Linux Today: Linux News On Internet Time.
Search Linux Today
Linux News Sections:  Developer -  High Performance -  Infrastructure -  IT Management -  Security -  Storage -
Linux Today Navigation
LT Home
Contribute
Contribute
Link to Us
Linux Jobs


Top White Papers

More on LinuxToday


Advisories, September 13, 2006

Sep 14, 2006, 03:45 (0 Talkback[s])

Debian GNU/Linux


Debian Security Advisory DSA 1161-2 security@debian.org
http://www.debian.org/security/ Martin Schulze
September 13th, 2006 http://www.debian.org/security/faq


Package : mozilla-firefox
Vulnerability : several
Problem type : remote
Debian-specific: no
CVE IDs : CVE-2006-3805 CVE-2006-3806 CVE-2006-3807 CVE-2006-3808 CVE-2006-3809 CVE-2006-3811
CERT advisories: VU#655892 VU#687396 VU#876420
BugTraq ID : 19181

The latest security updates of Mozilla Firefox introduced a regression that led to a disfunctional attachment panel which warrants a correction to fix this issue. For reference please find below the original advisory text:

Several security related problems have been discovered in Mozilla and derived products like Mozilla Firefox. The Common Vulnerabilities and Exposures project identifies the following vulnerabilities:

CVE-2006-3805

The Javascript engine might allow remote attackers to execute arbitrary code. [MFSA-2006-50]

CVE-2006-3806

Multiple integer overflows in the Javascript engine might allow remote attackers to execute arbitrary code. [MFSA-2006-50]

CVE-2006-3807

Specially crafted Javascript allows remote attackers to execute arbitrary code. [MFSA-2006-51]

CVE-2006-3808

Remote AutoConfig (PAC) servers could execute code with elevated privileges via a specially crafted PAC script. [MFSA-2006-52]

CVE-2006-3809

Scripts with the UniversalBrowserRead privilege could gain UniversalXPConnect privileges and possibly execute code or obtain sensitive data. [MFSA-2006-53]

CVE-2006-3811

Multiple vulnerabilities allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code. [MFSA-2006-55]

For the stable distribution (sarge) these problems have been fixed in version 1.0.4-2sarge11.

For the unstable distribution (sid) these problems have been fixed in version 1.5.dfsg+1.5.0.5-1.

We recommend that you upgrade your mozilla-firefox package.

Upgrade Instructions


wget url

will fetch the file for you
dpkg -i file.deb

will install the referenced file.

If you are using the apt-get package manager, use the line for sources.list as given at the end of this advisory:

apt-get update

will update the internal database apt-get upgrade

will install corrected packages

You may use an automated update by adding the resources from the footer to the proper configuration.

Debian GNU/Linux 3.1 alias sarge


Source archives:

    http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox_1.0.4-2sarge11.dsc
      Size/MD5 checksum: 1003 fcb7947248bc53a236134e59a7e9673a
    http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox_1.0.4-2sarge11.diff.gz
      Size/MD5 checksum: 419204 417893bc76c1a0f772e6c6eff7571c98
    http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox_1.0.4.orig.tar.gz
      Size/MD5 checksum: 40212297 8e4ba81ad02c7986446d4e54e978409d

Alpha architecture:

    http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox_1.0.4-2sarge11_alpha.deb
      Size/MD5 checksum: 11176846 0f8f7a2dfe4758092806312b92c0fa16
    http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-dom-inspector_1.0.4-2sarge11_alpha.deb
      Size/MD5 checksum: 169842 7bc6af501357d15416aa39a731ad84a7
    http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-gnome-support_1.0.4-2sarge11_alpha.deb
      Size/MD5 checksum: 61674 6746719356df15955ad4cadfee8a44ae

AMD64 architecture:

    http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox_1.0.4-2sarge11_amd64.deb
      Size/MD5 checksum: 9405320 6cb1704571922ccc445aa3b54cfee6b1
    http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-dom-inspector_1.0.4-2sarge11_amd64.deb
      Size/MD5 checksum: 164636 81725e9973607ef36dd732a2e7ef40a1
    http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-gnome-support_1.0.4-2sarge11_amd64.deb
      Size/MD5 checksum: 60204 2eb1e134427f4f4dc94233c42aadc295

ARM architecture:

    http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox_1.0.4-2sarge11_arm.deb
      Size/MD5 checksum: 8228072 fd099e40cc4ab7475f9b9ee5edbaf224
    http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-dom-inspector_1.0.4-2sarge11_arm.deb
      Size/MD5 checksum: 156064 10ce619e39bc6b2731114786e1cb9c93
    http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-gnome-support_1.0.4-2sarge11_arm.deb
      Size/MD5 checksum: 55518 da686a241720a55b9f444c2d00da3fb8

HP Precision architecture:

    http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox_1.0.4-2sarge11_hppa.deb
      Size/MD5 checksum: 10281878 47dd66ed0e3f65b784257a3a7124b669
    http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-dom-inspector_1.0.4-2sarge11_hppa.deb
      Size/MD5 checksum: 167584 b795910270c5244dce878ede41b1bf4e
    http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-gnome-support_1.0.4-2sarge11_hppa.deb
      Size/MD5 checksum: 60656 e2735db17f1c50937886821f5c682325

Intel IA-32 architecture:

    http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox_1.0.4-2sarge11_i386.deb
      Size/MD5 checksum: 8905260 78f91ed5ea64d8401f81c881bf197318
    http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-dom-inspector_1.0.4-2sarge11_i386.deb
      Size/MD5 checksum: 159842 39c39cc385ece1da80d7129ad5d91073
    http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-gnome-support_1.0.4-2sarge11_i386.deb
      Size/MD5 checksum: 57062 54ca183ad099a3d172a03433fb9bae77

Intel IA-64 architecture:

    http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox_1.0.4-2sarge11_ia64.deb
      Size/MD5 checksum: 11638550 b7c8dca5be087b63b0c9cb99a5406ee6
    http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-dom-inspector_1.0.4-2sarge11_ia64.deb
      Size/MD5 checksum: 170184 ebba92837650a1af655a24b3196510cd
    http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-gnome-support_1.0.4-2sarge11_ia64.deb
      Size/MD5 checksum: 64872 0da252d7693a0c55a7f1e9e92e8bfd93

Motorola 680x0 architecture:

    http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox_1.0.4-2sarge11_m68k.deb
      Size/MD5 checksum: 8180246 a55c8120cfc2da1df53dc65ecd6fce91
    http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-dom-inspector_1.0.4-2sarge11_m68k.deb
      Size/MD5 checksum: 158684 746c12952165ac9375d63b5ae8ba34f1
    http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-gnome-support_1.0.4-2sarge11_m68k.deb
      Size/MD5 checksum: 56318 e1b1e85cf556c71d425403b0177aa871

Big endian MIPS architecture:

    http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox_1.0.4-2sarge11_mips.deb
      Size/MD5 checksum: 9939250 9e86d61f30f4057e59dc7f310cbb5cf5
    http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-dom-inspector_1.0.4-2sarge11_mips.deb
      Size/MD5 checksum: 157634 e5f8214f60849ae5ac4be6967719d2cd
    http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-gnome-support_1.0.4-2sarge11_mips.deb
      Size/MD5 checksum: 57332 aec13be187d73ef17e173594f6476b5a

Little endian MIPS architecture:

    http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox_1.0.4-2sarge11_mipsel.deb
      Size/MD5 checksum: 9814448 412c4ae8bf5c53d0d6eb151a13f5be65
    http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-dom-inspector_1.0.4-2sarge11_mipsel.deb
      Size/MD5 checksum: 157198 a7ef40abac781f64a43fb6bfd5013785
    http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-gnome-support_1.0.4-2sarge11_mipsel.deb
      Size/MD5 checksum: 57148 50378fe99784dd4e0612f2339843345a

PowerPC architecture:

    http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox_1.0.4-2sarge11_powerpc.deb
      Size/MD5 checksum: 8576000 845d7e9726dfe677b3e7e788b3c4daa7
    http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-dom-inspector_1.0.4-2sarge11_powerpc.deb
      Size/MD5 checksum: 158278 cee79f6031004b1d26287c1766acc8c0
    http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-gnome-support_1.0.4-2sarge11_powerpc.deb
      Size/MD5 checksum: 59444 3cede4cc2ffbb21a460a87ae6da4c443

IBM S/390 architecture:

    http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox_1.0.4-2sarge11_s390.deb
      Size/MD5 checksum: 9644388 4cdc4fba0ff2f749509e0162eac50ab1
    http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-dom-inspector_1.0.4-2sarge11_s390.deb
      Size/MD5 checksum: 165190 285d75aa1d10c558cf56de3917777ab4
    http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-gnome-support_1.0.4-2sarge11_s390.deb
      Size/MD5 checksum: 59630 686ad114f29bce70ebeef7744ac140a9

Sun Sparc architecture:

    http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox_1.0.4-2sarge11_sparc.deb
      Size/MD5 checksum: 8667892 cac220d156fdb0d0a307ccbec6e648af
    http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-dom-inspector_1.0.4-2sarge11_sparc.deb
      Size/MD5 checksum: 158460 fa572a3d6e045fd7faca38d96ad0d529
    http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-gnome-support_1.0.4-2sarge11_sparc.deb
      Size/MD5 checksum: 55882 e70bf88e151ba6e56a9bc4239bc519c8

These files will probably be moved into the stable distribution on its next update.



Debian Security Advisory DSA 1175-1 security@debian.org
http://www.debian.org/security/ Noah Meyerhans
September 13th, 2006 http://www.debian.org/security/faq


Package : isakmpd
Vulnerability : programming error
Problem-Type : remote
Debian-specific: no
CVE ID : CVE-2006-4436
BugTraq ID : 19712
Debian Bug : 385894

A flaw has been found in isakmpd, OpenBSD's implementation of the Internet Key Exchange protocol, that caused Security Associations to be created with a replay window of 0 when isakmpd was acting as the responder during SA negotiation. This could allow an attacker to re-inject sniffed IPsec packets, which would not be checked against the replay counter.

For the stable distribution (sarge) this problem has been fixed in version 20041012-1sarge1

For the unstable distribution (sid) this problem has been fixed in version 20041012-4

We recommend that you upgrade your isakmpd package.

Upgrade Instructions


wget url

will fetch the file for you
dpkg -i file.deb

will install the referenced file.

If you are using the apt-get package manager, use the line for sources.list as given below:

apt-get update

will update the internal database apt-get upgrade

will install corrected packages

You may use an automated update by adding the resources from the footer to the proper configuration.

Debian GNU/Linux 3.1 alias sarge


Source archives:

    http://security.debian.org/pool/updates/main/i/isakmpd/isakmpd_20041012-1sarge1.dsc
      Size/MD5 checksum: 661 35e8865c2759c66f01c0563a4bdfc124
    http://security.debian.org/pool/updates/main/i/isakmpd/isakmpd_20041012-1sarge1.diff.gz
      Size/MD5 checksum: 68877 90e47af5080893c9ccf7d38aebef6760
    http://security.debian.org/pool/updates/main/i/isakmpd/isakmpd_20041012.orig.tar.gz
      Size/MD5 checksum: 373941 e6d25a9e232fb186e1a48dc06453bd57

Alpha architecture:

    http://security.debian.org/pool/updates/main/i/isakmpd/isakmpd_20041012-1sarge1_alpha.deb
      Size/MD5 checksum: 708414 e6894a5a6c7a4586f2c22d28cd0a8f84

AMD64 architecture:

    http://security.debian.org/pool/updates/main/i/isakmpd/isakmpd_20041012-1sarge1_amd64.deb
      Size/MD5 checksum: 544652 43df55b5251b4cbb2bf3c4fe3528827f

ARM architecture:

    http://security.debian.org/pool/updates/main/i/isakmpd/isakmpd_20041012-1sarge1_arm.deb
      Size/MD5 checksum: 473492 92e5b4ae0fbbb14104d39fe0b1a24597

HP Precision architecture:

    http://security.debian.org/pool/updates/main/i/isakmpd/isakmpd_20041012-1sarge1_hppa.deb
      Size/MD5 checksum: 535124 d97d6a0357c332c72a8ac313a7f1c301

Intel IA-32 architecture:

    http://security.debian.org/pool/updates/main/i/isakmpd/isakmpd_20041012-1sarge1_i386.deb
      Size/MD5 checksum: 497670 0a58ae7ef43c38853a58d430389d1840

Intel IA-64 architecture:

    http://security.debian.org/pool/updates/main/i/isakmpd/isakmpd_20041012-1sarge1_ia64.deb
      Size/MD5 checksum: 786026 f8e473ef442260b13076aa6add875c99

Motorola 680x0 architecture:

    http://security.debian.org/pool/updates/main/i/isakmpd/isakmpd_20041012-1sarge1_m68k.deb
      Size/MD5 checksum: 421268 3f57254cfdded5e2615f4c3b277133e9

Big endian MIPS architecture:

    http://security.debian.org/pool/updates/main/i/isakmpd/isakmpd_20041012-1sarge1_mips.deb
      Size/MD5 checksum: 568914 cf14999a58edbb20545d8a63f7311f87

Little endian MIPS architecture:

    http://security.debian.org/pool/updates/main/i/isakmpd/isakmpd_20041012-1sarge1_mipsel.deb
      Size/MD5 checksum: 567060 38fca5d17f6be2c843f92aed15ac3830

PowerPC architecture:

    http://security.debian.org/pool/updates/main/i/isakmpd/isakmpd_20041012-1sarge1_powerpc.deb
      Size/MD5 checksum: 555978 f3786f6d0f4e556587b372a753184cca

IBM S/390 architecture:

    http://security.debian.org/pool/updates/main/i/isakmpd/isakmpd_20041012-1sarge1_s390.deb
      Size/MD5 checksum: 548240 e9cbc0d97b19aac56686d7384de1c219

Sun Sparc architecture:

    http://security.debian.org/pool/updates/main/i/isakmpd/isakmpd_20041012-1sarge1_sparc.deb
      Size/MD5 checksum: 514166 7318cf5d5f419d5d00b45faf6d5bc3e1

These files will probably be moved into the stable distribution on its next update.



Debian Security Advisory DSA 1176-1 security@debian.org
http://www.debian.org/security/ Moritz Muehlenhoff
September 13th, 2006 http://www.debian.org/security/faq


Package : zope2.7
Vulnerability : programming error
Problem-Type : remote
Debian-specific: no
CVE ID : CVE-2006-4684

It was discovered that the Zope web application server does not disable the csv_table directive in web pages containing ReST markup, allowing the exposure of files readable by the Zope server.

For the stable distribution (sarge) this problem has been fixed in version 2.7.5-2sarge2.

The unstable distribution (sid) doesn't contain zope2.7 any longer, for zope2.8 this problem has been fixed in version 2.8.8-2.

We recommend that you upgrade your Zope package.

Upgrade Instructions


wget url

will fetch the file for you
dpkg -i file.deb

will install the referenced file.

If you are using the apt-get package manager, use the line for sources.list as given below:

apt-get update

will update the internal database apt-get upgrade

will install corrected packages

You may use an automated update by adding the resources from the footer to the proper configuration.

