Debian Security Advisory

                                                                                                                                                    • -
Debian Security Advisory DSA 633-1 security@debian.org http://www.debian.org/security/ Martin Schulze January 11th, 2005 http://www.debian.org/security/faq
                                                                                                                                                    • -
Package : bmv Vulnerability : insecure temporary file Problem-Type : local Debian-specific: no CVE ID : CAN-2003-0014 Peter Samuelson, upstream maintainer of bmv, a PostScript viewer for SVGAlib, discovered that temporary files are created in an insecure fashion. A malicious local user could cause arbitrary files to be overwritten by a symlink attack. For the stable distribution (woody) this problem has been fixed in version 1.2-14.2. For the unstable distribution (sid) this problem has been fixed in version 1.2-17. We recommend that you upgrade your bmv packages.
                                                                                                                                                    • -
Debian Security Advisory DSA 634-1 security@debian.org http://www.debian.org/security/ Martin Schulze January 11th, 2005 http://www.debian.org/security/faq
                                                                                                                                                    • -
Package : hylafax Vulnerability : weak hostname and username validation Problem-Type : local/remote Debian-specific: no CVE ID : CAN-2004-1182 Patrice Fournier discovered a vulnerability in the authorisation subsystem of hylafax, a flexible client/server fax system. A local or remote user guessing the contents of the hosts.hfaxd database could gain unauthorised access to the fax system. Some installations of hylafax may actually utilise the weak hostname and username validation for authorized uses. For example, hosts.hfaxd entries that may be common are 192.168.0 username:uid:pass:adminpass user@host After updating, these entries will need to be modified in order to continue to function. Respectively, the correct entries should be 192.168.0.[0-9]+ username@:uid:pass:adminpass user@host Unless such maching of "username" with "otherusername" and "host" with "hostname" is desired, the proper form of these entries should include the delimiter and markers like this @192.168.0.[0-9]+$ ^username@:uid:pass:adminpass ^user@host$ For the stable distribution (woody) this problem has been fixed in version 4.1.1-3.1. For the unstable distribution (sid) this problem has been fixed in version 4.2.1-1. We recommend that you upgrade your hylafax packages.
                                                                                                                                                    • -
Debian Security Advisory DSA 635-1 security@debian.org http://www.debian.org/security/ Martin Schulze January 12th, 2005 http://www.debian.org/security/faq
                                                                                                                                                    • -
Package : exim Vulnerability : buffer overflow Problem-Type : remote Debian-specific: no CVE ID : CAN-2005-0021 Debian Bug : 289046 Philip Hazel announced a buffer overflow in the host_aton function in exim, the default mail-tranport-agent in Debian, which can lead to the execution of arbitrary code via an illegal IPv6 address. For the stable distribution (woody) this problem has been fixed in version 3.35-1woody4. For the unstable distribution (sid) this problem has been fixed in version 3.36-13 of exim and 4.34-10 of exim4. We recommend that you upgrade your exim and exim4 packages.