+---------------------------------------------------------------------+ | LinuxSecurity.com Weekly Newsletter | | September 22nd 2006 Volume 7, Number 39a | +---------------------------------------------------------------------+ Editors: Dave Wreski Benjamin D. Thomas dave@xxxxxxxxxxxxxxxxx ben@xxxxxxxxxxxxxxxxx Linux Advisory Watch is a comprehensive newsletter that outlines the security vulnerabilities that have been announced throughout the week. It includes pointers to updated packages and descriptions of each vulnerability. This week, advisories were released for Mozilla, usermin, bomberclone, freetype, alsaplayer, gzip, DokuWiki, BIND, Mailman, xorge-x11, ipsec-tools, mailman, gnutls, firefox, seamonkey, thunderbird, php, openssl, bind, x11, php, and flash-player. The distributors include Debian, Gentoo, Mandriva, Red Hat, Slackware, and SuSE. --- Earn an NSA recognized IA Masters Online The NSA has designated Norwich University a center of Academic Excellence in Information Security. Our program offers unparalleled Infosec management education and the case study affords you unmatched consulting experience. Using interactive e-Learning technology, you can earn this esteemed degree, without disrupting your career or home life. http://www.msia.norwich.edu/linsec/ --- RFID with Bio-Smart Card in Linux In this paper, we describe the integration of fingerprint template and RF smart card for clustered network, which is designed on Linux platform and Open source technology to obtain biometrics security. Combination of smart card and biometrics has achieved in two step authentication where smart card authentication is based on a Personal Identification Number (PIN) and the card holder is authenticated using the biometrics template stored in the smart card that is based on the fingerprint verification. The fingerprint verification has to be executed on central host server for security purposes. Protocol designed allows controlling entire parameters of smart security controller like PIN options, Reader delay, real-time clock, alarm option and cardholder access conditions. The RF Smart Card and card reader/writer were developed to handle payment transaction for public transportation systems. These contact less cards have security features, such as encrypted RF transmission mutual authentication, and security keys. The RF smart card has up to 16 separate sectors, which can be configured as purses or for general data storage. The first sector is typically used as a directory for the rest of the card, leaving 15 segments available for data or purses. Each sector has two keys, called the A and B keys, allowing different access privileges to that sector. These key pairs can be designated as read and read/write, or decrement and increment/decrement .For example this would allow turnstile readers with the A key to only deduct value from a card sector, while smart card readers with the B keys could either add or subtract value .The card also has a 32-bit unique random number, which is permanently encoded into each chip by the chip manufacturer. Public key infrastructure (PKI) based systems are used to construct a secure system that can achieve secure access conditions. They are consequently being used to carry keys and store personal information in applications such student identification systems. http://www.linuxsecurity.com/content/view/125052/171/ ---------------------- * EnGarde Secure Community 3.0.8 Released 1st, August, 2006 Guardian Digital is happy to announce the release of EnGarde Secure Community 3.0.8 (Version 3.0, Release 8). This release includes several bug fixes and feature enhancements to the Guardian Digital WebTool, several updated packages, and several new packages available for installation. http://www.linuxsecurity.com/content/view/123902 --- Packet Sniffing Overview The best way to secure you against sniffing is to use encryption. While this won.t prevent a sniffer from functioning, it will ensure that what a sniffer reads is pure junk. http://www.linuxsecurity.com/content/view/123570/49/ --- Review: How To Break Web Software With a tool so widely used by so many different types of people like the World Wide Web, it is necessary for everyone to understand as many aspects as possible about its functionality. From web designers to web developers to web users, this is a must read. Security is a job for everyone and How To Break Web Software by Mike Andrews and James A. Whittaker is written for everyone to understand. http://www.linuxsecurity.com/content/view/122713/49/ -------- --> Take advantage of the LinuxSecurity.com Quick Reference Card! --> http://www.linuxsecurity.com/docs/QuickRefCard.pdf +---------------------------------+ | Distribution: Debian | ----------------------------// +---------------------------------+ * Debian: New Mozilla packages fix several vulnerabilities 