Linux Advisory Watch - December 31st 2004

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



+---------------------------------------------------------------------+
|  LinuxSecurity.com                             Weekly Newsletter    |
|  December 31st, 2004                         Volume 5, Number 52a   |
+---------------------------------------------------------------------+

  Editors:      Dave Wreski                     Benjamin D. Thomas
                dave@xxxxxxxxxxxxxxxxx          ben@xxxxxxxxxxxxxxxxx

Linux Advisory Watch is a comprehensive newsletter that outlines the
security vulnerabilities that have been announced throughout the
week.  It includes pointers to updated packages and descriptions of
each vulnerability.

Happy New Year!  This week advisories were released for netpbm,
libtiff, imlib, Xpdf,CUPS, and ViewCVS.  The distributors include
Conectiva, Debian, Gentoo, and Mandrake.

----

Internet Productivity Suite: Open Source Security
Trust Internet Productivity Suite's  open source architecture to give
you the best security and productivity applications  available.
Collaborating with thousands of developers, Guardian Digital security
engineers implement the most technologically advanced ideas and
methods into their design.

http://store.guardiandigital.com/html/eng/products/software/ips_overview.shtml

---

A 2005 Linux Security Resolution

Year 2000, the coming of the new millennium, brought us great joy
and celebration, but also brought great fear.  Some believed it
would result in full-scale computer meltdown, leaving Earth as a
nuclear wasteland.  Others predicted minor glitches leading only to
inconvenience.  The following years (2001-2004) have been tainted
with the threat of terrorism worldwide.  Whether it be physical
terrorism, or malicious acts of information security, we have all
raised our level of awareness.  For many across the world, the new
year brings a sense of rebirth and recommitment.  All of us take
time to reflect on the past year, reexamine our lives, and focus
on how we can do better the upcoming year.  Some have career related
goals, others only wish to make more time for their family because
of the realization that those close to you are in fact the real
and only reason for everything.  Personally, I am one who loves
to set goals.  Without a mission and plan, very little gets
accomplished.  The new year should not only be a time to set
personal goals such as an exercise regiment, but also a time to
focus on security practices and configurations.  2005 will be
hostile, now is the time to prepare.

Reflect on Present

Those of us long-time security gurus always chant the mantra
"security is a process, not a product; repeat."  The new year
should be a time to refine that process.  Take a moment to analyze
and ask the following questions:

 - Are we doing everything the way we should?
 - What areas of our operation need to be improved?
 - Are we following security best practices?
 - Do I feel confident about our security practices?
 - Do I have metrics to provide assurance about our security?
 - Are we proactive, or do we always seem to be catching up?

Continue to Read Article Here:
http://www.linuxsecurity.com/content/view/117721/49/

---

State of Linux Security 2004

In 2004, security continued to be a major concern. The beginning of the
year was plagued with several kernel flaws and Linux vendor advisories
continue to be released at an ever-increasing rate. This year, we have
seen the reports touting Window's security superiority, only to be
debunked by other security experts immediately after release. Also,
Guardian Digital launched the new LinuxSecurity.com, users continue to
be targeted by automated attacks, and the need for security awareness
and education continues to rise.

http://www.linuxsecurity.com/content/view/117655/49/

-----

Users Respond with Constructive Feedback

When the new version of LinuxSecurity.com  was launched on December 1st,
we also asked our readers to " Tell us what you think ." You have spoken,
and we appreciate that! We received hundreds of comments & requests, and
have been addressing a majority of them. We thought it was important to
share some of the comments with you. While some were purely positive
acknowledgements, others were thoughtful criticisms. We take every
critique into account and address each as resources become available
or when the criticism becomes the concern of many.

http://www.linuxsecurity.com/content/view/117614/49/

-----------------------------------------------------------------------

Vincenzo Ciaglia Speaks Security 2004

Vincenzo Ciaglia of Linux Netwosix talks about this year of Linux
Security.  A full immersion in the world of Linux Security from many
sides and points of view.

http://www.linuxsecurity.com/content/view/117515/49/

------

-->  Take advantage of the LinuxSecurity.com Quick Reference Card!
-->  http://www.linuxsecurity.com/docs/QuickRefCard.pdf


+---------------------------------+
|  Distribution: Conectiva        | ----------------------------//
+---------------------------------+

* Conectiva: netpbm Insecure temporary file creation
  29th, December, 2004

Utilities provided by the netpbm package prior to the 9.25 version
contain defects[2] in temporary file handling. They create temporary
files with predictable names without checking if the target file
already exists.

http://www.linuxsecurity.com/content/view/117694


+---------------------------------+
|  Distribution: Debian           | ----------------------------//
+---------------------------------+

* Debian: libtiff arbitrary code execution fix
  24th, December, 2004

"infamous41md" discovered a problem in libtiff, the Tag Image File
Format library for processing TIFF graphics files. Upon reading a
TIFF file it is possible to allocate a zero sized buffer and write to
it which would lead to the execution of arbitrary code.

http://www.linuxsecurity.com/content/view/117664


* Debian: imlib arbitrary code execution fix
  24th, December, 2004

Pavel Kankovsky discovered that several overflows found in the libXpm
library were also present in imlib, an imaging library for X and X11.
An attacker could create a carefully crafted image file in such a way
that it could cause an application linked with imlib to execute
arbitrary code when the file was opened by a victim.

http://www.linuxsecurity.com/content/view/117667


+---------------------------------+
|  Distribution: Gentoo           | ----------------------------//
+---------------------------------+

* Gentoo: Xpdf, Gpdf New integer overflows
  28th, December, 2004

New integer overflows were discovered in Xpdf, potentially resulting
in the execution of arbitrary code. GPdf includes Xpdf code and
therefore is vulnerable to the same issues.

http://www.linuxsecurity.com/content/view/117690


* Gentoo: CUPS Multiple vulnerabilities
  28th, December, 2004

Multiple vulnerabilities have been found in CUPS, ranging from local
Denial of Service attacks to the remote execution of arbitrary code.

http://www.linuxsecurity.com/content/view/117691


* Gentoo: ViewCVS Information leak and XSS vulnerabilities
  28th, December, 2004

ViewCVS is vulnerable to an information leak and to cross-site
scripting (XSS) issues.

http://www.linuxsecurity.com/content/view/117692


+---------------------------------+
|  Distribution: Mandrake         | ----------------------------//
+---------------------------------+

* Mandrake: integer overflow vulnerabilities update
  27th, December, 2004

Remote exploitation of an integer overflow vulnerability in the smbd
daemon included in Samba 2.0.x, Samba 2.2.x, and Samba 3.0.x prior to
and including 3.0.9 could allow an attacker to cause controllable
heap corruption, leading to execution of arbitrary commands with root
privileges.

http://www.linuxsecurity.com/content/view/117683

------------------------------------------------------------------------
Distributed by: Guardian Digital, Inc.                LinuxSecurity.com

     To unsubscribe email vuln-newsletter-request@xxxxxxxxxxxxxxxxx
         with "unsubscribe" in the subject of the message.
------------------------------------------------------------------------


[Index of Archives]     [Fedora Announce]     [Linux Crypto]     [Kernel]     [Netfilter]     [Bugtraq]     [USB]     [Fedora Security]

  Powered by Linux