From 1e715ab63b55a4e6964bab43c2d82724b18370df Mon Sep 17 00:00:00 2001 From: eik Date: Fri, 13 Aug 2004 16:48:12 +0000 Subject: fix some vuxml duplicates, add sympa unauthorized list creation --- security/portaudit-db/database/portaudit.txt | 8 +- security/portaudit-db/database/portaudit.xlist | 15 + security/portaudit-db/database/portaudit.xml | 665 ++++++++++++++++++++++++- 3 files changed, 680 insertions(+), 8 deletions(-) (limited to 'security/portaudit-db') diff --git a/security/portaudit-db/database/portaudit.txt b/security/portaudit-db/database/portaudit.txt index 6ea07a0c1d15..2f9b71c87d55 100644 --- a/security/portaudit-db/database/portaudit.txt +++ b/security/portaudit-db/database/portaudit.txt @@ -58,16 +58,10 @@ phpMyAdmin<2.5.7.1|http://www.securityfocus.com/archive/1/367486 http://www.secu gnutls<1.0.17|http://www.hornik.sk/SA/SA-20040802.txt http://secunia.com/advisories/12156|GnuTLS certificate chain verification DoS|84ab58cf-e4ac-11d8-9b0a-000347a4fa7d gnutls-devel>=1.1.*<1.1.12|http://www.hornik.sk/SA/SA-20040802.txt http://secunia.com/advisories/12156|GnuTLS certificate chain verification DoS|84ab58cf-e4ac-11d8-9b0a-000347a4fa7d ripmime<1.3.2.3|http://www.osvdb.org/8287 http://secunia.com/advisories/12201 http://www.securityfocus.com/bid/10848|ripMIME attachment extraction bypass|85e19dff-e606-11d8-9b0a-000347a4fa7d -acroread<5.09|http://www.osvdb.org/7429 http://freshmeat.net/projects/acrobatreader/?branch_id=92&release_id=164883|Acrobat Reader handling of malformed uuencoded pdf files|ab166a60-e60a-11d8-9b0a-000347a4fa7d {linux-,}opera<7.54|http://www.opera.com/freebsd/changelogs/754/ http://www.greymagic.com/security/advisories/gm008-op/ http://secunia.com/advisories/12233 http://www.osvdb.org/8331|Opera "location" object write access vulnerability|0deed2ce-e6f5-11d8-9a79-000347dd607f putty<0.55|http://www.chiark.greenend.org.uk/~sgtatham/putty/changes.html http://www.coresecurity.com/common/showdoc.php?idx=417&idxseccion=10 http://www.osvdb.org/8299 http://secunia.com/advisories/12212|modified server can execute commands on the client|4424f4db-e697-11d8-bf04-000c763e9a47 -cvstrac<1.1.4|http://www.securityfocus.com/archive/1/370955 http://secunia.com/advisories/12090 http://www.osvdb.org/8373 http://www.cvstrac.org/cvstrac/chngview?cn=316|CVStrac remote code execution vulnerability|0139e7e0-e850-11d8-9440-000347a4fa7d p5-Mail-SpamAssassin<2.64|http://secunia.com/advisories/12255 http://marc.theaimsgroup.com/?l=spamassassin-announce&m=109168121628767&w=2|SpamAssassin DoS vulnerability|bacbc357-ea65-11d8-9440-000347a4fa7d cfengine2<2.1.8|http://www.coresecurity.com/common/showdoc.php?idx=387&idxseccion=10 http://secunia.com/advisories/12251|cfengine authentication heap corruption|f2a1dc8b-ea66-11d8-9440-000347a4fa7d libxine<=1.0.r5_1|http://www.open-security.org/advisories/6 http://secunia.com/advisories/12194 http://sourceforge.net/mailarchive/forum.php?thread_id=5143955&forum_id=11923|libxine vcd MRL input identifier management overflow|bef4515b-eaa9-11d8-9440-000347a4fa7d -kdelibs<=3.2.3_1|http://www.kde.org/info/security/advisory-20040811-1.txt http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0689 http://www.kde.org/info/security/advisory-20040811-2.txt http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0690 http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=261386 http://www.kde.org/info/security/advisory-20040811-3.txt http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0721 http://secunia.com/advisories/11978/ http://www.heise.de/newsticker/meldung/48793 http://bugs.kde.org/show_bug.cgi?id=84352|Temporary Directory Vulnerability, Konqueror Frame Injection Vulnerability|a4bd1cd3-eb25-11d8-978e-00e018f69096 -kdebase<=3.2.3|http://www.kde.org/info/security/advisory-20040811-3.txt http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0721 http://www.heise.de/newsticker/meldung/48793 http://bugs.kde.org/show_bug.cgi?id=84352|Konqueror Frame Injection Vulnerability|2e395baa-eb26-11d8-978e-00e018f69096 -kdelibs<=3.2.3_3|http://www.kde.org/info/security/advisory-20040811-1.txt|DCOPServer Temporary Filename Vulnerability|608ceab8-eca3-11d8-afa6-ed04757064bb rsync<2.6.2_2|http://lists.samba.org/archive/rsync-announce/2004/000017.html|security hole in non-chroot rsync daemon|2689f4cb-ec4c-11d8-9440-000347a4fa7d -kdelibs<=3.2.3_3|http://www.kde.org/info/security/advisory-20040811-1.txt|DCOPServer Temporary Filename Vulnerability|608ceab8-eca3-11d8-afa6-ed04757064bb -kdelibs<=3.2.3_4|http://www.kde.org/info/security/advisory-20040811-1.txt|Temporary Filename Vulnerability|cd95b452-eca6-11d8-afa6-ed04757064bb +sympa<4.1.2|http://secunia.com/advisories/12286 http://www.sympa.org/release.html|Sympa unauthorized list creation security issue|4a160c54-ed46-11d8-81b0-000347a4fa7d diff --git a/security/portaudit-db/database/portaudit.xlist b/security/portaudit-db/database/portaudit.xlist index bebf52fd1262..122e7ffb681c 100644 --- a/security/portaudit-db/database/portaudit.xlist +++ b/security/portaudit-db/database/portaudit.xlist @@ -3,3 +3,18 @@ 3362f2c1-8344-11d8-a41f-0020ed76ef5a 5e7f58c3-b3f8-4258-aeb8-795e5e940ff8 4aec9d58-ce7b-11d8-858d-000d610a3b12 +78348ea2-ec91-11d8-b913-000c41e2cdad +641859e8-eca1-11d8-b913-000c41e2cdad +603fe36d-ec9d-11d8-b913-000c41e2cdad +2de14f7a-dad9-11d8-b59a-00061bc2ad93 +7a9d5dfe-c507-11d8-8898-000d6111a684 +3a408f6f-9c52-11d8-9366-0020ed76ef5a +e5e2883d-ceb9-11d8-8898-000d6111a684 +74d06b67-d2cf-11d8-b479-02e0185c0b53 +265c8b00-d2d0-11d8-b479-02e0185c0b53 +4764cfd6-d630-11d8-b479-02e0185c0b53 +730db824-e216-11d8-9b0a-000347a4fa7d +f9e3e60b-e650-11d8-9b0a-000347a4fa7d +abe47a5a-e23c-11d8-9b0a-000347a4fa7d +a713c0f9-ec54-11d8-9440-000347a4fa7d +5b8f9a02-ec93-11d8-b913-000c41e2cdad diff --git a/security/portaudit-db/database/portaudit.xml b/security/portaudit-db/database/portaudit.xml index af14de8e0997..9a35be7de91a 100644 --- a/security/portaudit-db/database/portaudit.xml +++ b/security/portaudit-db/database/portaudit.xml @@ -91,7 +91,7 @@ This file is in the public domain. http://lists.freebsd.org/pipermail/freebsd-ports/2004-June/013878.html - http://www.idefense.com/application/poi/display?id=114&type=vulnerabilities + http://www.idefense.com/application/poi/display?id=114&type=vulnerabilities&flashstatus=false CAN-2004-0640 http://www.osvdb.org/7594 http://secunia.com/advisories/12032 @@ -113,4 +113,667 @@ This file is in the public domain. + + + + + + + Acrobat Reader handling of malformed uuencoded pdf files + + + acroread + 5.09 + + + + +

Remote exploitation of an input validation error in the uudecoding + feature of Adobe Acrobat Reader (Unix) 5.0 allows an attacker to execute + arbitrary code.

+ +
+ + http://www.osvdb.org/7429 + http://freshmeat.net/releases/164883 + CAN-2004-0630 + CAN-2004-0631 + http://secunia.com/advisories/12285 + http://www.idefense.com/application/poi/display?id=124&type=vulnerabilities&flashstatus=false + http://www.idefense.com/application/poi/display?id=125&type=vulnerabilities&flashstatus=false + + + 2004-03-30 + 2004-08-04 + +
+ + + + + + + + + + + KDElibs temporary directory vulnerability + + + kdelibs + 3.2.3_5 + + + + +

In some cases the + integrity of symlinks used by KDE are not ensured and that + these symlinks can be pointing to stale locations. This can + be abused by a local attacker to create or truncate arbitrary + files or to prevent KDE applications from functioning + correctly (Denial of Service).

+ +
+ + http://www.kde.org/info/security/advisory-20040811-1.txt + CAN-2004-0689 + http://www.osvdb.org/8589 + http://secunia.com/advisories/12276 + + + 2004-06-23 + 2004-08-12 + 2004-08-13 + +
+ + + DCOPServer Temporary Filename Vulnerability + + + kdelibs + 3.2.3_4 + + + + +

KDE's DCOPServer creates + temporary files in an insecure manner. Since the temporary + files are used for authentication related purposes this can + potentially allow a local attacker to compromise the account of + any user which runs a KDE application.

+ +
+ + http://www.kde.org/info/security/advisory-20040811-2.txt + CAN-2004-0690 + http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=261386 + http://www.osvdb.org/8590 + http://secunia.com/advisories/12276 + + + 2004-07-25 + 2004-08-12 + 2004-08-13 + +
+ + + + + + + Konqueror frame injection vulnerability + + + kdebase + 3.2.3_1 + + + kdelibs + 3.2.3_3 + + + + +

The Konqueror webbrowser allows websites to load webpages into + a frame of any other frame-based webpage that the user may have open.

+ +
+ + http://www.kde.org/info/security/advisory-20040811-3.txt + CAN-2004-0721 + http://secunia.com/advisories/11978 + http://www.heise.de/newsticker/meldung/48793 + http://bugs.kde.org/show_bug.cgi?id=84352 + + + 2004-07-01 + 2004-08-11 + 2004-08-13 + +
+ + + Multiple Potential Buffer Overruns in Samba + + + samba + 3.*3.0.5,1 + 2.2.10 + + + ja-samba + 2.2.10.* + + + + +

Evgeny Demidov discovered that the Samba server has a + buffer overflow in the Samba Web Administration Tool (SWAT) + on decoding Base64 data during HTTP Basic Authentication. + Versions 3.0.2 through 3.0.4 are affected.

+

Another buffer overflow bug has been found in the code + used to support the "mangling method = hash" smb.conf + option. The default setting for this parameter is "mangling + method = hash2" and therefore not vulnerable. Versions + between 2.2.0 through 2.2.9 and 3.0.0 through 3.0.4 are affected. +

+ +
+ + CAN-2004-0600 + CAN-2004-0686 + http://www.securityfocus.com/archive/1/369698 + http://www.securityfocus.com/archive/1/369706 + http://www.samba.org/samba/whatsnew/samba-3.0.5.html + http://www.samba.org/samba/whatsnew/samba-2.2.10.html + http://www.osvdb.org/8190 + http://www.osvdb.org/8191 + http://secunia.com/advisories/12130 + + + 2004-07-14 + 2004-07-21 + 2004-07-22 + +
+ + + isc-dhcp3-server buffer overflow in logging mechanism + + + isc-dhcp3-{relay,server} + 3.0.1.r123.0.1.r14 + + + + +

A buffer overflow exists in the logging functionality + of the DHCP daemon which could lead to Denial of Service + attacks and has the potential to allow attackers to + execute arbitrary code.

+ +
+ + CAN-2004-0460 + http://www.osvdb.org/7237 + TA04-174A + 317350 + http://www.securityfocus.com/archive/1/366801 + http://www.securityfocus.com/archive/1/367286 + + + 2004-06-22 + 2004-06-25 + 2004-06-28 + +
+ + + libpng denial-of-service + + + linux-png + 1.0.14_3 + 1.2.*1.2.2 + + + png + 1.2.5_4 + + + + +

Steve Grubb reports a buffer read overrun in + libpng's png_format_buffer function. A specially + constructed PNG image processed by an application using + libpng may trigger the buffer read overrun and possibly + result in an application crash.

