Advisories
Research
Forums
Create Profile
Our Commitment
Database
Search
Advisories by Product
Advisories by Vendor
Terminology
Report Vulnerability
Insecure Library Loading

Vulnerability Report: Debian GNU/Linux 2.x

This vulnerability report for Debian GNU/Linux 2.x contains a complete overview of all Secunia advisories affecting it. You can use this vulnerability report to ensure that you are aware of all vulnerabilities, both patched and unpatched, affecting this product allowing you to take the necessary precautions.

If you have information about a new or an existing vulnerability in Debian GNU/Linux 2.x then you are more than welcome to contact us.


Table of Contents

1. Product Summary Only

2. Secunia Advisory Statistics (All time)
2.1. Statistics for 2014
2.2. Statistics for 2013
2.3. Statistics for 2012
2.4. Statistics for 2011
2.5. Statistics for 2010
2.6. Statistics for 2009
2.7. Statistics for 2008
2.8. Statistics for 2007
2.9. Statistics for 2006
2.10. Statistics for 2005
2.11. Statistics for 2004
2.12. Statistics for 2003

3. List of Secunia Advisories (All time)
3.1. List for 2014
3.2. List for 2013
3.3. List for 2012
3.4. List for 2011
3.5. List for 2010
3.6. List for 2009
3.7. List for 2008
3.8. List for 2007
3.9. List for 2006
3.10. List for 2005
3.11. List for 2004
3.12. List for 2003

4. Send Feedback
 
Vendor, Links, and Unpatched Vulnerabilities

Vendor Debian

Product Link View Here (Link to external site)

Affected By 91 Secunia advisories
1 Vulnerabilities

Monitor Product Receive alerts for this product





91 Secunia Advisories in 2003-2014

Secunia has issued a total of 91 Secunia advisories in 2003-2014 for Debian GNU/Linux 2.x. Currently, 1% (1 out of 91) are marked as unpatched with the most severe being rated Less critical

More information about the specific Secunia advisories affecting Debian GNU/Linux 2.x can be found below. Each Secunia advisory is enclosed by a box highlighted with a color representing its current patch status. You can read the complete Secunia advisories for thorough descriptions of the issues covered and for solution suggestions by clicking either the Secunia advisory title or the "Read More" links available for each Secunia advisory.



Debian "apt-setup" Insecure File Permission Security Issue
Unpatched. Secunia Advisory 1 of 1 in 2005. 10,924 views.
Release Date:
2005-07-07
Secunia Advisory ID:
SA15955
Solution Status:
Unpatched
Criticality:
Impact:
Exposure of sensitive information
Where:
Local system
Short Description:
Alexander Mader has reported a security issue in Debian apt-setup, which can be exploited by malicious, local users to gain knowledge of sensitive information. [Read More]


nfs-utils "xlog()" Buffer Overflow Vulnerability
Vendor Patch. Secunia Advisory 1 of 54 in 2003. 16,759 views.
Release Date:
2003-07-14
Secunia Advisory ID:
SA9259
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From local network
Short Description:
A vulnerability has been reported in nfs-utils, which potentially can be exploited by malicious people to compromise a vulnerable system. [Read More]


XBlockOut Multiple Privilege Escalation Vulnerabilities
Vendor Patch. Secunia Advisory 2 of 54 in 2003. 9,302 views.
Release Date:
2003-06-20
Secunia Advisory ID:
SA9082
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
Debian has reported several vulnerabilities in XBlockOut (xbl), which can be exploited by malicious, local users to escalate their privileges on a vulnerable system. [Read More]


Debian update for jnethack
Vendor Patch. Secunia Advisory 3 of 54 in 2003. 8,770 views.
Release Date:
2003-06-18
Secunia Advisory ID:
SA9062
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
Debian has issued updated packages for jnethack. These fix two vulnerabilities, which can be exploited by a malicious, local user to escalate privileges on a vulnerable system. [Read More]


Linux-PAM User Name Spoofing Vulnerability
Vendor Patch. Secunia Advisory 4 of 54 in 2003. 16,158 views.
Release Date:
2003-06-17
Secunia Advisory ID:
SA9057
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
A vulnerability has been identified in Linux-PAM, which allows malicious, local users to escalate their privileges. [Read More]


Debian update for typespeed
Vendor Patch. Secunia Advisory 5 of 54 in 2003. 9,765 views.
Release Date:
2003-06-17
Secunia Advisory ID:
SA9052
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Debian has issued updated packages for typespeed. These fix a vulnerability, which potentially may be exploited by malicious people to compromise a user's system. [Read More]


