Linux Advisory Watch - December 12th 2003

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



+----------------------------------------------------------------+
|  LinuxSecurity.com                        Linux Advisory Watch |
|  December 12th, 2003                      Volume 4, Number 49a |
+----------------------------------------------------------------+

  Editors:     Dave Wreski                Benjamin Thomas
               dave@xxxxxxxxxxxxxxxxx     ben@xxxxxxxxxxxxxxxxx

Linux Advisory Watch is a comprehensive newsletter that outlines the
security vulnerabilities that have been announced throughout the week.
It includes pointers to updated packages and descriptions of each
vulnerability.

This week, advisories were released for GnuPG, cvs, rsync, screen, and
ethereal.  The distributors include Conectiva, Fedora, Gentoo, Immunix,
Mandrake, Red Hat, and Slackware.

---

>> Get Thawtes NEW Step-by-Step SSL Guide for Apache <<

In this guide you will find out how to test, purchase, install and use a
Thawte Digital Certificate on you Apache web server. Throughout, best
practices for set-up are highlighted to help you ensure efficient ongoing
management of your encryption keys and digital certificates.

Get your copy of this new guide now:
http://ads.linuxsecurity.com/cgi-bin/ad_redirect.pl?id=thawte29

---

Data integrity has never been more important.  A few weeks ago, several
Debian servers were compromised.  Soon after that, it was reported that
the Gentoo rsync server was also compromised.  Although these incidents
appear to be under control, something catastrophic could have happened.
Suppose malicious code was planted on the Debian or Gentoo servers.
Later, users wishing to install or update their operating systems
downloaded and executed this code. Sooner or later, it could have resulted
in thousands of vulnerable systems across the Internet.

One problem that we are faced with today is trusting the code that we
execute.  How can we ensure that it comes from the correct source?  When
applying security patches, how do we know that this comes from the
distributor and not a rouge source?  A helpful solution is to use MD5
checksums.  Briefly, MD5 (message-digest algorithm) is the most widely
used hashing algorithm. With this, it is reasonable to assume that the
code you wish to execute came from the source in which you trust.  For
example, if I needed to send a friend a binary, I may also choose to send
a MD5 checksum.  (d1ccac94dadcf1686f6692719845991c)  With this, the friend
can verify the integrity of the binary that I sent.  In Linux and most
other operating systems, to generate a MD5 checksum, the command 'md5sum
filename(s)' is used.

When applying security patches, it is important to check the integrity of
the patches that are downloaded.  When downloading security patches, it is
important to check the source of where the download is coming from, and
also verify the file(s) with 'md5sum'.  This week, there is a Red Hat
GnuPG advisory and patch. If you are patching a Red Hat server, after
downloading the files, the MD5 checksums can be checked against the ones
found in the advisory.

e1f31f4a07ebb5b4040f8f6ca3816cc4 9/en/os/SRPMS/gnupg-1.2.1-9.src.rpm
604a2fb5b809ec99280871f46507f4a1 9/en/os/i386/gnupg-1.2.1-9.i386.rpm

If they differ with those generated on your machine, there is an integrity
problem.  Either the code, or the hash was published wrong and it should
be investigated.  Checking MD5s does not absolutely guarantee data
integrity because they could have also been altered.  However, because the
MD5 hash values and the code are distributed independently, it can give a
reasonable assurance that the code can be trusted.  Checking a MD5 will
only take several seconds and will provide another level of assurance.

Until next time, cheers!
Benjamin D. Thomas
ben@xxxxxxxxxxxxxxxxx

---

Guardian Digital Customers Protected From Linux Kernel Vulnerability

As a result of the planning and secure design of EnGarde Secure Linux, the
company's flagship product, Guardian Digital customers are securely
protected from a vulnerability that lead to the complete compromise of
several high-profile open source projects, including those belonging to
the Debian Project.

http://www.linuxsecurity.com/feature_stories/feature_story-155.html

--------------------------------------------------------------------

CONCERNED ABOUT THE NEXT THREAT? EnGarde is the undisputed winner!
Hardened Linux Puts Hackers EnGarde! Winner of the Network Computing
Editor's Choice Award, EnGarde "walked away with our Editor's Choice award
thanks to the depth of its security strategy..." Find out what the other
Linux vendors are not telling you.

http://ads.linuxsecurity.com/cgi-bin/ad_redirect.pl?id=engarde2

--------------------------------------------------------------------

OpenVPN: An Introduction and Interview with Founder, James Yonan In this
article, Duane Dunston gives a brief introduction to OpenVPN and
interviews its founder James Yonan.

http://www.linuxsecurity.com/feature_stories/feature_story-152.html


-->  Take advantage of the LinuxSecurity.com Quick Reference Card!
-->  http://www.linuxsecurity.com/docs/QuickRefCard.pdf

