Frugalware Security Announcements (FSAs)

This is a list of security announcments that have been released for the current stable version of Frugalware

tetex

  • Author: voroskoi
  • Vulnerable: 3.0-10
  • Unaffected: 3.0-11terminus1

A vulnerability has been reported in teTeX, which potentially can be exploited by malicious people to compromise a user’s system. The vulnerability is caused due to the use of vulnerable Xpdf code.

CVEs:

apache

  • Author: voroskoi
  • Vulnerable: 2.2.4-2terminus1
  • Unaffected: 2.2.4-2terminus2

A vulnerability has been reported in the Apache mod_proxy module, which can be exploited by malicious people to cause a DoS (Denial of Service). The vulnerability is caused due to the improper handling of date headers within the “ap_proxy_date_canon()” function in proxy_util.c. This can be exploited to cause a DoS by sending specially crafted requests to the affected server. Successful exploitation results in a crash if a threaded Multi-Processing Module is used on servers where a reverse or forward proxy is configured.

asterisk

  • Author: voroskoi
  • Vulnerable: 1.4.8-1terminus1
  • Unaffected: 1.4.11-1terminus1

Three vulnerabilities has been reported in Asterisk, which can be exploited by malicious people to cause a DoS (Denial of Service).

  1. The vulnerability is caused due to the IAX2 Channel Driver improperly processing “NEW” packets. This can be exploited to allocate resources that are never freed by sending multiple “NEW” packets for valid extensions to the server. Successful exploitation results in a DoS, but requires that the IAX2 Channel Driver is configured to allow unauthenticated calls.
  2. The vulnerability is caused due to the Skinny channel driver (chan_skinny) improperly processing packets. This can be exploited to crash the application by sending a “CAPABILITIES_RES_MESSAGE” packet with the capabilities count greater than the total number of items in the “capabilities_res_message” array.
  3. The vulnerability is caused due to the SIP Dialog History of SIP channel driver (chan_sip) recording all history items (88 bytes per item) in memory. This can be exploited to cause a DoS due to memory exhaustion by causing a high amount of logged items.

CVEs:

id3lib

  • Author: voroskoi
  • Vulnerable: 3.8.3-3
  • Unaffected: 3.8.3-4terminus1

Nikolaus Schulz has reported a security issue in id3lib, which can be exploited by malicious, local users to gain escalated privileges. The security issue is caused due to the “RenderV2ToFile()” function in src/tag_file.cpp handling temporary files in an insecure manner. This can be exploited to execute arbitrary commands with escalated privileges (usually root user).

CVEs:

kdebase

  • Author: voroskoi
  • Vulnerable: 3.5.6-2
  • Unaffected: 3.5.6-3terminus1

Robert Swiecki has discovered a vulnerability in Konqueror, which can be exploited by malicious people to conduct spoofing attacks. The vulnerability is caused due to an error when processing the “setInterval()” function and can be exploited to display arbitrary content while showing the URL of a trusted web site in the address bar. The vulnerability is caused due to an error in the handling of the “data:” URI scheme. This can be exploited to display arbitrary content while showing the URL of a trusted web site in the address bar when a user follows a specially crafted link.

kdelibs

  • Author: voroskoi
  • Vulnerable: 3.5.6-3
  • Unaffected: 3.5.6-4terminus1

Robert Swiecki has discovered a vulnerability in Konqueror, which can be exploited by malicious people to conduct spoofing attacks. The vulnerability is caused due to an error when processing the “setInterval()” function and can be exploited to display arbitrary content while showing the URL of a trusted web site in the address bar. The vulnerability is caused due to an error in the handling of the “data:” URI scheme. This can be exploited to display arbitrary content while showing the URL of a trusted web site in the address bar when a user follows a specially crafted link.

opera

  • Author: voroskoi
  • Vulnerable: 9.22-1terminus1
  • Unaffected: 9.23-1terminus1

A vulnerability has been reported in Opera, which potentially can be exploited by malicious people to compromise a user’s system. The vulnerability is caused due to an unspecified error when processing JavaScript code and can result in a virtual function call using an invalid pointer. This can be exploited to execute arbitrary code by e.g. tricking a user into visiting a malicious website.

CVEs:

php

  • Author: voroskoi
  • Vulnerable: 5.2.3-1terminus2
  • Unaffected: 5.2.3-1terminus3

shinnai has discovered a vulnerability in PHP, which can be exploited by malicious, local users to bypass certain security restrictions. The vulnerability is caused due to an error in the handling of an uninitialized structure inside the “glob()” function. This can be exploited to execute arbitrary code, which may lead to security restrictions (e.g. the “disable_functions” directive) being bypassed.

CVEs:

po4a

  • Author: voroskoi
  • Vulnerable: 0.30-1
  • Unaffected: 0.30-2terminus1

A security issue has been reported in po4a, which can be exploited by malicious, local users to perform certain actions with escalated privileges. The security issue is caused due to the “gettextize()” function in lib/Locale/Po4a/Po.pm creating the file “/tmp/gettextization.failed.po” in an insecure manner. This can be exploited via symlink attacks to e.g. overwrite arbitrary files with the permissions of the user running the po4a-gettextize tool.