name=unix>UNIX / Linux Operating Systems Only |
Vendor &
Software Name |
Vulnerability
- Impact Patches - Workarounds Attacks Scripts |
Common Name
/ CVE Reference |
face="Arial, Helvetica, sans-serif">Risk |
face="Arial, Helvetica, sans-serif">Source |
Apple
Mac OS X 10.0-10.0.4, 10.1-10.1.5, 10.2-10.2.8, 10.3-10.3.9, Mac OS X
Server 10.0-10.1.5, 10.2-10.2.8, 10.3-10.3.9 |
A vulnerability has been reported in the pseudo terminal system due to
a design error, which could let a malicious user obtain sensitive
information.
Version 10.4 of Apple Mac OS X reportedly fixes this vulnerability by
implementing proper default permissions on the pseudo terminal API.
There is no exploit code required. |
Apple Mac OS X Default Pseudo-Terminal Permission
href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1430">CAN-2005-1430 |
Medium |
Bugtraq, 397306, May 1, 2005 |
Apple
Safari 1.3 |
A Denial of Service vulnerability has been reported when processing
HTTPS URLs due to insufficient bounds checking.
No workaround or patch available at time of publishing.
Currently we are not aware of any exploits for this
vulnerability. |
Apple Safari Web Browser HTTPS Denial of Service
href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1385">CAN-2005-1385 |
|
Security Tracker Alert, 1013835, April 29, 2005 |
APSIS
Pound 1.8.2 |
A buffer overflow vulnerability has been reported in the 'add_port()'
function due to a boundary error, which could let a remote malicious user
cause a Denial of Service and possibly execute arbitrary code.
Upgrade available at:
href="http://www.apsis.ch/pound/Pound-1.8.3.tgz"
target=_blank>http://www.apsis.ch/ pound/Pound-1.8.3.tgz
Currently we are not aware of any exploits for this
vulnerability.
|
APSIS Pound Remote Buffer Overflow
href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1391">CAN-2005-1391 |
Low/ High (High if arbitrary code can be executed) |
Security Focus, 13436, April 29, 2005 |
Carnegie Mellon University
Cyrus IMAP Server 2.x
|
Multiple vulnerabilities exist: a buffer overflow
vulnerability exists in mailbox handling due to an off-by-one boundary
error, which could let a remote malicious user execute arbitrary code; a
buffer overflow vulnerability exists in the imapd annotate extension due
to an off-by-one boundary error, which could let a remote malicious user
execute arbitrary code; a buffer overflow vulnerability exists in
'fetchnews,' which could let a remote malicious user execute arbitrary
code; a buffer overflow vulnerability exist because remote administrative
users can exploit the backend; and a buffer overflow vulnerability exists
in imapd due to a boundary error, which could let a remote malicious user
execute arbitrary code.
Update available at:
href=" http://ftp.andrew.cmu.edu/pub/cyrus/cyrus-imapd-2.2.11.tar.gz"> http://ftp.andrew.cmu.edu/pub/ cyrus/cyrus-imapd-2.2.11.tar.gz
Gentoo:
href="http://security.gentoo.org/glsa/glsa-200502-29.xml"> http://security.gentoo.org/ glsa/glsa-200502-29.xml
SUSE:
href="ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/i586/xorg-x11-libs-6.8.1-15.3.i586.rpm"
target=_blank>ftp://ftp.SUSE.com/pub/SUSE
Ubuntu:
href="http://security.ubuntu.com/ubuntu/pool/main/c/cyrus21-imapd/"> http://security.ubuntu.com/ubuntu/ pool/main/c/cyrus21-imapd/
Mandrake:
href="http://www.mandrakesecure.net/en/ftp.php"> http://www.mandrakesecure.net/ en/ftp.php
Conectiva:
href="ftp://atualizacoes.conectiva.com.br/"> ftp://atualizacoes.conectiva. com.br/
ALT Linux:
href="http://lists.altlinux.ru/pipermail/security-announce/2005-March/000287.html"> http://lists.altlinux.ru/pipermail/ security-announce/2005-March /000287.html
OpenPKG:
href="ftp://ftp.openpkg.org/release/2.2/UPD/">ftp://ftp.openpkg.org/release/
Fedora:
href="http://download.fedora.redhat.com/pub/fedora/linux/core/updates/3/">http://download.fedora.redhat.com/ pub/fedora/linux/core/updates/3/
Currently we are not aware of any exploits for these
vulnerabilities. |
Cyrus IMAP Server Multiple Remote Buffer Overflows
href=" http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0546">CAN-2005-0546 |
High |
Secunia Advisory, SA14383, February 24, 2005
Gentoo Linux Security Advisory, GLSA 200502-29, February 23, 2005
SUSE Security Announcement, SUSE-SA:2005:009, February 24, 2005
Ubuntu Security Notice USN-87-1, February 28, 2005
Mandrakelinux Security Update Advisory, MDKSA-2005:051, March
4, 2005
Conectiva Linux Security Announcement, CLA-2005:937, March
17, 2005
ALTLinux Security Advisory, March 29, 2005
OpenPKG Security Advisory, OpenPKG-SA-2005.005, April 5, 2005
Fedora Update Notification, FEDORA-2005-339, April 27, 2005
|
Cocktail
Cocktail 3.5.4 |
A vulnerability has been reported because the administrator password is
passed insecurely, which could let a malicious user obtain sensitive
information.
No workaround or patch available at time of publishing.
There is no exploit code required. |
Cocktail Admin Password Disclosure
href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1387">CAN-2005-1387 |
Medium |
Securities, May 1, 2005 |
Debian
CVS 1.11.1 p1 |
Several vulnerabilities have been reported: a vulnerability was
reported because it is possible to bypass the password protection using
the pserver access method, which could let a remote malicious user bypass
authentication to obtain unauthorized access; and a Denial of Service
vulnerability was reported due to an error in Debian's CVS cvs-repouid
patch.
Debian:
href="http://security.debian.org/pool/updates/main/c/cvs/">http://security.debian.org/ pool/updates/main/c/cvs/
Currently we are not aware of any exploits for these
vulnerabilities. |
Debian CVS-Repouid Remote Authentication Bypass & Denial of Service
href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1342">CAN-2004-1342
href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1343">CAN-2004-1343
|
Medium |
Debian Security Advisory, DSA 715-1, April 27, 2005 |
ESRI
ArcInfo Workstation on UNIX 9.0 |
Several vulnerabilities have been reported: a format string
vulnerability was reported in the 'lockmgr' and 'wservice' applications,
which could let a malicious user execute arbitrary code with root
privileges; and a buffer overflow vulnerability was reported in the
'asmaster,' 'asrecovery,' 'asuser,' 'asutulity,' and 'se' applications due
to command line argument boundary errors, which could let a malicious user
execute arbitrary code with root privileges.
Patch available at:
href="http://support.esri.com/index.cfm?fa=downloads.patchesServicePacks.viewPatch&PID=14&MetaID=1015">http://support.esri.com/index.cfm?fa= downloads.patchesServicePacks. viewPatch&PID=14&MetaID=1015
Proof of Concept exploits have been published. An exploit script has
also been published for the format string vulnerability. |
ESRI ArcInfo Workstation s Buffer Overflows and Format String
href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1393">CAN-2005-1393
href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1394">CAN-2005-1394
href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1393">
|
High |
Secunia Advisory, SA15196, May 2, 2005 |
GNU
sharutils 4.2, 4.2.1 |
Multiple buffer overflow vulnerabilities exists due to a failure to
verify the length of user-supplied strings prior to copying them into
finite process buffers, which could let a remote malicious user cause a
Denial of Service or execute arbitrary code.
Gentoo:
href="http://security.gentoo.org/glsa/glsa-200410-01.xml"> http://security.gentoo.org/ glsa/glsa-200410-01.xml
FedoraLegacy:
href="http://download.fedoralegacy.org/fedora/">http://download.fedoralegacy. org/fedora/
Ubuntu:
href="http://security.ubuntu.com/ubuntu/pool/main/s/sharutils/">http://security.ubuntu.com/ ubuntu/pool/main/s/sharutils/
Fedora:
href="http://download.fedora.redhat.com/pub/fedora/linux/core/updates/">http://download.fedora.redhat.com/ pub/fedora/linux/core/updates/
OpenPKG:
href="ftp://ftp.openpkg.org/release"> ftp://ftp.openpkg.org/release
Mandrake:
href="http://www.mandrakesecure.net/en/ftp.php"> http://www.mandrakesecure.net/ en/ftp.php
RedHat:
href="http://rhn.redhat.com/errata/RHSA-2005-377.html">http://rhn.redhat.com/ errata/RHSA-2005-377.html
Trustix:
href="ftp://ftp.turbolinux.co.jp/pub/TurboLinux/TurboLinux/ia32/">ftp://ftp.turbolinux.co.jp/ pub/TurboLinux/TurboLinux/ia32/
We are not aware of any exploits for these vulnerabilities. |
GNU Sharutils Multiple Buffer Overflow
href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1773">CAN-2004-1773 |
Low/ High (High if arbitrary code can be executed) |
Gentoo Linux Security Advisory, GLSA 200410-01, October 1, 2004
Fedora Legacy Update Advisory, FLSA:2155, March 24, 2005
Ubuntu Security Notice, USN-102-1 March 29, 2005
Fedora Update Notifications, FEDORA-2005- 280 & 281, April
1, 2005
Mandrakelinux Security Update Advisory, MDKSA-2005:067, April 7, 2005
RedHat Security Advisory, RHSA-2005:377-07, April 26, 2005
Turbolinux Security Advisory, TLSA-2005-54, April 28, 2005
|
GNU
sharutils 4.2, 4.2.1 |
A vulnerability has been reported in the 'unshar' utility due to the
insecure creation of temporary files, which could let a malicious user
create/overwrite arbitrary files.
Ubuntu:
href="http://security.ubuntu.com/ubuntu/pool/main/s/sharutils/">http://security.ubuntu.com/ ubuntu/pool/main/s/sharutils/
Gentoo:
href="http://security.gentoo.org/glsa/glsa-200504-06.xml"> http://security.gentoo.org/ glsa/glsa-200504-06.xml
Mandrake:
href="http://www.mandrakesecure.net/en/ftp.php"> http://www.mandrakesecure.net/ en/ftp.php
Fedora:
href="http://download.fedora.redhat.com/pub/fedora/linux/core/updates/">http://download.fedora.redhat.com/ pub/fedora/linux/core/updates/
RedHat:
href="http://rhn.redhat.com/errata/RHSA-2005-377.html">http://rhn.redhat.com/ errata/RHSA-2005-377.html
Trustix:
href="ftp://ftp.turbolinux.co.jp/pub/TurboLinux/TurboLinux/ia32/">ftp://ftp.turbolinux.co.jp/ pub/TurboLinux/TurboLinux/ia32/
There is no exploit code required. |
GNU Sharutils 'Unshar' Insecure Temporary File Creation
href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0990">CAN-2005-0990 |
Medium |
Ubuntu Security Notice, USN-104-1, April 4, 2005
Gentoo Linux Security Advisory, GLSA 200504-06, April 6, 2005
Mandrakelinux Security Update Advisory, MDKSA-2005:067, April 7, 2005
Fedora Update Notification, FEDORA-2005-319, April 14, 2005
RedHat Security Advisory, RHSA-2005:377-07, April 26, 2005
Turbolinux Security Advisory, TLSA-2005-54, April 28,
2005 |
GNU
Lysator LSH 1.5-1.5.5, 2.0 |
A remote Denial of Service vulnerability has been reported due to an
unspecified error.
Upgrades available at:
href="http://www.lysator.liu.se/%7Enisse/archive/lsh-2.0.1.tar.gz"
target=_blank>http://www.lysator.liu.se/~nisse/ archive/
Patch available at:
href="ftp://ftp.lysator.liu.se/pub/security/lsh/lsh-2.0-2.0.1.diff.gz"
target=_blank>ftp://ftp.lysator.liu.se/pub/security/ lsh/lsh-2.0-2.0.1.diff.gz
Debian:
href="http://security.debian.org/pool/updates/main/l/lsh-utils/">http://security.debian.org/ pool/updates/main/l/lsh-utils/
Currently we are not aware of any exploits for this
vulnerability. |
Lysator LSH Remote Denial of Service
href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0814">CAN-2005-0814 |
Low |
Secunia Advisory, SA14609, March 17, 2005
Debian Security Advisory, DSA 717-1, April 27, 2005
|
GnuTLS
GnuTLS 1.2 prior to 1.2.3; 1.0 prior to 1.0.25 |
A remote Denial of Service vulnerability has been reported due to
insufficient validation of padding bytes in 'lib/gnutils_cipher.c.'
Updates available at:
href=" http://www.gnu.org/software/gnutls/download.html">http://www.gnu.org/software/ gnutls/download.html
Currently we are not aware of any exploits for this
vulnerability. |
GnuTLS Padding Validation Remote Denial of Service
href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1431">CAN-2005-1431
|
Low |
Security Tracker Alert, 1013861, May 2, 2005 |
Hewlett Packard Company
OpenView Event Correlation Services 3.32, 3.33 |
Several vulnerabilities have been reported due to unspecified errors,
which could let a malicious user cause a Denial of Service or execute
arbitrary code.
Patches available at:
href="http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=PSD_HPSBMA01141">http://h20000.www2.hp.com/bizsupport/ TechSupport/Document.jsp?objectID= PSD_HPSBMA01141
Currently we are not aware of any exploits for these
vulnerabilities. |
HP OpenView Event Correlation Services
href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1433">CAN-2005-1433 |
Low/ High (High if arbitrary code can be executed) |
HP Security Bulletin, HPSBMA01141, May 2, 2005
|
Hewlett Packard Company
OpenView Network Node Manager 6.2, 6.4, 7.01, 7.50
|
Several vulnerabilities have been reported due to unspecified errors,
which could let a malicious user cause a Denial of Service or execute
arbitrary code.
Patches available at:
href="http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=PSD_HPSBMA01140">http://h20000.www2.hp.com/bizsupport/ TechSupport/Document.jsp?objectID= PSD_HPSBMA01140
Currently we are not aware of any exploits for these
vulnerabilities. |
HP OpenView Network Node Manager
href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1434">CAN-2005-1434 |
Low/ High (High if arbitrary code can be executed) |
HP Security Bulletin, HPSBMA01140, May 2, 2005 |
Info-ZIP
Zip 2.3; Avaya CVLAN, Intuity LX, MN100, Modular Messaging (MSS) 1.1,
2.0, Network Routing |
A buffer overflow vulnerability exists due to a boundary error when
doing recursive compression of directories with 'zip,' which could let a
remote malicious user execute arbitrary code.
Ubuntu:
href="http://security.ubuntu.com/ubuntu/pool/main/z/zip/zip_2.30-6ubuntu0.1_amd64.deb"
target=_blank>http://security.ubuntu.com/ ubuntu/pool/main/z/zip/
Fedora:
href="http://download.fedora.redhat.com/pub/fedora/linux/core/updates/2/"> http://download.fedora.redhat.com/pub /fedora/linux/core/updates/
Gentoo:
href="http://security.gentoo.org/glsa/glsa-200411-16.xml"> http://security.gentoo.org/glsa/ glsa-200411-16.xml
Mandrake:
href="http://www.mandrakesecure.net/en/ftp.php"
target=_blank> http://www.mandrakesecure.net/ en/ftp.php
SUSE:
href=" ftp://ftp.suse.com/pub/suse"> ftp://ftp.SUSE.com/pub/SUSE
Red Hat:
href="http://rhn.redhat.com/errata/RHSA-2004-634.html"> http://rhn.redhat.com/errata/ RHSA-2004-634.html
Debian:
href="http://www.debian.org/security/2005/dsa-624"> http://www.debian.org/ security/2005/dsa-624
TurboLinux:
href="ftp://ftp.turbolinux.co.jp/pub/TurboLinux/TurboLinux/ia32/"> ftp://ftp.turbolinux.co.jp/pub/ TurboLinux/TurboLinux/ia32/
Avaya:
href="http://support.avaya.com/elmodocs2/security/ASA-2005-019_RHSA-2004-634.pdf"> http://support.avaya.com/elmodocs2/ security/ASA-2005-019_RHSA-2004-634.pdf
Fedora Legacy:
href="http://download.fedoralegacy.org/redhat/"> http://download.fedoralegacy.org/ redhat/
href="http://download.fedoralegacy.org/fedora/1/updates/">http://download.fedoralegacy.org /fedora/1/updates/
Slackware:
href="ftp://ftp.slackware.com/pub/slackware/">ftp://ftp.slackware.com/ pub/slackware/
Currently we are not aware of any exploits for this
vulnerability.
|
Info-ZIP Zip Remote Recursive Directory Compression Buffer Overflow
href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1010">CAN-2004-1010
|
class=highrisk>High |
Bugtraq, November 3, 2004
Ubuntu Security Notice, USN-18-1, November 5, 2004
Fedora Update Notification, FEDORA-2004-399 & FEDORA-2004-400,
November 8 & 9, 2004
Gentoo Linux Security Advisory, GLSA 200411-16, November 9, 2004
Mandrakelinux Security Update Advisory, MDKSA-2004:141, November 26,
2004
SUSE Security Summary Report, SUSE-SR:2004:003, December 7, 2004
Red Hat Advisory, RHSA-2004:634-08, December 16, 2004
Debian DSA-624-1, January 5, 2005
Turbolinux Security Announcement, 20050131, January 31,
2005
Avaya Security Advisory, ASA-2005-019, January 25,
200
Fedora Legacy Update Advisory, FLSA:2255, February 1,
2005
Slackware Security Advisory, SSA:2005-121-01, May
2, 2005
|
Joshua Chamas
Crypt::SSLeay 0.51 |
A vulnerability has been reported because a file is
employed from a world writable location for its fallback entropy source,
which could lead to weak cryptographic operations.
Ubuntu:
href="http://security.ubuntu.com/ubuntu/pool/main/libn/libnet-ssleay-perl/">http://security.ubuntu.com/ubuntu/ pool/main/libn/libnet-ssleay-perl/
There is no exploit code required. |
Joshua Chamas Crypt::SSLeay Perl Module Insecure Entropy Source
href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0106">CAN-2005-0106 |
Medium |
Ubuntu Security Notice, USN-113-1, May 03, 2005 |
Kalum Somaratna
ProZilla Download Accelerator 1.0 x, 1.3.0-1.3.4, 1.3.5 .2, 1.3.5 .1,
1.3.5-1.3.5.2 1.3.6 |
A vulnerability exists due to improper implementation of a
formatted string function when handling initial server responses, which
could let a remote malicious user execute arbitrary code.
Debian:
href="http://security.debian.org/pool/updates/main/p/prozilla/p">http://security.debian.org/pool/ updates/main/p/prozilla/p
An exploit script has been published. |
ProZilla Initial Server Response Format String
href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0523">CAN-2005-0523
|
High |
Security Focus, 12635, February 23, 2005
Debian Security Advisory, DSA 719-1, April 28, 2005
|
KDE
KDE 3.2-3.2.3, 3.3-3.3.2, 3.4, KDE Quanta 3.1 |
A vulnerability has been reported due to a design error in Kommander,
which could let a remote malicious user execute arbitrary code.
Patches available at:
href="ftp://ftp.kde.org/pub/kde/security_patches/post-3.3.2-kdewebdev-kommander.diff"
target=_blank>ftp://ftp.kde.org/pub/kde/ security_patches/f
Gentoo:
href="http://security.gentoo.org/glsa/glsa-200504-23.xml"> http://security.gentoo.org/ glsa/glsa-200504-23.xml
Fedora:
href="http://download.fedora.redhat.com/pub/fedora/linux/core/updates/3/">http://download.fedora.redhat.com/ pub/fedora/linux/core/updates/3/
Currently we are not aware of any exploits for this
vulnerability.
|
KDE Kommander Remote Arbitrary Code Execution
href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0754">CAN-2005-0754 |
High |
KDE Security Advisory, April 20, 2005
Gentoo Linux Security Advisory, GLSA 200504-23, April 22, 200
Fedora Update Notification FEDORA-2005-345, April 28, 2005
|
LBL
tcpdump 3.4 a6, 3.4, 3.5, alpha, 3.5.2, 3.6.2, 3.6.3, 3.7-3.7.2,
class=bodytext>3.8.1 -3.8.3 |
Remote Denials of Service vulnerabilities have been reported due to the
way tcpdump decodes Border Gateway Protocol (BGP) packets, Label
Distribution Protocol (LDP) datagrams, Resource ReSerVation Protocol
(RSVP) packets, and Intermediate System to Intermediate System (ISIS)
packets.
Fedora:
href="http://download.fedora.redhat.com/pub/fedora/linux/core/updates/3/">http://download.fedora.redhat.com/ pub/fedora/linux/core/updates/3/
Exploit scripts have been published. |
LBL TCPDump Remote Denials of Service
href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1278">CAN-2005-1278
href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1279"> CAN-2005-1279
href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1280">CAN-2005-1280
|
Low |
Bugtraq, 396932, April 26, 2005
Fedora Update Notification, FEDORA-2005-351, May 3, 2005
|
Linux kernel 2.6.11 .7 |
A Denial of Service vulnerability has been reported due to the creation
of an insecure file by the kernel it87 and via686a drivers.
Patch available at:
href="http://kernel.org/pub/linux/kernel/v2.6/patch-2.6.11.8.bz2"
target=_blank>http://kernel.org/pub/linux/ kernel/v2.6/patch-2.6.11.8.bz2
There is no exploit code required. |
Linux Kernel it87 & via686a Drivers Denial of Service
href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1369">CAN-2005-1369 |
Low |
Secunia Advisory, SA15204, May 2, 2005 |
MandrakeSoft
lam-runtime-7.0.6-2mdk |
A vulnerability has been reported in the LAM/MPI Runtime environment
due to the creation of an insecure account, which could let a local/remote
malicious user obtain unauthorized access.
No workaround or patch available at time of publishing.
There is no exploit code required. |
MandrakeSoft LAM/MPI Runtime Insecure Account Creation
href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1379">CAN-2005-1379 |
Medium |
Bugtraq, 397157, April 28, 2005 |
Marc Lehmann
Convert-UUlib 1.50 |
A buffer overflow vulnerability has been reported in the
Convert::UUlib module for Perl due to a boundary error, which could let a
remote malicious user execute arbitrary code.
Update available at:
href="http://search.cpan.org/dist/Convert-UUlib/">http://search.cpan.org/ dist/Convert-UUlib/
Gentoo:
href="http://security.gentoo.org/glsa/glsa-200504-26.xml"> http://security.gentoo.org/ glsa/glsa-200504-26.xml
Currently we are not aware of any exploits for this
vulnerability. |
Convert-UUlib Perl Module Buffer Overflow
href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1349">CAN-2005-1349 |
High |
Gentoo Linux Security Advisory, GLSA 200504-26, April 26, 2005
Secunia Advisory, SA15130, April 27,2 005 |
mtp-target.org
Mtp-Target for Windows 1.2.2 & prior, Mtp-Target for Linux 1.2.2
& prior |
Several vulnerabilities have been reported: a format string
vulnerability has been reported in the client code when messages from
other users are displayed, which could let a remote malicious user execute
arbitrary code; and a remote Denial of Service vulnerability has been
reported due to a negative integer overflow from the NeL library.
No workaround or patch available at time of publishing.
A Proof of Concept exploit script has been published. |
Mtp Target Format String and Denial of Service
href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1401">CAN-2005-1401
href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1402">CAN-2005-1402
href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1401">
|
Low/ High (High if arbitrary code can be executed) |
Securiteam, May 2, 2005 |
Multiple Vendors
ImageMagick 6.0-6.0.8, 6.1-6.1.8, 6.2 .0.7, 6.2 .0.4, 6.2, 6.2.1 |
A buffer overflow vulnerability has been reported due to a failure to
properly validate user-supplied string lengths before copying into static
process buffers, which could let a remote malicious user cause a Denial of
Service.
Upgrades available at:
href="http://www.imagemagick.org/script/binary-releases.php"
target=_blank>http://www.imagemagick.org/ script/binary-releases.php
Fedora:
href="http://download.fedora.redhat.com/pub/fedora/linux/core/updates/3/">http://download.fedora.redhat.com/ pub/fedora/linux/core/updates/3/
A Proof of Concept exploit has been published. |
ImageMagick Remote Buffer Overflow
href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1275">CAN-2005-1275 |
|
Security Focus, 13351, April 25, 2005
Fedora Update Notification FEDORA-2005-344, April 28, 2005
|
Multiple Vendors
KDE 2.0, beta, 2.0.1, 2.1-2.1.2, 2.2-2.2.2, 3.0-3.0.5, 3.1-3.1.5,
3.2-3.2.3, 3.3-3.3.2, 3.4; Novell Linux Desktop 9; SuSE E. Linux 9.1,
x86_64, 9.2, x86_64, 9.3, Linux Enterprise Server 9 |
A buffer overflow vulnerability has been reported in the 'kimgio'
image library due to insufficient validation of PCX image data, which
could let a remote malicious user cause a Denial of Service or possibly
execute arbitrary code.
Patches available at:
href="http://bugs.kde.org/attachment.cgi?id=10325&action=view">http://bugs.kde.org/attachment.cgi ?id=10325&action=view
href="http://bugs.kde.org/attachment.cgi?id=10326&action=view ">http://bugs.kde.org/attachment.cgi ?id=10326&action=view
SuSE:
href="ftp://ftp.suse.com/pub/suse/i386/update/9.1/rpm/i586/kdelibs3-3.2.1-44.46.i586.rpm"
target=_blank>ftp://ftp.suse.com/pub/suse/
Gentoo:
href="http://security.gentoo.org/glsa/glsa-200504-22.xml"> http://security.gentoo.org/ glsa/glsa-200504-22.xml
Debian:
href="http://security.debian.org/pool/updates/main/k/kdelibs/">http://security.debian.org/ pool/updates/main/k/kdelibs/
Fedora:
href="http://download.fedora.redhat.com/pub/fedora/linux/core/updates/3/">http://download.fedora.redhat.com/ pub/fedora/linux/core/updates/3/
Denial of Service Proofs of Concept exploits have been published.
|
KDE 'kimgio' image library Remote Buffer Overflow
href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1046">CAN-2005-1046 |
Low/ High (High if arbitrary code can be executed) |
SUSE Security Announcement, SUSE-SA:2005:022, April 11, 2005
Gentoo Linux Security Advisory, GLSA 200504-22, April 22, 2005
Debian Security Advisory, DSA 714-1, April 26, 2005
Fedora Update Notification, FEDORA-2005-350, May 2, 2005
|
Multiple Vendors
Larry Wall Perl 5.0 05_003, 5.0 05, 5.0 04_05, 5.0 04_04, 5.0 04, 5.0
03, 5.6, 5.6.1, 5.8, 5.8.1, 5.8.3, 5.8.4 -5, 5.8.4 -4, 5.8.4 -3, 5.8.4
-2.3, 5.8.4 -2, 5.8.4 -1, 5.8.4, 5.8.5, 5.8.6 |
A vulnerability has been reported in the 'rmtree()' function in the
'File::Path.pm' module when handling directory permissions while cleaning
up directories, which could let a malicious user obtain elevated
privileges.
Ubuntu:
href="http://security.ubuntu.com/ubuntu/pool/universe/p/perl/libcgi-fast-perl_5.8.4-2ubuntu0.4_all.deb"
target=_blank>http://security.ubuntu.com/ ubuntu/pool/universe/p/perl/
Gentoo:
href="http://security.gentoo.org/glsa/glsa-200501-38.xml"> http://security.gentoo.org/glsa/ glsa-200501-38.xml
Debian:
href="http://security.debian.org/pool/updates/main/p/perl/"> http://security.debian.org/pool /updates/main/p/perl/
TurboLinux:
href="ftp://ftp.turbolinux.co.jp/pub/TurboLinux/TurboLinux/ia32/">ftp://ftp.turbolinux.co.jp/pub/ TurboLinux/TurboLinux/ia32/
Mandrake:
href="http://www.mandrakesecure.net/en/ftp.php"> http://www.mandrakesecure.net/ en/ftp.php
Currently we are not aware of any exploits for this
vulnerability. |
Perl 'rmtree()' Function Elevated Privileges
href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0448">CAN-2005-0448 |
Medium |
Ubuntu Security Notice, USN-94-1 March 09, 2005
Gentoo Linux Security Advisory [UPDATE], GLSA 200501-38:03, March 15,
2005
Debian Security Advisory, DSA 696-1 , March 22, 2005
Turbolinux Security Advisory, TLSA-2005-45, April 19, 2005
Mandriva Linux Security Update Advisory, MDKSA-2005:079, April
29, 2005 |
Multiple Vendors
Linux kernel 2.4 .0-test1-test12, 2.4-2.4.29, 2.6, 2.6-test1-test11,
2.6.1-2.6.11 |
Multiple vulnerabilities have been reported in the ISO9660 handling
routines, which could let a malicious user execute arbitrary code.
Fedora:
href="http://download.fedora.redhat.com/pub/fedora/linux/core/updates/">http://download.fedora.redhat.com/ pub/fedora/linux/core/updates/
Ubuntu:
href="http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/">http://security.ubuntu.com/ ubuntu/pool/main/l/linux-source-2.6.8.1/
Fedora:
href="http://download.fedora.redhat.com/pub/fedora/linux/core/updates/">http://download.fedora. redhat.com/pub/fedora/l inux/core/updates/
RedHat:
href="http://rhn.redhat.com/errata/RHSA-2005-366.html">http://rhn.redhat.com/ errata/RHSA-2005-366.html
Conectiva:
href="ftp://atualizacoes.conectiva.com.br/">ftp://atualizacoes.conectiva. com.br/
Currently we are not aware of any exploits for these
vulnerabilities. |
Linux Kernel Multiple ISO9660 Filesystem Handling
Vulnerabilities
href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0815">CAN-2005-0815 |
High |
Security Focus, 12837, March 18, 2005
Fedora Security Update Notification, FEDORA-2005-262, March 28,
2005
Ubuntu Security Notice, USN-103-1, April 1, 2005
Fedora Update Notification FEDORA-2005-313, April 11, 2005
RedHat Security Advisory, RHSA-2005:366-19, April 19, 2005
Conectiva Linux Security Announcement, CLA-2005:952, May 2, 2005 |
Multiple Vendors
Perl |
A race condition vulnerability was reported in the
'File::Path::rmtree()' function. A remote user may be able to obtain
potentially sensitive information. A remote user may be able to obtain
potentially sensitive information or modify files.
The vendor has released Perl version 5.8.4-5 to address this
vulnerability. Customers are advised to contact the vendor for information
regarding update availability.