+---------------------------------+
|  Distribution: Conectiva        | ----------------------------//
+---------------------------------+

 12/9/2003 - GnuPG
   signing key vulnerability

   Phong Nguyen discovered[2] a vulnerability (CAN-2003-0971[3]) in the
   way GnuPG deals with type 20 ElGamal sign+encrypt keys which allows an
   attacker to recover the corresponding private key from a signature.
   http://www.linuxsecurity.com/advisories/conectiva_advisory-3858.html


+---------------------------------+
|  Distribution: Fedora           | ----------------------------//
+---------------------------------+

 12/11/2003 - GnuPG
   Signing key vulnerability

   Phong Nguyen identified a severe bug in the way GnuPG creates and uses
   ElGamal keys, when those keys are used both to sign and encrypt data.
   This vulnerability can be used to trivially recover the private key.
   http://www.linuxsecurity.com/advisories/fedora_advisory-3863.html


+---------------------------------+
|  Distribution: Gentoo           | ----------------------------//
+---------------------------------+

 12/11/2003 - cvs
   Unauthorized access vulnerability

   This release fixes a security issue with no known exploits that could
   cause previous versions of CVS to attempt to create files and
   directories in the filesystem root.
   http://www.linuxsecurity.com/advisories/gentoo_advisory-3859.html

 12/12/2003 - app-crypt/gnupg Multiple vulnerabilities
   Unauthorized access vulnerability

   Two flaws have been found in GnuPG 1.2.3 including a format string
   vulnerability and the compromise of ElGamal signing keys.
   http://www.linuxsecurity.com/advisories/gentoo_advisory-3871.html


+---------------------------------+
|  Distribution: Immunix          | ----------------------------//
+---------------------------------+

 12/8/2003 - rsync
   Heap overflow vulnerability

   The rsync team has alerted us to a remotely exploitable heap overflow
   that is being actively exploited. As the overflow is on the heap,
   StackGuard offers no protection to this vulnerability.
   http://www.linuxsecurity.com/advisories/immunix_advisory-3854.html


+---------------------------------+
|  Distribution: Mandrake         | ----------------------------//
+---------------------------------+

 12/8/2003 - cvs
   Unauthorized access vulnerability

   A vulnerability was discovered in the CVS server < 1.11.10 where a
   malformed module request could cause the CVS server to attempt to
   create directories and possibly files at the root of the filesystem
   holding the CVS repository.
   http://www.linuxsecurity.com/advisories/mandrake_advisory-3855.html

 12/8/2003 - screen
   Buffer overflow vulnerability

   A vulnerability was discovered and fixed in screen by Timo Sirainen who
   found an exploitable buffer overflow that allowed privilege escalation.
   http://www.linuxsecurity.com/advisories/mandrake_advisory-3856.html

 12/11/2003 - cvs
   Unauthorized access vulnerability (correction)

   The previous updates had an incorrect temporary directory hard-coded in
   the cvs binary for 9.1 and 9.2.  This update corrects the problem.
   http://www.linuxsecurity.com/advisories/mandrake_advisory-3860.html

 12/11/2003 - ethereal
   Multiple vulnerabilities

   A number of vulnerabilities were discovered in ethereal that, if
   exploited, could be used to make ethereal crash or run arbitrary code
   by injecting malicious malformed packets onto the wire or by convincing
   someone to read a malformed packet trace file.
   http://www.linuxsecurity.com/advisories/mandrake_advisory-3861.html


+---------------------------------+
|  Distribution: Red Hat          | ----------------------------//
+---------------------------------+

 12/11/2003 - GnuPG
   Signing key vulnerability

   Phong Nguyen identified a severe bug in the way GnuPG creates and uses
   ElGamal keys, when those keys are used both to sign and encrypt data.
   This vulnerability can be used to trivially recover the private key.
   http://www.linuxsecurity.com/advisories/redhat_advisory-3862.html


+---------------------------------+
|  Distribution: Slackware        | ----------------------------//
+---------------------------------+

 12/11/2003 - cvs
   Unauthorized access vulnerability

   A security problem which could allow an attacker to create directories
   and possibly files outside of the CVS repository has been fixed with
   the release of cvs-1.11.10.
   http://www.linuxsecurity.com/advisories/slackware_advisory-3870.html

------------------------------------------------------------------------
Distributed by: Guardian Digital, Inc.                LinuxSecurity.com

     To unsubscribe email vuln-newsletter-request@xxxxxxxxxxxxxxxxx
         with "unsubscribe" in the subject of the message.
------------------------------------------------------------------------


[Index of Archives]     [Fedora Announce]     [Linux Crypto]     [Kernel]     [Netfilter]     [Bugtraq]     [USB]     [Fedora Security]

  Powered by Linux