Linux Advisory Watch - March 11th 2005

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



+---------------------------------------------------------------------+
|  LinuxSecurity.com                             Weekly Newsletter    |
|  March 11th, 2005                           Volume 6, Number 10a    |
+---------------------------------------------------------------------+

  Editors:      Dave Wreski                     Benjamin D. Thomas
                dave@xxxxxxxxxxxxxxxxx          ben@xxxxxxxxxxxxxxxxx

Linux Advisory Watch is a comprehensive newsletter that outlines the
security vulnerabilities that have been announced throughout the
week.  It includes pointers to updated packages and descriptions of
each vulnerability.

This week, advisories were released for clamav, kernel, squid, kppp,
helixplayer, tzdata, libtool, firefox, ipsec-tools, dmraid, gaim,
libexif, gimp, yum, grip, libXpm, xv, ImageMagick, Hashcash, mlterm,
dcoidlng, curl, gftp, cyrus-imapd, unixODBC, and mc.  The distributors
include Conectiva, Debian, Fedora, Gentoo, Mandrake, Red Hat, and
SuSE.

---

>> Enterprise Security for the Small Business <<
Never before has a small business productivity solution been designed
with such robust security features.  Engineered with security as a main
focus, the Guardian Digital Internet Productivity Suite is the
cost-effective solution small businesses have been waiting for.

http://ads.linuxsecurity.com/cgi-bin/newad_redirect.pl?id=gdn07

---

STRATEGIES AND COUNTERMEASURES
By: Raymond Ankobia

This discusses strategies and countermeasures that will help
alleviate threats and vulnerabilities commonly found in web
application development.

3.1 Security Management Programs

A security policy drafted and implemented from a holistic viewpoint
with full approval of senior executives. There must be security
education and awareness campaigns for the development team and
administrators to foster a secure development lifecycle. Policies
will ensure secure configuration of web servers and back end databases.
Key amongst education campaigns is social engineering [8][7] where
the attacker deceitfully extracts information directly from authorized
people.

3.2 Deployment of Application Firewalls This is a fairly new concept
that offers use of gateways that specifically operate at the
application layer. These are stateful, intelligent and content
driven programmes/appliances that operate by checking web content.
This allows for evaluation of attack signatures and exploits and
prevents them from impacting on the targets. They look out and allow
legitimate requests of users to reach the backend servers and
databases whilst preventing, logging and alerting administrators of
malicious activities. Even though these may be able to do a far better
job of analysing application content including graphics, they
are not a panacea and the battle is far from over. Malicious and
encrypted content will still get through firewalls [6].

3.3 Using SSL/TLS (HTTPS) Protocol

SSL/TLS has become the de-facto protocol for deploying secure web
applications running on HTTP. It is based on Public Key Technology
and X509 certificates, and defined by the Internet Engineering Task
Force (IEFT) RFC 2246. This is supported in most web browsers and
provides a secure tunnel between the client and the server. The server
side almost always authenticates to the client by making available its
public key to the client for verification; thereby offering a mechanism
to identify rogue servers that impersonate by spoofing IP addresses
with wrong DNS entries [8][7].

In most situations, the client side authentication is optional. This is
due largely to the overhead of requiring every client to have a public
key. This provides confidentiality, integrity and authenticity of
transactions between both ends of the traffic. However, it must be
emphasised that hackers concentrate on attacking the endpoints';
poor deployment and implementation of applications and databases make
easy break-ins.

Poor implementation of a secure protocol does not make it any better.
Attention to detailed instructions from these specifications is
imperative to get it right.

3.4 Sandboxing and Code Signing

This idea for using sandboxes and signing of code (especially mobile
code) is to introduce trust and assurance to the end user as to the
origin of the application in question. Sandboxes are restricted and
non-privileged operating environments [2][1]. Java Applets use this
approach by encapsulating permissions and rights to resources within
the programme itself.

This provides a safer environment as the Java Virtual Machine (embedded
in most browsers) consults the security manager for any violations or
privileged system calls that may compromise the local computer. The
author of a code may digitally sign it to give some authenticity and
confidence to the end user; allowing that signature to be publicly
verified using a certified public directory.

Authenticode is the approach by Microsoft for digitally signing code
to provide trust and authenticity of origin. Developers of ActiveX
controls/programmes may likewise sign the code to give similar level
of trust and authenticity. However, discretion is left entirely to the
user to check the authenticity of the digital signatures. [2] Clearly
declares, "A digital signature does not, however, provide any guarantee
of benevolence or competence". The Sandboxing (by Sun Microsystems)
approach offers better assurance since it comes with a built-in
security reference monitor that checks the access controls of the
objects. These architectures are designed with Public Key Infrastructure
(PKI) in mind and require education and awareness programmes on key
management and certification authorities.

