Linux Advisory Watch - December 17th 2004

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



+---------------------------------------------------------------------+
|  LinuxSecurity.com                             Weekly Newsletter    |
|  December 17th, 2004                         Volume 5, Number 50a   |
+---------------------------------------------------------------------+

  Editors:      Dave Wreski                     Benjamin D. Thomas
                dave@xxxxxxxxxxxxxxxxx          ben@xxxxxxxxxxxxxxxxx

Linux Advisory Watch is a comprehensive newsletter that outlines the
security vulnerabilities that have been announced throughout the
week.  It includes pointers to updated packages and descriptions of
each vulnerability.

This week, advisories were released for zgv, atari800, MyODBC, mikmod,
gstreamer, grep, flim, kdelibs, kdebase, selinux-policy-targeted,
xcdroast, udev, PHProjekt, nfs-utils, ncpfs, vim, evolution, mkdonline,
iproute, libpng, postgresql, IPSec, imlib, ruby, ncompress, and mod_ssl.
The distributors include Debian, Fedora, Gentoo, Mandrake, OpenBSD,
Red Hat, and TurboLinux.

----

Internet Productivity Suite: Open Source Security
Trust Internet Productivity Suite's  open source architecture to give
you the best security and productivity applications  available.
Collaborating with thousands of developers, Guardian Digital security
engineers implement the most technologically advanced ideas and
methods into their design.

http://store.guardiandigital.com/html/eng/products/software/ips_overview.shtml

---

Detecting Physical Security Compromises

The first thing to always note is when your machine was rebooted.
Since Linux is a robust and stable OS, the only times your machine
should reboot is when you take it down for OS upgrades, hardware
swapping, or the like. If your machine has rebooted without you
doing it, that may be a sign that an intruder has compromised it.
Many of the ways that your machine can be compromised require the
intruder to reboot or power off your machine.

Check for signs of tampering on the case and computer area. Although
many intruders clean traces of their presence out of logs, it's a
good idea to check through them all and note any discrepancy.

It is also a good idea to store log data at a secure location, such
as a dedicated log server within your well-protected network.  Once
a machine has been compromised, log data becomes of little use as
it most likely has also been modified by the intruder.

The syslog daemon can be configured to automatically send log data
to a central syslog server, but this is typically sent unencrypted,
allowing an intruder to view data as it is being transferred.  This
may reveal information about your network that is not intended to be
public.  There are syslog daemons available that encrypt the data as
it is being sent.

Also be aware that faking syslog messages is easy -- with an exploit
program having been published.  Syslog even accepts net log entries
claiming to come from the local host without indicating their true
origin.

Excerpt from LinuxSecurity HowTO:
http://www.linuxsecurity.com/docs/LDP/Security-HOWTO/
By: Dave Wreski (dave@xxxxxxxxxxxxxxxxx) & Kevin Fenzi

-----

Vincenzo Ciaglia Speaks Security 2004

Vincenzo Ciaglia of Linux Netwosix talks about this year of Linux
Security.  A full immersion in the world of Linux Security from many
sides and points of view.

http://www.linuxsecurity.com/content/view/117515/49/

---------------------------------------------------------------------

Mass deploying Osiris

Osiris is a centralized file-integrity program that uses a client/server
architecture to check for changes on a system.  A central server maintains
the file-integrity database and configuration for a client and at a
specified time, sends the configuration file over to the client, runs a
scan and sends the results back to the server to compare any changes.
Those changes are then sent via email, if configured, to a system admin or
group of people.  The communication is all done over an encrypted
communication channel.

http://www.linuxsecurity.com/feature_stories/feature_story-175.html

------

-->  Take advantage of the LinuxSecurity.com Quick Reference Card!
-->  http://www.linuxsecurity.com/docs/QuickRefCard.pdf


+---------------------------------+
|  Distribution: Debian           | ----------------------------//
+---------------------------------+

* Debian: zgv arbitrary code execution fix
  14th, December, 2004

Several vulnerabilities have been discovered in zgv, an SVGAlib
graphics viewer for the i386 architecture.

http://www.linuxsecurity.com/content/view/117475


* Debian: atari800 local root exploit fix
  14th, December, 2004

Adam Zabrocki discovered multiple buffer overflows in atari800, an
Atari emulator.  In order to directly access graphics hardware, one
of the affected programs is installed setuid root. A local attacker
could exploit this vulnerability to gain root privileges.

http://www.linuxsecurity.com/content/view/117492


+---------------------------------+
|  Distribution: Fedora           | ----------------------------//
+---------------------------------+

* Fedora: MyODBC-2.50.39-18.2 update
  10th, December, 2004

This update fixes a problem that occurs when the user's locale
setting selects a decimal point other than ".".

http://www.linuxsecurity.com/content/view/117469


* Fedora: MyODBC-2.50.39-19.1 update
  10th, December, 2004

This update fixes a problem that occurs when the user's locale
setting selects a decimal point other than ".".

