XChat Server Strings Buffer Overflow Vulnerability
BugTraq ID: 7089
Remote: Yes
Date Published: Mar 14 2003 12:00AM
Relevant URL:
http://www.securityfocus.com/bid/7089
Summary:

XChat is a freely available, open source IRC client. It is available for
the the Unix, Linux, and Microsoft Windows platforms.

XChat IRC client has been reported vulnerable, under certain
circumstances, to a buffer overflow condition.

It has been reported that due to a lack of both, sufficient bounds
checking and string termination, two malformed non-terminated server
supplied strings may be stored contiguously in a fixed internal memory
buffer.

As a result of this, a malicious IRC server may be used to pass excessive
data to the client and overwrite memory adjacent to the deficient buffer.
If this memory contains crucial saved program state values the attacker
may be able to influence the programs' flow and execute arbitrary code.

Any code successfully executed would be in the context of the user running
the vulnerable IRC application.

This vulnerability was reported to affect XChat version 2.0.1 other
versions may also be affected.

EPIC PRIVMSG Remote Heap Corruption Vulnerability
BugTraq ID: 7088
Remote: Yes
Date Published: Mar 14 2003 12:00AM
Relevant URL:
http://www.securityfocus.com/bid/7088
Summary:

Epic is a freely available, open source IRC client.  It is maintained by
the Epic project.

A vulnerability has been discovered in EPIC4 1.1.7.20020907. The problem
occurs due to insufficient bounds checking data interchanged between
clients. Specifically, by using the PRIVMSG command to send a message of
excessive length to a vulnerable client, it may be possible to corrupt the
processes heap memory.

It should be noted that this issue might only be exploitable when the
'mangle_inbound' option is set. Secondly, the data which can be written to
sensitive memory is limited to a defined character set, making remote code
execution unlikely.

Successful exploitation of this issue would likely cause the vulnerable
client to crash.

ircII Make_Status_One Memory Corruption Vulnerability
BugTraq ID: 7093
Remote: Yes
Date Published: Mar 14 2003 12:00AM
Relevant URL:
http://www.securityfocus.com/bid/7093
Summary:

ircII is an IRC and ICB client for Unix and Linux platforms.

A buffer overflow vulnerability has been reported in ircII. The
vulnerability is related to the way ircII refreshes its status bar.
Specifically, the make_status_one() function in the status.c source file
does not properly account for some control characters when attempting to
refresh the status bar.

This issue is exploitable by a malicious IRC server that sends an overly
long response to the vulnerable ircII client. As the client does not make
proper checks for control characters when updating the status bar, it will
result in the corruption of sensitive memory.

This will cause the client to crash thus resulting in a denial of service
condition.

This issue was reported in ircII build 20020912. Other versions may also
be affected.

This issue was originally described in BID 7087 "Multiple IrcII Remote
Client-Side Buffer Overflow Vulnerabilities" and is now being assigned a
separate BID.

ircII Client-Side Private Message Handling Memory Corruption Vulnerability
BugTraq ID: 7094
Remote: Yes
Date Published: Mar 14 2003 12:00AM
Relevant URL:
http://www.securityfocus.com/bid/7094
Summary:

ircII is an IRC and ICB client for Unix and Linux platforms.

A buffer overflow vulnerability has been reported for ircII. This issue is
due to insufficient bounds checking of server-supplied data and may
potentially result in denial of service in the IRC client.  This overflow
occurs during client handling of private message data supplied by an IRC
server, allowing for the 'ctcp_buffer' to be overrun.  Though unconfirmed,
exploitation may also allow for execution of arbitrary code in the context
of the client.

This could result in corruption of sensitive regions of memory with
attacker-supplied data.  It may be possible for another client to trigger
this condition, though this is also unconfirmed.

This issue was originally described in BID 7087 "Multiple IrcII Remote
Client-Side Buffer Overflow Vulnerabilities" and is now being assigned a
separate BID.

