Security Advisories Week: 22-29 May 2002
Problem description: The fetchmail client will allocate an array to store the sizes of the messages it is attempting to retrieve. This array size is determined by the number of messages the server is claiming to have, and fetchmail would not check whether or not the number of messages the server was claiming was too high. This would allow a malicious server to make the fetchmail process write data outside of the array bounds.



Title: scoadmin command creates temporary files insecurely
Date: May 28 2002
Vendor: Caldera
Vulnerable systems: OpenServer 5.0.5, OpenServer 5.0.6
Full advisory: http://www.net-security.org/advisory.php?id=724
Problem description: The scoadmin command creates and uses temporary files insecurely. Names can be predicted, and spoofed with symbolic links.



Title: sort command creates temporary files
Date: May 28 2002
Vendor: Caldera
Vulnerable systems: OpenServer 5.0.5, OpenServer 5.0.6
Full advisory: http://www.net-security.org/advisory.php?id=725
Problem description: The sort command creates and uses temporary files insecurely. Names can be predicted, and spoofed with symbolic links.


Title: Tcpdump remote command execution
Date: May 29 2002
Vendor: SuSE
Vulnerable systems: SuSE Linux line of products 6.4, 7.0, 7.1, 7.2, 7.3, 8.0
Full advisory: http://www.net-security.org/advisory.php?id=726
Problem description: Tcpdump decodes certain packets such as AFS requests in a wrong way resulting in a buffer overflow. Since running tcpdump requires root privileges this may lead to a root compromise of the system running tcpdump.



Title: rc uses file globbing dangerously
Date: May 9 2002
Vendor: FreeBSD
Vulnerable systems: FreeBSD 4.4-RELEASE, FreeBSD 4.5-RELEASE, FreeBSD 4-STABLE prior to the correction date
Full advisory: http://www.net-security.org/advisory.php?id=727
Problem description: rc is the system startup script (/etc/rc). It is run when the FreeBSD is booted multi-user, and performs a multitude of tasks to bring the system up. One of these tasks is to remove lock files left by X Windows, as their existence could prevent one from restarting the X Windows server.



Title: DHCP remote exploitable vulnerability
Date: May 29 2002
Vendor: Mandrake
Vulnerable systems: Mandrake Linux 7.2, 8.1, 8.2, Single Network Firewall 7.2
Full advisory: http://www.net-security.org/advisory.php?id=729
Problem description: Fermin J. Serna discovered a problem in the dhcp server and client package from versions 3.0 to 3.0.1rc8, which are affected by a format string vulnerability that can be exploited remotely.



Title: Remote denial-of-service when using accept filters
Date: May 29 2002
Vendor: FreeBSD
Vulnerable systems: FreeBSD 4.5-RELEASE, FreeBSD 4-STABLE after 2001-11-22 and prior to the correction date
Full advisory: http://www.net-security.org/advisory.php?id=728
Problem description: FreeBSD features an accept_filter mechanism which allows an application to request that the kernel pre-process incoming connections. For example, the accf_http accept filter prevents accept from returning until a full HTTP request has been buffered.

Spotlight

Almost 1 in 10 Android apps are now malware

Posted on 28 July 2014.  |  Cheetah Mobile Threat Research Labs analyzed trends in mobile viruses for Q1 and Q2 of 2014. Pulling 24.4 million sample files they found that 2.2 million files had viruses. This is a 153% increase from the number of infected files in 2013.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Tue, Jul 29th
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //