Linux Advisory Watch - January 23rd 2004

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



+----------------------------------------------------------------+
|  LinuxSecurity.com                        Linux Advisory Watch |
|  January 23rd, 2004                        Volume 5, Number 4a |
+----------------------------------------------------------------+

  Editors:     Dave Wreski                Benjamin Thomas
               dave@xxxxxxxxxxxxxxxxx     ben@xxxxxxxxxxxxxxxxx

Linux Advisory Watch is a comprehensive newsletter that outlines the
security vulnerabilities that have been announced throughout the week.
It includes pointers to updated packages and descriptions of each
vulnerability.

This week, advisories were released for cvs, screen, kdepim, mc, tcpdump,
kernel, slocate, honeyd, isakmpd, and lftp.  The distributors include
Conectiva, Debian, Guardian Digital EnGarde Secure Linux, Gentoo, OpenBSD,
Red Hat, Trustix, and Turbolinux.

----
>> Combating Junk Email <<
Guardian Digital Secure Mail Suites comprehensive anti-spam capabilities
create an impenetrable barrier between spammers and your inbox.
Eliminates virtually all inappropriate & unsolicited mail using the most
advanced junk mail technologies.

http://ads.linuxsecurity.com/cgi-bin/newad_redirect.pl?id=gdn01
----

In all business environments management must give a certain level of trust
to staff in order for work to get done.  In security, trust is extremely
important.  Security managers must trust staff to properly setup and
configure systems, give appropriate access, and fix vulnerabilities as
they arise. Trusting staff to get the job done is a fundamental part of
doing business.  As a manager, how can one be sure that the security staff
is properly addressing security issues?  How can one be sure that
vulnerabilities are fixed and logs are monitored?  Peter F. Drucker, a
well known writer on business management topics once wrote, "if you cannot
measure it, you cannot manage it."

This is directly relevant to security.  How can a manager be sure that the
backups are getting done?  Are the IDS and firewall logs properly
monitored?  A manager can easily have trust in employees, but assurance
also must be provided. Management should require staff to log backups, log
reviews, server patching, etc.  Rather than trusting staff to get the job
done, it is necessary to have assurance.  All general security maintenance
tasks can be, and should be audit-able.

How will extra paper work help security?  Will staff get fed up with all
of the extra documentation?  The purpose of extra documentation is not to
burden staff, it is to increasingly justify security spending.  If a
security department is properly doing its job, incidents will have little
affect. However, if the department isn't doing its job, something
catastrophic could happen.  It is hard for people not in security to see
the value in spending more money when there are no security incidents.
Having audit-able documented evidence of thwarted security attempts, log
reviews, etc. can have a huge impact on the image of the security
department.  Rather than relying on trust, giving assurance and
quantifying security will help get the budget necessary to have the
appropriate level of protection.

Until next time, cheers!
Benjamin D. Thomas
ben@xxxxxxxxxxxxxxxxx

---

Managing Linux Security Effectively in 2004

This article examines the process of proper Linux security management in
2004.  First, a system should be hardened and patched.  Next, a security
routine should be established to ensure that all new vulnerabilities are
addressed.  Linux security should be treated as an evolving process.

http://www.linuxsecurity.com/feature_stories/feature_story-157.html

--------------------------------------------------------------------

FEATURE: OSVDB: An Independent and Open Source Vulnerability Database This
article outlines the origins, purpose, and future of the Open Source
Vulnerability Database project. Also, we talk to with Tyler Owen, a major
contributor.

http://www.linuxsecurity.com/feature_stories/feature_story-156.html

-->  Take advantage of the LinuxSecurity.com Quick Reference Card!
-->  http://www.linuxsecurity.com/docs/QuickRefCard.pdf


+---------------------------------+
|  Distribution: Conectiva        | ----------------------------//
+---------------------------------+

 1/20/2004 - cvs
   Chroot escape vulnerability

   By requesting malformed modules[2] a remote attacker can attempt
   to create files and directories on the server's root file system.
   http://www.linuxsecurity.com/advisories/conectiva_advisory-3962.html

 1/20/2004 - screen
   Buffer overflow vulnerability

   This vulnerability could be exploited by an attacker who is able
   to send about 2Gb of data to the user's screen session.
   http://www.linuxsecurity.com/advisories/conectiva_advisory-3963.html

 1/20/2004 - kdepim
   Buffer overflow vulnerability

   A carefully constructed .VCF file, if opened or previewed, could
   cause the execution of arbitrary code with the victim's
   privileges.
   http://www.linuxsecurity.com/advisories/conectiva_advisory-3964.html


