----------------------------------------------------------------------


  Secunia CSI
+ Microsoft SCCM
-----------------------
= Extensive Patch Management

http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/


----------------------------------------------------------------------

TITLE:
SUSE Update for Multiple Packages

SECUNIA ADVISORY ID:
SA39176

VERIFY ADVISORY:
http://secunia.com/advisories/39176/

DESCRIPTION:
SUSE has issued an update for multiple packages. This fixes a
weakness, security issues, and vulnerabilities, which can be
exploited by malicious, local users to cause a DoS (Denial of
Service), disclose potentially sensitive information, and gain
escalated privileges, and by malicious people to conduct spoofing
attacks, disclose system and potentially sensitive information,
bypass certain security restrictions, cause a DoS, and potentially
compromise a vulnerable system.

For more information:
SA30134
SA33077
SA36378
SA37364
SA37372
SA37842
SA38257
SA38364
SA38390
SA38451
SA38454
SA38700
SA38789
SA38895
SA39010

1) A security issue is caused due to MySQL checking the validity of a
local path by using a requested table name without extension. This can
be exploited to bypass table access restrictions in CREATE TABLE
statements via symlink attacks.

This is related to:
SA30134

2) A security issue is caused due to pulseaudio performing chown()
and chmod() calls without checking for symbolic links in existing
directories. This can be exploited to e.g. change permissions and
ownership of arbitrary files via symlink attacks.

3) The "mount.cifs" utility does not properly sanitise certain input,
which can be exploited to corrupt the /etc/mtab file.

Successful exploitation requires that "mount.cifs" is setuid root
(not setuid root by default).

SOLUTION:
Apply updated packages via YaST Online Update or the SUSE FTP server.

ORIGINAL ADVISORY:
SUSE-SR:2010:007:
http://lists.opensuse.org/opensuse-security-announce/2010-03/msg00008.html

OTHER REFERENCES:
SA30134:
http://secunia.com/advisories/30134/

SA33077:
http://secunia.com/advisories/33077/

SA36378:
http://secunia.com/advisories/36378/

SA37364:
http://secunia.com/advisories/37364/

SA37372:
http://secunia.com/advisories/37372/

SA37842:
http://secunia.com/advisories/37842/

SA38257:
http://secunia.com/advisories/38257/

SA38364:
http://secunia.com/advisories/38364/

SA38390:
http://secunia.com/advisories/38390/

SA38451:
http://secunia.com/advisories/38451/

SA38454:
http://secunia.com/advisories/38454/

SA38700:
http://secunia.com/advisories/38700/

SA38789:
http://secunia.com/advisories/38789/

SA38895:
http://secunia.com/advisories/38895/

SA39010:
http://secunia.com/advisories/39010/

----------------------------------------------------------------------

About:
This Advisory was delivered by Secunia as a free service to help
private users keeping their systems up to date against the latest
vulnerabilities.

Subscribe:
http://secunia.com/advisories/secunia_security_advisories/

Definitions: (Criticality, Where etc.)
http://secunia.com/advisories/about_secunia_advisories/


Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.

----------------------------------------------------------------------

Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

----------------------------------------------------------------------