Spyware, Viruses, & Security forum

General discussion

VULNERABILITIES - January 11, 2007

Movable Type "nofollow" Plugin Comment Script Insertion
http://secunia.com/advisories/23669/

Software: Movable Type 3.x

Description:
A vulnerability has been discovered in Movable Type, which can be exploited by malicious people to conduct cross-site scripting attacks.

Input passed in the "Comments" form field when posting comments to blog entries is not properly sanitised before being stored. This can be exploited to insert arbitrary HTML and script code, which is then executed in a user's browser session in context of an affected site when the comment is viewed.

Successful exploitation requires that the "nofollow" plugin is disabled, which is not its default state, and that "Immediately publish comments from" is set to a value such that the comment does not require moderation.

The vulnerability is confirmed in version 3.33. Other versions may also be affected.

Solution: Enable the "nofollow" plugin.
Fixed in version 3.34b1.

Provided and/or discovered by: Mike Stay, Jacques Distler and Zack Ajmal

Original Advisory:
Jacques Distler:
http://golem.ph.utexas.edu/~distler/blog/archives/001102.html

Zack Ajmal:
http://www.zackvision.com/weblog/2007/01/movabletype-security-bug.html

Discussion is locked
You are posting a reply to: VULNERABILITIES - January 11, 2007
The posting of advertisements, profanity, or personal attacks is prohibited. Please refer to our CNET Forums policies for details. All submitted content is subject to our Terms of Use.
Track this discussion and email me when there are updates

If you're asking for technical help, please be sure to include all your system info, including operating system, model number, and any other specifics related to the problem. Also please exercise your best judgment when posting in the forums--revealing personal information such as your e-mail address, telephone number, and address is not recommended.

You are reporting the following post: VULNERABILITIES - January 11, 2007
This post has been flagged and will be reviewed by our staff. Thank you for helping us maintain CNET's great community.
Sorry, there was a problem flagging this post. Please try again now or at a later time.
If you believe this post is offensive or violates the CNET Forums' Usage policies, you can report it below (this will not automatically remove the post). Once reported, our moderators will be notified and the post will be reviewed.
Collapse -
pple Mac OS X UFS Filesystem "ffs_mountfs()" Remote Integer

In reply to: VULNERABILITIES - January 11, 2007

pple Mac OS X UFS Filesystem "ffs_mountfs()" Remote Integer Overflow Vulnerability

Advisory ID : FrSIRT/ADV-2007-0141
CVE ID : GENERIC-MAP-NOMATCH
Rated as : Critical
Remotely Exploitable : Yes
Locally Exploitable : Yes
Release Date : 2007-01-11

A vulnerability has been identified in Apple Mac OS X, which could be exploited by attackers to execute arbitrary commands. This issue is due to an integer overflow error in the "ffs_mountfs()" function when handling malformed images, which could be exploited by attackers to crash a vulnerable application or compromise an affected system by tricking a user into mounting a specially crafted image or visiting a malicious web page using Safari.

Affected Products

Apple Mac OS X version 10.4.8 and prior

Solution

Disable the "open safe files after downloading" option in Safari preferences.

The FrSIRT is not aware of any official supplied patch for this issue.

References

http://www.frsirt.com/english/advisories/2007/0141
http://projects.info-pull.com/moab/MOAB-10-01-2007.html

Credits

Vulnerability reported by LMH

Collapse -
Apple Mac OS X Finder DMG Volume Name Handling Memory Corrup

In reply to: VULNERABILITIES - January 11, 2007

Apple Mac OS X Finder DMG Volume Name Handling Memory Corruption Vulnerability

Advisory ID : FrSIRT/ADV-2007-0140
CVE ID : GENERIC-MAP-NOMATCH
Rated as : Low Risk
Remotely Exploitable : Yes
Locally Exploitable : Yes
Release Date : 2007-01-11

A vulnerability has been identified in Apple Mac OS X, which could be exploited by attackers to cause a denial of service. This issue is due to an error in Finder when handling DMG images containing an overly long volume name, which could be exploited by attackers to crash a vulnerable application or potentially execute arbitrary commands by tricking a user into mounting a specially crafted image or visiting a malicious web page.

Affected Products

Apple Mac OS X version 10.4.8 and prior

Solution

Disable the "open safe files after downloading" option in Safari preferences.

The FrSIRT is not aware of any official supplied patch for this issue.