+---------------------------------+
|  Distribution: Debian           | ----------------------------//
+---------------------------------+

 1/16/2004 - mc
   Improper execution vulnerability

   A malicious archive (such as a .tar file) could cause arbitrary
   code to be executed if opened by Midnight Commander.
   http://www.linuxsecurity.com/advisories/debian_advisory-3955.html

 1/16/2004 - tcpdump
   Multiple vulnerabilities

   A number of buffer overflows could be exploited to crash tcpdump,
   or execute arbitrary code with the privileges of tcpdump.
   http://www.linuxsecurity.com/advisories/debian_advisory-3957.html

 1/19/2004 - netpbm-free Insecure temporary files
   Multiple vulnerabilities

   Many of these programs were found to create temporary files in an
   insecure manner.
   http://www.linuxsecurity.com/advisories/debian_advisory-3960.html

 1/19/2004 - kernel
   MIPS version of mremap() fix

   A flaw in bounds checking in mremap() in the Linux kernel may
   allow a local attacker to gain root privileges.
   http://www.linuxsecurity.com/advisories/debian_advisory-3961.html

 1/20/2004 - slocate
   Heap buffer overflow

   This vulnerability could grant a local attacker "slocate" group
   privileges, which can access the list of all file pathnames on the
   system.
   http://www.linuxsecurity.com/advisories/debian_advisory-3965.html


+---------------------------------+
|  EnGarde                        | ----------------------------//
+---------------------------------+

 1/19/2004 - 'tcpdump' multiple vulnerabilities
   Heap buffer overflow

   By sending specially constructed packets across the wire a
   malicious remote attacker could cause tcpdump to crash or
   potentially run arbitrary code as the user under which tcpdump was
   being run.
   http://www.linuxsecurity.com/advisories/engarde_advisory-3958.html

 1/19/2004 - tcpdump
   Multiple vulnerabilities

   Several buffer overflows were recently discovered in tcpdump which
   could cause tcpdump to crash or run arbitrary code.
   http://www.linuxsecurity.com/advisories/engarde_advisory-3959.html


+---------------------------------+
|  Distribution: Gentoo           | ----------------------------//
+---------------------------------+

 1/22/2004 - honeyd
   Honeyd remotely identifiable

   Identification of Honeyd installations allows an adversary to
   launch attacks specifically against Honeyd.
   http://www.linuxsecurity.com/advisories/gentoo_advisory-3969.html


+---------------------------------+
|  Distribution: OpenBSD          | ----------------------------//
+---------------------------------+

 1/16/2004 - isakmpd
   SA deletion vulnerability

   Several message handling flaws in isakmpd(8) have been reported by
   Thomas Walpuski.
   http://www.linuxsecurity.com/advisories/openbsd_advisory-3956.html


+---------------------------------+
|  Distribution: Red Hat          | ----------------------------//
+---------------------------------+

 1/21/2004 - mc
   Buffer overflow vulnerability

   This vulnerability allows remote attackers to execute arbitrary
   code during symlink conversion.
   http://www.linuxsecurity.com/advisories/redhat_advisory-3966.html

 1/22/2004 - slocate
   Heap overflow vulnerability

   A local user could exploit this vulnerability to gain "slocate"
   group privileges and then read the entire slocate database.
   http://www.linuxsecurity.com/advisories/redhat_advisory-3970.html


+---------------------------------+
|  Distribution: Trustix          | ----------------------------//
+---------------------------------+

 1/21/2004 - slocate
   Privilege escalation vulnerability

   Exploiting this would allow an attacker to obtain a list of all
   files in the filesystem.
   http://www.linuxsecurity.com/advisories/trustix_advisory-3967.html


+---------------------------------+
|  Distribution: Turbolinux       | ----------------------------//
+---------------------------------+

 1/22/2004 - lftp
   and tcpdump Multiple vulnerabilities

   lftp: buffer overflow tcpdump: multiple vulnerabilities
   http://www.linuxsecurity.com/advisories/turbolinux_advisory-3968.html

------------------------------------------------------------------------
Distributed by: Guardian Digital, Inc.                LinuxSecurity.com

     To unsubscribe email vuln-newsletter-request@xxxxxxxxxxxxxxxxx
         with "unsubscribe" in the subject of the message.
------------------------------------------------------------------------


[Index of Archives]     [Fedora Announce]     [Linux Crypto]     [Kernel]     [Netfilter]     [Bugtraq]     [USB]     [Fedora Security]

  Powered by Linux