Ubuntu Security Notice USN-151-3 - USN-148-1 and USN-151-1 fixed two security flaws in zlib, which could be exploited to cause Denial of Service attacks or even arbitrary code execution with malicious data streams. Since aide is statically linked against the zlib library, it is also affected by these issues.
e648bcae15214f4071931ab9828a2a130291bfc0ecfc2a39cc9d2a7b39d43c78
SCO Security Advisory - When the RPC portmapper (rpcbind) receives an invalid portmap request from a remote (or local) host, it falls into a denial of service state and cannot respond. As a result, the RPC services will not operate normally.
7b965753d3a7e4c763df94035fce455dd73a441c5f5b3e89c806b700e160b3aa
iDEFENSE Security Advisory 10.28.05 - Remote exploitation of a stack overflow vulnerability in chmlib as included in various Linux distributions allows attackers to execute arbitrary code. The vulnerability specifically exists due to an unchecked memory copy while processing a CHM file. iDefense has confirmed the existence of this vulnerability in chmlib 0.35. It is suspected that all versions of chmlib are vulnerable.
ee23933cc3bb210a5faf6c8bbce7befe90f8cf66107a4479fd2909a768c974cf
Ubuntu Security Notice USN-212-1 - Steve Kemp discovered two format string vulnerabilities in the logging handler of the Gnome database access library. Depending on the application that uses the library, this could have been exploited to execute arbitrary code with the permission of the user running the application.
c09669fc02969cd84e0da17bf15e8f81c918154c5c8422161c0a46dd25b2144e
Swisscom EuroSpot wireless service suffers from multiple cross site scripting vulnerabilities. Details provided.
12ac9a5eaae2ce4ca5f76f2b9eed2d4b8311c75ab8487c21f985d6cf1d5e64ff
Debian Security Advisory DSA 878-1 - A buffer overflow has been identified in the pnmtopng component of the netpbm package, a set of graphics conversion tools. This vulnerability could allow an attacker to execute arbitrary code as a local user by providing a specially crafted PNM file.
78bdccaeee505cfe9ac443b08c9f1251e2beb5e2d080e00f6784e5becfe5ff7e
Ethereal SLIMP3 protocol dissector remote buffer overflow proof of concept exploit that crashes the program. Tested with Ethereal 0.10.12, WinPcap 3.1 beta4, WinXP SP2.
4040c8f6a0687370d485ce7020c65239db8950551fc47099f8dc2c15e9977dfb
VERITAS Netbackup remote format string exploit for Mac OS-X.
40b19b405339547ac14c58e1de679ac1b08b64282cb47cc79e27e76f6c37eef0
VERITAS Netbackup remote format string exploit for Win32.
e2096b1eb9ba99343b4455d73ecb4e8d9884c541e9cf863e8877ae37da43c17b
VERITAS Netbackup remote format string exploit for Linux.
5ffffc3997e8bb1ec7434b97c95d74bb2103cc01e15991b4779df4cabaf30ce5
A denial of service vulnerability exists within Internet Explorer 6.0 on XP SP2 with the J2SE Runtime Environment installed. Successful exploitation causes the browser to not respond. The flaw resides in mshtmled.dll.
c5acb9fc228858f7d61a35f25badf37ddaf0c280921bdbde589de85ffb69067e
318 byte useradd shellcode for Russian Windows NT/2k/XP variants.
10017e3f15e72558b80c3010dd58d45700aa807ddf899b075926f63b8f3ebad0
Mirabilis ICQ 2003a buffer overflow download shellcoded exploit. Affected versions: Mirabilis ICQ Pro versions 2003a and below.
01676ac1acef6ab5d516ee90542dec43fea9c4accbc3df9c2c03d2a059fe0351
Updated and improved version of the local root exploit for the Linux kernel code that has the Bluetooth related flaw.