Debian update for noweb
Vendor Patch. Secunia Advisory 6 of 54 in 2003. 9,314 views.
Release Date:
2003-06-17
Secunia Advisory ID:
SA9046
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
Debian has issued updated packages for noweb. These fix a vulnerability, which can be exploited by a malicious, local user to escalate privileges on a vulnerable system. [Read More]


Debian update for mikmod
Vendor Patch. Secunia Advisory 7 of 54 in 2003. 9,828 views.
Release Date:
2003-06-16
Secunia Advisory ID:
SA9040
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Debian has issued updated packages for mikmod. These fix a vulnerability, which potentially could be exploited by malicious people to compromise a user's system. [Read More]


Debian update for cupsys
Vendor Patch. Secunia Advisory 8 of 54 in 2003. 8,573 views.
Release Date:
2003-06-12
Secunia Advisory ID:
SA9006
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From local network
Short Description:
Debian has issued updated packages for cupsys. These fix a vulnerability, which can be exploited by a malicious user to cause a DoS (Denial of Service) on a print server. [Read More]


Debian update for nethack
Vendor Patch. Secunia Advisory 9 of 54 in 2003. 8,477 views.
Release Date:
2003-06-12
Secunia Advisory ID:
SA9004
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
Debian has issued updated packages for nethack. These fix two vulnerabilities, which can be exploited by a malicious, local user to escalate privileges on a vulnerable system. [Read More]


Debian update for slashem
Vendor Patch. Secunia Advisory 10 of 54 in 2003. 8,836 views.
Release Date:
2003-06-12
Secunia Advisory ID:
SA9002
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
Debian has issued updated packages for slashem. These fix a vulnerability, which can be exploited by malicious, local users to escalate their privileges on a vulnerable system: [Read More]


Debian update for gzip
Vendor Patch. Secunia Advisory 11 of 54 in 2003. 9,576 views.
Release Date:
2003-06-11
Secunia Advisory ID:
SA8990
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
A vulnerability has been identified in znew allowing malicious, local users escalate privileges. [Read More]


Debian update for xaos
Vendor Patch. Secunia Advisory 12 of 54 in 2003. 8,278 views.
Release Date:
2003-06-09
Secunia Advisory ID:
SA8975
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
Debian has released updated packages for xaos. These fix a vulnerability, which can be exploited by malicious, local users to escalate their privileges on a vulnerable system. [Read More]


Debian update for ircii-pana
Vendor Patch. Secunia Advisory 13 of 54 in 2003. 8,718 views.
Release Date:
2003-05-20
Secunia Advisory ID:
SA8806
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Debian has released updated packages for ircii-pana. These fix multiple vulnerabilities, which can be exploited by malicious people to compromise a user's system. [Read More]


Debian update for sendmail
Vendor Patch. Secunia Advisory 14 of 54 in 2003. 8,818 views.
Release Date:
2003-05-16
Secunia Advisory ID:
SA8797
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
Debian has issued an update for sendmail to fix a privilege escalation vulnerability. [Read More]


Debian update for MySQL
Vendor Patch. Secunia Advisory 15 of 54 in 2003. 7,972 views.
Release Date:
2003-05-16
Secunia Advisory ID:
SA8796
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Privilege escalation
Where:
From remote
Short Description:
Debian has issued updated packages for MySQL, which fix two vulnerabilities. [Read More]


Debian update for lv
Vendor Patch. Secunia Advisory 16 of 54 in 2003. 8,672 views.
Release Date:
2003-05-16
Secunia Advisory ID:
SA8795
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
Debian has issued an update for lv to fix a privilege escalation vulnerability. [Read More]


Debian update for epic4
Vendor Patch. Secunia Advisory 17 of 54 in 2003. 7,251 views.
Release Date:
2003-05-02
Secunia Advisory ID:
SA8713
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Debian has released updated packages for epic4. These fix a vulnerability, which can be exploited by malicious people to compromise a user's system. [Read More]


Debian update for pptpd
Vendor Patch. Secunia Advisory 18 of 54 in 2003. 8,113 views.
Release Date:
2003-04-30
Secunia Advisory ID:
SA8695
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Debian has issued updated packages for pptpd. These fix a vulnerability, which can be exploited by malicious people to compromise a vulnerable system. [Read More]


