Linux Advisory Watch - June 27th 2003

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



+----------------------------------------------------------------+
|  LinuxSecurity.com                        Linux Advisory Watch |
|  June 27th, 2002                          Volume 4, Number 25a |
+----------------------------------------------------------------+

  Editors:     Dave Wreski                Benjamin Thomas
               dave@xxxxxxxxxxxxxxxxx     ben@xxxxxxxxxxxxxxxxx

Linux Advisoiry Watch is a comprehensive newsletter that outlines the
security vulnerabilities that have been announced throughout the week.
It includes pointers to updated packages and descriptions of each
vulnerability.

This week, advisories were released for buzilla, ethereal, tcptraceroute,
Netscape, ypserv, XFree86, xpdf, orville-write, eldav, xbl, webfs, osh,
and foomatic. The distributors include Conectiva, Debian, Mandrake,
RedHat, TurboLinux, and YellowDog. Like most weeks, the more proactive
vendors released several new advisories and others submitted advisories
for older issues. Overall, this week has not been very active.

I wanted to take a moment to thank the readers for the wonderful feedback
that we received.  If you missed last week's Advisory Watch, I discussed
Gartner's latest report that suggests IDS technology will be obsolete by
2005.  Although I find this report very interesting, I did not expect the
amount of feedback that I received.  Most people agreed with my conclusion
that a majority of all system vulnerabilities could be alleviated if
administrators would simply patch his/her system quickly.

An insightful reader by the name of Jeremy quickly wrote, "Hear hear!
But you can't really blame the sysadmins."  He continued to discuss how
the inability to maintain systems is not the fault of the administrator.
He pointed out that the burden ultimately falls on upper management.
System administrators only do what they are told to do.  Adequate funding
and support is necessary to maintain a secure and stable system.

Jeff Cours, wrote the following:

  I think the fundamental problem is that software engineering is still a
  very young field of engineering. I run a Linux box at home. Because I'm
  not a full time administrator and don't have time to keep track of
  vulnerabilities as they come up, I use Red Hat Network. Even then, I am
  constantly surprised at the number and frequency of updates that come
  down the pipe. The fact that my system needs so much maintenance is, I
  think, a sign that we don't yet know how to engineer software with the
  same level of reliability that we can engineer, say, a bridge.

  Here, as I see them, are some of the open issues
  in software engineering:

 1. Gotos, Pointers and Threads

  Gotos, pointers, and threads are all paradigms that have the same
  underlying problem of unpredictability. Gotos can transfer control to a
  huge range of places within the program. Pointers allow data access to a
  huge range of places. And threads allow an enormous number of possible
  orders of execution. (Exceptions and interrupts are similar to threads
  in this respect, but they're a little less extreme.) All three paradigms
  tremendously increase the number of cases the engineer has to analyze to
  make sure the code properly handles them. Structured programming sharply
  reduced the number of gotos, but pointers and threads are still in
  widespread use. I think we'll either need new paradigms that are as
  useful as threads and pointers but don't introduce as many cases to
  analyze, like structured programming did for gotos, or we'll need more
  powerful analysis techniques.

 2. Fault Propagation

  The cables that hold up the Golden Gate Bridge are made of multiple
  strands of wire. One reason for that design choice is that, if a single
  strand breaks, the break is not likely to affect neighboring strands.

  Unfortunately, we don't yet know how to do that same thing with
  software. A bug in one part of the code might stay local (say, just
  affecting the output of a print statement) or its effects might
  propagate and cause the whole application, or in some cases the whole
  operating system, to crash. As far as I know, fault propagation in
  software is still an area of active research.

 3. Predictability

  When civil engineers build a bridge, they have a good idea before they
  build it how much wind or how strong an earthquake it can withstand, how
  much load it will bear, and how much traffic can go across it. Software
  engineering hasn't yet reached that point. We've made a great start:
  quality assurance techniques can say roughly how many bugs remain in a
  given release, and complexity analysis helps us choose one algorithm
  over another, but we don't yet have analysis tools that will let us
  accurately predict how reliable a program will be, how fast it will run,
  how well it will handle unusual inputs, or how long it will take to
  write it.

  I don't mean to say that software engineers are slacking. On the
  contrary, we've made tremendous progress, but we've had only 50 or 60
  years to work on the problem. It would be interesting to survey the more
  mature fields of engineering and see how long it took them to get to
  that state. I wouldn't be surprised if it takes 100-150 years and a few
  bridge collapses (or equivalent) for a field of engineering to mature,
  which would mean we should see the number of security patches start to
  drop off somewhere in the second half of this century.

  In the meantime, you're right, we can expect to have to patch our
  systems regularly. Here, I think systems like Red Hat Network and
  Debian's package management have a lot to offer: they recognize that
  human nature is much harder to change than technology, so they make it
  as easy as possible to find out that an update needs to happen and to
  apply it. Yes, exhorting sysadmins to patch their systems is also
  important, but it seems to me that it's only one small piece of a much
  larger issue.


Jeff made several very good points.  I particularly like his analogy
comparing software engineering to conventional engineering projects. Also
this week, I spoke with a security consultant from one of the Big 5
Accounting firms.  I asked him what his opinion was on the Gartner report.
He replied by stating that he did not believe IDS would be dead by 2005,
but only IDS as we know it today.  He pointed out that IDS technology will
get more sophisticated, but there will still be a need for it.  He had a
hard time agreeing that they will be obsolete. What do you think?  I tend
to agree.  I see the technology getting better, but I don't see it going
away.  Perhaps the real issue here is that people are now beginning to
realize that an IDS is not an all-in-one solution.  It is merely a single
tool in an entire tool chest.

Remember Ye Olde Security Wisdom, "Security Is Not a Product; It's a
Process" (Schneier, Crypto-Gram: December 15 1999)

Everyone wish me luck; I'm getting married this Saturday!

Take care,
Benjamin D. Thomas
ben@xxxxxxxxxxxxxxxxx


>> FREE Apache SSL Guide from Thawte <<
Are you worried about your web server security?  Click here to get a FREE
Thawte Apache SSL Guide and find the answers to all your Apache SSL
security needs.

 Click Command:
 http://ads.linuxsecurity.com/cgi-bin/ad_redirect.pl?id=thawte25

FEATURE: Real-Time Alerting with Snort
Real-time alerting is a feature of an IDS or any other monitoring
application that notifies a person of an event in an acceptably short
amount of time. The amount of time that is acceptable is different
for every person.

http://www.linuxsecurity.com/feature_stories/feature_story-144.html


--------------------------------------------------------------------

* Comprehensive SPAM Protection! - Guardian Digital's Secure Mail Suite is
unparalleled in security, ease of management, and features. Open source
technology constantly adapts to new threats. Email firewall, simplified
administration, automatically updated.

 --> http://guardiandigital.com/cgi-bin/ad_redirect.pl?id=mailnews2

--------------------------------------------------------------------

LINSECURITY.COM FEATURE:
Intrusion Detection Systems: An Introduction
By: Alberto Gonzalez

Intrusion Detection is the process and methodology of inspecting data for
malicious, inaccurate or anomalous activity. At the most basic levels
there are two forms of Intrusion Detection Systems that you will
encounter: Host and Network based.

http://www.linuxsecurity.com/feature_stories/feature_story-143.html


+---------------------------------+
|  Distribution: Conectiva        | ----------------------------//
+---------------------------------+

 6/20/2003 - buzilla
   vulnerabilities

   This update fixes several problems with the bugzilla package
   shipped with Conectiva Linux 9
   http://www.linuxsecurity.com/advisories/connectiva_advisory-3378.html

 6/20/2003 - 'BitchX' remote vulnerabilities
   vulnerabilities

   This update fixes two remote vulnerabilities in Bitchx
   http://www.linuxsecurity.com/advisories/connectiva_advisory-3379.html

 6/20/2003 - 'netpbm' math overflow vulnerabilities
   vulnerabilities

   Alan Cox and Al Viro discovered[1] several "math overflow"
   vulnerabilities in netpbm versions <= 9.20
   http://www.linuxsecurity.com/advisories/connectiva_advisory-3380.html

 6/20/2003 - 'apache 2' vulnerabiltiies
   vulnerabilities

   This update addresses two security vulnerabilities which have been
   fixed in the recently released[2] 2.0.46 version
   http://www.linuxsecurity.com/advisories/connectiva_advisory-3381.html

 6/25/2003 - ethereal
   multiple vulnerabilities

   This update announcement addresses several vulnerabilities in
   ethereal versions <= 0.9.12.
   http://www.linuxsecurity.com/advisories/connectiva_advisory-3388.html


+---------------------------------+
|  Distribution: Debian           | ----------------------------//
+---------------------------------+

 6/20/2003 - 'orville-write' buffer overflows
   multiple vulnerabilities

   Orville Write, a replacement for the standard write(1) command,
   contains a number of buffer overflows.  These could be exploited
   to gain either gid tty or root privileges, depending on the
   configuration selected when the package is installed.
   http://www.linuxsecurity.com/advisories/debian_advisory-3382.html

 6/20/2003 - 'eldav' temp file vulnerabilities
   multiple vulnerabilities

   eldav, a WebDAV client for Emacs, creates temporary files without
   taking appropriate security precautions.  This vulnerability could
   be exploited by a local user to create or overwrite files with the
   privileges of the user running emacs and eldav.
   http://www.linuxsecurity.com/advisories/debian_advisory-3383.html