Debian:
href="http://security.debian.org/pool/updates/main/p/perl/perl-doc_5.6.1-8.8_all.deb"
target=_blank>http://security.debian.org/pool/ updates/main/p/perl/
Ubuntu:
href="http://security.ubuntu.com/ubuntu/pool/main/p/perl/perl-doc_5.8.4-2ubuntu0.2_all.deb"
target=_blank>http://security.ubuntu.com/ ubuntu/pool/main/p/perl/
OpenPKG:
href="ftp://ftp.openpkg.org/release/2.1/UPD/perl-5.8.4-2.1.1.src.rpm"
target=_blank>ftp://ftp.openpkg.org/release/ 2.1/UPD/perl-5.8.4-2.1.1.src.rpm
Gentoo:
href=" http://security.gentoo.org/glsa/glsa-200501-38.xml"> http://security.gentoo.org/ glsa/glsa-200501-38.xml
Mandrake:
href="http://www.mandrakesoft.com/security/advisories?name=MDKSA-2005:031"> http://www.mandrakesoft.com/ security/advisories?name= MDKSA-2005:031
SUSE:
href="ftp://ftp.suse.com/pub/suse/"> ftp://ftp.suse.com/pub/suse/
Gentoo:
href="http://security.gentoo.org/glsa/glsa-200501-38.xml"> http://security.gentoo.org /glsa/glsa-200501-38.xml
Fedora:
href="http://download.fedora.redhat.com/pub/fedora/linux/core/updates/3/">http://download.fedora.redhat.com/ pub/fedora/linux/core/updates/3/
Currently we are not aware of any exploits for this
vulnerability. |
Multiple Vendors Perl File::Path::rmtree() Permission
Modification Vulnerability
href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0452">CAN-2004-0452 |
Medium |
Ubuntu Security Notice, USN-44-1, December 21, 2004
Debian Security Advisory, DSA 620-1, December 30, 2004
OpenPKG Security Advisory, OpenPKG-SA-2005.001, January 11, 2005
Gentoo Linux Security Advisory, GLSA 200501-38, January 26, 2005
MandrakeSoft Security Advisory, MDKSA-2005:031, February 8, 2005
SUSE Security Summary Report, SUSE-SR:2005:004, February 11, 2005
Gentoo Linux Security Advisory [UPDATE], GLSA 200501-38:03, March 15,
2005
Fedora Update Notification, FEDORA-2005-353, May 2, 2005
|
Multiple Vendors
Squid Web Proxy Cache 2.5 .STABLE9, .STABLE8, .STABLE7 |
A vulnerability exists when using the Netscape Set-Cookie
recommendations for handling cookies in caches due to a race condition,
which could let a malicious user obtain sensitive information.
Patches available at:
href="http://www.squid-cache.org/Versions/v2/2.5/bugs/squid-2.5.STABLE9-setcookie.patch"
target=_blank>http://www.squid-cache.org/Versions /v2/2.5/bugs/squid-2.5.STABLE9-setcookie.patch
Ubuntu:
href=" http://security.ubuntu.com/ubuntu/pool/main/s/squid/"> http://security.ubuntu.com/ubuntu/ pool/main/s/squid/
Fedora:
href="http://download.fedora.redhat.com/pub/fedora/linux/core/updates/2/">http://download.fedora.redhat.com/ pub/fedora/linux/core/updates/
Conectiva:
href="ftp://atualizacoes.conectiva.com.br/">ftp://atualizacoes. conectiva.com.br/
Mandrake:
href="http://www.mandrakesecure.net/en/ftp.php"> http://www.mandrakesecure.net/ en/ftp.php
There is no exploit code required.
|
Squid Proxy Set-Cookie Headers Information Disclosure
href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0626">CAN-2005-0626 |
Medium |
Secunia Advisory, SA14451, March 3, 2005
Ubuntu Security Notice, USN-93-1 March 08, 2005
Fedora Update Notifications, FEDORA-2005- 275 & 276,
March 30, 2005
Conectiva Linux Security Announcement, CLA-2005:948, April 27,
2005
Mandriva Linux Security Update Advisory, MDKSA-2005:078, April
29, 2005 |
Multiple Vendors
Concurrent Versions System (CVS) 1.x;Gentoo Linux; SuSE Linux 8.2, 9.0,
9.1, x86_64, 9.2, x86_64, 9.3, Linux Enterprise Server 9, 8,
Open-Enterprise-Server 9.0, School-Server 1.0, SUSE CORE 9 for x86,
UnitedLinux 1.0 |
Multiple vulnerabilities have been reported: a buffer overflow
vulnerability was reported due to an unspecified boundary error, which
could let a remote malicious user potentially execute arbitrary code; a
remote Denial of Service vulnerability was reported due to memory leaks
and NULL pointer dereferences; an unspecified error was reported due to an
arbitrary free (the impact was not specified), and several errors were
reported in the contributed Perl scripts, which could let a remote
malicious user execute arbitrary code.
Update available at:
href="https://ccvs.cvshome.org/servlets/ProjectDocumentList">https://ccvs.cvshome.org/ servlets/ProjectDocumentList
Gentoo:
href="http://security.gentoo.org/glsa/glsa-200504-16.xml">http://security.gentoo.org/ glsa/glsa-200504-16.xml
SuSE:
href="ftp://ftp.suse.com/pub/suse/i386/update/8.2/rpm/i586/cvs-1.11.5-116.i586.rpm"
target=_blank>ftp://ftp.suse.com/pub/suse/i
Fedora:
href=" http://download.fedora.redhat.com/pub/fedora/linux/core/updates/3/"> http://download.fedora.redhat.com/ pub/fedora/linux/core/updates/3/
Mandrake:
href="http://www.mandrakesecure.net/en/ftp.php"> http://www.mandrakesecure.net/ en/ftp.php
Trustix:
href="http://http.trustix.org/pub/trustix/updates/"> http://http.trustix.org/pub/ trustix/updates/
FreeBSD:
href="ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/patches/S">ftp://ftp.FreeBSD.org/pub/
Peachtree:
href="http://peachtree.burdell.org/updates/"> http://peachtree.burdell.org/ updates/
RedHat:
href="http://rhn.redhat.com/errata/RHSA-2005-387.html"> http://rhn.redhat.com/errata/ RHSA-2005-387.html
OpenBSD:
href="http://www.openbsd.org/errata.html#cvs"> http://www.openbsd.org/ errata.html#cvs
TurboLinux:
href="ftp://ftp.turbolinux.co.jp/pub/TurboLinux/TurboLinux/ia32/">ftp://ftp.turbolinux.co.jp/p ub/TurboLinux/TurboLinux/ia32/
Currently we are not aware of any exploits for these
vulnerabilities. |
CVS Multiple Vulnerabilities
href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0753">CAN-2005-0753 |
Low/ High (High if arbitrary code can be executed) |
Gentoo Linux Security Advisory, GLSA 200504-16, April 18, 2005
SuSE Security Announcement, SUSE-SA:2005:024, April 18, 2005
Secunia Advisory, SA14976, April 19, 2005
Fedora Update Notification, FEDORA-2005-330, April 20, 2006
Mandriva Linux Security Update Advisory, MDKSA-2005:073, April 21, 2005
Trustix Secure Linux Security Advisory, TSLSA-2005-0013, April 21, 2005
Gentoo Linux Security Advisory [UPDATE], GLSA 200504-16:02, April 22,
2005
FreeBSD Security Advisory, FreeBSD-SA-05:05, April 22, 2005
Peachtree Linux Security Notice, PLSN-0005, April 22, 2005
RedHat Security Advisory, RHSA-2005:387-06, April 25, 2005
Turbolinux Security Advisory, TLSA-2005-51, April 28, 2005
|
Multiple Vendors
Larry Wall Perl 5.8, 5.8.1, 5.8.3, 5.8.4, 5.8.4 -1-5.8.4-5; Ubuntu
Linux 4.1 ppc, ia64, ia32
|
Multiple vulnerabilities exist: a buffer overflow
vulnerability exists in the 'PERLIO_DEBUG' SuidPerl environment variable,
which could let a malicious user execute arbitrary code; and a
vulnerability exists due to an error when handling debug message output,
which could let a malicious user corrupt arbitrary files.
Ubuntu:
href="http://security.ubuntu.com/ubuntu/pool/universe/p/perl/libcgi-fast-perl_5.8.4-2ubuntu0.3_all.deb"
target=_blank>http://security.ubuntu.com/ ubuntu/pool/universe/p/perl/
Gentoo:
href="http://security.gentoo.org/glsa/glsa-200502-13.xml"> http://security.gentoo.org/ glsa/glsa-200502-13.xml
Mandrake:
href="http://www.mandrakesoft.com/security/advisories?name=MDKSA-2005:031"> http://www.mandrakesoft.com/security/ advisories?name=MDKSA-2005:031
RedHat:
href="http://rhn.redhat.com/errata/RHSA-2005-105.html"> http://rhn.redhat.com/errata/ RHSA-2005-105.html
SGI:
href="ftp://oss.sgi.com/projects/sgi_propack/download/3/updates/"> ftp://oss.sgi.com/projects/ sgi_propack/download/3/updates/
SUSE:
href="ftp://ftp.suse.com/pub/suse/"> ftp://ftp.suse.com/pub/suse/
Trustix:
href="http://www.trustix.org/errata/2005/0003/"> http://www.trustix.org/errata/2005/0003/
IBM:
href="ftp://aix.software.ibm.com/aix/efixes/security/perl58x.tar.Z"> ftp://aix.software.ibm.com/ aix/efixes/security/perl58x.tar.Z
Fedora:
href="http://download.fedora.redhat.com/pub/fedora/linux/core/updates/3/">http://download.fedora.redhat.com/ pub/fedora/linux/core/updates/3/
Proofs of Concept exploits have been published. |
Perl SuidPerl Multiple Vulnerabilities
href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0155">CAN-2005-0155
href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0156">CAN-2005-0156 |
Medium/ High (High if arbitrary code can be executed) |
Ubuntu Security Notice, USN-72-1, February 2, 2005
MandrakeSoft Security Advisory, MDKSA-2005:031, February 9, 2005
RedHat Security Advisory, RHSA-2005:105-11, February 7, 2005
SGI Security Advisory, 20050202-01-U, February 9, 2005
SUSE Security Summary Report, SUSE-SR:2005:004, February 11, 2005
Gentoo Linux Security Advisory, GLSA 200502-13, February 11, 2005
Trustix Secure Linux Security Advisory, TSLSA-2005-0003,February 11,
2005
IBM SECURITY ADVISORY, February 28, 2005
Fedora Update Notification, FEDORA-2005-353, May 2,
2005 |
Multiple Vendors
Linux kernel 2.4-2.4.29, 2.6 .10, 2.6-2.6.11 |
A vulnerability has been reported in the 'bluez_sock_create()' function
when a negative integer value is submitted, which could let a malicious
user execute arbitrary code with root privileges.