Debian two vulnerabilities in mime-support
Vendor Patch. Secunia Advisory 19 of 54 in 2003. 8,149 views.
Release Date:
2003-04-23
Secunia Advisory ID:
SA8641
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
Debian has issued updated packages for mime-support. These fix two vulnerabilities, which can be exploited by malicious, local users to escalate their privileges. [Read More]


Debian update for ircii
Vendor Patch. Secunia Advisory 20 of 54 in 2003. 7,814 views.
Release Date:
2003-04-22
Secunia Advisory ID:
SA8634
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Debian has released updated packages for ircii. These fix a vulnerability, which can be exploited by malicious people to compromise a user's system running a vulnerable IRC-client. [Read More]


Xinetd Connection Reject Memory Leak
Vendor Patch. Secunia Advisory 21 of 54 in 2003. 13,037 views.
Release Date:
2003-04-22
Secunia Advisory ID:
SA8632
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
A vulnerability has been identified in Xinetd, which can be exploited by malicious people to cause a DoS (Denial of Service) on a vulnerable system. [Read More]


Debian update for rinetd
Vendor Patch. Secunia Advisory 22 of 54 in 2003. 7,506 views.
Release Date:
2003-04-18
Secunia Advisory ID:
SA8620
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
DoS
Where:
From remote
Short Description:
Debian has issued updated packages for rinetd. These fix a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service) on a vulnerable system and potentially compromise it. [Read More]


Debian update for sendmail-wide
Vendor Patch. Secunia Advisory 23 of 54 in 2003. 8,215 views.
Release Date:
2003-04-17
Secunia Advisory ID:
SA8616
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
DoS
Where:
From remote
Short Description:
Debian has issued updated packages for sendmail-wide. These fix a vulnerability in the address parsing, which potentially can be exploited to compromise a vulnerable mail server. [Read More]


Debian update for OpenSSL
Vendor Patch. Secunia Advisory 24 of 54 in 2003. 8,800 views.
Release Date:
2003-04-17
Secunia Advisory ID:
SA8613
Solution Status:
Vendor Patch
Criticality:
Impact:
Exposure of sensitive information
Where:
From remote
Short Description:
Debian has issued updated packages for openssl. These fix two information disclosure vulnerabilities, which can be exploited by malicious people to gain knowledge of the pre-master secret or server's private key. [Read More]


Debian update for EPIC
Vendor Patch. Secunia Advisory 25 of 54 in 2003. 7,343 views.
Release Date:
2003-04-15
Secunia Advisory ID:
SA8597
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
DoS
Where:
From remote
Short Description:
Debian has issued updated packages for epic. These fix a vulnerability, which can be exploited by a malicious server to compromise a user's system. [Read More]


Debian update for glibc
Vendor Patch. Secunia Advisory 26 of 54 in 2003. 7,548 views.
Release Date:
2003-04-09
Secunia Advisory ID:
SA8558
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Debian has issued updated packages for glibc. A vulnerability has been discovered allowing malicious users to cause an integer overflow. This could lead to a Denial of Service and possibly also execution of arbitrary code. [Read More]


Debian update for xftp
Vendor Patch. Secunia Advisory 27 of 54 in 2003. 7,404 views.
Release Date:
2003-04-08
Secunia Advisory ID:
SA8548
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Debian has issued updated packages for xftp. These fix a vulnerability, which potentially allows malicious people to compromise a user's system. [Read More]


Debian update for samba
Vendor Patch. Secunia Advisory 28 of 54 in 2003. 6,132 views.
Release Date:
2003-04-08
Secunia Advisory ID:
SA8538
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From local network
Short Description:
Debian has issued updated packages for samba. These fix some unspecified potential buffer overflow vulnerabilities as well as a vulnerability, which can be exploited by anonymous users to gain root privileges on a vulnerable system. [Read More]


Samba exploitable buffer overflow
Vendor Patch. Secunia Advisory 29 of 54 in 2003. 17,839 views.
Release Date:
2003-04-07
Secunia Advisory ID:
SA8533
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From local network
Short Description:
Samba is vulnerable to a buffer overflow, which can be exploited by anonymous users. [Read More]


Debian Metrics Insecure Temporary File Handling
Vendor Patch. Secunia Advisory 30 of 54 in 2003. 6,961 views.
Release Date:
2003-04-07
Secunia Advisory ID:
SA8531
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
Debian reports that a vulnerability has been discovered in the metrics package, which can be exploited by malicious, local users to escalate their privileges on the system. [Read More]


Debian update for sendmail
Vendor Patch. Secunia Advisory 31 of 54 in 2003. 7,794 views.
Release Date:
2003-04-04
Secunia Advisory ID:
SA8517
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Debian has issued updated packages for sendmail. These fix a vulnerability in the address parsing, which potentially can be exploited to compromise a vulnerable mail server. [Read More]


Sendmail Address Parsing Buffer Overflow
Vendor Patch. Secunia Advisory 32 of 54 in 2003. 20,896 views.
Release Date:
2003-03-30
Secunia Advisory ID:
SA8446
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
A vulnerability has been discovered in Sendmail, which can be exploited by malicious people to compromise a vulnerable system. [Read More]


Debian mutt IMAP Buffer Overflow
Vendor Patch. Secunia Advisory 33 of 54 in 2003. 7,468 views.
Release Date:
2003-03-29
Secunia Advisory ID:
SA8444
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Debian reports that a vulnerability has been discovered in "mutt", which can be exploited by malicious people to cause a DoS (Denial of Service) on a vulnerable system or potentially compromise it. [Read More]


Debian update for krb4
Vendor Patch. Secunia Advisory 34 of 54 in 2003. 5,764 views.
Release Date:
2003-03-28
Secunia Advisory ID:
SA8440
Solution Status:
Vendor Patch
Criticality:
Impact:
Spoofing
Exposure of system information
Security Bypass
Where:
From remote
Short Description:
Debian has issued updated packages for Kerberos to address a cryptographic weakness. [Read More]


Debian update for listar/ecartis
Vendor Patch. Secunia Advisory 35 of 54 in 2003. 7,446 views.
Release Date:
2003-03-27
Secunia Advisory ID:
SA8430
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Where:
From remote
Short Description:
Debian has released updated packages for listar/ecartis. These fix a vulnerability, which can be exploited by malicious people to reset other users' passwords. [Read More]


Debian update for lpr
Vendor Patch. Secunia Advisory 36 of 54 in 2003. 7,810 views.
Release Date:
2003-03-24
Secunia Advisory ID:
SA8398
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
Debian has issued updated packages for lpr. These fix a vulnerability, which can be exploited by malicious, local users to escalate their privileges to root on a vulnerable system. [Read More]


Multiple Vendor RPC XDR Library Integer Overflow
Vendor Patch. Secunia Advisory 37 of 54 in 2003. 15,767 views.
Release Date:
2003-03-20
Secunia Advisory ID:
SA8347
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From local network
Short Description:
A vulnerability identified in multiple *NIX operating systems and software can be exploited by malicious people to conduct a DoS attack (Denial of Service) on a vulnerable system or potentially compromise it. [Read More]


Samba Packet Fragment Re-assembly Buffer Overflow
Vendor Patch. Secunia Advisory 38 of 54 in 2003. 17,921 views.
Release Date:
2003-03-17
Secunia Advisory ID:
SA8299
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From local network
Short Description:
A vulnerability has been identified in Samba, which can be exploited by a malicious person to compromise a vulnerable server. [Read More]


Debian updates for file
Vendor Patch. Secunia Advisory 39 of 54 in 2003. 5,904 views.
Release Date:
2003-03-13
Secunia Advisory ID:
SA8291
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
Debian has released updates for the utility "file". These fix a vulnerability exploitable by malicious, local users to escalate their privileges. [Read More]


File utility possible privilege escalation
Vendor Patch. Secunia Advisory 40 of 54 in 2003. 9,621 views.
Release Date:
2003-03-05
Secunia Advisory ID:
SA8224
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
A boundary error identified in the utility "file" included in many *nix distributions can potentially be exploited by malicious users to escalate their privileges. [Read More]


Debian updates for sendmail-wide
Vendor Patch. Secunia Advisory 41 of 54 in 2003. 6,402 views.
Release Date:
2003-03-05
Secunia Advisory ID:
SA8212
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Debian has issued updates for sendmail-wide. Sendmail has been found vulnerable to an issue that could lead to remote root compromise. The problem is with parsing of certain headers. [Read More]


Debian updates for sendmail
Vendor Patch. Secunia Advisory 42 of 54 in 2003. 6,524 views.
Release Date:
2003-03-04
Secunia Advisory ID:
SA8210
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Debian has issued updates for sendmail. Sendmail has been found vulnerable to an issue that could lead to remote root compromise. The problem is with parsing of certain headers. [Read More]


Debian updates for tcpdump
Vendor Patch. Secunia Advisory 43 of 54 in 2003. 6,344 views.
Release Date:
2003-02-28
Secunia Advisory ID:
SA8176
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Debian has issued updates for tcpdump to fix a Denial of Service vulnerability in the handling of ISAKMP packets. [Read More]


Debian update for traceroute-nanog
Vendor Patch. Secunia Advisory 44 of 54 in 2003. 6,227 views.
Release Date:
2003-02-27
Secunia Advisory ID:
SA8172
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
System access
Where:
From remote
Short Description:
Debian has issued an update for traceroute-nanog. This fixes multiple older issues, which potentially can be exploited to gain escalated privileges or compromise a user's system. [Read More]


Debian updates for openssl
Vendor Patch. Secunia Advisory 45 of 54 in 2003. 6,373 views.
Release Date:
2003-02-24
Secunia Advisory ID:
SA8135
Solution Status:
Vendor Patch
Criticality:
Impact:
Exposure of sensitive information
Where:
From remote
Short Description:
Debian has released updated packages for openssl. These eliminate an information disclosure vulnerability, which can be exploited by malicious people to gain knowledge of a used plaintext block in a SSL/TLS session. [Read More]


Debian updates to hypermail
Vendor Patch. Secunia Advisory 46 of 54 in 2003. 7,321 views.
Release Date:
2003-02-11
Secunia Advisory ID:
SA8030
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Debian has issued updates to fix a buffer overflow in hypermail. The buffer overflow can be exploited by returning a large DNS response or supplying a long file name. [Read More]


Debian updates to CVS
Vendor Patch. Secunia Advisory 47 of 54 in 2003. 5,695 views.
Release Date:
2003-01-21
Secunia Advisory ID:
SA7916
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Debian has issued updates to fix the double-free vulnerability in CVS, allowing anonymous remote users to execute arbitrary code. [Read More]


Debian updates to cupsys
Vendor Patch. Secunia Advisory 48 of 54 in 2003. 6,953 views.
Release Date:
2003-01-20
Secunia Advisory ID:
SA7907
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Debian has issued updates to CUPS to fix multiple vulnerabilities. [Read More]


Debian updates to IMP
Vendor Patch. Secunia Advisory 49 of 54 in 2003. 6,188 views.
Release Date:
2003-01-15
Secunia Advisory ID:
SA7874
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Where:
From remote
Short Description:
Debian has issued updates to IMP, IMP does not verify input correctly this allows SQL injcetion. [Read More]


Debian updates to xpdf-i
Vendor Patch. Secunia Advisory 50 of 54 in 2003. 6,128 views.
Release Date:
2003-01-10
Secunia Advisory ID:
SA7847
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Debian has issued updates to xpdf-i to fix an integer overflow. [Read More]


Debian updates to Canna Japanese character server
Vendor Patch. Secunia Advisory 51 of 54 in 2003. 6,045 views.
Release Date:
2003-01-09
Secunia Advisory ID:
SA7835
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Privilege escalation
Exposure of sensitive information
Where:
From remote
Short Description:
Debian has issued updates to Canna. Canna suffers a buffer overflow which may be exploited from remote to cause a Denial of Service or leak information, by local users it can be exploited to gain privileges. [Read More]


Debian updates to xpdf
Vendor Patch. Secunia Advisory 52 of 54 in 2003. 6,270 views.
Release Date:
2003-01-08
Secunia Advisory ID:
SA7827
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Debian has issued updates to xpdf to fix an integer overflow. [Read More]


Debian updates to mhonarc
Vendor Patch. Secunia Advisory 53 of 54 in 2003. 6,018 views.
Release Date:
2003-01-03
Secunia Advisory ID:
SA7810
Solution Status:
Vendor Patch
Criticality:
Impact:
Cross Site Scripting
Where:
From remote
Short Description:
Debian has issued updates mhonarc. mhonarc is vulnerable to Cross Site Scripting, it is possible to craft a mail message which can bypass mhonarcs script filter. [Read More]


Debian updates to dhcpcd
Vendor Patch. Secunia Advisory 54 of 54 in 2003. 5,833 views.
Release Date:
2003-01-02
Secunia Advisory ID:
SA7796
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From local network
Short Description:
Debian has issued updated packages to dhcpcd. [Read More]


Debian updates to typespeed
Vendor Patch. Secunia Advisory 1 of 36 in 2002. 5,862 views.
Release Date:
2002-12-28
Secunia Advisory ID:
SA7786
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
Debian has issued updates to typespeed. typespeed runs setgid 'games', a buffer overflow allows users to run arbtirary code as group games. [Read More]


