Spyware, Viruses, & Security forum

General discussion

VULNERABILITIES \ FIXES - July 4, 2008

Fedora update for glib2

Secunia Advisory: SA30945
Release Date: 2008-07-04


Critical:
Moderately critical
Impact: DoS
System access

Where: From remote

Solution Status: Vendor Patch


OS: Fedora 8
Fedora 9

Description:
Fedora has issued an update for glib2. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system.

Solution:
Apply updated packages via the yum utility ("yum update glib2").

Original Advisory:
https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00105.html
https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00123.html

Other References:
SA30944
http://secunia.com/advisories/30944/

Discussion is locked
You are posting a reply to: VULNERABILITIES \ FIXES - July 4, 2008
The posting of advertisements, profanity, or personal attacks is prohibited. Please refer to our CNET Forums policies for details. All submitted content is subject to our Terms of Use.
Track this discussion and email me when there are updates

If you're asking for technical help, please be sure to include all your system info, including operating system, model number, and any other specifics related to the problem. Also please exercise your best judgment when posting in the forums--revealing personal information such as your e-mail address, telephone number, and address is not recommended.

You are reporting the following post: VULNERABILITIES \ FIXES - July 4, 2008
This post has been flagged and will be reviewed by our staff. Thank you for helping us maintain CNET's great community.
Sorry, there was a problem flagging this post. Please try again now or at a later time.
If you believe this post is offensive or violates the CNET Forums' Usage policies, you can report it below (this will not automatically remove the post). Once reported, our moderators will be notified and the post will be reviewed.
Collapse -
GNOME Glib PCRE pcre_compile.c Buffer Overflow Vulnerability

In reply to: VULNERABILITIES \ FIXES - July 4, 2008

Secunia Advisory: SA30944
Release Date: 2008-07-04


Critical:
Moderately critical
Impact: DoS
System access

Where: From remote

Solution Status: Vendor Patch


Software: GNOME GLib 2.x

Description:
A vulnerability has been reported in GNOME Glib, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise an application using the library.

The vulnerability is caused due to the use of a vulnerable code of the PCRE library.

The vulnerability is reported in versions prior to 2.16.4.

Solution:
Update to version 2.16.4.

Provided and/or discovered by:
Originally reported in PCRE by Tavis Ormandy.

Original Advisory:
http://ftp.gnome.org/pub/GNOME/sources/glib/2.16/glib-2.16.4.changes

Other References:
SA30916:
http://secunia.com/advisories/30916/

Collapse -
rPath update for wireshark

In reply to: VULNERABILITIES \ FIXES - July 4, 2008

Secunia Advisory: SA30942
Release Date: 2008-07-04


Critical:
Moderately critical
Impact: Exposure of sensitive information
DoS

Where: From remote

Solution Status: Vendor Patch


OS: rPath Linux 1.x

Description:
rPath has issued an update for wireshark. This fixes some vulnerabilities, which can be exploited by malicious people to disclose potentially sensitive information or cause a DoS (Denial of Service).

Solution:
Update to:
wireshark=conary.rpath.com@rpl:1/1.0.1-0.1-1

Original Advisory:
http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0212

Other References:
SA30886:
http://secunia.com/advisories/30886/

Collapse -
Novell eDirectory ds.dlm Module Buffer Overflow

In reply to: VULNERABILITIES \ FIXES - July 4, 2008

Secunia Advisory: SA30938
Release Date: 2008-07-04


Critical:
Moderately critical
Impact: DoS
System access

Where: From local network

Solution Status: Vendor Patch


Software: Novell eDirectory 8.x

Description:
A vulnerability has been reported in Novell eDirectory, which can be exploited by malicious people to cause a DoS (Denial of Service) or compromise a vulnerable system.

The vulnerability is caused due to an integer overflow error in ds.dlm and can be exploited to cause a stack-based buffer overflow via a specially crafted packet sent to default port 524/TCP.