41cf67b44ead5be4a7bf304315be0c442ff77ad14a01b9d00c0f87d107b198e5
Gentoo Linux Security Advisory GLSA 200510-24 - Mantis is affected by multiple vulnerabilities ranging from information disclosure to arbitrary script execution. Versions less than 0.19.3 are affected.
19c3a876d924b808c5dde8507af88c2240a1311908ddd4e82172a57a9f9b89a8
Gentoo Linux Security Advisory GLSA 200510-23 - Due to improper input validation, TikiWiki can be exploited to perform cross-site scripting attacks. Versions less than 1.9.1.1 are affected.
ae25ab42edccb8f81e7e80784ca4d189a28f4f5548c73215ddc3f56de0af8d4e
Gentoo Linux Security Advisory GLSA 200510-22 - The SELinux patches for PAM introduce a vulnerability allowing a password to be checked with the unix_chkpwd utility without delay or logging. This vulnerability doesn't affect users who do not run SELinux. Versions less than 0.78-r3 are affected.
7c7e5d46bf6fd6f71f5337abf9fc116b600f7355c35a74788774b636404011b3
British Telecom (BT) operates an automated fault detection and reporting system that allows anyone to test any line. If the line is found to be faulty the caller is given an option to divert all incoming calls for that line to another number, including mobile phones. No authentication is required and the owner of the line will be oblivious to the fact that her calls are being hijacked.
ccb6e976c84994b8246b1691d17c53db361f5ac8ccbf6fca3af7aa4a0d4a5797
Debian Security Advisory DSA 877-1 - Steve Kemp discovered two vulnerabilities in gnump3d, a streaming server for MP3 and OGG files. The 404 error page does not strip malicious javascript content from the resulting page, which would be executed in the victims browser. By using specially crafting URLs it is possible to read arbitrary files to which the user of the streaming server has access to.
98fa603efd7958547815f57ece2488d3f36345e45de9af44f1bbef83d27dac4f
During an audit of a client, Security-Assessment.com discovered multiple critical vulnerabilities within the RockLiffe MailSite Express WebMail software. The vulnerabilities include the retrieval of arbitrary files from the web server, and bypassing attachment validation routines allowing for remote code execution. Exploitation details included. All versions of RockLiffe MailSite Express WebMail prior to version 6.1.22 are affected.
620b1bc3c58fa84fa86dd64e75b2c243efc3431f8bb6eb7c5bd361422269be97
Exploit for a remote denial of service flaw for HTTP GET in Hasbani-WindWeb version 2.0.
e7ea5226541a9e30177def6562f8d6efcb06aad03e47001f1f145555549dc8b9
Mandriva Linux Security Advisory - Tavis Ormandy discovered that sudo does not perform sufficient environment cleaning; in particular the SHELLOPTS and PS4 variables are still passed to the program running as an alternate user which can result in the execution of arbitrary commands as the alternate user when a bash script is executed.
8065af1a69c4eae4f5fc5ee3860e0ca7e4a63e03d474b5e164f6ba0611f7966b
Mandriva Linux Security Advisory - The mod_auth_shadow module 1.0 through 1.5 and 2.0 for Apache with AuthShadow enabled uses shadow authentication for all locations that use the require group directive, even when other authentication mechanisms are specified, which might allow remote authenticated users to bypass security restrictions.
6026d986b49e82508b1a992df337232860f4aa9bf4e0f0f430a8de79bb5a2126
Remote denial of service exploit that makes of a length checking issue in the Microsoft UMPNPMGR PNP_GetDeviceList. This code crashes services.exe.
4c414db62f8080df8cfa4b3c934df6fe1b7ac73cf2921817e10cd4373baf9f07
Secunia Research has discovered some vulnerabilities in ATutor, which can be exploited by malicious people to conduct cross-site scripting attacks, disclose sensitive information, and compromise a vulnerable system. The vulnerabilities have been confirmed in version 1.5.1-pl1. Other versions may also be affected.
ea4981890b687d4caff07c6b7157202c331ffe371d5cb42efe41a196ad0226d2