This issue was reported in ircII build 20020912. Other versions may also
be affected.

ircII Client-Side Cannot_Join_Channel Memory Corruption Vulnerability
BugTraq ID: 7095
Remote: Yes
Date Published: Mar 14 2003 12:00AM
Relevant URL:
http://www.securityfocus.com/bid/7095
Summary:

ircII is an IRC and ICB client for Unix and Linux platforms.

A buffer overflow vulnerability has been reported in ircII.  This issue is
due to insufficient bounds checking of server-supplied data and may
potentially result in denial of service in the IRC client.  This issue
exists in the cannot_join_channel() function and could be triggered by a
channel length of excessive length.

This could result in corruption of memory (including stack variables) with
attacker-supplied data.

This issue was originally described in BID 7087 "Multiple IrcII Remote
Client-Side Buffer Overflow Vulnerabilities" and is now being assigned a
separate BID.

ircII Status_Make_Printable Memory Corruption Vulnerability
BugTraq ID: 7098
Remote: Yes
Date Published: Mar 14 2003 12:00AM
Relevant URL:
http://www.securityfocus.com/bid/7098
Summary:

ircII is an IRC and ICB client for Unix and Linux platforms.

A buffer overflow vulnerability has been reported in ircII. The
vulnerability is related to the way ircII refreshes its status bar.
Specifically, the status_make_printable() function in the status.c source
file does not properly account for some control characters when attempting
to refresh the status bar.

This issue is exploitable by a malicious IRC server that sends an overly
long response to the vulnerable ircII client. As the client does not make
proper checks for control characters when updating the status bar, it will
result in the corruption of sensitive memory with attacker-supplied
values.

This will cause the client to behave in an unpredictable manner and
possibly execute attacker-supplied code.

This issue was reported in ircII build 20020912. Other versions may also
be affected.

This issue was originally described in BID 7087 "Multiple IrcII Remote
Client-Side Buffer Overflow Vulnerabilities" and is now being assigned a
separate BID.

OpenSSL Timing Attack RSA Private Key Information Disclosure Vulnerability
BugTraq ID: 7101
Remote: Yes
Date Published: Mar 14 2003 12:00AM
Relevant URL:
http://www.securityfocus.com/bid/7101
Summary:

OpenSSL is an open source implementation of the SSL protocol.

A side-channel attack in the OpenSSL implementation has been published in
a recent paper that may ultimately result in an active adversary gaining
the RSA private key of a target server.  The attack involves analysis of
the timing of certain operations during client-server session key
negotiation.

Session negotiation occurs using the RSA PKCS 1 type public key
cryptography standard.  During the client-server negotiation, the client
constructs a proto-session-key using PKCS 1 formatted random bytes and
encrypts it with the RSA public key of the server.  The client then
transmits this value to the server, which uses it to compute the shared
session key.  The server will generate a session key on its own and send
an alert message to the client if the client-supplied proto-key decrypted
by the server using its RSA private key is not properly PKCS 1 formatted.

It is possible for an adversary, acting as a client, to obtain bits of
information about the server RSA private key by observing the time elapsed
between the transmission of an invalid proto-key value and reception of
the alert message from the server that is sent in response.  The
information is leaked during the decryption process and may, through
successive observations, reveal the factorization of the private key to
the adversary.  An attacker may perform this attack by repeatedly
establishing sessions with invalid proto-key values.

Upon successful compromise of a RSA private key, it is possible for an
attacker to monitor the establishing of all future sessions with the
server.  This may additionally allow an attacker to impersonate the server
based on the compromised private key.  This problem also affects other SSL
implementations that do not implement RSA blinding by default.

BitchX Remote Send_CTCP() Memory Corruption Vulnerability
BugTraq ID: 7097
Remote: Yes
Date Published: Mar 14 2003 12:00AM
Relevant URL:
http://www.securityfocus.com/bid/7097
Summary:

BitchX is a freely available, open source IRC client. It is available for
Unix, Linux, and Microsoft operating systems.

A memory corruption vulnerability has been reported in the send_ctcp()
function which is used when handling server-supplied data. The function
takes the length of an argument, char *to, and uses it to allocate a
buffer on the stack. This occurs by calling the alloca() function with an
argument of 512 - (12 + strlen(to)). Delimiter characters are later
appended to the buffer returned by alloca().

