Util-Linux mcookie Cookie Generation Weakness BugTraq ID: 6855 Remote: Yes Date Published: Feb 14 2003 12:00AM Relevant URL: http://www.securityfocus.com/bid/6855 Summary:
util-linux is a freely available, open source software package that provides some implementations of standard UNIX utilities, such as login. Included with util-linux is the mcookie utility that is used to generate random cookies for use with X authentication. A weakness has been reported for the mcookie utility where cookies may be generated in a predictable manner. The weakness occurs because mcookie uses /dev/urandom to generate cookies. This may be exploited by an attacker to guess cookie values to steal credentials of users who use X authentication. Information obtained in this manner may be used by the attacker to launch further attacks against vulnerable systems and users. PHP CGI SAPI Code Execution Vulnerability BugTraq ID: 6875 Remote: Yes Date Published: Feb 17 2003 12:00AM Relevant URL: http://www.securityfocus.com/bid/6875 Summary: PHP is a freely available, open source web scripting language package. It is available for Microsoft Windows, Linux, and Unix operating systems. An unspecified vulnerability has been reported in the CGI SAPI of PHP version 4.3.0. Direct access to the CGI binary can be prevented by using the configuration option '--enable-force-cgi-redirect' and the php.ini option 'cgi.force_redirect'. The report states that an unspecified bug could render these options useless, allowing a remote user to directly access the CGI binary. This could allow an attacker to read any file that is readable by the web server user, or to potentially execute arbitrary PHP code. The attacker would have to be able to inject the PHP code into a file accessible by the CGI binary, such as the web server access logs. [ core PHP ] BitchX Malformed RPL_NAMREPLY Denial Of Service Vulnerability BugTraq ID: 6880 Remote: Yes Date Published: Feb 18 2003 12:00AM Relevant URL: http://www.securityfocus.com/bid/6880 Summary: BitchX is a freely available, open source IRC client. It is available for Unix, Linux, and Microsoft operating systems. A problem with BitchX could make it possible for a malicious IRC server to crash a vulnerable client. It has been reported that BitchX does not properly handle some types of replies contained in the RPL_NAMREPLY numeric. When a malformed reply is received by the client, the client crashes, resulting in a denial of service. The problem occurs through the handling of the 353 IRC numeric. It is suspected that this vulnerability may also make possible the execution of arbitrary code. In the event that this is possible, code executed through this vulnerability would be in the context of the BitchX user. This could allow a remote attacker access to the system on which the affected client is running with the privileges of the BitchX user. [ + usuels scripts PHP + IBM Domino HTTP server ] - Pour poster une annonce: [EMAIL PROTECTED]