Debian GNU/Linux 3.1 alias sarge


Source archives:

    http://security.debian.org/pool/updates/main/z/zope2.7/zope2.7_2.7.5-2sarge3.dsc
      Size/MD5 checksum: 906 b4ea5636227d16c5df630894d2b76967
    http://security.debian.org/pool/updates/main/z/zope2.7/zope2.7_2.7.5-2sarge3.diff.gz
      Size/MD5 checksum: 51399 ee75bf3e88b6eb161ccc431e1077bce8
    http://security.debian.org/pool/updates/main/z/zope2.7/zope2.7_2.7.5.orig.tar.gz
      Size/MD5 checksum: 2885871 5b5c5823c62370d9f7325c6014a49d8b

Alpha architecture:

    http://security.debian.org/pool/updates/main/z/zope2.7/zope2.7_2.7.5-2sarge3_alpha.deb
      Size/MD5 checksum: 2669566 2c4d8fb2ac3e9dba4f7de9caf0868b51

AMD64 architecture:

    http://security.debian.org/pool/updates/main/z/zope2.7/zope2.7_2.7.5-2sarge3_amd64.deb
      Size/MD5 checksum: 2661080 8108a298111e6abad30073cbd002093e

ARM architecture:

    http://security.debian.org/pool/updates/main/z/zope2.7/zope2.7_2.7.5-2sarge3_arm.deb
      Size/MD5 checksum: 2616068 9d77c1ccce693668a3a7e2bb0f35491d

HP Precision architecture:

    http://security.debian.org/pool/updates/main/z/zope2.7/zope2.7_2.7.5-2sarge3_hppa.deb
      Size/MD5 checksum: 2736774 1fd5611ff6fa57d561b15bae9d836fe7

Intel IA-32 architecture:

    http://security.debian.org/pool/updates/main/z/zope2.7/zope2.7_2.7.5-2sarge3_i386.deb
      Size/MD5 checksum: 2608554 779c9e75c919a1d39d0db7a9a6fc14d9

Intel IA-64 architecture:

    http://security.debian.org/pool/updates/main/z/zope2.7/zope2.7_2.7.5-2sarge3_ia64.deb
      Size/MD5 checksum: 2959538 d800e88a7a988d9bb0db833df57f074a

Motorola 680x0 architecture:

    http://security.debian.org/pool/updates/main/z/zope2.7/zope2.7_2.7.5-2sarge3_m68k.deb
      Size/MD5 checksum: 2601510 cdd9b090bf745ab74545361936b415c8

Big endian MIPS architecture:

    http://security.debian.org/pool/updates/main/z/zope2.7/zope2.7_2.7.5-2sarge3_mips.deb
      Size/MD5 checksum: 2675666 260205e53eb3802ad50c4adcc8ac0d5f

Little endian MIPS architecture:

    http://security.debian.org/pool/updates/main/z/zope2.7/zope2.7_2.7.5-2sarge3_mipsel.deb
      Size/MD5 checksum: 2678458 dc9af18e0027a9fb7ae507ff33e050b9

PowerPC architecture:

    http://security.debian.org/pool/updates/main/z/zope2.7/zope2.7_2.7.5-2sarge3_powerpc.deb
      Size/MD5 checksum: 2723958 90e0b09a7f8d299a60c09947b86a72e5

IBM S/390 architecture:

    http://security.debian.org/pool/updates/main/z/zope2.7/zope2.7_2.7.5-2sarge3_s390.deb
      Size/MD5 checksum: 2663150 a5f76f5bc20b8fde2ed6ffcf24dffa33

Sun Sparc architecture:

    http://security.debian.org/pool/updates/main/z/zope2.7/zope2.7_2.7.5-2sarge3_sparc.deb
      Size/MD5 checksum: 2670708 66e3bd2e47d38d33bf951711e59f7592

These files will probably be moved into the stable distribution on its next update.


For apt-get: deb http://security.debian.org/ stable/updates main
For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
Mailing list: debian-security-announce@lists.debian.org
Package info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg>

Gentoo Linux


Gentoo Linux Security Advisory GLSA 200609-07

http://security.gentoo.org/


Severity: High
Title: LibXfont, monolithic X.org: Multiple integer overflows
Date: September 13, 2006
Bugs: #145513
ID: 200609-07


Synopsis

Some buffer overflows were discovered in the CID font parser, potentially resulting in the execution of arbitrary code with elevated privileges.

