Linux Advisory Watch - November 8th 2002

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 




+----------------------------------------------------------------+
|  LinuxSecurity.com                        Linux Advisory Watch |
|  November 8th, 2002                       Volume 3, Number 45a |
+----------------------------------------------------------------+

  Editors:     Dave Wreski                Benjamin Thomas
               dave@linuxsecurity.com     ben@linuxsecurity.com

Linux Advisory Watch is a comprehensive newsletter that outlines the
security vulnerabilitiaes that have been announced throughout the week.
It includes pointers to updated packages and descriptions of each
vulnerability.

This week, advisories were released for log2mail, apache, luxman, wmaker,
squirrelmail, IPFilter, perl-MailTools, glibc, kerberos, heartbeat, dvips,
krb5, gv, tar/unzip, ypserv, and linuxconf.  The distributors include
Conectiva, Debian, Gentoo, NetBSD, Red Hat, and SuSE.

Concerned about the next threat? EnGarde is the undisputed winner!
Hardened Linux Puts Hackers EnGarde! Winner of the Network Computing
Editor's Choice Award, EnGarde "walked away with our Editor's Choice award
thanks to the depth of its security strategy..." Find out what the other
Linux vendors are not telling you.

http://ads.linuxsecurity.com/cgi-bin/ad_redirect.pl?id=engarde2


FEATURE: Security - Physical and Service
The first installation of a 3 part article covering everything from
physical security and service security to LAMP security (Linux Apache
MySQL PHP).

 http://www.linuxsecurity.com/feature_stories/feature_story-128.html


FEATURE: Remote Syslogging - A Primer
The syslog daemon is a very versatile tool that should never be overlooked
under any circumstances. The facility itself provides a wealth of
information regarding the local system that it monitors.

 http://www.linuxsecurity.com/feature_stories/feature_story-123.html


+---------------------------------+
|  Package: log2mail              | ----------------------------//
|  Date: 11-05-2002               |
+---------------------------------+

Description:
Enrico Zini discovered a buffer overflow in log2mail, a daemon for
watching logfiles and sending lines with matching patterns via mail.
The log2mail daemon is started upon system boot and runs as root.  A
specially crafted (remote) log message could overflow a static
buffer, potentially leaving log2mail to execute arbitrary code as
root.

Vendor Alerts:

 Debian:
  http://security.debian.org/pool/updates/main/l/log2mail/
  log2mail_0.2.5.1_i386.deb
  Size/MD5 checksum:	38532 ca7b3f97063ee1de06eb2ec97c3c4f52

  Debian Vendor Advisory:
  http://www.linuxsecurity.com/advisories/debian_advisory-2525.html



+---------------------------------+
|  Package: apache                | ----------------------------//
|  Date: 11-04-2002               |
+---------------------------------+

Description:
According to David Wagner, iDEFENSE and the Apache HTTP Server Project,
several remotely exploitable vulnerabilities have been found in the Apache
package, a commonly used webserver.  These vulnerabilities could allow an
attacker to enact a denial of service against a server or execute a cross
scripting attack.

Vendor Alerts:

 Debian:
  http://security.debian.org/pool/updates/main/a/apache/
  apache_1.3.9-14.3_i386.deb
  Size/MD5 checksum:   359946 aae786f44f00d4c62b09ccd33fbef609

  http://security.debian.org/pool/updates/main/a/apache/
  apache-common_1.3.9-14.3_i386.deb
  Size/MD5 checksum:   718786 33046433f742f4bf5628d82afad4c18e

  http://security.debian.org/pool/updates/main/a/apache/
  apache-dev_1.3.9-14.3_i386.deb
  Size/MD5 checksum:   548902 86fd170a541de8c70d5abff2fca8d544


  Debian Vendor Advisory:
  http://www.linuxsecurity.com/advisories/debian_advisory-2526.html

  Debian Vendor Advisory: (apache-ssl)
  http://www.linuxsecurity.com/advisories/debian_advisory-2527.html


 Conectiva:

  Conectiva Vendor Advisory:
  http://www.linuxsecurity.com/advisories/other_advisory-2531.html




+---------------------------------+
|  Package: luxman                | ----------------------------//
|  Date: 11-06-2002               |
+---------------------------------+

Description:
iDEFENSE reported about a vulnerability in LuxMan, a maze game for
GNU/Linux, similar to the PacMan arcade game.  When successfully exploited
it a local attacker with read write access to the Memory, leading to a
local root compromise in many ways, examples of which include scanning the
file for fragments of the master password file and modifying kernel memory
to re-map system calls.

Vendor Alerts:

 Debian:
  http://security.debian.org/pool/updates/main/l/
  luxman/luxman_0.41-17.1_i386.deb
  Size/MD5 checksum:   290680 e9aa37d421068e828307ef5c816ad72d


  Debian Vendor Advisory:
  http://www.linuxsecurity.com/advisories/debian_advisory-2538.html



+---------------------------------+
|  Package: wmaker                | ----------------------------//
|  Date: 11-07-2002               |
+---------------------------------+

Description:
iDEFENSE reported about a vulnerability in LuxMan, a maze game for
GNU/Linux, similar to the PacMan arcade game.  When successfully exploited
it a local attacker with read write access to the Memory, leading to a
local root compromise in many ways, examples of which include scanning the
file for fragments of the master password file and modifying kernel memory
to re-map system calls.

Vendor Alerts:

 Debian:
  PLEASE SEE VENDOR ADVISORY FOR UPDATE

  Debian Vendor Advisory:
  http://www.linuxsecurity.com/advisories/debian_advisory-2541.html





+---------------------------------+
|  Package: squirrelmail          | ----------------------------//
|  Date: 11-07-2002               |
+---------------------------------+

Description:
Several cross site scripting vulnerabilities have been found in
squirrelmail, a feature-rich webmail package written in PHP4.

Vendor Alerts:

 Debian:
  http://security.debian.org/pool/updates/main/s/
  squirrelmail/squirrelmail_1.2.6-1.1_all.deb
  Size/MD5 checksum:  1839498 9e9c7ff1f5b42aaea021af563b76deaa

  Debian Vendor Advisory:
  http://www.linuxsecurity.com/advisories/debian_advisory-2543.html




+---------------------------------+
|  Package: IPFilter (FTP)        | ----------------------------//
|  Date: 11-05-2002               |
+---------------------------------+

Description:
FTP proxy module in IPFilter package may not adequately maintain the state
of FTP commands and responses. As a result, an attacker could establish
arbitrary TCP connections to FTP servers or clients located behind a
vulnerable firewall.

Vendor Alerts:

 NetBSD:
  PLEASE SEE VENDOR ADVISORY FOR UPDATE

  NetBSD Vendor Advisory:
  http://www.linuxsecurity.com/advisories/netbsd_advisory-2528.html



+---------------------------------+
|  Package: perl-MailTools        | ----------------------------//
|  Date: 11-05-2002               |
+---------------------------------+

Description:
This package contains a security hole which allows remote attackers to
execute arbitrary commands in certain circumstances. This is due to the
usage of mailx as default mailer which allows commands to be embedded in
the mail body.

Vendor Alerts:

 SuSE:
  ftp://ftp.suse.com/pub/suse/i386/update/8.1/rpm/i586/
  perl-MailTools-1.47-29.i586.rpm
  d41d8cd98f00b204e9800998ecf8427e

  SuSE Vendor Advisory:
  http://www.linuxsecurity.com/advisories/suse_advisory-2529.html


 Gentoo:

  Gentoo Vendor Advisory:
  http://www.linuxsecurity.com/advisories/other_advisory-2530.html




+---------------------------------+
|  Package: glibc                 | ----------------------------//
|  Date: 11-07-2002               |
+---------------------------------+

Description:
A read buffer overflow vulnerability exists in the glibc resolver code in
versions of glibc up to and including 2.2.5.  The vulnerability is
triggered by DNS packets larger than 1024 bytes and can cause applications
to crash.

Vendor Alerts:

 Red Hat:
  PLEASE SEE VENDOR ADVISORY FOR UPDATE

  Red Hat Vendor Advisory:
  http://www.linuxsecurity.com/advisories/redhat_advisory-2542.html


 Conectiva:

  Contectiva Vendor Advisory:
  http://www.linuxsecurity.com/advisories/other_advisory-2537.html




+---------------------------------+
|  Package: kerberos              | ----------------------------//
|  Date: 11-07-2002               |
+---------------------------------+

Description:
A remotely exploitable stack buffer overflow has been found in the
Kerberos v4 compatibility administration daemon distributed with the Red
Hat Linux krb5 packages.

Vendor Alerts:

 Red Hat:
  PLEASE SEE VENDOR ADVISORY FOR UPDATE

  Red Hat Vendor Advisory:
  http://www.linuxsecurity.com/advisories/redhat_advisory-2544.html





+---------------------------------+
|  Package: heartbeat             | ----------------------------//
|  Date: 11-03-2002               |
+---------------------------------+

Description:
Nathan Wallwork reported several format string vulnerabilities[2] in
heartbeat that could possibly be used by a remote attacker to execute
arbitrary code with root privileges.

Vendor Alerts:

 Conectiva:
  ftp://atualizacoes.conectiva.com.br/8/RPMS/
  heartbeat-0.4.9.1-2U80_1cl.i386.rpm

  ftp://atualizacoes.conectiva.com.br/8/RPMS/
  heartbeat-ldirectord-0.4.9.1-2U80_1cl.i386.rpm

  ftp://atualizacoes.conectiva.com.br/8/RPMS/
  heartbeat-stonith-0.4.9.1-2U80_1cl.i386.rpm


  Conectiva Vendor Advisory:
  http://www.linuxsecurity.com/advisories/other_advisory-2532.html





+---------------------------------+
|  Package: dvips                 | ----------------------------//
|  Date: 11-03-2002               |
+---------------------------------+

Description:
Olaf Kirch from SuSE discovered a vulnerability in the dvips utility,
which is used to convert .dvi files to PostScript. dvips is calling the
system() function in an insecure way when handling font names. An attacker
can exploit this by creating a carefully crafted dvi file which, when
opened by dvips, will cause the execution of arbitrary commands.

Vendor Alerts:

 Conectiva:
  PLEASE SEE VENDOR ADVISORY FOR UPDATE

  Conectiva Vendor Advisory:
  http://www.linuxsecurity.com/advisories/other_advisory-2533.html



+---------------------------------+
|  Package: krb5                  | ----------------------------//
|  Date: 11-07-2002               |
+---------------------------------+

Description:
There is a buffer overflow vulnerability[2][3] in the Kerberos 4 remote
administration service (kadmind4) that could be used by a remote attacker
to execute arbitrary commands on the server with root privileges.

Vendor Alerts:

 Conectiva:
  PLEASE SEE VENDOR ADVISORY FOR UPDATE

  Conectiva Vendor Advisory:
  http://www.linuxsecurity.com/advisories/other_advisory-2534.html



+---------------------------------+
|  Package: gv                    | ----------------------------//
|  Date: 11-07-2002               |
+---------------------------------+

Description:
Zen Parse found[1] a buffer overflow vulnerability in gv version 3.5.8 and
earlier. kghostview (from kdegraphics versions prior to 3.0.4) is also
affected, since it has some code derived from the same project. An
attacker can exploit this vulnerability by creating a carefully crafted
pdf file that, when opened by gv or kghostview, causes the execution of
arbitrary code.

Vendor Alerts:

 Conectiva:
  PLEASE SEE VENDOR ADVISORY FOR UPDATE

  Conectiva Vendor Advisory:
  http://www.linuxsecurity.com/advisories/other_advisory-2535.html




+---------------------------------+
|  Package: tar/unzip             | ----------------------------//
|  Date: 11-07-2002               |
+---------------------------------+

Description:
Both tar and unzip have directory transversal vulnerabilities in the way
they extract filenames containning ".." or "/" characteres at the
beginning. By exploiting these vulnerabilities, a malicious user can
overwrite arbitrary files if the user unpacking such an archive has
sufficient filesystem permissions to do so.

Vendor Alerts:

 Conectiva:
  ftp://atualizacoes.conectiva.com.br/8/RPMS/
  tar-1.13.25-2U80_1cl.i386.rpm

  ftp://atualizacoes.conectiva.com.br/8/RPMS/
  unzip-5.50-1U80_1cl.i386.rpm

  Conectiva Vendor Advisory:
  http://www.linuxsecurity.com/advisories/other_advisory-2536.html




+---------------------------------+
|  Package: ypserv                | ----------------------------//
|  Date: 11-07-2002               |
+---------------------------------+

Description:
Thorsten Kukuk identified and fixed a memory leak vulnerability[2] in the
ypserv daemon. Requests for non-existing maps would cause the ypserv
daemon to consume more and more memory. An attacker in the local network
could flood the service with such requests until the memory is exhausted,
characterizing a DoS condition.

Vendor Alerts:

 Conectiva:
  ftp://atualizacoes.conectiva.com.br/8/RPMS/
  ypserv-1.3.12-4U80_1cl.i386.rpm

  Conectiva Vendor Advisory:
  http://www.linuxsecurity.com/advisories/other_advisory-2539.html




+---------------------------------+
|  Package: linuxconf             | ----------------------------//
|  Date: 11-06-2002               |
+---------------------------------+

Description:
There is a problem[1] in the sendmail.cf file generated by the mailconf
module that allows sendmail to be used as an open relay. By exploiting
this vulnerability, a malicious user could send SPAM through the sendmail
server without being in its served network. In order to do that, the
recipient address of the messages must be in the format "user%domain@".

Vendor Alerts:

 Conectiva:
  ftp://atualizacoes.conectiva.com.br/8/RPMS/
  linuxconf-mailconf-1.25r3-39U80_1cl.i386.rpm

  Conectiva Vendor Advisory:
  http://www.linuxsecurity.com/advisories/other_advisory-2540.html


------------------------------------------------------------------------
Distributed by: Guardian Digital, Inc.                LinuxSecurity.com

     To unsubscribe email vuln-newsletter-request@linuxsecurity.com
         with "unsubscribe" in the subject of the message.
------------------------------------------------------------------------


[Index of Archives]     [Fedora Announce]     [Linux Crypto]     [Kernel]     [Netfilter]     [Bugtraq]     [USB]     [Fedora Security]

  Powered by Linux