VARIoT IoT vulnerabilities database
| VAR-200902-0500 | CVE-2009-0216 | ge_fanuc ifix Bypass access restriction vulnerability |
CVSS V2: 10.0 CVSS V3: - Severity: HIGH |
GE Fanuc iFIX 5.0 and earlier relies on client-side authentication involving a weakly encrypted local password file, which allows remote attackers to bypass intended access restrictions and start privileged server login sessions by recovering a password or by using a modified program module. Vulnerabilities in the way GE Fanuc iFIX handles authentication could allow a remote attacker to log on to the system with elevated privileges. Microsoft Windows fails to properly handle the NoDriveTypeAutoRun registry value, which may prevent Windows from effectively disabling AutoRun and AutoPlay features. GE Fanuc iFIX Is Human Machine Interface With components, Microsoft Windows CE , NT , 2000 , Server 2003 , XP and Vista Work on SCADA client / Server software. iFIX Vulnerabilities exist in authentication. The user name and password are stored in a local file on the client side, and the password is encrypted with a low-strength algorithm. GE Fanuc according to: Attackers can gain copies of this file in two ways. The first way requires that an attacker have an interactive session with the computer containing the file, such as a direct login, or through a remote terminal session, VNC, or some other remote session providing access to a command shell. Using the shell, the attacker can simply copy the file and extract the passwords at some later point. Another way an attacker can gain access to this file is by intercepting the file over the network. This can occur if the file is shared between two computers using Microsoft WindowsR network sharing. In this case, an attacker may be able to recreate the file by using a network sniffer to monitor network traffic between them. iFIX Since authentication is performed within the client, an attacker could tamper and replace the authentication module. GE Fanuc according to: Authentication and authorization of users are implemented through certain program modules. These modules can be modified at the binary level to bypass user authentication. To exploit this type of attack, an attacker needs to be able to launch unauthorized applications from an interactive shell. Also, iFIX Is Technical Cyber Security Alert TA09-020A Published on “Microsoft Windows Notes on disabling the auto-execution function ” There is a possibility of being affected. Any code executed using the auto-execution function iFIX Enviroment Protection May result in the authentication module being tampered with and replaced.An attacker could gain access to a file containing authentication information or intercept network traffic. As a result, by the attacker iFIX Unauthorized access to the system is possible.
GE Fanuc iFIX 5.0 are earlier are vulnerable.
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
National Cyber Alert System
Technical Cyber Security Alert TA09-020A
Microsoft Windows Does Not Disable AutoRun Properly
Original release date: January 20, 2009
Last revised: --
Source: US-CERT
Systems Affected
* Microsoft Windows
Overview
Disabling AutoRun on Microsoft Windows systems can help prevent the
spread of malicious code. However, Microsoft's guidelines for
disabling AutoRun are not fully effective, which could be
considered a vulnerability.
I. Description
Microsoft Windows includes an AutoRun feature, which can
automatically run code when removable devices are connected to the
computer. AutoRun (and the closely related AutoPlay) can
unexpectedly cause arbitrary code execution in the following
situations:
* A removable device is connected to a computer. This includes, but
is not limited to, inserting a CD or DVD, connecting a USB or
Firewire device, or mapping a network drive. This connection can
result in code execution without any additional user interaction.
* A user clicks the drive icon for a removable device in Windows
Explorer. Rather than exploring the drive's contents, this action
can cause code execution.
* The user selects an option from the AutoPlay dialog that is
displayed when a removable device is connected. Malicious
software, such as W32.Downadup, is using AutoRun to
spread. Disabling AutoRun, as specified in the CERT/CC
Vulnerability Analysis blog, is an effective way of helping to
prevent the spread of malicious code. It will, however, disable Media
Change Notification (MCN) messages, which may prevent Windows from
detecting when a CD or DVD is changed.
II. Impact
By placing an Autorun.inf file on a device, an attacker may be able
to automatically execute arbitrary code when the device is
connected to a Windows system. Code execution may also take place
when the user attempts to browse to the software location with
Windows Explorer.
III. We recommend
restarting Windows after making the registry change so that any
cached mount points are reinitialized in a way that ignores the
Autorun.inf file. Alternatively, the following registry key may be
deleted:
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2
Once these changes have been made, all of the AutoRun code
execution scenarios described above will be mitigated because
Windows will no longer parse Autorun.inf files to determine which
actions to take. Further details are available in the
CERT/CC Vulnerability Analysis blog. Thanks to Nick Brown and Emin
Atac for providing the workaround.
IV. References
* The Dangers of Windows AutoRun -
<http://www.cert.org/blogs/vuls/2008/04/the_dangers_of_windows_autorun.html>
* US-CERT Vulnerability Note VU#889747 -
<http://www.kb.cert.org/vuls/id/889747>
* Nick Brown's blog: Memory stick worms -
<http://nick.brown.free.fr/blog/2007/10/memory-stick-worms>
* TR08-004 Disabling Autorun -
<http://www.publicsafety.gc.ca/prg/em/ccirc/2008/tr08-004-eng.aspx>
* How to Enable or Disable Automatically Running CD-ROMs -
<http://support.microsoft.com/kb/155217>
* NoDriveTypeAutoRun -
<http://www.microsoft.com/technet/prodtechnol/windows2000serv/reskit/regentry/91525.mspx>
* Autorun.inf Entries -
<http://msdn.microsoft.com/en-us/library/bb776823(VS.85).aspx>
* W32.Downadup -
<http://www.symantec.com/security_response/writeup.jsp?docid=2008-112203-2408-99>
* MS08-067 Worm, Downadup/Conflicker -
<http://www.f-secure.com/weblog/archives/00001576.html>
* Social Engineering Autoplay and Windows 7 -
<http://www.f-secure.com/weblog/archives/00001586.html>
____________________________________________________________________
The most recent version of this document can be found at:
<http://www.us-cert.gov/cas/techalerts/TA09-020A.html>
____________________________________________________________________
Feedback can be directed to US-CERT Technical Staff. Please send
email to <cert@cert.org> with "TA09-020A Feedback VU#889747" in
the subject.
____________________________________________________________________
For instructions on subscribing to or unsubscribing from this
mailing list, visit <http://www.us-cert.gov/cas/signup.html>.
____________________________________________________________________
Produced 2009 by US-CERT, a government organization.
Terms of use:
<http://www.us-cert.gov/legal.html>
____________________________________________________________________
Revision History
January 20, 2009: Initial release
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.5 (GNU/Linux)
iQEVAwUBSXYqQnIHljM+H4irAQL9EAgAwE5XWd+83CTwTl1vAbDW3sNfCaucmj79
VmXJ+GktQorbcp29fktYaQxXZ2A6qBREJ1FfwlM5BT0WftvGppLoQcQO3vbbwEQF
M0VG5xZhTOi8tf4nedBDgDj0ENJBgh6C73G5uZfVatQdFi79TFkf9SVe6xn5BkQm
5kKsly0d/CX/te15zZLd05AJVEVilbZcECUeDVAYDvWcQSkx2OsJFb+WkuWI9Loh
zkB7uOeZFY9bgrC04nr9DPHpaPFd8KCXegsxjqN1nIraaCabfvNamriqyUFHwAhK
sk/DFSjdI6xJ4fXjDQ77wfgLYyTeYQ/b2U/1sqkbOTdCgXqSop5RrA==
=6/cp
-----END PGP SIGNATURE-----
. ----------------------------------------------------------------------
A new version (0.9.0.0 - Release Candidate 1) of the free Secunia PSI
has been released. The new version includes many new and advanced
features, which makes it even easier to stay patched.
Download and test it today:
https://psi.secunia.com/
Read more about this new version:
https://psi.secunia.com/?page=changelog
----------------------------------------------------------------------
TITLE:
Windows Vista "NoDriveTypeAutoRun" Security Issue
SECUNIA ADVISORY ID:
SA29458
VERIFY ADVISORY:
http://secunia.com/advisories/29458/
CRITICAL:
Not critical
IMPACT:
Security Bypass
WHERE:
Local system
OPERATING SYSTEM:
Microsoft Windows Vista
http://secunia.com/product/13223/
DESCRIPTION:
CERT/CC has reported a security issue in Windows Vista, which can be
exploited by malicious people to bypass certain security settings.
AutoPlay is a feature designed to immediately begin reading from a
drive (e.g. run a setup file) when a media is inserted.
Successful exploitation may result in execution of arbitrary code,
but requires physical access to a vulnerable system or that a user is
tricked into inserting a malicious media (e.g. USB device).
SOLUTION:
Restrict access to affected systems.
Do not insert any untrusted media even with the registry key value
set to disable AutoPlay for all drives.
PROVIDED AND/OR DISCOVERED BY:
Will Dormann and Jeff Gennari, CERT/CC.
ORIGINAL ADVISORY:
US-CERT VU#889747:
http://www.kb.cert.org/vuls/id/889747
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------
Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
----------------------------------------------------------------------
. This can be exploited
to gain knowledge of user names and passwords by obtaining (e.g. by modifying certain used modules.
3) It is possible to bypass the run-time Environment Protection via
the Autoplay feature by attaching an external storage device
containing an automatically launched script. Use in a
trusted network environment only. Description
The presence of a Conficker infection may be detected if a user is
unable to surf to the following websites:
* http://www.symantec.com/norton/theme.jsp?themeid=conficker_worm&inid=us_ghp_link_conficker_worm
* http://www.mcafee.com
If a user is unable to reach either of these websites, a Conficker
infection may be indicated (the most current variant of Conficker
interferes with queries for these sites, preventing a user from
visiting them). If a Conficker infection is suspected, the
infected system should be removed from the network. Major
anti-virus vendors and Microsoft have released several free tools
that can verify the presence of a Conficker infection and remove
the worm. Instructions for manually removing a Conficker infection
from a system have been published by Microsoft in
http://support.microsoft.com/kb/962007. Solution
US-CERT encourages users to prevent a Conficker infection by
ensuring all systems have the MS08-067 patch (part of Security
Update KB958644, which was published by Miscrosoft in October
2008), disabling AutoRun functionality (see
http://www.us-cert.gov/cas/techalerts/TA09-020A.html), and
maintaining up-to-date anti-virus software
| VAR-200803-0231 | CVE-2008-1012 | Apple AirPort Extreme Base Station AFP Request Denial of Service Vulnerability |
CVSS V2: 4.3 CVSS V3: - Severity: MEDIUM |
Unspecified vulnerability in Apple AirPort Extreme Base Station Firmware 7.3.1 allows remote attackers to cause a denial of service (file sharing hang) via a crafted AFP request, related to "input validation.". Apple AirPort Extreme Base Station is a small wireless access solution.
Apple AirPort Extreme Base Station has a vulnerability in processing malformed requests. If a special AFP request is sent to the device, file sharing will become unresponsive.
AirPort Extreme running firmware versions prior to 7.3.1 are affected. ----------------------------------------------------------------------
A new version (0.9.0.0 - Release Candidate 1) of the free Secunia PSI
has been released. The new version includes many new and advanced
features, which makes it even easier to stay patched.
SOLUTION:
Update to one of the following firmware versions:
* AirPort Extreme with 802.11n (Fast Ethernet) 7.3.1
* AirPort Extreme with 802.11n (Gigabit Ethernet) 7.3.1
PROVIDED AND/OR DISCOVERED BY:
The vendor credits Alex deVries.
ORIGINAL ADVISORY:
Apple:
http://support.apple.com/kb/HT1226
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------
Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
----------------------------------------------------------------------
| VAR-200803-0027 | CVE-2008-0062 | MIT Kerberos krb4-enabled KDC contains multiple vulnerabilities |
CVSS V2: 9.3 CVSS V3: 9.8 Severity: CRITICAL |
KDC in MIT Kerberos 5 (krb5kdc) does not set a global variable for some krb4 message types, which allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via crafted messages that trigger a NULL pointer dereference or double-free. Vulnerabilities in the MIT Kerberos Key Distribution Center server could allow a remote attacker to compromise the key database, gain access to sensitive information, or cause a denial of service. It adopts a client/server structure, and both the client and the server can authenticate each other (that is, double verification), which can prevent eavesdropping and replay attack, etc. MIT Kerberos 5 (also known as krb5) is a set of network authentication protocols developed by the Massachusetts Institute of Technology (MIT). ), which can prevent eavesdropping, prevent replay attacks, etc. If the KDC receives a malformed Kerberos 4 message, and there was no previous Kerberos 4 communication, a null pointer dereference will be triggered, causing the KDC to crash. If there is valid Kerberos 4 communication, messages sent to the client are locked using a null pointer; the pointer may resend a previously generated response, send some arbitrary block of process memory (which may contain key data), or due to an attempt to Accessing an invalid address crashes the process. If the process does not crash, a random address is passed to free(), which may corrupt the release pool, causing a crash, data corruption, or a jump to an arbitrary address in process memory. ===========================================================
Ubuntu Security Notice USN-587-1 March 19, 2008
krb5 vulnerabilities
CVE-2008-0062, CVE-2008-0063, CVE-2008-0947
===========================================================
A security issue affects the following Ubuntu releases:
Ubuntu 6.06 LTS
Ubuntu 6.10
Ubuntu 7.04
Ubuntu 7.10
This advisory also applies to the corresponding versions of
Kubuntu, Edubuntu, and Xubuntu.
The problem can be corrected by upgrading your system to the
following package versions:
Ubuntu 6.06 LTS:
libkadm55 1.4.3-5ubuntu0.7
libkrb53 1.4.3-5ubuntu0.7
Ubuntu 6.10:
libkadm55 1.4.3-9ubuntu1.6
libkrb53 1.4.3-9ubuntu1.6
Ubuntu 7.04:
libkadm55 1.4.4-5ubuntu3.4
libkrb53 1.4.4-5ubuntu3.4
Ubuntu 7.10:
libkadm55 1.6.dfsg.1-7ubuntu0.1
libkrb53 1.6.dfsg.1-7ubuntu0.1
In general, a standard system upgrade is sufficient to effect the
necessary changes.
Details follow:
It was discovered that krb5 did not correctly handle certain krb4
requests. (CVE-2008-0947)
Updated packages for Ubuntu 6.06 LTS:
Source archives:
http://security.ubuntu.com/ubuntu/pool/main/k/krb5/krb5_1.4.3-5ubuntu0.7.diff.gz
Size/MD5: 1460317 0090e30287f3448ed9babac78c39d5ca
http://security.ubuntu.com/ubuntu/pool/main/k/krb5/krb5_1.4.3-5ubuntu0.7.dsc
Size/MD5: 848 237125b6b35a1a059e5573d10fd7c18e
http://security.ubuntu.com/ubuntu/pool/main/k/krb5/krb5_1.4.3.orig.tar.gz
Size/MD5: 7279788 43fe621ecb849a83ee014dfb856c54af
Architecture independent packages:
http://security.ubuntu.com/ubuntu/pool/main/k/krb5/krb5-doc_1.4.3-5ubuntu0.7_all.deb
Size/MD5: 853222 dfd657a08b13ce0f3916e49ab8e3ce28
amd64 architecture (Athlon64, Opteron, EM64T Xeon):
http://security.ubuntu.com/ubuntu/pool/main/k/krb5/libkadm55_1.4.3-5ubuntu0.7_amd64.deb
Size/MD5: 190904 e9e05267f551177f3c7cae46fdda9565
http://security.ubuntu.com/ubuntu/pool/main/k/krb5/libkrb5-dev_1.4.3-5ubuntu0.7_amd64.deb
Size/MD5: 768706 79270ab27ac164fc4c76822e1dc0be2c
http://security.ubuntu.com/ubuntu/pool/main/k/krb5/libkrb53_1.4.3-5ubuntu0.7_amd64.deb
Size/MD5: 425714 d8467d288bf46cdfa35ba74e6aa0ff02
http://security.ubuntu.com/ubuntu/pool/universe/k/krb5/krb5-admin-server_1.4.3-5ubuntu0.7_amd64.deb
Size/MD5: 80378 b2d795bc82f8f962ceff0afdd11060da
http://security.ubuntu.com/ubuntu/pool/universe/k/krb5/krb5-clients_1.4.3-5ubuntu0.7_amd64.deb
Size/MD5: 223230 73161771034af58dc6d0cd0c4be72fa8
http://security.ubuntu.com/ubuntu/pool/universe/k/krb5/krb5-ftpd_1.4.3-5ubuntu0.7_amd64.deb
Size/MD5: 60376 f0712ab86caf1d9d9e52ff3750afeddd
http://security.ubuntu.com/ubuntu/pool/universe/k/krb5/krb5-kdc_1.4.3-5ubuntu0.7_amd64.deb
Size/MD5: 135158 34b51b738a69c2aeb9df20e0af93e9bc
http://security.ubuntu.com/ubuntu/pool/universe/k/krb5/krb5-rsh-server_1.4.3-5ubuntu0.7_amd64.deb
Size/MD5: 85274 265b8ad9968001e5c984743650d635ac
http://security.ubuntu.com/ubuntu/pool/universe/k/krb5/krb5-telnetd_1.4.3-5ubuntu0.7_amd64.deb
Size/MD5: 67600 bd5c7020310f1bd70f8dc98864c2961c
http://security.ubuntu.com/ubuntu/pool/universe/k/krb5/krb5-user_1.4.3-5ubuntu0.7_amd64.deb
Size/MD5: 129906 0f0383de4d51d8581a260021c3332f72
i386 architecture (x86 compatible Intel/AMD):
http://security.ubuntu.com/ubuntu/pool/main/k/krb5/libkadm55_1.4.3-5ubuntu0.7_i386.deb
Size/MD5: 165730 8128a78d17cd98c4ccfa086b390af167
http://security.ubuntu.com/ubuntu/pool/main/k/krb5/libkrb5-dev_1.4.3-5ubuntu0.7_i386.deb
Size/MD5: 647222 96672590753337d39b1aadc24dac0531
http://security.ubuntu.com/ubuntu/pool/main/k/krb5/libkrb53_1.4.3-5ubuntu0.7_i386.deb
Size/MD5: 381120 af9c45400c55b68778f3b769c238548d
http://security.ubuntu.com/ubuntu/pool/universe/k/krb5/krb5-admin-server_1.4.3-5ubuntu0.7_i386.deb
Size/MD5: 72298 754b91046e7e47bb0f2aa58cd2ca3797
http://security.ubuntu.com/ubuntu/pool/universe/k/krb5/krb5-clients_1.4.3-5ubuntu0.7_i386.deb
Size/MD5: 187240 d7e5a8b1a077776309282bc328aab885
http://security.ubuntu.com/ubuntu/pool/universe/k/krb5/krb5-ftpd_1.4.3-5ubuntu0.7_i386.deb
Size/MD5: 54326 1137dd0e4209cf7edb38ff327feb342d
http://security.ubuntu.com/ubuntu/pool/universe/k/krb5/krb5-kdc_1.4.3-5ubuntu0.7_i386.deb
Size/MD5: 121564 9e36fe3a9567176b2e224a45e55017a0
http://security.ubuntu.com/ubuntu/pool/universe/k/krb5/krb5-rsh-server_1.4.3-5ubuntu0.7_i386.deb
Size/MD5: 75920 cd8854a9ae911eaa1c82eaa945b3d175
http://security.ubuntu.com/ubuntu/pool/universe/k/krb5/krb5-telnetd_1.4.3-5ubuntu0.7_i386.deb
Size/MD5: 58720 eaf05e05f40183c066e294bec431bc61
http://security.ubuntu.com/ubuntu/pool/universe/k/krb5/krb5-user_1.4.3-5ubuntu0.7_i386.deb
Size/MD5: 119078 67a73b248bf33afee23ffb885f5d2e18
powerpc architecture (Apple Macintosh G3/G4/G5):
http://security.ubuntu.com/ubuntu/pool/main/k/krb5/libkadm55_1.4.3-5ubuntu0.7_powerpc.deb
Size/MD5: 177716 b834ad9d37a2e3dfa44d086c6dcbfbc9
http://security.ubuntu.com/ubuntu/pool/main/k/krb5/libkrb5-dev_1.4.3-5ubuntu0.7_powerpc.deb
Size/MD5: 752002 22dd063609b942c4996c56a3f74b266c
http://security.ubuntu.com/ubuntu/pool/main/k/krb5/libkrb53_1.4.3-5ubuntu0.7_powerpc.deb
Size/MD5: 395914 b4fde9f81a08aa112f48b38f1d7faf9c
http://security.ubuntu.com/ubuntu/pool/universe/k/krb5/krb5-admin-server_1.4.3-5ubuntu0.7_powerpc.deb
Size/MD5: 80530 7e55073ee6b67ba12f0ed48d0137e73c
http://security.ubuntu.com/ubuntu/pool/universe/k/krb5/krb5-clients_1.4.3-5ubuntu0.7_powerpc.deb
Size/MD5: 220582 482d21e5007a1876bf6af64e434b4942
http://security.ubuntu.com/ubuntu/pool/universe/k/krb5/krb5-ftpd_1.4.3-5ubuntu0.7_powerpc.deb
Size/MD5: 59574 4f47514f7992a292c162f40f8a174ee6
http://security.ubuntu.com/ubuntu/pool/universe/k/krb5/krb5-kdc_1.4.3-5ubuntu0.7_powerpc.deb
Size/MD5: 135962 0e23ea255a84c3a580e0d7e6b0da9546
http://security.ubuntu.com/ubuntu/pool/universe/k/krb5/krb5-rsh-server_1.4.3-5ubuntu0.7_powerpc.deb
Size/MD5: 85120 e07cf29268ba053833122cca9ed79d8d
http://security.ubuntu.com/ubuntu/pool/universe/k/krb5/krb5-telnetd_1.4.3-5ubuntu0.7_powerpc.deb
Size/MD5: 65990 3c4f25017e0760f4dd10404e604087a8
http://security.ubuntu.com/ubuntu/pool/universe/k/krb5/krb5-user_1.4.3-5ubuntu0.7_powerpc.deb
Size/MD5: 134952 7096226ce8ce15dd20c6ed933888d56e
sparc architecture (Sun SPARC/UltraSPARC):
http://security.ubuntu.com/ubuntu/pool/main/k/krb5/libkadm55_1.4.3-5ubuntu0.7_sparc.deb
Size/MD5: 165278 5c8580725c8a200f24173d38dfce388e
http://security.ubuntu.com/ubuntu/pool/main/k/krb5/libkrb5-dev_1.4.3-5ubuntu0.7_sparc.deb
Size/MD5: 678538 4002d8655a43f5784d5e9c95bc5b4f76
http://security.ubuntu.com/ubuntu/pool/main/k/krb5/libkrb53_1.4.3-5ubuntu0.7_sparc.deb
Size/MD5: 368726 5ee45e24f0ac54d79a55c20674b2887f
http://security.ubuntu.com/ubuntu/pool/universe/k/krb5/krb5-admin-server_1.4.3-5ubuntu0.7_sparc.deb
Size/MD5: 73042 672530bb7218c04a67e23d1053757050
http://security.ubuntu.com/ubuntu/pool/universe/k/krb5/krb5-clients_1.4.3-5ubuntu0.7_sparc.deb
Size/MD5: 197404 ea257178102f6b7732ef12538ead3e24
http://security.ubuntu.com/ubuntu/pool/universe/k/krb5/krb5-ftpd_1.4.3-5ubuntu0.7_sparc.deb
Size/MD5: 56304 855c59021874c714bd4e2605de10d5a6
http://security.ubuntu.com/ubuntu/pool/universe/k/krb5/krb5-kdc_1.4.3-5ubuntu0.7_sparc.deb
Size/MD5: 124374 7d8f7f84b2c1648b63129ba342389d75
http://security.ubuntu.com/ubuntu/pool/universe/k/krb5/krb5-rsh-server_1.4.3-5ubuntu0.7_sparc.deb
Size/MD5: 76922 142ed0e2c119d596c5437ac8f9042064
http://security.ubuntu.com/ubuntu/pool/universe/k/krb5/krb5-telnetd_1.4.3-5ubuntu0.7_sparc.deb
Size/MD5: 62350 db681a03624a21a34425fea9f6fa9ade
http://security.ubuntu.com/ubuntu/pool/universe/k/krb5/krb5-user_1.4.3-5ubuntu0.7_sparc.deb
Size/MD5: 120620 ebe2ddf8dc131cf6e3322e1cb125f2f3
Updated packages for Ubuntu 6.10:
Source archives:
http://security.ubuntu.com/ubuntu/pool/main/k/krb5/krb5_1.4.3-9ubuntu1.6.diff.gz
