
|
|
<cvename>CVE-2005-3912</cvename>
|
|
<cvename>CVE-2005-3962</cvename>
|
|
<url>http://dev.perl.org/perl5/news/2005/perl_patches_fix_sprintf_buffer.html</url>
|
|
<url>http://www.dyadsecurity.com/perl-0002.html</url>
|
|
<url>http://www.dyadsecurity.com/webmin-0001.html</url>
|
|
<url>http://www.webmin.com/security.html</url>
|
|
</references>
|
|
<dates>
|
|
<discovery>2005-09-23</discovery>
|
|
<entry>2006-02-15</entry>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="12f9d9e9-9e1e-11da-b410-000e0c2e438a">
|
|
<topic>phpicalendar -- cross site scripting vulnerability</topic>
|
|
<affects>
|
|
<package>
|
|
<name>phpicalendar</name>
|
|
<range><lt>2.1</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>Francesco Ongaro reports that phpicalendar is vulnerable for
|
|
a cross site scripting attack. The vulnerability is caused by
|
|
improper validation of the index.php file allowing attackers
|
|
to include an arbitrary file with the .php extension</p>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<bid>15193</bid>
|
|
<cvename>CVE-2005-3366</cvename>
|
|
<url>http://www.ush.it/2005/10/25/php-icalendar-css/</url>
|
|
</references>
|
|
<dates>
|
|
<discovery>2005-10-25</discovery>
|
|
<entry>2006-02-15</entry>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="f1f163ce-9e09-11da-b410-000e0c2e438a">
|
|
<topic>phpicalendar -- file disclosure vulnerability</topic>
|
|
<affects>
|
|
<package>
|
|
<name>phpicalendar</name>
|
|
<range><lt>2.21</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>The phpicalendar team reports that there is an
|
|
unspecified vulnerability within phpicalendar. This
|
|
seems to be a file disclosure vulnerability caused by
|
|
improper checking of the template parsing function.
|
|
This would allow an attacker to disclose any file
|
|
readable by the user under which the webserver runs.</p>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<url>http://phpicalendar.net/forums/viewtopic.php?t=396</url>
|
|
</references>
|
|
<dates>
|
|
<discovery>2006-02-08</discovery>
|
|
<entry>2006-02-15</entry>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="dfb71c00-9d44-11da-8c1d-000e0c2e438a">
|
|
<topic>FreeBSD -- Infinite loop in SACK handling</topic>
|
|
<affects>
|
|
<package>
|
|
<name>FreeBSD</name>
|
|
<range><ge>5.4</ge><lt>5.4_11</lt></range>
|
|
<range><ge>5.3</ge><lt>5.3_26</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>Problem description:</p>
|
|
<p>When insufficient memory is available to handle an
|
|
incoming selective acknowledgement, the TCP/IP stack may
|
|
enter an infinite loop.</p>
|
|
<p>Impact:</p>
|
|
<p>By opening a TCP connection and sending a carefully crafted
|
|
series of packets, an attacker may be able to cause a denial
|
|
of service.</p>
|
|
<p>Workaround:</p>
|
|
<p>On FreeBSD 5.4, the net.inet.tcp.sack.enable sysctl can be used to
|
|
disable the use of SACK:</p>
|
|
<p># sysctl net.inet.tcp.sack.enable=0</p>
|
|
<p>No workaround is available for FreeBSD 5.3.</p>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<cvename>CVE-2006-0433</cvename>
|
|
<freebsdsa>SA-06:08.sack</freebsdsa>
|
|
</references>
|
|
<dates>
|
|
<discovery>2006-02-01</discovery>
|
|
<entry>2006-02-14</entry>
|
|
<modified>2016-08-09</modified>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="52ba7713-9d42-11da-8c1d-000e0c2e438a">
|
|
<topic>pf -- IP fragment handling panic</topic>
|
|
<affects>
|
|
<package>
|
|
<name>FreeBSD</name>
|
|
<range><ge>6.0</ge><lt>6.0_4</lt></range>
|
|
<range><ge>5.4</ge><lt>5.4_10</lt></range>
|
|
<range><ge>5.3</ge><lt>5.3_25</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>Problem description:</p>
