Typespeed Local Buffer Overflow Vulnerability
BugTraq ID: 6485
Remote: No
Date Published: Dec 27 2002 12:00AM
Relevant URL:
http://www.securityfocus.com/bid/6485
Summary:

Typespeed is a game designed to test typing skills. It is available for
the Linux operating system. Typespeed is installed setgid 'games' by
default on the Debian Linux distribution.

A vulnerability has been discovered in Typespeed. It is possible to
trigger a buffer overflow in Typespeed by passing excessive data as a
user-supplied parameter. By exploiting this issue to overwrite sensitive
locations in memory it may be possible for a local attacker to execute
commands with elevated privileges.

The precise technical details regarding this vulnerability are not yet
known. This BID will be updated as further information becomes available.

SkyStream Edge Media Router-5000 Local Buffer Overflow Vulnerability
BugTraq ID: 6486
Remote: No
Date Published: Dec 27 2002 12:00AM
Relevant URL:
http://www.securityfocus.com/bid/6486
Summary:

SkyStream Edge Media Router-5000 (EMR5000) is a satellite network
connection router.  It provides remote administration capabilities through
telnet or optionally a web interface.

The EMR5000 is prone to a buffer overflow.  This vulnerability may be
exploited from the client shell (accessible via telnet) by an
authenticated user.

It is possible to trigger this condition by supplying an overly long
string to the command line, which will cause sensitive regions of memory
(such as stack variables) to be corrupted with attacker-supplied data.
This issue may be leveraged to cause arbitrary code to be executed with
elevated privileges.

[ hardware ]

Leafnode Resource Exhaustion Denial Of Service Vulnerability
BugTraq ID: 6490
Remote: Yes
Date Published: Dec 30 2002 12:00AM
Relevant URL:
http://www.securityfocus.com/bid/6490
Summary:

Leafnode is a USENET proxy server intended for sites with a small number
of readers.

A denial of service vulnerability has been reported for Leafnode. The
vulnerability occurs when Leafnode tries to retrieve certain news
postings. Specifically, Leafnode will consume all available CPU resources
when it tries to retrieve messages that have been cross-posted to several
groups.

An attacker can exploit this vulnerability by cross-posting to several
newsgroups where some groups are prefixes of others. When leafnode
attempts to retrieve these news articles by the message-id, the leafnode
nntpd server will will go into an infinite loop and consume all CPU
resources thereby leading to a denial of service condition.

This vulnerability affects Leafnode 1.9.20 to 1.9.29. The default
installation of Leafnode is not affected by this vulnerabilty.

Perl-HTTPd File Disclosure Vulnerability
BugTraq ID: 6497
Remote: Yes
Date Published: Dec 31 2002 12:00AM
Relevant URL:
http://www.securityfocus.com/bid/6497
Summary:

Perl-HTTPd is a web server implemented in Perl.

It has been reported that Perl-HTTPd fails to properly sanitize some web
requests. By exploiting this issue, an attacker is able to traverse
outside of the established web root by using dot-dot-slash (../) directory
traversal sequences. An attacker may be able to obtain any web server
readable files from outside of the web root directory.

Disclosure of sensitive system files may aid the attacker in launching
further attacks against the target system.

This vulnerability was reported for Perl-HTTPd 1.0 and 1.0.1.

ShadowJAAS Command Line Password Disclosure Vulnerability
BugTraq ID: 6498
Remote: No
Date Published: Dec 28 2002 12:00AM
Relevant URL:
http://www.securityfocus.com/bid/6498
Summary:

ShadowJAAS is authentication software that allows users to authenticate to
Java applications using a local Linux user account with a shadowed
password.

ShadowJAAS is prone to a design error that may cause user credentials to
be disclosed to other local users.

Vulnerable versions of ShadowJAAS require that username and password
credentials are passed via the command line instead of through standard
input when a user authenticates.  As a result, this information may be
accessible to other local users through various means (such as the 'ps'
utility).

-
Pour poster une annonce: [EMAIL PROTECTED]

Répondre à