Successful exploitation allows execution of arbitrary code.

NOTE: An error within the LDAP component when processing invalid extensibleMatch filters has also been reported.

The vulnerability is reported in version 8.8 and 8.7.3 for all platforms.

Solution:
Apply eDir 8.8.2 ftf2 or 8.7.3 SP10b.

Provided and/or discovered by:
The vendor credits Sebastian Apelt, reported via ZDI.

Original Advisory:
http://www.novell.com/support/viewContent.do?externalId=3694858&sliceId=1
http://www.novell.com/support/viewContent.do?externalId=3477912&sliceId=1

Collapse -
UnixWare ReliantHA Privilege Escalation Vulnerabilities

In reply to: VULNERABILITIES \ FIXES - July 4, 2008

Secunia Advisory: SA30921
Release Date: 2008-07-04


Critical:
Less critical
Impact: Privilege escalation

Where: Local system

Solution Status: Vendor Patch


OS: UnixWare 7.x.x

Description:
Some vulnerabilities have been reported in UnixWare, which can be exploited by malicious, local users to gain escalated privileges.

The vulnerabilities are caused due to errors within certain utilities in the ReliantHA package and can be exploited to execute arbitrary code with root privileges.

Successful exploitation requires that the ReliantHA package is installed.

The vulnerabilities reportedly affect UnixWare version 7.1.4 with ReliantHA version 1.1.4.

Solution:
Apply patch p534850.
ftp://ftp.sco.com/pub/unixware7/714/security/p534850/

Provided and/or discovered by:
qaaz

Original Advisory:
UnixWare:
ftp://ftp.sco.com/pub/unixware7/714/security/p534850/p534850.txt

http://milw0rm.com/exploits/5356

Collapse -
PCRE pcre_compile.c Buffer Overflow Vulnerability

In reply to: VULNERABILITIES \ FIXES - July 4, 2008

Secunia Advisory: SA30916
Release Date: 2008-07-04


Critical:
Moderately critical
Impact: DoS
System access

Where: From remote

Solution Status: Unpatched


Software: PCRE 7.x

Description:
A vulnerability has been reported in PCRE, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise an application using the library.

The vulnerability is caused due to an error when processing certain patterns containing an option at the start and multiple branches. This can be exploited to cause a heap-based buffer overflow via specially crafted patterns.

The vulnerability is reported in version 7.7. Other versions may also be affected.

Solution:
Do not use untrusted regular expressions in an application using the library.

Provided and/or discovered by:
Tavis Ormandy

Original Advisory:
http://bugs.gentoo.org/show_bug.cgi?id=228091

Collapse -
ServerView Web Interface Buffer Overflow Vulnerabilities

In reply to: VULNERABILITIES \ FIXES - July 4, 2008

Secunia Advisory: SA30913
Release Date: 2008-07-04


Critical:
Moderately critical
Impact: System access

Where: From local network

Solution Status: Unpatched


Software: ServerView 4.x

Description:
Some vulnerabilities have been reported in ServerView, which can be exploited by malicious people to compromise a vulnerable system.

The vulnerabilities are caused due to boundary errors within certain components of the ServerView web interface (e.g. SnmpGetMibValues.exe) and can be exploited to cause stack-based buffer overflows via a specially crafted URL.

Successful exploitation allows execution of arbitrary code.

The vulnerabilities are reported in version 4.60.07. Other versions may also be affected.

Solution:
Restrict network access to the web interface.

Provided and/or discovered by:
Steven James, Mike James, and r at b13$, Digital Defense, Inc. Vulnerability Research Team

Original Advisory:
http://lists.grok.org.uk/pipermail/full-disclosure/2008-July/063043.html

Collapse -
No critical updates scheduled for MS patch Tuesday

In reply to: VULNERABILITIES \ FIXES - July 4, 2008

4 July 2008

Next patch day, 8 July, looks like being fairly uneventful, with only four security updates scheduled classified as "important". At least one of the two Windows problems that are addressed allows remote code to be executed under Vista and Server 2008. We'll presumably have to wait until Tuesday to find out why this particular update is not judged to be "critical". The second Windows update protects against spoofing ? the forging of any kind of information. Updates for SQL Server and Exchange are intended to eliminate an opportunity to elevate privileges without authorisation.

http://www.heise-online.co.uk/security/No-critical-updates-scheduled-for-MS-patch-Tuesday--/news/111050

Collapse -
MS readies Vista code injection risk fix

In reply to: VULNERABILITIES \ FIXES - July 4, 2008

Redmond security gnomes get tough
By John Leyden
Published Friday 4th July 2008

Critical bug fixes are on the agenda for this month's monthly patch update from Microsoft.

The four "important" fixes due out next Tuesday (8 July) for Microsoft SQL Server and Exchange as well as a brace of fixes for Windows. One of the Windows fixes affects Vista and poses a "remote code execution" risk, something that would normally merit a critical tag.

Microsoft will need to come up with a really convincing rationale on why the bug is hard to exploit, to avoid accusations that it's fudging the classification of the vulnerability to avoid negative press.

More: http://www.theregister.co.uk/2008/07/04/ms_july_patch_tuesday_pre_alert/

Collapse -
Microsoft touts trustworthy browsing with IE8

In reply to: VULNERABILITIES \ FIXES - July 4, 2008

If it asks if you'd like to see some puppies, just say no
By John Leyden
Published Thursday 3rd July 2008

Microsoft has detailed a raft of security improvements due to appear in Internet Explorer 8. The second beta of Redmond's web browser will be packed full of features designed to thwart phishing and drive-by download attacks, Redmond explained on Wednesday.

Users need to be running either Vista or Windows XP SP2 to take advantage of the upgrade. We knew already that IE8 would be promoted on three grounds: improved security, enhanced ease of use and a move towards stricter adherence to web standards. However, the upcoming release will feature a far more extensive set of security enhancements than previously expected, particularly in relation to blocking some classes of cross-site scripting attack.

More:http://www.theregister.co.uk/2008/07/03/ie8_security_enhancements/

Collapse -
Several bugs fixed in the Wireshark and TShark network tools

In reply to: VULNERABILITIES \ FIXES - July 4, 2008

The new version 1.0.1 of the Wireshark network analysis tool and its command line variant TShark, remedy a number of security problems. Bugs in previous versions in the analysis modules for GSM messages, PANA, KISMET, and RTMPT packets as well as syslog messages, made it possible for attackers to crash the program. According to the developer advisory, the RMI module would even reveal some contents of the RAM to attackers.

More: http://www.heise-online.co.uk/security/Several-bugs-fixed-in-the-Wireshark-and-TShark-network-tools--/news/111055

Collapse -
Buffer overflow in the PCRE regular expression library

In reply to: VULNERABILITIES \ FIXES - July 4, 2008

A vulnerability in the Perl 5 Compatible Regular Expression Library (PCRE) may make it possible for attackers to execute arbitrary malicious code from programs that use the library. According to an entry in the Gentoo bug database, which initially reported the vulnerability, compilation of regular expressions with multiple branches into the bytecode can cause a buffer overflow on the heap. This usually results in the program crashing, but might also be used to inject malicious code.

More: http://www.heise-online.co.uk/security/Buffer-overflow-in-the-PCRE-regular-expression-library--/news/111053

Popular Forums

icon
Computer Newbies 10,686 discussions
icon
Computer Help 54,365 discussions
icon
Laptops 21,181 discussions
icon
Networking & Wireless 16,313 discussions
icon
Phones 17,137 discussions
icon
Security 31,287 discussions
icon
TVs & Home Theaters 22,101 discussions
icon
Windows 7 8,164 discussions
icon
Windows 10 2,657 discussions

SMART HOME

This one tip will help you sleep better tonight

A few seconds are all you need to get a better night's rest.