3.5 Use of Honeypots

These are used to lure potential crackers / hackers. The principle is
one of falsifying information and placing it where hackers will
eventually find it. The original concept seem to have come from [9]
where he managed to bait hackers with falsified information which
eventually led to their capture. This allows for the footprints of
malicious activities to be logged, monitored and analysed. They help
analyse the weak points that may are exposed with subsequent
introduction of countermeasures that will seal any weaknesses that
may be exploited. Use of this technology does have some legal
implications. There is a debate as to whether this is enticement or
entrapment and may require legal interpretation before use.

3.6 Using SiteDigger

This is a tool developed by Foundstone Professional Services to help
web application developers and administrators test the efficacy of
security measures incorporated during design. It works in conjunction
with certain API's which will need to be downloaded from Google's
website (http://www.google.com/apis/). This tool will help the web
application developer or administrator to scan and generate reports
of any leakages on a particular website.

3.7 ISO/IEC 17799 (Part I)

This was originally a British code of practice for Information
Security Management and was later adopted by ISO as a Standard [5].
This has many facets for compliance and one of them is Systems
Development and Maintenance. Part II of this, is for accreditation
(currently being vetted by ISO for standardisation).
It engages the certifying party through a rigorous compliance
process, which includes the integration of controls and audit trails
built into application systems. It encourages stringent checks and
controls, Input data validation, message authentication to guard
against unauthorised changes, output validation to ensure correct
input and processing (the old adage "Garbage In, Garbage out), and
the use of cryptographic controls to protect the confidentiality
and integrity of information.

It also envisages strict and secure change control procedures
and principle of least principle, by making sure that support
developers are only given access to areas of their domain.

3.8 Security Audit

Self-Hack Audit [1]. The self-hack audit is an approach that uses
methodology used by developers to identify and eliminate security
weaknesses in an application before they are discovered and
compromised. This will include checking login prompts, brute forcing
passwords and setting up limits for login attempts. Penetration
Testing. Particular mention is made of The Open Web Application
Security Project (OWASP), which is an Open source platform used as
a benchmark for testing web application vulnerabilities.

Read Entire Article:
http://www.linuxsecurity.com/content/view/118427/49/

----------------------

Getting to Know Linux Security: File Permissions

Welcome to the first tutorial in the 'Getting to Know Linux Security'
series.  The topic explored is Linux file permissions.  It offers an
easy to follow explanation of how to read permissions, and how to set
them using chmod.  This guide is intended for users new to Linux
security, therefore very simple.  If the feedback is good, I'll
consider creating more complex guides for advanced users.  Please
let us know what you think and how these can be improved.

Click to view video demo:
http://www.linuxsecurity.com/content/view/118181/49/

---

The Tao of Network Security Monitoring: Beyond Intrusion Detection

To be honest, this was one of the best books that I've read on network
security. Others books often dive so deeply into technical discussions,
they fail to provide any relevance to network engineers/administrators
working in a corporate environment. Budgets, deadlines, and flexibility
are issues that we must all address. The Tao of Network Security
Monitoring is presented in such a way that all of these are still
relevant. One of the greatest virtues of this book is that is offers
real-life technical examples, while backing them up with relevant case
studies.

http://www.linuxsecurity.com/content/view/118106/49/

---

Encrypting Shell Scripts

Do you have scripts that contain sensitive information like
passwords and you pretty much depend on file permissions to keep
it secure?  If so, then that type of security is good provided
you keep your system secure and some user doesn't have a "ps -ef"
loop running in an attempt to capture that sensitive info (though
some applications mask passwords in "ps" output).

http://www.linuxsecurity.com/content/view/117920/49/

--------

-->  Take advantage of the LinuxSecurity.com Quick Reference Card!
-->  http://www.linuxsecurity.com/docs/QuickRefCard.pdf

+---------------------------------+
|  Distribution: Conectiva        | ----------------------------//
+---------------------------------+

* Conectiva: clamav Fix for denial of service in clamav
  3rd, March, 2005

Clamav[1] is an anti-virus utility for Unix/Linux.
This announcement updates clamav so it is able to update its database

from the server without any problems related to its format and also
because it fixes a security issue which could lead to a denial of
service[2] situation.

http://www.linuxsecurity.com/content/view/118480


* Conectiva: kernel Kernel fixes
  7th, March, 2005

The Linux kernel is responsible for handling the basic functions of
the GNU/Linux operating system.
This announcement has the following important changes.

http://www.linuxsecurity.com/content/view/118518


* Conectiva: squid Fixes for multiple squid vulnerabilities
  8th, March, 2005

Squid[1] is a full-featured web proxy cache.
This announcement fixes the following vulnerabilities for Squid.

http://www.linuxsecurity.com/content/view/118533


+---------------------------------+
|  Distribution: Debian           | ----------------------------//
+---------------------------------+

* Debian: New abuse packages fix local root exploit
  7th, March, 2005

Updated package.

http://www.linuxsecurity.com/content/view/118514


* Debian: New kppp packages fix privileged file descriptor leak
  8th, March, 2005

Updated package.

http://www.linuxsecurity.com/content/view/118534


+---------------------------------+
|  Distribution: Fedora           | ----------------------------//
+---------------------------------+

* Fedora Core 3 Update: HelixPlayer-1.0.3-3.fc3
  3rd, March, 2005

Updated HelixPlayer packages that fixes two buffer overflow issues
are now available.

http://www.linuxsecurity.com/content/view/118479


* Fedora Core 3 Update: tzdata-2005f-1.fc3
  3rd, March, 2005

Updated package.

http://www.linuxsecurity.com/content/view/118484


* Fedora Core 2 Update: tzdata-2005f-1.fc2
  3rd, March, 2005

Updated package.

http://www.linuxsecurity.com/content/view/118485


* Fedora Core 2 Update: kernel-2.6.10-1.770_FC2
  3rd, March, 2005

Updated package.

http://www.linuxsecurity.com/content/view/118486


* Fedora Core 3 Update: kernel-2.6.10-1.770_FC3
  3rd, March, 2005

Updated package.

http://www.linuxsecurity.com/content/view/118487


* Fedora Core 3 Update: libtool-1.5.6-4.FC3.1
  4th, March, 2005

Libtool is a program used by many other programs to create static and

dynamic libraries using a portable interface.
Libtool is generally configured as part of every package that uses
it.

http://www.linuxsecurity.com/content/view/118488


* Fedora Core 3 Update: firefox-1.0.1-1.3.2
  4th, March, 2005

Some users may experience spacing issues in textareas.	This update
resolves those issues, updating to the latest version of the pango
selection patch.

http://www.linuxsecurity.com/content/view/118499


* Fedora Core 2 Update: ipsec-tools-0.5-0.fc2
  4th, March, 2005

This updates ipsec-tools to 0.5, which correctly generates forward
policies so that tunnels work on current kernels.

http://www.linuxsecurity.com/content/view/118507


* Fedora Core 3 Update: ipsec-tools-0.5-0.fc3
  4th, March, 2005

This updates ipsec-tools to 0.5, which correctly generates forward
policies so that tunnels work on current kernels.

http://www.linuxsecurity.com/content/view/118508


* Fedora Core 3 Update: dmraid-1.0.0.rc6-1_FC3
  7th, March, 2005

This updates dmraid to 1.0.0.rc6, which includes support for VIA
ATARAID sets.

http://www.linuxsecurity.com/content/view/118515


* Fedora Core 3 Update: selinux-policy-targeted-1.17.30-2.85
  7th, March, 2005

Updated package.

http://www.linuxsecurity.com/content/view/118517


* Fedora Core 2 Update: ipsec-tools-0.5-1.fc2
  7th, March, 2005

This update fixes some packaging errors:
the /var/racoon directory is shipped, for use with the admin port
racoon correctly looks for its config file in /etc/racoon now

http://www.linuxsecurity.com/content/view/118520


* Fedora Core 3 Update: ipsec-tools-0.5-1.fc3
  7th, March, 2005

This update fixes some packaging errors:
the /var/racoon directory is shipped, for use with the admin port
racoon correctly looks for its config file in /etc/racoon now

http://www.linuxsecurity.com/content/view/118521


* Fedora Core 2 Update: gaim-1.1.4-1.FC2
  7th, March, 2005

This fixes the crash in the Gadu Gadu protocol, and makes Yahoo file
transfer and buddy icons work for the more common non-proxy case.
Unfortunately this probably breaks the less common proxy case.