Debian updates to fetchmail
Vendor Patch. Secunia Advisory 2 of 36 in 2002. 6,203 views.
Release Date:
2002-12-24
Secunia Advisory ID:
SA7782
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Debian has issued updates to fetchmail, to fix a remotely expoitable heap overflow. [Read More]


Debian updates to cyrus imapd
Vendor Patch. Secunia Advisory 3 of 36 in 2002. 6,559 views.
Release Date:
2002-12-23
Secunia Advisory ID:
SA7774
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Debian has issued updates to cyrus imapd, a buffer overflow has been identified which can be exploited from remote to run arbitrary code. This problem exists prior to login. Also a buffer overflow in the SASL library has been fixed. [Read More]


Debian updates to libpng
Vendor Patch. Secunia Advisory 4 of 36 in 2002. 6,586 views.
Release Date:
2002-12-20
Secunia Advisory ID:
SA7754
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Debian has issued an update for libpng. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a vulnerable system. [Read More]


Linux Kernel 2.2 local Denial of Service
Vendor Patch. Secunia Advisory 5 of 36 in 2002. 9,438 views.
Release Date:
2002-12-18
Secunia Advisory ID:
SA7746
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
Local system
Short Description:
Linux Kernel 2.2 has been found vulnerable to a Denial of Service condition. It is possible for local users to read the memory used by certain programs by using "/proc/pid/mem" and "mmap()". [Read More]


Debian updates to mysql
Vendor Patch. Secunia Advisory 6 of 36 in 2002. 5,596 views.
Release Date:
2002-12-17
Secunia Advisory ID:
SA7733
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Privilege escalation
Where:
From remote
Short Description:
Debian has issued updates to address a Denial of Service and a privilege escalation vulnerability. [Read More]


Debian updates to mICQ
Vendor Patch. Secunia Advisory 7 of 36 in 2002. 5,882 views.
Release Date:
2002-12-16
Secunia Advisory ID:
SA7714
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Debian has issued updates to mICQ to fix a Denial of Service vulnerability. mICQ crashes when it receives certain types of ICQ messages types which do not contain the 0xFE seperator. [Read More]


Debian updates to lynx
Vendor Patch. Secunia Advisory 8 of 36 in 2002. 5,929 views.
Release Date:
2002-12-13
Secunia Advisory ID:
SA7707
Solution Status:
Vendor Patch
Criticality:
Impact:
Manipulation of data
Where:
Local system
Short Description:
Debian has issued updated packages to fix a vulnerability in lynx. [Read More]


Debian updates to wget
Vendor Patch. Secunia Advisory 9 of 36 in 2002. 6,703 views.
Release Date:
2002-12-13
Secunia Advisory ID:
SA7706
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Debian has issued updates to wget, which is used to retrieve files from remote web and ftp sites. [Read More]


Debian updates to Perl
Vendor Patch. Secunia Advisory 10 of 36 in 2002. 5,521 views.
Release Date:
2002-12-12
Secunia Advisory ID:
SA7704
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Where:
Local system
Short Description:
Debian has issued updates to Perl. Perl suffers a vulnerability in the Safe.pm module, Safe.pm provides safe compartments to evaluate perl code in, however if a safe compartment is re-used it is broken and not safe any more. [Read More]


Debian updates to tetex
Vendor Patch. Secunia Advisory 11 of 36 in 2002. 6,099 views.
Release Date:
2002-12-12
Secunia Advisory ID:
SA7692
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From local network
Short Description:
Debian has issued updates to the dvips. The updates closes a vulnerability where system() calls are made insecurely, which makes it possible for a malicious person to create DVI files which can execute arbitrary code as the print user (lp). [Read More]


Debian updates to smb2www
Vendor Patch. Secunia Advisory 12 of 36 in 2002. 8,439 views.
Release Date:
2002-12-05
Secunia Advisory ID:
SA7654
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Debian has issued updates to fix a vulnerability in smb2www. The problem is that it is possible to execute arbitrary code as the www-data user on the host running smb2www. [Read More]


Debian updates to im
Vendor Patch. Secunia Advisory 13 of 36 in 2002. 7,259 views.
Release Date:
2002-12-03
Secunia Advisory ID:
SA7646
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
Debian has (re)issued an update to im. im creates temporary files and folders insecurely with predictable names. This can be abused to gain privileges. [Read More]