If a hostile IRC server were to supply a 'to' argument containing a
length, -12, which is larger then 512 bytes, it would be possible to
supply a negative value as the argument to alloca(). If this were to occur
the negative value would be interpreted and a stack address used by a
previous frame will be returned. This may allow for delimiter characters
and a NULL value to be written to arbitrary stack memory.

Successful exploitation of this issue may allow a malicious server to
execute arbitrary commands on the client system with the privileges of the
user running the vulnerable client.

This vulnerability has been reported to affect BitchX 1.0c19. Other
versions may also be affected.

This issue was originally described in BID 7086 "Multiple BitchX Remote
Client-Side Buffer Overflow Vulnerabilities" and is now being assigned a
separate BID.

BitchX Remote cannot_join_channel() Buffer Overflow Vulnerability
BugTraq ID: 7099
Remote: Yes
Date Published: Mar 14 2003 12:00AM
Relevant URL:
http://www.securityfocus.com/bid/7099
Summary:

BitchX is a freely available, open source IRC client. It is available for
Unix, Linux, and Microsoft operating systems.

A memory corruption vulnerability has been discovered in BitchX 1.0c19.
This issue occurs when calling the cannot_join_channel() function. If a
channel of excessive length is supplied a buffer overflow could occur
which may result in predefined strings being written over sensitive stack
memory.

As a result, it may be possible for a malicious IRC server to crash a
vulnerable client. Although unconfirmed this vulnerability could
potentially be leveraged to execute arbitrary commands within a target
client.

This vulnerability has been reported to affect BitchX 1.0c19. Other
versions may also be affected.

This issue was originally described in BID 7086 "Multiple BitchX Remote
Client-Side Buffer Overflow Vulnerabilities" and is now being assigned a
separate BID.

BitchX Remote BX_compress_modes() Buffer Overflow Vulnerability
BugTraq ID: 7100
Remote: Yes
Date Published: Mar 14 2003 12:00AM
Relevant URL:
http://www.securityfocus.com/bid/7100
Summary:

BitchX is a freely available, open source IRC client. It is available for
Unix, Linux, and Microsoft operating systems.

BitchX has been reported prone to a buffer overflow vulnerability.

Reportedly, when the BitchX option 'compress_modes' is activated a
potential circumstance for a buffer overflow condition may be created. If
an excessive amount of data is supplied to the BitchX
'BX_Compress_modes()' function an internal memory buffer, 'nmodes[16]',
will be overflowed. This action may cause adjacent memory to be corrupted
with attacker-supplied values.

There is a potential that this issue could be exploited to corrupt crucial
program management variables on the stack and thus seize control of
program flow. As a result, a hostile IRC server may be capable of
executing arbitrary code on a target client.

Any arbitrary code executed would be in the context of the user running
the vulnerable software.

This vulnerability was reported to affect BitchX 1.0c19 earlier versions
may also be affected.

This issue was originally described in BID 7086 "Multiple BitchX Remote
Client-Side Buffer Overflow Vulnerabilities" and is now being assigned a
separate BID.

BitchX Remote Cluster() Heap Corruption Vulnerability
BugTraq ID: 7096
Remote: Yes
Date Published: Mar 14 2003 12:00AM
Relevant URL:
http://www.securityfocus.com/bid/7096
Summary:

BitchX is a freely available, open source IRC client. It is available for
Unix, Linux, and Microsoft operating systems.

BitchX has been reported prone to a heap based memory corruption
vulnerability. Reportedly when an excessively long hostname is supplied to
the BitchX 'cluster()' function an internal static memory buffer is
overflowed.

It has been reported that 1500 bytes of data may be written past the
buffer, potentially corrupting sensitive values located in the heap.

Although unconfirmed, due to the nature of heap corruption
vulnerabilities, there is a potential that this issue could be exploited
to corrupt memory management information. As a result, a hostile IRC
server may be capable of executing arbitrary code on a target client.

This vulnerability was reported to affect BitchX 1.0c19 earlier versions
may also be affected.

This issue was originally described in BID 7086 "Multiple BitchX Remote
Client-Side Buffer Overflow Vulnerabilities" and is now being assigned a
separate BID.

Epic Status Bar Writing Buffer Overflow Vulnerability
BugTraq ID: 7103
Remote: Yes
Date Published: Mar 14 2003 12:00AM
Relevant URL:
http://www.securityfocus.com/bid/7103
Summary:

Epic is a freely available, open source IRC client. It is maintained by
the Epic project.

A problem with the software may make it possible for an attacker to gain
access to a vulnerable client system.

It has been reported that Epic does not properly handle some types of
server replies. This particular problem occurs when the status bar is
written to by the server.  Because of this, an attacker may be able to
gain access to a vulnerable client system with the privileges of the Epic
user.

The client does not perform sufficient bounds checking on the data
returned by the server.  Because of this, data that is passed by the
server that may be written to the status bar may make it is possible for a
malicious server to send a response of arbitrary length that will result
in a client-side overflow, and potentially the execution of arbitrary
code.

This issue was originally described in BID 7077 "Multiple Epic Remote
Client-Side Buffer Overflow Vulnerabilities" and is now being assigned a
separate BID.

Epic Userhost_Cmd_Returned Buffer Overflow Vulnerability
BugTraq ID: 7091
Remote: Yes
Date Published: Mar 14 2003 12:00AM
Relevant URL:
http://www.securityfocus.com/bid/7091
Summary:

Epic is a freely available, open source IRC client. It is maintained by
the Epic project.

A problem with the software may make it possible for an attacker to gain
access to a vulnerable client system.

It has been reported that Epic does not properly handle some types of
server replies. This particular problem occurs in the userhost returned by
the server.  Because of this, an attacker may be able to gain access to a
vulnerable client system with the privileges of the Epic user.

The client does not perform sufficient bounds checking on the data
returned by the server when the userhost is sent.  Because of this, it is
possible for a malicious server to send a response of arbitrary length
that will result in a client-side overflow, and potentially the execution
of arbitrary code.

This issue was originally described in BID 7077 "Multiple Epic Remote
Client-Side Buffer Overflow Vulnerabilities" and is now being assigned a
separate BID.

Samba SMB/CIFS Packet Assembling Buffer Overflow Vulnerability
BugTraq ID: 7106
Remote: Yes
Date Published: Mar 15 2003 12:00AM
Relevant URL:
http://www.securityfocus.com/bid/7106
Summary:

Samba is a freely available file and printer sharing application
maintained and developed by the Samba Development Team. Samba allows file
and printer sharing between operating systems on the Unix and Microsoft
platforms. The Samba daemon is typically run with super user privileges.

A buffer overflow vulnerability has been reported for Samba. The
vulnerability occurs when the smbd service attempts to re-assemble
specially crafted SMB/CIFS packets.

An attacker can exploit this vulnerability by creating a specially
formatted SMB/CIFS packet and sending it to a vulnerable Samba server. The
overflow condition will be triggered when smbd attempts to re-assemble the
malformed packet fragments. smbd will overwrite sensitive areas of memory
with attacker-supplied values resulting in the execution of malicious
code.

This vulnerability is further exacerbated by the fact that the smbd
service runs with root privileges.

This vulnerability affects Samba 2.0.0 to 2.2.7a.  Additionally, HP
CIFS/9000 server versions up to A.01.09.01 on HP-UX 11.0, 11.11(11i), and
11.22 are vulnerable.

Samba REG File Writing Race Condition Vulnerability
BugTraq ID: 7107
Remote: No
Date Published: Mar 15 2003 12:00AM
Relevant URL:
http://www.securityfocus.com/bid/7107
Summary:

Samba is a freely available file and printer sharing application
maintained and developed by the Samba Development Team. Samba allows file
and printer sharing between operating systems on the Unix and Microsoft
platforms. The Samba daemon is typically run with super user privileges.

A race condition vulnerability has been reported for Samba. The
vulnerability occurs when Samba attempts to write reg files. However, it
may be possible to create a symbolic link in a crucial point of program
execution that would result in the overwriting of files pointed to by the
link. This will only occur if the files are writeable by the Samba
process.