http://www.linuxsecurity.com/content/view/118526


* Fedora Core 3 Update: gaim-1.1.4-1.FC3
  7th, March, 2005

This fixes the crash in the Gadu Gadu protocol, and makes Yahoo file
transfer and buddy icons work for the more common non-proxy case.
Unfortunately this probably breaks the less common proxy case.

http://www.linuxsecurity.com/content/view/118527


* Fedora Core 2 Update: libexif-0.5.12-2.2
  8th, March, 2005

Updated package.

http://www.linuxsecurity.com/content/view/118535


* Fedora Core 3 Update: libexif-0.5.12-3.1
  8th, March, 2005

Updated package.

http://www.linuxsecurity.com/content/view/118536


* Fedora Core 3 Update: gimp-2.2.4-0.fc3.1
  8th, March, 2005

Updated package.

http://www.linuxsecurity.com/content/view/118537


* Subject: Fedora Core 3 Update: yum-2.2.0-0.fc3
  8th, March, 2005

New yum release fixes multiple small bugs.

http://www.linuxsecurity.com/content/view/118538


* Fedora Core 3 Update: grip-3.2.0-4
  9th, March, 2005

This fixes a buffer overflow when the CDDB server returns more than
16 matches.

http://www.linuxsecurity.com/content/view/118543


* Fedora Core 2 Update: grip-3.2.0-3.fc2
  9th, March, 2005

This fixes a buffer overflow when the CDDB server returns more than
16 matches.

http://www.linuxsecurity.com/content/view/118544


+---------------------------------+
|  Distribution: Gentoo           | ----------------------------//
+---------------------------------+

* Gentoo: BidWatcher Format string vulnerability
  3rd, March, 2005

BidWatcher is vulnerable to a format string vulnerability,
potentially allowing arbitrary code execution.

http://www.linuxsecurity.com/content/view/118483


* Gentoo: OpenMotif, LessTif New libXpm buffer overflows
  4th, March, 2005

A new vulnerability has been discovered in libXpm, which is included
in OpenMotif and LessTif, that can potentially lead to remote code
execution.

http://www.linuxsecurity.com/content/view/118493


* Gentoo: xv Filename handling vulnerability
  4th, March, 2005

xv contains a format string vulnerability, potentially resulting in
the execution of arbitrary code.

http://www.linuxsecurity.com/content/view/118497


* Gentoo: Mozilla Firefox Various vulnerabilities
  4th, March, 2005

Mozilla Firefox is vulnerable to a local file deletion issue and to
various issues allowing to trick the user into trusting fake web
sites or interacting with privileged content.

http://www.linuxsecurity.com/content/view/118498


* Gentoo: ImageMagick Filename handling vulnerability
  6th, March, 2005

A format string vulnerability exists in ImageMagick that may allow an

attacker to execute arbitrary code.

http://www.linuxsecurity.com/content/view/118509


* Gentoo: Hashcash Format string vulnerability
  6th, March, 2005

A format string vulnerability in the Hashcash utility could allow an
attacker to execute arbitrary code.

http://www.linuxsecurity.com/content/view/118510


* Gentoo: mlterm Integer overflow vulnerability
  7th, March, 2005

mlterm is vulnerable to an integer overflow, which could potentially
allow the execution of arbitrary code.

http://www.linuxsecurity.com/content/view/118516


* Gentoo: KDE dcopidlng Insecure temporary file creation
  7th, March, 2005

The dcopidlng script is vulnerable to symlink attacks, potentially
allowing a local user to overwrite arbitrary files.

http://www.linuxsecurity.com/content/view/118519


+---------------------------------+
|  Distribution: Mandrake         | ----------------------------//
+---------------------------------+

* Mandrake: Updated curl packages fix
  4th, March, 2005

"infamous41md" discovered a buffer overflow vulnerability in
libcurl's NTLM authorization base64 decoding.  This could allow a
remote attacker using a prepared remote server to execute arbitrary
code as the user running curl. The updated packages are patched to
deal with these issues.

http://www.linuxsecurity.com/content/view/118500


* Mandrake: Updated gaim packages fix
  4th, March, 2005

Gaim versions prior to version 1.1.4 suffer from a few security
issues such as the HTML parses not sufficiently validating its input.
This allowed a remote attacker to crash the Gaim client be sending
certain malformed HTML messages (CAN-2005-0208 and CAN-2005-0473).

http://www.linuxsecurity.com/content/view/118501


* Mandrake: Updated gftp packages fix
  4th, March, 2005

A vulnerability in gftp could allow a malicious FTP server to
overwrite files on the local system as the user running gftp due to
improper handling of filenames containing slashes.
The updated packages are patched to deal with these issues.