|
|
<p>A logic bug in pf's IP fragment cache may result in a packet
|
|
fragment being inserted twice, violating a kernel
|
|
invariant.</p>
|
|
<p>Impact:</p>
|
|
<p>By sending carefully crafted sequence of IP packet fragments,
|
|
a remote attacker can cause a system running pf with a ruleset
|
|
containing a 'scrub fragment crop' or 'scrub fragment
|
|
drop-ovl' rule to crash.</p>
|
|
<p>Workaround:</p>
|
|
<p>Do not use 'scrub fragment crop' or 'scrub fragment drop-ovl'
|
|
rules on systems running pf. In most cases, such rules can be
|
|
replaced by 'scrub fragment reassemble' rules; see the
|
|
pf.conf(5) manual page for more details.</p>
|
|
|
|
<p>Systems which do not use pf, or use pf but do not use the
|
|
aforementioned rules, are not affected by this issue.</p>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<cvename>CVE-2006-0381</cvename>
|
|
<freebsdsa>SA-06:07.pf</freebsdsa>
|
|
</references>
|
|
<dates>
|
|
<discovery>2006-01-25</discovery>
|
|
<entry>2006-02-14</entry>
|
|
<modified>2016-08-09</modified>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="7a4f2aca-9d40-11da-8c1d-000e0c2e438a">
|
|
<topic>FreeBSD -- Local kernel memory disclosure</topic>
|
|
<affects>
|
|
<package>
|
|
<name>FreeBSD</name>
|
|
<range><ge>6.0</ge><lt>6.0_4</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>Problem description:</p>
|
|
<p>A buffer allocated from the kernel stack may not be completely
|
|
initialized before being copied to userland. [CVE-2006-0379]</p>
|
|
<p>A logic error in computing a buffer length may allow too much
|
|
data to be copied into userland. [CVE-2006-0380]</p>
|
|
<p>Impact:</p>
|
|
<p>Portions of kernel memory may be disclosed to local users.
|
|
Such memory might contain sensitive information, such as
|
|
portions of the file cache or terminal buffers. This
|
|
information might be directly useful, or it might be
|
|
leveraged to obtain elevated privileges in some way. For
|
|
example, a terminal buffer might include a user-entered
|
|
password.</p>
|
|
<p>Workaround:</p>
|
|
<p>No workaround is available.</p>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<cvename>CVE-2006-0379</cvename>
|
|
<cvename>CVE-2006-0380</cvename>
|
|
<freebsdsa>SA-06:06.kmem</freebsdsa>
|
|
</references>
|
|
<dates>
|
|
<discovery>2006-01-25</discovery>
|
|
<entry>2006-02-14</entry>
|
|
<modified>2016-08-09</modified>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="dade3316-9d31-11da-8c1d-000e0c2e438a">
|
|
<topic>IEEE 802.11 -- buffer overflow</topic>
|
|
<affects>
|
|
<package>
|
|
<name>FreeBSD</name>
|
|
<range><ge>6.0</ge><lt>6.0_3</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>Problem description:</p>
|
|
<p>An integer overflow in the handling of corrupt IEEE 802.11
|
|
beacon or probe response frames when scanning for existing
|
|
wireless networks can result in the frame overflowing a
|
|
buffer.</p>
|
|
<p>Impact:</p>
|
|
<p>An attacker able broadcast a carefully crafted beacon or
|
|
probe response frame may be able to execute arbitrary code
|
|
within the context of the FreeBSD kernel on any system
|
|
scanning for wireless networks.</p>
|
|
<p>Workaround:</p>
|
|
<p>No workaround is available, but systems without IEEE 802.11
|
|
hardware or drivers loaded are not vulnerable.</p>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<cvename>CVE-2006-0226</cvename>
|
|
<freebsdsa>SA-06:05.80211</freebsdsa>
|
|
</references>
|
|
<dates>
|
|
<discovery>2006-01-18</discovery>
|
|
<entry>2006-02-14</entry>
|
|
<modified>2016-08-09</modified>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="d7c1d00d-9d2e-11da-8c1d-000e0c2e438a">
|
|
<topic>ipfw -- IP fragment denial of service</topic>
|
|
<affects>
|
|
<package>
|
|
<name>FreeBSD</name>
|
|
<range><ge>6.0</ge><lt>6.0_2</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>Problem description:</p>
|
|
<p>The firewall maintains a pointer to layer 4 header
|
|
information in the event that it needs to send a TCP reset
|
|
or ICMP error message to discard packets. Due to incorrect
|
|
handling of IP fragments, this pointer fails to get
|
|
initialized.</p>
|
|
<p>Impact:</p>
|
|
<p>An attacker can cause the firewall to crash by sending ICMP
|
|
IP fragments to or through firewalls which match any reset,
|
|
reject or unreach actions.</p>
|
|
<p>Workaround:</p>
|
|
<p>Change any reset, reject or unreach actions to deny. It
|
|
should be noted that this will result in packets being
|
|
silently discarded.</p>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<cvename>CVE-2006-0054</cvename>
|
|
<freebsdsa>SA-06:04.ipfw</freebsdsa>
|
|
</references>
|
|
<dates>
|
|
<discovery>2006-01-11</discovery>
|
|
<entry>2006-02-14</entry>
|
|
<modified>2016-08-09</modified>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="1613db79-8e52-11da-8426-000fea0a9611">
|
|
<topic>kpopup -- local root exploit and local denial of service</topic>
|
|
<affects>
|
|
<package>
|
|
<name>kpopup</name>
|
|
<range><ge>0.9.1</ge><le>0.9.5</le></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>Mitre CVE reports:</p>
|
|
<blockquote cite="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-1170">
|
|
<p>Format string vulnerability in main.cpp in kpopup
|
|
0.9.1-0.9.5pre2 allows local users to cause a denial of
|
|
service (segmentation fault) and possibly execute
|
|
arbitrary code via format string specifiers in command
|
|
line arguments.</p>
|
|
</blockquote>
|
|
<blockquote cite="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-1167">
|
|
<p>misc.cpp in KPopup 0.9.1 trusts the PATH variable when
|
|
executing killall, which allows local users to elevate
|
|
their privileges by modifying the PATH variable to
|
|
reference a malicious killall program.</p>
|
|
</blockquote>
|
|
<p>SecurityFocus credits "b0f" b0fnet@yahoo.com</p>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<cvename>CVE-2003-1170</cvename>
|
|
<bid>8918</bid>
|
|
<cvename>CVE-2003-1167</cvename>
|
|
<bid>8915</bid>
|
|
<url>http://www.securityfocus.com/archive/1/342736</url>
|
|
<url>http://www.henschelsoft.de/kpopup_en.html</url>
|
|
</references>
|
|
<dates>
|
|
<discovery>2003-10-28</discovery>
|
|
<entry>2006-02-07</entry>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="6b0215ae-8f26-11da-8c1d-000e0c2e438a">
|
|
<topic>cpio -- multiple vulnerabilities</topic>
|
|
<affects>
|
|
<package>
|
|
<name>FreeBSD</name>
|
|
<range><ge>6.0</ge><lt>6.0_2</lt></range>
|
|
<range><ge>5.4</ge><lt>5.4_9</lt></range>
|
|
<range><ge>5.3</ge><lt>5.3_24</lt></range>
|
|
<range><ge>4.11</ge><lt>4.11_14</lt></range>
|
|
<range><ge>4.10</ge><lt>4.10_20</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>Problem description:</p>
|
|
<p>A number of issues has been discovered in cpio:</p>
|
|
<p>When creating a new file, cpio closes the file before setting
|
|
its permissions. (CVE-2005-1111)</p>
|
|
<p>When extracting files cpio does not properly sanitize file
|
|
names to filter out ".." components, even if the
|
|
--no-absolute-filenames option is used. (CVE-2005-1229)</p>
|
|
<p>When adding large files (larger than 4 GB) to a cpio archive
|
|
on 64-bit platforms an internal buffer might overflow.
|
|
(CVE-2005-4268)</p>
|
|
<p>Impact</p>
|
|
<p>The first problem can allow a local attacker to change the
|
|
permissions of files owned by the user executing cpio providing
|
|
that they have write access to the directory in which the file
|
|
is being extracted. (CVE-2005-1111)</p>
|
|
<p>The lack of proper file name sanitation can allow an attacker
|
|
to overwrite arbitrary local files when extracting files from
|
|
a cpio archive. (CVE-2005-1229)</p>
|
|
<p>The buffer-overflow on 64-bit platforms could lead cpio to a
|
|
Denial-of-Service situation (crash) or possibly execute
|
|
arbitrary code with the permissions of the user running
|
|
cpio. (CVE-2005-4268)</p>
|
|
<p>Workaround</p>
|
|
<p>Use a different utility to create and extract cpio archives,
|
|
for example pax(1) or (on FreeBSD 5.3 or later) tar(1). If
|
|
this is not possible, do not extract untrusted archives and
|
|
when running on 64-bit platforms do not add untrusted files
|
|
to cpio archives.</p>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<cvename>CVE-2005-1111</cvename>
|
|
<cvename>CVE-2005-1229</cvename>
|
|
<cvename>CVE-2005-4268</cvename>
|
|
<freebsdsa>SA-06:03.cpio</freebsdsa>
|
|
</references>
|
|
<dates>
|
|
<discovery>2006-01-11</discovery>
|
|
<entry>2006-01-27</entry>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="726dd9bd-8f25-11da-8c1d-000e0c2e438a">
|
|
<topic>ee -- temporary file privilege escalation</topic>
|
|
<affects>
|
|
<package>
|
|
<name>FreeBSD</name>
|
|
<range><ge>6.0</ge><lt>6.0_2</lt></range>
|
|
<range><ge>5.4</ge><lt>5.4_9</lt></range>
|
|
<range><ge>5.3</ge><lt>5.3_24</lt></range>
|
|
<range><ge>4.11</ge><lt>4.11_14</lt></range>
|
|
<range><ge>4.10</ge><lt>4.10_20</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>Problem description</p>
|
|
<p>The ispell_op function used by ee(1) while executing spell
|
|
check operations employs an insecure method of temporary file
|
|
generation. This method produces predictable file names based
|
|
on the process ID and fails to confirm which path will be over
|
|
written with the user.<br/>
|
|
It should be noted that ispell does not have to be installed
|
|
in order for this to be exploited. The option simply needs to
|
|
be selected.</p>
|
|
<p>Impact</p>
|
|
<p>These predictable temporary file names are problematic
|
|
because they allow an attacker to take advantage of a race
|
|
condition in order to execute a symlink attack, which could
|
|
allow them to overwrite files on the system in the context of
|
|
the user running the ee(1) editor.</p>
|
|
<p>Workaround</p>
|
|
<p>Instead of invoking ispell through ee(1), invoke it directly.</p>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<bid>16207</bid>
|
|
<cvename>CVE-2006-0055</cvename>
|
|
<freebsdsa>SA-06:02.ee</freebsdsa>
|
|
</references>
|
|
<dates>
|
|
<discovery>2006-01-11</discovery>
|
|
<entry>2006-01-27</entry>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="c01a25f5-8f20-11da-8c1d-000e0c2e438a">
|
|
<topic>texindex -- temporary file privilege escalation</topic>
|
|
<affects>
|
|
<package>
|
|
<name>FreeBSD</name>
|
|
<range><ge>6.0</ge><lt>6.0_2</lt></range>
|
|
<range><ge>5.4</ge><lt>5.4_9</lt></range>
|
|
<range><ge>5.3</ge><lt>5.3_24</lt></range>
|
|
<range><ge>4.11</ge><lt>4.11_14</lt></range>
|
|
<range><ge>4.10</ge><lt>4.10_20</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>Problem description</p>
|
|