Background

libXfont is the X.Org Xfont library, some parts are based on the FreeType code base.

Affected packages


     Package            /  Vulnerable  /                    Unaffected


1 x11-libs/libXfont < 1.2.1 >= 1.2.1 2 x11-base/xorg-x11 < 7.0 >= 7.0 ------------------------------------------------------------------- 2 affected packages on all of their supported architectures.

Description

Several integer overflows have been found in the CID font parser.

Impact

A remote attacker could exploit this vulnerability by enticing a user to load a malicious font file resulting in the execution of arbitrary code with the permissions of the user running the X server which typically is the root user. A local user could exploit this vulnerability to gain elevated privileges.

Workaround

Disable CID-encoded Type 1 fonts by removing the "type1" module and replacing it with the "freetype" module in xorg.conf.

Resolution

All libXfont users should upgrade to the latest version:

    # emerge --sync
    # emerge --ask --oneshot --verbose ">=x11-libs/libXfont-1.2.1"

All monolithic X.org users are advised to migrate to modular X.org.

References

[ 1 ] CVE-2006-3739

http://cve.mitre.org/cgi-bin/cvename.cgi?name=2006-3739

[ 2 ] CVE-2006-3740

http://cve.mitre.org/cgi-bin/cvename.cgi?name=2006-3740

Availability

This GLSA and any updates to it are available for viewing at the Gentoo Security Website:

http://security.gentoo.org/glsa/glsa-200609-07.xml

Concerns?

Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at http://bugs.gentoo.org.

License

Copyright 2006 Gentoo Foundation, Inc; referenced text belongs to its owner(s).

The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license.

http://creativecommons.org/licenses/by-sa/2.5


Gentoo Linux Security Advisory GLSA 200609-08

http://security.gentoo.org/


Severity: Normal
Title: xine-lib: Buffer overflows
Date: September 13, 2006
Bugs: #133520
ID: 200609-08


Synopsis

xine-lib is vulnerable to multiple buffer overflows that could be exploited to execute arbitrary code.

Background

xine is a high performance, portable and reusable multimedia playback engine. xine-lib is xine's core engine.

Affected packages


     Package              /  Vulnerable  /                  Unaffected

  1  media-libs/xine-lib     < 1.1.2-r2                    >= 1.1.2-r2

Description

xine-lib contains buffer overflows in the processing of AVI. Additionally, xine-lib is vulnerable to a buffer overflow in the HTTP plugin (xineplug_inp_http.so) via a long reply from an HTTP server.

Impact

An attacker could trigger the buffer overflow vulnerabilities by enticing a user to load a specially crafted AVI file in xine. This might result in the execution of arbitrary code with the rights of the user running xine. Additionally, a remote HTTP server serving a xine client a specially crafted reply could crash xine and possibly execute arbitrary code.

Workaround

There is no known workaround at this time.

Resolution

All xine-lib users should upgrade to the latest version:

    # emerge --sync
    # emerge --ask --oneshot --verbose ">=media-libs/xine-lib-1.1.2-r2"

References

[ 1 ] CVE-2006-2802

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2802

Availability

This GLSA and any updates to it are available for viewing at the Gentoo Security Website:

http://security.gentoo.org/glsa/glsa-200609-08.xml

Concerns?

Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at http://bugs.gentoo.org.

License

Copyright 2006 Gentoo Foundation, Inc; referenced text belongs to its owner(s).

The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license.

http://creativecommons.org/licenses/by-sa/2.5


Gentoo Linux Security Advisory GLSA 200609-09

http://security.gentoo.org/


Severity: Normal
Title: FFmpeg: Buffer overflows
Date: September 13, 2006
Bugs: #133520
ID: 200609-09


Synopsis

FFmpeg is vulnerable to multiple buffer overflows that might be exploited to execute arbitrary code.

Background

FFmpeg is a very fast video and audio converter.

Affected packages


     Package             /      Vulnerable      /           Unaffected

  1  media-video/ffmpeg      < 0.4.9_p20060530      >= 0.4.9_p20060530

Description

FFmpeg contains buffer overflows in the AVI processing code.

Impact

An attacker could trigger the buffer overflows by enticing a user to load a specially crafted AVI file in an application using the FFmpeg library. This might result in the execution of arbitrary code in the context of the running application.

Workaround

There is no known workaround at this time.

Resolution

All FFmpeg users should upgrade to the latest version:

    # emerge --sync
    # emerge --ask --oneshot --verbose ">=media-video/ffmpeg-0.4.9_p20060530"

Availability

This GLSA and any updates to it are available for viewing at the Gentoo Security Website:

http://security.gentoo.org/glsa/glsa-200609-09.xml

Concerns?

Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at http://bugs.gentoo.org.

License

Copyright 2006 Gentoo Foundation, Inc; referenced text belongs to its owner(s).

The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license.

http://creativecommons.org/licenses/by-sa/2.5

Ubuntu


Ubuntu Security Notice USN-345-1 September 13, 2006
mailman vulnerabilities
CVE-2006-2941, CVE-2006-3636

A security issue affects the following Ubuntu releases:

Ubuntu 5.04
Ubuntu 5.10
Ubuntu 6.06 LTS

This advisory also applies to the corresponding versions of Kubuntu, Edubuntu, and Xubuntu.

The problem can be corrected by upgrading your system to the following package versions:

Ubuntu 5.04:
mailman 2.1.5-7ubuntu0.3

Ubuntu 5.10:
mailman 2.1.5-8ubuntu2.3

Ubuntu 6.06 LTS:
mailman 2.1.5-9ubuntu4.1

In general, a standard system upgrade is sufficient to effect the necessary changes.

Details follow:

Steve Alexander discovered that mailman did not properly handle attachments with special filenames. A remote user could exploit that to stop mail delivery until the server administrator manually cleaned these posts. (CVE-2006-2941)

Various cross-site scripting vulnerabilities have been reported by Barry Warsaw. By using specially crafted email addresses, names, and similar arbitrary user-defined strings, a remote attacker could exploit this to run web script code in the list administrator's web browser. (CVE-2006-3636)

URLs logged to the error log file are now checked for invalid characters. Before, specially crafted URLs could inject arbitrary messages into the log.

Updated packages for Ubuntu 5.04:

Source archives:

    http://security.ubuntu.com/ubuntu/pool/main/m/mailman/mailman_2.1.5-7ubuntu0.3.diff.gz
      Size/MD5: 122672 040be0e94a3463829deda6255b81914c
    http://security.ubuntu.com/ubuntu/pool/main/m/mailman/mailman_2.1.5-7ubuntu0.3.dsc
      Size/MD5: 669 6533900d800881c5e5e97661592fe9b1
    http://security.ubuntu.com/ubuntu/pool/main/m/mailman/mailman_2.1.5.orig.tar.gz
      Size/MD5: 5745912 f5f56f04747cd4aff67427e7a45631af

amd64 architecture (Athlon64, Opteron, EM64T Xeon)

    http://security.ubuntu.com/ubuntu/pool/main/m/mailman/mailman_2.1.5-7ubuntu0.3_amd64.deb
      Size/MD5: 6610396 9e485ddc61fea15ffaacebeb176bc924

i386 architecture (x86 compatible Intel/AMD)

    http://security.ubuntu.com/ubuntu/pool/main/m/mailman/mailman_2.1.5-7ubuntu0.3_i386.deb
      Size/MD5: 6610126 7a76e92c25d14c439141c243f807ac59

powerpc architecture (Apple Macintosh G3/G4/G5)

    http://security.ubuntu.com/ubuntu/pool/main/m/mailman/mailman_2.1.5-7ubuntu0.3_powerpc.deb
      Size/MD5: 6617368 a0c258a612fc19b87f756dfd1b2f5604