 6/20/2003 - 'xbl' buffer overflow
   multiple vulnerabilities

   Steve Kemp discovered several buffer overflows in xbl, a game,
   which can be triggered by long command line arguments.  This
   vulnerability could be exploited by a local attacker to gain gid
   'games'.
   http://www.linuxsecurity.com/advisories/debian_advisory-3384.html

 6/20/2003 - 'webfs' buffer overflow
   multiple vulnerabilities

   webfs, a lightweight HTTP server for static content, contains a
   buffer overflow whereby a long Request-URI in an HTTP request
   could cause arbitrary code to be executed.
   http://www.linuxsecurity.com/advisories/debian_advisory-3385.html

 6/20/2003 - 'osh' buffer overflows
   multiple vulnerabilities

   Steve Kemp discovered that osh, a shell intended to restrict the
   actions of the user, contains two buffer overflows, in processing
   environment variables and file redirections.  These
   vulnerabilities could be used to execute arbitrary code,
   overriding any restrictions placed on the shell.
   http://www.linuxsecurity.com/advisories/debian_advisory-3386.html

 6/23/2003 - tcptraceroute
   root privilege vulnerability

   tcptraceroute is a setuid-root program which drops root privileges
   after obtaining a file descriptor used for raw packet capture.
   However, it did not fully relinquish all privileges, and in the
   event of an exploitable vulnerability, root privileges could be
   regained.
   http://www.linuxsecurity.com/advisories/debian_advisory-3389.html


+---------------------------------+
|  Distribution: Mandrake         | ----------------------------//
+---------------------------------+

 6/25/2003 - ethereal
   arbitrary code execution vulnerability

   A number of string handling bugs were found in the packet
   dissectors in ethereal that can be exploited using specially
   crafted packets to cause ethereal to consume excessive amounts of
   memory, crash, or even execute arbitray code.
   http://www.linuxsecurity.com/advisories/mandrake_advisory-3390.html


+---------------------------------+
|  Distribution: RedHat           | ----------------------------//
+---------------------------------+

 6/20/2003 - Netscape
   Multiple vulnerabilities

   A number of string handling bugs were found in the packet
   dissectors in ethereal that can be exploited using specially
   crafted packets to cause ethereal to consume excessive amounts of
   memory, crash, or even execute arbitray code.
   http://www.linuxsecurity.com/advisories/redhat_advisory-3387.html

 6/25/2003 - ypserv
   denial of service vulnerability

   A vulnerability has been discovered in the ypserv NIS server prior
   to version 2.7.
   http://www.linuxsecurity.com/advisories/redhat_advisory-3391.html

 6/25/2003 - XFree86
   multiple vulnerabilities

   There are multiple vulnerabilities in XFree86.
   http://www.linuxsecurity.com/advisories/redhat_advisory-3392.html


+---------------------------------+
|  Distribution: TurboLinux       | ----------------------------//
+---------------------------------+

 6/24/2003 - xpdf
   arbitrary command execution vulnerability

   If a victim clicks on a hyperlink contained within a malicious PDF
   file, an attacker may be able to execute arbitrary commands with
   the privileges of the victim.
   http://www.linuxsecurity.com/advisories/turbolinux_advisory-3393.html


+---------------------------------+
|  Distribution: YellowDog        | ----------------------------//
+---------------------------------+

 6/25/2003 - foomatic
   multiple vulnerabilities

   There are multiple vulnerabilities in the foomatic package.
   http://www.linuxsecurity.com/advisories/yellowdog_advisory-3394.html

 6/25/2003 - xpdf
   arbitrary command execution vulnerability

   Martyn Gilmore discovered a flaw in various PDF viewers and
   readers. An attacker can embed malicious external-type hyperlinks
   that if activated or followed by a victim can execute arbitrary
   shell commands.
   http://www.linuxsecurity.com/advisories/yellowdog_advisory-3395.html

 6/25/2003 - hanterm-xf arbitrary command execution vulnerability
   arbitrary command execution vulnerability

   An attacker can craft an escape sequence that sets the window
   title of a victim using Hangul Terminal to an arbitrary command
   and then report it to the command line.
   http://www.linuxsecurity.com/advisories/yellowdog_advisory-3396.html

------------------------------------------------------------------------
Distributed by: Guardian Digital, Inc.                LinuxSecurity.com

     To unsubscribe email vuln-newsletter-request@xxxxxxxxxxxxxxxxx
         with "unsubscribe" in the subject of the message.
------------------------------------------------------------------------


[Index of Archives]     [Fedora Announce]     [Linux Crypto]     [Kernel]     [Netfilter]     [Bugtraq]     [USB]     [Fedora Security]

  Powered by Linux