Patches available at:
href="http://www.kernel.org/pub/linux/kernel/v2.4/testing/patch-2.4.30-rc3.bz2"
target=_blank>http://www.kernel.org/pub/linux/ kernel/v2.4/testing/patch- 2.4.30-rc3.bz2
Fedora:
href="http://download.fedora.redhat.com/pub/fedora/linux/core/updates/">http://download.fedora.redhat.com/ pub/fedora/linux/core/updates/
SUSE:
href="ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/i586/xorg-x11-libs-6.8.1-15.3.i586.rpm"
target=_blank>ftp://ftp.SUSE.com/pub/SUSE
Trustix:
href="http://http.trustix.org/pub/trustix/updates/">http://http.trustix.org/pub/ trustix/updates/
Fedora:
href="http://download.fedora.redhat.com/pub/fedora/linux/core/updates/">http://download.fedora.redhat.com/ pub/fedora/linux/core/updates/
RedHat:
href="http://rhn.redhat.com/errata/RHSA-2005-366.html">http://rhn.redhat.com/ errata/RHSA-2005-366.html
RedHat:
href="http://rhn.redhat.com/errata/RHSA-2005-283.html">http://rhn.redhat.com/ errata/RHSA-2005-283.html
href="http://rhn.redhat.com/errata/RHSA-2005-284.html">http://rhn.redhat.com/ errata/RHSA-2005-284.html
Conectiva:
href="ftp://atualizacoes.conectiva.com.br/">ftp://atualizacoes.conectiva. com.br/
A Proof of Concept exploit script has been published. |
Linux Kernel Bluetooth Signed Buffer Index
href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0750">CAN-2005-0750 |
High |
Security Tracker Alert, 1013567, March 27, 2005
SUSE Security Announcement, SUSE-SA:2005 :021, April 4, 2005
Trustix Secure Linux Security Advisory, TSLSA-2005-0011, April
5, 2005
US-CERT
VU#685461
Fedora Update Notification FEDORA-2005-313, April 11, 2005
RedHat Security Advisory, RHSA-2005:366-19, April 19, 2005
RedHat Security Advisories, RHSA-2005:283-15 &
RHSA-2005:284-11, April 28, 2005
Conectiva Linux Security Announcement, CLA-2005:952, May 2, 2005 |
Multiple Vendors
Linux kernel 2.4-2.4.30
|
A Denial of Service vulnerability has been reported due to a failure to
handle system calls that contain missing arguments.
RedHat:
href="http://rhn.redhat.com/errata/RHSA-2005-293.html">http://rhn.redhat.com/ errata/RHSA-2005-293.html
href="http://rhn.redhat.com/errata/RHSA-2005-284.html">http://rhn.redhat.com/ errata/RHSA-2005-284.html
Currently we are not aware of any exploits for this
vulnerability.
|
Linux Kernel Itanium System Call Denial of Service
href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0137">CAN-2005-0137 |
Low |
RedHat Security Advisories, RHSA-2005:284-11 & RHSA-2005:293-16,
April 22 & 28, 2005 |
Multiple Vendors
Linux Kernel 2.6.10, 2.6 -test1-test11, 2.6-2.6.11 |
A Denial of Service vulnerability has been reported in the
'load_elf_library' function.
Patches available at:
href="http://www.kernel.org/pub/linux/kernel/v2.6/patch-2.6.11.6.bz2"
target=_blank>http://www.kernel.org/pub/ linux/kernel/v2.6/patch-2.6.11.6.bz2
Fedora:
href="http://download.fedora.redhat.com/pub/fedora/linux/core/updates/2/">http://download.fedora.redhat.com/ pub/fedora/linux/core/updates/2/
Trustix:
href="http://http.trustix.org/pub/trustix/updates/">http://http.trustix.org/pub/ trustix/updates/
Fedora:
href="http://download.fedora.redhat.com/pub/fedora/linux/core/updates/">http://download.fedora.redhat.com/ pub/fedora/linux/core/updates/
RedHat:
href="http://rhn.redhat.com/errata/RHSA-2005-366.html">http://rhn.redhat.com/ errata/RHSA-2005-366.html
Conectiva:
href="ftp://atualizacoes.conectiva.com.br/">ftp://atualizacoes.conectiva. com.br/
Currently we are not aware of any exploits for this
vulnerability. |
Linux Kernel Local Denial of Service
href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0749">CAN-2005-0749 |
Low |
Fedora Security Update Notification, FEDORA-2005-262, March 28,
2005
Trustix Secure Linux Security Advisory, TSLSA-2005-0011, April
5, 2005
Fedora Update Notification FEDORA-2005-313, April 11, 2005
RedHat Security Advisory, RHSA-2005:366-19, April 19, 2005
Conectiva Linux Security Announcement, CLA-2005:952, May 2, 2005 |
Multiple Vendors
Linux kernel 2.6.10, 2.6 -test9-CVS, 2.6 -test1-test11, 2.6, 2.6.1
rc1&rc2, 2.6.1-2.6.8 |
A remote Denial of Service vulnerability has been reported in the
Point-to-Point Protocol (PPP) Driver.
Ubuntu:
href="http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/">http://security.ubuntu.com/ubuntu/ pool/main/l/linux-source-2.6.8.1/
Trustix:
href="http://http.trustix.org/pub/trustix/updates"> http://http.trustix.org/pub/ trustix/updates
SUSE:
href="ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/i586/xorg-x11-libs-6.8.1-15.3.i586.rpm"
target=_blank>ftp://ftp.SUSE.com/pub/SUSE
Fedora:
href="http://download.fedora.redhat.com/pub/fedora/linux/core/updates/2/">http://download.fedora.redhat.com/ pub/fedora/linux/core/updates/2/
ALTLinux:
href="http://lists.altlinux.ru/pipermail/security-announce/2005-March/000287.html">http://lists.altlinux.ru/ pipermail/security-announce/ 2005-March/000287.html
Fedora:
href="http://download.fedora.redhat.com/pub/fedora/linux/core/updates/">http://download.fedora.redhat.com/ pub/fedora/linux/core/updates/
RedHat:
href="http://rhn.redhat.com/errata/RHSA-2005-366.html">http://rhn.redhat.com/ errata/RHSA-2005-366.html
RedHat:
href="http://rhn.redhat.com/errata/RHSA-2005-283.html">http://rhn.redhat.com/ errata/RHSA-2005-283.html
href="http://rhn.redhat.com/errata/RHSA-2005-284.html">http://rhn.redhat.com/ errata/RHSA-2005-284.html
Conectiva:
href="ftp://atualizacoes.conectiva.com.br/">ftp://atualizacoes. conectiva.com.br/
Currently we are not aware of any exploits for this vulnerability.
|
Linux Kernel PPP Driver Remote Denial of Service
href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0384">CAN-2005-0384 |
Low |
Ubuntu Security Notice, USN-95-1 March 15, 2005
Trustix Secure Linux Security Advisory, TSL-2005-0009, March 21, 2005
SUSE Security Announcement, SUSE-SA:2005:018, March 24, 2005
Fedora Security Update Notification, FEDORA-2005-262, March 28,
2005
ALTLinux Security Advisory, March 29, 2005
Fedora Update Notification FEDORA-2005-313, April 11, 2005
RedHat Security Advisory, RHSA-2005:366-19, April 19, 2005
RedHat Security Advisories, RHSA-2005:283-15 &
RHSA-2005:284-11, April 28, 2005
Conectiva Linux Security Announcement, CLA-2005:952, May 2,
2005 |
Multiple Vendors
Linux kernel 2.6.10, 2.6 -test9-CVS, 2.6-test1- -test11, 2.6,
2.6.1-2.6.11 ; RedHat Desktop 4.0, Enterprise Linux WS 4, ES 4, AS 4
|
Multiple vulnerabilities exist: a vulnerability exists in the 'shmctl'
function, which could let a malicious user obtain sensitive information; a
Denial of Service vulnerability exists in 'nls_ascii.c' due to the use of
incorrect table sizes; a race condition vulnerability exists in the
'setsid()' function; and a vulnerability exists in the OUTS instruction on
the AMD64 and Intel EM64T architecture, which could let a malicious user
obtain elevated privileges.
RedHat:
href="https://rhn.redhat.com/errata/RHSA-2005-092.html"> https://rhn.redhat.com/errata/ RHSA-2005-092.html
Ubuntu:
href="http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/"> http://security.ubuntu.com/ubuntu/ pool/main/l/linux-source-2.6.8.1/
Conectiva:
href="ftp://atualizacoes.conectiva.com.br/1"> ftp://atualizacoes.conectiva. com.br/
SUSE:
href="ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/i586/xorg-x11-libs-6.8.1-15.3.i586.rpm"
target=_blank>ftp://ftp.SUSE.com/pub/SUSE
Fedora:
href="http://download.fedora.redhat.com/pub/fedora/linux/core/updates/2/">http://download.fedora.redhat.com/ pub/fedora/linux/core/updates/2/
Conectiva:
href="ftp://atualizacoes.conectiva.com.br/10/">ftp://atualizacoes.conectiva. com.br/10/
Fedora:
href="http://download.fedora.redhat.com/pub/fedora/linux/core/updates/">http://download.fedora.redhat.com/ pub/fedora/linux/core/updates/
RedHat:
href="http://rhn.redhat.com/errata/RHSA-2005-366.html">http://rhn.redhat.com/ errata/RHSA-2005-366.html
RedHat:
href="http://rhn.redhat.com/errata/RHSA-2005-283.html">http://rhn.redhat.com/ errata/RHSA-2005-283.html
href="http://rhn.redhat.com/errata/RHSA-2005-284.html">http://rhn.redhat.com/ errata/RHSA-2005-284.html
Currently we are not aware of any exploits for these
vulnerabilities. |
Linux Kernel Multiple Vulnerabilities
href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0177">
href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0176">CAN-2005-0176
href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0177">CAN-2005-0177
href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0178">CAN-2005-0178
href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0177">
href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0176">
href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0177">
href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0178">
href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0204">
href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0204"> CAN-2005-0204 |
Low/ Medium (Low if a DoS) |
Ubuntu Security Notice, USN-82-1, February 15, 2005
RedHat Security Advisory, RHSA-2005:092-14, February 18, 2005
SUSE Security Announcement, SUSE-SA:2005:018, March 24, 2005
Fedora Security Update Notification, FEDORA-2005-262, March 28,
2005
Conectiva Linux Security Announcement, CLA-2005:945, March 31,
2005
Fedora Update Notification FEDORA-2005-313, April 11, 2005
RedHat Security Advisory, RHSA-2005:366-19, April 19, 2005
RedHat Security Advisories, RHSA-2005:283-15 &
RHSA-2005:284-11, April 28, 2005 |
Multiple Vendors
Linux kernel 2.6.10, 2.6, -test1-test 11, 2.6.1- 2.6.11; RedHat
Fedora Core2 |
A vulnerability has been reported in the EXT2 filesystem
handling code, which could let malicious user obtain sensitive
information.