http://www.linuxsecurity.com/content/view/117470


* Fedora: mikmod-3.1.6-30.2 update
  13th, December, 2004

This moves 'mikmod' back to the main package. It was incorrectly in
the mikmod-devel package.

http://www.linuxsecurity.com/content/view/117476


* Fedora: gstreamer-0.8.7-4.FC3.0 update
  14th, December, 2004

This update adds multilib support to GStreamer; this fixes several
issues people had on multilib architectures such as x86_64.  It's
been fairly well tested but please do not hesitate to report
any issues.

http://www.linuxsecurity.com/content/view/117494


* Fedora: grep-2.5.1-31.2 update
  14th, December, 2004

This update improves performance when processing UTF-8 input.

http://www.linuxsecurity.com/content/view/117495


* Fedora: flim-1.14.7-0.FC2 update
  15th, December, 2004

Update to 1.14.7 release, which also fixes CAN-2004-0422.

http://www.linuxsecurity.com/content/view/117518


* Fedora: kdelibs-3.2.2-10.FC2 update
  15th, December, 2004

apply the patch to fix Konqueror Window Injection Vulnerability
#142510 CAN-2004-1158,	Thanks to KDE security team

http://www.linuxsecurity.com/content/view/117519


* Fedora: kdebase-3.2.2-8.FC2 update
  15th, December, 2004

apply the patch to fix Konqueror Window Injection Vulnerability
#142510 CAN-2004-1158,	Thanks to KDE security team

http://www.linuxsecurity.com/content/view/117520


* Fedora: kdelibs-3.3.1-2.4.FC3 update
  15th, December, 2004

apply the patch to fix Konqueror Window Injection Vulnerability
#142510 CAN-2004-1158,	Thanks to KDE security team

http://www.linuxsecurity.com/content/view/117521


* Fedora: kdebase-3.3.1-4.3.FC3 update
  15th, December, 2004

apply the patch to fix Konqueror Window Injection Vulnerability
#142510 CAN-2004-1158,	Thanks to KDE security team

http://www.linuxsecurity.com/content/view/117522


* Fedora: selinux-policy-targeted-1.17.30-2.51 update
  16th, December, 2004

Fix problems with winbind, nscd, apache and others.

http://www.linuxsecurity.com/content/view/117525


* Fedora: xcdroast-0.98a15-8 update
  16th, December, 2004

fixed frozen progress bars with patch from Didier Heyden (bug
#134334)

http://www.linuxsecurity.com/content/view/117529


* Fedora: udev-039-10.FC3.6 update
  16th, December, 2004

fixed a case where reading /proc/ide/hd?/media returns EIO (bug
rh#142713) and added simple dvb rules

http://www.linuxsecurity.com/content/view/117530


+---------------------------------+
|  Distribution: Gentoo           | ----------------------------//
+---------------------------------+

* Gentoo: PHProjekt setup.php vulnerability
  10th, December, 2004

PHProjekt contains a vulnerability in the setup procedure allowing
remote users without admin rights to change the configuration.

http://www.linuxsecurity.com/content/view/117468


* Gentoo: nfs-utils Multiple remote vulnerabilities
  13th, December, 2004

Multiple vulnerabilities have been discovered in nfs-utils that could
lead to a Denial of Service, or the execution of arbitrary code.

http://www.linuxsecurity.com/content/view/117478


* Gentoo: ncpfs Buffer overflow in ncplogin and ncpmap
  15th, December, 2004

ncpfs is vulnerable to a buffer overflow that could lead to local
execution of arbitrary code with elevated privileges.

http://www.linuxsecurity.com/content/view/117505


* Gentoo: vim, gVim Vulnerable options in modelines
  15th, December, 2004

Several vulnerabilities related to the use of options in modelines
have been found and fixed in Vim. They could potentially result in a
local user escalating privileges.

http://www.linuxsecurity.com/content/view/117508


* Gentoo: file Arbitrary code execution
  13th, December, 2004

The code for parsing ELF headers in file contains a flaw which may
allow an attacker to execute arbitrary code.

http://www.linuxsecurity.com/content/view/117477


+---------------------------------+
|  Distribution: Mandrake         | ----------------------------//
+---------------------------------+

* Mandrake: evolution various bugs fix
  14th, December, 2004

This update provides Evolution 2.0.3 which fixes a number of bugs
found in the previous version of Evolution, including the possibility
to lose mail when Evolution sends an email message, that fails to
send, but Evolution doesn't realize it has failed.

http://www.linuxsecurity.com/content/view/117484


* Mandrake: mdkonline provide new features
  14th, December, 2004

This is a major update of mandrakeonline which fixes several issues
and adds more features such as a text wizard for servers without
Xwindow capabilities, support for server products, corporate and MNF
for instance, errors displaying and md5sum file checks.

http://www.linuxsecurity.com/content/view/117485


* Mandrake: iproute2 temporary file vulnerability
  14th, December, 2004

Herbert Xu discovered that iproute can accept spoofed messages sent
via the kernel netlink interface by other users on the local machine.
This could lead to a local Denial of Service attack.

http://www.linuxsecurity.com/content/view/117486


* Mandrake: evolution various bugs fix
  14th, December, 2004

This update provides Evolution 2.0.3 which fixes a number of bugs
found in the previous version of Evolution, including the possibility
to lose mail when Evolution sends an email message, that fails to
send, but Evolution doesn't realize it has failed.

http://www.linuxsecurity.com/content/view/117487


* Mandrake: libpng invalid zlib header problem fix
  14th, December, 2004

A problem in version 1.2.6 of the libpng library would cause libpng
to write an invalid zlib header within the PNG datastream.  This can
cause some applications to display the images incorrectly.

http://www.linuxsecurity.com/content/view/117488


* Mandrake: postgresql temporary file vulnerability fix
  14th, December, 2004

The Trustix development team found insecure temporary file creation
problems in a script included in the postgresql package.  This could
allow an attacker to trick a user into overwriting arbitrary files he
has access to.

http://www.linuxsecurity.com/content/view/117489


* Mandrake: kde various bug fixes
  15th, December, 2004

A number of KDE-related packages are being released to address a
number of bugs in these packages.  Updated packages include
kdenetwork (which fixes problems in kget, kopete, and krfb), kdepim
(which fixes problems in kmail, knode, knotes, and kontact), kwallet
(which fixes problems in kwalleditor and kcmlirc), and kdesdk (which
fixes a problem in cervisia).

http://www.linuxsecurity.com/content/view/117516


* Mandrake: kdelibs & kdebase vulnerability fix
  15th, December, 2004

Daniel Fabian discovered a potential privacy issue in KDE.  When
creating a link to a remote file from various applications, including
Konqueror, the resulting URL may contain the authentication
credentials used to access that remote resource.  This includes, but
is not limited to, browsing SMB (Samba) shares.  Upon further
investigation, it was found that the SMB protocol handler also
unnecessarily exposed authentication credentials (CAN-2004-1171).

http://www.linuxsecurity.com/content/view/117517


+---------------------------------+
|  Distribution: OpenBSD          | ----------------------------//
+---------------------------------+

* OpenBSD: kernel heap overflow in IPsec
  14th, December, 2004

On systems running isakmpd(8) it is possible for a local user to
cause kernel memory corruption and system panic by setting ipsec(4)
credentials on a socket.  Stopping isakmpd(8) does not prevent the
memory corruption.

http://www.linuxsecurity.com/content/view/117493



+---------------------------------+
|  Distribution: Red Hat          | ----------------------------//
+---------------------------------+

* Red Hat: imlib security vulnerabilities fix
  10th, December, 2004

Updated imlib packages that fix several integer and buffer overflows
are now available.

http://www.linuxsecurity.com/content/view/117455


* Red Hat: ruby denial of service issue fix
  13th, December, 2004

An updated ruby package that fixes a denial of service issue for the
CGI instance is now available.

http://www.linuxsecurity.com/content/view/117479


* Red Hat: ncompress security issue and bug fix
  13th, December, 2004

An updated ncompress package that fixes a buffer overflow and problem
in the handling of files larger than 2 GB is now available.

http://www.linuxsecurity.com/content/view/117480


* Red Hat: apache and mod_ssl security vulnerabilities fix
  13th, December, 2004

Updated apache and mod_ssl packages that fix various minor security
issues and bugs in the Apache Web server are now available for Red
Hat Enterprise
Linux 2.1.

http://www.linuxsecurity.com/content/view/117481


* Red Hat: kernel security vulnerability fix
  13th, December, 2004

Updated kernel packages are now available as part of ongoing support
and maintenance of Red Hat Enterprise Linux version 2.1. This is the
sixth regular update.

http://www.linuxsecurity.com/content/view/117482


* Red Hat: Itanium security issues fix
  13th, December, 2004

Updated Itanium kernel packages are now available as part of ongoing
support and maintenance of Red Hat Enterprise Linux version 2.1. This
is the sixth regular update.

http://www.linuxsecurity.com/content/view/117483


+---------------------------------+
|  Distribution: Turbo Linux      | ----------------------------//
+---------------------------------+

* TurboLinux: Security & Bugfix
  13th, December, 2004

Numerous issues in the Linux ELF binary loader. Issues relating to
IDE DMA transfers which prevent installation on machines with SiS
chipsets using the SiS 962/963 IDE controller. Null pointer
dereferencing in the SG driver.

http://www.linuxsecurity.com/content/view/117471

------------------------------------------------------------------------
Distributed by: Guardian Digital, Inc.                LinuxSecurity.com

     To unsubscribe email vuln-newsletter-request@xxxxxxxxxxxxxxxxx
         with "unsubscribe" in the subject of the message.
------------------------------------------------------------------------


[Index of Archives]     [Fedora Announce]     [Linux Crypto]     [Kernel]     [Netfilter]     [Bugtraq]     [USB]     [Fedora Security]

  Powered by Linux