Debian Security Advisory

    • Offizieller Beitrag

    Package : wordpress
    Vulnerability : sql injection
    Problem type : remote
    Debian-specific: no
    CVE ID : CVE-2010-4257

    Vladimir Kolesnikov discovered a SQL injection vulnerability in wordpress,
    a weblog manager.
    An authenticated users could execute arbitrary SQL commands via the Send
    Trackbacks field.


    For the stable distribution (lenny), this problem has been fixed
    in version 2.5.1-11+lenny4.

    For the unstable distribution (sid), and the testing distribution (squeeze),
    this problem has been fixed in version 3.0.2-1.

    We recommend that you upgrade your wordpress package.

    Further information about Debian Security Advisories, how to apply
    these updates to your system and frequently asked questions can be
    found at: http://www.debian.org/security/

    Mailing list: debian-security-announce@lists.debian.org

    • Offizieller Beitrag

    Package : phpmyadmin
    Vulnerability : several
    Problem type : remote
    Debian-specific: no
    CVE ID : CVE-2010-4329 CVE-2010-4480 CVE-2010-4481

    Several vulnerabilities have been discovered in phpMyAdmin, a tool
    to administer MySQL over the web. The Common Vulnerabilities and Exposures
    project identifies the following problems:

    CVE-2010-4329

    Cross site scripting was possible in search, that allowed
    a remote attacker to inject arbitrary web script or HTML.

    CVE-2010-4480

    Cross site scripting was possible in errors, that allowed
    a remote attacker to inject arbitrary web script or HTML.

    CVE-2010-4481

    Display of PHP's phpinfo() function was available to world, but only
    if this functionality had been enabled (defaults to off). This may
    leak some information about the host system.

    For the stable distribution (lenny), these problems have been fixed in
    version 2.11.8.1-5+lenny7.

    For the testing (squeeze) and unstable distribution (sid), these problems
    have been fixed in version 3.3.7-3.

    We recommend that you upgrade your phpmyadmin package.

    Further information about Debian Security Advisories, how to apply
    these updates to your system and frequently asked questions can be
    found at: http://www.debian.org/security/

    Mailing list: debian-security-announce@lists.debian.org

    • Offizieller Beitrag

    Package : nss
    Vulnerability : SSL/TLS insecure renegotiation protocol design flaw
    Problem type : remote
    Debian-specific: no
    CVE ID : CVE-2009-3555

    CVE-2009-3555:

    Marsh Ray, Steve Dispensa, and Martin Rex discovered a flaw in the TLS
    and SSLv3 protocols. If an attacker could perform a man in the middle
    attack at the start of a TLS connection, the attacker could inject
    arbitrary content at the beginning of the user's session. This update
    adds backported support for the new RFC5746 renegotiation extension
    which fixes this issue.

    The updated libraries allow to use shell environment variables to
    configure if insecure renegotiation is still allowed. The syntax of
    these environment variables is described in the release notes to
    version 3.12.6 of nss:

    https://developer.mozilla.org/NSS_3.12.6_release_notes

    However, the default behaviour for nss in Debian 5.0 (Lenny) is
    NSS_SSL_ENABLE_RENEGOTIATION=3, which allows clients to continue to
    renegotiate with vulnerable servers.

    For the stable distribution (lenny), this problem has been fixed
    in version 3.12.3.1-0lenny3.

    For the unstable distribution (sid), and the testing distribution
    (squeeze), this problem has been fixed in version 3.12.6-1.

    We recommend that you upgrade your nss package.

    Further information about Debian Security Advisories, how to apply
    these updates to your system and frequently asked questions can be
    found at: http://www.debian.org/security/

    • Offizieller Beitrag

    Package : apache2
    Vulnerability : backward compatibility option for SSL/TLS insecure
    renegotiation
    Problem type : remote
    Debian-specific: no
    CVE ID : CVE-2009-3555
    Debian Bug : 587037

    DSA-2141-1 changed the behaviour of the openssl libraries in a server
    environment to only allow SSL/TLS renegotiation for clients that
    support the RFC5746 renegotiation extension. This update to apache2
    adds the new SSLInsecureRenegotiation configuration option that allows
    to restore support for insecure clients. More information can be found
    in the file /usr/share/doc/apache2.2-common/NEWS.Debian.gz .

    For the stable distribution (lenny), the compatibility option has been
    included in version 2.2.9-10+lenny9.

    In addition, apache2-mpm-itk has been rebuilt to work with the updated
    apache2 packages. The new version number is 2.2.6-02-1+lenny4.

    For the unstable distribution (sid), and the testing distribution
    (squeeze), the compatibility option has been included since version
    2.2.15-1.

    We recommend that you upgrade your apache2 and apache2-mpm-itk
    packages.

    Further information about Debian Security Advisories, how to apply
    these updates to your system and frequently asked questions can be
    found at: http://www.debian.org/security/

    • Offizieller Beitrag

    Package : libapache2-mod-fcgid
    Vulnerability : stack overflow
    Problem type : local
    Debian-specific: no
    CVE ID : CVE-2010-3872

    A vulnerability has been found in Apache mod_fcgid.
    The Common Vulnerabilities and Exposures project identifies the
    following problem:

    CVE-2010-3872

    A stack overflow could allow an untrusted FCGI application to cause
    a server crash or possibly to execute arbitrary code as the user
    running the web server.

    For the stable distribution (lenny), this problem has been fixed
    in version 2.2-1+lenny1.

    For the unstable distribution (sid), and the testing distribution
    (squeeze), this problem has been fixed in version 2.3.6-1.

    We recommend that you upgrade your libapache2-mod-fcgid packages.

    Further information about Debian Security Advisories, how to apply
    these updates to your system and frequently asked questions can be
    found at: http://www.debian.org/security/

    • Offizieller Beitrag

    Package : openssl
    Vulnerability : SSL/TLS insecure renegotiation protocol design flaw
    Problem type : remote
    Debian-specific: no
    CVE ID : CVE-2009-3555 CVE-2010-4180
    Debian Bug : 555829

    CVE-2009-3555:

    Marsh Ray, Steve Dispensa, and Martin Rex discovered a flaw in the TLS
    and SSLv3 protocols. If an attacker could perform a man in the middle
    attack at the start of a TLS connection, the attacker could inject
    arbitrary content at the beginning of the user's session. This update
    adds backported support for the new RFC5746 renegotiation extension
    which fixes this issue.

    If openssl is used in a server application, it will by default no
    longer accept renegotiation from clients that do not support the
    RFC5746 secure renegotiation extension. A separate advisory will add
    RFC5746 support for nss, the security library used by the iceweasel
    web browser. For apache2, there will be an update which allows to
    re-enable insecure renegotiation.

    This version of openssl is not compatible with older versions of tor.
    You have to use at least tor version 0.2.1.26-1~lenny+1, which has
    been included in the point release 5.0.7 of Debian stable.

    Currently we are not aware of other software with similar compatibility
    problems.


    CVE-2010-4180:

    In addition, this update fixes a flaw that allowed a client to bypass
    restrictions configured in the server for the used cipher suite.


    For the stable distribution (lenny), this problem has been fixed
    in version 0.9.8g-15+lenny11.

    For the unstable distribution (sid), and the testing distribution
    (squeeze), this problem has been fixed in version 0.9.8o-4.

    We recommend that you upgrade your openssl package.

    Further information about Debian Security Advisories, how to apply
    these updates to your system and frequently asked questions can be
    found at: http://www.debian.org/security/

    • Offizieller Beitrag

    Package : dpkg
    Vulnerability : directory traversal
    Problem type : local
    Debian-specific: no
    CVE ID : CVE-2010-1679

    Jakub Wilk discovered that the dpkg-source component of dpkg, the Debian
    package management system, doesn't correctly handle paths in patches of
    source packages, which could make it traverse directories.
    Raphaël Hertzog additionally discovered that symbolic links in the .pc
    directory are followed, which could make it traverse directories too.

    Both issues only affect source packages using the "3.0 quilt" format at
    unpack-time.


