Linux Advisory Watch - September 29th 2006

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



+---------------------------------------------------------------------+
|  LinuxSecurity.com                               Weekly Newsletter  |
|  September 29th 2006                          Volume 7, Number 40a  |
+---------------------------------------------------------------------+

  Editors:      Dave Wreski                     Benjamin D. Thomas
                dave@xxxxxxxxxxxxxxxxx          ben@xxxxxxxxxxxxxxxxx

Linux Advisory Watch is a comprehensive newsletter that outlines the
security vulnerabilities that have been announced throughout the
week.  It includes pointers to updated packages and descriptions of
each vulnerability.

This week, advisories were released for gnutls11, openssl, gzip,
ImageMagick, GnuTLS, tikiwiki, openssh, opera, firefox, thunderbird,
webmin, fibric, php, squirrelmail, php, flash-player, mozilla, and
the Linux kernel.  The distributors include Debian, Gentoo, Mandriva,
Red Hat, and SuSE.

---

Earn an NSA recognized IA Masters Online

The NSA has designated Norwich University a center of Academic
Excellence in Information Security. Our program offers unparalleled
Infosec management education and the case study affords you unmatched
consulting experience. Using interactive e-Learning technology, you
can earn this esteemed degree, without disrupting your career or home
life.

http://www.msia.norwich.edu/linsec/

---

Access Control Systems and Biometric Smart card

The client stores a user.s certificate including a public
and a private key that are issued by a certification authority
in advance. A random number (RN) generated by the server is
encrypted with the private key in the client, then the encrypted
random number (ERN) is validated in the server with both CA's and
the use's certificate.

In the case of embedding a fingerprint matching function into the
server, the transmission of fingerprint images from the client to
the server is required. This requirement means that other
transmission protocols specialized for user validation must be
added to the system. However, this is not desirable for standard
entity authentication systems because of the prohibitive cost.
Therefore, the matching function must be embedded in the client
in this case. For a similar reason, the templates must be stored
in the client. Although there are actually many choices of
connection between fingerprint matching and entity authentication,
activation of the user's private key or the encryption function
depending on the result of the fingerprint matching is appropriate
in consideration of matching junction and the template residing
in the client.

The card memory is organized as 8192 Bit EEPROM, which is split
into 16 sectors with 4 blocks. One block consists of 16 bytes.
The first block of the memory is reserved for manufacturer data
like 32 bit serial number. This is a read only block. It is
named as "Block 0". Access conditions for the Data Blocks are
defined in the Sector Trailers. According to these conditions
data can be read, written, incremented, decremented, transferred
or restored either with Key A, Key B or never. The RF Smart
card consists of two types of Data Blocks: Read/write blocks,
Value blocks.

http://www.linuxsecurity.com/content/view/125052/171/

----------------------

* EnGarde Secure Community 3.0.8 Released
  1st, August, 2006

Guardian Digital is happy to announce the release of EnGarde
Secure Community 3.0.8 (Version 3.0, Release 8).  This release
includes several bug fixes and feature enhancements to the Guardian
Digital WebTool, several updated packages, and several new
packages available for installation.

http://www.linuxsecurity.com/content/view/123902

---

Packet Sniffing Overview

The best way to secure you against sniffing is to use encryption.
While this won't prevent a sniffer from functioning, it will ensure
that what a sniffer reads is pure junk.

http://www.linuxsecurity.com/content/view/123570/49/

---

Review: How To Break Web Software

With a tool so widely used by so many different types of
people like the World Wide Web, it is necessary for everyone
to understand as many aspects as possible about its
functionality. From web designers to web developers to web
users, this is a must read. Security is a job for everyone
and How To Break Web Software by Mike Andrews and James A.
Whittaker is written for everyone to understand.

http://www.linuxsecurity.com/content/view/122713/49/

--------

-->  Take advantage of the LinuxSecurity.com Quick Reference Card!
-->  http://www.linuxsecurity.com/docs/QuickRefCard.pdf


+---------------------------------+
|  Distribution: Debian           | ----------------------------//
+---------------------------------+

* Debian: New gnutls11 packages fix RSA signature forgery
cryptographic weakness
  22nd, September, 2006

Daniel Bleichenbacher discovered a flaw in GNU TLS cryptographic
package that could allow an attacker to generate a forged signature
that GNU TLS will accept as valid.

http://www.linuxsecurity.com/content/view/125056


* Debian: New Linux 2.4.27 packages fix several vulnerabilities
  25th, September, 2006

Several security related problems have been discovered in the Linux
kernel which may lead to a denial of service or even the execution of
arbitrary code.

http://www.linuxsecurity.com/content/view/125068


* Debian: New Linux 2.6.8 packages fix several vulnerabilities
  25th, September, 2006

Several security related problems have been discovered in the Linux
kernel which may lead to a denial of service or even the execution of
arbitrary code.

http://www.linuxsecurity.com/content/view/125070


* Debian: New Linux 2.6.8 packages fix several vulnerabilities
  26th, September, 2006

Updated package.

http://www.linuxsecurity.com/content/view/125077


* Debian: New openssl packages fix denial of service
  28th, September, 2006

Multiple vulnerabilities have been discovered in the OpenSSL
cryptographic software package that could allow an attacker to launch
a denial of service attack by exhausting system resources or crashing
processes on a victim's computer.  The following CVE IDs have been
addressed: CVE-2006-2940 CVE-2006-3738 CVE-2006-4343 CVE-2006-2937

http://www.linuxsecurity.com/content/view/125102


+---------------------------------+
|  Distribution: Gentoo           | ----------------------------//
+---------------------------------+

* Gentoo: gzip Multiple vulnerabilities
  23rd, September, 2006

gzip is affected by multiple vulnerabilities, including buffer
overflows and infinite loops, possibly allowing the execution of
arbitrary code.

http://www.linuxsecurity.com/content/view/125065


* Gentoo: ImageMagick Multiple Vulnerabilities
  26th, September, 2006

Multiple buffer overflows have been discovered in ImageMagick, which
could potentially result in the execution of arbitrary code.

http://www.linuxsecurity.com/content/view/125083


* Gentoo: GnuTLS RSA Signature Forgery
  26th, September, 2006

GnuTLS fails to handle excess data which could allow an attacker to
forge a PKCS #1 v1.5 signature.

http://www.linuxsecurity.com/content/view/125084


* Gentoo: Tikiwiki Arbitrary command execution
  26th, September, 2006

Tikiwiki contains a cross-site scripting (XSS) vulnerability as well
as a second vulnerability which may allow remote execution of
arbitrary code.

http://www.linuxsecurity.com/content/view/125085


* Gentoo: OpenSSH Denial of Service
  27th, September, 2006

A flaw in the OpenSSH daemon allows remote unauthenticated attackers
to cause a Denial of Service.

http://www.linuxsecurity.com/content/view/125090


* Gentoo: Opera RSA signature forgery
  28th, September, 2006

Opera fails to correctly verify certain signatures.

http://www.linuxsecurity.com/content/view/125098



+---------------------------------+
|  Distribution: Mandriva         | ----------------------------//
+---------------------------------+

* Mandriva: Updated Firefox packages fix multiple vulnerabilities
  21st, September, 2006

A number of security vulnerabilities have been discovered and
corrected in the latest Mozilla Firefox program, version 1.5.0.7.
This update provides the latest Firefox to correct these issues.

http://www.linuxsecurity.com/content/view/125049


* Mandriva: Updated Thunderbird packages fix multiple vulnerabilities
  22nd, September, 2006

A number of security vulnerabilities have been discovered and
corrected in the latest Mozilla Thunderbird program, version 1.5.0.7.
This update provides the latest Thunderbird to correct these issues.

http://www.linuxsecurity.com/content/view/125063


* Mandriva: Updated webmin packages fix XSS vulnerability
  22nd, September, 2006

Webmin before 1.296 and Usermin before 1.226 does not properly handle
a URL with a null ("%00") character, which allows remote attackers to
conduct cross-site scripting (XSS), read CGI program source code,
list directories, and possibly execute programs. Updated packages
have been patched to correct this issue.

http://www.linuxsecurity.com/content/view/125064


* Mandriva: Updated Fibric package interaction with curl
  28th, September, 2006

 The Fibric tool, used for updating packages on Corporate Server 4.0,
had difficulty with usernames that contained the '@' character when
curl is installed.  No such problem exists when Fibric uses wget.
This update provides a fixed Fibric that better interacts with curl.

http://www.linuxsecurity.com/content/view/125094


* Mandriva: Updated webmin packages fix XSS vulnerability
  28th, September, 2006

Webmin before 1.296 and Usermin before 1.226 does not properly handle
a URL with a null ("%00") character, which allows remote attackers to
conduct cross-site scripting (XSS), read CGI program source code,
list directories, and possibly execute programs. Updated packages
have been patched to correct this issue.

http://www.linuxsecurity.com/content/view/125095



+---------------------------------+
|  Distribution: Red Hat          | ----------------------------//
+---------------------------------+

* RedHat: Moderate: php security update
  21st, September, 2006

Updated PHP packages that fix multiple security issues are now
available for Red Hat Enterprise Linux 3 and 4. This update has been
rated as having moderate security impact by the Red Hat Security
Response Team.

http://www.linuxsecurity.com/content/view/125044


* RedHat: Moderate: php security update
  21st, September, 2006

Updated PHP packages that fix multiple security issues are now
available for Red Hat Enterprise Linux 2.1. This update has been
rated as having moderate security impact by the Red Hat Security
Response Team.

http://www.linuxsecurity.com/content/view/125045


* RedHat: Moderate: squirrelmail security update
  26th, September, 2006

A new squirrelmail package that fixes a security issue as well as
several bugs is now available for Red Hat Enterprise Linux 3 and 4.
This update has been rated as having moderate security impact by the
Red Hat Security Response Team.

http://www.linuxsecurity.com/content/view/125081



+---------------------------------+
|  Distribution: SuSE             | ----------------------------//
+---------------------------------+

* SuSE: php4,php5 (SUSE-SA:2006:052)
  21st, September, 2006

Various security problems have been fixed in the PHP script language
engine and its modules, versions 4 and 5. The PHP4 updated packages
were released on September 12, the PHP5 update packages were released
on September 20. The following CVE IDs have been resolved:
CVE-2006-2563 CVE-2006-4483 CVE-2006-4481 CVE-2006-4482 CVE-2006-4484
CVE-2006-4482 CVE-2006-4020

http://www.linuxsecurity.com/content/view/125043


* SuSE: flash-player (SUSE-SA:2006:053)
  21st, September, 2006

Multiple input validation errors have been identified in the
Macromedia Flash Player that could lead to the potential execution of
arbitrary code. These vulnerabilities could be accessed through
content delivered from a remote location via the user's web browser,
email client, or other applications that include or reference the
Flash Player. (CVE-2006-3311, CVE-2006-3587, CVE-2006-3588) These
updates also include changes to prevent circumvention of the
"allowScriptAccess" option. (CVE-2006-4640)

http://www.linuxsecurity.com/content/view/125048


* SuSE: Mozilla Firefox,Thunderbird,
  22nd, September, 2006

Security updates have been released that bring Mozilla Firefox to
version 1.5.0.7, Mozilla Thunderbird to version 1.5.0.7 and Mozilla
Seamonkey to 1.0.5.

http://www.linuxsecurity.com/content/view/125054


* SuSE: openssl,mozilla-nss RSA signature
  22nd, September, 2006

If an RSA key with exponent 3 is used it may be possible to forge a
PKCS verify the certificate if they are not checking for excess data
in the RSA exponentiation result of the signature.

http://www.linuxsecurity.com/content/view/125055


* SuSE: gzip (SUSE-SA:2006:056)
  26th, September, 2006

Updated package.

http://www.linuxsecurity.com/content/view/125082


* SuSE: kernel security problems
  28th, September, 2006

Various security problems were found and fixed in the Linux kernel.

http://www.linuxsecurity.com/content/view/125099


* SuSE: openssl security problems
  28th, September, 2006

Several security problems were found and fixed in the OpenSSL
cryptographic library.

http://www.linuxsecurity.com/content/view/125100


------------------------------------------------------------------------
Distributed by: Guardian Digital, Inc.                LinuxSecurity.com

     To unsubscribe email vuln-newsletter-request@xxxxxxxxxxxxxxxxx
         with "unsubscribe" in the subject of the message.
------------------------------------------------------------------------


[Index of Archives]     [Fedora Announce]     [Linux Crypto]     [Kernel]     [Netfilter]     [Bugtraq]     [USB]     [Fedora Security]

  Powered by Linux