Linux Advisory Watch - January 24th 2003

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



+----------------------------------------------------------------+
|  LinuxSecurity.com                        Linux Advisory Watch |
|  January 24th, 2002                        Volume 4, Number 4a |
+----------------------------------------------------------------+

  Editors:     Dave Wreski                Benjamin Thomas
               dave@linuxsecurity.com     ben@linuxsecurity.com

Linux Advisory Watch is a comprehensive newsletter that outlines the
security vulnerabilitiaes that have been announced throughout the week.
It includes pointers to updated packages and descriptions of each
vulnerability.

This week, advisories were released for cups, canna, cvs, dhcp, libpng,
kde, fnord, vim, printer-drivers, python, and susehelp. The distributors
include Caldera, Conectiva, Debian, Gentoo, Mandrake, Red Hat, Slackware,
and SuSE.

ENCRYPTION + AUTHENTICATION = TRUST
You may think people will regard your business as trustworthy because
you.ve got a 128-bit encryption certificate, but encryption does not
guarantee trust.  Thawte believes in rigorous authentication - Download
our FREE Authentication Guide


http://ads.linuxsecurity.com/cgi-bin/ad_redirect.pl?id=thawte5

Patching It Up - Patching and upgrading software requires more than
running a few commands. Having a patch recovery plan, communicating with
developers on that server, and knowing who to contact in case of a botched
patch job is critical.

http://www.linuxsecurity.com/feature_stories/feature_story-135.html

---------------------------------------------------------------------

CONCERNED ABOUT THE NEXT THREAT? EnGarde is the undisputed winner!
Hardened Linux Puts Hackers EnGarde! Winner of the Network Computing
Editor's Choice Award, EnGarde "walked away with our Editor's Choice award
thanks to the depth of its security strategy..." Find out what the other
Linux vendors are not telling you.

http://ads.linuxsecurity.com/cgi-bin/ad_redirect.pl?id=engarde2

---------------------------------------------------------------------

LINUXSECURITY.COM FEATURE: Newest Members of the Team Just to give
everyone an idea about who writes these articles and feature stories that
we spend so much of our time reading each day, I have decided to ask Brian
Hatch and Duane Dunston, the newest members of the LinuxSecurity.com team,
a few questions.

http://www.linuxsecurity.com/feature_stories/feature_story-134.html


+---------------------------------+
|  Package:  cups                 | ----------------------------//
|  Date: 01-20-2003               |
+---------------------------------+

Description:
Allows remote attackers to add printers without authentication via a
certain UDP packet, that can then be used to perform unauthorized
activities such as stealing the local root certificate for the
administration server via a "need authorization" page.

Vendor Alerts:

 Caldera:
  ftp://ftp.sco.com/pub/updates/OpenLinux/3.1.1/
  Server/CSSA-2003-004.0/RPMS
  cups-1.1.10-6.i386.rpm
  c27cfc1dc18d8c4769c0f8247f9c9bf0

  Caldera Vendor Advisory:
  http://www.linuxsecurity.com/advisories/caldera_advisory-2781.html




 Debian:
  http://security.debian.org/pool/updates/main/c/
  cupsys/cupsys_1.0.4-12.1_i386.deb
  3e977f66990a5d169d24088c22ffba34

  Debian Vendor Advisory:
  http://www.linuxsecurity.com/advisories/debian_advisory-2776.html




+---------------------------------+
|  Package:  canna                | ----------------------------//
|  Date: 01-20-2003               |
+---------------------------------+

Description:
Buffer overflow in canna allows local users to execute arbitrary code as
the bin user.  Canna does not properly validate requests, which allows
remote attackers to cause a denial of service or information leak.

Vendor Alerts:

 Caldera:
  ftp://ftp.sco.com/pub/updates/OpenLinux/3.1.1/
  Server/CSSA-2003-005.0/RPMS
  canna-3.5b2-8.i386.rpm
  91acd89bd9041e06c0a22e4d73b5bb1f

  Caldera Vendor Advisory:
  http://www.linuxsecurity.com/advisories/caldera_advisory-2790.html




+---------------------------------+
|  Package:  cvs                  | ----------------------------//
|  Date: 01-21-2003               |
+---------------------------------+

Description:
Besides fixing the double free vulnerability, the new packages provided
with this update now have the Checkin-prog and Update-prog commands
disabled.

