Beschreibung: | Description:
The remote host is missing updates announced in advisory TSLSA-2006-0002.
clamav < TSL 3.0 > < TSL 2.2 > - New Upstream. - SECURITY Fix: Fixes possible heap based buffer overflow in libclamav/upx.c.
The Common Vulnerabilities and Exposures project has assigned the name CVE-2006-0162 to this issue.
cups < TSL 3.0 > < TSL 2.2 > < TSEL 2 > - SECURITY Fix: Chris Evans has reported some vulnerabilities in xpdf, which can be exploited by malicious people to cause a DoS. - Integer overflow error exists in Stream.cc:StreamPredictor::StreamPredictor() and Stream.cc::CCITTFaxStream::CCITTFaxStream() when calculating buffer sizes for memory allocation. This can potentially be exploited to overflow the allocated heap memory. - An infinite loop error exists in Stream.cc::DCTStream::readMarker() when handling certain malformed input files. This can potentially be exploited to cause a DoS. - Missing validation of input parameters in Stream.cc:DCTStream::readHuffmanTables() and Stream.cc:DCTStream::readScanInfo() can cause out-of-bounds memory access. This can potentially be exploited to overwrite certain memory. - Some potential integer overflow error exists in JBIG2Stream.cc.
The Common Vulnerabilities and Exposures project has assigned the name CVE-2005-3624, CVE-2005-3625, CVE-2005-3626 and CVE-2005-3627 to these issues.
fetchmail < TSL 3.0 > < TSL 2.2 > - New Upstream. - SECURITY Fix: A vulnerability has been reported in Fetchmail caused due to a null pointer dereferencing error when handling a message without email headers. This can be exploited to crash Fetchmail when the upstream mail server sends a message without headers.
The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CVE-2005-4348 to this issue.
mod_auth_pgsql < TSL 3.0 > - New Upstream. - SECURITY Fix: iDEFENSE has reported a format string flaw in mod_auth_pgsql. This could allow a remote unauthenticated attacker to execute arbitrary code as the httpd process.
The Common Vulnerabilities and Exposures project has assigned the name CVE-2005-3656 to this issue.
sudo < TSL 3.0 > < TSL 2.2 > < TSEL 2 > - SECURITY FIX: A vulnerability has been reported in Sudo caused due to an error within the environment cleaning. This can be exploited by a user with sudo access to a perl script to load and execute arbitrary library files via the PERLLIB, PERL5LIB and the PERL5OPT environment variables.
The Common Vulnerabilities and Exposures project has assigned the name CVE-2005-4158 to this issue.
Solution: Update your system with the packages as indicated in the referenced security advisory.
http://www.securityspace.com/smysecure/catid.html?in=TSLSA-2006-0002
Risk factor : Critical
CVSS Score: 10.0
|