Linux Advisory Watch - May 9th 2003

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



+----------------------------------------------------------------+
|  LinuxSecurity.com                        Linux Advisory Watch |
|  May 9th, 2002                            Volume 4, Number 18a |
+----------------------------------------------------------------+

  Editors:     Dave Wreski                Benjamin Thomas
               dave@xxxxxxxxxxxxxxxxx     ben@xxxxxxxxxxxxxxxxx

Linux Advisory Watch is a comprehensive newsletter that outlines the
security vulnerabilitiaes that have been announced throughout the week.
It includes pointers to updated packages and descriptions of each
vulnerability.

This week, advisories were released for samba, file, tcpsec, krb5, vnc,
snort, epic4, balsa, leksbot, libgtop, fuzz, openssh, MySQL, and
mod_auth_any.  The distributors include SCO, Conectiva, Connectiva,
Debian, Gentoo, and RedHat.

Have you noticed any changes with this week's newsletter? It probably will
not take you long to realize that something is different. First, rather
than sorting security advisories by package, we are now sorting by
distribution. The purpose of that is to allow you to more easily find
information about your desired distribution. Second, the description
information provided with each advisory is shorter and probably more
informative. For example, rather than giving extreme detail on some
vulnerabilities and little to none on others, we are now making an effort
to provide a consistent level of detail for all advisories listed.
Hopefully, these changes will allow this newsletter to be more helpful to
you.

In addition, each week we will include commentary on particularly
significant advisories, security news, opinion, tips, research, and
anything else that may be interesting to readers.

Do you have any suggestions? We are currently in the first phase of a
three-part reconstruction effort to improve the quality of our
newsletters. Our goal is to provide a single place for security advisory
information that can be accessed quickly. How can we make your job easier?
What would you like to see in our newsletters? Do you welcome this change?
Do you have any other suggestions on how we can improve?

We look forward to hearing from you!
news@xxxxxxxxxxxxxxxxx


SECURE YOUR SERVERS WITH 128-BIT SSL ENCRYPTION

Guarantee transmitted data integrity, secure all communication sessions
and more with SSL encryption from Thawte- a leading global certificate
provider. Learn more in our FREE GUIDE--click here to get

Find out more!
http://ads.linuxsecurity.com/cgi-bin/ad_redirect.pl?id=thawte17


At the RealWorld Linux Expo in Toronto, Guardian Digital launched the next
generation of the Community edition of EnGarde Secure Linux - the
secure and easy to manage system for building a complete Internet
presence while protecting your information assets.

Download the FREE trial today!
http://guardiandigital.com/cgi-bin/ad_redirect.pl?id=freetrial


--------------------------------------------------------------------

* Comprehensive SPAM Protection! - Guardian Digital's Secure Mail Suite is
unparalleled in security, ease of management, and features. Open source
technology constantly adapts to new threats. Email firewall, simplified
administration, automatically updated.

 --> http://guardiandigital.com/cgi-bin/ad_redirect.pl?id=mailnews2

--------------------------------------------------------------------

Days of the Honeynet: Attacks, Tools, Incidents - Among other benefits,
running a honeynet makes one acutely aware about "what is going on" out
there. While placing a network IDS outside one's firewall might also
provide a similar flood of alerts, a honeypot provides a unique
prospective on what will be going on when a related server is compromised
used by the intruders.

http://www.linuxsecurity.com/feature_stories/feature_story-141.html


+---------------------------------+
|  Distribution: SCO              | ----------------------------//
+---------------------------------+

 5/7/2003 - samba
   multiple vulnerabilities

   This updates fixes multiple vulnerabilities in samba.
   http://www.linuxsecurity.com/advisories/caldera_advisory-3240.html

 5/7/2003 - file
   buffer overflow vulnerability

   The file command is vulnerable to a buffer overflow when given a
   maliciously crafted binary to examine.
   http://www.linuxsecurity.com/advisories/caldera_advisory-3241.html