    For the stable distribution (lenny), these problems have been fixed in
    version 1.14.31.
    For the testing (squeeze) and unstable distributions (sid),
    these problems will be fixed soon.


    We recommend that you upgrade your dpkg packages.

    Further information about Debian Security Advisories, how to apply
    these updates to your system and frequently asked questions can be
    found at: http://www.debian.org/security/

    • Offizieller Beitrag

    Package : dpkg
    Vulnerability : directory traversal
    Problem type : local
    Debian-specific: no
    CVE ID : CVE-2010-1679

    Jakub Wilk discovered that the dpkg-source component of dpkg, the Debian
    package management system, doesn't correctly handle paths in patches of
    source packages, which could make it traverse directories.
    Raphaël Hertzog additionally discovered that symbolic links in the .pc
    directory are followed, which could make it traverse directories too.

    Both issues only affect source packages using the "3.0 quilt" format at
    unpack-time.


    For the stable distribution (lenny), these problems have been fixed in
    version 1.14.31.
    For the testing (squeeze) and unstable distributions (sid),
    these problems will be fixed soon.


    We recommend that you upgrade your dpkg packages.

    Further information about Debian Security Advisories, how to apply
    these updates to your system and frequently asked questions can be
    found at: http://www.debian.org/security/

    • Offizieller Beitrag

    Package : glibc
    Vulnerability : missing input sanitization
    Problem type : local
    Debian-specific: no
    CVE ID : CVE-2010-3847 CVE-2010-3856

    Colin Watson discovered that the update for stable relased in
    DSA-2122-1 did not complete address the underlying security issue in
    all possible scenarios.

    For the stable distribution (lenny), this problem has been fixed in
    version 2.7-18lenny7.

    For the testing distribution (squeeze) and the unstable distribution
    (sid), this problem will be fixed soon.

    We recommend that you upgrade your glibc packages.

    Further information about Debian Security Advisories, how to apply
    these updates to your system and frequently asked questions can be
    found at: http://www.debian.org/security/

    • Offizieller Beitrag

    Package : lighttpd
    Vulnerability : compatibility problem with updated openssl
    Debian-specific: no
    CVE ID : CVE-2009-3555
    Debian Bug : 609124

    The openssl update in DSA-2141-1 caused a regression in lighttpd. Due
    to a bug in lighttpd, the server fails to start in some configurations
    if using the updated openssl libraries. This update fixes this problem.

    For the stable distribution (lenny), the problem has been fixed in
    version 1.4.19-5+lenny2.

    The packages for the hppa, mips, and mipsel architectures are not yet
    available. They will be released as soon as they have been built.

    For the unstable distribution (sid), and the testing distribution
    (squeeze), the problem has been fixed some time ago in version 1.4.26-3.

    We recommend that you upgrade your lighttpd packages.

    Further information about Debian Security Advisories, how to apply
    these updates to your system and frequently asked questions can be
    found at: http://www.debian.org/security/

    • Offizieller Beitrag

    Package : mysql-dfsg-5.0
    Vulnerability : several vulnerabilities
    Problem type : remote
    Debian-specific: no
    CVE ID : CVE-2010-3677 CVE-2010-3680 CVE-2010-3681 CVE-2010-3682 CVE-2010-3833 CVE-2010-3834 CVE-2010-3835 CVE-2010-3836 CVE-2010-3837 CVE-2010-3838 CVE-2010-3840


    Several vulnerabilities have been discovered in the MySQL
    database server.
    The Common Vulnerabilities and Exposures project identifies the
    following problems:


    CVE-2010-3677

    It was discovered that MySQL allows remote authenticated users to cause
    a denial of service (mysqld daemon crash) via a join query that uses a
    table with a unique SET column.


    CVE-2010-3680

    It was discovered that MySQL allows remote authenticated users to cause
    a denial of service (mysqld daemon crash) by creating temporary tables
    while using InnoDB, which triggers an assertion failure.


