Linux Advisory Watch - October 4th 2002

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 




+----------------------------------------------------------------+
|  LinuxSecurity.com                        Linux Advisory Watch |
|  October 4th, 2002                        Volume 3, Number 40a |
+----------------------------------------------------------------+
 
  Editors:     Dave Wreski                Benjamin Thomas
               dave@linuxsecurity.com     ben@linuxsecurity.com
 
Linux Advisory Watch is a comprehensive newsletter that outlines the
security vulnerabilitiaes that have been announced throughout the week.  
It includes pointers to updated packages and descriptions of each
vulnerability.

This week, advisories were released for fetchmail, postgresql, dietlibc,
glibc, unzip, python, tar, gv, XFree86, and heimdal. The vendors include
Conectiva, EnGarde, Gentoo, Mandrake, Red Hat, and SuSE.


Scan 24: Digital Forensic Research WorkShop
It's time for the October Honeynet scan of the month. One of the
interesting changes to the challange for this month is the fact that you
have to read the police report before continuing. This adds a real life
aspect to the challenge. Click for details:

http://www.linuxsecurity.com/articles/projects_article-5814.html


** Concerned about the next threat? EnGarde is the undisputed winner! 
Hardened Linux Puts Hackers EnGarde! Winner of the Network Computing 
Editor's Choice Award, EnGarde "walked away with our Editor's Choice 
award thanks to the depth of its security strategy..." Find out what 
the other Linux vendors are not telling you. 
 
 --> http://ads.linuxsecurity.com/cgi-bin/ad_redirect.pl?id=engarde2 
  
 
  
+---------------------------------+
|  Package: fetchmail             | ----------------------------//
|  Date: 10-01-2002               |
+---------------------------------+  

Description: 
Several buffer overflows and a boundary check error were discovered in all
fetchmail versions prior to 6.1.0 by e-matters GmbH.  These problems are
vulnerable to crashes and/or arbitrary code execution by remote attackers
if fetchmail is running in multidrop mode.  The code execution would be
done with the same privilege as the user running fetchmail.

Vendor Alerts: 

Mandrake:  
http://www.mandrakesecure.net/en/ftp.php

 Mandrake Linux 9.0: 
 9.0/RPMS/fetchmail-6.1.0-0.1mdk.i586.rpm 
 e885d1f0c8e24e46ac2e1f8a219650be  

 9.0/RPMS/fetchmail-daemon-6.1.0-0.1mdk.i586.rpm  
 09c813350cf31109555b68fd9fdf741d  

 9.0/RPMS/fetchmailconf-6.1.0-0.1mdk.i586.rpm  
 945ae5c3ce8e69f0ca24a054c033bbd4  

 Mandrake  Vendor Advisory: 
 http://www.linuxsecurity.com/advisories/mandrake_advisory-2395.html 


 Gentoo Vendor Advisory: 
 http://www.linuxsecurity.com/advisories/other_advisory-2390.html 
 

 EnGarde Vendor Advisory:  
 ftp://ftp.engardelinux.org/pub/engarde/stable/updates/
 i386/fetchmail-ssl-6.1.0-1.0.5.i386.rpm 
 MD5 Sum: 74a23fe3975b6d23ac45fcc8654444ac 

 i686/fetchmail-ssl-6.1.0-1.0.5.i686.rpm 
 MD5 Sum: f7ac0b8560086169ba39e77c3aeddfcd 

 EnGarde Vendor Advisory: 
 http://www.linuxsecurity.com/advisories/other_advisory-2402.html 
  
 
 

  
+---------------------------------+
|  Package: postgresql            | ----------------------------//
|  Date: 10-01-2002               |
+---------------------------------+  

Description: 
Vulnerabilities were discovered in the Postgresql relational database by
Mordred Labs.  These vulnerabilities are buffer overflows in the rpad(),
lpad(), repeat(), and cash_words() functions.  The Postgresql developers
also fixed a buffer overflow in functions that deal with time/date and
timezone.

Vendor Alerts: 

 Mandrake:  
 PLEASE SEE VENDOR ADVISORY FOR UPDATE 

 Mandrake  Vendor Advisory: 
 http://www.linuxsecurity.com/advisories/mandrake_advisory-2394.html
 

  
  
+---------------------------------+
|  Package: dietlibc              | ----------------------------//
|  Date: 09-27-2002               |
+---------------------------------+  

Description: 
There is an integer overflow present in the xdr_array() function
distributed as part of the Sun Microsystems XDR library. This overflow has
been shown to lead to remotely exploitable buffer overflows in multiple
applications, leading to the execution of arbitrary code. Although the
library was originally distributed by Sun Microsystems, multiple vendors
have included the vulnerable code in their own implementations.

Vendor Alerts: 

 Gentoo:  
 PLEASE SEE VENDOR ADVISORY FOR UPDATE 

 Gentoo  Vendor Advisory: 
 http://www.linuxsecurity.com/advisories/other_advisory-2386.html
 

  

+---------------------------------+
|  Package: glibc                 | ----------------------------//
|  Date: 09-27-2002               |
+---------------------------------+  

Description: 
Wolfram Gloger discovered that the sunrpc overflow ugfix unintentially
replaced potential integer overflows in connection with malloc() with more
likely divisions by zero.

Vendor Alerts: 

 Gentoo:  
 PLEASE SEE VENDOR ADVISORY FOR UPDATE 

 Gentoo  Vendor Advisory: 
 http://www.linuxsecurity.com/advisories/other_advisory-2387.html 
 

 EnGarde:  
 ftp://ftp.engardelinux.org/pub/engarde/stable/updates/ 
 i386/glibc-2.1.3-1.0.6.i386.rpm 
 MD5 Sum: ae9a9aa2ff031b582ce9be770f73ec6f 

 EnGarde Vendor Advisory: 
 http://www.linuxsecurity.com/advisories/other_advisory-2399.html 
 
 

  
+---------------------------------+
|  Package: unzip                 | ----------------------------//
|  Date: 10-01-2002               |
+---------------------------------+  

Description: 
Archive extraction is usually treated by users as a safe operation. There
are few problems with files extraction though.

Vendor Alerts: 

 Gentoo:  
 PLEASE SEE VENDOR ADVISORY FOR UPDATE 

 Gentoo  Vendor Advisory:  
 http://www.linuxsecurity.com/advisories/other_advisory-2391.html 
 

 Red Hat Vendor Advisory: 
 http://www.linuxsecurity.com/advisories/redhat_advisory-2388.html 


  

+---------------------------------+
|  Package: python                | ----------------------------//
|  Date: 10-01-2002               |
+---------------------------------+  

Description: 
Zack Weinberg found[1] a vulnerability in the way the exevpe() method from
the os.py module uses a temporary file name. A file which supposedly
should not exist is created in a unsafe way and the method tries to
execute it. The objective of such code is to discover what error the
operating system returns in a portable way.

Vendor Alerts: 

 Conectiva:  
 ftp://atualizacoes.conectiva.com.br/8/RPMS/ 
 python-2.2-10U80_1cl.i386.rpm 

 ftp://atualizacoes.conectiva.com.br/8/RPMS/ 
 python-devel-2.2-10U80_1cl.i386.rpm 

 ftp://atualizacoes.conectiva.com.br/8/RPMS/ 
 python-doc-2.2-10U80_1cl.i386.rpm 

 ftp://atualizacoes.conectiva.com.br/8/RPMS/ 
 python-freeze-2.2-10U80_1cl.i386.rpm 

 ftp://atualizacoes.conectiva.com.br/8/RPMS/ 
 python-idle-2.2-10U80_1cl.i386.rpm 

 ftp://atualizacoes.conectiva.com.br/8/RPMS/ 
 python-tkinter-2.2-10U80_1cl.i386.rpm 
  

 Conectiva  Vendor Advisory: 
 http://www.linuxsecurity.com/advisories/other_advisory-2393.html
 

  
+---------------------------------+
|  Package: tar                   | ----------------------------//
|  Date: 10-03-2002               |
+---------------------------------+  

Description: 
There is a directory traversal vulnerability in tar which may allow an
attacker to overwrite arbitrary files by tricking the administrator into
extracting a malicious archive.

