Typespeed Local Buffer Overflow Vulnerability BugTraq ID: 6485 Remote: No Date Published: Dec 27 2002 12:00AM Relevant URL: http://www.securityfocus.com/bid/6485 Summary:
Typespeed is a game designed to test typing skills. It is available for the Linux operating system. Typespeed is installed setgid 'games' by default on the Debian Linux distribution. A vulnerability has been discovered in Typespeed. It is possible to trigger a buffer overflow in Typespeed by passing excessive data as a user-supplied parameter. By exploiting this issue to overwrite sensitive locations in memory it may be possible for a local attacker to execute commands with elevated privileges. The precise technical details regarding this vulnerability are not yet known. This BID will be updated as further information becomes available. SkyStream Edge Media Router-5000 Local Buffer Overflow Vulnerability BugTraq ID: 6486 Remote: No Date Published: Dec 27 2002 12:00AM Relevant URL: http://www.securityfocus.com/bid/6486 Summary: SkyStream Edge Media Router-5000 (EMR5000) is a satellite network connection router. It provides remote administration capabilities through telnet or optionally a web interface. The EMR5000 is prone to a buffer overflow. This vulnerability may be exploited from the client shell (accessible via telnet) by an authenticated user. It is possible to trigger this condition by supplying an overly long string to the command line, which will cause sensitive regions of memory (such as stack variables) to be corrupted with attacker-supplied data. This issue may be leveraged to cause arbitrary code to be executed with elevated privileges. [ hardware ] Leafnode Resource Exhaustion Denial Of Service Vulnerability BugTraq ID: 6490 Remote: Yes Date Published: Dec 30 2002 12:00AM Relevant URL: http://www.securityfocus.com/bid/6490 Summary: Leafnode is a USENET proxy server intended for sites with a small number of readers. A denial of service vulnerability has been reported for Leafnode. The vulnerability occurs when Leafnode tries to retrieve certain news postings. Specifically, Leafnode will consume all available CPU resources when it tries to retrieve messages that have been cross-posted to several groups. An attacker can exploit this vulnerability by cross-posting to several newsgroups where some groups are prefixes of others. When leafnode attempts to retrieve these news articles by the message-id, the leafnode nntpd server will will go into an infinite loop and consume all CPU resources thereby leading to a denial of service condition. This vulnerability affects Leafnode 1.9.20 to 1.9.29. The default installation of Leafnode is not affected by this vulnerabilty. Perl-HTTPd File Disclosure Vulnerability BugTraq ID: 6497 Remote: Yes Date Published: Dec 31 2002 12:00AM Relevant URL: http://www.securityfocus.com/bid/6497 Summary: Perl-HTTPd is a web server implemented in Perl. It has been reported that Perl-HTTPd fails to properly sanitize some web requests. By exploiting this issue, an attacker is able to traverse outside of the established web root by using dot-dot-slash (../) directory traversal sequences. An attacker may be able to obtain any web server readable files from outside of the web root directory. Disclosure of sensitive system files may aid the attacker in launching further attacks against the target system. This vulnerability was reported for Perl-HTTPd 1.0 and 1.0.1. ShadowJAAS Command Line Password Disclosure Vulnerability BugTraq ID: 6498 Remote: No Date Published: Dec 28 2002 12:00AM Relevant URL: http://www.securityfocus.com/bid/6498 Summary: ShadowJAAS is authentication software that allows users to authenticate to Java applications using a local Linux user account with a shadowed password. ShadowJAAS is prone to a design error that may cause user credentials to be disclosed to other local users. Vulnerable versions of ShadowJAAS require that username and password credentials are passed via the command line instead of through standard input when a user authenticates. As a result, this information may be accessible to other local users through various means (such as the 'ps' utility). - Pour poster une annonce: [EMAIL PROTECTED]
