+----------------------------------------------------------------+ | LinuxSecurity.com Linux Advisory Watch | | August 29th, 2003 Volume 4, Number 34a | +----------------------------------------------------------------+ Editors: Dave Wreski Benjamin Thomas dave@xxxxxxxxxxxxxxxxx ben@xxxxxxxxxxxxxxxxx Linux Advisory Watch is a comprehensive newsletter that outlines the security vulnerabilitiaes that have been announced throughout the week. It includes pointers to updated packages and descriptions of each vulnerability. This week, advisories were released for docview, unzip, sendmail, iptables, pam_smb, gdm, php, and perl. The distributors include Debian, FreeBSD, Gentoo, Mandrake, Red Hat, Slackware, SuSE, and TurboLinux. Last Saturday, ISECOM released version 2.1 of the Open-Source Security Testing Methodology Manual. For those of you who are not familiar with it, the OSSTMM is an established standard for testing security. It includes information on ethics, legalities, rules of engagement, and many templates that will prove to be useful to those conducting penetration tests. The document is intended to be used by security testing professionals as well as developers, systems analysts, and architects. The OSSTMM provides a very structured method for pen-testing. The manual includes sections on information security, process security, internet technology security, communications security, wireless security, and physical security. Each section module has several detailed parts. For example, information security testing includes posture assessment, information integrity review, human resources review, competitive intelligence scouting, and many others. The beauty of the OSSTMM is that it provides a peer-reviewed and comprehensive listing of tests that should be conducted. Many consulting firms have an established testing methodology. However, the average security professional has a few tricks, but it is by no means comprehensive. The OSSTMM gives everyone an open standard that can be trusted and is not unnecessarily complex. As mentioned previously, the OSSTMM provides pen-testing templates. The examples provided can easily be re-produced in any spreadsheet application to be used multiple times. It is also just as acceptable to re-print or edit the PDF. Templates include one for firewall analysis, ids testing, social engineering, privacy, password cracking, denial of service, and others. If you are involved in security at any level, you should definitely use the OSSTMM. It is extremely valuable. The OSSTMM document and the Institute for Security and Open Methodologies Web site is at the following URL: http://www.isecom.org/ Until next time, Benjamin D. Thomas ben@xxxxxxxxxxxxxxxxx FEATURE: A Practical Approach of Stealthy Remote Administration This paper is written for those paranoid administrators who are looking for a stealthy technique of managing sensitive servers (like your enterprise firewall console or IDS). http://www.linuxsecurity.com/feature_stories/feature_story-149.html -------------------------------------------------------------------- >> FREE Apache SSL Guide from Thawte << Are you worried about your web server security? Click here to get a FREE Thawte Apache SSL Guide and find the answers to all your Apache SSL security needs. Click Command: http://ads.linuxsecurity.com/cgi-bin/newad_redirect.pl?id=vertad_thawteapache -------------------------------------------------------------------- Expert vs. Expertise: Computer Forensics and the Alternative OS No longer a dark and mysterious process, computer forensics have been significantly on the scene for more than five years now. Despite this, they have only recently gained the notoriety they deserve. http://www.linuxsecurity.com/feature_stories/feature_story-147.html --> Take advantage of the LinuxSecurity.com Quick Reference Card! --> http://www.linuxsecurity.com/docs/QuickRefCard.pdf +---------------------------------+ | Distribution: Debian | ----------------------------// +---------------------------------+ 8/26/2003 - unzip directory traversal vulnerability A directory traversal vulnerability in UnZip 5.50 allows attackers tobypass a check for relative pathnames ("../") by placing certain invalidcharacters between the two "." characters. http://www.linuxsecurity.com/advisories/debian_advisory-3570.html 8/26/2003 - libpam-smb buffer overflow vulnerability directory traversal vulnerability If a long password is supplied, this cancause a buffer overflow which could be exploited to execute arbitrarycode with the privileges of the process which invokes PAM services. http://www.linuxsecurity.com/advisories/debian_advisory-3571.html +---------------------------------+ | Distribution: FreeBSD | ----------------------------// +---------------------------------+ 8/26/2003 - sendmail DNS map vulnerability Some versions of sendmail (8.12.0 through 8.12.8) contain aprogramming error in the code that implements DNS maps. A malformedDNS reply packet may cause sendmail to call `free()' on anuninitialized pointer. http://www.linuxsecurity.com/advisories/freebsd_advisory-3572.html +---------------------------------+ | Distribution: Gentoo | ----------------------------// +---------------------------------+ 8/25/2003 - vmware-server env variable vulnerability DNS map vulnerability By manipulating the VMware GSX Server and VMware Workstationenvironment variables, a program such as a shell session withroot privileges could be started when a virtual machine islaunched. http://www.linuxsecurity.com/advisories/gentoo_advisory-3573.html +---------------------------------+ | Distribution: Mandrake | ----------------------------// +---------------------------------+ 8/27/2003 - sendmail dns map vulnerability Due to wrong initialization of RESOURCE_RECORD_T structures, if sendmail receives a bad DNS reply it will call free() on random addresses which usually causes sendmail to crash. http://www.linuxsecurity.com/advisories/mandrake_advisory-3574.html +---------------------------------+ | Distribution: Red Hat | ----------------------------// +---------------------------------+ 8/26/2003 - iptables upgrade fix Recent updates to the kernel in Red Hat Linux versions 7.1, 7.2, 7.3 and8.0 did not also update the iptables utility, causing functions such asowner match to stop working. http://www.linuxsecurity.com/advisories/redhat_advisory-3575.html 8/27/2003 - pam_smb remote buffer overflow vulnerability On systems that use pam_smb and are configured to authenticate aremotely accessible service, an attacker can exploit this bug andremotely execute arbitrary code. http://www.linuxsecurity.com/advisories/redhat_advisory-3576.html +---------------------------------+ | Distribution: Slackware | ----------------------------// +---------------------------------+ 8/25/2003 - GDM file permission vulnerability This fixes a bug where a local user may read any system file by making a symlink to it from $HOME/.xsession-errors and using GDM's error browser to read the file. http://www.linuxsecurity.com/advisories/slackware_advisory-3577.html 8/26/2003 - unzip directory traversal vulnerability These fix a security issue where a specially crafted archive mayoverwrite files (including system files anywhere on the filesystem)upon extraction by a user with sufficient permissions. http://www.linuxsecurity.com/advisories/slackware_advisory-3578.html +---------------------------------+ | Distribution: SuSe | ----------------------------// +---------------------------------+ 8/26/2003 - sendmail dns map vulnerability When sendmail receives an invalid DNS response it tries to call free on random data which results in a process crash. http://www.linuxsecurity.com/advisories/suse_advisory-3579.html +---------------------------------+ | Distribution: TurboLinux | ----------------------------// +---------------------------------+ 8/27/2003 - php XSS vulnerability The cross-site scripting vulnerability is in the transparent SID support capability for PHP. http://www.linuxsecurity.com/advisories/turbolinux_advisory-3580.html 8/27/2003 - gdm file permission vulnerability GDM contains a bug where GDM will run as root when examining the ~/.xsession-errors file when using the "examine session errors" feature, allowing local users the ability to read any text file on the system by creating a symlink. http://www.linuxsecurity.com/advisories/turbolinux_advisory-3581.html 8/27/2003 - perl CGI.pm XSS vulnerability A cross-site scripting vulnerability exists in the start_form() function from CGI.pm http://www.linuxsecurity.com/advisories/turbolinux_advisory-3582.html ------------------------------------------------------------------------ Distributed by: Guardian Digital, Inc. LinuxSecurity.com To unsubscribe email vuln-newsletter-request@xxxxxxxxxxxxxxxxx with "unsubscribe" in the subject of the message. ------------------------------------------------------------------------