    CVE-2010-3681

    It was discovered that MySQL allows remote authenticated users to cause
    a denial of service (mysqld daemon crash) by using the HANDLER interface
    and performing "alternate reads from two indexes on a table," which
    triggers an assertion failure.


    CVE-2010-3682

    It was discovered that MySQL incorrectly handled use of EXPLAIN with
    certain queries.
    An authenticated user could crash the server.


    CVE-2010-3833

    It was discovered that MySQL incorrectly handled propagation during
    evaluation of arguments to extreme-value functions.
    An authenticated user could crash the server.


    CVE-2010-3834

    It was discovered that MySQL incorrectly handled materializing a derived
    table that required a temporary table for grouping.
    An authenticated user could crash the server.


    CVE-2010-3835

    It was discovered that MySQL incorrectly handled certain user-variable
    assignment expressions that are evaluated in a logical expression context.
    An authenticated user could crash the server.


    CVE-2010-3836

    It was discovered that MySQL incorrectly handled pre-evaluation of LIKE
    predicates during view preparation.
    An authenticated user could crash the server.


    CVE-2010-3837

    It was discovered that MySQL incorrectly handled using GROUP_CONCAT()
    and WITH ROLLUP together.
    An authenticated user could crash the server.


    CVE-2010-3838

    It was discovered that MySQL incorrectly handled certain queries using a
    mixed list of numeric and LONGBLOB arguments to the GREATEST() or
    LEAST() functions.
    An authenticated user could crash the server.


    CVE-2010-3840

    It was discovered that MySQL incorrectly handled improper WKB data
    passed to the PolyFromWKB() function.
    An authenticated user could crash the server.


    For the stable distribution (lenny), these problems have been fixed
    in version 5.0.51a-24+lenny5

    The testing (squeeze) and unstable (sid) distribution do not contain
    mysql-dfsg-5.0 anymore.

    We recommend that you upgrade your mysql-dfsg-5.0 packages.

    Further information about Debian Security Advisories, how to apply
    these updates to your system and frequently asked questions can be
    found at: http://www.debian.org/security/

    Mailing list: debian-security-announce@lists.debian.org

    • Offizieller Beitrag

    Package : wireshark
    Vulnerability : buffer overflow
    Problem type : remote
    Debian-specific: no
    CVE ID : CVE-2010-4538

    It was discovered that a buffer overflow in the ENTTEC dissector may
    lead to the execution of arbitrary code.


    For the stable distribution (lenny), this problem has been fixed in
    version 1.0.2-3+lenny12.

    For the testing distribution (squeeze), this problem has been fixed in
    version 1.2.11-6.

    For the unstable distribution (sid), this problem has been fixed in
    version 1.2.11-6.

    We recommend that you upgrade your wireshark packages.

    Further information about Debian Security Advisories, how to apply
    these updates to your system and frequently asked questions can be
    found at: http://www.debian.org/security/

    • Offizieller Beitrag

    Package : libsmi
    Vulnerability : buffer overflow
    Problem type : remote
    Debian-specific: no
    CVE ID : CVE-2010-2891

    Andres Lopez Luksenberg discovered a buffer overflow in the OID parser
    of libsmi, a library to access SMI MIB data.

    For the stable distribution (lenny), this problem has been fixed in
    version 0.4.7+dfsg-0.2.

    For the testing distribution (squeeze), this problem has been fixed in
    version 0.4.8+dfsg2-3.

    For the unstable distribution (sid), this problem has been fixed in
    version 0.4.8+dfsg2-3.

    We recommend that you upgrade your libsmi packages.

    Further information about Debian Security Advisories, how to apply
    these updates to your system and frequently asked questions can be
    found at: http://www.debian.org/security/

    • Offizieller Beitrag

    Package : mydms
    Vulnerability : directory traversal
    Problem type : remote
    Debian-specific: no
    CVE ID : CVE-2010-2006

    D. Fabian and L. Weichselbaum discovered a directory traversal
    vulnerability in MyDMS, a open-source document management system based
    on PHP and MySQL.

    For the stable distribution (lenny), this problem has been fixed in
    version 1.7.0-1+lenny1.

