what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

Secunia Security Advisory 33849

Secunia Security Advisory 33849
Posted Feb 18, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - SUSE has issued an update for multiple packages. This fixes some security issues and some vulnerabilities, which can be exploited by malicious, local users to gain escalated privileges and bypass certain security restrictions, malicious users to cause a DoS (Denial of Service) and potentially compromise a vulnerable system, and by malicious people to disclose sensitive information, conduct session fixation attacks, cross-site scripting and request forgery attacks, bypass certain security restrictions, cause a DoS, and potentially compromise a vulnerable system.

tags | advisory, denial of service, local, vulnerability, xss
systems | linux, suse
SHA-256 | 3aac417cacad07dc406ccb7d1319d6c546f163f3e3e47021d2a1975457112c13

Secunia Security Advisory 33849

Change Mirror Download
----------------------------------------------------------------------

Did you know that a change in our assessment rating, exploit code
availability, or if an updated patch is released by the vendor, is
not part of this mailing-list?

Click here to learn more:
https://secunia.com/advisories/business_solutions/

----------------------------------------------------------------------

TITLE:
SUSE Update for Multiple Packages

SECUNIA ADVISORY ID:
SA33849

VERIFY ADVISORY:
https://secunia.com/advisories/33849/

DESCRIPTION:
SUSE has issued an update for multiple packages. This fixes some
security issues and some vulnerabilities, which can be exploited by
malicious, local users to gain escalated privileges and bypass
certain security restrictions, malicious users to cause a DoS (Denial
of Service) and potentially compromise a vulnerable system, and by
malicious people to disclose sensitive information, conduct session
fixation attacks, cross-site scripting and request forgery attacks,
bypass certain security restrictions, cause a DoS, and potentially
compromise a vulnerable system.

For more information:
SA33014
SA31330
SA31450
SA31478
SA31502
SA31567
SA32164
SA32851
SA32964
SA33133
SA33198
SA33227
SA33356
SA33795

A vulnerability is caused due to an incorrect backport of the patch
for CVE-2008-3663, resulting in an error within the handling of
sessions, which can be exploited to hijack a user's session.

This is related to:
SA33517

A vulnerability is caused due to the reintroduction of
CVE-2005-0448.

For more information:
SA14531

SOLUTION:
Apply updated packages using YaST Online Update or the SUSE FTP
server.

ORIGINAL ADVISORY:
SUSE-SR:2009:004:
https://lists.opensuse.org/opensuse-security-announce/2009-02/msg00002.html

OTHER REFERENCES:
SA14531:
https://secunia.com/advisories/14531/

SA33014:
https://secunia.com/advisories/33014/

SA31330:
https://secunia.com/advisories/31330/

SA31450:
https://secunia.com/advisories/31450/

SA31478:
https://secunia.com/advisories/31478/

SA31502:
https://secunia.com/advisories/31502/

SA31567:
https://secunia.com/advisories/31567/

SA32164:
https://secunia.com/advisories/32164/

SA32851:
https://secunia.com/advisories/32851/

SA32964:
https://secunia.com/advisories/32964/

SA33133:
https://secunia.com/advisories/33133/

SA33198:
https://secunia.com/advisories/33198/

SA33227:
https://secunia.com/advisories/33227/

SA33356:
https://secunia.com/advisories/33356/

SA33517:
https://secunia.com/advisories/33517/

SA33795:
https://secunia.com/advisories/33795/

----------------------------------------------------------------------

About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.

Subscribe:
https://secunia.com/advisories/secunia_security_advisories/

Definitions: (Criticality, Where etc.)
https://secunia.com/advisories/about_secunia_advisories/


Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.

----------------------------------------------------------------------

Login or Register to add favorites

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    0 Files
  • 12
    Nov 12th
    0 Files
  • 13
    Nov 13th
    0 Files
  • 14
    Nov 14th
    0 Files
  • 15
    Nov 15th
    0 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close