 5/7/2003 - tcpsec
   SYN+FIN packet discarding vulnerability

   Allowing TCP packets with both the SYN and FIN bits set
   significantly improve an attacker's chances of circumventing a
   firewall.
   http://www.linuxsecurity.com/advisories/caldera_advisory-3242.html


+---------------------------------+
|  Distribution: Conectiva        | ----------------------------//
+---------------------------------+

 5/5/2003 - krb5
   Multiple vulnerabilities

   Cryptographic weakness, buffer overrun and underrun, faulty length
   checks, and integer signedness vulnerabilities have been fixed.
   http://www.linuxsecurity.com/advisories/connectiva_advisory-3232.html

 5/5/2003 - vnc
   Multiple vulnerabilities

   Cryptographic weakness, buffer overrun and underrun, faulty length
   checks, and integer signedness vulnerabilities have been fixed.
   http://www.linuxsecurity.com/advisories/connectiva_advisory-3233.html


+---------------------------------+
|  Distribution: Connectiva       | ----------------------------//
+---------------------------------+

 5/7/2003 - snort
   integer overflow vulnerability

   There is a remotely exploitable integer overflow vulnerability in
   Snort.
   http://www.linuxsecurity.com/advisories/connectiva_advisory-3243.html


+---------------------------------+
|  Distribution: Debian           | ----------------------------//
+---------------------------------+

 5/5/2003 - epic4
   buffer overflow vulnerability

   A malicious server could craft special reply strings, triggering
   the client to write beyond buffer boundaries.
   http://www.linuxsecurity.com/advisories/debian_advisory-3231.html

 5/6/2003 - balsa
   off-by-one vulnerabilities

   Byrial Jensen discovered a couple of off-by-one buffer overflow in
   the IMAP code of Mutt.
   http://www.linuxsecurity.com/advisories/debian_advisory-3235.html

 5/6/2003 - leksbot
   improper setuid-root execution

   Due to a packaging error, the program /usr/bin/KATAXWR was
   inadvertently installed setuid root.
   http://www.linuxsecurity.com/advisories/debian_advisory-3236.html

 5/7/2003 - libgtop
   Remote buffer overflow vulnerability

   Due to a packaging error, the program /usr/bin/KATAXWR was
   inadvertently installed setuid root.
   http://www.linuxsecurity.com/advisories/debian_advisory-3244.html

 5/7/2003 - fuzz
   Local privilege escalation vulnerability

   Due to a packaging error, the program /usr/bin/KATAXWR was
   inadvertently installed setuid root.
   http://www.linuxsecurity.com/advisories/debian_advisory-3245.html


+---------------------------------+
|  Distribution: Gentoo           | ----------------------------//
+---------------------------------+

 5/2/2003 - openssh
   Information disclosure vulnerability

   Due to a packaging error, the program /usr/bin/KATAXWR was
   inadvertently installed setuid root.
   http://www.linuxsecurity.com/advisories/gentoo_advisory-3226.html


+---------------------------------+
|  Distribution: RedHat           | ----------------------------//
+---------------------------------+

 5/2/2003 - MySQL
   Multiple vulnerabilities

   Due to a packaging error, the program /usr/bin/KATAXWR was
   inadvertently installed setuid root.
   http://www.linuxsecurity.com/advisories/redhat_advisory-3227.html

 5/2/2003 - mod_auth_any
   Arbitrary command execution vulnerability

   Due to a packaging error, the program /usr/bin/KATAXWR was
   inadvertently installed setuid root.
   http://www.linuxsecurity.com/advisories/redhat_advisory-3228.html


------------------------------------------------------------------------
Distributed by: Guardian Digital, Inc.                LinuxSecurity.com

     To unsubscribe email vuln-newsletter-request@xxxxxxxxxxxxxxxxx
         with "unsubscribe" in the subject of the message.
------------------------------------------------------------------------


[Index of Archives]     [Fedora Announce]     [Linux Crypto]     [Kernel]     [Netfilter]     [Bugtraq]     [USB]     [Fedora Security]

  Powered by Linux