MPlayer remotely exploitable buffer overflow in the ASX parser mplayer{,-gtk}{,-esound} 0.92

A remotely exploitable buffer overflow vulnerability was found in MPlayer. A malicious host can craft a harmful ASX header, and trick MPlayer into executing arbitrary code upon parsing that header.

http://www.mplayerhq.hu/ http://www.securityfocus.com/archive/1/339330 http://www.securityfocus.com/archive/1/339193 CAN-2003-0835 8702 2003-09-24 2004-03-30
MPlayer remotely exploitable buffer overflow in the HTTP parser mplayer{,-gtk}{,-esound} 0.92.1

A remotely exploitable buffer overflow vulnerability was found in MPlayer. A malicious host can craft a harmful HTTP header ("Location:"), and trick MPlayer into executing arbitrary code upon parsing that header.

http://www.mplayerhq.hu/ http://www.securityfocus.com/archive/1/359029 http://www.securityfocus.com/archive/1/359025 CAN-2004-0386 2004-03-29 2004-03-30
SSLtelnet remote format string vulnerability SSLtelnet 0.13_1

SSLtelnet contains a format string vulnerability that could allow remote code execution.

http://lists.freebsd.org/pipermail/freebsd-ports/2004-June/013878.html http://www.idefense.com/application/poi/display?id=114&type=vulnerabilities&flashstatus=false CAN-2004-0640 http://www.osvdb.org/7594 http://secunia.com/advisories/12032 2003-04-03 2004-06-30
Acrobat Reader handling of malformed uuencoded pdf files acroread 5.09

Remote exploitation of an input validation error in the uudecoding feature of Adobe Acrobat Reader (Unix) 5.0 allows an attacker to execute arbitrary code.

http://www.osvdb.org/7429 http://freshmeat.net/releases/164883 CAN-2004-0630 CAN-2004-0631 http://secunia.com/advisories/12285 http://xforce.iss.net/xforce/xfdb/16972 http://xforce.iss.net/xforce/xfdb/16973 http://www.idefense.com/application/poi/display?id=124&type=vulnerabilities&flashstatus=false http://www.idefense.com/application/poi/display?id=125&type=vulnerabilities&flashstatus=false http://www.osvdb.org/8654 http://www.osvdb.org/8655 10931 10932 2004-03-30 2004-08-04
KDElibs temporary directory vulnerability kdelibs 3.2.3_5

In some cases the integrity of symlinks used by KDE are not ensured and that these symlinks can be pointing to stale locations. This can be abused by a local attacker to create or truncate arbitrary files or to prevent KDE applications from functioning correctly (Denial of Service).

http://www.kde.org/info/security/advisory-20040811-1.txt CAN-2004-0689 http://www.osvdb.org/8589 http://secunia.com/advisories/12276 2004-06-23 2004-08-12 2004-08-13
DCOPServer Temporary Filename Vulnerability kdelibs 3.2.3_4

KDE's DCOPServer creates temporary files in an insecure manner. Since the temporary files are used for authentication related purposes this can potentially allow a local attacker to compromise the account of any user which runs a KDE application.

http://www.kde.org/info/security/advisory-20040811-2.txt CAN-2004-0690 http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=261386 http://www.osvdb.org/8590 http://secunia.com/advisories/12276 2004-07-25 2004-08-12 2004-08-13
Konqueror frame injection vulnerability kdebase 3.2.3_1 kdelibs 3.2.3_3

The Konqueror webbrowser allows websites to load webpages into a frame of any other frame-based webpage that the user may have open.

http://www.kde.org/info/security/advisory-20040811-3.txt CAN-2004-0721 http://secunia.com/advisories/11978 http://www.heise.de/newsticker/meldung/48793 http://bugs.kde.org/show_bug.cgi?id=84352 2004-07-01 2004-08-11 2004-08-13
Multiple Potential Buffer Overruns in Samba samba 3.*3.0.5,1 2.2.10 ja-samba 2.2.10.*

Evgeny Demidov discovered that the Samba server has a buffer overflow in the Samba Web Administration Tool (SWAT) on decoding Base64 data during HTTP Basic Authentication. Versions 3.0.2 through 3.0.4 are affected.

Another buffer overflow bug has been found in the code used to support the "mangling method = hash" smb.conf option. The default setting for this parameter is "mangling method = hash2" and therefore not vulnerable. Versions between 2.2.0 through 2.2.9 and 3.0.0 through 3.0.4 are affected.