<p>The "sort_offline" function used by texindex(1) employs the
|
|
"maketempname" function, which produces predictable file names
|
|
and fails to validate that the paths do not exist.</p>
|
|
<p>Impact</p>
|
|
<p>These predictable temporary file names are problematic because
|
|
they allow an attacker to take advantage of a race condition in
|
|
order to execute a symlink attack, which could enable them to
|
|
overwrite files on the system in the context of the user running
|
|
the texindex(1) utility.</p>
|
|
<p>Workaround</p>
|
|
<p>No workaround is available, but the problematic code is only
|
|
executed if the input file being processed is 500kB or more in
|
|
length; as a result, users working with documents of less than
|
|
several hundred pages are very unlikely to be affected.</p>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<bid>14854</bid>
|
|
<cvename>CAN-2005-3011</cvename>
|
|
<freebsdsa>SA-06:01.texindex</freebsdsa>
|
|
</references>
|
|
<dates>
|
|
<discovery>2006-01-11</discovery>
|
|
<entry>2006-01-27</entry>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="c5c17ead-8f23-11da-8c1d-000e0c2e438a">
|
|
<topic>cvsbug -- race condition</topic>
|
|
<affects>
|
|
<package>
|
|
<name>FreeBSD</name>
|
|
<range><ge>5.4</ge><lt>5.4_7</lt></range>
|
|
<range><ge>5.3</ge><lt>5.3_22</lt></range>
|
|
<range><ge>4.11</ge><lt>4.11_12</lt></range>
|
|
<range><ge>4.10</ge><lt>4.10_18</lt></range>
|
|
</package>
|
|
<package>
|
|
<name>cvs+ipv6</name>
|
|
<range><lt>1.11.17_1</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>Problem description</p>
|
|
<p>A temporary file is created, used, deleted, and then
|
|
re-created with the same name. This creates a window during
|
|
which an attacker could replace the file with a link to
|
|
another file. While cvsbug(1) is based on the send-pr(1)
|
|
utility, this problem does not exist in the version of
|
|
send-pr(1) distributed with FreeBSD.<br/>
|
|
In FreeBSD 4.10 and 5.3, some additional problems exist
|
|
concerning temporary file usage in both cvsbug(1) and
|
|
send-pr(1).</p>
|
|
<p>Impact</p>
|
|
<p>A local attacker could cause data to be written to any file
|
|
to which the user running cvsbug(1) (or send-pr(1) in FreeBSD
|
|
4.10 and 5.3) has write access. This may cause damage in
|
|
itself (e.g., by destroying important system files or
|
|
documents) or may be used to obtain elevated privileges.</p>
|
|
<p>Workaround</p>
|
|
<p>Do not use the cvsbug(1) utility on any system with untrusted
|
|
users.<br/>
|
|
Do not use the send-pr(1) utility on a FreeBSD 4.10 or 5.3
|
|
system with untrusted users.</p>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<cvename>CAN-2005-2693</cvename>
|
|
<freebsdsa>SA-05:20.cvsbug</freebsdsa>
|
|
</references>
|
|
<dates>
|
|
<discovery>2005-09-07</discovery>
|
|
<entry>2006-01-27</entry>
|
|
<modified>2006-11-08</modified>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="57a0242d-8c4e-11da-8ddf-000ae42e9b93">
|
|
<topic>sge -- local root exploit in bundled rsh executable</topic>
|
|
<affects>
|
|
<package>
|
|
<name>sge</name>
|
|
<name>sgeee</name>
|
|
<range><lt>5.3.6.20040330_1</lt></range>
|
|
<range><gt>6.*</gt><lt>6.0.7.1</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>Sun Microsystems reports:</p>
|
|
<blockquote cite="http://gridengine.sunsource.net/project/gridengine/news/SGE60u7_1-announce.html">
|
|
<p>The SGE 6.0u7_1 release fixes a security bug which can
|
|
allow malicious users to gain root access.</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<url>http://gridengine.sunsource.net/project/gridengine/news/SGE60u7_1-announce.html</url>
|
|
</references>
|
|
<dates>
|
|
<discovery>2005-12-23</discovery>
|
|
<entry>2006-01-23</entry>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="f11d3b22-88c6-11da-a7b2-0060084a00e5">
|
|
<topic>fetchmail -- crash when bouncing a message</topic>
|
|
<affects>
|
|
<package>
|
|
<name>fetchmail</name>
|
|
<range><ge>6.3.0</ge><lt>6.3.2</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>Matthias Andree reports:</p>
|
|
<blockquote cite="http://www.fetchmail.info/fetchmail-SA-2006-01.txt">
|
|
<p>Fetchmail contains a bug that causes itself to crash when
|
|
bouncing a message to the originator or to the local
|
|
postmaster. The crash happens after the bounce message has
|
|
been sent, when fetchmail tries to free the dynamic array
|
|
of failed addresses, and calls the free() function with an
|
|
invalid pointer.</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<cvename>CVE-2006-0321</cvename>
|
|
<url>http://www.fetchmail.info/fetchmail-SA-2006-01.txt</url>
|
|
<url>http://bugs.debian.org/348747</url>
|
|
</references>
|
|
<dates>
|
|
<discovery>2006-01-22</discovery>
|
|
<entry>2006-01-23</entry>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="612a34ec-81dc-11da-a043-0002a5c3d308">
|
|
<topic>clamav -- possible heap overflow in the UPX code</topic>
|
|
<affects>
|
|
<package>
|
|
<name>clamav</name>
|
|
<range><lt>0.88</lt></range>
|
|
</package>
|
|
<package>
|
|
<name>clamav-devel</name>
|
|
<range><lt>20060110</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>The Zero Day Initiative reports:</p>
|
|
<blockquote cite="http://www.zerodayinitiative.com/advisories/ZDI-06-001.html">
|
|
<p>This vulnerability allows remote attackers to execute
|
|
arbitrary code on vulnerable Clam AntiVirus
|
|
installations. Authentication is not required to exploit
|
|
this vulnerability.</p>
|
|
<p>This specific flaw exists within libclamav/upx.c during
|
|
the unpacking of executable files compressed with UPX. Due
|
|
to an invalid size calculation during a data copy from the
|
|
user-controlled file to heap allocated memory, an
|
|
exploitable memory corruption condition is created.</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<bid>16191</bid>
|
|
<cvename>CVE-2006-0162</cvename>
|
|
<mlist>http://lurker.clamav.net/message/20060109.213247.a16ae8db.en.html</mlist>
|
|
<url>http://www.zerodayinitiative.com/advisories/ZDI-06-001.html</url>
|
|
<url>http://secunia.com/advisories/18379/</url>
|
|
</references>
|
|
<dates>
|
|
<discovery>2006-01-09</discovery>
|
|
<entry>2006-01-10</entry>
|
|
<modified>2006-01-15</modified>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="6d9a28f8-8152-11da-817c-0001020eed82">
|
|
<topic>milter-bogom -- headerless message crash</topic>
|
|
<affects>
|
|
<package>
|
|
<name>milter-bogom</name>
|
|
<range><lt>1.8.2</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>Juan J. Marítnez reports:</p>
|
|
<blockquote cite="http://www.usebox.net/jjm/bogom/errata/bogom-errata-2006-1.txt">
|
|
<p>The milter crashes while processing a headerless
|
|
message</p>
|
|
<p>Impact: bogom crashes and sendmail moves it to error
|
|
state</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<url>http://www.usebox.net/jjm/bogom/errata/bogom-errata-2006-1.txt</url>
