Frugalware Security Announcements (FSAs)

This is a list of security announcments that have been released for the current stable version of Frugalware

clamav

  • Vulnerable: 0.92.1-1
  • Unaffected: 0.93-1kalgan1

Some vulnerabilities have been reported in ClamAV, which can be exploited by malicious people to bypass certain security restrictions, to cause a DoS (Denial of Service), or to compromise a vulnerable system.

  1. A boundary error exists within the “cli_scanpe()” function in libclamav/pe.c. This can be exploited to cause a heap-based buffer overflow via a specially crafted “Upack” executable. Successful exploitation allows execution of arbitrary code.
  2. A boundary error within the processing of PeSpin packed executables in libclamav/spin.c can be exploited to cause a heap-based buffer overflow. Successful exploitation may allow execution of arbitrary code.
  3. An unspecified error in the processing of ARJ files can be exploited to hang ClamAV.
  4. A boundary error within the processing of WWPack packed PE files in libclamav/pe.c can be exploited to cause a heap corruption. Successful exploitation may allow execution of arbitrary code.
  5. An error in the processing of RAR files can be exploited to bypass the scanning mechanism via a RAR file containing an invalid version number.
  6. An error exists within the “rfc2231()” function in message.c. This can be exploited to trigger the return of strings that are not NULL terminated and cause a crash.
  7. An error in libclamunrar can be exploited to crash the application via specially crafted RAR files.

CVEs:

cups

  • Vulnerable: 1.3.6-2kalgan1
  • Unaffected: 1.3.6-2kalgan2

Thomas Pollet has reported a vulnerability in CUPS, which potentially can be exploited by malicious people to compromise a vulnerable system. The vulnerability is caused due to two integer overflow errors in filter/image-png.c when processing PNG files. These can be exploited to cause a heap-based buffer overflow via overly large width and height PNG fields. Successful exploitation may allow execution of arbitrary code.

CVEs:

firefox

  • Vulnerable: 2.0.0.13-1kalgan1
  • Unaffected: 2.0.0.14-1kalgan1

A vulnerability has been reported in Mozilla Firefox, which can potentially be exploited by malicious people to compromise a user’s system. The vulnerability is caused due to an error in the Javascript Garbage Collector and can be exploited to cause a memory corruption via specially crafted Javascript code. Successful exploitation may allow execution of arbitrary code.

CVEs:

libpng

  • Vulnerable: 1.2.24-1
  • Unaffected: 1.2.24-2kalgan1

Tavis Ormandy has reported a vulnerability in libpng, which can be exploited by malicious people to cause a DoS (Denial of Service), disclose potentially sensitive information, or potentially compromise an application using the library. The vulnerability is caused due to the improper handling of PNG chunks unknown to the library. This can be exploited to trigger the use of uninitialized memory in e.g. a “free()” call via unknown PNG chunks having a length of zero. Successful exploitation may allow execution of arbitrary code, but requires that the application calls the “png_set_read_user_chunk_fn()” function or the “png_set_keep_unknown_chunks()” function under specific conditions.

mailman

  • Vulnerable: 2.1.9-2
  • Unaffected: 2.1.9-3kalgan1

A vulnerability has been reported in Mailman, which can be exploited by malicious users to conduct script insertion attacks. Certain input when editing the list templates and the list info attribute is not properly sanitised before being stored. This can be exploited to insert arbitrary HTML and script code, which is executed in a user’s browser session in context of an affected site when the malicious website is accessed. Successful exploitation requires list administrator privileges.

openssh

  • Vulnerable: 4.7p1-4kalgan1
  • Unaffected: 4.7p1-4kalgan2

A weakness has been reported in OpenSSH, which can be exploited by malicious, local users to bypass certain security restrictions. The weakness is caused due to the improper implementation of the “ForceCommand” directive. This can be exploited to execute arbitrary commands via the ~/.ssh/rc file even if a “ForceCommand” directive is in effect.

CVEs:

phpmyadmin

  • Vulnerable: 2.11.5.1-1kalgan1
  • Unaffected: 2.11.5.2-1kalgan1

A vulnerability has been reported in phpMyAdmin, which can be exploited by malicious users to disclose sensitive information. The vulnerability is caused due to an unspecified error and can be exploited to disclose arbitrary files via a specially crafted HTTP POST request. Successful exploitation requires a certain level of access e.g. on a shared host.

CVEs:

speex

  • Vulnerable: 1.2beta3-1
  • Unaffected: 1.2beta3-2kalgan1

The reference speex decoder from the Speex library is performing insufficient boundary checks on a header structure read from user input. A user controlled field in the header structure is used to build a function pointer. The reference speex decoder does not check for negative values for the field, allowing the function pointer to be pointed at an arbitary position in memory. This allows remote code execution.