CAN-2004-0600 CAN-2004-0686 http://www.securityfocus.com/archive/1/369698 http://www.securityfocus.com/archive/1/369706 http://www.samba.org/samba/whatsnew/samba-3.0.5.html http://www.samba.org/samba/whatsnew/samba-2.2.10.html http://www.osvdb.org/8190 http://www.osvdb.org/8191 http://secunia.com/advisories/12130 2004-07-14 2004-07-21 2004-07-22
isc-dhcp3-server buffer overflow in logging mechanism isc-dhcp3-{relay,server} 3.0.1.r123.0.1.r14

A buffer overflow exists in the logging functionality of the DHCP daemon which could lead to Denial of Service attacks and has the potential to allow attackers to execute arbitrary code.

CAN-2004-0460 http://www.osvdb.org/7237 TA04-174A 317350 http://www.securityfocus.com/archive/1/366801 http://www.securityfocus.com/archive/1/367286 2004-06-22 2004-06-25 2004-06-28
libpng denial-of-service linux-png 1.0.14_3 1.2.*1.2.2 png 1.2.5_4

Steve Grubb reports a buffer read overrun in libpng's png_format_buffer function. A specially constructed PNG image processed by an application using libpng may trigger the buffer read overrun and possibly result in an application crash.

CAN-2004-0421 http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=120508 http://rhn.redhat.com/errata/RHSA-2004-181.html http://secunia.com/advisories/11505 http://www.osvdb.org/5726 10244 http://www.mozilla.org/projects/security/known-vulnerabilities.html#mozilla1.7 2004-04-29 2004-05-02 2004-08-10
MySQL authentication bypass / buffer overflow mysql-server 4.1.*4.1.3 5.*5.0.0_2

By submitting a carefully crafted authentication packet, it is possible for an attacker to bypass password authentication in MySQL 4.1. Using a similar method, a stack buffer used in the authentication mechanism can be overflowed.

http://www.nextgenss.com/advisories/mysql-authbypass.txt http://dev.mysql.com/doc/mysql/en/News-4.1.3.html http://secunia.com/advisories/12020 http://www.osvdb.org/7475 http://www.osvdb.org/7476 http://archives.neohapsis.com/archives/vulnwatch/2004-q3/0003.html CAN-2004-0627 CAN-2004-0628 184030 645326 2004-07-01 2004-07-05
multiple vulnerabilities in ethereal ethereal{,-lite} tethereal{,-lite} 0.10.4

Issues have been discovered in multiple protocol dissectors.

http://www.ethereal.com/appnotes/enpa-sa-00014.html CAN-2004-0504 CAN-2004-0505 CAN-2004-0506 CAN-2004-0507 http://secunia.com/advisories/11608 10347 http://www.osvdb.org/6131 http://www.osvdb.org/6132 http://www.osvdb.org/6133 http://www.osvdb.org/6134 2004-05-13 2004-07-11
multiple vulnerabilities in ethereal ethereal{,-lite} tethereal{,-lite} 0.10.5

Issues have been discovered in multiple protocol dissectors.

http://www.ethereal.com/appnotes/enpa-sa-00015.html CAN-2004-0633 CAN-2004-0634 CAN-2004-0635 http://secunia.com/advisories/12024 10672 http://www.osvdb.org/7536 http://www.osvdb.org/7537 http://www.osvdb.org/7538 2004-07-06 2004-07-11
PHP memory_limit and strip_tags() vulnerabilities php4 php4-{cgi,cli,dtc,horde,nms} mod_php4-twig 4.3.8 mod_php4 4.3.8,1 php5 php5-{cgi,cli} 5.0.0 mod_php5 5.0.0,1

Stefan Esser has reported two vulnerabilities in PHP, which can be exploited by malicious people to bypass security functionality or compromise a vulnerable system. An error within PHP's memory_limit request termination allows remote code execution on PHP servers with activated memory_limit. A binary safety problem within PHP's strip_tags() function may allow injection of arbitrary tags in Internet Explorer and Safari browsers.

http://www.php.net/ChangeLog-4.php http://www.php.net/ChangeLog-5.php http://security.e-matters.de/advisories/112004.html http://security.e-matters.de/advisories/122004.html http://secunia.com/advisories/12064 http://www.osvdb.org/7870 http://www.osvdb.org/7871 CAN-2004-0594 CAN-2004-0595 2007-07-07 2004-07-15
Mozilla / Firefox user interface spoofing vulnerability firefox 0.9.1_1 linux-mozilla 1.7.1 linux-mozilla-devel 1.7.1 mozilla 1.7.1,2 1.8.*,21.8.a2,2 mozilla-gtk1 1.7.1_1

A vulnerability has been reported in Mozilla and Firefox, allowing malicious websites to spoof the user interface.

