Spyware, Viruses, & Security forum

General discussion

VULNERABILITIES - November 20, 2006

by Marianna Schmudlach / November 20, 2006 12:03 AM PST

- Apple Remote Desktop 3.1 update -
Oxygen3 24h-365d, by Panda Software (http://www.pandasoftware.com)

Madrid, November 20, 2006 - Apple has released a security update for Apple Remote Desktop to correct a vulnerability that could be exploited by local users.

The problem lies in the default permissions in the built-in packages used to install and upgrade client systems. The permissions on these packages could allow them to be altered by local users on Apple Remote Desktop admin systems.

This could allow an attacker to execute arbitrary commands with root privileges on client systems when Apple Remote Desktop client software is installed or upgraded. The Apple update corrects the problem by applying more restrictive permissions on the built-in installation packages.

More details are available at: http://docs.info.apple.com/article.html?artnum=304824

Discussion is locked
You are posting a reply to: VULNERABILITIES - November 20, 2006
The posting of advertisements, profanity, or personal attacks is prohibited. Please refer to our CNET Forums policies for details. All submitted content is subject to our Terms of Use.
Track this discussion and email me when there are updates

If you're asking for technical help, please be sure to include all your system info, including operating system, model number, and any other specifics related to the problem. Also please exercise your best judgment when posting in the forums--revealing personal information such as your e-mail address, telephone number, and address is not recommended.

You are reporting the following post: VULNERABILITIES - November 20, 2006
This post has been flagged and will be reviewed by our staff. Thank you for helping us maintain CNET's great community.
Sorry, there was a problem flagging this post. Please try again now or at a later time.
If you believe this post is offensive or violates the CNET Forums' Usage policies, you can report it below (this will not automatically remove the post). Once reported, our moderators will be notified and the post will be reviewed.
Collapse -
Fedora Core minix File System Denial of Service Vulnerabilit
by Marianna Schmudlach / November 20, 2006 12:05 AM PST

TITLE:
Fedora Core minix File System Denial of Service Vulnerability

SECUNIA ADVISORY ID:
SA23034

VERIFY ADVISORY:
http://secunia.com/advisories/23034/

CRITICAL:
Not critical

IMPACT:
DoS

WHERE:
Local system

OPERATING SYSTEM:
Fedora Core 6
http://secunia.com/product/12487/

DESCRIPTION:
LMH has reported a vulnerability in Fedora Core, which can be
exploited by malicious, local users to cause a DoS (Denial of
Service).

The vulnerability is caused due to improper handling of corrupted
data structures in the minix file system. This can be exploited to
crash a system by mounting a specially crafted image.

The vulnerability is reported in Fedora Core 6. Other versions may
also be affected.

SOLUTION:
Allow only trusted users to mount images and do not mount untrusted
images.

PROVIDED AND/OR DISCOVERED BY:
LMH

ORIGINAL ADVISORY:
http://projects.info-pull.com/mokb/MOKB-17-11-2006.html

----------------------------------------------------------------------

Collapse -
vBulletin "prefs" / "navprefs" Cross-Site Scripting Vulnerab
by Marianna Schmudlach / November 20, 2006 12:07 AM PST

TITLE:
vBulletin "prefs" / "navprefs" Cross-Site Scripting Vulnerabilities

SECUNIA ADVISORY ID:
SA23011

VERIFY ADVISORY:
http://secunia.com/advisories/23011/

CRITICAL:
Less critical

IMPACT:
Cross Site Scripting

WHERE:
From remote

SOFTWARE:
vBulletin 3.x
http://secunia.com/product/3212/

DESCRIPTION:
insanity has reported two vulnerabilities in vBulletin, which can be
exploited by malicious people to conduct cross-site scripting
attacks.

Input passed to the "prefs" and "navprefs" parameters in
admincp/index.php is not properly sanitised before being returned to
the user. This can be exploited to execute arbitrary HTML and script
code in an administrative user's browser session in context of an
affected site.

SOLUTION:
The vendor recommends administrative users to not follow links from
untrusted sources.

PROVIDED AND/OR DISCOVERED BY:
insanity

----------------------------------------------------------------------

Collapse -
NetGear MA521 Wireless Driver Long Rates Memory Corruption
by Marianna Schmudlach / November 20, 2006 12:09 AM PST

TITLE:
NetGear MA521 Wireless Driver Long Rates Memory Corruption

SECUNIA ADVISORY ID:
SA23036

VERIFY ADVISORY:
http://secunia.com/advisories/23036/

CRITICAL:
Moderately critical

IMPACT:
System access

WHERE:
From remote

SOFTWARE:
NetGear MA521 802.11b Wireless PC Card 5.x
http://secunia.com/product/12673/

DESCRIPTION:
Laurent Butti has reported a vulnerability in NetGear MA521 Wireless
driver, which can be exploited by malicious people to compromise a
vulnerable system.