+ +
+ + CAN-2004-0421 + http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=120508 + http://rhn.redhat.com/errata/RHSA-2004-181.html + http://secunia.com/advisories/11505 + http://www.osvdb.org/5726 + 10244 + + + 2004-04-29 + 2004-05-02 + 2004-08-10 + +
+ + + MySQL authentication bypass / buffer overflow + + + mysql-server + 4.1.*4.1.3 + 5.*5.0.0_2 + + + + +

By submitting a carefully crafted authentication packet, it is possible + for an attacker to bypass password authentication in MySQL 4.1. Using a + similar method, a stack buffer used in the authentication mechanism can + be overflowed.

+ +
+ + http://www.nextgenss.com/advisories/mysql-authbypass.txt + http://dev.mysql.com/doc/mysql/en/News-4.1.3.html + http://secunia.com/advisories/12020 + http://www.osvdb.org/7475 + http://www.osvdb.org/7476 + http://archives.neohapsis.com/archives/vulnwatch/2004-q3/0003.html + + + 2004-07-01 + 2004-07-05 + +
+ + + multiple vulnerabilities in ethereal + + + ethereal{,-lite} + tethereal{,-lite} + 0.10.4 + + + + +

Issues have been discovered in multiple protocol dissectors.

+ +
+ + http://www.ethereal.com/appnotes/enpa-sa-00014.html + CAN-2004-0504 + CAN-2004-0505 + CAN-2004-0506 + CAN-2004-0507 + http://secunia.com/advisories/11608 + 10347 + http://www.osvdb.org/6131 + http://www.osvdb.org/6132 + http://www.osvdb.org/6133 + http://www.osvdb.org/6134 + + + 2004-05-13 + 2004-07-11 + +
+ + + multiple vulnerabilities in ethereal + + + ethereal{,-lite} + tethereal{,-lite} + 0.10.5 + + + + +

Issues have been discovered in multiple protocol dissectors.

+ +
+ + http://www.ethereal.com/appnotes/enpa-sa-00015.html + CAN-2004-0633 + CAN-2004-0634 + CAN-2004-0635 + http://secunia.com/advisories/12024 + 10672 + http://www.osvdb.org/7536 + http://www.osvdb.org/7537 + http://www.osvdb.org/7538 + + + 2004-07-06 + 2004-07-11 + +
+ + + PHP memory_limit and strip_tags() vulnerabilities + + + php4 + php4-{cgi,cli,dtc,horde,nms} + mod_php4-twig + 4.3.8 + + + mod_php4 + 4.3.8,1 + + + php5 + php5-{cgi,cli} + 5.0.0 + + + mod_php5 + 5.0.0,1 + + + + +

Stefan Esser has reported two vulnerabilities in PHP, which can + be exploited by malicious people to bypass security functionality + or compromise a vulnerable system. An error within PHP's memory_limit + request termination allows remote code execution on PHP servers + with activated memory_limit. A binary safety problem within PHP's + strip_tags() function may allow injection of arbitrary tags in + Internet Explorer and Safari browsers.

+ +
+ + http://www.php.net/ChangeLog-4.php + http://www.php.net/ChangeLog-5.php + http://security.e-matters.de/advisories/112004.html + http://security.e-matters.de/advisories/122004.html + http://secunia.com/advisories/12064 + http://www.osvdb.org/7870 + http://www.osvdb.org/7871 + CAN-2004-0594 + CAN-2004-0595 + + + 2007-07-07 + 2004-07-15 + +
+ + + Mozilla / Firefox user interface spoofing vulnerability + + + firefox + 0.9.1_1 + + + linux-mozilla + 1.7.1 + + + linux-mozilla-devel + 1.7.1 + + + mozilla + 1.7.1,2 + 1.8.*,21.8.a2,2 + + + mozilla-gtk1 + 1.7.1_1 + + + + +

A vulnerability has been reported in Mozilla and Firefox, + allowing malicious websites to spoof the user interface.

