Cotygodniowe dziury...

Blues blues w ds6.pg.gda.pl
Pon, 24 Cze 2002, 11:11:12 CEST


Zaczynamy balet od nowa :)


To mamy w nowszej wersji:

Acrobat

    Vendor: Adobe Systems Incorporated

    A potential vulnerability was reported in Adobe Acrobat Reader
    version 4.05 for Linux systems.  A user may be able to cause
    another user to overwrite files.

    Impact: Modification of system information

    Alert: http://securitytracker.com/alerts/2002/Jun/1004606.html


To też mamy poprawione:

Irssi

    Vendor: Irssi.org

    A denial of service vulnerability was reported in the IRSSI
    Internet Relay Chat (IRC) client software.  A remote user on an IRC
    channel can cause the client to crash.

    Impact: Denial of service via network

    Alert: http://securitytracker.com/alerts/2002/Jun/1004592.html



Temu należałoby się przyjrzeć, ale to leży tylko w cvsie. Dla 
zainteresowanych :)

Tomcat

    Vendor: Apache Software Foundation

    KPMG reported an information disclosure vulnerability in Apache
    Tomcat.  A remote user can determine the full path of the Tomcat
    server.

    Impact: Disclosure of system information

    Alert: http://securitytracker.com/alerts/2002/Jun/1004586.html

Tomcat

    Vendor: Apache Software Foundation

    A denial of service vulnerability was reported in the Jakarta
    Tomcat server.  In a shared hosting environment, one hosted user's
    malicious JSP code can crash the entire JSP engine, affecting all
    other hosted users on that system.

    Impact: Denial of service via local system

    Alert: http://securitytracker.com/alerts/2002/Jun/1004578.html

Resin

    Vendor: Caucho Technology

    KPMG reported several vulnerabilities in the Resin web server.
    A remote user can view files on the system that are located outside
    of the web root directory.  A remote user can also cause the web
    service and possibly the entire server to crash.

    Impact: Denial of service via network

    Alert: http://securitytracker.com/alerts/2002/Jun/1004552.html



Teraz BARDZO poważna rzecz. Ten overflow wydaje się, że działa, choć 
raport jest o wcześniejszej wersji. Aktualnie nie ma fixa dostępnego... 
Jak ktoś znajdzie/zrobi to niech się nie krępuje :)

Procmail

    Vendor: Procmail.org

    A heap overflow vulnerability was reported in 'procmail'.  A
    local user may be able to gain root privileges on the system, but
    that has not been verified.

    Impact: Execution of arbitrary code via local system

    Alert: http://securitytracker.com/alerts/2002/Jun/1004584.html


Teraz gadzina i netscape:

Mozilla Browser

    Vendor: Mozilla.org

    A vulnerability was reported in the e-mail component of
    Mozilla. A remote user could send a specially crafted e-mail
    message that will cause the Mozilla e-mail client to fail to
    download messages when downloading the message from a POP3 server.

    Impact: Denial of service via network

    Alert: http://securitytracker.com/alerts/2002/Jun/1004572.html


Netscape Communicator

    Vendor: America Online, Inc.

    A vulnerability was reported in the e-mail component of older
    versions of Netscape Communicator.  A remote user could send a
    specially crafted e-mail message that will cause the Netscape
    e-mail client to fail to download messages when downloading the
    message from a POP3 server.

    Impact: Denial of service via network

    Alert: http://securitytracker.com/alerts/2002/Jun/1004571.html



Na to nie mamy wpływu. Fix w lipcu :)

Flash

    Vendor: Macromedia

    A vulnerability was reported in Macromedia's Flash (SWF)
    player.  A remote user can create and host malicious Flash content
    that, when referred to by another web site, may be able to access
    data (such as user cookies) from the target user's domain of other
    web site.

    Impact: Disclosure of authentication information

    Alert: http://securitytracker.com/alerts/2002/Jun/1004567.html




-- 
---------------------------------
pozdr.  Paweł Gołaszewski        
---------------------------------
CPU not found - software emulation...











Więcej informacji o liście dyskusyjnej pld-devel-pl