http://www.linuxsecurity.com/content/view/118502


* Mandrake: Updated cyrus-imapd packages
  4th, March, 2005

Several overruns have been fixed in the IMAP annote extension as well
as in cached header handling which can be run by an authenticated
user.  As well, additional bounds checking in fetchnews was improved
to avoid exploitation by a peer news admin.

http://www.linuxsecurity.com/content/view/118503


* Mandrake: Updated imap packages include
  4th, March, 2005

The imap package was missing a requires for xinetd, which is required
for using the daemon. Updated packages include this requirement.

http://www.linuxsecurity.com/content/view/118504


* Mandrake: Updated kdegraphics packages
  4th, March, 2005

Previous updates to correct integer overflow issues affecting xpdf
overlooked certain conditions when built for a 64 bit platform.
(formerly CAN-2004-0888). This also affects applications like
kdegraphics, that use embedded versions of xpdf. (CAN-2005-0206)

http://www.linuxsecurity.com/content/view/118505


* Mandrake: Updated unixODBC packages
  4th, March, 2005

The unixODBC packages shipped with Mandrakelinux 10.1 had a couple of
issues with the GUI config tools: The gtk interface gODBCConfig does
not exit when it's window is closed.

http://www.linuxsecurity.com/content/view/118506


* Mandrake: Updated dynamic packages
  8th, March, 2005

Dynamic did not launch kaffeine on insertion of a DVD vide when using
KDE as the desktop.  The updated version now launches kaffeine.

http://www.linuxsecurity.com/content/view/118528


+---------------------------------+
|  Distribution: Red Hat          | ----------------------------//
+---------------------------------+

* RedHat: Moderate: squid security update
  3rd, March, 2005

Updated squid packages that fix a denial of service issue are now
available. This update has been rated as having important security
impact by the Red Hat Security Response Team

http://www.linuxsecurity.com/content/view/118476


* RedHat: Low: kdenetwork security update
  3rd, March, 2005

Updated kdenetwork packages that fix a file descriptor leak are now
available. This update has been rated as having low security impact
by the Red Hat Security Response Team

http://www.linuxsecurity.com/content/view/118477


* RedHat: Critical: RealPlayer security update
  3rd, March, 2005

An updated RealPlayer package that fixes two buffer overflow issues
is now available. This update has been rated as having critical
security impact by the Red Hat Security Response Team.

http://www.linuxsecurity.com/content/view/118478


* RedHat: Critical: HelixPlayer security update
  3rd, March, 2005

An updated HelixPlayer package that fixes two buffer overflow issues
is now available. This update has been rated as having critical
security impact by the Red Hat Security Response Team.

http://www.linuxsecurity.com/content/view/118481


* RedHat: Important: xpdf security update
  4th, March, 2005

An updated xpdf package that correctly fixes several integer
overflows is now available. This update has been rated as having
important security impact by the Red Hat Security Response Team.

http://www.linuxsecurity.com/content/view/118489


* RedHat: Moderate: mc security update
  4th, March, 2005

Updated mc packages that fix multiple security issues are now
available. This update has been rated as having moderate security
impact by the Red Hat Security Response Team.

http://www.linuxsecurity.com/content/view/118490


* RedHat: Critical: mozilla security update
  4th, March, 2005

Updated mozilla packages that fix a buffer overflow issue are now
available.  This update has been rated as having critical security
impact by the Red Hat Security Response Team.

http://www.linuxsecurity.com/content/view/118491


+---------------------------------+
|  Distribution: SuSE             | ----------------------------//
+---------------------------------+

* SuSE: cyrus-sasl remote code execution
  3rd, March, 2005

A buffer overflow in the digestmda5 code was identified that could
lead to a remote attacker executing code in the context of the
service using sasl authentication.

http://www.linuxsecurity.com/content/view/118472


* SuSE: RealPlayer remote buffer overflow
  9th, March, 2005

Two security problems were found in the media player RealPlayer.

http://www.linuxsecurity.com/content/view/118542


------------------------------------------------------------------------
Distributed by: Guardian Digital, Inc.                LinuxSecurity.com

     To unsubscribe email vuln-newsletter-request@xxxxxxxxxxxxxxxxx
         with "unsubscribe" in the subject of the message.
------------------------------------------------------------------------


[Index of Archives]     [Fedora Announce]     [Linux Crypto]     [Kernel]     [Netfilter]     [Bugtraq]     [USB]     [Fedora Security]

  Powered by Linux