+---------------------------------------------------------------------+ | LinuxSecurity.com Weekly Newsletter | | March 11th, 2005 Volume 6, Number 10a | +---------------------------------------------------------------------+ Editors: Dave Wreski Benjamin D. Thomas dave@xxxxxxxxxxxxxxxxx ben@xxxxxxxxxxxxxxxxx Linux Advisory Watch is a comprehensive newsletter that outlines the security vulnerabilities that have been announced throughout the week. It includes pointers to updated packages and descriptions of each vulnerability. This week, advisories were released for clamav, kernel, squid, kppp, helixplayer, tzdata, libtool, firefox, ipsec-tools, dmraid, gaim, libexif, gimp, yum, grip, libXpm, xv, ImageMagick, Hashcash, mlterm, dcoidlng, curl, gftp, cyrus-imapd, unixODBC, and mc. The distributors include Conectiva, Debian, Fedora, Gentoo, Mandrake, Red Hat, and SuSE. --- >> Enterprise Security for the Small Business << Never before has a small business productivity solution been designed with such robust security features. Engineered with security as a main focus, the Guardian Digital Internet Productivity Suite is the cost-effective solution small businesses have been waiting for. http://ads.linuxsecurity.com/cgi-bin/newad_redirect.pl?id=gdn07 --- STRATEGIES AND COUNTERMEASURES By: Raymond Ankobia This discusses strategies and countermeasures that will help alleviate threats and vulnerabilities commonly found in web application development. 3.1 Security Management Programs A security policy drafted and implemented from a holistic viewpoint with full approval of senior executives. There must be security education and awareness campaigns for the development team and administrators to foster a secure development lifecycle. Policies will ensure secure configuration of web servers and back end databases. Key amongst education campaigns is social engineering [8][7] where the attacker deceitfully extracts information directly from authorized people. 3.2 Deployment of Application Firewalls This is a fairly new concept that offers use of gateways that specifically operate at the application layer. These are stateful, intelligent and content driven programmes/appliances that operate by checking web content. This allows for evaluation of attack signatures and exploits and prevents them from impacting on the targets. They look out and allow legitimate requests of users to reach the backend servers and databases whilst preventing, logging and alerting administrators of malicious activities. Even though these may be able to do a far better job of analysing application content including graphics, they are not a panacea and the battle is far from over. Malicious and encrypted content will still get through firewalls [6]. 3.3 Using SSL/TLS (HTTPS) Protocol SSL/TLS has become the de-facto protocol for deploying secure web applications running on HTTP. It is based on Public Key Technology and X509 certificates, and defined by the Internet Engineering Task Force (IEFT) RFC 2246. This is supported in most web browsers and provides a secure tunnel between the client and the server. The server side almost always authenticates to the client by making available its public key to the client for verification; thereby offering a mechanism to identify rogue servers that impersonate by spoofing IP addresses with wrong DNS entries [8][7]. In most situations, the client side authentication is optional. This is due largely to the overhead of requiring every client to have a public key. This provides confidentiality, integrity and authenticity of transactions between both ends of the traffic. However, it must be emphasised that hackers concentrate on attacking the endpoints'; poor deployment and implementation of applications and databases make easy break-ins. Poor implementation of a secure protocol does not make it any better. Attention to detailed instructions from these specifications is imperative to get it right. 3.4 Sandboxing and Code Signing This idea for using sandboxes and signing of code (especially mobile code) is to introduce trust and assurance to the end user as to the origin of the application in question. Sandboxes are restricted and non-privileged operating environments [2][1]. Java Applets use this approach by encapsulating permissions and rights to resources within the programme itself. This provides a safer environment as the Java Virtual Machine (embedded in most browsers) consults the security manager for any violations or privileged system calls that may compromise the local computer. The author of a code may digitally sign it to give some authenticity and confidence to the end user; allowing that signature to be publicly verified using a certified public directory. Authenticode