References

http://www.frsirt.com/english/advisories/2007/0140
http://projects.info-pull.com/moab/MOAB-09-01-2007.html

Credits

Vulnerability reported by Kevin Finisterre

Collapse -
Cisco IOS Data-link Switching Message Handling Remote Denial

In reply to: VULNERABILITIES - January 11, 2007

Cisco IOS Data-link Switching Message Handling Remote Denial of Service Vulnerability

Advisory ID : FrSIRT/ADV-2007-0139
CVE ID : GENERIC-MAP-NOMATCH
Rated as : Low Risk
Remotely Exploitable : Yes
Locally Exploitable : Yes
Release Date : 2007-01-11

A vulnerability has been identified in Cisco IOS, which could be exploited by remote attackers to cause a denial of service. This issue is due to an error in the Data-link Switching (DLSw) feature when processing messages with invalid values during the capabilities exchange, which could be exploited by attackers to reload a vulnerable device, creating a denial of service condition.

Affected Products

Cisco IOS versions 11.0 through 12.4

Solution

Apply patches :
http://www.cisco.com/warp/public/707/cisco-sa-20070110-dlsw.shtml#software

References

http://www.frsirt.com/english/advisories/2007/0139
http://www.cisco.com/warp/public/707/cisco-sa-20070110-dlsw.shtml

Credits

Vulnerability reported by Martyn Ruks (MWR InfoSecurity)

Collapse -
Cisco Unified and IP Contact Center JTapi Gateway Remote Den

In reply to: VULNERABILITIES - January 11, 2007

Cisco Unified and IP Contact Center JTapi Gateway Remote Denial of Service Vulnerability

Advisory ID : FrSIRT/ADV-2007-0138
CVE ID : GENERIC-MAP-NOMATCH
Rated as : Low Risk
Remotely Exploitable : Yes
Locally Exploitable : Yes
Release Date : 2007-01-11

A vulnerability has been identified in Cisco Unified Contact Center and Cisco IP Contact Center, which could be exploited by attackers to cause a denial of service. This issue is due to an unspecified error in the JTapi Gateway process, which could be exploited by an attacker who has completed a 3-way TCP handshake to the JTapi server port to restart a vulnerable application, creating a denial of service condition.

Affected Products

Cisco Unified Contact Center Enterprise Edition
Cisco Unified Contact Center Hosted Edition
Cisco IP Contact Center Enterprise Edition
Cisco IP Contact Center Hosted Edition

Solution

Apply patches :
http://www.cisco.com/warp/public/707/cisco-sa-20070110-jtapi.shtml#software

References

http://www.frsirt.com/english/advisories/2007/0138
http://www.cisco.com/warp/public/707/cisco-sa-20070110-jtapi.shtml

Credits

Vulnerability reported by the vendor

Collapse -
Magic Photo Storage "_config[site_path]" Parameter Remote Fi

In reply to: VULNERABILITIES - January 11, 2007

Magic Photo Storage "_config[site_path]" Parameter Remote File Inclusion Vulnerability

Advisory ID : FrSIRT/ADV-2007-0136
CVE ID : GENERIC-MAP-NOMATCH
Rated as : High Risk
Remotely Exploitable : Yes
Locally Exploitable : Yes
Release Date : 2007-01-11

A vulnerability has been identified in Magic Photo Storage, which could be exploited by attackers to execute arbitrary commands. This issue is due to an input validation error in the "include/common_function.php" script that does not validate the "_config[site_path]" parameter, which could be exploited by remote attackers to include malicious PHP scripts and execute arbitrary commands with the privileges of the web server.

Affected Products

Magic Photo Storage

Solution

The FrSIRT is not aware of any official supplied patch for this issue.

References

http://www.frsirt.com/english/advisories/2007/0136

Credits

Vulnerability reported by k1tk4t

Collapse -
SuSE Security Update Fixes W3m "inputAnswer()" Remote Format

In reply to: VULNERABILITIES - January 11, 2007

SuSE Security Update Fixes W3m "inputAnswer()" Remote Format String Vulnerability

Advisory ID : FrSIRT/ADV-2007-0135
CVE ID : CVE-2006-6772
Rated as : Critical
Remotely Exploitable : Yes
Locally Exploitable : Yes
Release Date : 2007-01-11

uSE has released security updates to address a vulnerability identified in W3m. This issue could be exploited by attackers to execute arbitrary commands. For additional information, see : FrSIRT/ADV-2006-5164

Affected Products

Novell Linux Desktop 9
Novell Linux POS 9
Open Enterprise Server
openSUSE 10.2
SUSE LINUX 10.1
SUSE LINUX 10.0
SUSE LINUX 9.3
SuSE Linux Desktop 1.0
SuSE Linux Enterprise Server 8
SuSE Linux Openexchange Server 4
SUSE LINUX Retail Solution 8
SuSE Linux School Server
SuSE Linux Standard Server 8
SUSE SLED 10
SUSE SLES 10
SUSE SLES 9
UnitedLinux 1.0

Solution

Upgrade the affected packages :
ftp://ftp.suse.com/pub/suse/update/

References

http://www.frsirt.com/english/advisories/2007/0135
http://lists.suse.com/archive/suse-security-announce/2007-Jan/0005.html

Collapse -
Mandriva Security Update Fixes OpenOffice.org Multiple Code

In reply to: VULNERABILITIES - January 11, 2007

Mandriva Security Update Fixes OpenOffice.org Multiple Code Execution Vulnerabilities

Advisory ID : FrSIRT/ADV-2007-0134
CVE ID : CVE-2006-5870
Rated as : Critical
Remotely Exploitable : Yes
Locally Exploitable : Yes
Release Date : 2007-01-11

Mandriva has released security updates to address multiple vulnerabilities identified in OpenOffice.org. These issues could be exploited by attackers to execute arbitrary commands. For additional information, see : FrSIRT/ADV-2007-0031

Affected Products

Mandriva Linux 2007.0
Mandriva Corporate 3.0

Solution

Upgrade the affected packages

References

http://www.frsirt.com/english/advisories/2007/0134
http://archives.mandrivalinux.com/security-announce/2007-01/msg00009.php

Collapse -
Mandriva Security Update Fixes Kerberos "kadmind" Command Ex

In reply to: VULNERABILITIES - January 11, 2007

Mandriva Security Update Fixes Kerberos "kadmind" Command Execution Vulnerability

Advisory ID : FrSIRT/ADV-2007-0133
CVE ID : CVE-2006-6143
Rated as : Critical
Remotely Exploitable : Yes
Locally Exploitable : Yes
Release Date : 2007-01-11

Mandriva has released security updates to address a vulnerability identified in Kerberos. This issue could be exploited by attackers to compromise a vulnerable system. For additional information, see : FrSIRT/ADV-2007-0111

Affected Products

Mandriva Linux 2007.0
Mandriva Linux 2006.0
Mandriva Corporate 4.0

Solution

Upgrade the affected packages

References

http://www.frsirt.com/english/advisories/2007/0133
http://archives.mandrivalinux.com/security-announce/2007-01/msg00011.php

Collapse -
Mandriva Security Update Fixes Fixes NVIDIA Driver Command E

In reply to: VULNERABILITIES - January 11, 2007

Mandriva Security Update Fixes Fixes NVIDIA Driver Command Execution Vulnerability

Advisory ID : FrSIRT/ADV-2007-0132
CVE ID : CVE-2006-5379
Rated as : Critical
Remotely Exploitable : Yes
Locally Exploitable : Yes
Release Date : 2007-01-11

Mandriva has released security updates to address a vulnerability identified in the Nvidia Graphics Driver. This flaw could be exploited by attackers to compromise a vulnerable system. For additional information, see : FrSIRT/ADV-2006-4053

Affected Products

Mandriva Linux 2007.0

Solution

Upgrade the affected packages

References

http://www.frsirt.com/english/advisories/2007/0132
http://archives.mandrivalinux.com/security-announce/2007-01/msg00010.php

Collapse -
Mandriva Security Update Fixes KSirc "PRIVMSG" Remote Denial

In reply to: VULNERABILITIES - January 11, 2007

Mandriva Security Update Fixes KSirc "PRIVMSG" Remote Denial of Service Vulnerability

Advisory ID : FrSIRT/ADV-2007-0131
CVE ID : CVE-2006-6811
Rated as : Low Risk
Remotely Exploitable : Yes
Locally Exploitable : Yes
Release Date : 2007-01-11

Mandriva has released security updates to address a vulnerability identified in KsIRC. This issue could be exploited by remote attackers to cause a denial of service. For additional information, see : FrSIRT/ADV-2006-5199

Affected Products

Mandriva Linux 2007.0
Mandriva Corporate 3.0

Solution

Upgrade the affected packages

References

http://www.frsirt.com/english/advisories/2007/0131
http://archives.mandrivalinux.com/security-announce/2007-01/msg00012.php

Collapse -
Gentoo Security Update Fixes Mozilla SeaMonkey Multiple Code

In reply to: VULNERABILITIES - January 11, 2007

Gentoo Security Update Fixes Mozilla SeaMonkey Multiple Code Execution Vulnerabilities

Advisory ID : FrSIRT/ADV-2007-0130
CVE ID : CVE-2006-6497 - CVE-2006-6498 - CVE-2006-6501 - CVE-2006-6502 - CVE-2006-6503 - CVE-2006-6504 - CVE-2006-6505
Rated as : Critical
Remotely Exploitable : Yes
Locally Exploitable : Yes
Release Date : 2007-01-11

Gentoo has released security updates to address multiple vulnerabilities identified in Mozilla SeaMonkey. These issues could be exploited by remote attackers to execute arbitrary commands or bypass security restrictions. For additional information, see : FrSIRT/ADV-2006-5068

Affected Products

www-client/seamonkey versions prior to 1.0.7

Solution

Upgrade the affected package :
# emerge --sync
# emerge --ask --oneshot --verbose " >=www-client/seamonkey-1.0.7"

References

http://www.frsirt.com/english/advisories/2007/0130
http://www.gentoo.org/security/en/glsa/glsa-200701-04.xml

Collapse -
Redhat Security Update Fixes X.Org X11 Multiple Privilege Es

In reply to: VULNERABILITIES - January 11, 2007

Redhat Security Update Fixes X.Org X11 Multiple Privilege Escalation Vulnerabilities

Advisory ID : FrSIRT/ADV-2007-0128
CVE ID : CVE-2006-6101 - CVE-2006-6102 - CVE-2006-6103
Rated as : Moderate Risk
Remotely Exploitable : Yes
Locally Exploitable : Yes
Release Date : 2007-01-11

Redhat has released security updates to address multiple vulnerabilities identified in X.Org X11. These issues could be exploited by local attackers to obtain elevated privileges. For additional information, see : FrSIRT/ADV-2007-0108

Affected Products

Red Hat Desktop (v. 4)
Red Hat Enterprise Linux AS (v. 4)
Red Hat Enterprise Linux ES (v. 4)
Red Hat Enterprise Linux WS (v. 4)

Solution

Upgrade the affected packages :
http://rhn.redhat.com/

References

http://www.frsirt.com/english/advisories/2007/0128
http://rhn.redhat.com/errata/RHSA-2007-0003.html

Collapse -
Fedora Security Update Fixes X.Org X11 Multiple Privilege Es

In reply to: VULNERABILITIES - January 11, 2007

Fedora Security Update Fixes X.Org X11 Multiple Privilege Escalation Vulnerabilities

Advisory ID : FrSIRT/ADV-2007-0126
CVE ID : CVE-2006-6101 - CVE-2006-6102 - CVE-2006-6103
Rated as : Moderate Risk
Remotely Exploitable : Yes
Locally Exploitable : Yes
Release Date : 2007-01-11

Fedora has released security updates to address multiple vulnerabilities identified in X.Org X11. These issues could be exploited by local attackers to obtain elevated privileges. For additional information, see : FrSIRT/ADV-2007-0108

Affected Products

Fedora Core 6
Fedora Core 5

Solution

Upgrade the affected packages

References

http://www.frsirt.com/english/advisories/2007/0126
https://www.redhat.com/archives/fedora-package-announce/2007-January/msg00049.html
https://www.redhat.com/archives/fedora-package-announce/2007-January/msg00050.html

Collapse -
Red Hat update for libgsf

In reply to: VULNERABILITIES - January 11, 2007

TITLE:
Red Hat update for libgsf

SECUNIA ADVISORY ID:
SA23686

VERIFY ADVISORY:
http://secunia.com/advisories/23686/

CRITICAL:
Moderately critical

IMPACT:
System access

WHERE:
From remote

OPERATING SYSTEM:
RedHat Enterprise Linux AS 3
http://secunia.com/product/2534/
RedHat Enterprise Linux AS 4
http://secunia.com/product/4669/
RedHat Enterprise Linux ES 3
http://secunia.com/product/2535/
RedHat Enterprise Linux ES 4
http://secunia.com/product/4668/
RedHat Enterprise Linux WS 3
http://secunia.com/product/2536/
RedHat Enterprise Linux WS 4
http://secunia.com/product/4670/

DESCRIPTION:
Red Hat has issued an update for libgsf. This fixes a vulnerability,
which can be exploited by malicious people to compromise an
application using the library.

For more information:
SA23164

SOLUTION:
Updated packages are available from Red Hat Network:
http://rhn.redhat.com

ORIGINAL ADVISORY:
http://rhn.redhat.com/errata/RHSA-2007-0011.html

OTHER REFERENCES:
SA23164:
http://secunia.com/advisories/23164/

Collapse -
Astaro update for ClamAV

In reply to: VULNERABILITIES - January 11, 2007

TITLE:
Astaro update for ClamAV

SECUNIA ADVISORY ID:
SA23719

VERIFY ADVISORY:
http://secunia.com/advisories/23719/

CRITICAL:
Highly critical

IMPACT:
DoS, System access

WHERE:
From remote

OPERATING SYSTEM:
Astaro Security Linux 6.x
http://secunia.com/product/5625/

DESCRIPTION:
Astaro has issued an update for ClamAV. This fixes some
vulnerabilities, which potentially can be exploited by malicious
people to cause a DoS (Denial of Service) or compromise a vulnerable
system.

For more information:
SA19534

SOLUTION:
Apply Up2Date package 6.202.

ORIGINAL ADVISORY:
http://up2date.astaro.com/2006/05/low_up2date_6202.html

OTHER REFERENCES:
SA19534:
http://secunia.com/advisories/19534/

Collapse -
Red Hat update for acroread

In reply to: VULNERABILITIES - January 11, 2007

TITLE:
Red Hat update for acroread

SECUNIA ADVISORY ID:
SA23691

VERIFY ADVISORY:
http://secunia.com/advisories/23691/

CRITICAL:
Highly critical

IMPACT:
Hijacking, Cross Site Scripting, DoS, System access

WHERE:
From remote

SOFTWARE:
Red Hat Enterprise Linux Extras v. 4
http://secunia.com/product/8743/

DESCRIPTION:
Red Hat has issued an update for acroread. This fixes some
vulnerabilities, which can be exploited by malicious people to
conduct cross-site scripting attacks, as a vector for conducting
cross-site request forgery attacks, or potentially compromise a
user's system.

For more information:
SA23483
SA23666

SOLUTION:
Updated packages are available from Red Hat Network:
http://rhn.redhat.com

ORIGINAL ADVISORY:
https://rhn.redhat.com/errata/RHSA-2007-0017.html

OTHER REFERENCES:
SA23483:
http://secunia.com/advisories/23483/

SA23666:
http://secunia.com/advisories/23666/

Collapse -
Mandriva update for krb5

In reply to: VULNERABILITIES - January 11, 2007

TITLE:
Mandriva update for krb5

SECUNIA ADVISORY ID:
SA23667

VERIFY ADVISORY:
http://secunia.com/advisories/23667/

CRITICAL:
Highly critical

IMPACT:
DoS, System access

WHERE:
From remote

OPERATING SYSTEM:
Mandriva Linux 2007
http://secunia.com/product/12165/
Mandriva Linux 2006
http://secunia.com/product/9020/

DESCRIPTION:
Mandriva has issued an update for krb5. This fixes a vulnerability,
which can potentially be exploited by malicious people to cause a DoS
(Denial of Service) or to compromise a vulnerable system.

For more information:
SA23696

SOLUTION:
Apply updated packages.

ORIGINAL ADVISORY:
http://www.mandriva.com/security/advisories?name=MDKSA-2007:008

OTHER REFERENCES:
SA23696:
http://secunia.com/advisories/23696/

Collapse -
Novell BorderManager Client Firewall Application Window Priv

In reply to: VULNERABILITIES - January 11, 2007

Advisory ID : FrSIRT/ADV-2007-0144
CVE ID : CVE-2006-3697
Rated as : Moderate Risk
Remotely Exploitable : No
Locally Exploitable : Yes
Release Date : 2007-01-11

A vulnerability has been identified in Novell BorderManager Client Firewall, which could be exploited by local attackers to obtain elevated privileges. This issue was initially discovered in Outpost Firewall, which Novell Client Firewall is based on. For additional information, see : FrSIRT/ADV-2006-2852

Affected Products

Novell BorderManager Client Firewall version 2.0 Build 0727 and prior
Novell BorderManager version 3.7
Novell BorderManager version 3.8

Solution

The vendors recommends disabling the Drag and drop or copy and paste files option in Windows :
http://support.microsoft.com/kb/888534

The FrSIRT is not aware of any official supplied patch for this issue.

References

http://www.frsirt.com/english/advisories/2007/0144
https://secure-support.novell.com/KanisaPlatform/Publishing/903/3762108_f.SAL_Public.html

Collapse -
Redhat Security Update Fixes GNOME Structured File Library B

In reply to: VULNERABILITIES - January 11, 2007

Redhat Security Update Fixes GNOME Structured File Library Buffer Overflow Vulnerability

Advisory ID : FrSIRT/ADV-2007-0145
CVE ID : CVE-2006-4514
Rated as : Moderate Risk
Remotely Exploitable : Yes
Locally Exploitable : Yes
Release Date : 2007-01-11

Redhat has released updated packages to address a vulnerability identified in libgsf. This flaw could be exploited by attackers to execute arbitrary commands. For additional information, see : FrSIRT/ADV-2006-4784

Affected Products

Red Hat Desktop (v. 3)
Red Hat Desktop (v. 4)
Red Hat Enterprise Linux AS (v. 3)
Red Hat Enterprise Linux AS (v. 4)
Red Hat Enterprise Linux ES (v. 3)
Red Hat Enterprise Linux ES (v. 4)
Red Hat Enterprise Linux WS (v. 3)
Red Hat Enterprise Linux WS (v. 4)

Solution

Upgrade the affected packages :
http://rhn.redhat.com/

References

http://www.frsirt.com/english/advisories/2007/0145
http://rhn.redhat.com/errata/RHSA-2007-0011.html

Collapse -
Mandriva update for OpenOffice.org

In reply to: VULNERABILITIES - January 11, 2007

TITLE:
Mandriva update for OpenOffice.org

SECUNIA ADVISORY ID:
SA23712

VERIFY ADVISORY:
http://secunia.com/advisories/23712/

CRITICAL:
Highly critical

IMPACT:
System access

WHERE:
From remote

OPERATING SYSTEM:
Mandriva Linux 2007
http://secunia.com/product/12165/

DESCRIPTION:
Mandriva has issued an update for OpenOffice.org. This fixes some
vulnerabilities, which can be exploited by malicious people to
compromise a user's system.

For more information:
SA23612

SOLUTION:
Apply updated packages.

ORIGINAL ADVISORY:
http://www.mandriva.com/security/advisories?name=MDKSA-2007:006

OTHER REFERENCES:
SA23612:
http://secunia.com/advisories/23612/

Collapse -
Linux Kernel Local Denial of Service Vulnerabilities

In reply to: VULNERABILITIES - January 11, 2007

TITLE:
Linux Kernel Local Denial of Service Vulnerabilities

SECUNIA ADVISORY ID:
SA23664

VERIFY ADVISORY:
http://secunia.com/advisories/23664/

CRITICAL:
Not critical

IMPACT:
DoS

WHERE:
Local system

OPERATING SYSTEM:
Linux Kernel 2.6.x
http://secunia.com/product/2719/

DESCRIPTION:
Some vulnerabilities have been reported in the Linux Kernel, which
can be exploited by malicious, local users to cause a DoS (Denial of
Service).

1) An error exists within the handling of locking semaphores in
"mincore()". This can be exploited to cause a deadlock by using the
function on unmapped pages.

2) An error exists within the "zlib_inflate()" function when
processing certain data streams. This can be exploited to corrupt
memory by e.g. mounting a specially crafted cramfs image and
performing a read operation on the mounted file system.

3) The Kernel fails to handle corrupted data structures in the Ext2
file system correctly. This can be exploited to crash the system by
mounting and reading a specially crafted file system image.

The vulnerabilities are reported in versions prior to 2.6.19.2.

SOLUTION:
Update to version 2.6.19.2.

PROVIDED AND/OR DISCOVERED BY:
1) Doug Chapman
2, 3) LMH

ORIGINAL ADVISORY:
http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.19.2

http://projects.info-pull.com/mokb/MOKB-07-11-2006.html
http://projects.info-pull.com/mokb/MOKB-12-11-2006.html

Popular Forums

icon
Computer Newbies 10,686 discussions
icon
Computer Help 54,365 discussions
icon
Laptops 21,181 discussions
icon
Networking & Wireless 16,313 discussions
icon
Phones 17,137 discussions
icon
Security 31,287 discussions
icon
TVs & Home Theaters 22,101 discussions
icon
Windows 7 8,164 discussions
icon
Windows 10 2,657 discussions

SMART HOME

This one tip will help you sleep better tonight

A few seconds are all you need to get a better night's rest.