+ +
+ + http://bugzilla.mozilla.org/show_bug.cgi?id=252198 + http://www.nd.edu/~jsmith30/xul/test/spoof.html + http://secunia.com/advisories/12188 + 10832 + CAN-2004-0764 + + + 2004-07-19 + 2004-07-30 + +
+ + + libpng stack-based buffer overflow and other code concerns + + + png + 1.2.5_7 + + + linux-png + 1.0.14_3 + 1.2.*1.2.2 + + + firefox + 0.9.3 + + + thunderbird + 0.7.3 + + + linux-mozilla + 1.7.2 + + + linux-mozilla-devel + 1.7.2 + + + mozilla + 1.7.2,2 + 1.8.*,21.8.a2,2 + + + mozilla-gtk1 + 1.7.2 + + + netscape-{communicator,navigator} + 4.78 + + + linux-netscape-{communicator,navigator} + {ja,ko}-netscape-{communicator,navigator}-linux + 4.8 + + + {,ja-}netscape7 + 7.1 + + + {de-,fr-,pt_BR-}netscape7 + 7.02 + + + + +

Chris Evans has discovered multiple vulnerabilities in libpng, + which can be exploited by malicious people to compromise a + vulnerable system or cause a DoS (Denial of Service).

+ +
+ + http://www.securityfocus.com/archive/1/370853 + http://scary.beasts.org/security/CESA-2004-001.txt + http://www.osvdb.org/8312 + http://www.osvdb.org/8313 + http://www.osvdb.org/8314 + http://www.osvdb.org/8315 + http://www.osvdb.org/8316 + CAN-2004-0597 + CAN-2004-0598 + CAN-2004-0599 + 388984 + 236656 + 160448 + 477512 + 817368 + 286464 + http://secunia.com/advisories/12219 + http://secunia.com/advisories/12232 + http://bugzilla.mozilla.org/show_bug.cgi?id=251381 + TA04-217A + http://dl.sourceforge.net/sourceforge/libpng/ADVISORY.txt + + + 2004-08-04 + 2004-08-04 + 2004-08-12 + +
+ + + Mozilla certificate spoofing + + + firefox + 0.9.10.9.2 + + + linux-mozilla + 1.7.2 + + + linux-mozilla-devel + 1.7.2 + + + mozilla + 1.7.2,2 + 1.8.*,21.8.a2,2 + + + mozilla-gtk1 + 1.7.2 + + + + +

Mozilla and Mozilla Firefox contains a flaw that may + allow a malicious user to spoof SSL certification.

+ +
+ + http://www.securityfocus.com/archive/1/369953 + http://www.cipher.org.uk/index.php?p=advisories/Certificate_Spoofing_Mozilla_FireFox_25-07-2004.advisory + http://secunia.com/advisories/12160 + http://bugzilla.mozilla.org/show_bug.cgi?id=253121 + http://www.osvdb.org/8238 + 10796 + CAN-2004-0763 + + + 2004-07-25 + 2004-07-30 + 2004-08-05 + +
+ + + ImageMagick png vulnerability fix + + + ImageMagick{,-nox11} + 6.0.4.2 + + + + +

Glenn Randers-Pehrson has contributed a fix for the png + vulnerabilities discovered by Chris Evans.

+ +
+ + http://studio.imagemagick.org/pipermail/magick-users/2004-August/013218.html + http://freshmeat.net/releases/169228 + http://secunia.com/advisories/12236 + http://www.freebsd.org/ports/portaudit/f9e3e60b-e650-11d8-9b0a-000347a4fa7d.html + + + 2004-08-04 + 2004-08-04 + 2004-08-12 + +
+ + + CVStrac remote code execution vulnerability + + + cvstrac + 1.1.4 + + + + +

CVStrac contains a flaw that may allow a remote attacker + to execute arbitrary commands.

+ +
+ + http://www.securityfocus.com/archive/1/370955 + http://secunia.com/advisories/12090 + http://www.osvdb.org/8373 + http://www.cvstrac.org/cvstrac/chngview?cn=316 + + + 2000-00-00 + 2004-08-13 + +
+ + + gaim remotely exploitable vulnerabilities in MSN component + + + {ja-,}gaim + 0.81_1 + + + + +

Sebastian Krahmer discovered several remotely exploitable + buffer overflow vulnerabilities in the MSN component of + gaim.

+ +
+ + CAN-2004-0500 + http://secunia.com/advisories/12125 + http://www.osvdb.org/8382 + http://www.suse.com/de/security/2004_25_gaim.html + + + 2004-08-12 + 2004-08-12 + 2004-08-12 + +
-- cgit