Patches available at:
href="http://www.kernel.org/pub/linux/kernel/v2.6/patch-2.6.11.6.bz2"
target=_blank>http://www.kernel.org/pub/linux/ kernel/v2.6/patch-2.6.11.6.bz2
Fedora:
href="http://download.fedora.redhat.com/pub/fedora/linux/core/updates/2/">http://download.fedora.redhat.com/ pub/fedora/linux/core/updates/2/
Trustix:
href="http://http.trustix.org/pub/trustix/updates/">http://http.trustix.org/pub/ trustix/updates/
Fedora:
href="http://download.fedora.redhat.com/pub/fedora/linux/core/updates/">http://download.fedora.redhat.com/ pub/fedora/linux/core/updates/
RedHat:
href="http://rhn.redhat.com/errata/RHSA-2005-366.html">http://rhn.redhat.com/ errata/RHSA-2005-366.html
Conectiva:
href="ftp://atualizacoes.conectiva.com.br/">ftp://atualizacoes.conectiva. com.br/
Currently we are not aware of any exploits for this
vulnerability. |
Linux Kernel EXT2 File System Information Leak
href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0400">CAN-2005-0400 |
Medium |
Security Focus, 12932, March 29, 2005
Trustix Secure Linux Security Advisory, TSLSA-2005-0011, April
5, 2005
Fedora Update Notification FEDORA-2005-313, April 11, 2005
RedHat Security Advisory, RHSA-2005:366-19, April 19, 2005
Conectiva Linux Security Announcement, CLA-2005:952, May 2, 2005
|
Multiple Vendors
Linux kernel 2.6.10, 2.6, -test9-CVS, -test1-test11, 2.6.1-2.6.9;
RedHat Desktop 4.0, Enterprise Linux WS 4, ES 4, AS 4 |
A Denial of Service vulnerability has been reported in the
'Unw_Unwind_To_User' function.
RedHat;
href="http://rhn.redhat.com/errata/RHSA-2005-366.html">http://rhn.redhat.com/ errata/RHSA-2005-366.html
href="http://rhn.redhat.com/errata/RHSA-2005-293.html">http://rhn.redhat.com/ errata/RHSA-2005-293.html
RedHat:
href="http://rhn.redhat.com/errata/RHSA-2005-284.html">http://rhn.redhat.com/ errata/RHSA-2005-284.html
Currently we are not aware of any exploits for this
vulnerability. |
Linux Kernel Unw_Unwind_ To_User Denial of Service
href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0135">CAN-2005-0135 |
Low |
RedHat Security Advisory, RHSA-2005:366-19 & RHSA-2005-2935 , April
19 & 22, 2005
RedHat Security Advisory, RHSA-2005:284-11, April 28, 2005
|
Multiple Vendors
Linux kernel 2.6-2.6.11 |
A vulnerability has been reported in 'SYS_EPoll_Wait' due to a failure
to properly handle user-supplied size values, which could let a malicious
user obtain elevated privileges.
Ubuntu:
href="http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/"> http://security.ubuntu.com/ubuntu/ pool/main/l/linux-source-2.6.8.1
Fedora:
href="http://download.fedora.redhat.com/pub/fedora/linux/core/updates/">http://download.fedora.redhat.com/ pub/fedora/linux/core/updates/
RedHat:
href="http://rhn.redhat.com/errata/RHSA-2005-366.html">http://rhn.redhat.com/ errata/RHSA-2005-366.html
Conectiva:
href="ftp://atualizacoes.conectiva.com.br/">ftp://atualizacoes.conectiva. com.br/
An exploit script has been published. |
Linux Kernel SYS_EPoll_Wait Elevated Privileges
href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0736">CAN-2005-0736 |
Medium |
Security Focus, 12763, March 8, 2005
Ubuntu Security Notice, USN-95-1 March 15, 2005
Security Focus, 12763, March 22, 2005
Fedora Security Update Notification, FEDORA-2005-262, March 28,
2005
Fedora Update Notification FEDORA-2005-313, April 11, 2005
RedHat Security Advisory, RHSA-2005:366-19, April 19, 2005
Conectiva Linux Security Announcement, CLA-2005:952, May 2, 2005 |
Multiple Vendors
RedHat Fedora Core3, Core2; Rob Flynn Gaim 1.2; Peachtree Linux
release 1 |
A remote Denial of Service vulnerability has been reported when an
unspecified Jabber file transfer request is handled.
Upgrade available at:
href="http://gaim.sourceforge.net/downloads.php"
target=_blank>http://gaim.sourceforge.net/ downloads.php
Fedora:
href="http://download.fedora.redhat.com/pub/fedora/linux/core/updates/">http://download.fedora.redhat.com/ pub/fedora/linux/core/updates/
Gentoo:
href="http://security.gentoo.org/glsa/glsa-200504-05.xml">http://security.gentoo.org/ glsa/glsa-200504-05.xml
RedHat:
href="http://rhn.redhat.com/errata/RHSA-2005-365.html">http://rhn.redhat.com/ errata/RHSA-2005-365.html
Mandrake:
href="http://www.mandrakesecure.net/en/ftp.php"> http://www.mandrakesecure.net/ en/ftp.php
SGI:
href="http://www.sgi.com/support/security/">http://www.sgi.com/support/ security/
Peachtree:
href="http://peachtree.burdell.org/updates/"> http://peachtree.burdell.org/ updates/
Conectiva:
href="ftp://atualizacoes.conectiva.com.br/">ftp://atualizacoes. conectiva.com.br/
There is no exploit code required. |
Gaim Jabber File Request Remote Denial of Service
href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0967">CAN-2005-0967 |
Low |
Fedora Update Notifications, FEDORA-2005- 298 & 299,
April 5, 2005
Gentoo Linux Security Advisory, GLSA 200504-05, April 06, 2005
RedHat Security Advisory, RHSA-2005:365-06, April 12, 2005
Mandriva Linux Security Update Advisory, MDKSA-2005:071, April 14, 2005
SGI Security Advisory, 20050404-01-U, April 20, 2005
Peachtree Linux Security Notice, PLSN-0001, April 21, 2005
Conectiva Linux Security Announcement, CLA-2005:949, April 27,
2005 |
Multiple Vendors
RedHat Fedora Core3, Core2; Rob Flynn Gaim 1.2; Ubuntu Linux 4.1
ppc, ia64, ia32; Peachtree Linux release 1 |
Two vulnerabilities have been reported: a remote Denial of Service
vulnerability has been reported due to a buffer overflow in
the 'gaim_markup_strip_html()' function; and a vulnerability has been
reported in the IRC protocol plug-in due to insufficient sanitization of
the 'irc_msg' data, which could let a remote malicious user execute
arbitrary code.
Update available at:
href="http://gaim.sourceforge.net/downloads.php"
target=_blank>http://gaim.sourceforge.net /downloads.php
Fedora:
href="http://download.fedora.redhat.com/pub/fedora/linux/core/updates/">http://download.fedora.redhat.com/ pub/fedora/linux/core/updates/
Ubuntu:
href="http://security.ubuntu.com/ubuntu/pool/main/g/gaim/">http://security.ubuntu.com/ ubuntu/pool/main/g/gaim/
Gentoo:
href="http://security.gentoo.org/glsa/glsa-200504-05.xml">http://security.gentoo.org/ glsa/glsa-200504-05.xml
RedHat:
href="http://rhn.redhat.com/errata/RHSA-2005-365.html">http://rhn.redhat.com/ errata/RHSA-2005-365.html
Mandrake:
href="http://www.mandrakesecure.net/en/ftp.php"> http://www.mandrakesecure.net/ en/ftp.php
SGI:
href="http://www.sgi.com/support/security/">http://www.sgi.com/support/ security/
Peachtree:
href="http://peachtree.burdell.org/updates/"> http://peachtree.burdell.org/ updates/
Conectiva:
href="ftp://atualizacoes.conectiva.com.br/">ftp://atualizacoes. conectiva.com.br/
Currently we are not aware of any exploits for these
vulnerabilities. |
Gaim 'Gaim_Markup_ Strip_HTML()' Function Remote Denial of
Service & IRC Protocol Plug-in Arbitrary Code Execution
href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0965">CAN-2005-0965
href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0966">CAN-2005-0966
|
Low/ High (High if arbitrary code can be executed) |
Fedora Update Notifications, FEDORA-2005 -298 & 299,
April 5, 2005
Ubuntu Security Notice, USN-106-1 April 05, 2005
Gentoo Linux Security Advisory, GLSA 200504-05, April 06, 2005
RedHat Security Advisory, RHSA-2005:365-06, April 12, 2005
Mandriva Linux Security Update Advisory, MDKSA-2005:071, April 14, 2005
SGI Security Advisory, 20050404-01-U, April 20, 2005
Peachtree Linux Security Notice, PLSN-0001, April 21, 2005
Conectiva Linux Security Announcement, CLA-2005:949, April 27,
2005 |
Multiple Vendors
Squid Web Proxy Cache 2.0 PATCH2, 2.1 PATCH2, 2.3 STABLE5, 2.3 STABLE4,
2.4 STABLE7, 2.4 STABLE6, 2.4, STABLE2, 2.5 STABLE3-STABLE7, 2.5
STABLE1 |
A vulnerability has been reported when handling upstream HTTP agents,
which could let a remote malicious user poison the web proxy cache.
Patches available at:
href="http://www.squid-cache.org/Versions/v2/2.5/squid-2.5.STABLE9.tar.gz"
target=_blank>http://www.squid-cache.org/ Versions/v2/2.5/squid- 2.5.STABLE9.tar.gz
There is no exploit code required. |
Squid Proxy Remote Cache Poisoning
href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0174">CAN-2005-0174 |
Medium |
Squid Proxy Cache Security Update Advisory, SQUID-2005:4, April 23,
2005 |
Multiple Vendors
Squid Web Proxy Cache 2.0 PATCH2, 2.1 PATCH2, 2.3 STABLE5, 2.3 STABLE4,
2.4 STABLE7, 2.4 STABLE6, 2.4, STABLE2, 2.5 STABLE3-STABLE7, 2.5
STABLE1 |
A vulnerability has been reported due to a failure to handle CR/LF
characters in HTTP requests, which could let a remote malicious user
poison the web proxy cache.
Patches available at:
href="http://www.squid-cache.org/Versions/v2/2.5/squid-2.5.STABLE9.tar.gz"
target=_blank>http://www.squid-cache.org/ Versions/v2/2.5/squid- 2.5.STABLE9.tar.gz
There is no exploit code required. |
Squid Proxy HTTP Response Splitting Remote Cache Poisoning
href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0175">CAN-2005-0175 |
Medium |
Squid Proxy Cache Security Update Advisory, SQUID-2005:5, April 23,
2005 |
Multiple Vendors
X.org X11R6 6.7.0, 6.8, 6.8.1; XFree86 X11R6 3.3, 3.3.2-3.3.6, 4.0,
4.0.1, 4.0.2 -11, 4.0.3, 4.1.0, 4.1 -12, 4.1 -11, 4.2 .0, 4.2.1 Errata,
4.2.1, 4.3.0.2, 4.3.0.1, 4.3.0 |
An integer overflow vulnerability exists in 'scan.c' due to
insufficient sanity checks on on the 'bitmap_unit' value, which could let
a remote malicious user execute arbitrary code.
