what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 51 - 75 of 100 RSS Feed

Files

MDKSA-2004:107.txt
Posted Oct 20, 2004
Authored by Mandrake Linux Security Team | Site mandrakesoft.com

Mandrake Linux Security Update Advisory - A number of vulnerabilities were fixed in mozilla 1.7.3, the following of which have been backported to mozilla packages for Mandrake Linux 10.0: "Send page" heap overrun, javascript clipboard access, buffer overflow when displaying VCard, BMP integer overflow, javascript: link dragging, Malicious POP3 server III.

tags | advisory, overflow, javascript, vulnerability
systems | linux, mandrake
SHA-256 | 9f5db01dbfd4b9ff3f74a73729cb6a0c9bf1c408d1dc95dad30d2132b2454615

Related Files

Mandriva Linux Security Advisory 2005.186
Posted Oct 28, 2005
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory - Ulf Harnhammar discovered a remote buffer overflow in lynx versions 2.8.2 through 2.8.5.

tags | advisory, remote, overflow
systems | linux, mandriva
SHA-256 | 9096ee2561547d48a7c2b2508bb19b5f4973f207aad33445e6c7d603140eeda0
Mandriva Linux Security Advisory 2005.192
Posted Oct 26, 2005
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Update Advisory - Ariel Berkman discovered several buffer overflows in xloadimage, which are also present in xli, a command line utility for viewing images in X11, and could be exploited via large image titles and cause the execution of arbitrary code.

tags | advisory, overflow, arbitrary
systems | linux, mandriva
SHA-256 | ab8941b3a540e289eb42a82f483c7ffbd67af77efba8be26cecb24ffb9d35617
Mandriva Linux Security Advisory 2005.191
Posted Oct 26, 2005
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Update Advisory - Yutaka Oiwa discovered a bug in Ruby, the interpreter for the object-oriented scripting language, that can cause illegal program code to bypass the safe level and taint flag protections check and be executed.

tags | advisory, ruby
systems | linux, mandriva
SHA-256 | df8d7dc5bef1b8661acb2ae9fd7ad34493349baa3daba6e152d7f4fa96136577
Mandriva Linux Security Advisory 2005.190
Posted Oct 26, 2005
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Update Advisory - A bug was found in the way the pam_ldap module processed certain failure messages. If the server includes supplemental data in an authentication failure result message, but the data does not include any specific error code, the pam_ldap module would proceed as if the authentication request had succeeded, and authentication would succeed. This affects versions 169 through 179 of pam_ldap.

tags | advisory
systems | linux, mandriva
SHA-256 | 1c8c93daaa5f913213407f6a73ad9ff723b3821b0c481e4640796f19fd334bd6
Mandriva Linux Security Advisory 2005.189
Posted Oct 26, 2005
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Update Advisory - "infamous41md" discovered a buffer overflow in uw-imap, the University of Washington's IMAP Server that allows attackers to execute arbitrary code.

tags | advisory, overflow, arbitrary, imap
systems | linux, mandriva
SHA-256 | 2d5b26da4c2651904587f7e2e1c4a615c6750ac7d289224abbbeb27829f09aee
Mandriva Linux Security Advisory 2005.188
Posted Oct 26, 2005
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Update Advisory - Javier Fern

tags | advisory, arbitrary, local
systems | linux, mandriva
SHA-256 | 1e8cee6ff1485779117b7c9f67f24678d6f076377f7903083aa290c52eb891f7
Mandriva Linux Security Advisory 2005.187
Posted Oct 26, 2005
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Update Advisory - Joxean Koret discovered that the Python SVG import plugin in dia, a vector-oriented diagram editor, does not properly sanitize data read from an SVG file and is hence vulnerable to execute arbitrary Python code.

tags | advisory, arbitrary, python
systems | linux, mandriva
SHA-256 | f000475a6708305f86349410e4b1108f015d991817e44392ae088316b69a934b
Mandriva Linux Security Advisory 2005.186
Posted Oct 18, 2005
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Update Advisory - Ulf Harnhammar discovered a remote buffer overflow in lynx versions 2.8.2 through 2.8.5

tags | advisory, remote, overflow
systems | linux, mandriva
advisories | CVE-2005-3120
SHA-256 | 48154abcdff3ecaa89fc76b7d19a1d5210df7e297fbbe99f9d51d9641259ff78
Mandriva Linux Security Advisory 2005.185
Posted Oct 18, 2005
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Update Advisory - Chris Evans reported a heap based buffer overflow in the RTF importer of KWord. An attacker could provide a specially crafted RTF file, which when opened in KWord can cause execution of arbitrary code

tags | advisory, overflow, arbitrary
systems | linux, mandriva
advisories | CVE-2005-2971
SHA-256 | 7a3183c390645fecb2cac0f42f9b73b4f054919dbc1eb75ea65cc15ca3e7262d
Mandriva Linux Security Advisory 2005.184
Posted Oct 18, 2005
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Update Advisory - Javier Fern

tags | advisory, arbitrary, local
systems | linux, mandriva
advisories | CVE-2005-2960
SHA-256 | a472be172d6fc469059b32dbc8d04e92cd576537b8caa4a88e1e5ba9d613c3d2
Mandriva Linux Security Advisory 2005.181
Posted Oct 12, 2005
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Update Advisory - Squid 2.5.9, while performing NTLM authentication, does not properly handle certain request sequences, which allows attackers to cause a denial of service (daemon restart).

tags | advisory, denial of service
systems | linux, mandriva
SHA-256 | 06d0d47bfa360a14185cf60283a9713fa8bf5c27d443c35ba004e0fb4381c8eb
Mandriva Linux Security Advisory 2005.180
Posted Oct 12, 2005
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Update Advisory - When playing an Audio CD, a xine-lib based media application contacts a CDDB server to retrieve metadata like the title and artist's name. During processing of this data, a response from the server, which is located in memory on the stack, is passed to the fprintf() function as a format string. An attacker can set up a malicious CDDB server and trick the client into using this server instead of the pre- configured one. Alternatively, any user and therefore the attacker can modify entries in the official CDDB server. Using this format string vulnerability, attacker-chosen data can be written to an attacker-chosen memory location. This allows the attacker to alter the control flow and to execute malicious code with the permissions of the user running the application.

tags | advisory
systems | linux, mandriva
SHA-256 | aa30859c0d6a7f47a28e0c687d6bf26f4f312e6ce94df28dde0c1458613a57d0
Mandriva Linux Security Advisory 2005.179
Posted Oct 12, 2005
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Update Advisory - Yutaka Oiwa discovered vulnerability potentially affects applications that use the SSL/TLS server implementation provided by OpenSSL.

tags | advisory
systems | linux, mandriva
advisories | CVE-2005-2946, CVE-2005-2969
SHA-256 | f162a1718a04d64fcdcfa881284798e3240afdc4b36bb8ef9e86a3efbf61ed0e
Mandriva Linux Security Advisory 2005.178
Posted Oct 12, 2005
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Update Advisory - A cross-site scripting (XSS) vulnerability in add.php in Address Add Plugin 1.9 and 2.0 for Squirrelmail allows remote attackers to inject arbitrary web script or HTML via the IMG tag.

tags | advisory, remote, web, arbitrary, php, xss
systems | linux, mandriva
SHA-256 | bed652ce606c76c741ba4a9bb11163f7491d679ec4eea0946f730779d582b5df
Mandriva Linux Security Advisory 2005.177
Posted Oct 8, 2005
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Update Advisory - faxcron, recvstats, and xferfaxstats in HylaFax 4.2.1 and earlier allows local users to overwrite arbitrary files via a symlink attack on temporary files. In addition, HylaFax has some provisional support for Unix domain sockets, which is disabled in the default compile configuration. It is suspected that a local user could create a fake /tmp/hyla.unix socket and intercept fax traffic via this socket. In testing for this vulnerability, with CONFIG_UNIXTRANSPORT disabled, it has been found that client programs correctly exit before sending any data.