Vendor Alerts: 

 EnGarde:  
 ftp://ftp.engardelinux.org/pub/engarde/stable/updates/  
 i386/tar-1.13.25-1.0.5.i386.rpm 
 MD5 Sum: 48a78e985fa73b15c7bb597ede2d7578 

 i686/tar-1.13.25-1.0.5.i686.rpm 
 MD5 Sum: d3dcf70784b6863f30b8813be42050bf 
  

 EnGarde Vendor Advisory: 
 http://www.linuxsecurity.com/advisories/other_advisory-2400.html
 

  
  
+---------------------------------+
|  Package: gv                    | ----------------------------//
|  Date: 10-03-2002               |
+---------------------------------+  

Description: 
When GV detects that the document is either a PDF file or a GZip
compressed file, it executes some commands with the help of the system()
function. Unfortunately, these commands contain the filename, which can be
considered as untrusted user input. It is then possible to distribute a
file (with a meticulously choosed filename, that can even seems innocent)
that causes execution of arbitrary shell commands when it is read with GV.
  
Vendor Alerts: 

 Gentoo:  
 PLEASE SEE VENDOR ADVISORY FOR UPDATE 

 Gentoo Vendor Advisory: 
 http://www.linuxsecurity.com/advisories/other_advisory-2401.html
 

  
+---------------------------------+
|  Package: XFree86               | ----------------------------//
|  Date: 10-03-2002               |
+---------------------------------+  

Description: 
XFree86 is a freely redistributable open-source implementation of the X
Window System, which is a client/server interface between display hardware
and the desktop environment. Xlib is one of the main libraries of XFree86
(libX11.so.6).

Vendor Alerts: 

 Conectiva:  
 PLEASE SEE VENDOR ADVISORY FOR UPDATE 

 Conectiva Vendor Advisory: 
 http://www.linuxsecurity.com/advisories/other_advisory-2403.html
 

  
+---------------------------------+
|  Package: heimdal               | ----------------------------//
|  Date: 10-03-2002               |
+---------------------------------+  

Description:
The Heimdal package is a free Kerberos implementation offering flexible
authentication mechanisms based on the Kerberos 5 and Kerberos 4 scheme.  
The SuSE Security Team has reviewed critical parts of the Heimdal package
such as the kadmind and kdc server. While doing so several possible buffer
overflows and other bugs have been uncovered and fixed.

Vendor Alerts: 

 SuSE: 
 ftp://ftp.suse.com/pub/suse/i386/update/8.0/d4/ 
 heimdal-devel-0.4e-191.i386.rpm 
 9dcb318864c2ad7c8bb11a51b0c1e12a 

 ftp://ftp.suse.com/pub/suse/i386/update/8.0/sec1/ 
 heimdal-lib-0.4e-191.i386.rpm 
 7971b5a482b0f8521c0a8bd07182be36 

 ftp://ftp.suse.com/pub/suse/i386/update/8.0/sec3/ 
 heimdal-0.4e-191.i386.rpm  
 fb6792204a9ec58f69a9dc7b4bcbed59 
     
 SuSE Vendor Advisory: 
 http://www.linuxsecurity.com/advisories/suse_advisory-2389.html


------------------------------------------------------------------------
Distributed by: Guardian Digital, Inc.                LinuxSecurity.com

     To unsubscribe email vuln-newsletter-request@linuxsecurity.com
         with "unsubscribe" in the subject of the message.
------------------------------------------------------------------------


[Index of Archives]     [Fedora Announce]     [Linux Crypto]     [Kernel]     [Netfilter]     [Bugtraq]     [USB]     [Fedora Security]

  Powered by Linux