    The testing distribution (squeeze) and the unstable distribution (sid)
    no longer contain mydms packages.

    We recommend that you upgrade your mydms packages.

    Further information about Debian Security Advisories, how to apply
    these updates to your system and frequently asked questions can be
    found at: http://www.debian.org/security/

    • Offizieller Beitrag

    Package : pimd
    Vulnerability : insecure temporary files
    Problem type : local
    Debian-specific: no
    CVE ID : CVE-2011-0007

    Vincent Bernat discovered that pimd, a multicast routing daemon, creates
    files with predictable names upon the receipt of particular signals.

    For the stable distribution (lenny), this problem has been fixed in
    version 2.1.0-alpha29.17-8.1lenny1.

    The testing distribution (squeeze) and the unstable distribution (sid)
    will receive updates shortly.

    We recommend that you upgrade your pimd packages.

    Further information about Debian Security Advisories, how to apply
    these updates to your system and frequently asked questions can be
    found at: http://www.debian.org/security/

    Mailing list: debian-security-announce@lists.debian.org

    • Offizieller Beitrag

    Package : tor
    Vulnerability : several
    Problem type : remote
    Debian-specific: no
    CVE ID : CVE-2011-0427

    The developers of Tor, an anonymizing overlay network for TCP, found
    three security issues during a security audit. A heap overflow allowed
    the execution of arbitrary code (CVE-2011-0427), a denial of service
    vulnerability was found in the zlib compression handling and some key
    memory was incorrectly zeroed out before being freed. The latter two
    issues do not yet have CVE identifiers assigned. The Debian Security
    Tracker will be updated once they're available:
    http://security-tracker.debian.org/tracker/source-package/tor

    For the stable distribution (lenny), this problem has been fixed in
    version 0.2.1.29-1~lenny+1.

    For the testing distribution (squeeze) and the unstable distribution (sid),
    this problem has been fixed in version 0.2.1.29-1.

    For the experimental distribution, this problem has been fixed in
    version 0.2.2.21-alpha-1.

    We recommend that you upgrade your tor packages.

    Further information about Debian Security Advisories, how to apply
    these updates to your system and frequently asked questions can be
    found at: http://www.debian.org/security/

    • Offizieller Beitrag

    Package : dbus
    Vulnerability : denial of service
    Problem type : local
    Debian-specific: no
    Debian bug : none
    CVE ID : CVE-2010-4352

    Rémi Denis-Courmont discovered that dbus, a message bus application,
    is not properly limiting the nesting level when examining messages with
    extensive nested variants. This allows an attacker to crash the dbus system
    daemon due to a call stack overflow via crafted messages.


    For the stable distribution (lenny), this problem has been fixed in
    version 1.2.1-5+lenny2.

    For the testing distribution (squeeze), this problem has been fixed in
    version 1.2.24-4.

    For the unstable distribution (sid), this problem has been fixed in
    version 1.2.24-4.


    We recommend that you upgrade your dbus packages.

    Mailing list: debian-security-announce@lists.debian.org

    • Offizieller Beitrag

    Package : request-tracker3.6
    Vulnerability : unsalted password hashing
    Problem type : local
    Debian-specific: no
    CVE ID : CVE-2011-0009

    It was discovered that Request Tracker, an issue tracking system,
    stored passwords in its database by using an insufficiently strong
    hashing method. If an attacker would have access to the password
    database, he could decode the passwords stored in it.

    For the stable distribution (lenny), this problem has been fixed in
    version 3.6.7-5+lenny5.

    The testing distribution (squeeze) will be fixed soon.

    For the unstable distribution (sid), this problem has been fixed in
    version 3.8.8-7 of the request-tracker3.8 package.

    We recommend that you upgrade your Request Tracker packages.

    Further information about Debian Security Advisories, how to apply
    these updates to your system and frequently asked questions can be
    found at: http://www.debian.org/security/

    Mailing list: debian-security-announce@lists.debian.org

    • Offizieller Beitrag

    Package : openoffice.org
    Vulnerability : several
    Problem type : local (remote)
    Debian-specific: no
    CVE ID : CVE-2010-3450 CVE-2010-3451 CVE-2010-3452 CVE-2010-3453
    CVE-2010-3454 CVE-2010-3689 CVE-2010-4253 CVE-2010-4643

    Several security related problems have been discovered in the
    OpenOffice.org package that allows malformed documents to trick the
    system into crashes or even the execution of arbitrary code.