tags | advisory, arbitrary, local
systems | linux, unix, mandriva
advisories | CVE-2005-3069, CVE-2005-3070
SHA-256 | 62d8e72fae9a4a68d6e24a2850d05bb819ea9695193453de5c40931f5182a02e
Mandriva Linux Security Advisory 2005.176
Posted Oct 8, 2005
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Update Advisory - Miniserv.pl in Webmin 1.220, when full PAM conversations is enabled, allows remote attackers to bypass authentication by spoofing session IDs via certain metacharacters (line feed or carriage return).

tags | advisory, remote, spoof
systems | linux, mandriva
advisories | CVE-2005-3042
SHA-256 | a2567dded228c5c8e1ec16208f680d5d1cc3614ecdb6712bdc01b2a5284525a6
Mandriva Linux Security Advisory 2005.172
Posted Oct 7, 2005
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Update Advisory - Sshd in OpenSSH before 4.2, when GSSAPIDelegateCredentials is enabled, allows GSSAPI credentials to be delegated to clients who log in using non-GSSAPI methods, which could cause those credentials to be exposed to untrusted users or hosts. GSSAPI is only enabled in versions of openssh shipped in LE2005 and greater.

tags | advisory
systems | linux, mandriva
advisories | CVE-2005-2798
SHA-256 | 36ff3b7eb497ae29ca47eb6ebb8a464874b5bda235ffd3c5c284b54f5f5fd1f4
Mandriva Linux Security Advisory 2005.169
Posted Sep 28, 2005
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Update Advisory - A number of vulnerabilities have been discovered in Mozilla Firefox that have been corrected in version 1.0.7

tags | advisory, vulnerability
systems | linux, mandriva
advisories | CVE-2005-2702, CVE-2005-2703, CVE-2005-2704, CVE-2005-2705, CVE-2005-2706, CVE-2005-2707, CVE-2005-2968
SHA-256 | bb0c0e56a300a55986048b2a72e10d74683868e9f32c036373319828bd7879e3
Mandriva Linux Security Advisory 2005.164
Posted Sep 14, 2005
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Update Advisory - A vulnerability was discovered in the pixmap allocation handling of the X server that can lead to local privilege escalation. By allocating a huge pixmap, a local user could trigger an integer overflow that resulted in a memory allocation that was too small for the requested pixmap, leading to a buffer overflow which could then be exploited to execute arbitrary code with full root privileges.

tags | advisory, overflow, arbitrary, local, root
systems | linux, mandriva
advisories | CVE-2005-2495
SHA-256 | 3cf2154b69cec09589d62bdefa8ec6d90c741286aeedc640ff2242cb4a6b34d9
Mandriva Linux Security Advisory 2005.163
Posted Sep 14, 2005
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Update Advisory - A stack-based buffer overflow was discovered in the init_syms function in MySQL that allows authenticated users that can create user-defined functions to execute arbitrary code via a long function_name field.

tags | advisory, overflow, arbitrary
systems | linux, mandriva
advisories | CVE-2005-2558
SHA-256 | e6803a3044816c86b9cb2e48715440a1ccf90fe4c2461cc9b68cf4cd21ef04eb
Mandriva Linux Security Advisory 2005.161
Posted Sep 13, 2005
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Update Advisory - A flaw was discovered in mod_ssl's handling of the SSLVerifyClient directive. This flaw occurs if a virtual host is configured using SSLVerifyClient optional and a directive SSLVerifyClient required is set for a specific location. For servers configured in this fashion, an attacker may be able to access resources that should otherwise be protected, by not supplying a client certificate when connecting. A flaw was discovered in Apache httpd where the byterange filter would buffer certain responses into memory. If a server has a dynamic resource such as a CGI script or PHP script that generates a large amount of data, an attacker could send carefully crafted requests in order to consume resources, potentially leading to a Denial of Service.

