ALT-BU-2020-3903-1
Branch sisyphus update bulletin.
Closed vulnerabilities
BDU:2021-03635
Уязвимость множества функций из libscp_v0.c RDP сервера xrdp, связанная с переполнением буфера на стеке, позволяющая нарушителю получить доступ к конфиденциальной информации или вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2020-4044
The xrdp-sesman service before version 0.9.13.1 can be crashed by connecting over port 3350 and supplying a malicious payload. Once the xrdp-sesman process is dead, an unprivileged attacker on the server could then proceed to start their own imposter sesman service listening on port 3350. This will allow them to capture any user credentials that are submitted to XRDP and approve or reject arbitrary login credentials. For xorgxrdp sessions in particular, this allows an unauthorized user to hijack an existing session. This is a buffer overflow attack, so there may be a risk of arbitrary code execution as well.
- openSUSE-SU-2020:0999
- openSUSE-SU-2020:0999
- openSUSE-SU-2020:1200
- openSUSE-SU-2020:1200
- https://github.com/neutrinolabs/xrdp/commit/0c791d073d0eb344ee7aaafd221513dc9226762c
- https://github.com/neutrinolabs/xrdp/commit/0c791d073d0eb344ee7aaafd221513dc9226762c
- https://github.com/neutrinolabs/xrdp/releases/tag/v0.9.13.1
- https://github.com/neutrinolabs/xrdp/releases/tag/v0.9.13.1
- https://github.com/neutrinolabs/xrdp/security/advisories/GHSA-j9fv-6fwf-p3g4
- https://github.com/neutrinolabs/xrdp/security/advisories/GHSA-j9fv-6fwf-p3g4
- [debian-lts-announce] 20200809 [SECURITY] [DLA 2319-1] xrdp security update
- [debian-lts-announce] 20200809 [SECURITY] [DLA 2319-1] xrdp security update
- DSA-4737
- DSA-4737
Closed vulnerabilities
BDU:2021-02007
Уязвимость почтовых клиентов Mutt и NeoMutt, связанная с недостатками процедуры нейтрализации особых элементов в выходных данных, используемых входящим компонентом, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации
Modified: 2024-11-21
CVE-2020-14954
Mutt before 1.14.4 and NeoMutt before 2020-06-19 have a STARTTLS buffering issue that affects IMAP, SMTP, and POP3. When a server sends a "begin TLS" response, the client reads additional data (e.g., from a man-in-the-middle attacker) and evaluates it in a TLS context, aka "response injection."
- http://lists.mutt.org/pipermail/mutt-announce/Week-of-Mon-20200615/000023.html
- http://lists.mutt.org/pipermail/mutt-announce/Week-of-Mon-20200615/000023.html
- openSUSE-SU-2020:0903
- openSUSE-SU-2020:0903
- openSUSE-SU-2020:0915
- openSUSE-SU-2020:0915
- http://www.mutt.org/
- http://www.mutt.org/
- https://github.com/neomutt/neomutt/commit/fb013ec666759cb8a9e294347c7b4c1f597639cc
- https://github.com/neomutt/neomutt/commit/fb013ec666759cb8a9e294347c7b4c1f597639cc
- https://github.com/neomutt/neomutt/releases/tag/20200619
- https://github.com/neomutt/neomutt/releases/tag/20200619
- https://gitlab.com/muttmua/mutt/-/commit/c547433cdf2e79191b15c6932c57f1472bfb5ff4
- https://gitlab.com/muttmua/mutt/-/commit/c547433cdf2e79191b15c6932c57f1472bfb5ff4
- https://gitlab.com/muttmua/mutt/-/issues/248
- https://gitlab.com/muttmua/mutt/-/issues/248
- [debian-lts-announce] 20200630 [SECURITY] [DLA 2268-1] mutt security update
- [debian-lts-announce] 20200630 [SECURITY] [DLA 2268-1] mutt security update
- [debian-lts-announce] 20200630 [SECURITY] [DLA 2268-2] mutt regression update
- [debian-lts-announce] 20200630 [SECURITY] [DLA 2268-2] mutt regression update
- FEDORA-2020-31af2ac7fd
- FEDORA-2020-31af2ac7fd
- FEDORA-2020-1cb4c3697b
- FEDORA-2020-1cb4c3697b
- GLSA-202007-57
- GLSA-202007-57
- USN-4403-1
- USN-4403-1
- DSA-4707
- DSA-4707
- DSA-4708
- DSA-4708