[Secure-testing-commits] r2945 - data/DTSA/advs
Neil McGovern
neilm at costa.debian.org
Mon Dec 5 14:55:43 UTC 2005
Author: neilm
Date: 2005-12-05 14:55:43 +0000 (Mon, 05 Dec 2005)
New Revision: 2945
Modified:
data/DTSA/advs/22-uim.adv
data/DTSA/advs/23-centericq.adv
data/DTSA/advs/24-inkscape.adv
data/DTSA/advs/25-smb4k.adv
data/DTSA/advs/26-trackballs.adv
Log:
Filled in the .advs
Modified: data/DTSA/advs/22-uim.adv
===================================================================
--- data/DTSA/advs/22-uim.adv 2005-12-05 11:56:05 UTC (rev 2944)
+++ data/DTSA/advs/22-uim.adv 2005-12-05 14:55:43 UTC (rev 2945)
@@ -1,13 +1,16 @@
-source: xxx
-date: Bloptember 99th, 1990
-author: xxx
-vuln-type: xxx
-problem-scope: remote/local
-debian-specifc: yes/no
-cve: xxx xxx
-vendor-advisory:
-testing-fix: xxx
-sid-fix: xxx
-upgrade: apt-get install xxx
+source: uim
+date: December 5th, 2005
+author: Neil McGovern
+vuln-type: local privilege escalation
+problem-scope: local
+debian-specifc: no
+cve: CVE-2005-3149
+testing-fix: 1:0.4.7-2.0etch1
+sid-fix: 1:0.4.7-2
+upgrade: apt-get upgrade
-xxx multiline description here
+CVE-2005-3149
+
+ Masanari Yamamoto discovered that incorrect use of environment
+ variables in uim. This bug causes privilege escalation if setuid/setgid
+ applications was linked to libuim.
Modified: data/DTSA/advs/23-centericq.adv
===================================================================
--- data/DTSA/advs/23-centericq.adv 2005-12-05 11:56:05 UTC (rev 2944)
+++ data/DTSA/advs/23-centericq.adv 2005-12-05 14:55:43 UTC (rev 2945)
@@ -1,13 +1,16 @@
-source: xxx
-date: Bloptember 99th, 1990
-author: xxx
-vuln-type: xxx
-problem-scope: remote/local
-debian-specifc: yes/no
-cve: xxx xxx
-vendor-advisory:
-testing-fix: xxx
-sid-fix: xxx
-upgrade: apt-get install xxx
+source: centericq
+date: December 5th, 2005
+author: Neil McGovern
+vuln-type: buffer overflow
+problem-scope: local
+debian-specifc: no
+cve: CVE-2005-3863
+testing-fix: 4.21.0-6.0etch1
+sid-fix: 4.21.0-6
+upgrade: apt-get upgrade
-xxx multiline description here
+CVE-2005-3863
+
+ Mehdi Oudad "deepfear" and Kevin Fernandez "Siegfried" from the Zone-H
+ Research Team discovered a buffer overflow in kkstrtext.h of the ktools
+ library, which is included in centericq.
Modified: data/DTSA/advs/24-inkscape.adv
===================================================================
--- data/DTSA/advs/24-inkscape.adv 2005-12-05 11:56:05 UTC (rev 2944)
+++ data/DTSA/advs/24-inkscape.adv 2005-12-05 14:55:43 UTC (rev 2945)
@@ -1,13 +1,16 @@
-source: xxx
-date: Bloptember 99th, 1990
-author: xxx
-vuln-type: xxx
-problem-scope: remote/local
-debian-specifc: yes/no
-cve: xxx xxx
-vendor-advisory:
-testing-fix: xxx
-sid-fix: xxx
-upgrade: apt-get install xxx
+source: inkscape
+date: December 5th, 2005
+author: Neil McGovern
+vuln-type: buffer overflow
+problem-scope: remote
+debian-specifc: no
+cve: CVE-2005-3737
+testing-fix: 0.43-0.0etch1
+sid-fix: 0.43-1
+upgrade: apt-get install inkscape
-xxx multiline description here
+CVE-2005-3737
+
+ Joxean Koret discovered that inkscape is vulnerable in the SVG importer
+ (style.cpp), which might allow remote attackers to execute arbitrary code
+ via a SVG file with long CSS style property values.
Modified: data/DTSA/advs/25-smb4k.adv
===================================================================
--- data/DTSA/advs/25-smb4k.adv 2005-12-05 11:56:05 UTC (rev 2944)
+++ data/DTSA/advs/25-smb4k.adv 2005-12-05 14:55:43 UTC (rev 2945)
@@ -1,13 +1,19 @@
-source: xxx
-date: Bloptember 99th, 1990
-author: xxx
-vuln-type: xxx
-problem-scope: remote/local
-debian-specifc: yes/no
-cve: xxx xxx
-vendor-advisory:
-testing-fix: xxx
-sid-fix: xxx
-upgrade: apt-get install xxx
+source: smb4k
+date: December 5th, 2005
+author: Neil McGovern
+vuln-type: access validation error
+problem-scope: local
+debian-specifc: no
+cve: CVE-2005-2851
+vendor-advisory: http://smb4k.berlios.de
+testing-fix: 0.6.4-0.0etch1
+sid-fix: 0.6.4-1
+upgrade: apt-get install smb4k
-xxx multiline description here
+CVE-2005-2851
+
+ A vulnerability leading to unauthorized file access has been found. A
+ pre-existing symlink from /tmp/sudoers and /tmp/super.tab to a textfile
+ will cause Smb4k to write the contents of these files to the target of the
+ symlink, as Smb4k does not check for the existence of these files before
+ writing to them.
Modified: data/DTSA/advs/26-trackballs.adv
===================================================================
--- data/DTSA/advs/26-trackballs.adv 2005-12-05 11:56:05 UTC (rev 2944)
+++ data/DTSA/advs/26-trackballs.adv 2005-12-05 14:55:43 UTC (rev 2945)
@@ -1,13 +1,17 @@
-source: xxx
-date: Bloptember 99th, 1990
-author: xxx
-vuln-type: xxx
+source: trackballs
+date: December 5th, 2005
+author: Neil McGovern
+vuln-type: symlink attack
problem-scope: remote/local
debian-specifc: yes/no
-cve: xxx xxx
+cve:
vendor-advisory:
-testing-fix: xxx
-sid-fix: xxx
-upgrade: apt-get install xxx
+testing-fix: 1.1.1-0.0etch1
+sid-fix: 1.1.1-1
+upgrade: apt-get upgrade
-xxx multiline description here
+Ulf Harnhammar notices that that trackballs follows symlinks when running as
+gid games. It writes to files such as $HOME/.trackballs/[USERNAME].gmr and
+$HOME/.trackballs/settings without checking if they are symlinks somewhere
+else. This can be abused for overwriting or creating files wherever the games
+group is allowed to do so.
More information about the Secure-testing-commits
mailing list