is the approach by Microsoft for digitally signing code to provide trust and authenticity of origin. Developers of ActiveX controls/programmes may likewise sign the code to give similar level of trust and authenticity. However, discretion is left entirely to the user to check the authenticity of the digital signatures. [2] Clearly declares, "A digital signature does not, however, provide any guarantee of benevolence or competence". The Sandboxing (by Sun Microsystems) approach offers better assurance since it comes with a built-in security reference monitor that checks the access controls of the objects. These architectures are designed with Public Key Infrastructure (PKI) in mind and require education and awareness programmes on key management and certification authorities. 3.5 Use of Honeypots These are used to lure potential crackers / hackers. The principle is one of falsifying information and placing it where hackers will eventually find it. The original concept seem to have come from [9] where he managed to bait hackers with falsified information which eventually led to their capture. This allows for the footprints of malicious activities to be logged, monitored and analysed. They help analyse the weak points that may are exposed with subsequent introduction of countermeasures that will seal any weaknesses that may be exploited. Use of this technology does have some legal implications. There is a debate as to whether this is enticement or entrapment and may require legal interpretation before use. 3.6 Using SiteDigger This is a tool developed by Foundstone Professional Services to help web application developers and administrators test the efficacy of security measures incorporated during design. It works in conjunction with certain API's which will need to be downloaded from Google's website (http://www.google.com/apis/). This tool will help the web application developer or administrator to scan and generate reports of any leakages on a particular website. 3.7 ISO/IEC 17799 (Part I) This was originally a British code of practice for Information Security Management and was later adopted by ISO as a Standard [5]. This has many facets for compliance and one of them is Systems Development and Maintenance. Part II of this, is for accreditation (currently being vetted by ISO for standardisation). It engages the certifying party through a rigorous compliance process, which includes the integration of controls and audit trails built into application systems. It encourages stringent checks and controls, Input data validation, message authentication to guard against unauthorised changes, output validation to ensure correct input and processing (the old adage "Garbage In, Garbage out), and the use of cryptographic controls to protect the confidentiality and integrity of information. It also envisages strict and secure change control procedures and principle of least principle, by making sure that support developers are only given access to areas of their domain. 3.8 Security Audit Self-Hack Audit [1]. The self-hack audit is an approach that uses methodology used by developers to identify and eliminate security weaknesses in an application before they are discovered and compromised. This will include checking login prompts, brute forcing passwords and setting up limits for login attempts. Penetration Testing. Particular mention is made of The Open Web Application Security Project (OWASP), which is an Open source platform used as a benchmark for testing web application vulnerabilities. Read Entire Article: http://www.linuxsecurity.com/content/view/118427/49/ ---------------------- Getting to Know Linux Security: File Permissions Welcome to the first tutorial in the 'Getting to Know Linux Security' series. The topic explored is Linux file permissions. It offers an easy to follow explanation of how to read permissions, and how to set them using chmod. This guide is intended for users new to Linux security, therefore very simple. If the feedback is good, I'll consider creating more complex guides for advanced users. Please let us know what you think and how these can be improved. Click to view video demo: http://www.linuxsecurity.com/content/view/118181/49/ --- The Tao of Network Security Monitoring: Beyond Intrusion Detection To be honest, this was one of the best books that I've read on network security. Others books often dive so deeply into technical discussions, they fail to provide any relevance to network engineers/administrators working in a corporate environment. Budgets, deadlines, and flexibility are issues that we must all address. The Tao of Network Security Monitoring is presented in such a way that all of these are still relevant. One of the greatest virtues of this book is that is offers real-life technical examples, while backing them up with relevant case studies. http://www.linuxsecurity.com/content/view/118106/49/ --- Encrypting Shell Scripts Do you have scripts that contain sensitive information like passwords and you pretty much depend on file permissions to keep it secure? If so, then that type of security is good provided you keep your system secure and some user doesn't have a "ps -ef" loop running in an attempt to capture that sensitive info (though some applications mask passwords in "ps" output). http://www.linuxsecurity.com/content/view/117920/49/ -------- --> Take advantage of the LinuxSecurity.com Quick Reference Card! --> http://www.linuxsecurity.com/docs/QuickRefCard.pdf +---------------------------------+ | Distribution: Conectiva | ----------------------------// +---------------------------------+ * Conectiva: clamav Fix for denial of service in clamav 3rd, March, 2005 Clamav[1] is an anti-virus utility for Unix/Linux. This announcement updates clamav so it is able to update its database from the server without any problems related to its format and also because it fixes a security issue which could lead to a denial of service[2] situation. http://www.linuxsecurity.com/content/view/118480 * Conectiva: kernel Kernel fixes 7th, March, 2005 The Linux kernel is responsible for handling the basic functions of the GNU/Linux operating system. This announcement has the following important changes. http://www.linuxsecurity.com/content/view/118518 * Conectiva: squid Fixes for multiple squid vulnerabilities 8th, March, 2005 Squid[1] is a full-featured web proxy cache. This announcement fixes the following vulnerabilities for Squid. http://www.linuxsecurity.com/content/view/118533 +---------------------------------+ | Distribution: Debian | ----------------------------// +---------------------------------+ * Debian: New abuse packages fix local root exploit 7th, March, 2005 Updated package. http://www.linuxsecurity.com/content/view/118514 * Debian: New kppp packages fix privileged file descriptor leak 8th, March, 2005 Updated package. http://www.linuxsecurity.com/content/view/118534 +---------------------------------+ | Distribution: Fedora | ----------------------------// +---------------------------------+ * Fedora Core 3 Update: HelixPlayer-1.0.3-3.fc3 3rd, March, 2005 Updated HelixPlayer packages that fixes two buffer overflow issues are now available. http://www.linuxsecurity.com/content/view/118479 * Fedora Core 3 Update: tzdata-2005f-1.fc3 3rd, March, 2005 Updated package. http://www.linuxsecurity.com/content/view/118484 * Fedora Core 2 Update: tzdata-2005f-1.fc2 3rd, March, 2005 Updated package. http://www.linuxsecurity.com/content/view/118485 * Fedora Core 2 Update: kernel-2.6.10-1.770_FC2 3rd, March, 2005 Updated package. http://www.linuxsecurity.com/content/view/118486 * Fedora Core 3 Update: kernel-2.6.10-1.770_FC3 3rd, March, 2005 Updated package. http://www.linuxsecurity.com/content/view/118487 * Fedora Core 3 Update: libtool-1.5.6-4.FC3.1 4th, March, 2005 Libtool is a program used by many other programs to create static and dynamic libraries using a portable interface. Libtool is generally configured as part of every package that uses it. http://www.linuxsecurity.com/content/view/118488 * Fedora Core 3 Update: firefox-1.0.1-1.3.2 4th, March, 2005 Some users may experience spacing issues in textareas. This update resolves those issues, updating to the latest version of the pango selection patch. http://www.linuxsecurity.com/content/view/118499 * Fedora Core 2 Update: ipsec-tools-0.5-0.fc2 4th, March, 2005 This updates ipsec-tools to 0.5, which correctly generates forward policies so that tunnels work on current kernels. http://www.linuxsecurity.com/content/view/118507 * Fedora Core 3 Update: ipsec-tools-0.5-0.fc3 4th, March, 2005 This updates ipsec-tools to 0.5, which correctly generates forward policies so that tunnels work on current kernels. http://www.linuxsecurity.com/content/view/118508 * Fedora Core 3 Update: dmraid-1.0.0.rc6-1_FC3 7th, March, 2005 This updates dmraid to 1.0.0.rc6, which includes support for VIA ATARAID sets. http://www.linuxsecurity.com/content/view/118515 * Fedora Core 3 Update: selinux-policy-targeted-1.17.30-2.85 7th, March, 2005 Updated package. http://www.linuxsecurity.com/content/view/118517 * Fedora Core 2 Update: ipsec-tools-0.5-1.fc2 7th, March, 2005 This update fixes some packaging errors: the /var/racoon directory is shipped, for use with the admin port racoon correctly looks for its config file in /etc/racoon now http://www.linuxsecurity.com/content/view/118520 * Fedora Core 3 Update: ipsec-tools-0.5-1.fc3 7th, March, 2005 This update fixes some packaging errors: the /var/racoon directory is shipped, for use with the admin port racoon correctly looks for its config file in /etc/racoon now http://www.linuxsecurity.com/content/view/118521 * Fedora Core 2 Update: gaim-1.1.4-1.FC2 7th, March, 2005 This fixes the crash in the Gadu Gadu protocol, and makes Yahoo file transfer and buddy icons work for the more common non-proxy case. Unfortunately this probably breaks the less common proxy case. http://www.linuxsecurity.com/content/view/118526 * Fedora Core 3 Update: gaim-1.1.4-1.FC3 7th, March, 2005 This fixes the crash in the Gadu Gadu protocol, and makes Yahoo file transfer and buddy icons work for the more common non-proxy case. Unfortunately this probably breaks the less common proxy case. http://www.linuxsecurity.com/content/view/118527 * Fedora Core 2 Update: libexif-0.5.12-2.2 8th, March, 2005 Updated package. http://www.linuxsecurity.com/content/view/118535 * Fedora Core 3 Update: libexif-0.5.12-3.1 8th, March, 2005 Updated package. http://www.linuxsecurity.com/content/view/118536 * Fedora Core 3 Update: gimp-2.2.4-0.fc3.1 8th, March, 2005 Updated package. http://www.linuxsecurity.com/content/view/118537 * Subject: Fedora Core 3 Update: yum-2.2.0-0.fc3 8th, March, 2005 New yum release fixes multiple small bugs. http://www.linuxsecurity.com/content/view/118538 * Fedora Core 3 Update: grip-3.2.0-4 9th, March, 2005 This fixes a buffer overflow when the CDDB server returns more than 16 matches. http://www.linuxsecurity.com/content/view/118543 * Fedora Core 2 Update: grip-3.2.0-3.fc2 9th, March, 2005 This fixes a buffer overflow when the CDDB server returns more than 16 matches. http://www.linuxsecurity.com/content/view/118544 +---------------------------------+ | Distribution: Gentoo | ----------------------------// +---------------------------------+ * Gentoo: BidWatcher Format string vulnerability 3rd, March, 2005 BidWatcher is vulnerable to a format string vulnerability, potentially allowing arbitrary code execution. http://www.linuxsecurity.com/content/view/118483 * Gentoo: OpenMotif, LessTif New libXpm buffer overflows 4th, March, 2005 A new vulnerability has been discovered in libXpm, which is included in OpenMotif and LessTif, that can potentially lead to remote code execution. http://www.linuxsecurity.com/content/view/118493 * Gentoo: xv Filename handling vulnerability 4th, March, 2005 xv contains a format string vulnerability, potentially resulting in the execution of arbitrary code. http://www.linuxsecurity.com/content/view/118497 * Gentoo: Mozilla Firefox Various vulnerabilities 4th, March, 2005 Mozilla Firefox is vulnerable to a local file deletion issue and to various issues allowing to trick the user into trusting fake web sites or interacting with privileged content. http://www.linuxsecurity.com/content/view/118498 * Gentoo: ImageMagick Filename handling vulnerability 6th, March, 2005 A format string vulnerability exists in ImageMagick that may allow an attacker to execute arbitrary code. http://www.linuxsecurity.com/content/view/118509 * Gentoo: Hashcash Format string vulnerability 6th, March, 2005 A format string vulnerability in the Hashcash utility could allow an attacker to execute arbitrary code. http://www.linuxsecurity.com/content/view/118510 * Gentoo: mlterm Integer overflow vulnerability 7th, March, 2005 mlterm is vulnerable to an integer overflow, which could potentially allow the execution of arbitrary code. http://www.linuxsecurity.com/content/view/118516 * Gentoo: KDE dcopidlng Insecure temporary file creation 7th, March, 2005 The dcopidlng script is vulnerable to symlink attacks, potentially allowing a local user to overwrite arbitrary files. http://www.linuxsecurity.com/content/view/118519 +---------------------------------+ | Distribution: Mandrake | ----------------------------// +---------------------------------+ * Mandrake: Updated curl packages fix 4th, March, 2005 "infamous41md" discovered a buffer overflow vulnerability in libcurl's NTLM authorization base64 decoding. This could allow a remote attacker using a prepared remote server to execute arbitrary code as the user running curl. The updated packages are patched to deal with these issues. http://www.linuxsecurity.com/content/view/118500 * Mandrake: Updated gaim packages fix 4th, March, 2005 Gaim versions prior to version 1.1.4 suffer from a few security issues such as the HTML parses not sufficiently validating its input. This allowed a remote attacker to crash the Gaim client be sending certain malformed HTML messages (CAN-2005-0208 and CAN-2005-0473). http://www.linuxsecurity.com/content/view/118501 * Mandrake: Updated gftp packages fix 4th, March, 2005 A vulnerability in gftp could allow a malicious FTP server to overwrite