Vendor Alerts:

 Conectiva:
  ftp://atualizacoes.conectiva.com.br/8/RPMS/
  cvs-1.11-9U80_1cl.i386.rpm

  ftp://atualizacoes.conectiva.com.br/8/RPMS/
  cvs-doc-1.11-9U80_1cl.i386.rpm

  Conectiva Vendor Advisory:
  http://www.linuxsecurity.com/advisories/connectiva_advisory-2788.html



 Debian:
  http://security.debian.org/pool/updates/main/c/
  cvs/cvs_1.10.7-9.2_i386.deb
  Size/MD5 checksum:   455974 32924918a5a027f287c1fff64139aa98

  Debian Vendor Advisory:
  http://www.linuxsecurity.com/advisories/debian_advisory-2782.html

 Gentoo:
  Gentoo Vendor Advisory:
  http://www.linuxsecurity.com/advisories/gentoo_advisory-2783.html

 Mandrake:
  Mandrake Vendor Advisory:
  http://www.linuxsecurity.com/advisories/mandrake_advisory-2786.html


 Red Hat:
  ftp://updates.redhat.com/8.0/en/os/i386/cvs-1.11.2-8.i386.rpm
  612a4814740dc8544619a22487b4652f

  Red Hat Vendor Advisory:
  http://www.linuxsecurity.com/advisories/redhat_advisory-2780.html

 Slackware:
  ftp://ftp.slackware.com/pub/slackware/
  slackware-8.1/patches/packages/cvs-1.11.5-i386-1.tgz

  Slackware Vendor Advisory:

http://www.linuxsecurity.com/advisories/slackware_advisory-2799.html


 SuSE:
  SuSE Vendor Advisory:
  http://www.linuxsecurity.com/advisories/suse_advisory-2797.html





+---------------------------------+
|  Package:  dhcp                 | ----------------------------//
|  Date: 01-23-2003               |
+---------------------------------+

Description:
During an internal source code audit, the ISC developers found several
stack-based buffer overflow vulnerabilities[2,3] in the error handling
routines of the minires library. This library is used by the NSUPDATE
feature, which is present in dhcp versions newer than 3.0 and allows the
DHCP server to dynamically update DNS server records.


Vendor Alerts:

 PLEASE SEE VENDOR ADVISORY FOR UPDATE

 Conectiva Vendor Advisory:
  http://www.linuxsecurity.com/advisories/connectiva_advisory-2805.html


 Debian Vendor Advisory:
  http://www.linuxsecurity.com/advisories/debian_advisory-2773.html

 Gentoo Vendor Advisory:
  http://www.linuxsecurity.com/advisories/gentoo_advisory-2772.html

 Mandrake Vendor Advisory:
  http://www.linuxsecurity.com/advisories/mandrake_advisory-2791.html


 Slackware Vendor Advisory:
  http://www.linuxsecurity.com/advisories/slackware_advisory-2779.html


 SuSE Vendor Advisory:
  http://www.linuxsecurity.com/advisories/suse_advisory-2777.html



+---------------------------------+
|  Package:  libpng               | ----------------------------//
|  Date: 01-23-2003               |
+---------------------------------+

Description:
Programs such as web browsers and various others common applications make
use of libpng. An attacker could exploit this vulnerability to remotely
run arbitrary code or crash such applications by using a specially crafted
png image.

Vendor Alerts:

 Conectiva:
  PLEASE SEE VENDOR ADVISORY FOR UPDATE

  Conectiva Vendor Advisory:

http://www.linuxsecurity.com/advisories/connectiva_advisory-2806.html



 Mandrake:
  Mandrake Vendor Advisory:
  http://www.linuxsecurity.com/advisories/mandrake_advisory-2787.html



+---------------------------------+
|  Package:  kde                  | ----------------------------//
|  Date: 01-22-2003               |
+---------------------------------+

Description:
The KDE team discovered several vulnerabilities in the K Desktop
Environment.  In some instances KDE fails to properly quote parameters of
instructions passed to a command shell for execution. These parameters may
incorporate data such as URLs, filenames and e-mail addresses, and this
data may be provided remotely to a victim in an e-mail, a webpage or files
on a network filesystem or other untrusted source.

Vendor Alerts:

 Debian:
  PLEASE SEE VENDOR ADVISORY FOR UPDATE

  kdeadmin - Debian Vendor Advisory:
  http://www.linuxsecurity.com/advisories/debian_advisory-2793.html

  kdegraphics - Debian Vendor Advisory:
  http://www.linuxsecurity.com/advisories/debian_advisory-2794.html

  kdelibs - Debian Vendor Advisory:
  http://www.linuxsecurity.com/advisories/debian_advisory-2795.html

  kdenetwork - DebianVendor Advisory:
  http://www.linuxsecurity.com/advisories/debian_advisory-2801.html

  kdepim - Debian Vendor Advisory:
  http://www.linuxsecurity.com/advisories/debian_advisory-2802.html

  kdesdk - Debian Vendor Advisory:
  http://www.linuxsecurity.com/advisories/debian_advisory-2803.html

  kdegamers - Debian Vendor Advisory:
  http://www.linuxsecurity.com/advisories/debian_advisory-2807.html


 Gentoo:
  Gentoo Vendor Advisory:
  http://www.linuxsecurity.com/advisories/gentoo_advisory-2774.html




+---------------------------------+
|  Package:  fnord                | ----------------------------//
|  Date: 01-17-2003               |
+---------------------------------+

Description:
"fnord 1.6 contained a buffer overrun in the CGI code. However, since the
function does not return, this does not appear to be exploitable."

Vendor Alerts:

 Gentoo:
  PLEASE SEE VENDOR ADVISORY FOR UPDATE

  Gentoo Vendor Advisory:
  http://www.linuxsecurity.com/advisories/gentoo_advisory-2771.html



+---------------------------------+
|  Package:  vim                  | ----------------------------//
|  Date: 01-22-2003               |
+---------------------------------+

Description:
"Opening a specially crafted text file with vim can execute arbitrary
shell commands and pass parameters to them."

Vendor Alerts:

 Gentoo:
  PLEASE SEE VENDOR ADVISORY FOR UPDATE

  Gentoo Vendor Advisory:
  http://www.linuxsecurity.com/advisories/gentoo_advisory-2796.html

  Red Hat Vendor Advisory:
  http://www.linuxsecurity.com/advisories/redhat_advisory-2767.html


+---------------------------------+
|  Package:  printer-drivers      | ----------------------------//
|  Date: 01-21-2003               |
+---------------------------------+

Description:
Karol Wiesek and iDefense disovered three vulnerabilities in the
printer-drivers package and tools it installs. These vulnerabilities allow
a local attacker to empty or create any file on the filesystem.


Vendor Alerts:

 Mandrake:
  PLEASE SEE VENDOR ADVISORY FOR UPDATE

  Mandrake Vendor Advisory:
  http://www.linuxsecurity.com/advisories/mandrake_advisory-2798.html



+---------------------------------+
|  Package:  python               | ----------------------------//
|  Date: 01-21-2003               |
+---------------------------------+

Description:
Zack Weinberg discovered that os._execvpe from os.py in Python 2.2.1 and
earlier creates temporary files with predictable names.  This could allow
local users to execute arbitrary code via a symlink attack.

Vendor Alerts:

 Red Hat:
  PLEASE SEE VENDOR ADVISORY FOR UPDATE

  Red Hat Vendor Advisory:
  http://www.linuxsecurity.com/advisories/redhat_advisory-2789.html




+---------------------------------+
|  Package:  susehelp             | ----------------------------//
|  Date: 01-20-2003               |
+---------------------------------+

Description:
Remote attackers can insert certain characters in CGI queries to the
susehelp system tricking it into executing arbitrary code as the "wwwrun"
user. Please note that this is only a vulnerability if you have a web
server running and configured to allow access to the susehelp system by
remote sites.

 Vendor Alerts:

 SuSE:
  ftp://ftp.suse.com/pub/suse/i386/update/8.1/rpm/
  noarch/susehelp-2002.09.05-51.noarch.rpm
  6dde3d487385fd6a935643b1a0d92b86

  SuSE Vendor Advisory:
  http://www.linuxsecurity.com/advisories/suse_advisory-2775.html

------------------------------------------------------------------------
Distributed by: Guardian Digital, Inc.                LinuxSecurity.com

     To unsubscribe email vuln-newsletter-request@linuxsecurity.com
         with "unsubscribe" in the subject of the message.
------------------------------------------------------------------------


[Index of Archives]     [Fedora Announce]     [Linux Crypto]     [Kernel]     [Netfilter]     [Bugtraq]     [USB]     [Fedora Security]

  Powered by Linux