Successful exploitation may cause local files to be corrupted. If files
can be corrupted with custom data, this may result in privilege elevation.

Full details of this vulnerability are not currently known. The BID will
be updated as further details are disclosed.

This vulnerability is reported to exist for Samba 2.0.0 to 2.2.7a.

Qpopper Username Information Disclosure Weakness
BugTraq ID: 7110
Remote: Yes
Date Published: Mar 15 2003 12:00AM
Relevant URL:
http://www.securityfocus.com/bid/7110
Summary:

Qpopper is a POP3 mail server available for Linux and Unix based systems.

An information disclosure weakness has been reported for Qpopper when
authenticating. The weakness is due to the fact that if a valid username
is sent with a bad password, Qpopper will wait a small amount of time
prior to disconnecting the client. If the username that is sent is
invalid, Qpopper immediately disconnects the client.

A determined attacker can exploit this weakness to gather a list of valid
usernames on a vulnerable system using Qpopper.

Any information obtained in this manner may be used by the attacker to
launch other attacks against a victim user or system.

This weakness was reported for Qpopper 3.1 and 4.0.4. It is not known
whether other versions are affected.

Multiple Vendor Java Virtual Machine java.util.zip Null Value Denial Of Service 
Vulnerability
BugTraq ID: 7109
Remote: Yes
Date Published: Mar 15 2003 12:00AM
Relevant URL:
http://www.securityfocus.com/bid/7109
Summary:

Several implementations of the Java Virtual Machine have been reported to
be prone to a denial of service condition.

This vulnerability occurs in several methods in the java.util.zip class. The following 
native methods have been reported to be vulnerable to this issue:
java.util.zip.Adler32().update();
java.util.zip.Deflater().setDictionary();
java.util.zip.CRC32().update();
java.util.zip.Deflater().deflate();
java.util.zip.CheckedOutputStream().write();
java.util.zip.CheckedInputStream().read();

The methods can be called with certain types of parameters however, there
does not appear to be proper checks to see whether the parameters are NULL
values. When these native methods are called with NULL values, this will
cause the JVM to reach an undefined state which will cause it to behave in
an unpredictable manner and possibly crash.

This BID will be separated into individual entries where appropriate.

[ non-free, but widely deployed, and some stacks might be free software ]

Linux Kernel Privileged Process Hijacking Vulnerability
BugTraq ID: 7112
Remote: No
Date Published: Mar 17 2003 12:00AM
Relevant URL:
http://www.securityfocus.com/bid/7112
Summary:

The Linux Kernel is the core of the Linux operating system and is
distributed by various Linux distributions.

A vulnerability has been discovered related to the automatic loading of
kernel modules via kmod.  This feature allows for modules to be loaded at
run-time when required by certain system calls.  When such a module is
required, the kernel will create a privileged process and exec the
modprobe executable. It should be noted that, although the process loading
the module is owned by the root user its parent process is the process
calling the function requiring the module.

The vulnerability presents itself because the kernel fails to restrict
tracing permissions on the privileged process. As a result, by
anticipating the PID of the process probing the module and making a
ptrace() call at the correct time interval, an attacker may be able to
attach to the privileged process. This may give an attacker the ability to
inject arbitrary instructions into memory and thus execute arbitrary
commands.

Successful exploitation of this vulnerability could allow a local
attacker, on a Linux system running a 2.2 or 2.4 kernel tree, to gain root
privileges.

Multiple Cryptographic Weaknesses in Kerberos 4 Protocol
BugTraq ID: 7113
Remote: Yes
Date Published: Mar 17 2003 12:00AM
Relevant URL:
http://www.securityfocus.com/bid/7113
Summary:

Multiple cryptographic weaknesses have recently been reported to affect
the Kerberos 4 protocol.  These are design faults and affect every full
implementation of the protocol.  The most serious allows for an adversary
to impersonate any principal in a realm.  This can result in a complete
compromise of the Kerberos Domain Controller and any hosts which rely on
it for authentication.  Another weakness allow fabrication of Kerberos 4
tickets for unauthorized client principals if triple-DES keys are used to
key Kerberos 4 services.