http://bugzilla.mozilla.org/show_bug.cgi?id=252198 http://www.nd.edu/~jsmith30/xul/test/spoof.html http://secunia.com/advisories/12188 10832 CAN-2004-0764 2004-07-19 2004-07-30
libpng stack-based buffer overflow and other code concerns png 1.2.5_7 linux-png 1.0.14_3 1.2.*1.2.2 firefox 0.9.3 thunderbird 0.7.3 linux-mozilla 1.7.2 linux-mozilla-devel 1.7.2 mozilla 1.7.2,2 1.8.*,21.8.a2,2 mozilla-gtk1 1.7.2 netscape-{communicator,navigator} 4.78 linux-netscape-{communicator,navigator} {ja,ko}-netscape-{communicator,navigator}-linux 4.8 {,ja-}netscape7 7.1 {de-,fr-,pt_BR-}netscape7 7.02

Chris Evans has discovered multiple vulnerabilities in libpng, which can be exploited by malicious people to compromise a vulnerable system or cause a DoS (Denial of Service).

http://www.securityfocus.com/archive/1/370853 http://scary.beasts.org/security/CESA-2004-001.txt http://www.osvdb.org/8312 http://www.osvdb.org/8313 http://www.osvdb.org/8314 http://www.osvdb.org/8315 http://www.osvdb.org/8316 CAN-2004-0597 CAN-2004-0598 CAN-2004-0599 388984 236656 160448 477512 817368 286464 http://secunia.com/advisories/12219 http://secunia.com/advisories/12232 http://bugzilla.mozilla.org/show_bug.cgi?id=251381 http://www.mozilla.org/projects/security/known-vulnerabilities.html#mozilla1.7.2 TA04-217A http://dl.sourceforge.net/sourceforge/libpng/ADVISORY.txt 2004-08-04 2004-08-04 2004-08-12
Mozilla certificate spoofing firefox 0.9.10.9.2 linux-mozilla 1.7.2 linux-mozilla-devel 1.7.2 mozilla 1.7.2,2 1.8.*,21.8.a2,2 mozilla-gtk1 1.7.2

Mozilla and Mozilla Firefox contains a flaw that may allow a malicious user to spoof SSL certification.

http://www.securityfocus.com/archive/1/369953 http://www.cipher.org.uk/index.php?p=advisories/Certificate_Spoofing_Mozilla_FireFox_25-07-2004.advisory http://secunia.com/advisories/12160 http://bugzilla.mozilla.org/show_bug.cgi?id=253121 http://www.mozilla.org/projects/security/known-vulnerabilities.html#mozilla1.7.2 http://www.osvdb.org/8238 10796 CAN-2004-0763 2004-07-25 2004-07-30 2004-08-05
ImageMagick png and bmp vulnerabilities ImageMagick{,-nox11} 6.0.6

Glenn Randers-Pehrson has contributed a fix for the png vulnerabilities discovered by Chris Evans.

Furthermore, Marcus Meissner has discovered and patched a buffer overrun associated with decoding runlength-encoded BMP images.

http://studio.imagemagick.org/pipermail/magick-users/2004-August/013218.html http://studio.imagemagick.org/pipermail/magick-developers/2004-August/002011.html http://freshmeat.net/releases/169228 http://secunia.com/advisories/12236 http://secunia.com/advisories/12479 http://www.freebsd.org/ports/portaudit/f9e3e60b-e650-11d8-9b0a-000347a4fa7d.html 2004-08-04 2004-08-04 2004-09-03
CVStrac remote code execution vulnerability cvstrac 1.1.4

CVStrac contains a flaw that may allow a remote attacker to execute arbitrary commands.

http://www.securityfocus.com/archive/1/370955 http://secunia.com/advisories/12090 http://www.osvdb.org/8373 http://www.cvstrac.org/cvstrac/chngview?cn=316 2004-08-05 2004-08-13
gaim remotely exploitable vulnerabilities in MSN component {ja-,ru-,}gaim 0.81_1

Sebastian Krahmer discovered several remotely exploitable buffer overflow vulnerabilities in the MSN component of gaim.

CAN-2004-0500 http://secunia.com/advisories/12125 http://www.osvdb.org/8382 http://www.osvdb.org/8961 http://www.osvdb.org/8962 http://www.suse.com/de/security/2004_25_gaim.html 10865 2004-08-12 2004-08-12 2004-08-30
jftpgw remote syslog format string vulnerability jftpgw 0.13.5

Remote authenticated users can execute arbitrary code by passing a malicious string containing format specifiers.

CAN-2004-0448 10438 http://secunia.com/advisories/11732 http://www.debian.org/security/2004/dsa-510 2004-05-29 2004-08-13
ruby CGI::Session insecure file creation ruby{,_r,_static} 1.6.8.2004.07.28 1.8.*1.8.2.p2

Rubys CGI session management store session information insecurely, which can be exploited by a local attacker to take over a session.