Size/MD5: 1481707 dc6dd5cd6d4a125e2fa70b9ebc3f8b12
http://security.ubuntu.com/ubuntu/pool/main/k/krb5/krb5_1.4.3-9ubuntu1.6.dsc
Size/MD5: 883 8fdcf0af1cc631c882a44ae0214e0b6f
http://security.ubuntu.com/ubuntu/pool/main/k/krb5/krb5_1.4.3.orig.tar.gz
Size/MD5: 7279788 43fe621ecb849a83ee014dfb856c54af
Architecture independent packages:
http://security.ubuntu.com/ubuntu/pool/main/k/krb5/krb5-doc_1.4.3-9ubuntu1.6_all.deb
Size/MD5: 853934 f3a7a044bedb974b32a46708774ec894
amd64 architecture (Athlon64, Opteron, EM64T Xeon):
http://security.ubuntu.com/ubuntu/pool/main/k/krb5/libkadm55_1.4.3-9ubuntu1.6_amd64.deb
Size/MD5: 190826 7772b734a889ea97cf052de39072cead
http://security.ubuntu.com/ubuntu/pool/main/k/krb5/libkrb5-dbg_1.4.3-9ubuntu1.6_amd64.deb
Size/MD5: 1073390 bedf0987fe159bc38c30663ad966d0ac
http://security.ubuntu.com/ubuntu/pool/main/k/krb5/libkrb5-dev_1.4.3-9ubuntu1.6_amd64.deb
Size/MD5: 772708 5cc8e489a0f6fcca17c3e0d8b9588879
http://security.ubuntu.com/ubuntu/pool/main/k/krb5/libkrb53_1.4.3-9ubuntu1.6_amd64.deb
Size/MD5: 428050 11b4c2211b18453bd2a662a297569f49
http://security.ubuntu.com/ubuntu/pool/universe/k/krb5/krb5-admin-server_1.4.3-9ubuntu1.6_amd64.deb
Size/MD5: 81790 06f349106755cc19cfb3f29fcc7228f8
http://security.ubuntu.com/ubuntu/pool/universe/k/krb5/krb5-clients_1.4.3-9ubuntu1.6_amd64.deb
Size/MD5: 224408 59491e595a544a84463a6deec8305f66
http://security.ubuntu.com/ubuntu/pool/universe/k/krb5/krb5-ftpd_1.4.3-9ubuntu1.6_amd64.deb
Size/MD5: 61620 f58dcb4c09e4c96f3db5bfc8172fdffa
http://security.ubuntu.com/ubuntu/pool/universe/k/krb5/krb5-kdc_1.4.3-9ubuntu1.6_amd64.deb
Size/MD5: 139116 31943a9766f657fd47ac1aded48d49d6
http://security.ubuntu.com/ubuntu/pool/universe/k/krb5/krb5-rsh-server_1.4.3-9ubuntu1.6_amd64.deb
Size/MD5: 87426 1033408d2692b38926947f8ae85e1515
http://security.ubuntu.com/ubuntu/pool/universe/k/krb5/krb5-telnetd_1.4.3-9ubuntu1.6_amd64.deb
Size/MD5: 68116 291db335b868748c933a7c67e6add6a7
http://security.ubuntu.com/ubuntu/pool/universe/k/krb5/krb5-user_1.4.3-9ubuntu1.6_amd64.deb
Size/MD5: 130628 a2cb3cd3ee9ede8c3c10e695fd8148af
i386 architecture (x86 compatible Intel/AMD):
http://security.ubuntu.com/ubuntu/pool/main/k/krb5/libkadm55_1.4.3-9ubuntu1.6_i386.deb
Size/MD5: 173062 e15aa9368fc4e4ef4562a23cc1780484
http://security.ubuntu.com/ubuntu/pool/main/k/krb5/libkrb5-dbg_1.4.3-9ubuntu1.6_i386.deb
Size/MD5: 1024998 798f81a00c59842cbc2c8ea8cd4b9a5e
http://security.ubuntu.com/ubuntu/pool/main/k/krb5/libkrb5-dev_1.4.3-9ubuntu1.6_i386.deb
Size/MD5: 673152 671e72c1eb7645dfda924c77949610dd
http://security.ubuntu.com/ubuntu/pool/main/k/krb5/libkrb53_1.4.3-9ubuntu1.6_i386.deb
Size/MD5: 404172 445f952e23f810f6de10773a01fd68ae
http://security.ubuntu.com/ubuntu/pool/universe/k/krb5/krb5-admin-server_1.4.3-9ubuntu1.6_i386.deb
Size/MD5: 75380 0b3cd4b087f56ebdd527d61194cf7fc0
http://security.ubuntu.com/ubuntu/pool/universe/k/krb5/krb5-clients_1.4.3-9ubuntu1.6_i386.deb
Size/MD5: 196506 bff3435e0da9aecff7a26d73e712937f
http://security.ubuntu.com/ubuntu/pool/universe/k/krb5/krb5-ftpd_1.4.3-9ubuntu1.6_i386.deb
Size/MD5: 57136 3fafa3cd2cd2792e740c4d6976a881de
http://security.ubuntu.com/ubuntu/pool/universe/k/krb5/krb5-kdc_1.4.3-9ubuntu1.6_i386.deb
Size/MD5: 129352 7e190df154981717bf711697c5042cd4
http://security.ubuntu.com/ubuntu/pool/universe/k/krb5/krb5-rsh-server_1.4.3-9ubuntu1.6_i386.deb
Size/MD5: 80102 94a76cc7807e9d6598b4a452a7fbb738
http://security.ubuntu.com/ubuntu/pool/universe/k/krb5/krb5-telnetd_1.4.3-9ubuntu1.6_i386.deb
Size/MD5: 61928 b7fdd344e683ce45be88f8fa43290175
http://security.ubuntu.com/ubuntu/pool/universe/k/krb5/krb5-user_1.4.3-9ubuntu1.6_i386.deb
Size/MD5: 122208 eb1ec6653d6d790e23dbcc14cd98f5f7
powerpc architecture (Apple Macintosh G3/G4/G5):
http://security.ubuntu.com/ubuntu/pool/main/k/krb5/libkadm55_1.4.3-9ubuntu1.6_powerpc.deb
Size/MD5: 180126 f8e5d077ee06234bbb9881beb9d49f36
http://security.ubuntu.com/ubuntu/pool/main/k/krb5/libkrb5-dbg_1.4.3-9ubuntu1.6_powerpc.deb
Size/MD5: 1076974 4752e5e87fdcd67fcb0f1ee2c35ddf80
http://security.ubuntu.com/ubuntu/pool/main/k/krb5/libkrb5-dev_1.4.3-9ubuntu1.6_powerpc.deb
Size/MD5: 758400 73ed6c35fbdcf1866a65a6198df8ca82
http://security.ubuntu.com/ubuntu/pool/main/k/krb5/libkrb53_1.4.3-9ubuntu1.6_powerpc.deb
Size/MD5: 399112 1fdd3a0a2a45bd410a1f4e72713a0e1e
http://security.ubuntu.com/ubuntu/pool/universe/k/krb5/krb5-admin-server_1.4.3-9ubuntu1.6_powerpc.deb
Size/MD5: 82420 446cda40d1590c088e2fc83118a58e13
http://security.ubuntu.com/ubuntu/pool/universe/k/krb5/krb5-clients_1.4.3-9ubuntu1.6_powerpc.deb
Size/MD5: 223182 8e6f5f3062fe3cfb113db73bc8a1a89e
http://security.ubuntu.com/ubuntu/pool/universe/k/krb5/krb5-ftpd_1.4.3-9ubuntu1.6_powerpc.deb
Size/MD5: 61826 b4ad931a1a1d48b668a972893502cd67
http://security.ubuntu.com/ubuntu/pool/universe/k/krb5/krb5-kdc_1.4.3-9ubuntu1.6_powerpc.deb
Size/MD5: 141210 8892626a667e0010a0cba8fe19df958f
http://security.ubuntu.com/ubuntu/pool/universe/k/krb5/krb5-rsh-server_1.4.3-9ubuntu1.6_powerpc.deb
Size/MD5: 87318 c7306114bbb195c221962abc469a1d42
http://security.ubuntu.com/ubuntu/pool/universe/k/krb5/krb5-telnetd_1.4.3-9ubuntu1.6_powerpc.deb
Size/MD5: 67222 b99ea3def960bdc849376c508e263f0d
http://security.ubuntu.com/ubuntu/pool/universe/k/krb5/krb5-user_1.4.3-9ubuntu1.6_powerpc.deb
Size/MD5: 136888 1c651e27011fa9c25ea87960b40ffe1b
sparc architecture (Sun SPARC/UltraSPARC):
http://security.ubuntu.com/ubuntu/pool/main/k/krb5/libkadm55_1.4.3-9ubuntu1.6_sparc.deb
Size/MD5: 167176 0f2f57754f3e012257a6fef890a23767
http://security.ubuntu.com/ubuntu/pool/main/k/krb5/libkrb5-dbg_1.4.3-9ubuntu1.6_sparc.deb
Size/MD5: 957816 2ef6010c70801e7b0dd5e633a08e3fac
http://security.ubuntu.com/ubuntu/pool/main/k/krb5/libkrb5-dev_1.4.3-9ubuntu1.6_sparc.deb
Size/MD5: 685238 a68016ffc9abcd0eab3f7f1ae323e83e
http://security.ubuntu.com/ubuntu/pool/main/k/krb5/libkrb53_1.4.3-9ubuntu1.6_sparc.deb
Size/MD5: 374074 d5ff62adb392f5be8b29c2e1056f6f92
http://security.ubuntu.com/ubuntu/pool/universe/k/krb5/krb5-admin-server_1.4.3-9ubuntu1.6_sparc.deb
Size/MD5: 75210 9611a07b489b518605a9550b27b3dd7c
http://security.ubuntu.com/ubuntu/pool/universe/k/krb5/krb5-clients_1.4.3-9ubuntu1.6_sparc.deb
Size/MD5: 203684 89d989c5db437eba6e9e56fc9bf7dc93
http://security.ubuntu.com/ubuntu/pool/universe/k/krb5/krb5-ftpd_1.4.3-9ubuntu1.6_sparc.deb
Size/MD5: 58980 b9d7f11d5c491595c90006ae7c039935
http://security.ubuntu.com/ubuntu/pool/universe/k/krb5/krb5-kdc_1.4.3-9ubuntu1.6_sparc.deb
Size/MD5: 129664 acf15ad70331066092154952cbd7754a
http://security.ubuntu.com/ubuntu/pool/universe/k/krb5/krb5-rsh-server_1.4.3-9ubuntu1.6_sparc.deb
Size/MD5: 80428 8409c34ee32612d48e8936618118bab7
http://security.ubuntu.com/ubuntu/pool/universe/k/krb5/krb5-telnetd_1.4.3-9ubuntu1.6_sparc.deb
Size/MD5: 63612 64b2987c2aee57159bc092c5fe37a25b
http://security.ubuntu.com/ubuntu/pool/universe/k/krb5/krb5-user_1.4.3-9ubuntu1.6_sparc.deb
Size/MD5: 122730 95db549e03f3bc30995d566f8ea7edac
Updated packages for Ubuntu 7.04:
Source archives:
http://security.ubuntu.com/ubuntu/pool/main/k/krb5/krb5_1.4.4-5ubuntu3.4.diff.gz
Size/MD5: 1589880 e20eef948656a29a255b557af6e7817b
http://security.ubuntu.com/ubuntu/pool/main/k/krb5/krb5_1.4.4-5ubuntu3.4.dsc
Size/MD5: 968 971223b33ae8631f013c20a3c8867805
http://security.ubuntu.com/ubuntu/pool/main/k/krb5/krb5_1.4.4.orig.tar.gz
Size/MD5: 11017910 a675e5953bb8a29b5c6eb6f4ab0bb32a
Architecture independent packages:
http://security.ubuntu.com/ubuntu/pool/main/k/krb5/krb5-doc_1.4.4-5ubuntu3.4_all.deb
Size/MD5: 1806176 c34d13b6877a21c426a85719a6ecf6a0
amd64 architecture (Athlon64, Opteron, EM64T Xeon):
http://security.ubuntu.com/ubuntu/pool/main/k/krb5/libkadm55_1.4.4-5ubuntu3.4_amd64.deb
Size/MD5: 194368 2b6345b614c38e353a3ec4abd2957e6d
http://security.ubuntu.com/ubuntu/pool/main/k/krb5/libkrb5-dbg_1.4.4-5ubuntu3.4_amd64.deb
Size/MD5: 1076886 d4e2d9d77afd78df99d96a6541730527
http://security.ubuntu.com/ubuntu/pool/main/k/krb5/libkrb5-dev_1.4.4-5ubuntu3.4_amd64.deb
Size/MD5: 772608 c3f93d5b94e84df6faac86b701f9836c
http://security.ubuntu.com/ubuntu/pool/main/k/krb5/libkrb53_1.4.4-5ubuntu3.4_amd64.deb
Size/MD5: 436580 f7e6430bf6f628592596b44e7341af30
http://security.ubuntu.com/ubuntu/pool/universe/k/krb5/krb5-admin-server_1.4.4-5ubuntu3.4_amd64.deb
Size/MD5: 83772 ad232225b5bbc88f1e0f5bd55916de24
http://security.ubuntu.com/ubuntu/pool/universe/k/krb5/krb5-clients_1.4.4-5ubuntu3.4_amd64.deb
Size/MD5: 226770 34e47342c392be9006254e15fc0258e3
http://security.ubuntu.com/ubuntu/pool/universe/k/krb5/krb5-ftpd_1.4.4-5ubuntu3.4_amd64.deb
Size/MD5: 62258 c71fecc4d7bd6e3191c08a19cbf07aa5
http://security.ubuntu.com/ubuntu/pool/universe/k/krb5/krb5-kdc_1.4.4-5ubuntu3.4_amd64.deb
Size/MD5: 141840 33ec180078e9b8e1f80fca5f26c1d558
http://security.ubuntu.com/ubuntu/pool/universe/k/krb5/krb5-rsh-server_1.4.4-5ubuntu3.4_amd64.deb
Size/MD5: 88380 64572d633f1a84999b2205bd6958206c
http://security.ubuntu.com/ubuntu/pool/universe/k/krb5/krb5-telnetd_1.4.4-5ubuntu3.4_amd64.deb
Size/MD5: 68890 dcabc2bcaac75b7e226c9090a82207a0
http://security.ubuntu.com/ubuntu/pool/universe/k/krb5/krb5-user_1.4.4-5ubuntu3.4_amd64.deb
Size/MD5: 132614 f129069e4dd68ccf7801c717603713ef
i386 architecture (x86 compatible Intel/AMD):
http://security.ubuntu.com/ubuntu/pool/main/k/krb5/libkadm55_1.4.4-5ubuntu3.4_i386.deb
Size/MD5: 176870 9e0e200bdff3119ef8488f9a5bf62e7c
http://security.ubuntu.com/ubuntu/pool/main/k/krb5/libkrb5-dbg_1.4.4-5ubuntu3.4_i386.deb
Size/MD5: 1031008 8a80209f195b2eb787236e0dcd8aaa23
http://security.ubuntu.com/ubuntu/pool/main/k/krb5/libkrb5-dev_1.4.4-5ubuntu3.4_i386.deb
Size/MD5: 672020 7b5b4e1643b5802b2bbfab006d0e6d7a
http://security.ubuntu.com/ubuntu/pool/main/k/krb5/libkrb53_1.4.4-5ubuntu3.4_i386.deb
Size/MD5: 412036 213c308bef9eaa6762ab755da6e7442a
http://security.ubuntu.com/ubuntu/pool/universe/k/krb5/krb5-admin-server_1.4.4-5ubuntu3.4_i386.deb
Size/MD5: 77328 295e5ed2c0c2366fc6b3d343607ae431
http://security.ubuntu.com/ubuntu/pool/universe/k/krb5/krb5-clients_1.4.4-5ubuntu3.4_i386.deb
Size/MD5: 199040 1b0a50f1bf8e421d9838acea254c6c26
http://security.ubuntu.com/ubuntu/pool/universe/k/krb5/krb5-ftpd_1.4.4-5ubuntu3.4_i386.deb
Size/MD5: 57780 96ae66401532d513b4333c3429f6e2eb
http://security.ubuntu.com/ubuntu/pool/universe/k/krb5/krb5-kdc_1.4.4-5ubuntu3.4_i386.deb
Size/MD5: 131900 fc29493488e6311a94cfa5ec2c5ac7a8
http://security.ubuntu.com/ubuntu/pool/universe/k/krb5/krb5-rsh-server_1.4.4-5ubuntu3.4_i386.deb
Size/MD5: 81008 0c2bd14ee6534cad097d5d80200cc94a
http://security.ubuntu.com/ubuntu/pool/universe/k/krb5/krb5-telnetd_1.4.4-5ubuntu3.4_i386.deb
Size/MD5: 62650 8d1f1316f52fe066626f0fde07f8b990
http://security.ubuntu.com/ubuntu/pool/universe/k/krb5/krb5-user_1.4.4-5ubuntu3.4_i386.deb
Size/MD5: 124088 de985ccf04486e2043c2324affbb18af
powerpc architecture (Apple Macintosh G3/G4/G5):
http://security.ubuntu.com/ubuntu/pool/main/k/krb5/libkadm55_1.4.4-5ubuntu3.4_powerpc.deb
Size/MD5: 194590 f63db5ccc5825220d5014b1d7eda0ebe
http://security.ubuntu.com/ubuntu/pool/main/k/krb5/libkrb5-dbg_1.4.4-5ubuntu3.4_powerpc.deb
Size/MD5: 1082008 3501eca4bc0d14b39fbc662ee20ab7cb
http://security.ubuntu.com/ubuntu/pool/main/k/krb5/libkrb5-dev_1.4.4-5ubuntu3.4_powerpc.deb
Size/MD5: 757006 169816425e730c69266d39518fb718f8
http://security.ubuntu.com/ubuntu/pool/main/k/krb5/libkrb53_1.4.4-5ubuntu3.4_powerpc.deb
Size/MD5: 429982 24a79674c75e6f9731d34468ad86e27c
http://security.ubuntu.com/ubuntu/pool/universe/k/krb5/krb5-admin-server_1.4.4-5ubuntu3.4_powerpc.deb
Size/MD5: 90254 936f19b572498c2de200fd3e323657de
http://security.ubuntu.com/ubuntu/pool/universe/k/krb5/krb5-clients_1.4.4-5ubuntu3.4_powerpc.deb
Size/MD5: 240274 eb844e20839937a3ccad330429ba1840
http://security.ubuntu.com/ubuntu/pool/universe/k/krb5/krb5-ftpd_1.4.4-5ubuntu3.4_powerpc.deb
Size/MD5: 65452 dffc482a088d83a0100e78e69f332bb8
http://security.ubuntu.com/ubuntu/pool/universe/k/krb5/krb5-kdc_1.4.4-5ubuntu3.4_powerpc.deb
Size/MD5: 153794 308fc25b452cb374f7b45a472784761b
http://security.ubuntu.com/ubuntu/pool/universe/k/krb5/krb5-rsh-server_1.4.4-5ubuntu3.4_powerpc.deb
Size/MD5: 96692 9566a692d6f8a6d47e9f60e25d13927d
http://security.ubuntu.com/ubuntu/pool/universe/k/krb5/krb5-telnetd_1.4.4-5ubuntu3.4_powerpc.deb
Size/MD5: 70680 4949b60728fc08134113f744738a293c
http://security.ubuntu.com/ubuntu/pool/universe/k/krb5/krb5-user_1.4.4-5ubuntu3.4_powerpc.deb
Size/MD5: 150262 dbf317c0added0c3faae6710b8026fc8
sparc architecture (Sun SPARC/UltraSPARC):
http://security.ubuntu.com/ubuntu/pool/main/k/krb5/libkadm55_1.4.4-5ubuntu3.4_sparc.deb
Size/MD5: 170940 967a1344994914065dc904da571a2aef
http://security.ubuntu.com/ubuntu/pool/main/k/krb5/libkrb5-dbg_1.4.4-5ubuntu3.4_sparc.deb
Size/MD5: 965784 bd503df54b8c9afcb4e5a6a375ce7fa8
http://security.ubuntu.com/ubuntu/pool/main/k/krb5/libkrb5-dev_1.4.4-5ubuntu3.4_sparc.deb
Size/MD5: 683396 939cb2731116dc8718ea4ebc996b5c7e
http://security.ubuntu.com/ubuntu/pool/main/k/krb5/libkrb53_1.4.4-5ubuntu3.4_sparc.deb
Size/MD5: 380910 5b46d8169ecc2409caad5dd4feacdc2b
http://security.ubuntu.com/ubuntu/pool/universe/k/krb5/krb5-admin-server_1.4.4-5ubuntu3.4_sparc.deb
Size/MD5: 79084 e3da961bcea67ff2c217008d141075cf
http://security.ubuntu.com/ubuntu/pool/universe/k/krb5/krb5-clients_1.4.4-5ubuntu3.4_sparc.deb
Size/MD5: 210904 688aeb4162f4dcf86768ddd299cf6625
http://security.ubuntu.com/ubuntu/pool/universe/k/krb5/krb5-ftpd_1.4.4-5ubuntu3.4_sparc.deb
Size/MD5: 60996 e20fcf5e2b4bab548fe8e0836aff86eb
http://security.ubuntu.com/ubuntu/pool/universe/k/krb5/krb5-kdc_1.4.4-5ubuntu3.4_sparc.deb
Size/MD5: 135846 55612458a19bd82331991bbb672f74e9
http://security.ubuntu.com/ubuntu/pool/universe/k/krb5/krb5-rsh-server_1.4.4-5ubuntu3.4_sparc.deb
Size/MD5: 84546 f1fc527ed376549516113ae94ca7d0fb
http://security.ubuntu.com/ubuntu/pool/universe/k/krb5/krb5-telnetd_1.4.4-5ubuntu3.4_sparc.deb
Size/MD5: 65282 7726043628cc103faccb839be0def042
http://security.ubuntu.com/ubuntu/pool/universe/k/krb5/krb5-user_1.4.4-5ubuntu3.4_sparc.deb
Size/MD5: 127130 edddba0066c5bab862847c750a231a51
Updated packages for Ubuntu 7.10:
Source archives:
http://security.ubuntu.com/ubuntu/pool/main/k/krb5/krb5_1.6.dfsg.1-7ubuntu0.1.diff.gz
Size/MD5: 1674637 40fa0c4bdf307c7e5d9509be9870434e
http://security.ubuntu.com/ubuntu/pool/main/k/krb5/krb5_1.6.dfsg.1-7ubuntu0.1.dsc
Size/MD5: 1044 2c6766c8721cf2e3caa259cdb5badf10
http://security.ubuntu.com/ubuntu/pool/main/k/krb5/krb5_1.6.dfsg.1.orig.tar.gz
Size/MD5: 14474321 8f8d6a494380f01a7a0a9236162afa52
Architecture independent packages:
http://security.ubuntu.com/ubuntu/pool/main/k/krb5/krb5-doc_1.6.dfsg.1-7ubuntu0.1_all.deb
Size/MD5: 2076606 1c021446b5f479717a4998df0f87f205
amd64 architecture (Athlon64, Opteron, EM64T Xeon):
http://security.ubuntu.com/ubuntu/pool/main/k/krb5/libkadm55_1.6.dfsg.1-7ubuntu0.1_amd64.deb
Size/MD5: 165034 78f040deebe1683f8966347e9896fce8
http://security.ubuntu.com/ubuntu/pool/main/k/krb5/libkrb5-dbg_1.6.dfsg.1-7ubuntu0.1_amd64.deb
Size/MD5: 1308970 04db0004a99e7e0d01b37d922f47df1e
http://security.ubuntu.com/ubuntu/pool/main/k/krb5/libkrb5-dev_1.6.dfsg.1-7ubuntu0.1_amd64.deb
Size/MD5: 88606 6509d222135bfaa05ebf79db1f63c2a7
http://security.ubuntu.com/ubuntu/pool/main/k/krb5/libkrb53_1.6.dfsg.1-7ubuntu0.1_amd64.deb
Size/MD5: 493016 54a329e5f8464d5f519ac225f4d5d778
http://security.ubuntu.com/ubuntu/pool/universe/k/krb5/krb5-admin-server_1.6.dfsg.1-7ubuntu0.1_amd64.deb
Size/MD5: 87824 cac8d5d1297bb71c52a877cf0b85c393
http://security.ubuntu.com/ubuntu/pool/universe/k/krb5/krb5-clients_1.6.dfsg.1-7ubuntu0.1_amd64.deb
Size/MD5: 228534 d6c15467cf49d74831ac0ea494eec6f9
http://security.ubuntu.com/ubuntu/pool/universe/k/krb5/krb5-ftpd_1.6.dfsg.1-7ubuntu0.1_amd64.deb
Size/MD5: 65864 563aaa90bffe6ff07ff8db56cff826f8
http://security.ubuntu.com/ubuntu/pool/universe/k/krb5/krb5-kdc_1.6.dfsg.1-7ubuntu0.1_amd64.deb
Size/MD5: 185182 e1f4910f7b6fca6655696a0bb7169d7b
http://security.ubuntu.com/ubuntu/pool/universe/k/krb5/krb5-rsh-server_1.6.dfsg.1-7ubuntu0.1_amd64.deb
Size/MD5: 91334 c1c20f704f98f19212cfa70ac9edf193
http://security.ubuntu.com/ubuntu/pool/universe/k/krb5/krb5-telnetd_1.6.dfsg.1-7ubuntu0.1_amd64.deb
Size/MD5: 72950 de7748ddb5f7cd3f0744eb77770fa3e0
http://security.ubuntu.com/ubuntu/pool/universe/k/krb5/krb5-user_1.6.dfsg.1-7ubuntu0.1_amd64.deb
Size/MD5: 137592 99c3b6d671ae7f0439f379d5b2688659
i386 architecture (x86 compatible Intel/AMD):
http://security.ubuntu.com/ubuntu/pool/main/k/krb5/libkadm55_1.6.dfsg.1-7ubuntu0.1_i386.deb
Size/MD5: 148364 a3e27e81c7e81f627d05c708faae402d
http://security.ubuntu.com/ubuntu/pool/main/k/krb5/libkrb5-dbg_1.6.dfsg.1-7ubuntu0.1_i386.deb
Size/MD5: 1266912 2696e89ea8cf6e857e36ee740fb65ea0
http://security.ubuntu.com/ubuntu/pool/main/k/krb5/libkrb5-dev_1.6.dfsg.1-7ubuntu0.1_i386.deb
Size/MD5: 88624 9970f2076c76427dd0cbf217b6a6bba0
http://security.ubuntu.com/ubuntu/pool/main/k/krb5/libkrb53_1.6.dfsg.1-7ubuntu0.1_i386.deb
Size/MD5: 462068 bd3623332d7737858d0fe5918ef8838d
http://security.ubuntu.com/ubuntu/pool/universe/k/krb5/krb5-admin-server_1.6.dfsg.1-7ubuntu0.1_i386.deb
Size/MD5: 81192 d4a4e0e7358f626abc0dbb81575071f6
http://security.ubuntu.com/ubuntu/pool/universe/k/krb5/krb5-clients_1.6.dfsg.1-7ubuntu0.1_i386.deb
Size/MD5: 199624 5a24164123aaea818f2d40c41186fdf7
http://security.ubuntu.com/ubuntu/pool/universe/k/krb5/krb5-ftpd_1.6.dfsg.1-7ubuntu0.1_i386.deb
Size/MD5: 61098 8cc21c42ff5dd534f7158c4c750a498e
http://security.ubuntu.com/ubuntu/pool/universe/k/krb5/krb5-kdc_1.6.dfsg.1-7ubuntu0.1_i386.deb
Size/MD5: 172178 319f2ba5ea41bb97a125049f17154ac4
http://security.ubuntu.com/ubuntu/pool/universe/k/krb5/krb5-rsh-server_1.6.dfsg.1-7ubuntu0.1_i386.deb
Size/MD5: 83634 049a305ea62a45ec23b65dbcd04e85fb
http://security.ubuntu.com/ubuntu/pool/universe/k/krb5/krb5-telnetd_1.6.dfsg.1-7ubuntu0.1_i386.deb
Size/MD5: 66538 a0c51897ca2c55ee7ec2447465121f5e
http://security.ubuntu.com/ubuntu/pool/universe/k/krb5/krb5-user_1.6.dfsg.1-7ubuntu0.1_i386.deb
Size/MD5: 128624 df48b843cf7ab20fc4696d36bba2fe6e
powerpc architecture (Apple Macintosh G3/G4/G5):
http://security.ubuntu.com/ubuntu/pool/main/k/krb5/libkadm55_1.6.dfsg.1-7ubuntu0.1_powerpc.deb
Size/MD5: 162676 0c11613a3d49190eb92074c27833f4c6
http://security.ubuntu.com/ubuntu/pool/main/k/krb5/libkrb5-dbg_1.6.dfsg.1-7ubuntu0.1_powerpc.deb
Size/MD5: 1320150 c2a537a9acf0ebf7b08764506136d37e
http://security.ubuntu.com/ubuntu/pool/main/k/krb5/libkrb5-dev_1.6.dfsg.1-7ubuntu0.1_powerpc.deb
Size/MD5: 88634 eedc4522ba18dfed6fd2483cf8dd0379
http://security.ubuntu.com/ubuntu/pool/main/k/krb5/libkrb53_1.6.dfsg.1-7ubuntu0.1_powerpc.deb
Size/MD5: 482868 4d015493346726e61cd0cf9525e2b1e5
http://security.ubuntu.com/ubuntu/pool/universe/k/krb5/krb5-admin-server_1.6.dfsg.1-7ubuntu0.1_powerpc.deb
Size/MD5: 94492 50526cbb8952316a7b9195edcf148fd3
http://security.ubuntu.com/ubuntu/pool/universe/k/krb5/krb5-clients_1.6.dfsg.1-7ubuntu0.1_powerpc.deb
Size/MD5: 241802 99608692096cfa0e88372013a1b41517
http://security.ubuntu.com/ubuntu/pool/universe/k/krb5/krb5-ftpd_1.6.dfsg.1-7ubuntu0.1_powerpc.deb
Size/MD5: 68960 fc1d60376ba03106488b098f4b5ea624
http://security.ubuntu.com/ubuntu/pool/universe/k/krb5/krb5-kdc_1.6.dfsg.1-7ubuntu0.1_powerpc.deb
Size/MD5: 198522 24b5f7bb74e3d978888dd1cdd065f881
http://security.ubuntu.com/ubuntu/pool/universe/k/krb5/krb5-rsh-server_1.6.dfsg.1-7ubuntu0.1_powerpc.deb
Size/MD5: 99412 ca441f559a1e11b55c3ef52c54ede8ca
http://security.ubuntu.com/ubuntu/pool/universe/k/krb5/krb5-telnetd_1.6.dfsg.1-7ubuntu0.1_powerpc.deb
Size/MD5: 74666 0657bf76d80f969330c5391d65291baa
http://security.ubuntu.com/ubuntu/pool/universe/k/krb5/krb5-user_1.6.dfsg.1-7ubuntu0.1_powerpc.deb
Size/MD5: 155750 967a3ce3bc4fe5383a2a4f6a54ac686a
sparc architecture (Sun SPARC/UltraSPARC):
http://security.ubuntu.com/ubuntu/pool/main/k/krb5/libkadm55_1.6.dfsg.1-7ubuntu0.1_sparc.deb
Size/MD5: 145672 b78635a0dbdb4d4d76c7e6d7ee4cb2fa
http://security.ubuntu.com/ubuntu/pool/main/k/krb5/libkrb5-dbg_1.6.dfsg.1-7ubuntu0.1_sparc.deb
Size/MD5: 1200060 c280c5257a62a657ba79ac09ed62e4ff
http://security.ubuntu.com/ubuntu/pool/main/k/krb5/libkrb5-dev_1.6.dfsg.1-7ubuntu0.1_sparc.deb
Size/MD5: 88620 9b75ff80509a5b3435f7d6f30b19ac9b
http://security.ubuntu.com/ubuntu/pool/main/k/krb5/libkrb53_1.6.dfsg.1-7ubuntu0.1_sparc.deb
Size/MD5: 431168 3c7606d6ced441110ab47b16de3542fc
http://security.ubuntu.com/ubuntu/pool/universe/k/krb5/krb5-admin-server_1.6.dfsg.1-7ubuntu0.1_sparc.deb
Size/MD5: 83030 cc47e0b9c435c5802a2352cb203c435c
http://security.ubuntu.com/ubuntu/pool/universe/k/krb5/krb5-clients_1.6.dfsg.1-7ubuntu0.1_sparc.deb
Size/MD5: 211104 bed40b53469b42c5a65a1f0640ae4d2f
http://security.ubuntu.com/ubuntu/pool/universe/k/krb5/krb5-ftpd_1.6.dfsg.1-7ubuntu0.1_sparc.deb
Size/MD5: 64404 13877024ad747d0ce0a696210217f170
http://security.ubuntu.com/ubuntu/pool/universe/k/krb5/krb5-kdc_1.6.dfsg.1-7ubuntu0.1_sparc.deb
Size/MD5: 172948 8fd8903c9b1caa12ebe73c7c6f86de98
http://security.ubuntu.com/ubuntu/pool/universe/k/krb5/krb5-rsh-server_1.6.dfsg.1-7ubuntu0.1_sparc.deb
Size/MD5: 87474 c3f94c62f987a7a6d50f9d5344e59cff
http://security.ubuntu.com/ubuntu/pool/universe/k/krb5/krb5-telnetd_1.6.dfsg.1-7ubuntu0.1_sparc.deb
Size/MD5: 69196 97040973c460c004ee83b7ba19ddfc88
http://security.ubuntu.com/ubuntu/pool/universe/k/krb5/krb5-user_1.6.dfsg.1-7ubuntu0.1_sparc.deb
Size/MD5: 131692 c12abe7485457bcd0ebe5cf3ecfcc850
.
A flaw was discovered in how the Kerberos krb5kdc handled Kerberos v4
protocol packets.
This issue only affects krb5kdc when it has Kerberos v4 protocol
compatibility enabled, which is a compiled-in default in all
Kerberos versions that Mandriva Linux ships prior to Mandriva
Linux 2008.0.
The updated packages have been patched to correct these issues.