Debian updates to mhonarc
Vendor Patch. Secunia Advisory 14 of 36 in 2002. 5,773 views.
Release Date:
2002-11-19
Secunia Advisory ID:
SA7554
Solution Status:
Vendor Patch
Criticality:
Impact:
Cross Site Scripting
Where:
From remote
Short Description:
Debian has issued updated mhonarc packages. It is possible to inject scripts when converting mail of the type text/html into html, when using mhonarc to convert mail. [Read More]


Debian updates to BIND
Vendor Patch. Secunia Advisory 15 of 36 in 2002. 5,695 views.
Release Date:
2002-11-14
Secunia Advisory ID:
SA7523
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Debian has issued updates to the three recent BIND holes, one allowing attackers system access from remote. [Read More]


Debian update to Apache-perl
Vendor Patch. Secunia Advisory 16 of 36 in 2002. 6,814 views.
Release Date:
2002-11-13
Secunia Advisory ID:
SA7510
Solution Status:
Vendor Patch
Criticality:
Impact:
Cross Site Scripting
DoS
System access
Where:
From remote
Short Description:
Debian has issued updates to Apache-perl, this updates deals with multiple older issues. [Read More]


Debian updates to html2ps
Vendor Patch. Secunia Advisory 17 of 36 in 2002. 6,899 views.
Release Date:
2002-11-11
Secunia Advisory ID:
SA7475
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Debian has (re)issued updates to html2ps, a vulnerability exists in html2ps which can be abused by users with access to the lprng printing service. [Read More]


Debian updates to Apache-SSL
Vendor Patch. Secunia Advisory 18 of 36 in 2002. 7,319 views.
Release Date:
2002-11-05
Secunia Advisory ID:
SA7447
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Debian has issued updates to Apache-SSL, this updates deals with multiple older issues. [Read More]


Debian updates to Apache fix multiple vulnerabilities
Vendor Patch. Secunia Advisory 19 of 36 in 2002. 6,666 views.
Release Date:
2002-11-04
Secunia Advisory ID:
SA7441
Solution Status:
Vendor Patch
Criticality:
Impact:
Cross Site Scripting
DoS
System access
Where:
From remote
Short Description:
Debian has issued updates to Apache, this updates deals with multiple older issues. [Read More]


Debian updates to heimdal/kerberos
Vendor Patch. Secunia Advisory 20 of 36 in 2002. 5,928 views.
Release Date:
2002-10-31
Secunia Advisory ID:
SA7425
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Heimdal has been found vulnerable to a number of remotely exploitable buffer overflows, which could possibly lead to root access for remote attackers. [Read More]


Debian updates to kerberos4
Vendor Patch. Secunia Advisory 21 of 36 in 2002. 5,548 views.
Release Date:
2002-10-30
Secunia Advisory ID:
SA7418
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Debian has issued updates to the fix the stack overflow in kadmind. Exploit code is known to be in the wild, we recommend that you upgrade immediatedly. [Read More]


Debian updates to Cross Site Scripting issue in mod_ssl
Vendor Patch. Secunia Advisory 22 of 36 in 2002. 6,600 views.
Release Date:
2002-10-22
Secunia Advisory ID:
SA7363
Solution Status:
Vendor Patch
Criticality:
Impact:
Cross Site Scripting
Where:
From remote
Short Description:
The problem that was discovered earlier in Apache, where a malicious person could perform a Cross Site Scripting attack using servers not using canonical_name and with a wild card DNS entry. [Read More]


Debian updates to ypserv memory leak
Vendor Patch. Secunia Advisory 23 of 36 in 2002. 6,189 views.
Release Date:
2002-10-21
Secunia Advisory ID:
SA7354
Solution Status:
Vendor Patch
Criticality:
Impact:
Exposure of sensitive information
Where:
From local network
Short Description:
Debian has issued updates to the ypserv issue, it is possible to cause a memory leak in ypserv which will cause the system to consume more and more memory. [Read More]


Debian update to gnome-gv vulnerability
Vendor Patch. Secunia Advisory 24 of 36 in 2002. 6,362 views.
Release Date:
2002-10-18
Secunia Advisory ID:
SA7344
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Debian has issued updated packages to address the vulnerability in gv, this problem also exists in gnome-gv. [Read More]


Debian issues fixes to vulnerabilities in heimdal
Vendor Patch. Secunia Advisory 25 of 36 in 2002. 5,953 views.
Release Date:
2002-10-17
Secunia Advisory ID:
SA7335
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Heimdal is a flexible kerberos implementation shipped with Debian. [Read More]