It should be noted that Kerberos 5 implementations may also be affected in
some environments.

This record will be updated as more information becomes available.
Depending on analysis by Symantec, this entry may be split into multiple
BIDs.

Sun XDR Library xdrmem_getbytes() Integer Overflow Vulnerability
BugTraq ID: 7123
Remote: Yes
Date Published: Mar 17 2003 12:00AM
Relevant URL:
http://www.securityfocus.com/bid/7123
Summary:

The Sun XDR (External Data Representation) library is used to for various
functions including interprocess communication (IPC) and is typically
implemented by RPC services. XDR library code is implemented by a variety
of system libraries including GNU libc, BSD libc, and Sun Microsystem's
libnsl.

A vulnerability has been discovered in the xdrmem_getbytes() function
defined by the XDR library. Due to an integer overflow in the function,
multiple applications linking to the library may be prone to a variety of
vulnerabilities.

By passing a malicious integer to the function, it may be possible for an
attacker to trigger an unexpected allocation of process memory. This may
cause implemented bounds checking to be insufficient. Furthermore,
previously used memory may be allocated which could contain sensitive
information.

Successful exploitation of this issue on a vulnerable application may
allow an attacker to execute arbitrary commands with root privileges.

[ also concerns krb5, glibc and others ]

Gnome-lokkit Iptables No Forward Chain Rule Vulnerability
BugTraq ID: 7128
Remote: Yes
Date Published: Mar 17 2003 12:00AM
Relevant URL:
http://www.securityfocus.com/bid/7128
Summary:

Gnome-lokkit is a utility that provides firewalling for the average Linux
end user based on responses to a small number of simple questions.

Gnome-lokkit for Red Hat 8.0 was modified to configure iptables instead of
ipchains based firewalls. Gnome-lokkit has been reported prone to a
condition where FORWARD chains in iptables rulesets are not configured by
default. This situation may result in a variety of security
vulnerabilities depending on system configuration.

It should be noted that a vulnerability might only present itself if an
administrator were to enable packet forwarding, without adding rules to
the FORWARD chain.

The vulnerability was reported to affect Gnome-lokkit for Red Hat Linux
8.0. Previous versions of Gnome-lokkit are not reported to be affected.

PXE Server Remote Buffer Overrun Vulnerability
BugTraq ID: 7129
Remote: Yes
Date Published: Mar 17 2003 12:00AM
Relevant URL:
http://www.securityfocus.com/bid/7129
Summary:

Red Hat Linux includes a Preboot eXecution Environment (PXE) server. PXE
can be used to boot a Linux based system from a remote disk image.

A vulnerability has been discovered in PXE which is included with Red Hat
Linux. Specifically, it is possible for a remote attacker to overrun a
buffer by passing 10000 bytes of data to the service. This may result in
the corruption of sensitive process memory, such as a saved instruction
pointer, and as such may allow an attacker to execute arbitrary commands.

Successful exploitation of this issue could allow an attacker to execute
commands with root privileges.

This issue has been reported to exist in PXE 2.0 Beta-1 on Red Hat Linux.
Other versions may also be affected by this vulnerability.

SIPS User Information Disclosure Vulnerability
BugTraq ID: 7134
Remote: Yes
Date Published: Mar 18 2003 12:00AM
Relevant URL:
http://www.securityfocus.com/bid/7134
Summary:

SIPS is a weblog and link indexing system. It is available for Unix and
Linux variants in addition to Microsoft Windows operating systems.

It has been reported that SIPS fails to authenticate users before granting
users to user account information. As a result, it may be possible for an
attacker to access sensitive data by making a request to a specific
location, including the first letter of a username, followed by the full
username.

By gaining access to sensitive user account data it may be possible for an
attacker to launch further attacks.

It should be noted that this vulnerability was reported in SIPS v0.2.2
however, other versions may also be affected.

-
Pour poster une annonce: [EMAIL PROTECTED]

Répondre à