|
|
<mlist>http://alf.dyndns.ws/pipermail/milter/2006-January/000076.html</mlist>
|
|
</references>
|
|
<dates>
|
|
<discovery>2006-01-05</discovery>
|
|
<entry>2006-01-09</entry>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="b747b2a9-7be0-11da-8ec4-0002b3b60e4c">
|
|
<topic>bogofilter -- heap corruption through excessively long words</topic>
|
|
<affects>
|
|
<package>
|
|
<name>bogofilter</name>
|
|
<range><ge>0.96.2</ge><lt>0.96.3</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>Matthias Andree reports:</p>
|
|
<blockquote cite="http://bogofilter.sourceforge.net/security/bogofilter-SA-2005-02">
|
|
<p>Bogofilter's/bogolexer's input handling in version 0.96.2 was not
|
|
keeping track of its output buffers properly and could overrun a
|
|
heap buffer if the input contained words whose length exceeded
|
|
16,384 bytes, the size of flex's input buffer. A "word" here refers
|
|
to a contiguous run of input octets that was not '_' and did not
|
|
match at least one of ispunct(), iscntrl() or isspace().</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<cvename>CVE-2005-4592</cvename>
|
|
<url>http://bogofilter.sourceforge.net/security/bogofilter-SA-2005-02</url>
|
|
</references>
|
|
<dates>
|
|
<discovery>2005-10-23</discovery>
|
|
<entry>2006-01-07</entry>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="92140bc9-7bde-11da-8ec4-0002b3b60e4c">
|
|
<topic>bogofilter -- heap corruption through malformed input</topic>
|
|
<affects>
|
|
<package>
|
|
<name>bogofilter</name>
|
|
<range><ge>0.93.5</ge><lt>0.96.3</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>Matthias Andree reports:</p>
|
|
<blockquote cite="http://bogofilter.sourceforge.net/security/bogofilter-SA-2005-01">
|
|
<p>When using Unicode databases (default in more recent bogofilter
|
|
installations), upon encountering invalid input sequences,
|
|
bogofilter or bogolexer could overrun a malloc()'d buffer,
|
|
corrupting the heap, while converting character sets. Bogofilter
|
|
would usually be processing untrusted data received from the
|
|
network at that time.</p>
|
|
|
|
<p>This problem was aggravated by an unrelated bug that made
|
|
bogofilter process binary attachments as though they were text, and
|
|
attempt charset conversion on them. Given the MIME default
|
|
character set, US-ASCII, all input octets in the range 0x80...0xff
|
|
were considered invalid input sequences and could trigger the heap
|
|
corruption.</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<cvename>CVE-2005-4591</cvename>
|
|
<url>http://bogofilter.sourceforge.net/security/bogofilter-SA-2005-01</url>
|
|
</references>
|
|
<dates>
|
|
<discovery>2005-10-22</discovery>
|
|
<entry>2006-01-07</entry>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="c2fdb3bc-7d72-11da-b96e-000fb586ba73">
|
|
<topic>rxvt-unicode -- restore permissions on tty devices</topic>
|
|
<affects>
|
|
<package>
|
|
<name>rxvt-unicode</name>
|
|
<range><lt>6.3</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>A rxvt-unicode changelog reports:</p>
|
|
<blockquote cite="http://dist.schmorp.de/rxvt-unicode/Changes">
|
|
<p>SECURITY FIX: on systems using openpty, permissions were
|
|
not correctly updated on the tty device and were left as
|
|
world-readable and world-writable (likely in original rxvt,
|
|
too), and were not restored properly. Affected are only
|
|
systems where non-unix ptys were used (such as most BSDs).
