[Bug 232109] New: CVE-2007-1398: snort DoS
by Red Hat Bugzilla
Please do not reply directly to this email. All additional
comments should be made in the comments box of this bug report.
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=232109
Summary: CVE-2007-1398: snort DoS
Product: Fedora Extras
Version: fc6
Platform: All
OS/Version: Linux
Status: NEW
Severity: medium
Priority: medium
Component: snort
AssignedTo: dennis(a)ausil.us
ReportedBy: ville.skytta(a)iki.fi
QAContact: extras-qa(a)fedoraproject.org
CC: fedora-security-list(a)redhat.com
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2007-1398
"The frag3 preprocessor in Snort 2.6.1.1, 2.6.1.2, and 2.7.0 beta, when
configured for inline use on Linux without the ip_conntrack module loaded,
allows remote attackers to cause a denial of service (segmentation fault and
application crash) via certain UDP packets produced by send_morefrag_packet and
send_overlap_packet."
FC-5 and 6 are at 2.6.1.1 at the moment.
--
Configure bugmail: https://bugzilla.redhat.com/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are on the CC list for the bug, or are watching someone who is.
17 years
[Bug 231729] New: trac < 0.10.3.1 XSS
by Red Hat Bugzilla
Please do not reply directly to this email. All additional
comments should be made in the comments box of this bug report.
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=231729
Summary: trac < 0.10.3.1 XSS
Product: Fedora Extras
Version: fc6
Platform: All
OS/Version: Linux
Status: NEW
Severity: medium
Priority: medium
Component: trac
AssignedTo: jeff(a)ocjtech.us
ReportedBy: ville.skytta(a)iki.fi
QAContact: extras-qa(a)fedoraproject.org
CC: fedora-security-list@redhat.com,limb(a)jcomserv.net
http://secunia.com/advisories/24470
http://trac.edgewall.org/wiki/ChangeLog#a0.10.3.1
"The vulnerability is caused due to an error within the "download wiki page as
text" function, which can be exploited to execute arbitrary HTML and script code
in a user's browser session in context of an affected site. Successful
exploitation may require that the victim uses IE."
Based on version numbers, all FE5+ releases affected.
(No CVE id yet AFAIK)
--
Configure bugmail: https://bugzilla.redhat.com/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are on the CC list for the bug, or are watching someone who is.
17 years
[Bug 231733] New: CVE-2007-1267: sylpheed <= 2.2.7 message forgery vulnerability
by Red Hat Bugzilla
Please do not reply directly to this email. All additional
comments should be made in the comments box of this bug report.
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=231733
Summary: CVE-2007-1267: sylpheed <= 2.2.7 message forgery
vulnerability
Product: Fedora Extras
Version: fc6
Platform: All
OS/Version: Linux
Status: NEW
Severity: medium
Priority: medium
Component: sylpheed
AssignedTo: bugs.michael(a)gmx.net
ReportedBy: ville.skytta(a)iki.fi
QAContact: extras-qa(a)fedoraproject.org
CC: fedora-security-list(a)redhat.com
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2007-1267
"Sylpheed 2.2.7 and earlier does not properly use the --status-fd argument when
invoking GnuPG, which prevents Sylpheed from visually distinguishing between
signed and unsigned portions of OpenPGP messages with multiple components, which
allows remote attackers to forge the contents of a message without detection."
This issue is reported against a suspiciously old version of Sylpheed; bug filed
for verification whether current versions in FE5+ are affected.
--
Configure bugmail: https://bugzilla.redhat.com/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are on the CC list for the bug, or are watching someone who is.
17 years
[Bug 228758] New: CVE-2007-0770: GraphicsMagick buffer overflow
by Red Hat Bugzilla
Please do not reply directly to this email. All additional
comments should be made in the comments box of this bug report.
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=228758
Summary: CVE-2007-0770: GraphicsMagick buffer overflow
Product: Fedora Extras
Version: fc6
Platform: All
OS/Version: Linux
Status: NEW
Severity: medium
Priority: normal
Component: GraphicsMagick
AssignedTo: andreas(a)bawue.net
ReportedBy: ville.skytta(a)iki.fi
QAContact: extras-qa(a)fedoraproject.org
CC: fedora-security-list(a)redhat.com
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2007-0770
"Buffer overflow in GraphicsMagick and ImageMagick allows user-assisted remote
attackers to cause a denial of service and possibly execute arbitrary code via a
PALM image that is not properly handled by the ReadPALMImage function in
coders/palm.c. NOTE: this issue is due to an incomplete patch for CVE-2006-5456."
CVE-2006-5456 says that it is an issue with < 1.1.7, but the discussion in bug
210921 refers to a post-1.1.7 GraphicsMagick, so whether this affects the FE
GraphicsMagick package should be investigated.
--
Configure bugmail: https://bugzilla.redhat.com/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are on the CC list for the bug, or are watching someone who is.
17 years
F7 T2 Security Leak?
by Michaël Vanderheeren
I think there's a security leak in F7. I found out the next thing:
Look at this situation:
There are 2 accounts on a computer, call them A and B. Each account has it's
own different password.
Person A starts up the computer and logs in. But at a certain point person B
wants to use his account for 5 minutes. So he uses the Fast User Switch. As
this happens person A's account stays active. But
person B can switch back
to person A's account without entering a password! So if person A is gone
for a while, person B can steal his documents, delete files,
Greetings,
Michaël Vanderheeren
17 years
[Bug 230898] New: CVE-2007-1244: wordpress 2.1.1 (others?) CSRF
by Red Hat Bugzilla
Please do not reply directly to this email. All additional
comments should be made in the comments box of this bug report.
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=230898
Summary: CVE-2007-1244: wordpress 2.1.1 (others?) CSRF
Product: Fedora Extras
Version: fc6
Platform: All
OS/Version: Linux
Status: NEW
Severity: medium
Priority: medium
Component: wordpress
AssignedTo: jwb(a)redhat.com
ReportedBy: ville.skytta(a)iki.fi
QAContact: extras-qa(a)fedoraproject.org
CC: fedora-security-list(a)redhat.com
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2007-1244
"Cross-site request forgery (CSRF) vulnerability in the AdminPanel in WordPress
2.1.1 and earlier allows remote attackers to perform privileged actions as
administrators, as demonstrated using the delete action in wp-admin/post.php.
NOTE: this issue can be leveraged to perform cross-site scripting (XSS) attacks
and steal cookies via the post parameter."
Unsure whether this is fixed in 2.1.2.
--
Configure bugmail: https://bugzilla.redhat.com/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are on the CC list for the bug, or are watching someone who is.
17 years
[Bug 230825] Backdoor exploit in 2.1.1
by Red Hat Bugzilla
Please do not reply directly to this email. All additional
comments should be made in the comments box of this bug report.
Summary: Backdoor exploit in 2.1.1
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=230825
ville.skytta(a)iki.fi changed:
What |Removed |Added
----------------------------------------------------------------------------
Keywords| |Security
CC| |fedora-security-
| |list(a)redhat.com
------- Additional Comments From ville.skytta(a)iki.fi 2007-03-03 11:07 EST -------
Repository push is in progress.
--
Configure bugmail: https://bugzilla.redhat.com/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are on the CC list for the bug, or are watching someone who is.
17 years