Linux Advisory Watch - May 27th 2005

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



+---------------------------------------------------------------------+
|  LinuxSecurity.com                             Weekly Newsletter    |
|  May 28th, 2005                             Volume 6, Number 21a    |
+---------------------------------------------------------------------+

  Editors:      Dave Wreski                     Benjamin D. Thomas
                dave@xxxxxxxxxxxxxxxxx          ben@xxxxxxxxxxxxxxxxx

Linux Advisory Watch is a comprehensive newsletter that outlines the
security vulnerabilities that have been announced throughout the
week.  It includes pointers to updated packages and descriptions of
each vulnerability.

This week, perhaps the most interesting articles include ppxp, oops,
libconvert, qpopper, gail, dmraid, openssl, kernel, netpbm, sudo,
texinfo, FreeRADIUS, gdb, ImageMagick, Net-SNMP, gxine, evolution,
firefox, mozilla, ethereal, and less tif.  The distributors include
Debian, Fedora, Gentoo, and Red Hat.

---

## Internet Productivity Suite: Open Source Security ##
Trust Internet Productivity Suite's open source architecture to
give you the best security and productivity applications available.
Collaborating with thousands of developers, Guardian Digital
security engineers implement the most technologically advanced
ideas and methods into their design.

Click to find out more!
http://store.guardiandigital.com/html/eng/products/software/ips_overview.shtml

---

Information Security Techniques
By: Benjamin D. Thomas

When addressing matters of information confidentiality,
integrity, and availability, there are four perspectives that
can be taken when introducing security controls. A control
can be a protection, detection, response, or assurance mechanism.
It is not uncommonfor a single control to provide information
security on multiple levels.

* Protection: A protection mechanism is used to prevent security
  incidents from occurring. Examples of protection mechanisms
  include: firewall rules, access control lists, encrypting packets
  that transverse over a network, passwords, biometrics, etc.

* Detection: It is an information security mechanism that detects
  when an incident is occurring, and allows a business to adjust its
  course of action. Detection mechanisms include: intrusion
  detection systems, virus/spam scanners, vulnerability scanning,
  quotas, logging alerts, etc. Detection mechanisms often lead
  into response mechanisms, and are often the same as or similar
  to assurance mechanisms.

* Response: A response mechanism addresses the consequences of a
  security incident and helps the organization return to a normal
  state. Response mechanisms can either be in the form of technical
  security controls (e.g. intrusion prevention system), policy (e.g.
  requiring a computer emergency response team), or procedures
  developed for all persons to follow during an incident.

* Assurance: Assurance mechanisms give management or third parties
  the ability to verify the effectiveness of the security controls
  in place. It may include logging, auditing, and reporting
  capabilities. Assurance is important to help justify further
  expenditure on information security projects.

----------------------

Measuring Security IT Success

In a time where budgets are constrained and Internet threats are
on the rise, it is important for organizations to invest in network
security applications that will not only provide them with powerful
functionality but also a rapid return on investment.

http://www.linuxsecurity.com/content/view/118817/49/

---

Getting to Know Linux Security: File Permissions

Welcome to the first tutorial in the 'Getting to Know Linux Security'
series.  The topic explored is Linux file permissions.  It offers an
easy to follow explanation of how to read permissions, and how to set
them using chmod.  This guide is intended for users new to Linux
security, therefore very simple.  If the feedback is good, I'll
consider creating more complex guides for advanced users.  Please
let us know what you think and how these can be improved.

Click to view video demo:
http://www.linuxsecurity.com/content/view/118181/49/

---

The Tao of Network Security Monitoring: Beyond Intrusion Detection

To be honest, this was one of the best books that I've read on network
security. Others books often dive so deeply into technical discussions,
they fail to provide any relevance to network engineers/administrators
working in a corporate environment. Budgets, deadlines, and flexibility
are issues that we must all address. The Tao of Network Security
Monitoring is presented in such a way that all of these are still
relevant. One of the greatest virtues of this book is that is offers
real-life technical examples, while backing them up with relevant case
studies.

http://www.linuxsecurity.com/content/view/118106/49/

--------

-->  Take advantage of the LinuxSecurity.com Quick Reference Card!
-->  http://www.linuxsecurity.com/docs/QuickRefCard.pdf


+---------------------------------+
|  Distribution: Debian           | ----------------------------//
+---------------------------------+

* Debian: New ppxp packages fix local root exploit
  19th, May, 2005

Updated package.

http://www.linuxsecurity.com/content/view/119151


* Debian: New oops packages fix format string vulnerability
  20th, May, 2005

Updated package.

http://www.linuxsecurity.com/content/view/119158


* Debian: New libconvert-uulib-perl packages fix arbitrary code
execution
  20th, May, 2005

Updated package.

http://www.linuxsecurity.com/content/view/119164


* Debian: New qpopper packages fix arbitrary file overwriting
  25th, May, 2005

Updated package.

http://www.linuxsecurity.com/content/view/119194


* Debian: New qpopper packages fix arbitrary file overwriting
  26th, May, 2005

Updated package.

http://www.linuxsecurity.com/content/view/119199



+---------------------------------+
|  Distribution: Fedora           | ----------------------------//
+---------------------------------+

* Fedora Core 3 Update: gail-1.8.0-3.fc3
  19th, May, 2005

The tamil translations in the gail package were not
encoded in UTF-8.

http://www.linuxsecurity.com/content/view/119155


* Fedora Core 3 Update: dmraid-1.0.0.rc8-FC3_2
  23rd, May, 2005

Updated packages.

