Linux Advisory Watch - September 27th 2002

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 




+----------------------------------------------------------------+
|  LinuxSecurity.com                        Linux Advisory Watch |
|  September 27th, 2002                     Volume 3, Number 39a |
+----------------------------------------------------------------+
 
  Editors:     Dave Wreski                Benjamin Thomas
               dave@linuxsecurity.com     ben@linuxsecurity.com
 
Linux Advisory Watch is a comprehensive newsletter that outlines the
security vulnerabilitiaes that have been announced throughout the week.  
It includes pointers to updated packages and descriptions of each
vulnerability.

This week, advisories were released for xchat, kdelibs, openssl, tcl/tk,
glibc, tomcat, and zope.  The vendors include Conectiva, Debian, Gentoo,
Mandrake, NetBSD, Red Hat, and SuSE.

** Guardian Digital Launches Next Generation 
** EnGarde Enterprise Security Platform

 EnGarde Secure Linux is the perfect platform for developing an online
 presence that requires a high degree of security. EnGarde is a unique
 collection of the best open source tools available, coupled with the
 security and networking expertise of Guardian Digital.

 http://www.guardiandigital.com/products/software/professional/

+---------------------------------+
|  Package: xchat                 | ----------------------------//
|  Date: 09-23-2002               |
+---------------------------------+  
 
Description: 
XChat prior to version 1.8.9 has a vulnerability[1] that may allow a
remote attacker to execute arbitrary commands in the IRC client
context. The vulnerability resides in the way xchat handles the IRC
server response for the /dns command. It passes the response directly
to a shell without filtering it. An attacker with administration
privileges in the IRC server can insert escaped commands in such a
response, which will be executed by the client's shell.  

Vendor Alerts: 

 Conectiva:  
 ftp://atualizacoes.conectiva.com.br/8/RPMS/ 
 xchat-1.8.10-1U80_1cl.i386.rpm 

 ftp://atualizacoes.conectiva.com.br/8/RPMS/ 
 xchat-gtk-1.8.10-1U80_1cl.i386.rpm 
  
 Conectiva Vendor Advisory: 
 http://linuxsecurity.com/advisories/other_advisory-2380.html
 

  
+---------------------------------+
|  Package: kdelibs               | ----------------------------//
|  Date: 09-20-2002               |
+---------------------------------+  

Description: 
This vulnerability could allow an attacker to steal cookies and
perform other types of cross site scripting attacks on applications
which use the KHTML rendering engine, such as Konqueror.  

Vendor Alerts: 

 Conectiva:  
 PLEASE SEE VENDOR ADVISORY FOR UPDATE 

 Conectiva Vendor Advisory: 
 http://linuxsecurity.com/advisories/other_advisory-2377.html
 

  

+---------------------------------+
|  Package: openssl               | ----------------------------//
|  Date: 09-20-2002               |
+---------------------------------+  

Description: 
This advisory is issued in an attempt to clarify any issues
surrounding the recently discovered Apache/mod_ssl worm. 

Vendor Alerts: 

 SuSE: 
 PLEASE SEE VENDOR ADVISORY FOR UPDATE 

 SuSE Vendor Advisory: 
 http://linuxsecurity.com/advisories/suse_advisory-2378.html 
 

 NetBSD: 

 NetBSD Vendor Advisory:  
 http://linuxsecurity.com/advisories/netbsd_advisory-2379.html 

  

+---------------------------------+
|  Package: tcl/tk                | ----------------------------//
|  Date: 09-20-2002               |
+---------------------------------+  

Description: 
Some problems were discovered with the Tcl/Tk development
environment. The expect application would search for its libraries in
/var/tmp prior to searching in other directories, which could allow a
local user to gain root privilege by writing a trojan library and
waiting for the root user to run the mkpasswd utility. This is fixed
in version 5.32 of expect.  A similiar vulnerability has been fixed
in the tcltk package which searched for its libraries in the current
working directory prior to searching in other directories.  This
could be used to execute arbitrary code by local users through the
use of a trojan library. 

Vendor Alerts: 

 Mandrake:  
 PLEASE SEE VENDOR ADVISORY FOR UPDATE 

 Mandrake Vendor Advisory: 
 http://linuxsecurity.com/advisories/mandrake_advisory-2381.html
 

  

+---------------------------------+
|  Package: glibc                 | ----------------------------//
|  Date: 09-23-2002               |
+---------------------------------+  

Description: 
A heap buffer overflow exists in the XDR decoder in glibc version
2.2.5 and earlier.  XDR is a mechanism for encoding data structures
for use with RPC, which is derived from Sun's RPC implementation
which is likewise vulnerable to a heap overflow.  Depending on the
application, this vulnerability may be exploitable and could lead to
arbitrary code execution.  Thanks to Solar Designer for the patches
used to correct this vulnerability. 

Vendor Alerts: 

 Mandrake:  
 PLEASE SEE VENDOR ADVISORY FOR UPDATE 

 Mandrake Vendor Advisory: 
 http://linuxsecurity.com/advisories/mandrake_advisory-2382.html 
 

 Debian Vendor Advisory: 
 http://linuxsecurity.com/advisories/debian_advisory-2385.html 

  
  
+---------------------------------+
|  Package: tomcat                | ----------------------------//
|  Date: 09-25-2002               |
+---------------------------------+  

Description: 
Tomcat 4.0.4 and 4.1.10 (probably all other earlier versions also)
are vulnerable to source code exposure by using the default servlet
org.apache.catalina.servlets.DefaultServlet. 

Vendor Alerts: 

 Gentoo:  
 PLEASE SEE VENDOR ADVISORY FOR UPDATE

 Gentoo Vendor Advisory:  
 http://linuxsecurity.com/advisories/other_advisory-2383.html 

  


+---------------------------------+
|  Package: zope                  | ----------------------------//
|  Date: 09-25-2002               |
+---------------------------------+  

Description: 
The "through the web code" capability for Zope 2.0 through 2.5.1 b1
allows untrusted users to shut down the Zope server via certain
headers. (CAN-2002-0687)  ZCatalog plug-in index support capability
for Zope 2.4.0 through 2.5.1 allows anonymous users and untrusted
code to bypass access restrictions and call arbitrary methods of
catalog indexes. (CAN-2002-0688) Zope 2.2.0 through 2.5.1 does not
properly verify the access for objects with proxy roles, which could
allow some users to access documents in violation of the intended
configuration. (CAN-2002-0170) Users should upgrade to these errata
packages that have the Zope  Hotfixes 2002-03-01, 2002-04-15, and
2002-06-14 applied, and are therefore not vulnerable to these issues.


Vendor Alerts: 

 Red Hat:   
 PLEASE SEE VENDOR ADVISORY FOR UPDATE

 Red Hat Vendor Advisory: 
 http://linuxsecurity.com/advisories/redhat_advisory-2384.html 


------------------------------------------------------------------------
Distributed by: Guardian Digital, Inc.                LinuxSecurity.com

     To unsubscribe email vuln-newsletter-request@linuxsecurity.com
         with "unsubscribe" in the subject of the message.
------------------------------------------------------------------------


[Index of Archives]     [Fedora Announce]     [Linux Crypto]     [Kernel]     [Netfilter]     [Bugtraq]     [USB]     [Fedora Security]

  Powered by Linux