Updated packages for Ubuntu 5.10:

Source archives:

    http://security.ubuntu.com/ubuntu/pool/main/m/mailman/mailman_2.1.5-8ubuntu2.3.diff.gz
      Size/MD5: 124569 edd592fdc5d979588cfa307d80f389ee
    http://security.ubuntu.com/ubuntu/pool/main/m/mailman/mailman_2.1.5-8ubuntu2.3.dsc
      Size/MD5: 626 52ca3b4a7132ed400701b33a9d1fa07c
    http://security.ubuntu.com/ubuntu/pool/main/m/mailman/mailman_2.1.5.orig.tar.gz
      Size/MD5: 5745912 f5f56f04747cd4aff67427e7a45631af

amd64 architecture (Athlon64, Opteron, EM64T Xeon)

    http://security.ubuntu.com/ubuntu/pool/main/m/mailman/mailman_2.1.5-8ubuntu2.3_amd64.deb
      Size/MD5: 6611062 4808daed20ff5871d0878041dc65c278

i386 architecture (x86 compatible Intel/AMD)

    http://security.ubuntu.com/ubuntu/pool/main/m/mailman/mailman_2.1.5-8ubuntu2.3_i386.deb
      Size/MD5: 6610402 bae1a8798cc5518e204ac418d4108330

powerpc architecture (Apple Macintosh G3/G4/G5)

    http://security.ubuntu.com/ubuntu/pool/main/m/mailman/mailman_2.1.5-8ubuntu2.3_powerpc.deb
      Size/MD5: 6617772 c397e9d02be876896f4c519da2965dce

sparc architecture (Sun SPARC/UltraSPARC)

    http://security.ubuntu.com/ubuntu/pool/main/m/mailman/mailman_2.1.5-8ubuntu2.3_sparc.deb
      Size/MD5: 6616692 9714c5ffcedced686d5d2224f373f63a

Updated packages for Ubuntu 6.06 LTS:

Source archives:

    http://security.ubuntu.com/ubuntu/pool/main/m/mailman/mailman_2.1.5-9ubuntu4.1.diff.gz
      Size/MD5: 228878 efe29915311336eea806f75a489ae876
    http://security.ubuntu.com/ubuntu/pool/main/m/mailman/mailman_2.1.5-9ubuntu4.1.dsc
      Size/MD5: 628 61d4ee8cb059d6073c845c63ab9428a3
    http://security.ubuntu.com/ubuntu/pool/main/m/mailman/mailman_2.1.5.orig.tar.gz
      Size/MD5: 5745912 f5f56f04747cd4aff67427e7a45631af

amd64 architecture (Athlon64, Opteron, EM64T Xeon)

    http://security.ubuntu.com/ubuntu/pool/main/m/mailman/mailman_2.1.5-9ubuntu4.1_amd64.deb
      Size/MD5: 6612630 20c59f9de0ad456f476d9222deaf232f

i386 architecture (x86 compatible Intel/AMD)

    http://security.ubuntu.com/ubuntu/pool/main/m/mailman/mailman_2.1.5-9ubuntu4.1_i386.deb
      Size/MD5: 6612422 b22f69ab0ad00a70cc4cf9526521ae02

powerpc architecture (Apple Macintosh G3/G4/G5)

    http://security.ubuntu.com/ubuntu/pool/main/m/mailman/mailman_2.1.5-9ubuntu4.1_powerpc.deb
      Size/MD5: 6620218 57752d37e3514f437bfbddd458203306

sparc architecture (Sun SPARC/UltraSPARC)

    http://security.ubuntu.com/ubuntu/pool/main/m/mailman/mailman_2.1.5-9ubuntu4.1_sparc.deb
      Size/MD5: 6618874 870ca284b9c208a8937ef2890506a93c