http://www.linuxsecurity.com/content/view/119173


* Fedora Core 3 Update: openssl-0.9.7a-42.1
  23rd, May, 2005

Updated package.

http://www.linuxsecurity.com/content/view/119174


* Fedora Core 3 Update: openssl096b-0.9.6b-21.1
  23rd, May, 2005

Updated package.

http://www.linuxsecurity.com/content/view/119175


* Fedora Core 3 Update: kernel-2.6.11-1.27_FC3
  23rd, May, 2005

Updated package.

http://www.linuxsecurity.com/content/view/119176


* Fedora Core 3 Update: netpbm-10.27-3.FC3
  24th, May, 2005

Updated package.

http://www.linuxsecurity.com/content/view/119183


* Fedora Core 3 Update: sudo-1.6.7p5-30.2
  24th, May, 2005

Updated package.

http://www.linuxsecurity.com/content/view/119186


* Fedora Core 3 Update: texinfo-4.8-2.1
  24th, May, 2005

This is an upgrade to 4.8, which fixes a segmentation fault
problem.

http://www.linuxsecurity.com/content/view/119187



+---------------------------------+
|  Distribution: Gentoo           | ----------------------------//
+---------------------------------+

* Gentoo: Cheetah Untrusted module search path
  19th, May, 2005

Cheetah contains a vulnerability in the module importing code
that can allow a local user to gain escalated privileges.

http://www.linuxsecurity.com/content/view/119152


* Gentoo: Kommander Insecure remote script execution
  20th, May, 2005

The fixed ebuild proposed in the original version of this
Security Advisory did not address all the vulnerabilities.

http://www.linuxsecurity.com/content/view/119159


* Gentoo: FreeRADIUS SQL injection and Denial of Service
vulnerability
  20th, May, 2005

The FreeRADIUS server is vulnerable to an SQL injection attack
and a buffer overflow, possibly resulting in disclosure and
modification of data and Denial of Service.

http://www.linuxsecurity.com/content/view/119160


* Gentoo: gdb Multiple vulnerabilities
  20th, May, 2005

Multiple vulnerabilities have been discovered in the GNU
debugger, potentially allowing the execution of arbitrary
code.

http://www.linuxsecurity.com/content/view/119161


* Gentoo: ImageMagick, GraphicsMagick Denial of Service
  21st, May, 2005

ImageMagick and GraphicsMagick utilities can be abused
to perform a Denial of Service attack.

http://www.linuxsecurity.com/content/view/119165


* Gentoo: Qpopper Multiple Vulnerabilities
  23rd, May, 2005

Qpopper contains two vulnerabilities allowing an attacker to
overwrite arbitrary files and create files with insecure
permissions.

http://www.linuxsecurity.com/content/view/119177


* Gentoo: Net-SNMP fixproc insecure temporary file creation
  23rd, May, 2005

Net-SNMP creates temporary files in an insecure manner, possibly
allowing the execution of arbitrary code.

http://www.linuxsecurity.com/content/view/119178


* Gentoo: gxine Format string vulnerability
  26th, May, 2005

A format string vulnerability in gxine could allow a remote
attacker to execute arbitrary code.

http://www.linuxsecurity.com/content/view/119200



+---------------------------------+
|  Distribution: Red Hat          | ----------------------------//
+---------------------------------+

* RedHat: Low: evolution security update
  19th, May, 2005

Updated evolution packages that fix various bugs are now available.
This update has been rated as having low security impact by the Red
Hat
Security Response Team.

http://www.linuxsecurity.com/content/view/119153


* RedHat: Important: firefox security update
  23rd, May, 2005

Updated firefox packages that fix various security bugs are now
available. This update has been rated as having important security
impact by the Red Hat Security Response Team.

http://www.linuxsecurity.com/content/view/119167


* RedHat: Important: mozilla security update
  23rd, May, 2005

Updated mozilla packages that fix various security bugs are now
available. This update has been rated as having important security
impact by the Red Hat Security Response Team.

http://www.linuxsecurity.com/content/view/119168


* RedHat: Moderate: ethereal security update
  24th, May, 2005

Updated Ethereal packages that fix various security vulnerabilities
are now available. This update has been rated as having moderate
security impact by the Red Hat Security Response Team.

http://www.linuxsecurity.com/content/view/119188


* RedHat: Moderate: lesstif security update
  24th, May, 2005

Updated lesstif packages that fix flaws in the Xpm library are now
available for Red Hat Enterprise Linux 2.1. This update has been
rated as having Moderate security impact by the Red Hat Security
Response Team.

http://www.linuxsecurity.com/content/view/119189


* RedHat: Important: ImageMagick security update
  25th, May, 2005

Updated ImageMagick packages that fix a buffer overflow issue are
now available. This update has been rated as having important
security impact by the Red Hat Security Response Team.

http://www.linuxsecurity.com/content/view/119195


* RedHat: Important: kernel security update
  25th, May, 2005

Updated kernel packages that fix several security issues
in the Red Hat Enterprise Linux 3 kernel are now available.
This security advisory has been rated as having important
security impact by the Red Hat Security Response Team.

http://www.linuxsecurity.com/content/view/119196


------------------------------------------------------------------------
Distributed by: Guardian Digital, Inc.                LinuxSecurity.com

     To unsubscribe email vuln-newsletter-request@xxxxxxxxxxxxxxxxx
         with "unsubscribe" in the subject of the message.
------------------------------------------------------------------------


[Index of Archives]     [Fedora Announce]     [Linux Crypto]     [Kernel]     [Netfilter]     [Bugtraq]     [USB]     [Fedora Security]

  Powered by Linux