_______________________________________________________________________
References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5901
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5971
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0062
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0063
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0947
http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2008-001.txt
http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2008-002.txt
_______________________________________________________________________
Updated Packages:
Mandriva Linux 2007.1:
64c3f5c31177dcacc99b021ec6ed1271 2007.1/i586/ftp-client-krb5-1.5.2-6.6mdv2007.1.i586.rpm
11b4194bc9edba8c0951e44660ba9955 2007.1/i586/ftp-server-krb5-1.5.2-6.6mdv2007.1.i586.rpm
23794e6e0cb1d46a329c42a04f672c5f 2007.1/i586/krb5-server-1.5.2-6.6mdv2007.1.i586.rpm
0fbb29bd81c8452d937d30fbbda62242 2007.1/i586/krb5-workstation-1.5.2-6.6mdv2007.1.i586.rpm
8f4eea60bf4ea3bfc776f1c117ceb26d 2007.1/i586/libkrb53-1.5.2-6.6mdv2007.1.i586.rpm
fd5b1da0a056d995011d2b1a692e4292 2007.1/i586/libkrb53-devel-1.5.2-6.6mdv2007.1.i586.rpm
ca79ccbe3f286b9069f0ae028d9816f7 2007.1/i586/telnet-client-krb5-1.5.2-6.6mdv2007.1.i586.rpm
8a7c84f1fe1bbb5338723f28d12a9f21 2007.1/i586/telnet-server-krb5-1.5.2-6.6mdv2007.1.i586.rpm
22830790ad7715479b7d4fbecc6c1e7f 2007.1/SRPMS/krb5-1.5.2-6.6mdv2007.1.src.rpm
Mandriva Linux 2007.1/X86_64:
fc02060b7c1da08c33952e6c14fb5627 2007.1/x86_64/ftp-client-krb5-1.5.2-6.6mdv2007.1.x86_64.rpm
513fca34bdd1f2a5643a8e6adeb62e0e 2007.1/x86_64/ftp-server-krb5-1.5.2-6.6mdv2007.1.x86_64.rpm
4f42d639753a885212e6d62bfe84a121 2007.1/x86_64/krb5-server-1.5.2-6.6mdv2007.1.x86_64.rpm
6b2ca028321fb08199be20a4aedef4a0 2007.1/x86_64/krb5-workstation-1.5.2-6.6mdv2007.1.x86_64.rpm
4d453dc2a579e74e29dfc052197fedc1 2007.1/x86_64/lib64krb53-1.5.2-6.6mdv2007.1.x86_64.rpm
b22d9f1b515df1a5270d2d4c373b7dd3 2007.1/x86_64/lib64krb53-devel-1.5.2-6.6mdv2007.1.x86_64.rpm
21b245649de9e38e43782bd1a18922a7 2007.1/x86_64/telnet-client-krb5-1.5.2-6.6mdv2007.1.x86_64.rpm
1322374ab1c15b5c1392ee4ae5f915e7 2007.1/x86_64/telnet-server-krb5-1.5.2-6.6mdv2007.1.x86_64.rpm
22830790ad7715479b7d4fbecc6c1e7f 2007.1/SRPMS/krb5-1.5.2-6.6mdv2007.1.src.rpm
Mandriva Linux 2008.0:
3ee5a309927b830bf8559a872161384b 2008.0/i586/ftp-client-krb5-1.6.2-7.1mdv2008.0.i586.rpm
1835baa43ab27aac2493dc7821bafa8a 2008.0/i586/ftp-server-krb5-1.6.2-7.1mdv2008.0.i586.rpm
5e8369c201ac4678a7bc46590107e45f 2008.0/i586/krb5-1.6.2-7.1mdv2008.0.i586.rpm
94277e76faf2b75553c2e6250e428a43 2008.0/i586/krb5-server-1.6.2-7.1mdv2008.0.i586.rpm
695d5b85347b906401433fa55177be1a 2008.0/i586/krb5-workstation-1.6.2-7.1mdv2008.0.i586.rpm
4696cbae0ce644c265b74ff4ce59a865 2008.0/i586/libkrb53-1.6.2-7.1mdv2008.0.i586.rpm
cc8122a1c6a3449fc41d3022bbdffeb2 2008.0/i586/libkrb53-devel-1.6.2-7.1mdv2008.0.i586.rpm
d5e75835b35e81a3f7d038e501dabd1c 2008.0/i586/telnet-client-krb5-1.6.2-7.1mdv2008.0.i586.rpm
072b5ba782fbd1659ed8bde15bd11b5a 2008.0/i586/telnet-server-krb5-1.6.2-7.1mdv2008.0.i586.rpm
cfd133fde8cc72b038ea61dc94405701 2008.0/SRPMS/krb5-1.6.2-7.1mdv2008.0.src.rpm
Mandriva Linux 2008.0/X86_64:
7a8c1c390b1d1a0b2a8fe28e8fb6a458 2008.0/x86_64/ftp-client-krb5-1.6.2-7.1mdv2008.0.x86_64.rpm
9b312bd49bd858d00d00ec299866a275 2008.0/x86_64/ftp-server-krb5-1.6.2-7.1mdv2008.0.x86_64.rpm
19f7d0590227c4cc636ee5528db8027a 2008.0/x86_64/krb5-1.6.2-7.1mdv2008.0.x86_64.rpm
6a84bc19cb8e32f7331ce4c1ed36dc9d 2008.0/x86_64/krb5-server-1.6.2-7.1mdv2008.0.x86_64.rpm
dabaf97b9b36316dc2b69e9edc953793 2008.0/x86_64/krb5-workstation-1.6.2-7.1mdv2008.0.x86_64.rpm
2810bbed78b7480ff48b021a798cb5a1 2008.0/x86_64/lib64krb53-1.6.2-7.1mdv2008.0.x86_64.rpm
734b018e6b05204767d07a7d53ef2c3c 2008.0/x86_64/lib64krb53-devel-1.6.2-7.1mdv2008.0.x86_64.rpm
787fb5ea70eff84b91eea5d68c1e956d 2008.0/x86_64/telnet-client-krb5-1.6.2-7.1mdv2008.0.x86_64.rpm
d6224c005bc7c818c117e3fc61643840 2008.0/x86_64/telnet-server-krb5-1.6.2-7.1mdv2008.0.x86_64.rpm
cfd133fde8cc72b038ea61dc94405701 2008.0/SRPMS/krb5-1.6.2-7.1mdv2008.0.src.rpm
_______________________________________________________________________
To upgrade automatically use MandrivaUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.
All packages are signed by Mandriva for security.
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
______________________________________________________________________________
SUSE Security Announcement
Package: krb5
Announcement ID: SUSE-SA:2008:016
Date: Wed, 19 Mar 2008 10:00:00 +0000
Affected Products: SUSE LINUX 10.1
openSUSE 10.2
openSUSE 10.3
SUSE Linux Enterprise Desktop 10 SP1
SLE SDK 10 SP1
SUSE Linux Enterprise Server 10 SP1
Vulnerability Type: remote code execution
Severity (1-10): 7
SUSE Default Package: no
Cross-References: CVE-2008-0062
CVE-2008-0063
CVE-2008-0947
CVE-2008-0948
Content of This Advisory:
1) Security Vulnerability Resolved:
Problem Description
2) Solution or Work-Around
3) Special Instructions and Notes
4) Package Location and Checksums
5) Pending Vulnerabilities, Solutions, and Work-Arounds:
6) Authenticity Verification and Additional Information
______________________________________________________________________________
1) Problem Description and Brief Discussion
The krb5 package is the implementation of the Kerberos protocol suite
from MIT.
This update fixes three vulnerabilities, two of them are only possible if
krb4 support is enabled:
- CVE-2008-0062: null/dangling pointer (krb4)
- CVE-2008-0063: operations on uninitialized buffer content,
possible information leak (krb4)
- CVE-2008-0947/8: out-of-bound array
access in kadmind's RPC lib
2) Solution or Work-Around
Please install the new packages.
3) Special Instructions and Notes
Please restart the kerberos services.
4) Package Location and Checksums
The preferred method for installing security updates is to use the YaST
Online Update (YOU) tool. YOU detects which updates are required and
automatically performs the necessary steps to verify and install them.
Alternatively, download the update packages for your distribution manually
and verify their integrity by the methods listed in Section 6 of this
announcement. Then install the packages using the command
rpm -Fhv <file.rpm>
to apply the update, replacing <file.rpm> with the filename of the
downloaded RPM package.
x86 Platform:
openSUSE 10.3:
http://download.opensuse.org/pub/opensuse/update/10.3/rpm/i586/krb5-1.6.2-22.4.i586.rpm
53f6c9b454e27c47ec4cb32679757c48
http://download.opensuse.org/pub/opensuse/update/10.3/rpm/i586/krb5-apps-clients-1.6.2-22.4.i586.rpm
66ee0e785595b000842c5cd2c9162c55
http://download.opensuse.org/pub/opensuse/update/10.3/rpm/i586/krb5-apps-servers-1.6.2-22.4.i586.rpm
f3fba89b56860b8f46691c69bba8b3c7
http://download.opensuse.org/pub/opensuse/update/10.3/rpm/i586/krb5-client-1.6.2-22.4.i586.rpm
193a8298aa8bb866e19e0c48f23e523e
http://download.opensuse.org/pub/opensuse/update/10.3/rpm/i586/krb5-devel-1.6.2-22.4.i586.rpm
a9b01b5c846e02c588664cddcae4c5c6
http://download.opensuse.org/pub/opensuse/update/10.3/rpm/i586/krb5-server-1.6.2-22.4.i586.rpm
ff536136c01b5f900aebe6fdc1ec62e6
openSUSE 10.2:
ftp://ftp.suse.com/pub/suse/update/10.2/rpm/i586/krb5-1.5.1-23.14.i586.rpm
5764e87b834c6a5b8a467fa6aa8ec40e
ftp://ftp.suse.com/pub/suse/update/10.2/rpm/i586/krb5-apps-clients-1.5.1-23.14.i586.rpm
94db70009c4c6e099a9807584c701686
ftp://ftp.suse.com/pub/suse/update/10.2/rpm/i586/krb5-apps-servers-1.5.1-23.14.i586.rpm
5881c8be92dc3eb215a1e837b6468922
ftp://ftp.suse.com/pub/suse/update/10.2/rpm/i586/krb5-client-1.5.1-23.14.i586.rpm
c45980b430614c2371dd1ad4f8d21a34
ftp://ftp.suse.com/pub/suse/update/10.2/rpm/i586/krb5-devel-1.5.1-23.14.i586.rpm
1c6a45d60e5eabffedc2c1e3e755ac73
ftp://ftp.suse.com/pub/suse/update/10.2/rpm/i586/krb5-server-1.5.1-23.14.i586.rpm
03793b23aced1c01d9e2817648d7c777
SUSE LINUX 10.1:
ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/krb5-1.4.3-19.30.6.i586.rpm
51d1c53aaf25a36dd1e2e74662cbabd9
ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/krb5-apps-clients-1.4.3-19.30.6.i586.rpm
6b4d89a932988685993dba1e87aea95f
ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/krb5-apps-servers-1.4.3-19.30.6.i586.rpm
c7ff44ef5a8453d5223da71d670fdea4
ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/krb5-client-1.4.3-19.30.6.i586.rpm
bc0456ed7708ee3ffdc2501e849e9dbe
ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/krb5-devel-1.4.3-19.30.6.i586.rpm
9942cbbfd032ea80d8a20daa34ce5374
ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/krb5-server-1.4.3-19.30.6.i586.rpm
d4596d47caafa6ea4ee4b4f4e218f831
Power PC Platform:
openSUSE 10.3:
http://download.opensuse.org/pub/opensuse/update/10.3/rpm/ppc/krb5-1.6.2-22.4.ppc.rpm
f0d1399edebb3e1d715d84568065130a
http://download.opensuse.org/pub/opensuse/update/10.3/rpm/ppc/krb5-apps-clients-1.6.2-22.4.ppc.rpm
8e444214994c1e7297b5332d96967ec0
http://download.opensuse.org/pub/opensuse/update/10.3/rpm/ppc/krb5-apps-servers-1.6.2-22.4.ppc.rpm
2eecfe960c969bf3a3dcce2fcab010f0
http://download.opensuse.org/pub/opensuse/update/10.3/rpm/ppc/krb5-client-1.6.2-22.4.ppc.rpm
8052a7d7a942545a46fa5e962c562ab8
http://download.opensuse.org/pub/opensuse/update/10.3/rpm/ppc/krb5-devel-1.6.2-22.4.ppc.rpm
6a118f48123ebfc23715bf797bf8b7d0
http://download.opensuse.org/pub/opensuse/update/10.3/rpm/ppc/krb5-server-1.6.2-22.4.ppc.rpm
fd8f73d6d8757d9ce3dea43997b56b0c
openSUSE 10.2:
ftp://ftp.suse.com/pub/suse/update/10.2/rpm/ppc/krb5-1.5.1-23.14.ppc.rpm
04289bb24041d226f27eb92025b25463
ftp://ftp.suse.com/pub/suse/update/10.2/rpm/ppc/krb5-apps-clients-1.5.1-23.14.ppc.rpm
731ea1ef473c0d1c8990a8045a9fe587
ftp://ftp.suse.com/pub/suse/update/10.2/rpm/ppc/krb5-apps-servers-1.5.1-23.14.ppc.rpm
f911f86a0d2e8c9da16930525bd8b163
ftp://ftp.suse.com/pub/suse/update/10.2/rpm/ppc/krb5-client-1.5.1-23.14.ppc.rpm
a4c560015bbaddcbc88603e1e194146e
ftp://ftp.suse.com/pub/suse/update/10.2/rpm/ppc/krb5-devel-1.5.1-23.14.ppc.rpm
64d0f163ebff972f2e70c6cc4d760555
ftp://ftp.suse.com/pub/suse/update/10.2/rpm/ppc/krb5-server-1.5.1-23.14.ppc.rpm
8b06dc5e5ac5b3fa410559017403378a
SUSE LINUX 10.1:
ftp://ftp.suse.com/pub/suse/update/10.1/rpm/ppc/krb5-1.4.3-19.30.6.ppc.rpm
ae1652f3ea622c5c91b0fd1d47b066ef
ftp://ftp.suse.com/pub/suse/update/10.1/rpm/ppc/krb5-apps-clients-1.4.3-19.30.6.ppc.rpm
a389841f387e37732c80d9d5095f9ae6
ftp://ftp.suse.com/pub/suse/update/10.1/rpm/ppc/krb5-apps-servers-1.4.3-19.30.6.ppc.rpm
cb6b4e402570e45767c5ae7a5c26e34c
ftp://ftp.suse.com/pub/suse/update/10.1/rpm/ppc/krb5-client-1.4.3-19.30.6.ppc.rpm
3a2c13bc932e84f7a451f3a2c77c99f0
ftp://ftp.suse.com/pub/suse/update/10.1/rpm/ppc/krb5-devel-1.4.3-19.30.6.ppc.rpm
b34f9511e269e0dfc2896ac88cf41cce
ftp://ftp.suse.com/pub/suse/update/10.1/rpm/ppc/krb5-server-1.4.3-19.30.6.ppc.rpm
0263cbb8f0f41e50dacfed082eca0835
x86-64 Platform:
openSUSE 10.3:
http://download.opensuse.org/pub/opensuse/update/10.3/rpm/x86_64/krb5-1.6.2-22.4.x86_64.rpm
6df39c9ddfb04cd4889b5f4bb271213a
http://download.opensuse.org/pub/opensuse/update/10.3/rpm/x86_64/krb5-32bit-1.6.2-22.4.x86_64.rpm
77ba221640964cc90ad8e0010ad5c07e
http://download.opensuse.org/pub/opensuse/update/10.3/rpm/x86_64/krb5-apps-clients-1.6.2-22.4.x86_64.rpm
fccb50e18045baa2c78165f20eb13eec
http://download.opensuse.org/pub/opensuse/update/10.3/rpm/x86_64/krb5-apps-servers-1.6.2-22.4.x86_64.rpm
3bfd6270a31f2a6a35728bcd274ae327
http://download.opensuse.org/pub/opensuse/update/10.3/rpm/x86_64/krb5-client-1.6.2-22.4.x86_64.rpm
53b3634e9e92255b62a932ed6d30742d
http://download.opensuse.org/pub/opensuse/update/10.3/rpm/x86_64/krb5-devel-1.6.2-22.4.x86_64.rpm
54071b2e12004117b0599f53c4a6027b
http://download.opensuse.org/pub/opensuse/update/10.3/rpm/x86_64/krb5-devel-32bit-1.6.2-22.4.x86_64.rpm
07069062d1e7b140c6774cc2aaa821d5
http://download.opensuse.org/pub/opensuse/update/10.3/rpm/x86_64/krb5-server-1.6.2-22.4.x86_64.rpm
b07d395220662db193b6f54753931ccc
openSUSE 10.2:
ftp://ftp.suse.com/pub/suse/update/10.2/rpm/x86_64/krb5-1.5.1-23.14.x86_64.rpm
3f2d8918cf5da2cab839bf2c72af1495
ftp://ftp.suse.com/pub/suse/update/10.2/rpm/x86_64/krb5-32bit-1.5.1-23.14.x86_64.rpm
4348a17ec69b6c64c69e11f74fa88a08
ftp://ftp.suse.com/pub/suse/update/10.2/rpm/x86_64/krb5-apps-clients-1.5.1-23.14.x86_64.rpm
433ffcced3ede0163628854ae3296baf
ftp://ftp.suse.com/pub/suse/update/10.2/rpm/x86_64/krb5-apps-servers-1.5.1-23.14.x86_64.rpm
c24ab880f1314c1d25f3e9561b204c10
ftp://ftp.suse.com/pub/suse/update/10.2/rpm/x86_64/krb5-client-1.5.1-23.14.x86_64.rpm
6022c2534c50718a2a4fd18fde346daf
ftp://ftp.suse.com/pub/suse/update/10.2/rpm/x86_64/krb5-devel-1.5.1-23.14.x86_64.rpm
d82a0204e6e0f5e9d6bcd8f60aa4fbde
ftp://ftp.suse.com/pub/suse/update/10.2/rpm/x86_64/krb5-devel-32bit-1.5.1-23.14.x86_64.rpm
17dc2896ebc7f252e39fc8e23a41abc1
ftp://ftp.suse.com/pub/suse/update/10.2/rpm/x86_64/krb5-server-1.5.1-23.14.x86_64.rpm
45596c22ec6d0c1eebf42f683e4e0cd4
SUSE LINUX 10.1:
ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/krb5-1.4.3-19.30.6.x86_64.rpm
684c7d1363494a7854afd3755bdb2a20
ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/krb5-32bit-1.4.3-19.30.6.x86_64.rpm
b8552a99f0785f1eee434f6d7293731a
ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/krb5-apps-clients-1.4.3-19.30.6.x86_64.rpm
060fac873ba1bc13e4b5b813ae6a6cd2
ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/krb5-apps-servers-1.4.3-19.30.6.x86_64.rpm
28235a5328a8a982e2a1784793a17863
ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/krb5-client-1.4.3-19.30.6.x86_64.rpm
056f5e479561d2b831e3dd969261f8de
ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/krb5-devel-1.4.3-19.30.6.x86_64.rpm
d81c85af0ca1812c273bbd1c6ddf3cb1
ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/krb5-devel-32bit-1.4.3-19.30.6.x86_64.rpm
d17b2d40649a83e28afd6a7a3dec96d6
ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/krb5-server-1.4.3-19.30.6.x86_64.rpm
dd8096c153fb51bdd67352cbe8a51953
Sources:
openSUSE 10.3:
http://download.opensuse.org/pub/opensuse/update/10.3/rpm/src/krb5-1.6.2-22.4.src.rpm
6ead1c530f58e6255b1c9ba1b78eb3ae
openSUSE 10.2:
ftp://ftp.suse.com/pub/suse/update/10.2/rpm/src/krb5-1.5.1-23.14.src.rpm
add4417c6743a6dd26f35182e85ee956
SUSE LINUX 10.1:
ftp://ftp.suse.com/pub/suse/update/10.1/rpm/src/krb5-1.4.3-19.30.6.src.rpm
2185d5b60fe733640f16a3a561ec6888
Our maintenance customers are notified individually. The packages are
offered for installation from the maintenance web:
SUSE Linux Enterprise Server 10 SP1
http://support.novell.com/techcenter/psdb/a1cba9b24d53ae5d2b80a81acd449edb.html
SLE SDK 10 SP1
http://support.novell.com/techcenter/psdb/a1cba9b24d53ae5d2b80a81acd449edb.html
SUSE Linux Enterprise Desktop 10 SP1
http://support.novell.com/techcenter/psdb/a1cba9b24d53ae5d2b80a81acd449edb.html
______________________________________________________________________________
5) Pending Vulnerabilities, Solutions, and Work-Arounds:
Please read our weekly security report.
______________________________________________________________________________
6) Authenticity Verification and Additional Information
- Announcement authenticity verification:
SUSE security announcements are published via mailing lists and on Web
sites. The authenticity and integrity of a SUSE security announcement is
guaranteed by a cryptographic signature in each announcement. All SUSE
security announcements are published with a valid signature.
To verify the signature of the announcement, save it as text into a file
and run the command
gpg --verify <file>
replacing <file> with the name of the file where you saved the
announcement. The output for a valid signature looks like:
gpg: Signature made <DATE> using RSA key ID 3D25D3D9
gpg: Good signature from "SuSE Security Team <security@suse.de>"
where <DATE> is replaced by the date the document was signed.
If the security team's key is not contained in your key ring, you can
import it from the first installation CD. To import the key, use the
command
gpg --import gpg-pubkey-3d25d3d9-36e12d04.asc
- Package authenticity verification:
SUSE update packages are available on many mirror FTP servers all over the
world. While this service is considered valuable and important to the free
and open source software community, the authenticity and the integrity of
a package needs to be verified to ensure that it has not been tampered
with.
There are two verification methods that can be used independently from
each other to prove the authenticity of a downloaded file or RPM package:
1) Using the internal gpg signatures of the rpm package
2) MD5 checksums as provided in this announcement
1) The internal rpm package signatures provide an easy way to verify the
authenticity of an RPM package. Use the command
rpm -v --checksig <file.rpm>
to verify the signature of the package, replacing <file.rpm> with the
filename of the RPM package downloaded. The package is unmodified if it
contains a valid signature from build@suse.de with the key ID 9C800ACA.
This key is automatically imported into the RPM database (on
RPMv4-based distributions) and the gpg key ring of 'root' during
installation. You can also find it on the first installation CD and at
the end of this announcement.
2) If you need an alternative means of verification, use the md5sum
command to verify the authenticity of the packages. Execute the command
md5sum <filename.rpm>
after you downloaded the file from a SUSE FTP server or its mirrors.
Then compare the resulting md5sum with the one that is listed in the
SUSE security announcement. Because the announcement containing the
checksums is cryptographically signed (by security@suse.de), the
checksums show proof of the authenticity of the package if the
signature of the announcement is valid. Note that the md5 sums
published in the SUSE Security Announcements are valid for the
respective packages only. Newer versions of these packages cannot be
verified.
- SUSE runs two security mailing lists to which any interested party may
subscribe:
opensuse-security@opensuse.org
- General Linux and SUSE security discussion.
All SUSE security announcements are sent to this list.
To subscribe, send an e-mail to
<opensuse-security+subscribe@opensuse.org>.
opensuse-security-announce@opensuse.org
- SUSE's announce-only mailing list.
Only SUSE's security announcements are sent to this list.
To subscribe, send an e-mail to
<opensuse-security-announce+subscribe@opensuse.org>.
=====================================================================
SUSE's security contact is <security@suse.com> or <security@suse.de>.
The <security@suse.de> public key is listed below.
=====================================================================
______________________________________________________________________________
The information in this advisory may be distributed or reproduced,
provided that the advisory is not modified in any way. In particular, the
clear text signature should show proof of the authenticity of the text.
SUSE Linux Products GmbH provides no warranties of any kind whatsoever
with respect to the information contained in this security advisory.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
- -------------------------------------------------------------------
VMware Security Advisory
Advisory ID: VMSA-2008-0009
Synopsis: Updates to VMware Workstation, VMware Player,
VMware ACE, VMware Fusion, VMware Server, VMware
VIX API, VMware ESX, VMware ESXi resolve critical
security issues
Issue date: 2008-06-04
Updated on: 2008-06-04 (initial release of advisory)
CVE numbers: CVE-2007-5671 CVE-2008-0967 CVE-2008-2097
CVE-2008-2100 CVE-2006-1721 CVE-2008-0553
CVE-2007-5378 CVE-2007-4772 CVE-2008-0888
CVE-2008-0062 CVE-2008-0063 CVE-2008-0948
- -------------------------------------------------------------------
1. Summary:
Several critical security vulnerabilities have been addressed
in patches in ESX and in the newest releases of VMware's hosted
product line.
2. Relevant releases:
VMware Workstation 6.0.3 and earlier,
VMware Workstation 5.5.6 and earlier,
VMware Player 2.0.3 and earlier,
VMware Player 1.0.6 and earlier,
VMware ACE 2.0.3 and earlier,
VMware ACE 1.0.5 and earlier,
VMware Server 1.0.5 and earlier,
VMware Fusion 1.1.1 and earlier
VMware ESXi 3.5 without patches ESXe350-200805501-I-SG,
ESXe350-200805502-T-SG,
ESXe350-200805503-C-SG
VMware ESX 3.5 without patches ESX350-200805515-SG, ESX350-200805508-SG,
ESX350-200805501-BG, ESX350-200805504-SG,
ESX350-200805506-SG, ESX350-200805505-SG,
ESX350-200805507-SG
VMware ESX 3.0.2 without patches ESX-1004727, ESX-1004821, ESX-1004216,
ESX-1004726, ESX-1004722, ESX-1004724,
ESX-1004719, ESX-1004219
VMware ESX 3.0.1 without patches ESX-1004186, ESX-1004728, ESX-1004725,
ESX-1004721, ESX-1004723, ESX-1004190,
ESX-1004189
VMware ESX 2.5.5 without update patch 8
VMware ESX 2.5.4 without update patch 19
NOTES: Hosted products VMware Workstation 5.x, VMware Player 1.x,
and VMware ACE 1.x will reach end of general support
2008-11-09. Customers should plan to upgrade to the latest
version of their respective products.
ESX 3.0.1 is in Extended Support and its end of extended
support (Security and Bug fixes) is 2008-07-31. Users should plan
to upgrade to at least 3.0.2 update 1 and preferably the newest
release available before the end of extended support.
ESX 2.5.4 is in Extended Support and its end of extended support
(Security and Bug fixes) is 2008-10-08. Users should plan to upgrade
to at least 2.5.5 and preferably the newest release available before
the end of extended support.
3. Problem description:
a. VMware Tools Local Privilege Escalation on Windows-based guest OS
The VMware Tools Package provides support required for shared folders
(HGFS) and other features.
An input validation error is present in the Windows-based VMware
HGFS.sys driver. Exploitation of this flaw might result in
arbitrary code execution on the guest system by an unprivileged
guest user. It doesn't matter on what host the Windows guest OS
is running, as this is a guest driver vulnerability and not a
vulnerability on the host.
The HGFS.sys driver is present in the guest operating system if the
VMware Tools package is loaded. Even if the host has HGFS disabled
and has no shared folders, Windows-based guests may be affected. This
is regardless if a host supports HGFS.
This issue could be mitigated by removing the VMware Tools package
from Windows based guests. However this is not recommended as it
would impact usability of the product.
NOTE: Installing the new hosted release or ESX patches will not
remediate the issue. The VMware Tools packages will need
to be updated on each Windows-based guest followed by a
reboot of the guest system.
VMware would like to thank iDefense and Stephen Fewer of Harmony
Security for reporting this issue to us.
The Common Vulnerabilities and Exposures project (cve.mitre.org)
has assigned the name CVE-2007-5671 to this issue.
VMware Product Running Replace with/
Product Version on Apply Patch
============ ======== ======= =================
Workstation 6.x Windows not affected
Workstation 6.x Linux not affected
Workstation 5.x Windows 5.5.6 build 80404 or later
Workstation 5.x Linux 5.5.6 build 80404 or later
Player 2.x Windows not affected
Player 2.x Linux not affected
Player 1.x Windows 1.0.6 build 80404 or later
Player 1.x Linux 1.0.6 build 80404 or later
ACE 2.x Windows not affected
ACE 1.x Windows 1.0.5 build 79846 or later
Server 1.x Windows 1.0.5 build 80187 or later
Server 1.x Linux 1.0.5 build 80187 or later
Fusion 1.x Mac OS/X not affected
ESXi 3.5 ESXi not affected
ESX 3.5 ESX not affected
ESX 3.0.2 ESX ESX-1004727
ESX 3.0.1 ESX ESX-1004186
ESX 2.5.5 ESX ESX 2.5.5 upgrade patch 5 or later
ESX 2.5.4 ESX ESX 2.5.4 upgrade patch 16 or later
b. Privilege escalation on ESX or Linux based hosted operating systems
This update fixes a security issue related to local exploitation of
an untrusted library path vulnerability in vmware-authd. In order to
exploit this vulnerability, an attacker must have local access and
the ability to execute the set-uid vmware-authd binary on an affected
system. Exploitation of this flaw might result in arbitrary code
execution on the Linux host system by an unprivileged user.
VMware would like to thank iDefense for reporting this issue to us.
The Common Vulnerabilities and Exposures project (cve.mitre.org)
has assigned the name CVE-2008-0967 to this issue.
VMware Product Running Replace with/
Product Version on Apply Patch
============ ======== ======= =================
Workstation 6.x Windows not affected
Workstation 6.x Linux 6.0.4 build 93057
Workstation 5.x Windows not affected
Workstation 5.x Linux 5.5.7 build 91707
Player 2.x Windows not affected
Player 2.x Linux 2.0.4 build 93057
Player 1.x Windows not affected
Player 1.x Linux 1.0.7 build 91707
ACE 2.x Windows not affected
ACE 1.x Windows not affected
Server 1.x Windows not affected
Server 1.x Linux 1.0.6 build 91891
Fusion 1.x Mac OS/X not affected
ESXi 3.5 ESXi ESXe350-200805501-I-SG
ESX 3.5 ESX ESX350-200805515-SG
ESX 3.0.2 ESX ESX-1004821
ESX 3.0.1 ESX ESX-1004728
ESX 2.5.5 ESX ESX 2.5.5 update patch 8
ESX 2.5.4 ESX ESX 2.5.4 update patch 19
c. Openwsman Invalid Content-Length Vulnerability
Openwsman is a system management platform that implements the Web
Services Management protocol (WS-Management). It is installed and
running by default. It is used in the VMware Management Service
Console and in ESXi.
The openwsman management service on ESX 3.5 and ESXi 3.5 is vulnerable
to a privilege escalation vulnerability, which may allow users with
non-privileged ESX or Virtual Center accounts to gain root privileges.
To exploit this vulnerability, an attacker would need a local ESX
account or a VirtualCenter account with the Host.Cim.CimInteraction
permission.
Systems with no local ESX accounts and no VirtualCenter accounts with
the Host.Cim.CimInteraction permission are not vulnerable.
This vulnerability cannot be exploited by users without valid login
credentials.
Discovery: Alexander Sotirov, VMware Security Research
The Common Vulnerabilities and Exposures project (cve.mitre.org)
has assigned the name CVE-2008-2097 to this issue.
VMware Product Running Replace with/
Product Version on Apply Patch
============ ======== ======= =================
hosted any any not affected
ESXi 3.5 ESXi ESXe350-200805501-I-SG
ESX 3.5 ESX ESX350-200805508-SG
ESX 3.0.2 ESX not affected
ESX 3.0.1 ESX not affected
ESX 2.5.5 ESX not affected
ESX 2.5.4 ESX not affected
NOTE: VMware hosted products are not affected by this issue.
d. VMware VIX Application Programming Interface (API) Memory Overflow
Vulnerabilities
The VIX API (also known as "Vix") is an API that lets users write scripts
and programs to manipulate virtual machines.
Multiple buffer overflow vulnerabilities are present in the VIX API.
Exploitation of these vulnerabilities might result in code execution on
the host system or on the service console in ESX Server from the guest
operating system.
The VIX API can be enabled and disabled using the "vix.inGuest.enable"
setting in the VMware configuration file. This default value for this
setting is "disabled". This configuration setting is present in the
following products:
VMware Workstation 6.0.2 and higher
VMware ACE 6.0.2 and higher
VMware Server 1.06 and higher
VMware Fusion 1.1.2 and higher
ESX Server 3.0 and higher
ESX Server 3.5 and higher
In previous versions of VMware products where the VIX API was introduced,
the VIX API couldn't be disabled.
The Common Vulnerabilities and Exposures project (cve.mitre.org)
has assigned the name CVE-2008-2100 to this issue.
VMware Product Running Replace with/
Product Version on Apply Patch
============ ======== ======= =================
VIX API 1.1.x Windows VMware-vix-1.1.4-93057.exe
VIX API 1.1.x Linux VMware-vix-1.1.4-93057.i386.tar.gz
VIX API 1.1.x Linux64 VMware-vix-1.1.4-93057.x86_64.tar.gz
Workstation 6.x Windows 6.0.4 build 93057
Workstation 6.x Linux 6.0.4 build 93057
Workstation 5.x Windows 5.5.7 build 91707
Workstation 5.x Linux 5.5.7 build 91707
Player 2.x Windows 2.0.4 build 93057
Player 2.x Linux 2.0.4 build 93057
Player 1.x Windows 1.0.6 build 91707
Player 1.x Linux 1.0.6 build 91707
ACE 2.x Windows 2.0.4 build 93057
ACE 1.x Windows not affected
Server 1.x Windows 1.0.6 build 91891
Server 1.x Linux 1.0.6 build 91891
Fusion 1.x Mac OS/X 1.1.2 build 87978 or later
ESXi 3.5 ESXi ESXe350-200805501-I-SG,
ESXe350-200805502-T-SG
ESX 3.5 ESX ESX350-200805501-BG
ESX 3.0.2 ESX ESX-1004216, ESX-1004726, ESX-1004727
ESX 3.0.1 ESX ESX-1004186, ESX-1004725
ESX 2.5.5 ESX not affected
ESX 2.5.4 ESX not affected
II Service Console rpm updates
NOTE: ESXi and hosted products are not affected by any service console
security updates
a. Security update for cyrus-sasl
Updated cyrus-sasl package for the ESX Service Console corrects a security
issue found in the DIGEST-MD5 authentication mechanism of Cyrus'
implementation of Simple Authentication and Security Layer (SASL). As a
result of this issue in the authentication mechanism, a remote
unauthenticated attacker might be able to cause a denial of service error
on the service console.
The Common Vulnerabilities and Exposures project (cve.mitre.org) has
assigned the name CVE-2006-1721 to this issue.
RPMs Updated:
cyrus-sasl-2.1.15-15.i386.rpm
cyrus-sasl-md5-2.1.15-1.i386.rpm
VMware Product Running Replace with/
Product Version on Apply Patch
============ ======== ======= =================
hosted any any not affected
ESXi 3.5 ESXi not affected
ESX 3.5 ESX ESX350-200805504-SG
ESX 3.0.2 ESX ESX-1004722
ESX 3.0.1 ESX ESX-1004721
ESX 2.5.5 ESX not affected
ESX 2.5.4 ESX not affected
b. Security update for tcltk
An input validation flaw was discovered in Tk's GIF image handling. A
code-size value read from a GIF image was not properly validated before
being used, leading to a buffer overflow. A specially crafted GIF file
could use this to cause a crash or, potentially, execute code with the
privileges of the application using the Tk graphical toolkit.
The Common Vulnerabilities and Exposures project (cve.mitre.org) has
assigned the name CVE-2008-0553 to this issue.
A buffer overflow flaw was discovered in Tk's animated GIF image handling.
An animated GIF containing an initial image smaller than subsequent images
could cause a crash or, potentially, execute code with the privileges of
the application using the Tk library.
The Common Vulnerabilities and Exposures project (cve.mitre.org) has
assigned the name CVE-2007-5378 to this issue.
A flaw first discovered in the Tcl regular expression engine used in the
PostgreSQL database server, resulted in an infinite loop when processing
certain regular expressions.
The Common Vulnerabilities and Exposures project (cve.mitre.org) has
assigned the name CVE-2007-4772 to this issue.
RPM Updated:
tcl-8.3.5-92.8.i386.rpm
VMware Product Running Replace with/
Product Version on Apply Patch
============ ======== ======= =================
hosted any any not affected
ESXi 3.5 ESXi not affected
ESX 3.5 ESX ESX350-200805506-SG
ESX 3.0.2 ESX ESX-1004724
ESX 3.0.1 ESX ESX-1004723
ESX 2.5.5 ESX ESX 2.5.5 Upgrade Patch 8
ESX 2.5.4 ESX ESX 2.5.4 Upgrade Patch 19
c. Security update for unzip
This patch includes a moderate security update to the service console that
fixes a flaw in unzip. An attacker could execute malicious code with a
user's privileges if the user ran unzip on a file designed to leverage
this flaw.
The Common Vulnerabilities and Exposures project (cve.mitre.org) has
assigned the name CVE-2008-0888 to this issue.
RPM Updated:
Unzip-5.50-36.EL3.i386.rpm
VMware Product Running Replace with/
Product Version on Apply Patch
============ ======== ======= =================
hosted any any not affected
ESXi 3.5 ESXi not affected
ESX 3.5 ESX ESX350-200805505-SG
ESX 3.0.2 ESX ESX-1004719
ESX 3.0.1 ESX ESX-1004190
ESX 2.5.5 ESX ESX 2.5.5 Upgrade Patch 8
ESX 2.5.4 ESX ESX 2.5.4 Upgrade Patch 19
d.
The Common Vulnerabilities and Exposures project (cve.mitre.org)
has assigned the name CVE-2008-0062 to this issue.
NOTE: ESX doesn't contain the krb5kdc binary and is not vulnerable
to this issue.
NOTE: ESX doesn't contain the krb5kdc binary and is not vulnerable
to this issue.
The Common Vulnerabilities and Exposures project (cve.mitre.org)
has assigned the name CVE-2008-0948 to this issue.
RPM Updated:
krb5-libs-1.2.7-68.i386.rpm
VMware Product Running Replace with/
Product Version on Apply Patch
============ ======== ======= =================
hosted any any not affected
ESXi 3.5 ESXi not affected
ESX 3.5 ESX ESX350-200805507-SG
ESX 3.0.2 ESX ESX-1004219
ESX 3.0.1 ESX ESX-1004189
ESX 2.5.5 ESX ESX 2.5.5 Upgrade Patch 8
ESX 2.5.4 ESX ESX 2.5.4 Upgrade Patch 19
4. Solution:
Please review the release notes for your product and version and verify the
md5sum of your downloaded file.
VMware Workstation 6.0.4
------------------------
http://www.vmware.com/download/ws/
Release notes:
http://www.vmware.com/support/ws6/doc/releasenotes_ws6.html
Windows binary
md5sum: f50a05831e94c19d98f363c752fca5f9
RPM Installation file for 32-bit Linux
md5sum: e7793b14b995d3b505f093c84e849421
tar Installation file for 32-bit Linux
md5sum: a0a8e1d8188f4be03357872a57a767ab
RPM Installation file for 64-bit Linux
md5sum: 960d753038a268b8f101f4b853c0257e
tar Installation file for 64-bit Linux
md5sum: 4697ec8a9d6c1152d785f3b77db9d539
VMware Workstation 5.5.7
------------------------
http://www.vmware.com/download/ws/ws5.html
Release notes:
http://www.vmware.com/support/ws55/doc/releasenotes_ws55.html
Windows binary:
md5sum: 4c6a6653b7296240197aac048591c659
Compressed Tar archive for 32-bit Linux
md5sum: 8fc15d72031489cf5cd5d47b966787e6
Linux RPM version for 32-bit Linux
md5sum: f0872fe447ac654a583af16b2f4bba3f
VMware Player 2.0.4 and 1.0.7
-----------------------------
http://www.vmware.com/download/player/
Release notes Player 1.x:
http://www.vmware.com/support/player/doc/releasenotes_player.html
Release notes Player 2.0
http://www.vmware.com/support/player2/doc/releasenotes_player2.html
2.0.4 Windows binary
md5sum: a117664a8bfa7336b846117e5fc048dd
VMware Player 2.0.4 for Linux (.rpm)
md5sum: de6ab6364a0966b68eadda2003561cd2
VMware Player 2.0.4 for Linux (.tar)
md5sum: 9e1c2bfda6b22a3fc195a86aec11903a
VMware Player 2.0.4 - 64-bit (.rpm)
md5sum: 997e5ceffe72f9ce9146071144dacafa
VMware Player 2.0.4 - 64-bit (.tar)
md5sum: 18eb4ee49dd7e33ec155ef69d7d259ef
1.0.7 Windows binary
md5sum: 51114b3b433dc1b3bf3e434aebbf2b9c
Player 1.0.7 for Linux (.rpm)
md5sum: 3b5f97a37df3b984297fa595a5cdba9c
Player 1.0.7 for Linux (.tar)
md5sum: b755739144944071492a16fa20f86a51
VMware ACE
----------
http://www.vmware.com/download/ace/
Release notes 2.0:
http://www.vmware.com/support/ace2/doc/releasenotes_ace2.html
VMware-workstation-6.0.4-93057.exe
md5sum: f50a05831e94c19d98f363c752fca5f9
VMware-ACE-Management-Server-Appliance-2.0.4-93057.zip
md5sum: d2ae2246f3d87268cf84c1421d94e86c
VMware-ACE-Management-Server-2.0.4-93057.exe
md5sum: 41b31b3392d5da2cef77a7bb28654dbf
VMware-ACE-Management-Server-2.0.4-93057.i386-rhel4.rpm
md5sum: 9920be4c33773df53a1728b41af4b109
VMware-ACE-Management-Server-2.0.4-93057.i386-sles9.rpm
md5sum: 4ec4c37203db863e8844460b5e80920b
Release notes 1.x:
http://www.vmware.com/support/ace/doc/releasenotes_ace.html
VMware-ACE-1.0.6-89199.exe
md5sum: 110f6e24842a0d154d9ec55ef9225f4f
VMware Server 1.0.6
-------------------
http://www.vmware.com/download/server/
Release notes:
http://www.vmware.com/support/server/doc/releasenotes_server.html
VMware Server for Windows 32-bit and 64-bit
md5sum: 3e00d5cfae123d875e4298bddabf12f5
VMware Server Windows client package
md5sum: 64f3fc1b4520626ae465237d7ec4773e
VMware Server for Linux
md5sum: 46ea876bfb018edb6602a921f6597245
VMware Server for Linux rpm
md5sum: 9d2f0af908aba443ef80bec8f7ef3485
Management Interface
md5sum: 1b3daabbbb49a036fe49f53f812ef64b
VMware Server Linux client package
md5sum: 185e5b174659f366fcb38b1c4ad8d3c6
VMware Fusion 1.1.3
--------------
http://www.vmware.com/download/fusion/
Release notes:
http://www.vmware.com/support/fusion/doc/releasenotes_fusion.html
md5sum: D15A3DFD3E7B11FC37AC684586086D
VMware VIX 1.1.4
----------------
http://www.vmware.com/support/developer/vix-api/
Release notes:
http://www.vmware.com/support/pubs/vix-api/VIXAPI-1.1.4-Release-Notes.html
VMware-vix-1.1.4-93057.exe
md5sum: 2efb74618c7ead627ecb3b3033e3f9f6
VMware-vix-1.1.4-93057.i386.tar.gz
md5sum: 988df2b2bbc975a6fc11f27ad1519832
VMware-vix-1.1.4-93057.x86_64.tar.gz
md5sum: a64f951c6fb5b2795a29a5a7607059c0
ESXi
----
VMware ESXi 3.5 patch ESXe350-200805501-O-SG (authd, openwsman, VIX)
http://download3.vmware.com/software/esx/ESXe350-200805501-O-SG.zip
md5sum: 4ce06985d520e94243db1e0504a56d8c
http://kb.vmware.com/kb/1005073
http://kb.vmware.com/kb/1004173
http://kb.vmware.com/kb/1004172
NOTE: ESXe350-200805501-O-SG contains the following patch bundles:
ESXe350-200805501-I-SG, ESXe350-200805502-T-SG,
ESXe350-200805503-C-SG
ESX
---
VMware ESX 3.5 patch ESX350-200805515-SG (authd)
http://download3.vmware.com/software/esx/ESX350-200805515-SG.zip
md5sum: 324b50ade230bcd5079a76e3636163c5
http://kb.vmware.com/kb/1004170
VMware ESX 3.5 patch ESX350-200805508-SG (openwsman)
http://download3.vmware.com/software/esx/ESX350-200805508-SG.zip
md5sum: 3ff8c06d4a9dd406f64f89c51bf26d12
http://kb.vmware.com/kb/1004644
VMware ESX 3.5 patch ESX350-200805501-BG (VIX)
http://download3.vmware.com/software/esx/ESX350-200805501-BG.zip
md5sum: 31a620aa249c593c30015b5b6f8c8650
http://kb.vmware.com/kb/1004637
VMware ESX 3.5 patch ESX350-200805504-SG (cyrus-sasl)
http://download3.vmware.com/software/esx/ESX350-200805504-SG.zip
md5sum: 4c1b1a8dcb09a636b55c64c290f7de51
http://kb.vmware.com/kb/1004640
VMware ESX 3.5 patch ESX350-200805506-SG (tcltk)
http://download3.vmware.com/software/esx/ESX350-200805506-SG.zip
md5sum: af279eef8fdeddb7808630da1ae717b1
http://kb.vmware.com/kb/1004642
VMware ESX 3.5 patch ESX350-200805505-SG (unzip)
http://download3.vmware.com/software/esx/ESX350-200805505-SG.zip
md5sum: 07af82d9fd97cccb89d9b90c6ecc41c6
http://kb.vmware.com/kb/1004641
VMware ESX 3.5 patch ESX350-200805507-SG (krb5)
http://download3.vmware.com/software/esx/ESX350-200805507-SG.zip
md5sum: 5d35a1c470daf13c9f4df5bdc9438748
http://kb.vmware.com/kb/1004643
VMware ESX 3.0.2 patch ESX-1004727 (HGFS,VIX)
http://download3.vmware.com/software/vi/ESX-1004727.tgz
md5sum: 31a67b0fa3449747887945f8d370f19e
http://kb.vmware.com/kb/1004727
VMware ESX 3.0.2 patch ESX-1004821 (authd)
http://download3.vmware.com/software/vi/ESX-1004821.tgz
md5sum: 5c147bedd07245c903d44257522aeba1
http://kb.vmware.com/kb/1004821
VMware ESX 3.0.2 patch ESX-1004216 (VIX)
http://download3.vmware.com/software/vi/ESX-1004216.tgz
md5sum: 0784ef70420d28a9a5d6113769f6669a
http://kb.vmware.com/kb/1004216
VMware ESX 3.0.2 patch ESX-1004726 (VIX)
http://download3.vmware.com/software/vi/ESX-1004726.tgz
md5sum: 44f03b274867b534cd274ccdf4630b86
http://kb.vmware.com/kb/1004726
VMware ESX 3.0.2 patch ESX-1004722 (cyrus-sasl)
http://download3.vmware.com/software/vi/ESX-1004722.tgz
md5sum: 99dc71aed5bab7711f573b6d322123d6
http://kb.vmware.com/kb/1004722
VMware ESX 3.0.2 patch ESX-1004724 (tcltk)
http://download3.vmware.com/software/vi/ESX-1004724.tgz
md5sum: fd9a160ca7baa5fc443f2adc8120ecf7
http://kb.vmware.com/kb/1004724
VMware ESX 3.0.2 patch ESX-1004719 (unzip)
http://download3.vmware.com/software/vi/ESX-1004719.tgz
md5sum: f0c37b9f6be3399536d60f6c6944de82
http://kb.vmware.com/kb/1004719
VMware ESX 3.0.2 patch ESX-1004219 (krb5)
http://download3.vmware.com/software/vi/ESX-1004219.tgz
md5sum: 7c68279762f407a7a5ee151a650ebfd4
http://kb.vmware.com/kb/1004219
VMware ESX 3.0.1 patch ESX-1004186 (HGFS,VIX)
http://download3.vmware.com/software/vi/ESX-1004186.tgz
md5sum: f64389a8b97718eccefadce1a14d1198
http://kb.vmware.com/kb/1004186
VMware ESX 3.0.1 patch ESX-1004728 (authd)
http://download3.vmware.com/software/vi/ESX-1004728.tgz
md5sum: 1f01bb819805b855ffa2ec1040eff5ca
http://kb.vmware.com/kb/1004728
VMware ESX 3.0.1 patch ESX-1004725 (VIX)
http://download3.vmware.com/software/vi/ESX-1004725.tgz
md5sum: 9fafb04c6d3f6959e623832f539d2dc8
http://kb.vmware.com/kb/1004725
VMware ESX 3.0.1 patch ESX-1004721 (cyrus-sasl)
http://download3.vmware.com/software/vi/ESX-1004721.tgz
md5sum: 48190819b0f5afddefcb8d209d12b585
http://kb.vmware.com/kb/1004721
VMware ESX 3.0.1 patch ESX-1004723 (tcltk)
http://download3.vmware.com/software/vi/ESX-1004723.tgz
md5sum: c34ca0a5886e0c0917a93a97c331fd7d
http://kb.vmware.com/kb/1004723
VMware ESX 3.0.1 patch ESX-1004190 (unzip)
http://download3.vmware.com/software/vi/ESX-1004190.tgz
md5sum: 05187b9f534048c79c62741367cc0dd2
http://kb.vmware.com/kb/1004190
VMware ESX 3.0.1 patch ESX-1004189 (krb5)
http://download3.vmware.com/software/vi/ESX-1004189.tgz
md5sum: 21b620530b99009f469c872e73a439e8
http://kb.vmware.com/kb/1004189
VMware ESX 2.5.5 Upgrade Patch 8
http://download3.vmware.com/software/esx/esx-2.5.5-90521-upgrade.tar.gz
md5sum: 392b6947fc3600ca0e8e7788cd5bbb6e
http://vmware.com/support/esx25/doc/esx-255-200805-patch.html
VMware ESX 2.5.4 Upgrade Patch 19
http://download3.vmware.com/software/esx/esx-2.5.4-90520-upgrade.tar.gz
md5sum: 442788fd0bccb0d994c75b268bd12760
http://vmware.com/support/esx25/doc/esx-254-200805-patch.html
5. References:
CVE numbers
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5671
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0967
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2097
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2100
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1721
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0553
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5378
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4772
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0888
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0062
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0063
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0948
6. Change log:
2008-06-04 VMSA-2008-0009 Initial release
- -------------------------------------------------------------------
7. Contact:
E-mail list for product security notifications and announcements:
http://lists.vmware.com/cgi-bin/mailman/listinfo/security-announce
This Security Advisory is posted to the following lists:
* security-announce@lists.vmware.com
* bugtraq@securityfocus.com
* full-disclosure@lists.grok.org.uk
E-mail: security@vmware.com
PGP key at: http://kb.vmware.com/kb/1055
VMware Security Center
http://www.vmware.com/security
VMware security response policy
http://www.vmware.com/support/policies/security_response.html
General support life cycle policy
http://www.vmware.com/support/policies/eos.html
VMware Infrastructure support life cycle policy
http://www.vmware.com/support/policies/eos_vi.html
Copyright 2008 VMware Inc. All rights reserved.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.7 (GNU/Linux)
iD8DBQFIRs08S2KysvBH1xkRCMxFAJ0WJX76quFzCV+avwupq3Lu72UKigCfRftj
CZvxoXw/sZxDCSDjVzYAhrA=
=s04s
-----END PGP SIGNATURE-----
. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 200803-31
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
http://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Severity: High
Title: MIT Kerberos 5: Multiple vulnerabilities
Date: March 24, 2008
Bugs: #199205, #212363
ID: 200803-31
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Synopsis
========
Multiple vulnerabilites have been found in MIT Kerberos 5, which could
allow a remote unauthenticated user to execute arbitrary code with root
privileges.
Background
==========
MIT Kerberos 5 is a suite of applications that implement the Kerberos
network protocol. kadmind is the MIT Kerberos 5 administration daemon,
KDC is the Key Distribution Center.
* Jeff Altman (Secure Endpoints) discovered a buffer overflow in the
RPC library server code, used in the kadmin server, caused when too
many file descriptors are opened (CVE-2008-0947).
* Venustech AD-LAB discovered multiple vulnerabilities in the GSSAPI
library: usage of a freed variable in the gss_indicate_mechs()
function (CVE-2007-5901) and a double free() vulnerability in the
gss_krb5int_make_seal_token_v3() function (CVE-2007-5971). These bugs can only be triggered when Kerberos 4 support is
enabled.
The RPC related vulnerability can be exploited by a remote
unauthenticated attacker to crash kadmind, and theoretically execute
arbitrary code with root privileges or cause database corruption. This
bug can only be triggered in configurations that allow large numbers of
open file descriptors in a process.
Workaround
==========
Kerberos 4 support can be disabled via disabling the "krb4" USE flag
and recompiling the ebuild, or setting "v4_mode=none" in the
[kdcdefaults] section of /etc/krb5/kdc.conf. This will only work around
the KDC related vulnerabilities.
Resolution
==========
All MIT Kerberos 5 users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=app-crypt/mit-krb5-1.6.3-r1"
References
==========
[ 1 ] CVE-2007-5901
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5894
[ 2 ] CVE-2007-5971
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5971
[ 3 ] CVE-2008-0062
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0062
[ 4 ] CVE-2008-0063
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0063
[ 5 ] CVE-2008-0947
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0947
Availability
============
This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:
http://security.gentoo.org/glsa/glsa-200803-31.xml
Concerns?
=========
Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
http://bugs.gentoo.org.
License
=======
Copyright 2008 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).
The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.
http://creativecommons.org/licenses/by-sa/2.5
| VAR-200803-0443 | CVE-2008-1397 | Check Point VPN-1 information disclosure vulnerability |
CVSS V2: 6.5 CVSS V3: - Severity: MEDIUM |
Check Point VPN-1 Power/UTM, with NGX R60 through R65 and NG AI R55 software, allows remote authenticated users to cause a denial of service (site-to-site VPN tunnel outage), and possibly intercept network traffic, by configuring the local RFC1918 IP address to be the same as one of this tunnel's endpoint RFC1918 IP addresses, and then using SecuRemote to connect to a network interface at the other endpoint. The Check Point VPN-1 firewall contains an information disclosure vulnerability that may allow an authenticated attacker to access data that they are not authorized to access. The issue occurs because the application fails to adequately handle IP address collisions.
Attackers can exploit this issue to break site-to-site VPN connectivity between a VPN-1 gateway and a third party, denying access to legitimate users. If SecuRemote back-connections are enabled, the attacker can leverage this issue to re-route site-to-site VPN traffic from the VPN gateway to their SecuRemote client. Under certain conditions, this will cause data that was destined for the third party to be sent to the attacker's client instead. This could contain sensitive information that would aid in further attacks. ----------------------------------------------------------------------
A new version (0.9.0.0 - Release Candidate 1) of the free Secunia PSI
has been released. The new version includes many new and advanced
features, which makes it even easier to stay patched.
Download and test it today:
https://psi.secunia.com/
Read more about this new version:
https://psi.secunia.com/?page=changelog
----------------------------------------------------------------------
TITLE:
CheckPoint VPN-1 IP Address Collision Security Issue
SECUNIA ADVISORY ID:
SA29394
VERIFY ADVISORY:
http://secunia.com/advisories/29394/
CRITICAL:
Less critical
IMPACT:
Exposure of sensitive information, DoS
WHERE:
>From local network
SOFTWARE:
Check Point VPN-1/FireWall-1 NG with Application Intelligence (AI)
http://secunia.com/product/2542/
Check Point VPN-1 UTM NGX
http://secunia.com/product/13346/
Check Point VPN-1 Power NGX
http://secunia.com/product/13348/
DESCRIPTION:
Robert Mitchell has reported a security issue in CheckPoint VPN-1,
which can lead to a DoS (Denial of Service) or disclosure of
sensitive information.
SOLUTION:
The vendor has issued hotfixes to resolve the issue (see vendor
advisory for details).
PROVIDED AND/OR DISCOVERED BY:
Robert Mitchell
ORIGINAL ADVISORY:
CheckPoint:
https://secureknowledge.checkpoint.com/SecureKnowledge/login.do?OriginalAction=solution&id=sk34579
http://updates.checkpoint.com/fileserver/ID/8141/FILE/VPN-1_NGX_R65_HFA02_Supplement3.pdf
Robert Mitchell:
http://puresecurity.com.au/index.php?action=fullnews&id=5
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------
Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
----------------------------------------------------------------------
| VAR-200803-0237 | CVE-2008-0995 | Apple Mac OS X Encrypted in the print component of PDF File decryption vulnerability |
CVSS V2: 2.6 CVSS V3: - Severity: LOW |
The Printing component in Apple Mac OS X 10.5.2 uses 40-bit RC4 when printing to an encrypted PDF file, which makes it easier for attackers to decrypt the file via brute force methods.
Attackers can use trivial brute-force tactics to view data that was encrypted with the insecure algorithm. Information harvested may aid in further attacks. Apple Mac OS X is prone to multiple security vulnerabilities.
These issues affect Mac OS X and various applications, including AFP Client, AFP Server, AppKit, Application Firewall, CoreFoundation, CoreServices, CUPS, Foundation, Help Viewer, Image Raw, libc, mDNSResponder, notifyd, pax archive utility, Podcast Producer, Preview, Printing, System Configuration, UDF, and Wiki Server.
Attackers may exploit these issues to execute arbitrary code, trigger denial-of-service conditions, escalate privileges, and potentially compromise vulnerable computers.
These issues affect Apple Mac OS X 10.4.11, 10.4.11 Server, 10.5.2, 10.5.2 Server and earlier.
NOTE: This BID is being retired. The following individual records have been created to fully document all the vulnerabilities that were described in this BID:
28320 Apple Mac OS X AFP Client 'afp://' URI Remote Code Execution Vulnerability CVE-2008-0044.
28323 Apple Mac OS X AFP Server Cross-Realm Authentication Bypass Vulnerability CVE-2008-0994
28388 Apple Mac OS X AppKit NSDocument API's Stack Based Buffer Overflow Vulnerability CVE-2008-0048
28340 Apple Mac OS X AppKit Bootstrap Namespace Local Privilege Escalation Vulnerability CVE-2008-0049
28358 Apple Mac OS X AppKit Legacy Serialization Kit Multiple Integer Overflow Vulnerabilities CVE-2008-0057
28364 Apple Mac OS X AppKit PPD File Stack Buffer Overflow Vulnerability CVE-2008-0997
28368 Apple Mac OS X Application Firewall German Translation Insecure Configuration Weakness CVE-2008-0046
28375 Apple Mac OS X CoreFoundation Time Zone Data Local Privilege Escalation Vulnerability CVE-2008-0051
28384 Apple Mac OS X CoreServices '.ief' Files Security Policy Violation Weakness CVE-2008-0052
28334 CUPS Multiple Unspecified Input Validation Vulnerabilities
28341 Apple Mac OS X Foundation 'NSSelectorFromString' Input Validation Vulnerability
28343 Apple Mac OS X Foundation NSFileManager Insecure Directory Local Privilege Escalation Vulnerability
28357 Apple Mac OS X Foundation 'NSFileManager' Stack-Based Buffer Overflow Vulnerability
28359 Apple Mac OS X Foundation 'NSURLConnection' Cache Management Race Condition Security Vulnerability
28363 Apple Mac OS X Image RAW Stack-Based Buffer Overflow Vulnerability
28367 Apple Mac OS X Foundation 'NSXML' XML File Processing Race Condition Security Vulnerability
28371 Apple Mac OS X Help Viewer Remote Applescript Code Execution Vulnerability
28374 Apple Mac OS X libc 'strnstr(3)' Off-By-One Denial of Service Vulnerability
28387 Apple Mac OS X Printing To PDF Insecure Encryption Weakness
28386 Apple Mac OS X Preview PDF Insecure Encryption Weakness
28389 Apple Mac OS X Universal Disc Format Remote Denial of Service Vulnerability
28385 Apple Mac OS X NetCfgTool Local Privilege Escalation Vulnerability
28365 Apple Mac OS X pax Archive Utility Remote Code Execution Vulnerability
28344 Apple Mac OS X Authenticated Print Queue Information Disclosure Vulnerability
28345 Apple Mac OS X 'notifyd' Local Denial of Service Vulnerability
28372 Apple Mac OS X Podcast Producer Podcast Capture Information Disclosure Vulnerability
28339 Apple Mac OS X mDNSResponderHelper Local Format String Vulnerability. ----------------------------------------------------------------------
A new version (0.9.0.0 - Release Candidate 1) of the free Secunia PSI
has been released. The new version includes many new and advanced
features, which makes it even easier to stay patched.
1) Multiple boundary errors in AFP client when processing "afp://"
URLs can be exploited to cause stack-based buffer overflows when a
user connects to a malicious AFP server.
Successful exploitation may allow execution of arbitrary code.
2) An error exists in AFP Server when checking Kerberos principal
realm names. This can be exploited to make unauthorized connections
to the server when cross-realm authentication with AFP Server is
used.
3) Multiple vulnerabilities in Apache can be exploited by malicious
people to conduct cross-site scripting attacks, cause a DoS (Denial
of Service), or potentially compromise a vulnerable system.
For more information:
SA18008
SA21197
SA26636
SA27906
SA28046
4) A boundary error within the handling of file names in the
NSDocument API in AppKit can be exploited to cause a stack-based
buffer overflow.
6) Multiple integer overflow errors exist in the parser for a legacy
serialization format. This can be exploited to cause a heap-based
buffer overflow when a specially crafted serialized property list is
parsed.
Successful exploitation may allow execution of arbitrary code.
7) An error in CFNetwork can be exploited to spoof secure websites
via 502 Bad Gateway errors from a malicious HTTPS proxy server.
8) Multiple vulnerabilities in ClamAV can be exploited by malicious
people to cause a DoS (Denial of Service) or to compromise a
vulnerable system.
For more information:
SA23347
SA24187
SA24891
SA26038
SA26530
SA28117
SA28907
9) An integer overflow error exists in CoreFoundation when handling
time zone data.
10) The problem is that files with names ending in ".ief" can be
automatically opened in AppleWorks if "Open 'Safe' files" is enabled
in Safari.
For more information:
SA29431
12) Multiple input validation errors exist in CUPS, which can be
exploited to execute arbitrary code with system privileges.
13) A boundary error in curl can be exploited to compromise a user's
system.
For more information:
SA17907
14) A vulnerability in emacs can be exploited by malicious people to
compromise a user's system.
For more information:
SA27508
15) A vulnerability in "file" can be exploited by malicious people to
compromise a vulnerable system.
For more information:
SA24548
16) An input validation error exists in the NSSelectorFromString API,
which can potentially be exploited to execute arbitrary code via a
malformed selector name.
17) A race condition error in NSFileManager can potentially be
exploited to gain escalated privileges.
18) A boundary error in NSFileManager can potentially be exploited to
cause a stack-based buffer overflow via an overly long pathname with a
specially crafted structure.
19) A race condition error exists in the cache management of
NSURLConnection. This can be exploited to cause a DoS or execute
arbitrary code in applications using the library (e.g. Safari).
20) A race condition error exists in NSXML. This can be exploited to
execute arbitrary code by enticing a user to process an XML file in
an application which uses NSXML.
21) An error in Help Viewer can be exploited to insert arbitrary HTML
or JavaScript into the generated topic list page via a specially
crafted "help:topic_list" URL and may redirect to a Help Viewer
"help:runscript" link that runs Applescript.
22) A boundary error exists in Image Raw within the handling of Adobe
Digital Negative (DNG) image files. This can be exploited to cause a
stack-based buffer overflow by enticing a user to open a maliciously
crafted image file.
23) Multiple vulnerabilities in Kerberos can be exploited to cause a
DoS or to compromise a vulnerable system.
For more information:
SA29428
24) An off-by-one error the "strnstr()" in libc can be exploited to
cause a DoS.
25) A format string error exists in mDNSResponderHelper, which can be
exploited by a malicious, local user to cause a DoS or execute
arbitrary code with privileges of mDNSResponderHelper by setting the
local hostname to a specially crafted string.
26) An error in notifyd can be exploited by a malicious, local user
to deny access to notifications by sending fake Mach port death
notifications to notifyd.
27) An array indexing error in the pax command line tool can be
exploited to execute arbitrary code.
28) Multiple vulnerabilities in php can be exploited to bypass
certain security restrictions.
For more information:
SA27648
SA28318
29) A security issue is caused due to the Podcast Capture application
providing passwords to a subtask through the arguments.
30) Printing and Preview handle PDF files with weak encryption.
31) An error in Printing in the handling of authenticated print
queues can lead to credentials being saved to disk.
33) A null-pointer dereference error exists in the handling of
Universal Disc Format (UDF) file systems, which can be exploited to
cause a system shutdown by enticing a user to open a maliciously
crafted disk image.
35) Some vulnerabilities in X11 can be exploited by malicious, local
users to gain escalated privileges.
For more information:
SA27040
SA28532
36) Some vulnerabilities in libpng can be exploited by malicious
people to cause a DoS (Denial of Service).
For more information:
SA22900
SA25292
SA27093
SA27130
SOLUTION:
Apply Security Update 2008-002.
Security Update 2008-002 v1.0 (PPC):
http://www.apple.com/support/downloads/securityupdate2008002v10ppc.html
Security Update 2008-002 v1.0 (Universal):
http://www.apple.com/support/downloads/securityupdate2008002v10universal.html
Security Update 2008-002 v1.0 (Leopard):
http://www.apple.com/support/downloads/securityupdate2008002v10leopard.html
Security Update 2008-002 v1.0 Server (Leopard):
http://www.apple.com/support/downloads/securityupdate2008002v10serverleopard.html
Security Update 2008-002 v1.0 Server (PPC):
http://www.apple.com/support/downloads/securityupdate2008002v10serverppc.html
Security Update 2008-002 v1.0 Server (Universal):
http://www.apple.com/support/downloads/securityupdate2008002v10serveruniversal.html
PROVIDED AND/OR DISCOVERED BY:
The vendor credits:
1) Ragnar Sundblad of KTH - Royal Institute of Technology, Stockholm
11) regenrecht via iDefense
19) Daniel Jalkut, Red Sweater Software
22) Brian Mastenbrook
24) Mike Ash, Rogue Amoeba Software
29) Maximilian Reiss, Chair for Applied Software Engineering, TUM
33) Paul Wagland of Redwood Software, and Wayne Linder of Iomega
34) Rodrigo Carvalho CORE Security Technologies
ORIGINAL ADVISORY:
Apple:
http://docs.info.apple.com/article.html?artnum=307562
CORE-2008-0123:
http://www.coresecurity.com/?action=item&id=2189
OTHER REFERENCES:
SA17907:
http://secunia.com/advisories/17907/
SA18008:
http://secunia.com/advisories/18008/
SA21187:
http://secunia.com/advisories/21197/
SA22900:
http://secunia.com/advisories/22900/
SA23347:
http://secunia.com/advisories/23347/
SA24187:
http://secunia.com/advisories/24187/
SA24548:
http://secunia.com/advisories/24548/
SA24891:
http://secunia.com/advisories/24891/
SA25292:
http://secunia.com/advisories/25292/
SA26038:
http://secunia.com/advisories/26038/
SA26530:
http://secunia.com/advisories/26530/
SA26636:
http://secunia.com/advisories/26636/
SA27040:
http://secunia.com/advisories/27040/
SA27093:
http://secunia.com/advisories/27093/
SA27130:
http://secunia.com/advisories/27130/
SA27648:
http://secunia.com/advisories/27648/
SA27508:
http://secunia.com/advisories/27508/
SA27906:
http://secunia.com/advisories/27906/
SA28046:
http://secunia.com/advisories/28046/
SA28117:
http://secunia.com/advisories/28117/
SAS28318:
http://secunia.com/advisories/28318/
SA28532:
http://secunia.com/advisories/28532/
SA28907:
http://secunia.com/advisories/28907/
SA29428:
http://secunia.com/advisories/29428/
SA29431:
http://secunia.com/advisories/29431/
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------
Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
----------------------------------------------------------------------
| VAR-200803-0243 | CVE-2008-1001 | Windows XP and Vista Under the environment Apple Safari Vulnerable to cross-site scripting |
CVSS V2: 4.3 CVSS V3: - Severity: MEDIUM |
Cross-site scripting (XSS) vulnerability in Apple Safari before 3.1, when running on Windows XP or Vista, allows remote attackers to inject arbitrary web script or HTML via a crafted URL that is not properly handled in the error page. Apple Safari is prone to 12 security vulnerabilities.
Attackers may exploit these issues to execute arbitrary code, steal cookie-based authentication credentials, spoof secure websites, obtain sensitive information, and crash the affected application. Other attacks are also possible.
NOTE: This BID is being retired.
An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of another site. This may help the attacker steal cookie-based authentication credentials and launch other attacks.
NOTE: This vulnerability was previously covered in BID 28290 (Apple Safari Prior to 3.1 Multiple Security Vulnerabilities), but has been given its own record to better document the issue. Safari is the WEB browser bundled with the Apple family operating system by default. If users are tricked into opening malicious URLs, sensitive information may be leaked
| VAR-200803-0248 | CVE-2008-1006 | Apple Safari of window.open() Cross-site scripting vulnerability in function |
CVSS V2: 4.3 CVSS V3: - Severity: MEDIUM |
Cross-site scripting (XSS) vulnerability in WebCore, as used in Apple Safari before 3.1, allows remote attackers to inject arbitrary web script or HTML by using the window.open function to change the security context of a web page.
An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of another site. This may help the attacker steal cookie-based authentication credentials and launch other attacks.
NOTE: This vulnerability was previously covered in BID 28290 (Apple Safari Prior to 3.1 Multiple Security Vulnerabilities), but has been given its own record to better document the issue. Apple Safari is prone to 12 security vulnerabilities.
Attackers may exploit these issues to execute arbitrary code, steal cookie-based authentication credentials, spoof secure websites, obtain sensitive information, and crash the affected application. Other attacks are also possible.
These issues affect versions prior to Apple Safari 3.1 running on Apple Mac OS X 10.4.1 and 10.5.2, Microsoft Windows XP, and Windows Vista.
NOTE: This BID is being retired. Safari is the WEB browser bundled with the Apple family operating system by default. ----------------------------------------------------------------------
Secunia Network Software Inspector 2.0 (NSI) - Public Beta
4 days left of beta period.
The 1st generation of the Secunia Network Software Inspector (NSI)
has been available for corporate users for almost 1 year and its been
a tremendous success.
The 2nd generation Secunia NSI is built on the same technology as the
award winning Secunia PSI, which has already been downloaded and
installed on more than 400,000 computers world wide.
For more information:
SA29393
SOLUTION:
Apply updated packages via the yum utility ("yum update WebKit").
Note: Updated packages for midori and kazehakase have also been
issued, which have been rebuilt against the new WebKit library. ----------------------------------------------------------------------
A new version (0.9.0.0 - Release Candidate 1) of the free Secunia PSI
has been released. The new version includes many new and advanced
features, which makes it even easier to stay patched.
Download and test it today:
https://psi.secunia.com/
Read more about this new version:
https://psi.secunia.com/?page=changelog
----------------------------------------------------------------------
TITLE:
Apple Safari Multiple Vulnerabilities
SECUNIA ADVISORY ID:
SA29393
VERIFY ADVISORY:
http://secunia.com/advisories/29393/
CRITICAL:
Highly critical
IMPACT:
Security Bypass, Cross Site Scripting, Exposure of sensitive
information, System access
WHERE:
>From remote
SOFTWARE:
Safari 3.x
http://secunia.com/product/17989/
Safari 2.x
http://secunia.com/product/5289/
DESCRIPTION:
Some vulnerabilities have been reported in Safari, which can be
exploited by malicious people to bypass certain security
restrictions, conduct cross-site scripting attacks, or to compromise
a vulnerable system.
2) An error exists the handling of web pages that have explicitly set
the document.domain property. This can be exploited to conduct
cross-site scripting attacks in sites that set the document.domain
property or between HTTP and HTTPS sites with the same
document.domain.
3) An error in Web Inspector can be exploited to inject script code
that will run in other domains and can read the user's file system
when a specially crafted page is inspected.
4) A security issue exists with the Kotoeri input method, which can
result in exposing the password field on the display when reverse
conversion is requested.
6) The frame navigation policy is not enforced for Java applets. This
can be exploited to conduct cross-site scripting attacks using java
and to gain escalated privileges by enticing a user to open a
specially crafted web page.
7) An unspecified error in the handling of the document.domain
property can be exploited to conduct cross-site scripting attacks
when a user visits a specially crafted web page.
8) An error exists in the handling of the history object. This can be
exploited to inject javascript code that will run in the context of
other frames.
9) A boundary error exists in the handling of javascript regular
expressions, which can be exploited to cause a buffer overflow via a
specially crafted web page.
Successful exploitation allows execution of arbitrary code.
10) An error in WebKit allows method instances from one frame to be
called in the context of another frame. This can be exploited to
conduct cross-site scripting attacks.
SOLUTION:
Update to version 3.1.
PROVIDED AND/OR DISCOVERED BY:
1) Robert Swiecki of Google Information Security Team
2, 3, 5, 6) Adam Barth and Collin Jackson of Stanford University
10) Eric Seidel of the WebKit Open Source Project, and Tavis Ormandy
and Will Drewry of Google Security Team
ORIGINAL ADVISORY:
Apple:
http://docs.info.apple.com/article.html?artnum=307563
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------
Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
----------------------------------------------------------------------
| VAR-200803-0246 | CVE-2008-1004 | Apple Safari of WebCore In Web Inspector Vulnerable to cross-site scripting |
CVSS V2: 4.3 CVSS V3: - Severity: MEDIUM |
Cross-site scripting (XSS) vulnerability in WebCore, as used in Apple Safari before 3.1, allows remote attackers to inject arbitrary web script or HTML via unknown vectors related to the Web Inspector.
Attackers may exploit this issue to run script code in other domains and access the vulnerable computer's filesystem.
NOTE: This vulnerability was previously covered in BID 28290 (Apple Safari Prior to 3.1 Multiple Security Vulnerabilities), but has been given its own record to better document the issue. Apple Safari is prone to 12 security vulnerabilities.
Attackers may exploit these issues to execute arbitrary code, steal cookie-based authentication credentials, spoof secure websites, obtain sensitive information, and crash the affected application. Other attacks are also possible.
These issues affect versions prior to Apple Safari 3.1 running on Apple Mac OS X 10.4.1 and 10.5.2, Microsoft Windows XP, and Windows Vista.
NOTE: This BID is being retired. Safari is the WEB browser bundled with the Apple family operating system by default. ----------------------------------------------------------------------
Secunia Network Software Inspector 2.0 (NSI) - Public Beta
4 days left of beta period.
The 1st generation of the Secunia Network Software Inspector (NSI)
has been available for corporate users for almost 1 year and its been
a tremendous success.
The 2nd generation Secunia NSI is built on the same technology as the
award winning Secunia PSI, which has already been downloaded and
installed on more than 400,000 computers world wide.
For more information:
SA29393
SOLUTION:
Apply updated packages via the yum utility ("yum update WebKit").
Note: Updated packages for midori and kazehakase have also been
issued, which have been rebuilt against the new WebKit library. ----------------------------------------------------------------------
A new version (0.9.0.0 - Release Candidate 1) of the free Secunia PSI
has been released. The new version includes many new and advanced
features, which makes it even easier to stay patched.
Download and test it today:
https://psi.secunia.com/
Read more about this new version:
https://psi.secunia.com/?page=changelog
----------------------------------------------------------------------
TITLE:
Apple Safari Multiple Vulnerabilities
SECUNIA ADVISORY ID:
SA29393
VERIFY ADVISORY:
http://secunia.com/advisories/29393/
CRITICAL:
Highly critical
IMPACT:
Security Bypass, Cross Site Scripting, Exposure of sensitive
information, System access
WHERE:
>From remote
SOFTWARE:
Safari 3.x
http://secunia.com/product/17989/
Safari 2.x
http://secunia.com/product/5289/
DESCRIPTION:
Some vulnerabilities have been reported in Safari, which can be
exploited by malicious people to bypass certain security
restrictions, conduct cross-site scripting attacks, or to compromise
a vulnerable system.
1) An error in the processing of "javascript:" URLs can be exploited
to execute arbitrary HTML and script code in context of another site
via a specially crafted web page.
2) An error exists the handling of web pages that have explicitly set
the document.domain property. This can be exploited to conduct
cross-site scripting attacks in sites that set the document.domain
property or between HTTP and HTTPS sites with the same
document.domain.
3) An error in Web Inspector can be exploited to inject script code
that will run in other domains and can read the user's file system
when a specially crafted page is inspected.
4) A security issue exists with the Kotoeri input method, which can
result in exposing the password field on the display when reverse
conversion is requested.
5) An error within the handling of the "window.open()" function can
be used to change the security context of a web page to the caller's
context. This can be exploited to execute arbitrary script code in
the user's security context via a specially crafted web page.
6) The frame navigation policy is not enforced for Java applets. This
can be exploited to conduct cross-site scripting attacks using java
and to gain escalated privileges by enticing a user to open a
specially crafted web page.
7) An unspecified error in the handling of the document.domain
property can be exploited to conduct cross-site scripting attacks
when a user visits a specially crafted web page.
8) An error exists in the handling of the history object. This can be
exploited to inject javascript code that will run in the context of
other frames.
9) A boundary error exists in the handling of javascript regular
expressions, which can be exploited to cause a buffer overflow via a
specially crafted web page.
Successful exploitation allows execution of arbitrary code.
10) An error in WebKit allows method instances from one frame to be
called in the context of another frame. This can be exploited to
conduct cross-site scripting attacks.
SOLUTION:
Update to version 3.1.
PROVIDED AND/OR DISCOVERED BY:
1) Robert Swiecki of Google Information Security Team
2, 3, 5, 6) Adam Barth and Collin Jackson of Stanford University
10) Eric Seidel of the WebKit Open Source Project, and Tavis Ormandy
and Will Drewry of Google Security Team
ORIGINAL ADVISORY:
Apple:
http://docs.info.apple.com/article.html?artnum=307563
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------
Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
----------------------------------------------------------------------
| VAR-200803-0247 | CVE-2008-1005 | Apple Safari of WebCore Of information leakage due to deficiency in input processing |
CVSS V2: 2.1 CVSS V3: - Severity: LOW |
WebCore, as used in Apple Safari before 3.1, does not properly mask the password field when reverse conversion is used with the Kotoeri input method, which allows physically proximate attackers to read the password.
An attacker can exploit this issue to obtain potentially sensitive information that may aid in further attacks.
NOTE: This vulnerability was previously covered in BID 28290 (Apple Safari Prior to 3.1 Multiple Security Vulnerabilities), but has been given its own record to better document the issue. Apple Safari is prone to 12 security vulnerabilities.
Attackers may exploit these issues to execute arbitrary code, steal cookie-based authentication credentials, spoof secure websites, obtain sensitive information, and crash the affected application. Other attacks are also possible.
These issues affect versions prior to Apple Safari 3.1 running on Apple Mac OS X 10.4.1 and 10.5.2, Microsoft Windows XP, and Windows Vista.
NOTE: This BID is being retired. The following individual records have been created to fully document all the vulnerabilities that were described in this BID:
28356 Apple Safari CFNetwork Arbitrary Secure Website Spoofing Vulnerability
28321 Apple Safari Error Page Cross-Site Scripting Vulnerability
28328 Apple Safari Javascript URL Parsing Cross-Site Scripting Vulnerability
28330 Apple Safari WebCore 'document.domain' Cross-Site Scripting Vulnerability
28347 Apple Safari Web Inspector Remote Code Injection Vulnerability
28326 Apple Safari WebCore 'Kotoeri' Password Field Information Disclosure Vulnerability
28332 Apple Safari WebCore 'window.open()' Function Cross-Site Scripting Vulnerability
28335 Apple Safari WebCore Java Frame Navigation Cross-Site Scripting Vulnerability
28336 Apple Safari WebCore 'document.domain' Variant Cross-Site Scripting Vulnerability
28337 Apple Safari WebCore History Object Cross-Site Scripting Vulnerability
28338 Apple Safari WebKit JavaScript Regular Expression Handling Buffer Overflow Vulnerability
28342 Apple Safari WebKit Frame Method Cross-Site Scripting Vulnerability. Safari is the WEB browser bundled with the Apple family operating system by default. Safari's version 3.1 fixes multiple security holes, as follows: Under normal circumstances, the password field of a web page is hidden to prevent leakage. ----------------------------------------------------------------------
Secunia Network Software Inspector 2.0 (NSI) - Public Beta
4 days left of beta period.
The 1st generation of the Secunia Network Software Inspector (NSI)
has been available for corporate users for almost 1 year and its been
a tremendous success.
The 2nd generation Secunia NSI is built on the same technology as the
award winning Secunia PSI, which has already been downloaded and
installed on more than 400,000 computers world wide.
For more information:
SA29393
SOLUTION:
Apply updated packages via the yum utility ("yum update WebKit").
Note: Updated packages for midori and kazehakase have also been
issued, which have been rebuilt against the new WebKit library. ----------------------------------------------------------------------
A new version (0.9.0.0 - Release Candidate 1) of the free Secunia PSI
has been released. The new version includes many new and advanced
features, which makes it even easier to stay patched.
Download and test it today:
https://psi.secunia.com/
Read more about this new version:
https://psi.secunia.com/?page=changelog
----------------------------------------------------------------------
TITLE:
Apple Safari Multiple Vulnerabilities
SECUNIA ADVISORY ID:
SA29393
VERIFY ADVISORY:
http://secunia.com/advisories/29393/
CRITICAL:
Highly critical
IMPACT:
Security Bypass, Cross Site Scripting, Exposure of sensitive
information, System access
WHERE:
>From remote
SOFTWARE:
Safari 3.x
http://secunia.com/product/17989/
Safari 2.x
http://secunia.com/product/5289/
DESCRIPTION:
Some vulnerabilities have been reported in Safari, which can be
exploited by malicious people to bypass certain security
restrictions, conduct cross-site scripting attacks, or to compromise
a vulnerable system.
1) An error in the processing of "javascript:" URLs can be exploited
to execute arbitrary HTML and script code in context of another site
via a specially crafted web page.
2) An error exists the handling of web pages that have explicitly set
the document.domain property. This can be exploited to conduct
cross-site scripting attacks in sites that set the document.domain
property or between HTTP and HTTPS sites with the same
document.domain.
3) An error in Web Inspector can be exploited to inject script code
that will run in other domains and can read the user's file system
when a specially crafted page is inspected.
5) An error within the handling of the "window.open()" function can
be used to change the security context of a web page to the caller's
context. This can be exploited to execute arbitrary script code in
the user's security context via a specially crafted web page.
6) The frame navigation policy is not enforced for Java applets. This
can be exploited to conduct cross-site scripting attacks using java
and to gain escalated privileges by enticing a user to open a
specially crafted web page.
7) An unspecified error in the handling of the document.domain
property can be exploited to conduct cross-site scripting attacks
when a user visits a specially crafted web page.
8) An error exists in the handling of the history object. This can be
exploited to inject javascript code that will run in the context of
other frames.
9) A boundary error exists in the handling of javascript regular
expressions, which can be exploited to cause a buffer overflow via a
specially crafted web page.
Successful exploitation allows execution of arbitrary code.
10) An error in WebKit allows method instances from one frame to be
called in the context of another frame. This can be exploited to
conduct cross-site scripting attacks.
SOLUTION:
Update to version 3.1.
PROVIDED AND/OR DISCOVERED BY:
1) Robert Swiecki of Google Information Security Team
2, 3, 5, 6) Adam Barth and Collin Jackson of Stanford University
10) Eric Seidel of the WebKit Open Source Project, and Tavis Ormandy
and Will Drewry of Google Security Team
ORIGINAL ADVISORY:
Apple:
http://docs.info.apple.com/article.html?artnum=307563
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------
Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
----------------------------------------------------------------------
| VAR-200803-0242 | CVE-2008-1000 | Mac OS X of Wiki Server directory and rubber vulnerability |
CVSS V2: 8.5 CVSS V3: - Severity: HIGH |
Directory traversal vulnerability in ContentServer.py in the Wiki Server in Apple Mac OS X 10.5.2 (aka Leopard) allows remote authenticated users to write arbitrary files via ".." sequences in file attachments.
Exploiting this issue allows an attacker to access arbitrary files outside of the application's document root directory. This can expose sensitive information that could help the attacker launch further attacks.
Note that attackers must be registered wiki users to exploit this issue.
Wiki Server from Mac OS X Server 10.5 is vulnerable. ----------------------------------------------------------------------
A new version (0.9.0.0 - Release Candidate 1) of the free Secunia PSI
has been released. The new version includes many new and advanced
features, which makes it even easier to stay patched.
Download and test it today:
https://psi.secunia.com/
Read more about this new version:
https://psi.secunia.com/?page=changelog
----------------------------------------------------------------------
TITLE:
Mac OS X Security Update Fixes Multiple Vulnerabilities
SECUNIA ADVISORY ID:
SA29420
VERIFY ADVISORY:
http://secunia.com/advisories/29420/
CRITICAL:
Highly critical
IMPACT:
Unknown, Security Bypass, Cross Site Scripting, Spoofing, Exposure of
sensitive information, Privilege escalation, DoS, System access
WHERE:
>From remote
OPERATING SYSTEM:
Apple Macintosh OS X
http://secunia.com/product/96/
DESCRIPTION:
Apple has issued a security update for Mac OS X, which fixes multiple
vulnerabilities.
1) Multiple boundary errors in AFP client when processing "afp://"
URLs can be exploited to cause stack-based buffer overflows when a
user connects to a malicious AFP server.
Successful exploitation may allow execution of arbitrary code.
2) An error exists in AFP Server when checking Kerberos principal
realm names. This can be exploited to make unauthorized connections
to the server when cross-realm authentication with AFP Server is
used.
3) Multiple vulnerabilities in Apache can be exploited by malicious
people to conduct cross-site scripting attacks, cause a DoS (Denial
of Service), or potentially compromise a vulnerable system.
For more information:
SA18008
SA21197
SA26636
SA27906
SA28046
4) A boundary error within the handling of file names in the
NSDocument API in AppKit can be exploited to cause a stack-based
buffer overflow.
5) An error in NSApplication in AppKit can potentially be exploited
to execute code with escalated privileges by sending a maliciously
crafted messages to privileged applications in the same bootstrap
namespace.
6) Multiple integer overflow errors exist in the parser for a legacy
serialization format. This can be exploited to cause a heap-based
buffer overflow when a specially crafted serialized property list is
parsed.
Successful exploitation may allow execution of arbitrary code.
7) An error in CFNetwork can be exploited to spoof secure websites
via 502 Bad Gateway errors from a malicious HTTPS proxy server.
8) Multiple vulnerabilities in ClamAV can be exploited by malicious
people to cause a DoS (Denial of Service) or to compromise a
vulnerable system.
For more information:
SA23347
SA24187
SA24891
SA26038
SA26530
SA28117
SA28907
9) An integer overflow error exists in CoreFoundation when handling
time zone data. This can be exploited by a malicious, local user to
execute arbitrary code with system privileges.
10) The problem is that files with names ending in ".ief" can be
automatically opened in AppleWorks if "Open 'Safe' files" is enabled
in Safari.
11) A vulnerability in CUPS can be exploited to execute arbitrary
code with system privileges.
For more information:
SA29431
12) Multiple input validation errors exist in CUPS, which can be
exploited to execute arbitrary code with system privileges.
13) A boundary error in curl can be exploited to compromise a user's
system.
For more information:
SA17907
14) A vulnerability in emacs can be exploited by malicious people to
compromise a user's system.
For more information:
SA27508
15) A vulnerability in "file" can be exploited by malicious people to
compromise a vulnerable system.
For more information:
SA24548
16) An input validation error exists in the NSSelectorFromString API,
which can potentially be exploited to execute arbitrary code via a
malformed selector name.
17) A race condition error in NSFileManager can potentially be
exploited to gain escalated privileges.
18) A boundary error in NSFileManager can potentially be exploited to
cause a stack-based buffer overflow via an overly long pathname with a
specially crafted structure.
19) A race condition error exists in the cache management of
NSURLConnection. This can be exploited to cause a DoS or execute
arbitrary code in applications using the library (e.g. Safari).
20) A race condition error exists in NSXML. This can be exploited to
execute arbitrary code by enticing a user to process an XML file in
an application which uses NSXML.
21) An error in Help Viewer can be exploited to insert arbitrary HTML
or JavaScript into the generated topic list page via a specially
crafted "help:topic_list" URL and may redirect to a Help Viewer
"help:runscript" link that runs Applescript.
22) A boundary error exists in Image Raw within the handling of Adobe
Digital Negative (DNG) image files. This can be exploited to cause a
stack-based buffer overflow by enticing a user to open a maliciously
crafted image file.
23) Multiple vulnerabilities in Kerberos can be exploited to cause a
DoS or to compromise a vulnerable system.
For more information:
SA29428
24) An off-by-one error the "strnstr()" in libc can be exploited to
cause a DoS.
25) A format string error exists in mDNSResponderHelper, which can be
exploited by a malicious, local user to cause a DoS or execute
arbitrary code with privileges of mDNSResponderHelper by setting the
local hostname to a specially crafted string.
26) An error in notifyd can be exploited by a malicious, local user
to deny access to notifications by sending fake Mach port death
notifications to notifyd.
27) An array indexing error in the pax command line tool can be
exploited to execute arbitrary code.
28) Multiple vulnerabilities in php can be exploited to bypass
certain security restrictions.
For more information:
SA27648
SA28318
29) A security issue is caused due to the Podcast Capture application
providing passwords to a subtask through the arguments.
30) Printing and Preview handle PDF files with weak encryption.
31) An error in Printing in the handling of authenticated print
queues can lead to credentials being saved to disk.
32) An error in NetCfgTool can be exploited by a malicious, local
user to execute arbitrary code with escalated privileges via a
specially crafted message.
33) A null-pointer dereference error exists in the handling of
Universal Disc Format (UDF) file systems, which can be exploited to
cause a system shutdown by enticing a user to open a maliciously
crafted disk image. This can be exploited by malicious users to upload arbitrary
files with privileges of the wiki server execute arbitrary code.
35) Some vulnerabilities in X11 can be exploited by malicious, local
users to gain escalated privileges.
For more information:
SA27040
SA28532
36) Some vulnerabilities in libpng can be exploited by malicious
people to cause a DoS (Denial of Service).
For more information:
SA22900
SA25292
SA27093
SA27130
SOLUTION:
Apply Security Update 2008-002.
Security Update 2008-002 v1.0 (PPC):
http://www.apple.com/support/downloads/securityupdate2008002v10ppc.html
Security Update 2008-002 v1.0 (Universal):
http://www.apple.com/support/downloads/securityupdate2008002v10universal.html
Security Update 2008-002 v1.0 (Leopard):
http://www.apple.com/support/downloads/securityupdate2008002v10leopard.html
Security Update 2008-002 v1.0 Server (Leopard):
http://www.apple.com/support/downloads/securityupdate2008002v10serverleopard.html
Security Update 2008-002 v1.0 Server (PPC):
http://www.apple.com/support/downloads/securityupdate2008002v10serverppc.html
Security Update 2008-002 v1.0 Server (Universal):
http://www.apple.com/support/downloads/securityupdate2008002v10serveruniversal.html
PROVIDED AND/OR DISCOVERED BY:
The vendor credits:
1) Ragnar Sundblad of KTH - Royal Institute of Technology, Stockholm
11) regenrecht via iDefense
19) Daniel Jalkut, Red Sweater Software
22) Brian Mastenbrook
24) Mike Ash, Rogue Amoeba Software
29) Maximilian Reiss, Chair for Applied Software Engineering, TUM
33) Paul Wagland of Redwood Software, and Wayne Linder of Iomega
34) Rodrigo Carvalho CORE Security Technologies
ORIGINAL ADVISORY:
Apple:
http://docs.info.apple.com/article.html?artnum=307562
CORE-2008-0123:
http://www.coresecurity.com/?action=item&id=2189
OTHER REFERENCES:
SA17907:
http://secunia.com/advisories/17907/
SA18008:
http://secunia.com/advisories/18008/
SA21187:
http://secunia.com/advisories/21197/
SA22900:
http://secunia.com/advisories/22900/
SA23347:
http://secunia.com/advisories/23347/
SA24187:
http://secunia.com/advisories/24187/
SA24548:
http://secunia.com/advisories/24548/
SA24891:
http://secunia.com/advisories/24891/
SA25292:
http://secunia.com/advisories/25292/
SA26038:
http://secunia.com/advisories/26038/
SA26530:
http://secunia.com/advisories/26530/
SA26636:
http://secunia.com/advisories/26636/
SA27040:
http://secunia.com/advisories/27040/
SA27093:
http://secunia.com/advisories/27093/
SA27130:
http://secunia.com/advisories/27130/
SA27648:
http://secunia.com/advisories/27648/
SA27508:
http://secunia.com/advisories/27508/
SA27906:
http://secunia.com/advisories/27906/
SA28046:
http://secunia.com/advisories/28046/
SA28117:
http://secunia.com/advisories/28117/
SAS28318:
http://secunia.com/advisories/28318/
SA28532:
http://secunia.com/advisories/28532/
SA28907:
http://secunia.com/advisories/28907/
SA29428:
http://secunia.com/advisories/29428/
SA29431:
http://secunia.com/advisories/29431/
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------
Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
----------------------------------------------------------------------
| VAR-200803-0245 | CVE-2008-1003 | Apple Safari of WebCore Vulnerable to cross-site scripting |
CVSS V2: 4.3 CVSS V3: - Severity: MEDIUM |
Cross-site scripting (XSS) vulnerability in WebCore, as used in Apple Safari before 3.1, allows remote attackers to inject arbitrary web script or HTML via unknown vectors related to sites that set the document.domain property or have the same document.domain.
An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of another site. This may help the attacker steal cookie-based authentication credentials and launch other attacks.
NOTE: This vulnerability was previously covered in BID 28290 (Apple Safari Prior to 3.1 Multiple Security Vulnerabilities), but has been given its own record to better document the issue. Apple Safari is prone to 12 security vulnerabilities.
Attackers may exploit these issues to execute arbitrary code, steal cookie-based authentication credentials, spoof secure websites, obtain sensitive information, and crash the affected application. Other attacks are also possible.
These issues affect versions prior to Apple Safari 3.1 running on Apple Mac OS X 10.4.1 and 10.5.2, Microsoft Windows XP, and Windows Vista.
NOTE: This BID is being retired. Safari is the WEB browser bundled with the Apple family operating system by default. ----------------------------------------------------------------------
Secunia Network Software Inspector 2.0 (NSI) - Public Beta
4 days left of beta period.
The 1st generation of the Secunia Network Software Inspector (NSI)
has been available for corporate users for almost 1 year and its been
a tremendous success.
The 2nd generation Secunia NSI is built on the same technology as the
award winning Secunia PSI, which has already been downloaded and
installed on more than 400,000 computers world wide.
For more information:
SA29393
SOLUTION:
Apply updated packages via the yum utility ("yum update WebKit").
Note: Updated packages for midori and kazehakase have also been
issued, which have been rebuilt against the new WebKit library. ----------------------------------------------------------------------
A new version (0.9.0.0 - Release Candidate 1) of the free Secunia PSI
has been released. The new version includes many new and advanced
features, which makes it even easier to stay patched.
Download and test it today:
https://psi.secunia.com/
Read more about this new version:
https://psi.secunia.com/?page=changelog
----------------------------------------------------------------------
TITLE:
Apple Safari Multiple Vulnerabilities
SECUNIA ADVISORY ID:
SA29393
VERIFY ADVISORY:
http://secunia.com/advisories/29393/
CRITICAL:
Highly critical
IMPACT:
Security Bypass, Cross Site Scripting, Exposure of sensitive
information, System access
WHERE:
>From remote
SOFTWARE:
Safari 3.x
http://secunia.com/product/17989/
Safari 2.x
http://secunia.com/product/5289/
DESCRIPTION:
Some vulnerabilities have been reported in Safari, which can be
exploited by malicious people to bypass certain security
restrictions, conduct cross-site scripting attacks, or to compromise
a vulnerable system.
2) An error exists the handling of web pages that have explicitly set
the document.domain property.
3) An error in Web Inspector can be exploited to inject script code
that will run in other domains and can read the user's file system
when a specially crafted page is inspected.
4) A security issue exists with the Kotoeri input method, which can
result in exposing the password field on the display when reverse
conversion is requested.
5) An error within the handling of the "window.open()" function can
be used to change the security context of a web page to the caller's
context.
6) The frame navigation policy is not enforced for Java applets. This
can be exploited to conduct cross-site scripting attacks using java
and to gain escalated privileges by enticing a user to open a
specially crafted web page.
7) An unspecified error in the handling of the document.domain
property can be exploited to conduct cross-site scripting attacks
when a user visits a specially crafted web page.
8) An error exists in the handling of the history object. This can be
exploited to inject javascript code that will run in the context of
other frames.
9) A boundary error exists in the handling of javascript regular
expressions, which can be exploited to cause a buffer overflow via a
specially crafted web page.
Successful exploitation allows execution of arbitrary code.
10) An error in WebKit allows method instances from one frame to be
called in the context of another frame. This can be exploited to
conduct cross-site scripting attacks.
SOLUTION:
Update to version 3.1.
PROVIDED AND/OR DISCOVERED BY:
1) Robert Swiecki of Google Information Security Team
2, 3, 5, 6) Adam Barth and Collin Jackson of Stanford University
10) Eric Seidel of the WebKit Open Source Project, and Tavis Ormandy
and Will Drewry of Google Security Team
ORIGINAL ADVISORY:
Apple:
http://docs.info.apple.com/article.html?artnum=307563
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------
Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
----------------------------------------------------------------------
| VAR-200803-0240 | CVE-2008-0998 | Apple Mac OS X of NetCfgTool Authentication bypass vulnerability |
CVSS V2: 6.9 CVSS V3: - Severity: MEDIUM |
Unspecified vulnerability in NetCfgTool in the System Configuration component in Apple Mac OS X 10.4.11 and 10.5.2 allows local users to bypass authorization and execute arbitrary code via crafted distributed objects. Successfully exploiting this issue will result in the complete compromise of affected computers. Failed exploit attempts will result in a denial-of-service condition. Apple Mac OS X is prone to multiple security vulnerabilities.
These issues affect Mac OS X and various applications, including AFP Client, AFP Server, AppKit, Application Firewall, CoreFoundation, CoreServices, CUPS, Foundation, Help Viewer, Image Raw, libc, mDNSResponder, notifyd, pax archive utility, Podcast Producer, Preview, Printing, System Configuration, UDF, and Wiki Server.
Attackers may exploit these issues to execute arbitrary code, trigger denial-of-service conditions, escalate privileges, and potentially compromise vulnerable computers.
These issues affect Apple Mac OS X 10.4.11, 10.4.11 Server, 10.5.2, 10.5.2 Server and earlier.
NOTE: This BID is being retired.
28323 Apple Mac OS X AFP Server Cross-Realm Authentication Bypass Vulnerability CVE-2008-0994
28388 Apple Mac OS X AppKit NSDocument API's Stack Based Buffer Overflow Vulnerability CVE-2008-0048
28340 Apple Mac OS X AppKit Bootstrap Namespace Local Privilege Escalation Vulnerability CVE-2008-0049
28358 Apple Mac OS X AppKit Legacy Serialization Kit Multiple Integer Overflow Vulnerabilities CVE-2008-0057
28364 Apple Mac OS X AppKit PPD File Stack Buffer Overflow Vulnerability CVE-2008-0997
28368 Apple Mac OS X Application Firewall German Translation Insecure Configuration Weakness CVE-2008-0046
28375 Apple Mac OS X CoreFoundation Time Zone Data Local Privilege Escalation Vulnerability CVE-2008-0051
28384 Apple Mac OS X CoreServices '.ief' Files Security Policy Violation Weakness CVE-2008-0052
28334 CUPS Multiple Unspecified Input Validation Vulnerabilities
28341 Apple Mac OS X Foundation 'NSSelectorFromString' Input Validation Vulnerability
28343 Apple Mac OS X Foundation NSFileManager Insecure Directory Local Privilege Escalation Vulnerability
28357 Apple Mac OS X Foundation 'NSFileManager' Stack-Based Buffer Overflow Vulnerability
28359 Apple Mac OS X Foundation 'NSURLConnection' Cache Management Race Condition Security Vulnerability
28363 Apple Mac OS X Image RAW Stack-Based Buffer Overflow Vulnerability
28367 Apple Mac OS X Foundation 'NSXML' XML File Processing Race Condition Security Vulnerability
28371 Apple Mac OS X Help Viewer Remote Applescript Code Execution Vulnerability
28374 Apple Mac OS X libc 'strnstr(3)' Off-By-One Denial of Service Vulnerability
28387 Apple Mac OS X Printing To PDF Insecure Encryption Weakness
28386 Apple Mac OS X Preview PDF Insecure Encryption Weakness
28389 Apple Mac OS X Universal Disc Format Remote Denial of Service Vulnerability
28385 Apple Mac OS X NetCfgTool Local Privilege Escalation Vulnerability
28365 Apple Mac OS X pax Archive Utility Remote Code Execution Vulnerability
28344 Apple Mac OS X Authenticated Print Queue Information Disclosure Vulnerability
28345 Apple Mac OS X 'notifyd' Local Denial of Service Vulnerability
28372 Apple Mac OS X Podcast Producer Podcast Capture Information Disclosure Vulnerability
28339 Apple Mac OS X mDNSResponderHelper Local Format String Vulnerability. The NetCfgTool privileged tool uses distributed objects to communicate with untrusted client programs on the local machine. ----------------------------------------------------------------------
A new version (0.9.0.0 - Release Candidate 1) of the free Secunia PSI
has been released. The new version includes many new and advanced
features, which makes it even easier to stay patched.
1) Multiple boundary errors in AFP client when processing "afp://"
URLs can be exploited to cause stack-based buffer overflows when a
user connects to a malicious AFP server.
Successful exploitation may allow execution of arbitrary code.
2) An error exists in AFP Server when checking Kerberos principal
realm names. This can be exploited to make unauthorized connections
to the server when cross-realm authentication with AFP Server is
used.
3) Multiple vulnerabilities in Apache can be exploited by malicious
people to conduct cross-site scripting attacks, cause a DoS (Denial
of Service), or potentially compromise a vulnerable system.
For more information:
SA18008
SA21197
SA26636
SA27906
SA28046
4) A boundary error within the handling of file names in the
NSDocument API in AppKit can be exploited to cause a stack-based
buffer overflow.
6) Multiple integer overflow errors exist in the parser for a legacy
serialization format. This can be exploited to cause a heap-based
buffer overflow when a specially crafted serialized property list is
parsed.
Successful exploitation may allow execution of arbitrary code.
7) An error in CFNetwork can be exploited to spoof secure websites
via 502 Bad Gateway errors from a malicious HTTPS proxy server.
8) Multiple vulnerabilities in ClamAV can be exploited by malicious
people to cause a DoS (Denial of Service) or to compromise a
vulnerable system.
For more information:
SA23347
SA24187
SA24891
SA26038
SA26530
SA28117
SA28907
9) An integer overflow error exists in CoreFoundation when handling
time zone data.
10) The problem is that files with names ending in ".ief" can be
automatically opened in AppleWorks if "Open 'Safe' files" is enabled
in Safari.
13) A boundary error in curl can be exploited to compromise a user's
system.
For more information:
SA17907
14) A vulnerability in emacs can be exploited by malicious people to
compromise a user's system.
For more information:
SA27508
15) A vulnerability in "file" can be exploited by malicious people to
compromise a vulnerable system.
For more information:
SA24548
16) An input validation error exists in the NSSelectorFromString API,
which can potentially be exploited to execute arbitrary code via a
malformed selector name.
17) A race condition error in NSFileManager can potentially be
exploited to gain escalated privileges.
18) A boundary error in NSFileManager can potentially be exploited to
cause a stack-based buffer overflow via an overly long pathname with a
specially crafted structure.
19) A race condition error exists in the cache management of
NSURLConnection. Safari).
20) A race condition error exists in NSXML.
21) An error in Help Viewer can be exploited to insert arbitrary HTML
or JavaScript into the generated topic list page via a specially
crafted "help:topic_list" URL and may redirect to a Help Viewer
"help:runscript" link that runs Applescript.
22) A boundary error exists in Image Raw within the handling of Adobe
Digital Negative (DNG) image files. This can be exploited to cause a
stack-based buffer overflow by enticing a user to open a maliciously
crafted image file.
23) Multiple vulnerabilities in Kerberos can be exploited to cause a
DoS or to compromise a vulnerable system.
For more information:
SA29428
24) An off-by-one error the "strnstr()" in libc can be exploited to
cause a DoS.
25) A format string error exists in mDNSResponderHelper, which can be
exploited by a malicious, local user to cause a DoS or execute
arbitrary code with privileges of mDNSResponderHelper by setting the
local hostname to a specially crafted string.
26) An error in notifyd can be exploited by a malicious, local user
to deny access to notifications by sending fake Mach port death
notifications to notifyd.
27) An array indexing error in the pax command line tool can be
exploited to execute arbitrary code.
28) Multiple vulnerabilities in php can be exploited to bypass
certain security restrictions.
For more information:
SA27648
SA28318
29) A security issue is caused due to the Podcast Capture application
providing passwords to a subtask through the arguments.
30) Printing and Preview handle PDF files with weak encryption.
31) An error in Printing in the handling of authenticated print
queues can lead to credentials being saved to disk.
33) A null-pointer dereference error exists in the handling of
Universal Disc Format (UDF) file systems, which can be exploited to
cause a system shutdown by enticing a user to open a maliciously
crafted disk image.
35) Some vulnerabilities in X11 can be exploited by malicious, local
users to gain escalated privileges.
For more information:
SA27040
SA28532
36) Some vulnerabilities in libpng can be exploited by malicious
people to cause a DoS (Denial of Service).
For more information:
SA22900
SA25292
SA27093
SA27130
SOLUTION:
Apply Security Update 2008-002.
Security Update 2008-002 v1.0 (PPC):
http://www.apple.com/support/downloads/securityupdate2008002v10ppc.html
Security Update 2008-002 v1.0 (Universal):
http://www.apple.com/support/downloads/securityupdate2008002v10universal.html
Security Update 2008-002 v1.0 (Leopard):
http://www.apple.com/support/downloads/securityupdate2008002v10leopard.html
Security Update 2008-002 v1.0 Server (Leopard):
http://www.apple.com/support/downloads/securityupdate2008002v10serverleopard.html
Security Update 2008-002 v1.0 Server (PPC):
http://www.apple.com/support/downloads/securityupdate2008002v10serverppc.html
Security Update 2008-002 v1.0 Server (Universal):
http://www.apple.com/support/downloads/securityupdate2008002v10serveruniversal.html
PROVIDED AND/OR DISCOVERED BY:
The vendor credits:
1) Ragnar Sundblad of KTH - Royal Institute of Technology, Stockholm
11) regenrecht via iDefense
19) Daniel Jalkut, Red Sweater Software
22) Brian Mastenbrook
24) Mike Ash, Rogue Amoeba Software
29) Maximilian Reiss, Chair for Applied Software Engineering, TUM
33) Paul Wagland of Redwood Software, and Wayne Linder of Iomega
34) Rodrigo Carvalho CORE Security Technologies
ORIGINAL ADVISORY:
Apple:
http://docs.info.apple.com/article.html?artnum=307562
CORE-2008-0123:
http://www.coresecurity.com/?action=item&id=2189
OTHER REFERENCES:
SA17907:
http://secunia.com/advisories/17907/
SA18008:
http://secunia.com/advisories/18008/
SA21187:
http://secunia.com/advisories/21197/
SA22900:
http://secunia.com/advisories/22900/
SA23347:
http://secunia.com/advisories/23347/
SA24187:
http://secunia.com/advisories/24187/
SA24548:
http://secunia.com/advisories/24548/
SA24891:
http://secunia.com/advisories/24891/
SA25292:
http://secunia.com/advisories/25292/
SA26038:
http://secunia.com/advisories/26038/
SA26530:
http://secunia.com/advisories/26530/
SA26636:
http://secunia.com/advisories/26636/
SA27040:
http://secunia.com/advisories/27040/
SA27093:
http://secunia.com/advisories/27093/
SA27130:
http://secunia.com/advisories/27130/
SA27648:
http://secunia.com/advisories/27648/
SA27508:
http://secunia.com/advisories/27508/
SA27906:
http://secunia.com/advisories/27906/
SA28046:
http://secunia.com/advisories/28046/
SA28117:
http://secunia.com/advisories/28117/
SAS28318:
http://secunia.com/advisories/28318/
SA28532:
http://secunia.com/advisories/28532/
SA28907:
http://secunia.com/advisories/28907/
SA29428:
http://secunia.com/advisories/29428/
SA29431:
http://secunia.com/advisories/29431/
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------
Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
----------------------------------------------------------------------
| VAR-200803-0244 | CVE-2008-1002 | Apple Safari vulnerable to xss via the processing of JavaScript URLs |
CVSS V2: 4.3 CVSS V3: - Severity: MEDIUM |
Cross-site scripting (XSS) vulnerability in Apple Safari before 3.1 allows remote attackers to inject arbitrary web script or HTML via a crafted javascript: URL.
An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of another site. This may help the attacker steal cookie-based authentication credentials and launch other attacks.
NOTE: This vulnerability was previously covered in BID 28290 (Apple Safari Prior to 3.1 Multiple Security Vulnerabilities), but has been given its own record to better document the issue. Apple Safari is prone to 12 security vulnerabilities.
Attackers may exploit these issues to execute arbitrary code, steal cookie-based authentication credentials, spoof secure websites, obtain sensitive information, and crash the affected application. Other attacks are also possible.
These issues affect versions prior to Apple Safari 3.1 running on Apple Mac OS X 10.4.1 and 10.5.2, Microsoft Windows XP, and Windows Vista.
NOTE: This BID is being retired. Safari is the WEB browser bundled with the Apple family operating system by default. ----------------------------------------------------------------------
Secunia Network Software Inspector 2.0 (NSI) - Public Beta
4 days left of beta period.
The 1st generation of the Secunia Network Software Inspector (NSI)
has been available for corporate users for almost 1 year and its been
a tremendous success.
The 2nd generation Secunia NSI is built on the same technology as the
award winning Secunia PSI, which has already been downloaded and
installed on more than 400,000 computers world wide.
For more information:
SA29393
SOLUTION:
Apply updated packages via the yum utility ("yum update WebKit").
Note: Updated packages for midori and kazehakase have also been
issued, which have been rebuilt against the new WebKit library. ----------------------------------------------------------------------
A new version (0.9.0.0 - Release Candidate 1) of the free Secunia PSI
has been released. The new version includes many new and advanced
features, which makes it even easier to stay patched.
Download and test it today:
https://psi.secunia.com/
Read more about this new version:
https://psi.secunia.com/?page=changelog
----------------------------------------------------------------------
TITLE:
Apple Safari Multiple Vulnerabilities
SECUNIA ADVISORY ID:
SA29393
VERIFY ADVISORY:
http://secunia.com/advisories/29393/
CRITICAL:
Highly critical
IMPACT:
Security Bypass, Cross Site Scripting, Exposure of sensitive
information, System access
WHERE:
>From remote
SOFTWARE:
Safari 3.x
http://secunia.com/product/17989/
Safari 2.x
http://secunia.com/product/5289/
DESCRIPTION:
Some vulnerabilities have been reported in Safari, which can be
exploited by malicious people to bypass certain security
restrictions, conduct cross-site scripting attacks, or to compromise
a vulnerable system.
2) An error exists the handling of web pages that have explicitly set
the document.domain property. This can be exploited to conduct
cross-site scripting attacks in sites that set the document.domain
property or between HTTP and HTTPS sites with the same
document.domain.
3) An error in Web Inspector can be exploited to inject script code
that will run in other domains and can read the user's file system
when a specially crafted page is inspected.
4) A security issue exists with the Kotoeri input method, which can
result in exposing the password field on the display when reverse
conversion is requested.
5) An error within the handling of the "window.open()" function can
be used to change the security context of a web page to the caller's
context.
6) The frame navigation policy is not enforced for Java applets. This
can be exploited to conduct cross-site scripting attacks using java
and to gain escalated privileges by enticing a user to open a
specially crafted web page.
7) An unspecified error in the handling of the document.domain
property can be exploited to conduct cross-site scripting attacks
when a user visits a specially crafted web page.
8) An error exists in the handling of the history object. This can be
exploited to inject javascript code that will run in the context of
other frames.
9) A boundary error exists in the handling of javascript regular
expressions, which can be exploited to cause a buffer overflow via a
specially crafted web page.
Successful exploitation allows execution of arbitrary code.
10) An error in WebKit allows method instances from one frame to be
called in the context of another frame. This can be exploited to
conduct cross-site scripting attacks.
SOLUTION:
Update to version 3.1.
PROVIDED AND/OR DISCOVERED BY:
1) Robert Swiecki of Google Information Security Team
2, 3, 5, 6) Adam Barth and Collin Jackson of Stanford University
10) Eric Seidel of the WebKit Open Source Project, and Tavis Ormandy
and Will Drewry of Google Security Team
ORIGINAL ADVISORY:
Apple:
http://docs.info.apple.com/article.html?artnum=307563
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------
Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
----------------------------------------------------------------------
| VAR-200803-0241 | CVE-2008-0999 | Apple Mac OS X of UDF Service operation interruption in file system (DoS) Vulnerabilities |
CVSS V2: 7.1 CVSS V3: - Severity: HIGH |
Apple Mac OS X 10.5.2 allows user-assisted attackers to cause a denial of service (crash) via a crafted Universal Disc Format (UDF) disk image, which triggers a NULL pointer dereference.
Attackers can leverage this issue to cause denial-of-service conditions. Apple Mac OS X is prone to multiple security vulnerabilities.
These issues affect Mac OS X and various applications, including AFP Client, AFP Server, AppKit, Application Firewall, CoreFoundation, CoreServices, CUPS, Foundation, Help Viewer, Image Raw, libc, mDNSResponder, notifyd, pax archive utility, Podcast Producer, Preview, Printing, System Configuration, UDF, and Wiki Server.
Attackers may exploit these issues to execute arbitrary code, trigger denial-of-service conditions, escalate privileges, and potentially compromise vulnerable computers.
These issues affect Apple Mac OS X 10.4.11, 10.4.11 Server, 10.5.2, 10.5.2 Server and earlier.
NOTE: This BID is being retired. The following individual records have been created to fully document all the vulnerabilities that were described in this BID:
28320 Apple Mac OS X AFP Client 'afp://' URI Remote Code Execution Vulnerability CVE-2008-0044.
28323 Apple Mac OS X AFP Server Cross-Realm Authentication Bypass Vulnerability CVE-2008-0994
28388 Apple Mac OS X AppKit NSDocument API's Stack Based Buffer Overflow Vulnerability CVE-2008-0048
28340 Apple Mac OS X AppKit Bootstrap Namespace Local Privilege Escalation Vulnerability CVE-2008-0049
28358 Apple Mac OS X AppKit Legacy Serialization Kit Multiple Integer Overflow Vulnerabilities CVE-2008-0057
28364 Apple Mac OS X AppKit PPD File Stack Buffer Overflow Vulnerability CVE-2008-0997
28368 Apple Mac OS X Application Firewall German Translation Insecure Configuration Weakness CVE-2008-0046
28375 Apple Mac OS X CoreFoundation Time Zone Data Local Privilege Escalation Vulnerability CVE-2008-0051
28384 Apple Mac OS X CoreServices '.ief' Files Security Policy Violation Weakness CVE-2008-0052
28334 CUPS Multiple Unspecified Input Validation Vulnerabilities
28341 Apple Mac OS X Foundation 'NSSelectorFromString' Input Validation Vulnerability
28343 Apple Mac OS X Foundation NSFileManager Insecure Directory Local Privilege Escalation Vulnerability
28357 Apple Mac OS X Foundation 'NSFileManager' Stack-Based Buffer Overflow Vulnerability
28359 Apple Mac OS X Foundation 'NSURLConnection' Cache Management Race Condition Security Vulnerability
28363 Apple Mac OS X Image RAW Stack-Based Buffer Overflow Vulnerability
28367 Apple Mac OS X Foundation 'NSXML' XML File Processing Race Condition Security Vulnerability
28371 Apple Mac OS X Help Viewer Remote Applescript Code Execution Vulnerability
28374 Apple Mac OS X libc 'strnstr(3)' Off-By-One Denial of Service Vulnerability
28387 Apple Mac OS X Printing To PDF Insecure Encryption Weakness
28386 Apple Mac OS X Preview PDF Insecure Encryption Weakness
28389 Apple Mac OS X Universal Disc Format Remote Denial of Service Vulnerability
28385 Apple Mac OS X NetCfgTool Local Privilege Escalation Vulnerability
28365 Apple Mac OS X pax Archive Utility Remote Code Execution Vulnerability
28344 Apple Mac OS X Authenticated Print Queue Information Disclosure Vulnerability
28345 Apple Mac OS X 'notifyd' Local Denial of Service Vulnerability
28372 Apple Mac OS X Podcast Producer Podcast Capture Information Disclosure Vulnerability
28339 Apple Mac OS X mDNSResponderHelper Local Format String Vulnerability. ----------------------------------------------------------------------
A new version (0.9.0.0 - Release Candidate 1) of the free Secunia PSI
has been released. The new version includes many new and advanced
features, which makes it even easier to stay patched.
1) Multiple boundary errors in AFP client when processing "afp://"
URLs can be exploited to cause stack-based buffer overflows when a
user connects to a malicious AFP server.
Successful exploitation may allow execution of arbitrary code.
2) An error exists in AFP Server when checking Kerberos principal
realm names. This can be exploited to make unauthorized connections
to the server when cross-realm authentication with AFP Server is
used.
3) Multiple vulnerabilities in Apache can be exploited by malicious
people to conduct cross-site scripting attacks, cause a DoS (Denial
of Service), or potentially compromise a vulnerable system.
For more information:
SA18008
SA21197
SA26636
SA27906
SA28046
4) A boundary error within the handling of file names in the
NSDocument API in AppKit can be exploited to cause a stack-based
buffer overflow.
6) Multiple integer overflow errors exist in the parser for a legacy
serialization format. This can be exploited to cause a heap-based
buffer overflow when a specially crafted serialized property list is
parsed.
Successful exploitation may allow execution of arbitrary code.
7) An error in CFNetwork can be exploited to spoof secure websites
via 502 Bad Gateway errors from a malicious HTTPS proxy server.
8) Multiple vulnerabilities in ClamAV can be exploited by malicious
people to cause a DoS (Denial of Service) or to compromise a
vulnerable system.
For more information:
SA23347
SA24187
SA24891
SA26038
SA26530
SA28117
SA28907
9) An integer overflow error exists in CoreFoundation when handling
time zone data.
10) The problem is that files with names ending in ".ief" can be
automatically opened in AppleWorks if "Open 'Safe' files" is enabled
in Safari.
For more information:
SA29431
12) Multiple input validation errors exist in CUPS, which can be
exploited to execute arbitrary code with system privileges.
13) A boundary error in curl can be exploited to compromise a user's
system.
For more information:
SA17907
14) A vulnerability in emacs can be exploited by malicious people to
compromise a user's system.
For more information:
SA27508
15) A vulnerability in "file" can be exploited by malicious people to
compromise a vulnerable system.
For more information:
SA24548
16) An input validation error exists in the NSSelectorFromString API,
which can potentially be exploited to execute arbitrary code via a
malformed selector name.
17) A race condition error in NSFileManager can potentially be
exploited to gain escalated privileges.
18) A boundary error in NSFileManager can potentially be exploited to
cause a stack-based buffer overflow via an overly long pathname with a
specially crafted structure.
19) A race condition error exists in the cache management of
NSURLConnection. This can be exploited to cause a DoS or execute
arbitrary code in applications using the library (e.g. Safari).
20) A race condition error exists in NSXML. This can be exploited to
execute arbitrary code by enticing a user to process an XML file in
an application which uses NSXML.
21) An error in Help Viewer can be exploited to insert arbitrary HTML
or JavaScript into the generated topic list page via a specially
crafted "help:topic_list" URL and may redirect to a Help Viewer
"help:runscript" link that runs Applescript.
22) A boundary error exists in Image Raw within the handling of Adobe
Digital Negative (DNG) image files. This can be exploited to cause a
stack-based buffer overflow by enticing a user to open a maliciously
crafted image file.
23) Multiple vulnerabilities in Kerberos can be exploited to cause a
DoS or to compromise a vulnerable system.
For more information:
SA29428
24) An off-by-one error the "strnstr()" in libc can be exploited to
cause a DoS.
25) A format string error exists in mDNSResponderHelper, which can be
exploited by a malicious, local user to cause a DoS or execute
arbitrary code with privileges of mDNSResponderHelper by setting the
local hostname to a specially crafted string.
26) An error in notifyd can be exploited by a malicious, local user
to deny access to notifications by sending fake Mach port death
notifications to notifyd.
27) An array indexing error in the pax command line tool can be
exploited to execute arbitrary code.
28) Multiple vulnerabilities in php can be exploited to bypass
certain security restrictions.
For more information:
SA27648
SA28318
29) A security issue is caused due to the Podcast Capture application
providing passwords to a subtask through the arguments.
30) Printing and Preview handle PDF files with weak encryption.
31) An error in Printing in the handling of authenticated print
queues can lead to credentials being saved to disk.
35) Some vulnerabilities in X11 can be exploited by malicious, local
users to gain escalated privileges.
For more information:
SA27040
SA28532
36) Some vulnerabilities in libpng can be exploited by malicious
people to cause a DoS (Denial of Service).
For more information:
SA22900
SA25292
SA27093
SA27130
SOLUTION:
Apply Security Update 2008-002.
Security Update 2008-002 v1.0 (PPC):
http://www.apple.com/support/downloads/securityupdate2008002v10ppc.html
Security Update 2008-002 v1.0 (Universal):
http://www.apple.com/support/downloads/securityupdate2008002v10universal.html
Security Update 2008-002 v1.0 (Leopard):
http://www.apple.com/support/downloads/securityupdate2008002v10leopard.html
Security Update 2008-002 v1.0 Server (Leopard):
http://www.apple.com/support/downloads/securityupdate2008002v10serverleopard.html
Security Update 2008-002 v1.0 Server (PPC):
http://www.apple.com/support/downloads/securityupdate2008002v10serverppc.html
Security Update 2008-002 v1.0 Server (Universal):
http://www.apple.com/support/downloads/securityupdate2008002v10serveruniversal.html
PROVIDED AND/OR DISCOVERED BY:
The vendor credits:
1) Ragnar Sundblad of KTH - Royal Institute of Technology, Stockholm
11) regenrecht via iDefense
19) Daniel Jalkut, Red Sweater Software
22) Brian Mastenbrook
24) Mike Ash, Rogue Amoeba Software
29) Maximilian Reiss, Chair for Applied Software Engineering, TUM
33) Paul Wagland of Redwood Software, and Wayne Linder of Iomega
34) Rodrigo Carvalho CORE Security Technologies
ORIGINAL ADVISORY:
Apple:
http://docs.info.apple.com/article.html?artnum=307562
CORE-2008-0123:
http://www.coresecurity.com/?action=item&id=2189
OTHER REFERENCES:
SA17907:
http://secunia.com/advisories/17907/
SA18008:
http://secunia.com/advisories/18008/
SA21187:
http://secunia.com/advisories/21197/
SA22900:
http://secunia.com/advisories/22900/
SA23347:
http://secunia.com/advisories/23347/
SA24187:
http://secunia.com/advisories/24187/
SA24548:
http://secunia.com/advisories/24548/
SA24891:
http://secunia.com/advisories/24891/
SA25292:
http://secunia.com/advisories/25292/
SA26038:
http://secunia.com/advisories/26038/
SA26530:
http://secunia.com/advisories/26530/
SA26636:
http://secunia.com/advisories/26636/
SA27040:
http://secunia.com/advisories/27040/
SA27093:
http://secunia.com/advisories/27093/
SA27130:
http://secunia.com/advisories/27130/
SA27648:
http://secunia.com/advisories/27648/
SA27508:
http://secunia.com/advisories/27508/
SA27906:
http://secunia.com/advisories/27906/
SA28046:
http://secunia.com/advisories/28046/
SA28117:
http://secunia.com/advisories/28117/
SAS28318:
http://secunia.com/advisories/28318/
SA28532:
http://secunia.com/advisories/28532/
SA28907:
http://secunia.com/advisories/28907/
SA29428:
http://secunia.com/advisories/29428/
SA29431:
http://secunia.com/advisories/29431/
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------
Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
----------------------------------------------------------------------
| VAR-200803-0239 | CVE-2008-0997 | Apple Mac OS X of AppKit In PPD Buffer overflow vulnerability in file handling |
CVSS V2: 6.8 CVSS V3: - Severity: MEDIUM |
Stack-based buffer overflow in AppKit in Apple Mac OS X 10.4.11 allows user-assisted remote attackers to cause a denial of service (application termination) and execute arbitrary code via a crafted PostScript Printer Description (PPD) file that is not properly handled when querying a network printer. Failed attacks will cause denial-of-service conditions. Apple Mac OS X is prone to multiple security vulnerabilities.
These issues affect Mac OS X and various applications, including AFP Client, AFP Server, AppKit, Application Firewall, CoreFoundation, CoreServices, CUPS, Foundation, Help Viewer, Image Raw, libc, mDNSResponder, notifyd, pax archive utility, Podcast Producer, Preview, Printing, System Configuration, UDF, and Wiki Server.
Attackers may exploit these issues to execute arbitrary code, trigger denial-of-service conditions, escalate privileges, and potentially compromise vulnerable computers.
These issues affect Apple Mac OS X 10.4.11, 10.4.11 Server, 10.5.2, 10.5.2 Server and earlier.
NOTE: This BID is being retired. The following individual records have been created to fully document all the vulnerabilities that were described in this BID:
28320 Apple Mac OS X AFP Client 'afp://' URI Remote Code Execution Vulnerability CVE-2008-0044.
28323 Apple Mac OS X AFP Server Cross-Realm Authentication Bypass Vulnerability CVE-2008-0994
28388 Apple Mac OS X AppKit NSDocument API's Stack Based Buffer Overflow Vulnerability CVE-2008-0048
28340 Apple Mac OS X AppKit Bootstrap Namespace Local Privilege Escalation Vulnerability CVE-2008-0049
28358 Apple Mac OS X AppKit Legacy Serialization Kit Multiple Integer Overflow Vulnerabilities CVE-2008-0057
28364 Apple Mac OS X AppKit PPD File Stack Buffer Overflow Vulnerability CVE-2008-0997
28368 Apple Mac OS X Application Firewall German Translation Insecure Configuration Weakness CVE-2008-0046
28375 Apple Mac OS X CoreFoundation Time Zone Data Local Privilege Escalation Vulnerability CVE-2008-0051
28384 Apple Mac OS X CoreServices '.ief' Files Security Policy Violation Weakness CVE-2008-0052
28334 CUPS Multiple Unspecified Input Validation Vulnerabilities
28341 Apple Mac OS X Foundation 'NSSelectorFromString' Input Validation Vulnerability
28343 Apple Mac OS X Foundation NSFileManager Insecure Directory Local Privilege Escalation Vulnerability
28357 Apple Mac OS X Foundation 'NSFileManager' Stack-Based Buffer Overflow Vulnerability
28359 Apple Mac OS X Foundation 'NSURLConnection' Cache Management Race Condition Security Vulnerability
28363 Apple Mac OS X Image RAW Stack-Based Buffer Overflow Vulnerability
28367 Apple Mac OS X Foundation 'NSXML' XML File Processing Race Condition Security Vulnerability
28371 Apple Mac OS X Help Viewer Remote Applescript Code Execution Vulnerability
28374 Apple Mac OS X libc 'strnstr(3)' Off-By-One Denial of Service Vulnerability
28387 Apple Mac OS X Printing To PDF Insecure Encryption Weakness
28386 Apple Mac OS X Preview PDF Insecure Encryption Weakness
28389 Apple Mac OS X Universal Disc Format Remote Denial of Service Vulnerability
28385 Apple Mac OS X NetCfgTool Local Privilege Escalation Vulnerability
28365 Apple Mac OS X pax Archive Utility Remote Code Execution Vulnerability
28344 Apple Mac OS X Authenticated Print Queue Information Disclosure Vulnerability
28345 Apple Mac OS X 'notifyd' Local Denial of Service Vulnerability
28372 Apple Mac OS X Podcast Producer Podcast Capture Information Disclosure Vulnerability
28339 Apple Mac OS X mDNSResponderHelper Local Format String Vulnerability. ----------------------------------------------------------------------
A new version (0.9.0.0 - Release Candidate 1) of the free Secunia PSI
has been released. The new version includes many new and advanced
features, which makes it even easier to stay patched.
1) Multiple boundary errors in AFP client when processing "afp://"
URLs can be exploited to cause stack-based buffer overflows when a
user connects to a malicious AFP server.
Successful exploitation may allow execution of arbitrary code.
2) An error exists in AFP Server when checking Kerberos principal
realm names. This can be exploited to make unauthorized connections
to the server when cross-realm authentication with AFP Server is
used.
3) Multiple vulnerabilities in Apache can be exploited by malicious
people to conduct cross-site scripting attacks, cause a DoS (Denial
of Service), or potentially compromise a vulnerable system.
For more information:
SA18008
SA21197
SA26636
SA27906
SA28046
4) A boundary error within the handling of file names in the
NSDocument API in AppKit can be exploited to cause a stack-based
buffer overflow.
6) Multiple integer overflow errors exist in the parser for a legacy
serialization format. This can be exploited to cause a heap-based
buffer overflow when a specially crafted serialized property list is
parsed.
Successful exploitation may allow execution of arbitrary code.
7) An error in CFNetwork can be exploited to spoof secure websites
via 502 Bad Gateway errors from a malicious HTTPS proxy server.
8) Multiple vulnerabilities in ClamAV can be exploited by malicious
people to cause a DoS (Denial of Service) or to compromise a
vulnerable system.
For more information:
SA23347
SA24187
SA24891
SA26038
SA26530
SA28117
SA28907
9) An integer overflow error exists in CoreFoundation when handling
time zone data.
10) The problem is that files with names ending in ".ief" can be
automatically opened in AppleWorks if "Open 'Safe' files" is enabled
in Safari.
13) A boundary error in curl can be exploited to compromise a user's
system.
For more information:
SA17907
14) A vulnerability in emacs can be exploited by malicious people to
compromise a user's system.
For more information:
SA27508
15) A vulnerability in "file" can be exploited by malicious people to
compromise a vulnerable system.
For more information:
SA24548
16) An input validation error exists in the NSSelectorFromString API,
which can potentially be exploited to execute arbitrary code via a
malformed selector name.
17) A race condition error in NSFileManager can potentially be
exploited to gain escalated privileges.
18) A boundary error in NSFileManager can potentially be exploited to
cause a stack-based buffer overflow via an overly long pathname with a
specially crafted structure.
19) A race condition error exists in the cache management of
NSURLConnection. This can be exploited to cause a DoS or execute
arbitrary code in applications using the library (e.g. Safari).
20) A race condition error exists in NSXML.
21) An error in Help Viewer can be exploited to insert arbitrary HTML
or JavaScript into the generated topic list page via a specially
crafted "help:topic_list" URL and may redirect to a Help Viewer
"help:runscript" link that runs Applescript.
22) A boundary error exists in Image Raw within the handling of Adobe
Digital Negative (DNG) image files. This can be exploited to cause a
stack-based buffer overflow by enticing a user to open a maliciously
crafted image file.
23) Multiple vulnerabilities in Kerberos can be exploited to cause a
DoS or to compromise a vulnerable system.
For more information:
SA29428
24) An off-by-one error the "strnstr()" in libc can be exploited to
cause a DoS.
25) A format string error exists in mDNSResponderHelper, which can be
exploited by a malicious, local user to cause a DoS or execute
arbitrary code with privileges of mDNSResponderHelper by setting the
local hostname to a specially crafted string.
26) An error in notifyd can be exploited by a malicious, local user
to deny access to notifications by sending fake Mach port death
notifications to notifyd.
27) An array indexing error in the pax command line tool can be
exploited to execute arbitrary code.
28) Multiple vulnerabilities in php can be exploited to bypass
certain security restrictions.
For more information:
SA27648
SA28318
29) A security issue is caused due to the Podcast Capture application
providing passwords to a subtask through the arguments.
30) Printing and Preview handle PDF files with weak encryption.
31) An error in Printing in the handling of authenticated print
queues can lead to credentials being saved to disk.
33) A null-pointer dereference error exists in the handling of
Universal Disc Format (UDF) file systems, which can be exploited to
cause a system shutdown by enticing a user to open a maliciously
crafted disk image.
35) Some vulnerabilities in X11 can be exploited by malicious, local
users to gain escalated privileges.
For more information:
SA27040
SA28532
36) Some vulnerabilities in libpng can be exploited by malicious
people to cause a DoS (Denial of Service).
For more information:
SA22900
SA25292
SA27093
SA27130
SOLUTION:
Apply Security Update 2008-002.
Security Update 2008-002 v1.0 (PPC):
http://www.apple.com/support/downloads/securityupdate2008002v10ppc.html
Security Update 2008-002 v1.0 (Universal):
http://www.apple.com/support/downloads/securityupdate2008002v10universal.html
Security Update 2008-002 v1.0 (Leopard):
http://www.apple.com/support/downloads/securityupdate2008002v10leopard.html
Security Update 2008-002 v1.0 Server (Leopard):
http://www.apple.com/support/downloads/securityupdate2008002v10serverleopard.html
Security Update 2008-002 v1.0 Server (PPC):
http://www.apple.com/support/downloads/securityupdate2008002v10serverppc.html
Security Update 2008-002 v1.0 Server (Universal):
http://www.apple.com/support/downloads/securityupdate2008002v10serveruniversal.html
PROVIDED AND/OR DISCOVERED BY:
The vendor credits:
1) Ragnar Sundblad of KTH - Royal Institute of Technology, Stockholm
11) regenrecht via iDefense
19) Daniel Jalkut, Red Sweater Software
22) Brian Mastenbrook
24) Mike Ash, Rogue Amoeba Software
29) Maximilian Reiss, Chair for Applied Software Engineering, TUM
33) Paul Wagland of Redwood Software, and Wayne Linder of Iomega
34) Rodrigo Carvalho CORE Security Technologies
ORIGINAL ADVISORY:
Apple:
http://docs.info.apple.com/article.html?artnum=307562
CORE-2008-0123:
http://www.coresecurity.com/?action=item&id=2189
OTHER REFERENCES:
SA17907:
http://secunia.com/advisories/17907/
SA18008:
http://secunia.com/advisories/18008/
SA21187:
http://secunia.com/advisories/21197/
SA22900:
http://secunia.com/advisories/22900/
SA23347:
http://secunia.com/advisories/23347/
SA24187:
http://secunia.com/advisories/24187/
SA24548:
http://secunia.com/advisories/24548/
SA24891:
http://secunia.com/advisories/24891/
SA25292:
http://secunia.com/advisories/25292/
SA26038:
http://secunia.com/advisories/26038/
SA26530:
http://secunia.com/advisories/26530/
SA26636:
http://secunia.com/advisories/26636/
SA27040:
http://secunia.com/advisories/27040/
SA27093:
http://secunia.com/advisories/27093/
SA27130:
http://secunia.com/advisories/27130/
SA27648:
http://secunia.com/advisories/27648/
SA27508:
http://secunia.com/advisories/27508/
SA27906:
http://secunia.com/advisories/27906/
SA28046:
http://secunia.com/advisories/28046/
SA28117:
http://secunia.com/advisories/28117/
SAS28318:
http://secunia.com/advisories/28318/
SA28532:
http://secunia.com/advisories/28532/
SA28907:
http://secunia.com/advisories/28907/
SA29428:
http://secunia.com/advisories/29428/
SA29431:
http://secunia.com/advisories/29431/
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------
Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
----------------------------------------------------------------------
| VAR-200803-0233 | CVE-2008-0990 | Apple Mac OS X of notifyd Service disruption in (DoS) Vulnerabilities |
CVSS V2: 4.4 CVSS V3: - Severity: MEDIUM |
notifyd in Apple Mac OS X 10.4.11 does not verify that Mach port death notifications have originated from the kernel, which allows local users to cause a denial of service via spoofed death notifications that prevent other applications from receiving notifications. (DoS) There is a vulnerability that becomes a condition.Disguised disabling notifications by a malicious local user can prevent other applications from receiving notifications.
Attackers can leverage this issue to cause denial-of-service conditions.
These issues affect Mac OS X and various applications, including AFP Client, AFP Server, AppKit, Application Firewall, CoreFoundation, CoreServices, CUPS, Foundation, Help Viewer, Image Raw, libc, mDNSResponder, notifyd, pax archive utility, Podcast Producer, Preview, Printing, System Configuration, UDF, and Wiki Server.
Attackers may exploit these issues to execute arbitrary code, trigger denial-of-service conditions, escalate privileges, and potentially compromise vulnerable computers.
NOTE: This BID is being retired. The following individual records have been created to fully document all the vulnerabilities that were described in this BID:
28320 Apple Mac OS X AFP Client 'afp://' URI Remote Code Execution Vulnerability CVE-2008-0044. ----------------------------------------------------------------------
A new version (0.9.0.0 - Release Candidate 1) of the free Secunia PSI
has been released. The new version includes many new and advanced
features, which makes it even easier to stay patched.
1) Multiple boundary errors in AFP client when processing "afp://"
URLs can be exploited to cause stack-based buffer overflows when a
user connects to a malicious AFP server.
Successful exploitation may allow execution of arbitrary code.
2) An error exists in AFP Server when checking Kerberos principal
realm names. This can be exploited to make unauthorized connections
to the server when cross-realm authentication with AFP Server is
used.
3) Multiple vulnerabilities in Apache can be exploited by malicious
people to conduct cross-site scripting attacks, cause a DoS (Denial
of Service), or potentially compromise a vulnerable system.
For more information:
SA18008
SA21197
SA26636
SA27906
SA28046
4) A boundary error within the handling of file names in the
NSDocument API in AppKit can be exploited to cause a stack-based
buffer overflow.
6) Multiple integer overflow errors exist in the parser for a legacy
serialization format. This can be exploited to cause a heap-based
buffer overflow when a specially crafted serialized property list is
parsed.
Successful exploitation may allow execution of arbitrary code.
7) An error in CFNetwork can be exploited to spoof secure websites
via 502 Bad Gateway errors from a malicious HTTPS proxy server.
8) Multiple vulnerabilities in ClamAV can be exploited by malicious
people to cause a DoS (Denial of Service) or to compromise a
vulnerable system.
For more information:
SA23347
SA24187
SA24891
SA26038
SA26530
SA28117
SA28907
9) An integer overflow error exists in CoreFoundation when handling
time zone data.
10) The problem is that files with names ending in ".ief" can be
automatically opened in AppleWorks if "Open 'Safe' files" is enabled
in Safari.
For more information:
SA29431
12) Multiple input validation errors exist in CUPS, which can be
exploited to execute arbitrary code with system privileges.
13) A boundary error in curl can be exploited to compromise a user's
system.
For more information:
SA17907
14) A vulnerability in emacs can be exploited by malicious people to
compromise a user's system.
For more information:
SA27508
15) A vulnerability in "file" can be exploited by malicious people to
compromise a vulnerable system.
For more information:
SA24548
16) An input validation error exists in the NSSelectorFromString API,
which can potentially be exploited to execute arbitrary code via a
malformed selector name.
17) A race condition error in NSFileManager can potentially be
exploited to gain escalated privileges.
18) A boundary error in NSFileManager can potentially be exploited to
cause a stack-based buffer overflow via an overly long pathname with a
specially crafted structure.
19) A race condition error exists in the cache management of
NSURLConnection. This can be exploited to cause a DoS or execute
arbitrary code in applications using the library (e.g. Safari).
20) A race condition error exists in NSXML. This can be exploited to
execute arbitrary code by enticing a user to process an XML file in
an application which uses NSXML.
21) An error in Help Viewer can be exploited to insert arbitrary HTML
or JavaScript into the generated topic list page via a specially
crafted "help:topic_list" URL and may redirect to a Help Viewer
"help:runscript" link that runs Applescript.
22) A boundary error exists in Image Raw within the handling of Adobe
Digital Negative (DNG) image files. This can be exploited to cause a
stack-based buffer overflow by enticing a user to open a maliciously
crafted image file.
23) Multiple vulnerabilities in Kerberos can be exploited to cause a
DoS or to compromise a vulnerable system.
For more information:
SA29428
24) An off-by-one error the "strnstr()" in libc can be exploited to
cause a DoS.
25) A format string error exists in mDNSResponderHelper, which can be
exploited by a malicious, local user to cause a DoS or execute
arbitrary code with privileges of mDNSResponderHelper by setting the
local hostname to a specially crafted string.
27) An array indexing error in the pax command line tool can be
exploited to execute arbitrary code.
28) Multiple vulnerabilities in php can be exploited to bypass
certain security restrictions.
For more information:
SA27648
SA28318
29) A security issue is caused due to the Podcast Capture application
providing passwords to a subtask through the arguments.
30) Printing and Preview handle PDF files with weak encryption.
31) An error in Printing in the handling of authenticated print
queues can lead to credentials being saved to disk.
33) A null-pointer dereference error exists in the handling of
Universal Disc Format (UDF) file systems, which can be exploited to
cause a system shutdown by enticing a user to open a maliciously
crafted disk image.
35) Some vulnerabilities in X11 can be exploited by malicious, local
users to gain escalated privileges.
For more information:
SA27040
SA28532
36) Some vulnerabilities in libpng can be exploited by malicious
people to cause a DoS (Denial of Service).
For more information:
SA22900
SA25292
SA27093
SA27130
SOLUTION:
Apply Security Update 2008-002.
Security Update 2008-002 v1.0 (PPC):
http://www.apple.com/support/downloads/securityupdate2008002v10ppc.html
Security Update 2008-002 v1.0 (Universal):
http://www.apple.com/support/downloads/securityupdate2008002v10universal.html
Security Update 2008-002 v1.0 (Leopard):
http://www.apple.com/support/downloads/securityupdate2008002v10leopard.html
Security Update 2008-002 v1.0 Server (Leopard):
http://www.apple.com/support/downloads/securityupdate2008002v10serverleopard.html
Security Update 2008-002 v1.0 Server (PPC):
http://www.apple.com/support/downloads/securityupdate2008002v10serverppc.html
Security Update 2008-002 v1.0 Server (Universal):
http://www.apple.com/support/downloads/securityupdate2008002v10serveruniversal.html
PROVIDED AND/OR DISCOVERED BY:
The vendor credits:
1) Ragnar Sundblad of KTH - Royal Institute of Technology, Stockholm
11) regenrecht via iDefense
19) Daniel Jalkut, Red Sweater Software
22) Brian Mastenbrook
24) Mike Ash, Rogue Amoeba Software
29) Maximilian Reiss, Chair for Applied Software Engineering, TUM
33) Paul Wagland of Redwood Software, and Wayne Linder of Iomega
34) Rodrigo Carvalho CORE Security Technologies
ORIGINAL ADVISORY:
Apple:
http://docs.info.apple.com/article.html?artnum=307562
CORE-2008-0123:
http://www.coresecurity.com/?action=item&id=2189
OTHER REFERENCES:
SA17907:
http://secunia.com/advisories/17907/
SA18008:
http://secunia.com/advisories/18008/
SA21187:
http://secunia.com/advisories/21197/
SA22900:
http://secunia.com/advisories/22900/
SA23347:
http://secunia.com/advisories/23347/
SA24187:
http://secunia.com/advisories/24187/
SA24548:
http://secunia.com/advisories/24548/
SA24891:
http://secunia.com/advisories/24891/
SA25292:
http://secunia.com/advisories/25292/
SA26038:
http://secunia.com/advisories/26038/
SA26530:
http://secunia.com/advisories/26530/
SA26636:
http://secunia.com/advisories/26636/
SA27040:
http://secunia.com/advisories/27040/
SA27093:
http://secunia.com/advisories/27093/
SA27130:
http://secunia.com/advisories/27130/
SA27648:
http://secunia.com/advisories/27648/
SA27508:
http://secunia.com/advisories/27508/
SA27906:
http://secunia.com/advisories/27906/
SA28046:
http://secunia.com/advisories/28046/
SA28117:
http://secunia.com/advisories/28117/
SAS28318:
http://secunia.com/advisories/28318/
SA28532:
http://secunia.com/advisories/28532/
SA28907:
http://secunia.com/advisories/28907/
SA29428:
http://secunia.com/advisories/29428/
SA29431:
http://secunia.com/advisories/29431/
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------
Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
----------------------------------------------------------------------
| VAR-200803-0238 | CVE-2008-0996 | Mac OS X Vulnerabilities that cause login credentials to be disclosed |
CVSS V2: 1.7 CVSS V3: - Severity: LOW |
The Printing component in Apple Mac OS X 10.5.2 might save authentication credentials to disk when starting a job on an authenticated print queue, which might allow local users to obtain the credentials.
Attackers can leverage this issue to gain access to privileged authentication credentials. Other attacks are also possible. The following individual records have been created to fully document all the vulnerabilities that were described in this BID:
28356 Apple Safari CFNetwork Arbitrary Secure Website Spoofing Vulnerability
28321 Apple Safari Error Page Cross-Site Scripting Vulnerability
28328 Apple Safari Javascript URL Parsing Cross-Site Scripting Vulnerability
28330 Apple Safari WebCore 'document.domain' Cross-Site Scripting Vulnerability
28347 Apple Safari Web Inspector Remote Code Injection Vulnerability
28326 Apple Safari WebCore 'Kotoeri' Password Field Information Disclosure Vulnerability
28332 Apple Safari WebCore 'window.open()' Function Cross-Site Scripting Vulnerability
28335 Apple Safari WebCore Java Frame Navigation Cross-Site Scripting Vulnerability
28336 Apple Safari WebCore 'document.domain' Variant Cross-Site Scripting Vulnerability
28337 Apple Safari WebCore History Object Cross-Site Scripting Vulnerability
28338 Apple Safari WebKit JavaScript Regular Expression Handling Buffer Overflow Vulnerability
28342 Apple Safari WebKit Frame Method Cross-Site Scripting Vulnerability. Apple Mac OS X is prone to multiple security vulnerabilities.
These issues affect Mac OS X and various applications, including AFP Client, AFP Server, AppKit, Application Firewall, CoreFoundation, CoreServices, CUPS, Foundation, Help Viewer, Image Raw, libc, mDNSResponder, notifyd, pax archive utility, Podcast Producer, Preview, Printing, System Configuration, UDF, and Wiki Server.
Attackers may exploit these issues to execute arbitrary code, trigger denial-of-service conditions, escalate privileges, and potentially compromise vulnerable computers.
These issues affect Apple Mac OS X 10.4.11, 10.4.11 Server, 10.5.2, 10.5.2 Server and earlier.
NOTE: This BID is being retired. The following individual records have been created to fully document all the vulnerabilities that were described in this BID:
28320 Apple Mac OS X AFP Client 'afp://' URI Remote Code Execution Vulnerability CVE-2008-0044.
28323 Apple Mac OS X AFP Server Cross-Realm Authentication Bypass Vulnerability CVE-2008-0994
28388 Apple Mac OS X AppKit NSDocument API's Stack Based Buffer Overflow Vulnerability CVE-2008-0048
28340 Apple Mac OS X AppKit Bootstrap Namespace Local Privilege Escalation Vulnerability CVE-2008-0049
28358 Apple Mac OS X AppKit Legacy Serialization Kit Multiple Integer Overflow Vulnerabilities CVE-2008-0057
28364 Apple Mac OS X AppKit PPD File Stack Buffer Overflow Vulnerability CVE-2008-0997
28368 Apple Mac OS X Application Firewall German Translation Insecure Configuration Weakness CVE-2008-0046
28375 Apple Mac OS X CoreFoundation Time Zone Data Local Privilege Escalation Vulnerability CVE-2008-0051
28384 Apple Mac OS X CoreServices '.ief' Files Security Policy Violation Weakness CVE-2008-0052
28334 CUPS Multiple Unspecified Input Validation Vulnerabilities
28341 Apple Mac OS X Foundation 'NSSelectorFromString' Input Validation Vulnerability
28343 Apple Mac OS X Foundation NSFileManager Insecure Directory Local Privilege Escalation Vulnerability
28357 Apple Mac OS X Foundation 'NSFileManager' Stack-Based Buffer Overflow Vulnerability
28359 Apple Mac OS X Foundation 'NSURLConnection' Cache Management Race Condition Security Vulnerability
28363 Apple Mac OS X Image RAW Stack-Based Buffer Overflow Vulnerability
28367 Apple Mac OS X Foundation 'NSXML' XML File Processing Race Condition Security Vulnerability
28371 Apple Mac OS X Help Viewer Remote Applescript Code Execution Vulnerability
28374 Apple Mac OS X libc 'strnstr(3)' Off-By-One Denial of Service Vulnerability
28387 Apple Mac OS X Printing To PDF Insecure Encryption Weakness
28386 Apple Mac OS X Preview PDF Insecure Encryption Weakness
28389 Apple Mac OS X Universal Disc Format Remote Denial of Service Vulnerability
28385 Apple Mac OS X NetCfgTool Local Privilege Escalation Vulnerability
28365 Apple Mac OS X pax Archive Utility Remote Code Execution Vulnerability
28344 Apple Mac OS X Authenticated Print Queue Information Disclosure Vulnerability
28345 Apple Mac OS X 'notifyd' Local Denial of Service Vulnerability
28372 Apple Mac OS X Podcast Producer Podcast Capture Information Disclosure Vulnerability
28339 Apple Mac OS X mDNSResponderHelper Local Format String Vulnerability. ----------------------------------------------------------------------
A new version (0.9.0.0 - Release Candidate 1) of the free Secunia PSI
has been released. The new version includes many new and advanced
features, which makes it even easier to stay patched.
1) Multiple boundary errors in AFP client when processing "afp://"
URLs can be exploited to cause stack-based buffer overflows when a
user connects to a malicious AFP server.
Successful exploitation may allow execution of arbitrary code.
2) An error exists in AFP Server when checking Kerberos principal
realm names. This can be exploited to make unauthorized connections
to the server when cross-realm authentication with AFP Server is
used.
3) Multiple vulnerabilities in Apache can be exploited by malicious
people to conduct cross-site scripting attacks, cause a DoS (Denial
of Service), or potentially compromise a vulnerable system.
For more information:
SA18008
SA21197
SA26636
SA27906
SA28046
4) A boundary error within the handling of file names in the
NSDocument API in AppKit can be exploited to cause a stack-based
buffer overflow.
6) Multiple integer overflow errors exist in the parser for a legacy
serialization format. This can be exploited to cause a heap-based
buffer overflow when a specially crafted serialized property list is
parsed.
Successful exploitation may allow execution of arbitrary code.
7) An error in CFNetwork can be exploited to spoof secure websites
via 502 Bad Gateway errors from a malicious HTTPS proxy server.
8) Multiple vulnerabilities in ClamAV can be exploited by malicious
people to cause a DoS (Denial of Service) or to compromise a
vulnerable system.
For more information:
SA23347
SA24187
SA24891
SA26038
SA26530
SA28117
SA28907
9) An integer overflow error exists in CoreFoundation when handling
time zone data.
10) The problem is that files with names ending in ".ief" can be
automatically opened in AppleWorks if "Open 'Safe' files" is enabled
in Safari.
For more information:
SA29431
12) Multiple input validation errors exist in CUPS, which can be
exploited to execute arbitrary code with system privileges.
13) A boundary error in curl can be exploited to compromise a user's
system.
For more information:
SA17907
14) A vulnerability in emacs can be exploited by malicious people to
compromise a user's system.
For more information:
SA27508
15) A vulnerability in "file" can be exploited by malicious people to
compromise a vulnerable system.
For more information:
SA24548
16) An input validation error exists in the NSSelectorFromString API,
which can potentially be exploited to execute arbitrary code via a
malformed selector name.
17) A race condition error in NSFileManager can potentially be
exploited to gain escalated privileges.
18) A boundary error in NSFileManager can potentially be exploited to
cause a stack-based buffer overflow via an overly long pathname with a
specially crafted structure.
19) A race condition error exists in the cache management of
NSURLConnection. This can be exploited to cause a DoS or execute
arbitrary code in applications using the library (e.g. Safari).
20) A race condition error exists in NSXML. This can be exploited to
execute arbitrary code by enticing a user to process an XML file in
an application which uses NSXML.
21) An error in Help Viewer can be exploited to insert arbitrary HTML
or JavaScript into the generated topic list page via a specially
crafted "help:topic_list" URL and may redirect to a Help Viewer
"help:runscript" link that runs Applescript.
22) A boundary error exists in Image Raw within the handling of Adobe
Digital Negative (DNG) image files. This can be exploited to cause a
stack-based buffer overflow by enticing a user to open a maliciously
crafted image file.
23) Multiple vulnerabilities in Kerberos can be exploited to cause a
DoS or to compromise a vulnerable system.
For more information:
SA29428
24) An off-by-one error the "strnstr()" in libc can be exploited to
cause a DoS.
25) A format string error exists in mDNSResponderHelper, which can be
exploited by a malicious, local user to cause a DoS or execute
arbitrary code with privileges of mDNSResponderHelper by setting the
local hostname to a specially crafted string.
26) An error in notifyd can be exploited by a malicious, local user
to deny access to notifications by sending fake Mach port death
notifications to notifyd.
27) An array indexing error in the pax command line tool can be
exploited to execute arbitrary code.
28) Multiple vulnerabilities in php can be exploited to bypass
certain security restrictions.
For more information:
SA27648
SA28318
29) A security issue is caused due to the Podcast Capture application
providing passwords to a subtask through the arguments.
30) Printing and Preview handle PDF files with weak encryption.
33) A null-pointer dereference error exists in the handling of
Universal Disc Format (UDF) file systems, which can be exploited to
cause a system shutdown by enticing a user to open a maliciously
crafted disk image.
35) Some vulnerabilities in X11 can be exploited by malicious, local
users to gain escalated privileges.
For more information:
SA27040
SA28532
36) Some vulnerabilities in libpng can be exploited by malicious
people to cause a DoS (Denial of Service).
For more information:
SA22900
SA25292
SA27093
SA27130
SOLUTION:
Apply Security Update 2008-002.
Security Update 2008-002 v1.0 (PPC):
http://www.apple.com/support/downloads/securityupdate2008002v10ppc.html
Security Update 2008-002 v1.0 (Universal):
http://www.apple.com/support/downloads/securityupdate2008002v10universal.html
Security Update 2008-002 v1.0 (Leopard):
http://www.apple.com/support/downloads/securityupdate2008002v10leopard.html
Security Update 2008-002 v1.0 Server (Leopard):
http://www.apple.com/support/downloads/securityupdate2008002v10serverleopard.html
Security Update 2008-002 v1.0 Server (PPC):
http://www.apple.com/support/downloads/securityupdate2008002v10serverppc.html
Security Update 2008-002 v1.0 Server (Universal):
http://www.apple.com/support/downloads/securityupdate2008002v10serveruniversal.html
PROVIDED AND/OR DISCOVERED BY:
The vendor credits:
1) Ragnar Sundblad of KTH - Royal Institute of Technology, Stockholm
11) regenrecht via iDefense
19) Daniel Jalkut, Red Sweater Software
22) Brian Mastenbrook
24) Mike Ash, Rogue Amoeba Software
29) Maximilian Reiss, Chair for Applied Software Engineering, TUM
33) Paul Wagland of Redwood Software, and Wayne Linder of Iomega
34) Rodrigo Carvalho CORE Security Technologies
ORIGINAL ADVISORY:
Apple:
http://docs.info.apple.com/article.html?artnum=307562
CORE-2008-0123:
http://www.coresecurity.com/?action=item&id=2189
OTHER REFERENCES:
SA17907:
http://secunia.com/advisories/17907/
SA18008:
http://secunia.com/advisories/18008/
SA21187:
http://secunia.com/advisories/21197/
SA22900:
http://secunia.com/advisories/22900/
SA23347:
http://secunia.com/advisories/23347/
SA24187:
http://secunia.com/advisories/24187/
SA24548:
http://secunia.com/advisories/24548/
SA24891:
http://secunia.com/advisories/24891/
SA25292:
http://secunia.com/advisories/25292/
SA26038:
http://secunia.com/advisories/26038/
SA26530:
http://secunia.com/advisories/26530/
SA26636:
http://secunia.com/advisories/26636/
SA27040:
http://secunia.com/advisories/27040/
SA27093:
http://secunia.com/advisories/27093/
SA27130:
http://secunia.com/advisories/27130/
SA27648:
http://secunia.com/advisories/27648/
SA27508:
http://secunia.com/advisories/27508/
SA27906:
http://secunia.com/advisories/27906/
SA28046:
http://secunia.com/advisories/28046/
SA28117:
http://secunia.com/advisories/28117/
SAS28318:
http://secunia.com/advisories/28318/
SA28532:
http://secunia.com/advisories/28532/
SA28907:
http://secunia.com/advisories/28907/
SA29428:
http://secunia.com/advisories/29428/
SA29431:
http://secunia.com/advisories/29431/
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------
Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
----------------------------------------------------------------------
| VAR-200803-0235 | CVE-2008-0993 | Apple Mac OS X of Podcast Vulnerability in password capture in the capture application |
CVSS V2: 2.1 CVSS V3: - Severity: LOW |
Podcast Capture in Podcast Producer for Apple Mac OS X 10.5.2 invokes a subtask with passwords in command line arguments, which allows local users to read the passwords via process listings.
Attackers can leverage this issue to gain access to privileged authentication credentials. Apple Mac OS X is prone to multiple security vulnerabilities.
These issues affect Mac OS X and various applications, including AFP Client, AFP Server, AppKit, Application Firewall, CoreFoundation, CoreServices, CUPS, Foundation, Help Viewer, Image Raw, libc, mDNSResponder, notifyd, pax archive utility, Podcast Producer, Preview, Printing, System Configuration, UDF, and Wiki Server.
Attackers may exploit these issues to execute arbitrary code, trigger denial-of-service conditions, escalate privileges, and potentially compromise vulnerable computers.
These issues affect Apple Mac OS X 10.4.11, 10.4.11 Server, 10.5.2, 10.5.2 Server and earlier.
NOTE: This BID is being retired. The following individual records have been created to fully document all the vulnerabilities that were described in this BID:
28320 Apple Mac OS X AFP Client 'afp://' URI Remote Code Execution Vulnerability CVE-2008-0044.
28323 Apple Mac OS X AFP Server Cross-Realm Authentication Bypass Vulnerability CVE-2008-0994
28388 Apple Mac OS X AppKit NSDocument API's Stack Based Buffer Overflow Vulnerability CVE-2008-0048
28340 Apple Mac OS X AppKit Bootstrap Namespace Local Privilege Escalation Vulnerability CVE-2008-0049
28358 Apple Mac OS X AppKit Legacy Serialization Kit Multiple Integer Overflow Vulnerabilities CVE-2008-0057
28364 Apple Mac OS X AppKit PPD File Stack Buffer Overflow Vulnerability CVE-2008-0997
28368 Apple Mac OS X Application Firewall German Translation Insecure Configuration Weakness CVE-2008-0046
28375 Apple Mac OS X CoreFoundation Time Zone Data Local Privilege Escalation Vulnerability CVE-2008-0051
28384 Apple Mac OS X CoreServices '.ief' Files Security Policy Violation Weakness CVE-2008-0052
28334 CUPS Multiple Unspecified Input Validation Vulnerabilities
28341 Apple Mac OS X Foundation 'NSSelectorFromString' Input Validation Vulnerability
28343 Apple Mac OS X Foundation NSFileManager Insecure Directory Local Privilege Escalation Vulnerability
28357 Apple Mac OS X Foundation 'NSFileManager' Stack-Based Buffer Overflow Vulnerability
28359 Apple Mac OS X Foundation 'NSURLConnection' Cache Management Race Condition Security Vulnerability
28363 Apple Mac OS X Image RAW Stack-Based Buffer Overflow Vulnerability
28367 Apple Mac OS X Foundation 'NSXML' XML File Processing Race Condition Security Vulnerability
28371 Apple Mac OS X Help Viewer Remote Applescript Code Execution Vulnerability
28374 Apple Mac OS X libc 'strnstr(3)' Off-By-One Denial of Service Vulnerability
28387 Apple Mac OS X Printing To PDF Insecure Encryption Weakness
28386 Apple Mac OS X Preview PDF Insecure Encryption Weakness
28389 Apple Mac OS X Universal Disc Format Remote Denial of Service Vulnerability
28385 Apple Mac OS X NetCfgTool Local Privilege Escalation Vulnerability
28365 Apple Mac OS X pax Archive Utility Remote Code Execution Vulnerability
28344 Apple Mac OS X Authenticated Print Queue Information Disclosure Vulnerability
28345 Apple Mac OS X 'notifyd' Local Denial of Service Vulnerability
28372 Apple Mac OS X Podcast Producer Podcast Capture Information Disclosure Vulnerability
28339 Apple Mac OS X mDNSResponderHelper Local Format String Vulnerability. ----------------------------------------------------------------------
A new version (0.9.0.0 - Release Candidate 1) of the free Secunia PSI
has been released. The new version includes many new and advanced
features, which makes it even easier to stay patched.
1) Multiple boundary errors in AFP client when processing "afp://"
URLs can be exploited to cause stack-based buffer overflows when a
user connects to a malicious AFP server.
Successful exploitation may allow execution of arbitrary code.
2) An error exists in AFP Server when checking Kerberos principal
realm names. This can be exploited to make unauthorized connections
to the server when cross-realm authentication with AFP Server is
used.
3) Multiple vulnerabilities in Apache can be exploited by malicious
people to conduct cross-site scripting attacks, cause a DoS (Denial
of Service), or potentially compromise a vulnerable system.
For more information:
SA18008
SA21197
SA26636
SA27906
SA28046
4) A boundary error within the handling of file names in the
NSDocument API in AppKit can be exploited to cause a stack-based
buffer overflow.
6) Multiple integer overflow errors exist in the parser for a legacy
serialization format. This can be exploited to cause a heap-based
buffer overflow when a specially crafted serialized property list is
parsed.
Successful exploitation may allow execution of arbitrary code.
7) An error in CFNetwork can be exploited to spoof secure websites
via 502 Bad Gateway errors from a malicious HTTPS proxy server.
8) Multiple vulnerabilities in ClamAV can be exploited by malicious
people to cause a DoS (Denial of Service) or to compromise a
vulnerable system.
For more information:
SA23347
SA24187
SA24891
SA26038
SA26530
SA28117
SA28907
9) An integer overflow error exists in CoreFoundation when handling
time zone data.
10) The problem is that files with names ending in ".ief" can be
automatically opened in AppleWorks if "Open 'Safe' files" is enabled
in Safari.
For more information:
SA29431
12) Multiple input validation errors exist in CUPS, which can be
exploited to execute arbitrary code with system privileges.
13) A boundary error in curl can be exploited to compromise a user's
system.
For more information:
SA17907
14) A vulnerability in emacs can be exploited by malicious people to
compromise a user's system.
For more information:
SA27508
15) A vulnerability in "file" can be exploited by malicious people to
compromise a vulnerable system.
For more information:
SA24548
16) An input validation error exists in the NSSelectorFromString API,
which can potentially be exploited to execute arbitrary code via a
malformed selector name.
17) A race condition error in NSFileManager can potentially be
exploited to gain escalated privileges.
18) A boundary error in NSFileManager can potentially be exploited to
cause a stack-based buffer overflow via an overly long pathname with a
specially crafted structure.
19) A race condition error exists in the cache management of
NSURLConnection. This can be exploited to cause a DoS or execute
arbitrary code in applications using the library (e.g. Safari).
20) A race condition error exists in NSXML. This can be exploited to
execute arbitrary code by enticing a user to process an XML file in
an application which uses NSXML.
21) An error in Help Viewer can be exploited to insert arbitrary HTML
or JavaScript into the generated topic list page via a specially
crafted "help:topic_list" URL and may redirect to a Help Viewer
"help:runscript" link that runs Applescript.
22) A boundary error exists in Image Raw within the handling of Adobe
Digital Negative (DNG) image files. This can be exploited to cause a
stack-based buffer overflow by enticing a user to open a maliciously
crafted image file.
23) Multiple vulnerabilities in Kerberos can be exploited to cause a
DoS or to compromise a vulnerable system.
For more information:
SA29428
24) An off-by-one error the "strnstr()" in libc can be exploited to
cause a DoS.
25) A format string error exists in mDNSResponderHelper, which can be
exploited by a malicious, local user to cause a DoS or execute
arbitrary code with privileges of mDNSResponderHelper by setting the
local hostname to a specially crafted string.
26) An error in notifyd can be exploited by a malicious, local user
to deny access to notifications by sending fake Mach port death
notifications to notifyd.
27) An array indexing error in the pax command line tool can be
exploited to execute arbitrary code.
28) Multiple vulnerabilities in php can be exploited to bypass
certain security restrictions.
30) Printing and Preview handle PDF files with weak encryption.
31) An error in Printing in the handling of authenticated print
queues can lead to credentials being saved to disk.
33) A null-pointer dereference error exists in the handling of
Universal Disc Format (UDF) file systems, which can be exploited to
cause a system shutdown by enticing a user to open a maliciously
crafted disk image.
35) Some vulnerabilities in X11 can be exploited by malicious, local
users to gain escalated privileges.
For more information:
SA27040
SA28532
36) Some vulnerabilities in libpng can be exploited by malicious
people to cause a DoS (Denial of Service).
For more information:
SA22900
SA25292
SA27093
SA27130
SOLUTION:
Apply Security Update 2008-002.
Security Update 2008-002 v1.0 (PPC):
http://www.apple.com/support/downloads/securityupdate2008002v10ppc.html
Security Update 2008-002 v1.0 (Universal):
http://www.apple.com/support/downloads/securityupdate2008002v10universal.html
Security Update 2008-002 v1.0 (Leopard):
http://www.apple.com/support/downloads/securityupdate2008002v10leopard.html
Security Update 2008-002 v1.0 Server (Leopard):
http://www.apple.com/support/downloads/securityupdate2008002v10serverleopard.html
Security Update 2008-002 v1.0 Server (PPC):
http://www.apple.com/support/downloads/securityupdate2008002v10serverppc.html
Security Update 2008-002 v1.0 Server (Universal):
http://www.apple.com/support/downloads/securityupdate2008002v10serveruniversal.html
PROVIDED AND/OR DISCOVERED BY:
The vendor credits:
1) Ragnar Sundblad of KTH - Royal Institute of Technology, Stockholm
11) regenrecht via iDefense
19) Daniel Jalkut, Red Sweater Software
22) Brian Mastenbrook
24) Mike Ash, Rogue Amoeba Software
29) Maximilian Reiss, Chair for Applied Software Engineering, TUM
33) Paul Wagland of Redwood Software, and Wayne Linder of Iomega
34) Rodrigo Carvalho CORE Security Technologies
ORIGINAL ADVISORY:
Apple:
http://docs.info.apple.com/article.html?artnum=307562
CORE-2008-0123:
http://www.coresecurity.com/?action=item&id=2189
OTHER REFERENCES:
SA17907:
http://secunia.com/advisories/17907/
SA18008:
http://secunia.com/advisories/18008/
SA21187:
http://secunia.com/advisories/21197/
SA22900:
http://secunia.com/advisories/22900/
SA23347:
http://secunia.com/advisories/23347/
SA24187:
http://secunia.com/advisories/24187/
SA24548:
http://secunia.com/advisories/24548/
SA24891:
http://secunia.com/advisories/24891/
SA25292:
http://secunia.com/advisories/25292/
SA26038:
http://secunia.com/advisories/26038/
SA26530:
http://secunia.com/advisories/26530/
SA26636:
http://secunia.com/advisories/26636/
SA27040:
http://secunia.com/advisories/27040/
SA27093:
http://secunia.com/advisories/27093/
SA27130:
http://secunia.com/advisories/27130/
SA27648:
http://secunia.com/advisories/27648/
SA27508:
http://secunia.com/advisories/27508/
SA27906:
http://secunia.com/advisories/27906/
SA28046:
http://secunia.com/advisories/28046/
SA28117:
http://secunia.com/advisories/28117/
SAS28318:
http://secunia.com/advisories/28318/
SA28532:
http://secunia.com/advisories/28532/
SA28907:
http://secunia.com/advisories/28907/
SA29428:
http://secunia.com/advisories/29428/
SA29431:
http://secunia.com/advisories/29431/
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------
Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
----------------------------------------------------------------------
| VAR-200803-0228 | CVE-2008-1009 | Apple Safari of WebCore Vulnerable to cross-site scripting |
CVSS V2: 4.3 CVSS V3: - Severity: MEDIUM |
Cross-site scripting (XSS) vulnerability in WebCore, as used in Apple Safari before 3.1, allows remote attackers to inject arbitrary JavaScript by modifying the history object. Apple Safari is prone to 12 security vulnerabilities.
Attackers may exploit these issues to execute arbitrary code, steal cookie-based authentication credentials, spoof secure websites, obtain sensitive information, and crash the affected application. Other attacks are also possible.
These issues affect versions prior to Apple Safari 3.1 running on Apple Mac OS X 10.4.1 and 10.5.2, Microsoft Windows XP, and Windows Vista.
NOTE: This BID is being retired.
An attacker may leverage this issue to execute arbitrary script code in other frames loaded from the same web page. This may help the attacker steal potentially sensitive information and launch other attacks.
NOTE: This vulnerability was previously covered in BID 28290 (Apple Safari Prior to 3.1 Multiple Security Vulnerabilities), but has been given its own record to better document the issue. Safari is the WEB browser bundled with the Apple family operating system by default. Safari version 3.1 fixes several security vulnerabilities, as follows: A JavaScript injection vulnerability exists in the handling of history objects, where frames set history object properties in all other frames loaded by the same web page. ----------------------------------------------------------------------
Secunia Network Software Inspector 2.0 (NSI) - Public Beta
4 days left of beta period.
The 1st generation of the Secunia Network Software Inspector (NSI)
has been available for corporate users for almost 1 year and its been
a tremendous success.
The 2nd generation Secunia NSI is built on the same technology as the
award winning Secunia PSI, which has already been downloaded and
installed on more than 400,000 computers world wide.
For more information:
SA29393
SOLUTION:
Apply updated packages via the yum utility ("yum update WebKit").
Note: Updated packages for midori and kazehakase have also been
issued, which have been rebuilt against the new WebKit library. ----------------------------------------------------------------------
A new version (0.9.0.0 - Release Candidate 1) of the free Secunia PSI
has been released. The new version includes many new and advanced
features, which makes it even easier to stay patched.
Download and test it today:
https://psi.secunia.com/
Read more about this new version:
https://psi.secunia.com/?page=changelog
----------------------------------------------------------------------
TITLE:
Apple Safari Multiple Vulnerabilities
SECUNIA ADVISORY ID:
SA29393
VERIFY ADVISORY:
http://secunia.com/advisories/29393/
CRITICAL:
Highly critical
IMPACT:
Security Bypass, Cross Site Scripting, Exposure of sensitive
information, System access
WHERE:
>From remote
SOFTWARE:
Safari 3.x
http://secunia.com/product/17989/
Safari 2.x
http://secunia.com/product/5289/
DESCRIPTION:
Some vulnerabilities have been reported in Safari, which can be
exploited by malicious people to bypass certain security
restrictions, conduct cross-site scripting attacks, or to compromise
a vulnerable system.
2) An error exists the handling of web pages that have explicitly set
the document.domain property. This can be exploited to conduct
cross-site scripting attacks in sites that set the document.domain
property or between HTTP and HTTPS sites with the same
document.domain.
3) An error in Web Inspector can be exploited to inject script code
that will run in other domains and can read the user's file system
when a specially crafted page is inspected.
4) A security issue exists with the Kotoeri input method, which can
result in exposing the password field on the display when reverse
conversion is requested.
5) An error within the handling of the "window.open()" function can
be used to change the security context of a web page to the caller's
context.
6) The frame navigation policy is not enforced for Java applets. This
can be exploited to conduct cross-site scripting attacks using java
and to gain escalated privileges by enticing a user to open a
specially crafted web page.
7) An unspecified error in the handling of the document.domain
property can be exploited to conduct cross-site scripting attacks
when a user visits a specially crafted web page.
8) An error exists in the handling of the history object. This can be
exploited to inject javascript code that will run in the context of
other frames.
9) A boundary error exists in the handling of javascript regular
expressions, which can be exploited to cause a buffer overflow via a
specially crafted web page.
Successful exploitation allows execution of arbitrary code.
10) An error in WebKit allows method instances from one frame to be
called in the context of another frame. This can be exploited to
conduct cross-site scripting attacks.
SOLUTION:
Update to version 3.1.
PROVIDED AND/OR DISCOVERED BY:
1) Robert Swiecki of Google Information Security Team
2, 3, 5, 6) Adam Barth and Collin Jackson of Stanford University
10) Eric Seidel of the WebKit Open Source Project, and Tavis Ormandy
and Will Drewry of Google Security Team
ORIGINAL ADVISORY:
Apple:
http://docs.info.apple.com/article.html?artnum=307563
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------
Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
----------------------------------------------------------------------
| VAR-200803-0230 | CVE-2008-1011 | Apple Safari of WebKit Vulnerable to cross-site scripting due to incomplete instance handling |
CVSS V2: 4.3 CVSS V3: - Severity: MEDIUM |
Cross-site scripting (XSS) vulnerability in WebKit, as used in Apple Safari before 3.1, allows remote attackers to inject arbitrary web script or HTML via a frame that calls a method instance in another frame. Apple Safari is prone to 12 security vulnerabilities.
Attackers may exploit these issues to execute arbitrary code, steal cookie-based authentication credentials, spoof secure websites, obtain sensitive information, and crash the affected application. Other attacks are also possible.
These issues affect versions prior to Apple Safari 3.1 running on Apple Mac OS X 10.4.1 and 10.5.2, Microsoft Windows XP, and Windows Vista.
NOTE: This BID is being retired.
An attacker may leverage this issue to access frame methods in another domain. This may help the attacker steal potentially sensitive information and launch other attacks.
NOTE: This vulnerability was previously covered in BID 28290 (Apple Safari Prior to 3.1 Multiple Security Vulnerabilities), but has been given its own record to better document the issue. Safari is the WEB browser bundled with the Apple family operating system by default. If a user is tricked into visiting a malicious web page, sensitive information will be leaked. ----------------------------------------------------------------------
Secunia Network Software Inspector 2.0 (NSI) - Public Beta
4 days left of beta period.
The 1st generation of the Secunia Network Software Inspector (NSI)
has been available for corporate users for almost 1 year and its been
a tremendous success.
The 2nd generation Secunia NSI is built on the same technology as the
award winning Secunia PSI, which has already been downloaded and
installed on more than 400,000 computers world wide.
For more information:
SA29393
SOLUTION:
Apply updated packages via the yum utility ("yum update WebKit").
Note: Updated packages for midori and kazehakase have also been
issued, which have been rebuilt against the new WebKit library. ----------------------------------------------------------------------
A new version (0.9.0.0 - Release Candidate 1) of the free Secunia PSI
has been released. The new version includes many new and advanced
features, which makes it even easier to stay patched.
Download and test it today:
https://psi.secunia.com/
Read more about this new version:
https://psi.secunia.com/?page=changelog
----------------------------------------------------------------------
TITLE:
Apple Safari Multiple Vulnerabilities
SECUNIA ADVISORY ID:
SA29393
VERIFY ADVISORY:
http://secunia.com/advisories/29393/
CRITICAL:
Highly critical
IMPACT:
Security Bypass, Cross Site Scripting, Exposure of sensitive
information, System access
WHERE:
>From remote
SOFTWARE:
Safari 3.x
http://secunia.com/product/17989/
Safari 2.x
http://secunia.com/product/5289/
DESCRIPTION:
Some vulnerabilities have been reported in Safari, which can be
exploited by malicious people to bypass certain security
restrictions, conduct cross-site scripting attacks, or to compromise
a vulnerable system.
1) An error in the processing of "javascript:" URLs can be exploited
to execute arbitrary HTML and script code in context of another site
via a specially crafted web page.
2) An error exists the handling of web pages that have explicitly set
the document.domain property. This can be exploited to conduct
cross-site scripting attacks in sites that set the document.domain
property or between HTTP and HTTPS sites with the same
document.domain.
3) An error in Web Inspector can be exploited to inject script code
that will run in other domains and can read the user's file system
when a specially crafted page is inspected.
4) A security issue exists with the Kotoeri input method, which can
result in exposing the password field on the display when reverse
conversion is requested.
5) An error within the handling of the "window.open()" function can
be used to change the security context of a web page to the caller's
context. This can be exploited to execute arbitrary script code in
the user's security context via a specially crafted web page.
6) The frame navigation policy is not enforced for Java applets. This
can be exploited to conduct cross-site scripting attacks using java
and to gain escalated privileges by enticing a user to open a
specially crafted web page.
7) An unspecified error in the handling of the document.domain
property can be exploited to conduct cross-site scripting attacks
when a user visits a specially crafted web page.
8) An error exists in the handling of the history object. This can be
exploited to inject javascript code that will run in the context of
other frames.
9) A boundary error exists in the handling of javascript regular
expressions, which can be exploited to cause a buffer overflow via a
specially crafted web page.
Successful exploitation allows execution of arbitrary code.
10) An error in WebKit allows method instances from one frame to be
called in the context of another frame. This can be exploited to
conduct cross-site scripting attacks.
SOLUTION:
Update to version 3.1.
PROVIDED AND/OR DISCOVERED BY:
1) Robert Swiecki of Google Information Security Team
2, 3, 5, 6) Adam Barth and Collin Jackson of Stanford University
10) Eric Seidel of the WebKit Open Source Project, and Tavis Ormandy
and Will Drewry of Google Security Team
ORIGINAL ADVISORY:
Apple:
http://docs.info.apple.com/article.html?artnum=307563
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------
Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
----------------------------------------------------------------------