tags | advisory, denial of service, cgi, php
systems | linux, mandriva
advisories | CVE-2005-2700, CVE-2005-2728
SHA-256 | d8ac7a09a10fda0bcf0e418be47a3e0e0888e664ca28011b661fb6856ae40716
Mandriva Linux Security Advisory 2005.160
Posted Sep 8, 2005
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Update Advisory - Ilja van Sprundel from suresec.org notified the KDE security team about a serious lock file handling error in kcheckpass that can, in some configurations, be used to gain root access. In order for an exploit to succeed, the directory /var/lock has to be writeable for a user that is allowed to invoke kcheckpass.

tags | advisory, root
systems | linux, mandriva
SHA-256 | 4777c752bcd6597f96c96b1cd0f65480dc336439c93211736685cf7dad59dd1d
Mandriva Linux Security Advisory 2005.159
Posted Sep 8, 2005
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Update Advisory - Ben Burton notified the KDE security team about several tempfile handling related vulnerabilities in langen2kvtml, a conversion script for kvoctrain. This vulnerability was initially discovered by Javier Fern

tags | advisory, local, vulnerability
systems | linux, mandriva
SHA-256 | a47c7b1147b1d3baf301144a1eadf49cf107afeef603b598d59f027c3dd9368a
Mandriva Linux Security Advisory 2005.158
Posted Sep 8, 2005
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Update Advisory - buffer overflow in ad_pcm.c in MPlayer 1.0pre7 and earlier allows remote attackers to execute arbitrary code via a video file with an audio header containing a large value in a strf chunk.

tags | advisory, remote, overflow, arbitrary
systems | linux, mandriva
SHA-256 | 7b3e6873b460f03c379d889d6f3bdfa59e23233031a499f5828119f39d23b366
Mandriva Linux Security Advisory 2005.157
Posted Sep 8, 2005
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Update Advisory - A severe security issue has been discovered in Smb4K. By linking a simple text file FILE to /tmp/smb4k.tmp or /tmp/sudoers, an attacker could get access to the full contents of the /etc/super.tab or /etc/sudoers file, respectively, because Smb4K didn't check for the existance of these files before writing any contents. When using super, the attack also resulted in /etc/super.tab being a symlink to FILE. Affected are all versions of the 0.4, 0.5, and 0.6 series of Smb4K.

tags | advisory
systems | linux, mandriva
SHA-256 | 2e7d946d88525e9117a39502618c5c8066182d1bb26b4e22744dea059b24fb60
Page 3 of 4
Back1234Next

File Archive:

March 2023

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    13 Files
  • 3
    Mar 3rd
    15 Files
  • 4
    Mar 4th
    0 Files
  • 5
    Mar 5th
    0 Files
  • 6
    Mar 6th
    16 Files
  • 7
    Mar 7th
    31 Files
  • 8
    Mar 8th
    16 Files
  • 9
    Mar 9th
    13 Files
  • 10
    Mar 10th
    9 Files
  • 11
    Mar 11th
    0 Files
  • 12
    Mar 12th
    0 Files
  • 13
    Mar 13th
    10 Files
  • 14
    Mar 14th
    6 Files
  • 15
    Mar 15th
    17 Files
  • 16
    Mar 16th
    22 Files
  • 17
    Mar 17th
    13 Files
  • 18
    Mar 18th
    0 Files
  • 19
    Mar 19th
    0 Files
  • 20
    Mar 20th
    16 Files
  • 21
    Mar 21st
    13 Files
  • 22
    Mar 22nd
    5 Files
  • 23
    Mar 23rd
    6 Files
  • 24
    Mar 24th
    47 Files
  • 25
    Mar 25th
    0 Files
  • 26
    Mar 26th
    0 Files
  • 27
    Mar 27th
    50 Files
  • 28
    Mar 28th
    42 Files
  • 29
    Mar 29th
    7 Files
  • 30
    Mar 30th
    31 Files
  • 31
    Mar 31st
    15 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close