From 08f5d2a3e95d694cff51e5d21c8edaae619421eb Mon Sep 17 00:00:00 2001 From: miwi Date: Wed, 13 May 2009 08:10:42 +0000 Subject: - Cleanup --- security/vuxml/vuln.xml | 103 ++++++++++++++++++++++++++---------------------- 1 file changed, 56 insertions(+), 47 deletions(-) (limited to 'security/vuxml') diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index 5baefbd517a7..e1b09ebdd375 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -76,9 +76,13 @@ Note: Please add new entries to the beginning of this file. wireshark -- multiple vulnerabilities - wireshark - wireshark-lite - 0.99.61.0.7 + ethereal + ethereal-lite + tethereal + tethereal-lite + wireshark + wireshark-lite + 1.0.7 @@ -89,31 +93,34 @@ Note: Please add new entries to the beginning of this file.

Wireshark 1.0.7 fixes the following vulnerabilities:

+ 34291 + 34457 CVE-2009-1210 CVE-2009-1268 CVE-2009-1269 - 34291 - 34457 http://www.wireshark.org/security/wnpa-sec-2009-02.html + http://secunia.com/advisories/34542 2009-04-06 2009-05-09 + 2009-05-13 + cups -- remote code execution and DNS rebinding @@ -130,39 +137,40 @@ Note: Please add new entries to the beginning of this file.

The following issues were reported in CUPS:

  • iDefense reported an integer overflow in the - _cupsImageReadTIFF() function in the "imagetops" filter, - leading to a heap-based buffer overflow (CVE-2009-0163).
  • + _cupsImageReadTIFF() function in the "imagetops" filter, + leading to a heap-based buffer overflow (CVE-2009-0163).
  • Aaron Siegel of Apple Product Security reported that the - CUPS web interface does not verify the content of the "Host" - HTTP header properly (CVE-2009-0164).
  • + CUPS web interface does not verify the content of the "Host" + HTTP header properly (CVE-2009-0164).
  • Braden Thomas and Drew Yao of Apple Product Security - reported that CUPS is vulnerable to CVE-2009-0146, - CVE-2009-0147 and CVE-2009-0166, found earlier in xpdf and - poppler.
  • + reported that CUPS is vulnerable to CVE-2009-0146, + CVE-2009-0147 and CVE-2009-0166, found earlier in xpdf and + poppler.

A remote attacker might send or entice a user to send a - specially crafted print job to CUPS, possibly resulting in the - execution of arbitrary code with the privileges of the - configured CUPS user -- by default this is "lp", or a Denial - of Service. Furthermore, the web interface could be used to - conduct DNS rebinding attacks.

+ specially crafted print job to CUPS, possibly resulting in the + execution of arbitrary code with the privileges of the + configured CUPS user -- by default this is "lp", or a Denial + of Service. Furthermore, the web interface could be used to + conduct DNS rebinding attacks.

+ 34571 + 34665 + 34568 CVE-2009-0163 CVE-2009-0164 CVE-2009-0146 CVE-2009-0147 CVE-2009-0166 - 34571 - 34665 - 34568 http://www.cups.org/articles.php?L582 2009-05-05 2009-05-07 + 2009-05-13
@@ -180,18 +188,18 @@ Note: Please add new entries to the beginning of this file.

Problem Description

-

The function ASN1_STRING_print_ex does not properly validate - the lengths of BMPString or UniversalString objects before - attempting to print them.

+

The function ASN1_STRING_print_ex does not properly validate + the lengths of BMPString or UniversalString objects before + attempting to print them.

Impact

-

An application which attempts to print a BMPString or - UniversalString which has an invalid length will crash as a - result of OpenSSL accessing invalid memory locations. This - could be used by an attacker to crash a remote application.

+

An application which attempts to print a BMPString or + UniversalString which has an invalid length will crash as a + result of OpenSSL accessing invalid memory locations. This + could be used by an attacker to crash a remote application.

Workaround

-

No workaround is available, but applications which do not use - the ASN1_STRING_print_ex function (either directly or - indirectly) are not affected.

+

No workaround is available, but applications which do not use + the ASN1_STRING_print_ex function (either directly or + indirectly) are not affected.

@@ -201,6 +209,7 @@ Note: Please add new entries to the beginning of this file. 2009-03-25 2009-05-07 + 2009-05-13 @@ -240,21 +249,21 @@ Note: Please add new entries to the beginning of this file. openfire -- Openfire No Password Changes Security Bypass - openfire - 3.6.4 + openfire + 3.6.4

Secunia reports:

-
-

A vulnerability has been reported in Openfire which can - be exploited by malicious users to bypass certain security - restrictions. The vulnerability is caused due to Openfire - not properly respecting the no password changes setting which - can be exploited to change passwords by sending jabber:iq:auth - passwd_change requests to the server.

-
+
+

A vulnerability has been reported in Openfire which can + be exploited by malicious users to bypass certain security + restrictions. The vulnerability is caused due to Openfire + not properly respecting the no password changes setting which + can be exploited to change passwords by sending jabber:iq:auth + passwd_change requests to the server.

+
@@ -265,7 +274,7 @@ Note: Please add new entries to the beginning of this file. 2009-05-04 2009-05-04 - 2009-05-04 + 2009-05-13 -- cgit