Frugalware Security Announcements (FSAs)

This is a list of security announcments that have been released for the current stable version of Frugalware

wordpress

  • Author: vmiklos
  • Vulnerable: 2.3.2-1terminus1
  • Unaffected: 2.3.3-1sayshell1

A vulnerability has been reported in WordPress, which can be exploited by malicious users to bypass certain security restrictions and to manipulate data. The xmlrpc.php script does not properly restrict access to the edit functionality. This can be exploited to edit other users’ posts. Successful exploitation requires valid user credentials.

CVEs:

xine-lib

  • Author: vmiklos
  • Vulnerable: 1.1.8-1
  • Unaffected: 1.1.10.1-1sayshell1

A vulnerability has been discovered in xine-lib, which can potentially be exploited by malicious people to compromise a user’s system. The vulnerability is caused due to a boundary error within the “open_flac_file()” function in src/demuxers/demux_flac.c. This can be exploited to corrupt memory via a specially crafted FLAC file.

CVEs:

firefox

  • Author: vmiklos
  • Vulnerable: 2.0.0.11-1sayshell1
  • Unaffected: 2.0.0.12-1sayshell1

Some vulnerabilities and weaknesses have been reported Mozilla Firefox, which can be exploited by malicious people to disclose sensitive information, bypass certain security restrictions, conduct spoofing attacks, or to compromise a user’s system.

  1. Various errors in the browser engine can be exploited to cause a memory corruption.
  2. Various errors in the Javascript engine can be exploited to cause a memory corruption. Successful exploitation of these vulnerabilities may allow execution of arbitrary code.
  3. A security issue is caused due to a design error within the focus handling and can potentially be exploited to trick a user into uploading arbitrary files.
  4. An error in the Javascript engine can be exploited to run Javascript code with “chrome” privileges.
  5. An error in the Javascript engine can be exploited to bypass the same-origin policy via the “XMLDocument.load()” function.
  6. An error exists in the handling of images when a user leaves a page, which uses “designMode” frames. This can be exploited to disclose the user’s navigation history, forward navigation information, and to cause a memory corruption. Successful exploitation of this vulnerability may allow execution of arbitrary code.
  7. A design error related to timer-enabled dialogs can be exploited to trick a user into unintentionally confirming a security dialog.
  8. The problem is that Firefox follows “302” redirects for stylesheets and allows reading the target URL via “element.sheet.href”. This can potentially be exploited to disclose sensitive URL parameters.
  9. An error within the processing of color palettes within bitmaps can be exploited to disclose the contents of memory areas.

CVEs:

seamonkey

  • Author: vmiklos
  • Vulnerable: 1.1.7-1sayshell1
  • Unaffected: 1.1.8-1sayshell1

Some vulnerabilities have been reported in Mozilla SeaMonkey, which can be exploited by malicious people to disclose sensitive information, bypass certain security restrictions, conduct spoofing attacks, or potentially to compromise a vulnerable system. For more information, see FSA373.

CVEs:

kernel

  • Author: vmiklos
  • Vulnerable: 2.6.22-7sayshell5
  • Unaffected: 2.6.22-7sayshell6

A vulnerability have been reported in the Linux Kernel, which can be exploited by malicious, local users to disclose potentially sensitive information or gain escalated privileges. The vulnerability is caused due to certain drivers with registered page fault handlers not correctly preventing size expansions of mapped memory regions beyond the originally allocated size. This can be exploited to gain access to other memory areas via e.g. the “mremap()” system call. Successful exploitation may allow local attackers to disclose and manipulate kernel memory, which potentially can be leveraged to gain escalated privileges.

openldap

  • Author: vmiklos
  • Vulnerable: 2.3.39-1sayshell1
  • Unaffected: 2.3.39-1sayshell2

A vulnerability has been reported in OpenLDAP, which can be exploited by malicious users to cause a DoS (Denial of Service). The vulnerability is caused due to an error within the implementation of modrdn operations. This can be exploited to crash the slapd daemon via a modrdn operation with a NOOP control.

CVEs:

mplayer

  • Author: vmiklos
  • Vulnerable: 1.0rc1-8
  • Unaffected: 1.0rc1-9sayshell1

Some vulnerabilities have been reported in MPlayer, which can be exploited by malicious people to compromise a user’s system.

  1. A boundary error exists within the libmpdemux/demux_audio.c file when parsing FLAC comments. This can be exploited to corrupt memory via a specially crafted FLAC file.
  2. An array indexing error exists within the libmpdemux/demux_mov.c file when parsing MOV file headers. This can be exploited to corrupt heap memory via a specially crafted MOV file.
  3. A boundary error exists within the “url_scape_string()” function in stream/url.c. This can be exploited to cause a buffer overflow via a specially crafted URL.
  4. A boundary error exists within the “cddb_parse_matches_list()” and “cddb_query_parse()” functions in stream/stream_cddb.c. This can be exploited to cause a stack-based buffer overflow via an overly long album title received from a CDDB server. Successful exploitation allows execution of arbitrary code.

CVEs:

flashplugin

  • Author: vmiklos
  • Vulnerable: 9.0.48.0-1
  • Unaffected: 9.0.115.0-1sayshell1

Some vulnerabilities have been reported in Adobe Flash Player, where one vulnerability has an unknown impact and others can be exploited by malicious, local users to gain escalated privileges and by malicious people to bypass certain security restrictions, conduct cross-site scripting and HTTP request splitting attacks, disclose sensitive information, cause a Denial of Service (DoS), or to potentially compromise a user’s system.

  1. An error when parsing specially crafted regular expressions can be exploited to cause a heap-based buffer overflow.

kernel

  • Author: vmiklos
  • Vulnerable: 2.6.22-7sayshell4
  • Unaffected: 2.6.22-7sayshell5

A vulnerability has been reported in the Linux Kernel, which can be exploited by malicious, local users to cause a DoS (Denial of Service), disclose potentially sensitive information, and gain escalated privileges. The vulnerability is caused due to the missing verification of parameters within the “vmsplice_to_user()”, “copy_from_user_mmap_sem()”, and “get_iovec_page_array()” functions in fs/splice.c before using them to perform certain memory operations. This can be exploited to e.g. read or write to arbitrary kernel memory via a specially crafted “vmsplice()” system call. Successful exploitation allows attackers to e.g. gain “root” privileges.

qt4

  • Author: vmiklos
  • Vulnerable: 4.3.1-3
  • Unaffected: 4.3.1-4sayshell1

A vulnerability has been reported in Qt, which can be exploited by malicious people to bypass certain security restrictions. The vulnerability is caused due to an error within the certificate validation in QSslSocket, which can be exploited to e.g. trick an application using QSslSocket into accepting spoofed certificates.

CVEs: