Linux Advisory Watch - May 24th 2002

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 




+----------------------------------------------------------------+
|  LinuxSecurity.com                        Linux Advisory Watch |
|  May 24th, 2002                           Volume 3, Number 21a |
+----------------------------------------------------------------+
 
  Editors:     Dave Wreski                Benjamin Thomas
               dave@linuxsecurity.com     ben@linuxsecurity.com
 
Linux Advisory Watch is a comprehensive newsletter that outlines the
security vulnerabilities that have been announced throughout the week. It
includes pointers to updated packages and descriptions of each
vulnerability.
 
This week, advisories were released for php, fetchmail, webmin, and dhcp.  
The vendors include Cadera, Mandrake, Red Hat, and SuSE.  Are you
subscribed to the Linux security discussion list? Take advantage of it!  
To subscribe send an e-mail to security-discuss-request@linuxsecurity.com
with "subscribe" as the subject.

** Build Complete Internet Presence Quickly and Securely! **  

EnGarde Secure Linux has everything necessary to create thousands of
virtual Web sites, manage e-mail, DNS, firewalling, and database functions
for an entire organization, all using a secure Web-based front-end.
Engineered to be secure and easy to use!
  
 --> http://www.guardiandigital.com/promo/ls230502.html 

* FTP Attack Case Study Part I: The Analysis *

This article presents a case study of a company network server compromise.
The attack and other intruder's actions are analyzed. Computer forensics
investigation is undertaken and results are presented. The article
provides an opportunity to follow the trail of incident response for the
real case.
 
http://www.linuxsecurity.com/feature_stories/ftp-analysis-part1.html 
 
 
+---------------------------------+
| php                             | ----------------------------//
+---------------------------------+  

Several flaws have been found in the way PHP handles multipart/form-data
POST requests. Each of the flaws could allow an attacker to execute
arbitrary code on the victim's system.

 Caldera: 

ftp://ftp.caldera.com/pub/updates/OpenLinux/3.1.1/Server/current/RPMS

 php-4.0.6-3.2.i386.rpm 
 1bbbc55e7dfd717f02b3668c57891edf 

 php-doc-4.0.6-3.2.i386.rpm 
 20c0812616f3df9c48078134c7e7fac6 

 Caldera Vendor Advisory: 
 http://www.linuxsecurity.com/advisories/caldera_advisory-2079.html



+---------------------------------+
| fetchmail                       | ----------------------------//
+---------------------------------+  

When retrieving mail from an IMAP server, the fetchmail e-mail client will
allocate an array to store the sizes of the messages which it will attempt
to fetch. The size of the array is determined by the number of messages
that the server claims to have. Unpatched versions of fetchmail prior to
5.9.10 did not check whether the number of e-mails the server claimed was
too high, allowing a malicious server to cause the fetchmail process to
write data outside of the array bounds.

 Red Hat Linux 7.3 i386: 
 ftp://updates.redhat.com/7.3/en/os/i386/
 fetchmail-5.9.0-11.i386.rpm 
 8ac6d5614b18de67e5dd53ea8de64e16 

 ftp://updates.redhat.com/7.3/en/os/i386/
 fetchmailconf-5.9.0-11.i386.rpm 
 51eeebc63b4e44bbf9de2d3ba3d408ff 

 Red Hat Vendor Advisory: 
 http://www.linuxsecurity.com/advisories/redhat_advisory-2080.html



+---------------------------------+
| webmin                          | ----------------------------//
+---------------------------------+  

A vulnerability exists in all versions of Webmin prior to 0.970 that
allows a remote attacker to login to Webmin as any user.  All users of
Webmin are encouraged to upgrade immediately.

 Mandrake Linux 8.2:8.2 
 http://www.mandrakesecure.net/en/ftp.php 
 /RPMS/webmin-0.970-1.1mdk.noarch.rpm 
 00b798a4d1d59c53d644809846e9980b 

 Mandrake Vendor Advisory: 
 http://www.linuxsecurity.com/advisories/mandrake_advisory-2081.html



+---------------------------------+
| dhcp                            | ----------------------------//
+---------------------------------+  

A remote exploitable format string vulnerability was found in the logging
routines of the dynamic DNS code of dhcpd. This vulnerability allows an
attacker, usually within the LAN served by the DHCP server, to get remote
root access to the host running dhcpd.

 i386 Intel Platform: SuSE-8.0 
 ftp://ftp.suse.com/pub/suse/i386/update/8.0/n2/
 dhcp-server-3.0.1rc6-8.i386.rpm 
 754569c059f5f2c4f71397f6c6498f53 

 SuSE Vendor Advisory: 
 http://www.linuxsecurity.com/advisories/suse_advisory-2082.html


------------------------------------------------------------------------
Distributed by: Guardian Digital, Inc.                LinuxSecurity.com

     To unsubscribe email vuln-newsletter-request@linuxsecurity.com
         with "unsubscribe" in the subject of the message.
------------------------------------------------------------------------


[Index of Archives]     [Fedora Announce]     [Linux Crypto]     [Kernel]     [Netfilter]     [Bugtraq]     [USB]     [Fedora Security]

  Powered by Linux