15th, September, 2006 The latest security updates of Mozilla introduced a regression that led to a disfunctional attachment panel which warrants a correction to fix this issue. For reference please find below the original advisory text: CVE-2006-2779 CVE-2006-3805 CVE-2006-3806 CVE-2006-3807 CVE-2006-3808 CVE-2006-3809 CVE-2006-3810 http://www.linuxsecurity.com/content/view/124970 * Debian: New usermin packages fix denial of service 15th, September, 2006 Updated package. http://www.linuxsecurity.com/content/view/124984 * Debian: New bomberclone packages fix several vulnerabilities 19th, September, 2006 Luigi Auriemma discovered two security related bugs in bomberclone, a free Bomberman clone. The Common Vulnerabilities and Exposures project identifies the following problems: CVE-2006-4005 CVE-2006-4006 http://www.linuxsecurity.com/content/view/125031 * Debian: New freetype packages fix execution of arbitrary code 16th, September, 2006 Updated package. http://www.linuxsecurity.com/content/view/124999 * Debian: New alsaplayer packages fix denial of service 19th, September, 2006 Updated package. http://www.linuxsecurity.com/content/view/125020 * Debian: New gzip packages fix arbitrary code execution 19th, September, 2006 Updated package. http://www.linuxsecurity.com/content/view/125034 +---------------------------------+ | Distribution: Gentoo | ----------------------------// +---------------------------------+ * Gentoo: DokuWiki Arbitrary command execution 14th, September, 2006 Vulnerabilities in some accessory scripts of DokuWiki allow remote code execution. http://www.linuxsecurity.com/content/view/124950 * Gentoo: BIND Denial of Service 15th, September, 2006 ISC BIND contains two vulnerabilities allowing a Denial of Service under certain conditions. http://www.linuxsecurity.com/content/view/124975 * Gentoo: Mailman Multiple vulnerabilities 19th, September, 2006 Mailman has multiple vulnerable that can result in Denial of Service, log file injection and XSS. http://www.linuxsecurity.com/content/view/125028 +---------------------------------+ | Distribution: Mandriva | ----------------------------// +---------------------------------+ * Mandriva: Updated xorg-x11/XFree86 packages fix integer overflow vulnerabilities 15th, September, 2006 Local exploitation of an integer overflow vulnerability in the 'CIDAFM()' function in the X.Org and XFree86 X server could allow an attacker to execute arbitrary code with privileges of the X server, typically root (CVE-2006-3739). http://www.linuxsecurity.com/content/view/124981 * Mandriva: Updated ipsec-tools to address various issues 15th, September, 2006 IPsec-Tools[1] is a port of KAME's IPsec utilities to the Linux-2.6 IPsec implementation. This update fixes a few issues and introduces new functionalities to the package provided for Mandriva 2006 users. It is recommended that users of ipsec-tools upgrade their packages. After the upgrade, the services will be restarted automatically if needed. http://www.linuxsecurity.com/content/view/124994 * Mandriva: Updated mailman packages fix multiple vulnerabilities 18th, September, 2006 A flaw was discovered in how Mailman handles MIME multipart messages where an attacker could send a carefully-crafted MIME multipart message to a Mailman-run mailing list causing that mailing list to stop working (CVE-2006-2941). http://www.linuxsecurity.com/content/view/125018 * Mandriva: Updated gnutls packages fixes PKCS signature verification issue. 20th, September, 2006 verify.c in GnuTLS before 1.4.4, when using an RSA key with exponent 3, does not properly handle excess data in the digestAlgorithm.parameters field when generating a hash, which allows remote attackers to forge a PKCS #1 v1.5 signature that is signed by that RSA key and prevents GnuTLS from correctly verifying X.509 and other certificates that use PKCS, a variant of CVE-2006-4339. The provided packages have been patched to correct this issues. http://www.linuxsecurity.com/content/view/125041 * Mandriva: Updated gzip packages fix multiple vulnerabilities 20th, September, 2006 The following CVE IDs have been addressed by this update: CVE-2006-4334 CVE-2006-4335 CVE-2006-4336 CVE-2006-4337 CVE-2006-4338 http://www.linuxsecurity.com/content/view/125042 * Mandriva: Updated Firefox packages fix multiple vulnerabilities 21st, September, 2006 A number of security vulnerabilities have been discovered and corrected in the latest Mozilla Firefox program, version 1.5.0.7. This update provides the latest Firefox to correct these issues. http://www.linuxsecurity.com/content/view/125049 +---------------------------------+ | Distribution: Red Hat | ----------------------------// +---------------------------------+ * RedHat: Important: gnutls security update 14th, September, 2006 Updated gnutls packages that fix a security issue are now available for Red Hat Enterprise Linux 4. This update has been rated as having important security impact by the Red Hat Security Response Team. http://www.linuxsecurity.com/content/view/124947 * RedHat: Critical: firefox security update 15th, September, 2006 Updated firefox packages that fix several security bugs are now available for Red Hat Enterprise Linux 4. This update has been rated as having critical security impact by the Red Hat Security Response Team. http://www.linuxsecurity.com/content/view/124972 * RedHat: Critical: seamonkey security update 15th, September, 2006 Updated seamonkey packages that fix several security bugs are now available for Red Hat Enterprise Linux 2.1, 3, and 4. This update has been rated as having critical security impact by the Red Hat Security Response Team. http://www.linuxsecurity.com/content/view/124973 * RedHat: Critical: thunderbird security update 15th, September, 2006 Updated thunderbird packages that fix several security bugs are now available for Red Hat Enterprise Linux 4. This update has been rated as having critical security impact by the Red Hat Security Response Team. http://www.linuxsecurity.com/content/view/124974 * RedHat: Moderate: gzip security update 19th, September, 2006 Updated gzip packages that fix several security issues are now available for Red Hat Enterprise Linux. This update has been rated as having moderate security impact by the Red Hat Security Response Team. http://www.linuxsecurity.com/content/view/125029 * RedHat: Moderate: php security update 21st, September, 2006 Updated PHP packages that fix multiple security issues are now available for Red Hat Enterprise Linux 3 and 4. This update has been rated as having moderate security impact by the Red Hat Security Response Team. http://www.linuxsecurity.com/content/view/125044 * RedHat: Moderate: php security update 21st, September, 2006 Updated PHP packages that fix multiple security issues are now available for Red Hat Enterprise Linux 2.1. This update has been rated as having moderate security impact by the Red Hat Security Response Team. http://www.linuxsecurity.com/content/view/125045 +---------------------------------+ | Distribution: Slackware | ----------------------------// +---------------------------------+ * Slackware: openssl 14th, September, 2006 Updated package. http://www.linuxsecurity.com/content/view/124954 * Slackware: bind DoS 14th, September, 2006 New bind packages are available for Slackware 9.0, 9.1, 10.0, 10.1, 10.2, and -current to fix a Denial of Service issue. http://www.linuxsecurity.com/content/view/124955 * Slackware: firefox/thunderbird/seamonkey 15th, September, 2006 New Firefox and Thunderbird packages are available for Slackware 10.2 and -current to fix security issues. In addition, a new Seamonkey package is available for Slackware -current to fix similar issues. http://www.linuxsecurity.com/content/view/124971 * Slackware: x11 multiple vulnerabilities 17th, September, 2006 New x11 (X.Org) packages are available for Slackware 10.2, and -current to fix security issues due to overflows in font parsing. More details about this issue may be found in the Common Vulnerabilities and Exposures (CVE) database: CVE-2006-3739 CVE-2006-3740 http://www.linuxsecurity.com/content/view/125000 * Slackware: gzip 19th, September, 2006 New gzip packages are available for Slackware 8.1, 9.0, 9.1, 10.0, 10.1, 10.2, and -current to fix possible security issues. http://www.linuxsecurity.com/content/view/125036 * SuSE: php4,php5 (SUSE-SA:2006:052) 21st, September, 2006 Various security problems have been fixed in the PHP script language engine and its modules, versions 4 and 5. The PHP4 updated packages were released on September 12, the PHP5 update packages were released on September 20. The following CVE IDs have been resolved: CVE-2006-2563 CVE-2006-4483 CVE-2006-4481 CVE-2006-4482 CVE-2006-4484 CVE-2006-4482 CVE-2006-4020 http://www.linuxsecurity.com/content/view/125043 * SuSE: flash-player (SUSE-SA:2006:053) 21st, September, 2006 Multiple input validation errors have been identified in the Macromedia Flash Player that could lead to the potential execution of arbitrary code. These vulnerabilities could be accessed through content delivered from a remote location via the user's web browser, email client, or other applications that include or reference the Flash Player. (CVE-2006-3311, CVE-2006-3587, CVE-2006-3588) These updates also include changes to prevent circumvention of the "allowScriptAccess" option. (CVE-2006-4640) http://www.linuxsecurity.com/content/view/125048 ------------------------------------------------------------------------ Distributed by: Guardian Digital, Inc. LinuxSecurity.com To unsubscribe email vuln-newsletter-request@xxxxxxxxxxxxxxxxx with "unsubscribe" in the subject of the message. ------------------------------------------------------------------------