|
|
Found, patched and debugged by Ryan Beasley.</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<url>http://dist.schmorp.de/rxvt-unicode/Changes</url>
|
|
</references>
|
|
<dates>
|
|
<discovery>2005-12-31</discovery>
|
|
<entry>2006-01-04</entry>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="9fff8dc8-7aa7-11da-bf72-00123f589060">
|
|
<topic>apache -- mod_imap cross-site scripting flaw</topic>
|
|
<affects>
|
|
<package>
|
|
<name>apache</name>
|
|
<range><ge>1.3</ge><lt>1.3.34_3</lt></range>
|
|
<range><ge>2.0.35</ge><lt>2.0.55_2</lt></range>
|
|
<range><ge>2.1</ge><lt>2.1.9_3</lt></range>
|
|
<range><ge>2.2</ge><lt>2.2.0_3</lt></range>
|
|
</package>
|
|
<package>
|
|
<name>apache+mod_perl</name>
|
|
<range><lt>1.3.34_1</lt></range>
|
|
</package>
|
|
<package>
|
|
<name>apache_fp</name>
|
|
<range><ge>0</ge></range>
|
|
</package>
|
|
<package>
|
|
<name>apache+ipv6</name>
|
|
<range><lt>1.3.37</lt></range>
|
|
</package>
|
|
<package>
|
|
<name>ru-apache</name>
|
|
<range><lt>1.3.34+30.22_1</lt></range>
|
|
</package>
|
|
<package>
|
|
<name>ru-apache+mod_ssl</name>
|
|
<range><lt>1.3.34+30.22+2.8.25_1</lt></range>
|
|
</package>
|
|
<package>
|
|
<name>apache+ssl</name>
|
|
<range><ge>1.3.0</ge><lt>1.3.33.1.55_2</lt></range>
|
|
</package>
|
|
<package>
|
|
<name>apache+mod_ssl</name>
|
|
<name>apache+mod_ssl+ipv6</name>
|
|
<name>apache+mod_ssl+mod_accel</name>
|
|
<name>apache+mod_ssl+mod_accel+ipv6</name>
|
|
<name>apache+mod_ssl+mod_accel+mod_deflate</name>
|
|
<name>apache+mod_ssl+mod_accel+mod_deflate+ipv6</name>
|
|
<name>apache+mod_ssl+mod_deflate</name>
|
|
<name>apache+mod_ssl+mod_deflate+ipv6</name>
|
|
<name>apache+mod_ssl+mod_snmp</name>
|
|
<name>apache+mod_ssl+mod_snmp+mod_accel</name>
|
|
<name>apache+mod_ssl+mod_snmp+mod_accel+ipv6</name>
|
|
<name>apache+mod_ssl+mod_snmp+mod_deflate</name>
|
|
<name>apache+mod_ssl+mod_snmp+mod_deflate+ipv6</name>
|
|
<name>apache+mod_ssl+mod_snmp+mod_accel+mod_deflate+ipv6</name>
|
|
<range><lt>1.3.34+2.8.25_1</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>The Apache HTTP Server Project reports:</p>
|
|
<blockquote cite="http://httpd.apache.org/security/vulnerabilities_13.html">
|
|
<p>A flaw in mod_imap when using the Referer directive with
|
|
image maps. In certain site configurations a remote
|
|
attacker could perform a cross-site scripting attack if a
|
|
victim can be forced to visit a malicious URL using
|
|
certain web browsers.</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<cvename>CVE-2005-3352</cvename>
|
|
<bid>15834</bid>
|
|
<url>http://www.apacheweek.com/features/security-13</url>
|
|
<url>http://www.apacheweek.com/features/security-20</url>
|
|
</references>
|
|
<dates>
|
|
<discovery>2005-11-01</discovery>
|
|
<entry>2006-01-01</entry>
|
|
<modified>2009-01-23</modified>
|
|
</dates>
|
|
</vuln>
|