    CVE-2010-3450

    During an internal security audit within Red Hat, a directory
    traversal vulnerability has been discovered in the way
    OpenOffice.org 3.1.1 through 3.2.1 processes XML filter files. If
    a local user is tricked into opening a specially-crafted OOo XML
    filters package file, this problem could allow remote attackers to
    create or overwrite arbitrary files belonging to local user or,
    potentially, execute arbitrary code.

    CVE-2010-3451

    During his work as a consultant at Virtual Security Research
    (VSR), Dan Rosenberg discovered a vulnerability in
    OpenOffice.org's RTF parsing functionality. Opening a maliciously
    crafted RTF document can caus an out-of-bounds memory read into
    previously allocated heap memory, which may lead to the execution
    of arbitrary code.

    CVE-2010-3452

    Dan Rosenberg discovered a vulnerability in the RTF file parser
    which can be leveraged by attackers to achieve arbitrary code
    execution by convincing a victim to open a maliciously crafted RTF
    file.

    CVE-2010-3453

    As part of his work with Virtual Security Research, Dan Rosenberg
    discovered a vulnerability in the WW8ListManager::WW8ListManager()
    function of OpenOffice.org that allows a maliciously crafted file
    to cause the execution of arbitrary code.

    CVE-2010-3454

    As part of his work with Virtual Security Research, Dan Rosenberg
    discovered a vulnerability in the WW8DopTypography::ReadFromMem()
    function in OpenOffice.org that may be exploited by a maliciously
    crafted file which allowins an attacker to control program flow
    and potentially execute arbitrary code.

    CVE-2010-3689

    Dmitri Gribenko discovered that the soffice script does not treat
    an empty LD_LIBRARY_PATH variable like an unset one, may lead to
    the execution of arbitrary code.

    CVE-2010-4253

    A heap based buffer overflow has been discovered with unknown impact.

    CVE-2010-4643

    A vulnerability has been discovered in the way OpenOffice.org
    handles TGA graphics which can be tricked by a specially crafted
    TGA file that could cause the program to crash due to a heap-based
    buffer overflow with unknown impact.


    For the stable distribution (lenny) these problems have been fixed in
    version 2.4.1+dfsg-1+lenny11.

    For the upcoming stable distribution (squeeze) these problems have
    been fixed in version 3.2.1-11+squeeze1.

    For the unstable distribution (sid) these problems have been fixed in
    version 3.2.1-11+squeeze1.

    For the experimental distribution these problems have been fixed in
    version 3.3.0~rc3-1.

    We recommend that you upgrade your OpenOffice.org packages.


    Further information about Debian Security Advisories, how to apply
    these updates to your system and frequently asked questions can be
    found at: [18]http://www.debian.org/security/

    Mailing list: debian-security-announce@lists.debian.org

    • Offizieller Beitrag

    Package : hplip
    Vulnerability : buffer overflow
    Problem type : remote
    Debian-specific: no
    CVE ID : CVE-2010-4267
    Debian Bug : 610960

    Sebastian Krahmer discovered a buffer overflow in the SNMP discovery code
    of the HP Linux Printing and Imaging System, which could result in the
    execution of arbitrary code.

    For the stable distribution (lenny), this problem has been fixed in
    version 2.8.6.b-4+lenny1.

    For the testing distribution (squeeze), this problem has been fixed in
    version 3.10.6-2.

    For the unstable distribution (sid), this problem has been fixed in
    version 3.10.6-2.

    For the experimental distribution, this problem has been fixed in
    version 3.11.1-1.

    We recommend that you upgrade your hplip packages.

    Further information about Debian Security Advisories, how to apply
    these updates to your system and frequently asked questions can be
    found at: http://www.debian.org/security/