Debian updates to gv vulnerability
Vendor Patch. Secunia Advisory 26 of 36 in 2002. 6,384 views.
Release Date:
2002-10-16
Secunia Advisory ID:
SA7321
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Debian has issued updated packages to address the vulnerability in gv. [Read More]


Debian updates to syslog-ng issue
Vendor Patch. Secunia Advisory 27 of 36 in 2002. 7,323 views.
Release Date:
2002-10-15
Secunia Advisory ID:
SA7309
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
Debian has issued new versions of syslog-ng which fixes the buffer overflow allowing users to gain root. [Read More]


Debian updates to fetchmail issue
Vendor Patch. Secunia Advisory 28 of 36 in 2002. 5,082 views.
Release Date:
2002-10-09
Secunia Advisory ID:
SA7257
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Debian has issued updated packages to fix the buffer overflow problem in fetchmail. [Read More]


Debian new package to fix insecure tmp file
Vendor Patch. Secunia Advisory 29 of 36 in 2002. 5,522 views.
Release Date:
2002-10-08
Secunia Advisory ID:
SA7254
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
tkmail creates temporary files insecurely, this allows local users to create and overwrite files as other users. [Read More]


Gentoo and Debian linux has issued updated packages to RPC issue
Vendor Patch. Secunia Advisory 30 of 36 in 2002. 7,010 views.
Release Date:
2002-09-27
Secunia Advisory ID:
SA7170
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
The XDR libraries was found to be remotely exploitable some time ago, most vendors has released updates to this issue, however the new update contained a division by zero bug. [Read More]


Debian has released update to address PHP vulnerabilities
Vendor Patch. Secunia Advisory 31 of 36 in 2002. 5,659 views.
Release Date:
2002-09-18
Secunia Advisory ID:
SA7124
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Debian has addressed the recently published PHP issues, this includes the CRLF header injection and the problems when running PHP in Safe Mode. [Read More]


Debian update to OpenSSL issue
Vendor Patch. Secunia Advisory 32 of 36 in 2002. 4,887 views.
Release Date:
2002-09-17
Secunia Advisory ID:
SA7116
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Debian has previsously issued an advisory and patches for the OpenSSL vulnerability, however there was an error in some of the updated packages. [Read More]


Debian has issued fixes to the OpenSSL bufferoverflow
Vendor Patch. Secunia Advisory 33 of 36 in 2002. 4,610 views.
Release Date:
2002-09-16
Secunia Advisory ID:
SA7111
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
This is an update to the Debian advisory from 30th July. It addresses the buffer overflow issue in OpenSSL. [Read More]


Debian linux includes purity which contain a buffer overflow
Vendor Patch. Secunia Advisory 34 of 36 in 2002. 4,787 views.
Release Date:
2002-09-13
Secunia Advisory ID:
SA7105
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
It is possible to exploit two buffer overflows in purity, a game which is included in Debian linux. [Read More]


Debian fixes vulnerability in PostgreSQL
Vendor Patch. Secunia Advisory 35 of 36 in 2002. 4,762 views.
Release Date:
2002-09-12
Secunia Advisory ID:
SA7100
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Multiple vulnerabilities has been found in PostgreSQL, some of which are remotely exploitable. [Read More]


Debian mhonarc Cross Site Scripting vulnerability
Vendor Patch. Secunia Advisory 36 of 36 in 2002. 4,115 views.
Release Date:
2002-09-10
Secunia Advisory ID:
SA7085
Solution Status:
Vendor Patch
Criticality:
Impact:
Cross Site Scripting
Where:
From remote
Short Description:
It is possible to inject scripts when converting mail of the type text/html into html, when using mhonarc to convert mail. [Read More]





Discuss this Product
A new thread in our forum is automatically created for each Product. Activate the thread by commenting/discussing below.
Subject: Debian GNU/Linux 2.x 
No posts yet

-

You must be logged in to post a comment.



 Products Solutions Customers Partner Resources Company
 
 Corporate
Vulnerability Intelligence Manager (VIM)
Corporate Software Inspector (CSI)
Consumer
Personal Software Inspector (PSI)
Online Software Inspector (OSI)
 Industry
Compliance
Technology
Integration
 Customers
Testimonials
 VARS
MSSP
Technology Partners
References
 Reports
Webinars
Events
 About us
Careers
Memberships
Newsroom


 
© 2002-2014 Secunia ApS - Rued Langgaards Vej 8, 4th floor, DK-2300 Copenhagen, Denmark - +45 7020 5144
Terms & Conditions and Copyright - Privacy - Report Vulnerability