The vulnerability is caused due to an error in the MA521nd5.SYS
device driver when handling beacon or probe response frames
containing an invalid supported rates information element. This can
be exploited to cause a memory corruption via a specially crafted
packet when the driver is running in active scanning mode.

Successful exploitation may allow execution of arbitrary code.

The vulnerability is reported in version 5.148.724.2003. Other
versions may also be affected.

SOLUTION:
Turn off the wireless card when not in use.

PROVIDED AND/OR DISCOVERED BY:
Laurent Butti

ORIGINAL ADVISORY:
http://projects.info-pull.com/mokb/MOKB-18-11-2006.html

----------------------------------------------------------------------

Collapse -
Mandriva update for xorg-x11
by Marianna Schmudlach / November 20, 2006 12:10 AM PST

TITLE:
Mandriva update for xorg-x11

SECUNIA ADVISORY ID:
SA23033

VERIFY ADVISORY:
http://secunia.com/advisories/23033/

CRITICAL:
Less critical

IMPACT:
Privilege escalation

WHERE:
Local system

OPERATING SYSTEM:
Mandriva Linux 2007
http://secunia.com/product/12165/

DESCRIPTION:
Mandriva has issued an update for xorg-x11. This fixes some
vulnerabilities, which can be exploited by malicious, local users to
gain escalated privileges.

For more information:
SA21864

SOLUTION:
Apply updated packages

ORIGINAL ADVISORY:
http://www.mandriva.com/security/advisories?name=MDKSA-2006:164-1

OTHER REFERENCES:
SA21864:
http://secunia.com/advisories/21864/

Collapse -
Mandriva update for bind
by Marianna Schmudlach / November 20, 2006 12:11 AM PST

TITLE:
Mandriva update for bind

SECUNIA ADVISORY ID:
SA22948

VERIFY ADVISORY:
http://secunia.com/advisories/22948/

CRITICAL:
Moderately critical

IMPACT:
Security Bypass, DoS

WHERE:
From remote

OPERATING SYSTEM:
Mandriva Linux 2007
http://secunia.com/product/12165/
Mandriva Linux 2006
http://secunia.com/product/9020/

DESCRIPTION:
Mandriva has issued an update for bind. This fixes some
vulnerabilities, which can be exploited by malicious people to bypass
certain security restrictions or cause a DoS (Denial of Service).

For more information:
SA22671

SOLUTION:
Apply updated packages.

ORIGINAL ADVISORY:
http://www.mandriva.com/security/advisories?name=MDKSA-2006:207

OTHER REFERENCES:
SA22671:
http://secunia.com/advisories/22671/

Collapse -
Ubuntu update for libpng
by Marianna Schmudlach / November 20, 2006 12:12 AM PST

TITLE:
Ubuntu update for libpng

SECUNIA ADVISORY ID:
SA22951

VERIFY ADVISORY:
http://secunia.com/advisories/22951/

CRITICAL:
Less critical

IMPACT:
DoS

WHERE:
From remote

OPERATING SYSTEM:
Ubuntu Linux 5.10
http://secunia.com/product/6606/
Ubuntu Linux 6.06
http://secunia.com/product/10611/
Ubuntu Linux 6.10
http://secunia.com/product/12470/

DESCRIPTION:
Ubuntu has issued an update for libpng. This fixes a vulnerability,
which can be exploited by malicious people to cause a DoS (Denial of
Service).

For more information:
SA22900

SOLUTION:
Apply updated packages.

ORIGINAL ADVISORY:
http://www.ubuntu.com/usn/usn-383-1

OTHER REFERENCES:
SA22900:
http://secunia.com/advisories/22900/

Collapse -
Mandriva update for openldap
by Marianna Schmudlach / November 20, 2006 12:14 AM PST

TITLE:
Mandriva update for openldap

SECUNIA ADVISORY ID:
SA22953

VERIFY ADVISORY:
http://secunia.com/advisories/22953/

CRITICAL:
Moderately critical

IMPACT:
DoS

WHERE:
From remote

OPERATING SYSTEM:
Mandriva Linux 2007
http://secunia.com/product/12165/
Mandriva Linux 2006
http://secunia.com/product/9020/

DESCRIPTION:
Mandriva has issued an update for openldap. This fixes a
vulnerability, which can be exploited by malicious people to cause a
DoS (Denial of Service).

For more information:
SA22750

SOLUTION:
Apply updated packages.

ORIGINAL ADVISORY:
http://www.mandriva.com/security/advisories?name=MDKSA-2006:208

OTHER REFERENCES:
SA22750:
http://secunia.com/advisories/22750/

Collapse -
SUSE Update for Multiple Packages
by Marianna Schmudlach / November 20, 2006 12:16 AM PST

TITLE:
SUSE Update for Multiple Packages

SECUNIA ADVISORY ID:
SA22932

VERIFY ADVISORY:
http://secunia.com/advisories/22932/

CRITICAL:
Highly critical

IMPACT:
Security Bypass, DoS, System access

WHERE:
From remote

OPERATING SYSTEM:
SUSE Linux 10
http://secunia.com/product/6221/
SUSE Linux 10.1
http://secunia.com/product/10796/
SUSE Linux 9.3
http://secunia.com/product/4933/
SUSE Linux 9.2
http://secunia.com/product/4258/
SUSE Linux Enterprise Server 10
http://secunia.com/product/12192/
SuSE Linux Enterprise Server 7
http://secunia.com/product/1170/
SuSE Linux Enterprise Server 8
http://secunia.com/product/1171/
SUSE Linux Enterprise Server 9
http://secunia.com/product/4118/
SuSE Linux Firewall on CD/Admin host
http://secunia.com/product/1179/
SuSE Linux Office Server
http://secunia.com/product/1172/
SuSE Linux Openexchange Server 4.x
http://secunia.com/product/2001/
SuSE Linux Standard Server 8
http://secunia.com/product/2526/
SuSE eMail Server 3.x
http://secunia.com/product/1168/

DESCRIPTION:
SUSE has issued an update for multiple packages. This fixes some
vulnerabilities, which can be exploited by malicious, local users to
bypass certain security restrictions, and by malicious people to
cause a DoS (Denial of Service), bypass certain security
restrictions, and compromise a vulnerable system.

For more information:
SA13123
SA19241
SA20188
SA22671
SA22732
SA22771
SA22787
SA22807

SOLUTION:
Apply updated packages.

Updated packages are available via YaST Online Update or via the SUSE
FTP site.

ORIGINAL ADVISORY:
http://lists.suse.com/archive/suse-security-announce/2006-Nov/0008.html

Collapse -
IBM OS/400 osp-cert ASN.1 Vulnerabilities
by Marianna Schmudlach / November 20, 2006 2:43 AM PST

TITLE:
IBM OS/400 osp-cert ASN.1 Vulnerabilities

SECUNIA ADVISORY ID:
SA22978

VERIFY ADVISORY:
http://secunia.com/advisories/22978/

CRITICAL:
Moderately critical

IMPACT:
Unknown

WHERE:
From remote

OPERATING SYSTEM:
OS/400 5.x
http://secunia.com/product/212/

DESCRIPTION:
Some vulnerabilities with unknown impacts have been reported in
OS/400.

The vulnerabilities are caused due to unspecified errors in the ASN.1
parsing.

SOLUTION:
A PTF is reportedly available.

PROVIDED AND/OR DISCOVERED BY:
Reported by the vendor.

ORIGINAL ADVISORY:
IBM:
http://www-1.ibm.com/support/docview.wss?uid=nas38b2ee8e7abe99d0b86256eb600477b8c

----------------------------------------------------------------------

Collapse -
IBM WebSphere Application Server Multiple Vulnerabilities
by Marianna Schmudlach / November 20, 2006 2:45 AM PST

TITLE:
IBM WebSphere Application Server Multiple Vulnerabilities

SECUNIA ADVISORY ID:
SA23028

VERIFY ADVISORY:
http://secunia.com/advisories/23028/

CRITICAL:
Moderately critical

IMPACT:
Unknown, Security Bypass, DoS, System access

WHERE:
From remote

SOFTWARE:
IBM WebSphere Application Server 6.1.x
http://secunia.com/product/11363/

DESCRIPTION:
Some vulnerabilities have been reported in IBM WebSphere Application
Server, where some have unknown impacts and others can be exploited
by malicious users to bypass certain security restrictions, and by
malicious people to potentially compromise a vulnerable system.

1) An off-by-one error in mod_rewrite within the ldap scheme handling
can be exploited to cause a one-byte buffer overflow.

For more information:
SA21197

2) An unspecified vulnerability with an unknown impact exists.

3) During the registering of response operations, Eal4 authentication
checks are not performed as one of the first actions.

4) Every user is authorized for "handleservantnotification" on Z/Os.

SOLUTION:
Apply Fix Pack 3 (6.1.0.3).
http://www.ibm.com/support/docview.wss?rs=180&uid=swg24013830

PROVIDED AND/OR DISCOVERED BY:
Reported by the vendor.

ORIGINAL ADVISORY:
http://www-1.ibm.com/support/docview.wss?uid=swg27007951

OTHER REFERENCES:
SA21197:
http://secunia.com/advisories/21197/

----------------------------------------------------------------------

Popular Forums
icon
Computer Newbies 10,686 discussions
icon
Computer Help 54,365 discussions
icon
Laptops 21,181 discussions
icon
Networking & Wireless 16,313 discussions
icon
Phones 17,137 discussions
icon
Security 31,287 discussions
icon
TVs & Home Theaters 22,101 discussions
icon
Windows 7 8,164 discussions
icon
Windows 10 2,657 discussions

CNET FORUMS TOP DISCUSSION

Help, my PC with Windows 10 won't shut down properly

Since upgrading to Windows 10 my computer won't shut down properly. I use the menu button shutdown and the screen goes blank, but the system does not fully shut down. The only way to get it to shut down is to hold the physical power button down till it shuts down. Any suggestions?