Frugalware Security Announcements (FSAs)

This is a list of security announcments that have been released for the current stable version of Frugalware

phpmyadmin

  • Vulnerable: 2.11.8.1-1
  • Unaffected: 2.11.9.1-1solaria1

Norman Hippert has reported a vulnerability in phpMyAdmin, which can be exploited by malicious users to compromise a vulnerable system. Input passed to the “sort_by” parameter in server_databases.php is not properly sanitised before being used. This can be exploited to execute arbitrary PHP code. Successful exploitation requires valid user credentials.

CVEs:

freetype2

  • Vulnerable: 2.3.5-2
  • Unaffected: 2.3.7-1kalgan1

Some vulnerabilities have been reported in FreeType, which potentially can be exploited by malicious people to compromise an application using the library.

  1. An integer overflow error exists in the processing of PFB font files. This can be exploited to cause a heap-based buffer overflow via a PFB file containing a specially crafted “Private” dictionary table.
  2. An error in the processing of PFB font files can be exploited to trigger the “free()” of memory areas that are not allocated on the heap.
  3. An off-by-one error exists in the processing of PFB font files. This can be exploited to cause a one-byte heap-based buffer overflow via a specially crafted PFB file.
  4. An off-by-one error exists in the implementation of the “SHC” instruction while processing TTF files. This can be exploited to cause a one-byte heap-based buffer overflow via a specially crafted TTF file. Successful exploitation of the vulnerabilities may allow execution of arbitrary code.

CVEs:

graphicsmagick

  • Vulnerable: 1.1.14-1kalgan1
  • Unaffected: 1.2.4-1kalgan1

Some vulnerabilities have been reported in GraphicsMagick, which can be exploited by malicious people to cause a DoS (Denial of Service).

  1. Multiple errors exist in the AVI, AVS, DCM, EPT, FITS, MTV, PALM, RLA, and TGA decoders. These can be exploited to trigger crashes, overly large memory allocations, or the execution of infinite loops.
  2. An error within the “GetImageCharacteristics()” function in magick/image.c can be exploited to crash an affected application via specially crafted e.g. PNG, JPEG, BMP, or TIFF files.

CVEs:

httrack

  • Vulnerable: 3.42-1
  • Unaffected: 3.42_3-1kalgan1

A security issue has been reported in HTTrack, which potentially can be exploited by malicious people to compromise a vulnerable system. The security issue is caused due to a boundary error when processing command line arguments. This can be exploited to cause a buffer overflow by passing overly long URLs to the application.

CVEs:

mono

  • Vulnerable: 1.2.6-3
  • Unaffected: 1.2.6-4kalgan1

Dean Brettle has reported some security issues in Mono, which can be exploited by malicious people to conduct cross-site scripting attacks. The security issues are caused due to Mono’s ASP.net implementation not properly sanitising certain attributes (e.g. “HtmlSelect.Value”, “HtmlSelect.Text”, and the “action” attribute of the “form” element). This can be exploited to execute arbitrary HTML and script code in a user’s browser session in context of an affected site.

openttd

  • Vulnerable: 0.5.3-1
  • Unaffected: 0.6.2-1kalgan1

A vulnerability has been reported in OpenTTD, which potentially can be exploited by malicious people to cause a DoS (Denial of Service) or to compromise a vulnerable system. The vulnerability is caused due to a boundary error within the “TruncateString()” function in src/gfx.cpp. This can be exploited to potentially cause a buffer overflow via a specially crafted string. Successful exploitation may allow execution of arbitrary code.

pidgin

  • Vulnerable: 2.4.3-1kalgan1
  • Unaffected: 2.4.3-1kalgan2

A security issue has been reported in Pidgin, which can be exploited by malicious people to conduct spoofing attacks. The problem is that the certificate presented by e.g. a Jabber server at the beginning of an SSL session is not verified. This can be exploited to spoof valid servers via a man-in-the-middle attack. Successful exploitation requires that Pidgin is configured to use the NSS plugin.

CVEs:

poppler

  • Vulnerable: 0.6.4-1
  • Unaffected: 0.6.4-2kalgan1

A vulnerability has been reported in Poppler, which potentially can be exploited by malicious people to compromise an application using the library. The vulnerability is caused due to the “Page” constructor leaving the “pageWidgets” object uninitialized under specific circumstances. This can be exploited to potentially trigger the “free()” of an arbitrary address when the object is deleted. Successful exploitation may allow execution of arbitrary code via a specially crafted PDF file.

apache

  • Vulnerable: 2.2.8-2kalgan1
  • Unaffected: 2.2.8-2kalgan2

A vulnerability has been reported in Apache, which can be exploited by malicious people to conduct cross-site scripting attacks. Input passed to mod_proxy_ftp via an URL containing a FTP wildcard character (e.g. “*”), is not properly sanitised before being returned to the user. This can be exploited to execute arbitrary HTML and script code in a user’s browser session in context of an affected site.

CVEs: