Tech Support Guy banner
Status
Not open for further replies.
1 - 1 of 1 Posts

·
Super Moderator
Joined
·
37,527 Posts
Discussion Starter · #1 ·
Hiya

Been a while, but here are the latest:

remote root exploit

We have received reports that the "SSH CRC-32 compensation attack
detector vulnerability" is being actively exploited. This is the same
integer type error previously corrected for OpenSSH in DSA-027-1.
OpenSSH (the Debian ssh package) was fixed at that time, but
ssh-nonfree and ssh-socks were not.

ssh-nonfree, ssh-socks

http://www.linuxsecurity.com/advisories/debian_advisory-1694.html

End Of Life

Effective Monday, December 10th 2001, after a lifespan of two years, SuSE
will discontinue support for the successful SuSE Linux distribution
SuSE Linux 6.3.

The remaining distributions
SuSE Linux 6.4
SuSE Linux 7.0
SuSE Linux 7.1
SuSE Linux 7.2
SuSE Linux 7.3

http://www.linuxsecurity.com/advisories/suse_advisory-1695.html

Postfix session log memory exhaustion bugfix

The Postfix SMTP server maintains a record of SMTP conversations
for debugging purposes. Depending on local configuration details
this record is mailed to the postmaster whenever an SMTP session
terminates with errors

http://www.linuxsecurity.com/advisories/other_advisory-1696.html

Session hijacking vulnerability

Imp is a webmail system which uses the Horde[3] framework.

Joao Pedro Goncalves reported[1] a vulnerability[2] in the Imp
webmail system which could be used by a remote attacker to access a
victim's email.
It is possible to include a script in an URL via html tags. Since
these tags are not treated appropriately in previous versions (<=
2.2.6) of Imp, such scripts can be executed by an unsuspecting user
if clicked on when viewing an email. By emailing such a crafted URL
to an user and having this user click on it, the attacker is able to
retrieve the authentication cookies used in the webmail session, thus
gaining access to the user's webmail account.

http://www.linuxsecurity.com/advisories/other_advisory-1697.html

Mandrake Linux Security Update Advisory

In older versions of procmail, it is possible to crash procmail by
sending it certain signals. If procmail is installed setuid, this
could be exploited to gain unauthorized privilege. This problem is
fixed in unstable version 3.20 and stable version 3.15.2

http://www.linuxsecurity.com/advisories/mandrake_advisory-1698.html

Mandrake Linux Security Update Advisory

A format string vulnerability exists in gnupg 1.0.5 and previous
versions which is fixed in 1.0.6. This vulnerability can be used to
invoke shell commands with privileges of the currently logged-in user

http://www.linuxsecurity.com/advisories/mandrake_advisory-1699.html

Mandrake Linux Security Update Advisory

A problem was discovered in the temporary file handling capabilities
of some teTeX filters by zen-parse. These filters are used as print
filters automatically when printing .dvi files using lpr. This can
lead to elevated privileges. This update relies on the updated mktemp
packages for 7.x in MDKA-2001:021, which gives mktemp the ability to
create temporary directories. 8.x users already have a mktemp that
works in this fashion.

http://www.linuxsecurity.com/advisories/mandrake_advisory-1700.html

Regards

eddie
 
1 - 1 of 1 Posts
Status
Not open for further replies.
Top