Gentoo Linux Security Advisory GLSA 200802-12 - Damian Frizza and Alfredo Ortega (Core Security Technologies) discovered a stack-based buffer overflow within the open_flac_file() function in the file demux_flac.c when parsing tags within a FLAC file (CVE-2008-0486). A buffer overflow when parsing ASF headers, which is similar to CVE-2006-1664, has also been discovered. Versions less than 1.1.10.1 are affected.
0cacd54cfae9fb2047f86db8000a63689e32a991f03a64e0f671e6df2ba0a24d
Mandriva Linux Security Advisory - A flaw was found in how CUPS handled the addition and removal of remote printers via IPP that could allow a remote attacker to send a malicious IPP packet to the UDP port causing CUPS to crash.
12147b573472bdc8bd17888a443b482c258f574cbe5f9670b1dc12fc05b1a2f6
Mandriva Linux Security Advisory - Dave Camp at Critical Path Software discovered a buffer overflow in CUPS 1.1.23 and earlier could allow local admin users to execute arbitrary code via a crafted URI to the CUPS service. The Red Hat Security Team also found two flaws in CUPS 1.1.x where a malicious user on the local subnet could send a set of carefully crafted IPP packets to the UDP port in such a way as to cause CUPS to crash or consume memory and lead to a CUPS crash. Finally, another flaw was found in how CUPS handled the addition and removal of remote printers via IPP that could allow a remote attacker to send a malicious IPP packet to the UDP port causing CUPS to crash.
a649ed2550f2724a2be3856c2b5d7185726ab19f41cbc7efcef59a823da612a9
Secunia Security Advisory - A vulnerability with unknown impact has been reported in H-Sphere SiteStudio.
51335d5dee14e938d980f918dde6572a91e991b86de2c2eaa53cc84897e99b19
Secunia Security Advisory - Fedora has issued an update for dnssec-tools. This fixes a security issue, which can be exploited by malicious people to bypass certain security restrictions.
7bdf78115ff32261ef8ba001bde2c8bd78c5e38bc291463c17117e9d99febe6e
Secunia Security Advisory - Fedora has issued an update for cups. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service) or to potentially compromise a vulnerable system.
ba709b34dd0e4f7cee4a940c5e29a0001f27c2a02c77ca01dfb11c8fe47b7300
Secunia Security Advisory - A security issue has been reported in DNSSEC-Tools, which can be exploited by malicious people to bypass certain security restrictions.
36909bc04dbc01f24032fbb9d5f0639b1087630ed57abd4c4e9b4f5e7ee6a121