files on the local system as the user running gftp due to improper handling of filenames containing slashes. The updated packages are patched to deal with these issues. http://www.linuxsecurity.com/content/view/118502 * Mandrake: Updated cyrus-imapd packages 4th, March, 2005 Several overruns have been fixed in the IMAP annote extension as well as in cached header handling which can be run by an authenticated user. As well, additional bounds checking in fetchnews was improved to avoid exploitation by a peer news admin. http://www.linuxsecurity.com/content/view/118503 * Mandrake: Updated imap packages include 4th, March, 2005 The imap package was missing a requires for xinetd, which is required for using the daemon. Updated packages include this requirement. http://www.linuxsecurity.com/content/view/118504 * Mandrake: Updated kdegraphics packages 4th, March, 2005 Previous updates to correct integer overflow issues affecting xpdf overlooked certain conditions when built for a 64 bit platform. (formerly CAN-2004-0888). This also affects applications like kdegraphics, that use embedded versions of xpdf. (CAN-2005-0206) http://www.linuxsecurity.com/content/view/118505 * Mandrake: Updated unixODBC packages 4th, March, 2005 The unixODBC packages shipped with Mandrakelinux 10.1 had a couple of issues with the GUI config tools: The gtk interface gODBCConfig does not exit when it's window is closed. http://www.linuxsecurity.com/content/view/118506 * Mandrake: Updated dynamic packages 8th, March, 2005 Dynamic did not launch kaffeine on insertion of a DVD vide when using KDE as the desktop. The updated version now launches kaffeine. http://www.linuxsecurity.com/content/view/118528 +---------------------------------+ | Distribution: Red Hat | ----------------------------// +---------------------------------+ * RedHat: Moderate: squid security update 3rd, March, 2005 Updated squid packages that fix a denial of service issue are now available. This update has been rated as having important security impact by the Red Hat Security Response Team http://www.linuxsecurity.com/content/view/118476 * RedHat: Low: kdenetwork security update 3rd, March, 2005 Updated kdenetwork packages that fix a file descriptor leak are now available. This update has been rated as having low security impact by the Red Hat Security Response Team http://www.linuxsecurity.com/content/view/118477 * RedHat: Critical: RealPlayer security update 3rd, March, 2005 An updated RealPlayer package that fixes two buffer overflow issues is now available. This update has been rated as having critical security impact by the Red Hat Security Response Team. http://www.linuxsecurity.com/content/view/118478 * RedHat: Critical: HelixPlayer security update 3rd, March, 2005 An updated HelixPlayer package that fixes two buffer overflow issues is now available. This update has been rated as having critical security impact by the Red Hat Security Response Team. http://www.linuxsecurity.com/content/view/118481 * RedHat: Important: xpdf security update 4th, March, 2005 An updated xpdf package that correctly fixes several integer overflows is now available. This update has been rated as having important security impact by the Red Hat Security Response Team. http://www.linuxsecurity.com/content/view/118489 * RedHat: Moderate: mc security update 4th, March, 2005 Updated mc packages that fix multiple security issues are now available. This update has been rated as having moderate security impact by the Red Hat Security Response Team. http://www.linuxsecurity.com/content/view/118490 * RedHat: Critical: mozilla security update 4th, March, 2005 Updated mozilla packages that fix a buffer overflow issue are now available. This update has been rated as having critical security impact by the Red Hat Security Response Team. http://www.linuxsecurity.com/content/view/118491 +---------------------------------+ | Distribution: SuSE | ----------------------------// +---------------------------------+ * SuSE: cyrus-sasl remote code execution 3rd, March, 2005 A buffer overflow in the digestmda5 code was identified that could lead to a remote attacker executing code in the context of the service using sasl authentication. http://www.linuxsecurity.com/content/view/118472 * SuSE: RealPlayer remote buffer overflow 9th, March, 2005 Two security problems were found in the media player RealPlayer. http://www.linuxsecurity.com/content/view/118542 ------------------------------------------------------------------------ Distributed by: Guardian Digital, Inc. LinuxSecurity.com To unsubscribe email vuln-newsletter-request@xxxxxxxxxxxxxxxxx with "unsubscribe" in the subject of the message. ------------------------------------------------------------------------