Patch available at:
alink="#999999">
face="Arial, Helvetica">
href="https://bugs.freedesktop.org/attachment.cgi?id=1909">https://bugs.freedesktop.org/ attachment.cgi?id=1909
Gentoo:
href="http://security.gentoo.org/glsa/glsa-200503-08.xml"> http://security.gentoo.org/glsa/ glsa-200503-08.xml
Ubuntu:
href="http://security.ubuntu.com/ubuntu/pool/main/l/lesstif1-1/"> http://security.ubuntu.com/ubuntu/ pool/main/l/lesstif1-1/
Gentoo:
href=" http://security.gentoo.org/glsa/glsa-200503-15.xml"> http://security.gentoo.org/ glsa/glsa-200503-15.xml
Ubuntu:
href="http://security.ubuntu.com/ubuntu/pool/main/x/xfree86/"> http://security.ubuntu.com/ ubuntu/pool/main/x/xfree86/
ALTLinux:
href="http://lists.altlinux.ru/pipermail/security-announce/2005-March/000287.html">http://lists.altlinux.ru/ pipermail/security-announce/ 2005-March/000287.html
Fedora:
href="http://download.fedora.redhat.com/pub/fedora/linux/core/updates/">http://download.fedora.redhat.com/ pub/fedora/linux/core/updates/
RedHat:
href="http://rhn.redhat.com/errata/RHSA-2005-331.html">http://rhn.redhat.com/errata/ RHSA-2005-331.html
SGI:
href="ftp://oss.sgi.com/projects/sgi_propack/download/3/updates/">ftp://oss.sgi.com/projects/ sgi_propack/download/3/updates/
RedHat:
href="http://rhn.redhat.com/errata/RHSA-2005-044.html"> http://rhn.redhat.com/errata/ RHSA-2005-044.html
Mandrake:
href="http://www.mandrakesecure.net/en/ftp.php"> http://www.mandrakesecure.net/ en/ftp.php
Currently we are not aware of any exploits for this
vulnerability. |
LibXPM Bitmap_unit Integer Overflow
href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0605">CAN-2005-0605 |
High |
Security Focus, 12714, March 2, 2005
Gentoo Linux Security Advisory, GLSA 200503-08, March 4, 2005
Ubuntu Security Notice, USN-92-1 March 07, 2005
Gentoo Linux Security Advisory, GLSA 200503-15, March 12, 2005
Ubuntu Security Notice, USN-97-1 March 16, 2005
ALTLinux Security Advisory, March 29, 2005
Fedora Update Notifications, FEDORA-2005 -272 & 273,
March 29, 2005
RedHat Security Advisory, RHSA-2005: 331-06, March 30, 2005
SGI Security Advisory, 20050401-01-U, April 6, 2005
RedHat Security Advisory, RHSA-2005:044-15, April 6, 2005
Mandriva Linux Security Update Advisory, MDKSA-2005:080, April
29, 2005 |
Multiple Vendors
xli 1.14-1.17 |
A vulnerability exists due to a failure to manage internal buffers
securely, which could let a remote malicious user execute arbitrary code.
Gentoo:
href="http://security.gentoo.org/glsa/glsa-200503-05.xml"> http://security.gentoo.org/ glsa/glsa-200503-05.xml
Debian:
href="http://security.debian.org/pool/updates/main/x/xli/"> http://security.debian.org/ pool/updates/main/x/xli/
ALTLinux:
href="http://lists.altlinux.ru/pipermail/security-announce/2005-March/000287.html">http://lists.altlinux.ru/ pipermail/security-announce/ 2005-March/000287.html
Mandrake:
href="http://www.mandrakesecure.net/en/ftp.php"> http://www.mandrakesecure.net/ en/ftp.php
SUSE:
href="ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/i586/xorg-x11-libs-6.8.1-15.3.i586.rpm"
target=_blank>ftp://ftp.SUSE.com/pub/SUSE
Currently we are not aware of any exploits for this
vulnerability. |
XLI Internal Buffer Management
href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0639">CAN-2005-0639 |
High |
Gentoo Linux Security Advisory, GLSA 200503-05, March 2, 2005
Debian Security Advisory, DSA 695-1, March 21, 2005
ALTLinux Security Advisory, March 29, 2005
Mandriva Linux Security Update Advisory, MDKSA-2005:076, April 21, 2005
SUSE Security Summary Report, SUSE-SR:2005:012, April 29, 2005
|
Multiple Vendors
xli 1.14-1.17; xloadimage 3.0, 4.0, 4.1 |
A vulnerability exists due to a failure to parse compressed images
safely, which could let a remote malicious user execute arbitrary code.
Gentoo:
href="http://security.gentoo.org/glsa/glsa-200503-05.xml"> http://security.gentoo.org/ glsa/glsa-200503-05.xml
Debian:
href="http://security.debian.org/pool/updates/main/x/xli/"> http://security.debian.org/ pool/updates/main/x/xli/
Fedora:
href="http://download.fedora.redhat.com/pub/fedora/linux/core/updates/">http://download.fedora. redhat.com/pub/fedora/ linux/core/updates/
TurboLinux:
href="%20ftp://ftp.turbolinux.co.jp/pub/TurboLinux/TurboLinux/ia32/">ftp://ftp.turbolinux.co.jp/pub/ TurboLinux/TurboLinux/ia32/
RedHat:
href="http://rhn.redhat.com/errata/RHSA-2005-332.html"> http://rhn.redhat.com/errata/ RHSA-2005-332.html
Mandrake:
href="http://www.mandrakesecure.net/en/ftp.php"> http://www.mandrakesecure.net/ en/ftp.php
SUSE:
href="ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/i586/xorg-x11-libs-6.8.1-15.3.i586.rpm"
target=_blank>ftp://ftp.SUSE.com/pub/SUSE
Currently we are not aware of any exploits for this
vulnerability. |
XLoadImage Compressed Image Remote Command Execution
href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0638">CAN-2005-0638 |
High |
Gentoo Linux Security Advisory, GLSA 200503-05, March 2, 2005
Fedora Update Notifications, FEDORA-2005-236 & 237, March 18,
2005
Debian Security Advisory, DSA 695-1, March 21, 2005
Turbolinux Security Advisory, TLSA-2005-43, April 19, 2005
RedHat Security Advisory, RHSA-2005:332-10, April 19, 2005
Mandriva Linux Security Update Advisory, MDKSA-2005:076, April 21, 2005
SUSE Security Summary Report, SUSE-SR:2005:012, April 29, 2005
|
Nokia
Affix Bluetooth Protocol Stack 3.1.1, 3.2 |
A vulnerability has been reported in the 'affix_sock_register' due to a
failure to properly handle user-supplied buffer size parameters, which
could let a malicious user obtain elevated privileges.
No workaround or patch available at time of publishing.
A Proof of Concept exploit has been published. |
Affix Bluetooth Protocol Stack Elevated Privileges
href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1294">CAN-2005-1294 |
Medium |
DMA[2005-0423a] Advisory, April 24, 2005 |
Novell
Evolution 2.0.2, 2.0.3 |
A remote Denial of Service vulnerability has been reported due to the
way messages are processed that contained malformed unicode
specifications.
Mandrake:
href="http://www.mandrakesecure.net/en/ftp.php"> http://www.mandrakesecure.net/ en/ftp.php
Conectiva:
href="ftp://atualizacoes.conectiva.com.br/">ftp://atualizacoes. conectiva.com.br/
Currently we are not aware of any exploits for this
vulnerability. |
Novell Evolution Remote Denial of Service
href=" http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0806">CAN-2005-0806 |
Low |
Mandrakelinux Security Update Advisory, MDKSA-2005:059, March 17,
2005
Conectiva Linux Security Announcement, CLA-2005:950, April 27,
2005 |
Open WebMail
Open WebMail prior to 2.51 20050430 |
A vulnerability has been reported due to insufficient sanitization of
input before using in an 'open()' call, which could let an authenticated
remote malicious user execute arbitrary code.
Patches available at:
alink="#999999">
face="Arial, Helvetica">
href="http://openwebmail.org/openwebmail/download/cert/patches/SA-05:02/">http://openwebmail.org/openwebmail/ download/cert/patches/SA-05:02/
Currently we are not aware of any exploits for this
vulnerability.
href=" http://openwebmail.org/openwebmail/download/"> |
Open WebMail Input Validation
href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1435">CAN-2005-1435 |
High |
Security Tracker Alert, 1013859, May 2, 2005 |
osTicket.com
osTicket 1.x |
Multiple vulnerabilities have been reported: a vulnerability was
reported due to insufficient sanitization of unspecified input, which
could let a remote malicious user execute arbitrary HTML and script code;
a vulnerability was reported when adding a ticket due to insufficient
sanitization of the name and subject fields, which could let a remote
malicious user execute arbitrary HTML and script code; a vulnerability was
reported due to insufficient sanitization of the 'id' and 'cat' parameters
before using in a SQL query, which could let a remote malicious user
execute arbitrary SQL code; a vulnerability was reported in 'main.php' due
to insufficient verification of the 'include_dir' parameter, which could
let a local/remote malicious user include arbitrary files; and a
vulnerability was reported in 'attachments.php' due to an input validation
error when handling the 'file' parameter, which could let a remote
malicious user obtain sensitive information.
No workaround or patch available at time of publishing.
Proofs of Concept exploits have been published. |
osTicket Multiple Vulnerabilities
href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1436">CAN-2005-1436
href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1437">CAN-2005-1437
href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1436">
href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1438">CAN-2005-1438
href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1439">CAN-2005-1439 |
Medium/ High (High if arbitrary code can be executed) |
Secunia Advisory, : SA15216, May 3, 2005 |
PHP Group
PHP 4.3-4.3.10; Peachtree Linux release 1 |
A vulnerability has been reported in the 'exif_process_IFD_TAG()'
function when processing malformed IFD (Image File Directory) tags, which
could let a remote malicious user execute arbitrary code.
Upgrades available at:
href="http://ca.php.net/get/php-4.3.11.tar.gz/from/a/mirror"
target=_blank>http://ca.php.net/get/php 4.3.11.tar.gz/from/a/mirror
Ubuntu:
href="http://security.ubuntu.com/ubuntu/pool/main/p/php4/">http://security.ubuntu.com/ ubuntu/pool/main/p/php4/
Gentoo:
href="http://security.gentoo.org/glsa/glsa-200504-15.xml">http://security.gentoo.org/ glsa/glsa-200504-15.xml
Fedora:
href="http://download.fedora.redhat.com/pub/fedora/linux/core/updates/">http://download.fedora.redhat.com/ pub/fedora/linux/core/updates/
Mandrake:
href="http://www.mandrakesecure.net/en/ftp.php"> http://www.mandrakesecure.net/ en/ftp.php
Peachtree:
href="http://peachtree.burdell.org/updates/"> http://peachtree.burdell.org/ updates/
TurboLinux:
href="ftp://ftp.turbolinux.co.jp/pub/TurboLinux/TurboLinux/ia32/">ftp://ftp.turbolinux.co.jp/p ub/TurboLinux/TurboLinux/ia32/
RedHat:
href="http://rhn.redhat.com/errata/RHSA-2005-405.html">http://rhn.redhat.com/ errata/RHSA-2005-405.html
SUSE:
href="ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/i586/xorg-x11-libs-6.8.1-15.3.i586.rpm"
target=_blank>ftp://ftp.SUSE.com/pub/SUSE
Currently, we are not aware of any exploits for this
vulnerability. |
PHP Group Exif Module IFD Tag Integer Overflow
href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1042">CAN-2005-1042
|
High |
Security Focus, 13163, April 14, 2005
Ubuntu Security Notice, USN-112-1, April 14, 2005
Gentoo Linux Security Advisory, GLSA 200504-15, April 18, 2005
Fedora Update Notification, FEDORA-2005-315, April 18, 2005
Mandriva Linux Security Update Advisory, MDKSA-2005:072, April 19, 2005
Peachtree Linux Security Notice, PLSN-0001, April 21, 2005
Turbolinux Security Advisory, TLSA-2005-50, April 28, 2005
RedHat Security Advisory, RHSA-2005:405-06, April 28, 2005
SUSE Security Summary Report, SUSE-SR:2005:012, April 29, 2005
|
phpmyAdmin
phpMyAdmin 2.6.2 |
A vulnerability has been reported due to insecure default permissions
on the SQL install script, which could let a malicious user obtain
unauthorized access.
Gentoo:
href="http://security.gentoo.org/glsa/glsa-200504-30.xml ">http://security.gentoo.org/ glsa/glsa-200504-30.xml
There is no exploit code required. |
PHPMyAdmin Insecure SQL Install Script
href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1392">CAN-2005-1392 |
Medium |
Gentoo Linux Security Advisory, GLSA 200504-30, April 30, 2005 |
PostgreSQL
PostgreSQL 7.3 through 8.0.2 |
Two vulnerabilities have been reported: a vulnerability was
reported because a remote authenticated malicious user can invoke some
client-to-server character set conversion functions and supply specially
crafted argument values to potentially execute arbitrary commands; and a
remote Denial of Service vulnerability was reported because the
'contrib/tsearch2' module incorrectly declares several functions as
returning type 'internal.'
Fix available at:
href=" http://www.postgresql.org/about/news.315">http://www.postgresql.org/ about/news.315
Currently we are not aware of any exploits for these
vulnerabilities. |
PostgreSQL Remote Denial of Service & Arbitrary Code Execution
href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1409">CAN-2005-1409
href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1410">CAN-2005-1410
|
Low/ High (High if arbitrary code can be executed) |
Security Tracker Alert, 1013868, May 3, 2005 |
Postgrey
Postgrey 1.16-1.18, 0.84-9.87 |
A format string vulnerability has been reported in the 'server.pm'
module in the 'log' subroutine, which could let a remote malicious user
cause a Denial of Service or execute arbitrary code.
Upgrades available at:
href="http://isg.ee.ethz.ch/tools/postgrey/pub/postgrey-1.21.tar.gz"
target=_blank>http://isg.ee.ethz.ch/tools/ postgrey/pub/postgrey-1.21.tar.gz
SUSE:
href="ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/i586/xorg-x11-libs-6.8.1-15.3.i586.rpm"
target=_blank>ftp://ftp.SUSE.com/pub/SUSE
Currently, we are not aware of any exploits for this
vulnerability. |
Postgrey Format String
href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1127">CAN-2005-1127
|
Low/ High (High if arbitrary code can be executed) |
Secunia Advisory, SA14958, April 15, 2005
SUSE Security Summary Report, SUSE-SR:2005:012, April 29, 2005
|
Red Hat
Linux kernel-2.4.20-8.athlon.rpm, 2.4.20-8.i386.rpm, 2.4.20-8.i586.rpm,
2.4.20-8.i686.rpm, kernel-smp-2.4.20-8.athlon.rpm,
kernel-smp-2.4.20-8.i586.rpm , kernel-smp-2.4.20-8.i686.rpm ,
kernel-source-2.4.20-8.i386.rpm, Linux 8.0, i686, i386 |
A buffer overflow vulnerability exists in the ubsec_keysetup()
function in '/drivers/crypto/bcm/pkey.c,' which could let a malicious user
cause a Denial of Service or possibly execute arbitrary code.
Red Hat:
href="http://rhn.redhat.com/errata/RHSA-2004-549.html"> http://rhn.redhat.com/ errata/RHSA-2004-549.html
RedHat:
href="http://rhn.redhat.com/errata/RHSA-2005-283.html">http://rhn.redhat.com/ errata/RHSA-2005-283.html
Currently we are not aware of any exploits for this
vulnerability. |
Red Hat BCM5820 Linux Driver Buffer Overflow
href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0619">CAN-2004-0619 |
High/Low
(High if arbitrary code can be executed; and Low if a
DoS) |
Security Tracker Alert, 1010575,
day="24" year="2004">June 24, 2004
Red Hat Advisory: RHSA-2004:549-10, December 2, 2004
RedHat Security Advisory, RHSA-2005:283-15, April 28, 2005
|
RedHat
Enterprise Linux WS 3, ES 3, AS 3 |
A vulnerability has been reported in the Native POSIX Threading
Library (NPTL) due to a design error, which could let a malicious user
cause a Denial of Service or obtain sensitive information.
RedHat:
href="http://rhn.redhat.com/errata/RHSA-2005-293.html">http://rhn.redhat.com/ errata/RHSA-2005-293.html
Currently we are not aware of any exploits for this
vulnerability. |
RedHat Enterprise Linux Native POSIX Threading Library
href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0403">CAN-2005-0403 |
Low/ Medium (Medium if sensitive information can be obtained) |
RedHat Security Advisory, RHSA-2005:293-16, April 22, 2005 |
Rob Flynn
Gaim 1.0-1.0.2, 1.1.1, 1.1.2 |
Multiple remote Denial of Service vulnerabilities have been reported
when a remote malicious ICQ or AIM user submits certain malformed SNAC
packets; and a vulnerability exists when parsing malformed HTML data.
Upgrades available at:
href="http://gaim.sourceforge.net/downloads.php"
target=_blank>http://gaim.sourceforge.net/ downloads.php
Fedora:
href="http://download.fedora.redhat.com/pub/fedora/linux/core/updates/"> http://download.fedora.redhat. com/pub/fedora/linux/core/ updates/
Ubuntu:
href="http://security.ubuntu.com/ubuntu/pool/main/g/gaim/"> http://security.ubuntu.com/ ubuntu/pool/main/g/gaim/
Gentoo:
href=" http://security.gentoo.org/glsa/glsa-200503-03.xml"> http://security.gentoo.org/ glsa/glsa-200503-03.xml
Mandrake:
href="Http://www.mandrakesecure.net/en/advisories/">Http://www.mandrakesecure.net/ en/advisories/
RedHat:
href="http://rhn.redhat.com/errata/RHSA-2005-215.html"> http://rhn.redhat.com/errata/ RHSA-2005-215.html
Conectiva:
href="ftp://atualizacoes.conectiva.com.br/"> ftp://atualizacoes.conectiva. com.br/
Peachtree:
href="http://peachtree.burdell.org/updates/"> http://peachtree.burdell.org/ updates/
Debian:
href="http://security.debian.org/pool/updates/main/g/gaim/">http://security.debian.org/ pool/updates/main/g/gaim/
There is no exploit code required. |
Gaim Multiple Remote Denials of Service
href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0472">CAN-2005-0472
href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0473">CAN-2005-0473
|
Low |
Gaim Advisory, February 17, 2005
Fedora Update Notifications, FEDORA-2005-159 & 160, February
21, 2005
US-CERT
VU#839280
US-CERT
VU#523888
Ubuntu Security Notice, USN-85-1 February 25, 2005
Gentoo Linux Security Advisory, GLSA 200503-03, March 1, 2005
Mandrakelinux Security Update Advisory, MDKSA-2005:049, March 4, 2005
RedHat Security Advisory, RHSA-2005:215-11, March 10, 2005
Conectiva Linux Security Announcement, CLA-2005:933, March 14, 2005
Peachtree Linux Security Notice, PLSN-0002, April 21, 2005
Debian Security Advisory, DSA 716-1, April 27, 2005
|
Robert Styma Consulting
Ce/Ceterm (ARPUS/Ce) 2.x |
Several vulnerabilities have been reported: a buffer overflow
vulnerability was reported when a specially crafted 'XAPPLRESLANGPATH' or
'XAPPLRESDIR' environment variable is submitted, which could let malicious
user execute arbitrary code; and a race condition vulnerability was
reported due to the insecure creation of the 'ce_edit_log' temporary file,
which could let a malicious user overwrite arbitrary files.
No workaround or patch available at time of publishing.
Exploit scripts have been published. |
Robert Styma Consulting ARPUS/Ce Buffer Overflow & Race Condition
href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1395">CAN-2005-1395
href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1396">CAN-2005-1396
|
High |
Security Tracker Alert, 1013855, May 2, 2005 |
Rootkit.nl
Rootkit Hunter 1.2-1.2.3 |
Several vulnerabilities have been reported because temporary files are
insecurely opened or created due to a design error, which could let a
malicious user corrupt arbitrary files with elevated privileges.
Gentoo:
href="http://security.gentoo.org/glsa/glsa-200504-25.xml"> http://security.gentoo.org/ glsa/glsa-200504-25.xml
There is no exploit code required. |
Rootkit Hunter Insecure Temporary File Creation
href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1270">CAN-2005-1270 |
Medium |
Secunia Advisory, SA15127, April 27, 2005
Gentoo Linux Security Advisory GLSA 200504-25, April 26, 2005
|
Survivor
Survivor 0.9.5 a |
A Cross-Site Scripting vulnerability has been reported due to
insufficient sanitization of unspecified input, which could let a remote
malicious user execute arbitrary HTML and script code.
Upgrade available at:
href="http://www.columbia.edu/acis/dev/projects/survivor/dl/survivor-0.9.6.tar.gz"
target=_blank>http://www.columbia.edu/acis/dev/ projects/survivor/dl/survivor-0.9.6.tar.gz
There is no exploit code required. |
Survivor Cross-Site Scripting
href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1388">CAN-2005-1388 |
High |
Security Focus, 13415, April 28, 2005 |
Vladislav Bogdanov
SNMP Proxy Daemon 0.4-0.4.5 |
A format string vulnerability has been reported in SNMPPD due to
insufficient sanitization of user-supplied input before using in a
formatted printing function, which could let a remote malicious user
execute arbitrary code.
No workaround or patch available at time of publishing.
An exploit script has been published. |
SNMPPD SNMP Proxy Daemon Remote Format String
href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1246">CAN-2005-1246 |
High |
INetCop Security Advisory #2005-0x82-027, April 24, 2005
Security Focus, 13348, April 29,2005
|