CAN-2004-0755 http://secunia.com/advisories/12290 http://www.debian.org/security/2004/dsa-537 http://www.ruby-lang.org/cgi-bin/cvsweb.cgi/ruby/ChangeLog?rev=1.2673.2.410 http://www.osvdb.org/8845 2004-07-22 2004-08-16 2004-08-16
Qt 3.x BMP heap-based overflow, GIF and XPM DoS NULL pointer dereference qt 3.*3.3.3

Chris Evans has discovered flaws in th handling of various bitmap formats, allowing the execution of arbitrary code or causing a DoS.

http://scary.beasts.org/security/CESA-2004-004.txt http://secunia.com/advisories/12325 CAN-2004-0691 CAN-2004-0692 CAN-2004-0693 http://www.osvdb.org/9026 http://xforce.iss.net/xforce/xfdb/17040 http://xforce.iss.net/xforce/xfdb/17041 http://xforce.iss.net/xforce/xfdb/17042 2004-08-18 2004-08-20
SpamAssassin DoS vulnerability p5-Mail-SpamAssassin 2.64

Unspecified malformed messages can be used to cause a DoS (Denial of Service).

http://secunia.com/advisories/12255 http://marc.theaimsgroup.com/?l=spamassassin-announce&m=109168121628767&w=2 CAN-2004-0796 10957 2004-08-05 2004-08-10
vpopmail multiple vulnerabilities vpopmail 5.4.6 vpopmail-devel 5.5.0

Inter7 vpopmail (vchkpw) versions 5.4.2 and earlier contain buffer overflows and format string vulnerabilities in the file vsybase.c

The buffer overflows are not fixed in versions 5.4.6/5.5.0, but are believed to be very hard to exploit, and only by administrators able to add users.

http://www.osvdb.org/9146 http://www.osvdb.org/9147 http://www.osvdb.org/9148 10962 http://secunia.com/advisories/12441 http://cvs.sourceforge.net/viewcvs.py/vpopmail/vpopmail/vsybase.c?r1=1.9.2.1&r2=1.9.2.2 http://www.kupchino.org.ru/unl0ck/advisories/vpopmail.txt http://www.securityfocus.com/archive/1/372257 http://www.securityfocus.com/archive/1/372468 http://xforce.iss.net/xforce/xfdb/17016 http://xforce.iss.net/xforce/xfdb/17017 http://security.gentoo.org/glsa/glsa-200409-01.xml 2004-08-17 2004-09-03
multiple vulnerabilities in the cvs server code cvs+ipv6 1.11.17 FreeBSD 491101 500000502114

Stefan Esser reports multiple remote exploitable vulnerabilites in the cvs code base.

Additionaly there exists an undocumented switch to the history command allows an attacker to determine whether arbitrary files exist and whether the CVS process can access them.

CAN-2004-0414 CAN-2004-0416 CAN-2004-0417 CAN-2004-0418 CAN-2004-0778 http://secunia.com/advisories/11817 http://secunia.com/advisories/12309 http://security.e-matters.de/advisories/092004.html http://www.idefense.com/application/poi/display?id=130&type=vulnerabilities&flashstatus=false https://ccvs.cvshome.org/source/browse/ccvs/NEWS?rev=1.116.2.104 http://www.osvdb.org/6830 http://www.osvdb.org/6831 http://www.osvdb.org/6832 http://www.osvdb.org/6833 http://www.osvdb.org/6834 http://www.osvdb.org/6835 http://www.osvdb.org/6836 http://www.packetstormsecurity.org/0405-exploits/cvs_linux_freebsd_HEAP.c 10499 2004-05-20 2004-08-17
multiple vulnerabilities in LHA lha 1.14i_4

Multiple vulnerabilities have been found in the LHA code by Lukasz Wojtow and Thomas Biege.

Successful exploitation may allow execution of arbitrary code.

http://secunia.com/advisories/12435 CAN-2004-0694 CAN-2004-0745 CAN-2004-0769 CAN-2004-0771 http://www.securityfocus.com/archive/1/365386 http://www.securityfocus.com/archive/1/363418 http://lw.ftw.zamosc.pl/lha-exploit.txt http://www.osvdb.org/9519 http://www.osvdb.org/9520 http://www.osvdb.org/9521 http://www.osvdb.org/9522 10354 11093 http://rhn.redhat.com/errata/RHSA-2004-323.html 2004-05-19 2004-09-03
cdrtools local privilege escalation cdrtools 2.0.3_4 cdrtools-cjk 2.0.3.20030714_4 cdrtools-devel 2.01a38

Max Vozeler found a flaw in in cdrecord allowing a local root exploit

ftp://ftp.berlios.de/pub/cdrecord/alpha/AN-2.01a38 http://www.osvdb.org/9395 CAN-2004-0806 http://lists.debian.org/debian-devel-changes/2004/08/msg03421.html 11075 http://secunia.com/advisories/12481 2004-08-28 2004-08-30