+---------------------------------------------------------------------+ | LinuxSecurity.com Weekly Newsletter | | February 23rd 2007 Volume 8, Number 8a | +---------------------------------------------------------------------+ Editors: Dave Wreski Benjamin D. Thomas dave@xxxxxxxxxxxxxxxxx ben@xxxxxxxxxxxxxxxxx Linux Advisory Watch is a comprehensive newsletter that outlines the security vulnerabilities that have been announced throughout the week. It includes pointers to updated packages and descriptions of each vulnerability. This week, advisories were released for postgresql, fail2ban, bind, jdk/jre, openssh, amavisd-new, clamav, akiga, gnomemeeting, gnucash, Imagemagick, samba, mysql, php, kofice, spamassassin, apparmor, moinmoin, slocate, and ekiga. The distributors include Debian, Gentoo, Mandriva, Red Hat, SuSE, and Ubuntu. --- Earn an NSA recognized IA Masters Online The NSA has designated Norwich University a center of Academic Excellence in Information Security. Our program offers unparalleled Infosec management education and the case study affords you unmatched consulting experience. Using interactive e-Learning technology, you can earn this esteemed degree, without disrupting your career or home life. http://www.msia.norwich.edu/linsec/ --- * EnGarde Secure Linux v3.0.12 Now Available Guardian Digital is happy to announce the release of EnGarde Secure Community 3.0.11 (Version 3.0, Release 12). This release includes several bug fixes and feature enhancements to the SELinux policy and several updated packages. http://wiki.engardelinux.org/index.php/ReleaseNotes3.0.12 --- RFID with Bio-Smart Card in Linux In this paper, we describe the integration of fingerprint template and RF smart card for clustered network, which is designed on Linux platform and Open source technology to obtain biometrics security. Combination of smart card and biometrics has achieved in two step authentication where smart card authentication is based on a Personal Identification Number (PIN) and the card holder is authenticated using the biometrics template stored in the smart card that is based on the fingerprint verification. The fingerprint verification has to be executed on central host server for security purposes. Protocol designed allows controlling entire parameters of smart security controller like PIN options, Reader delay, real-time clock, alarm option and cardholder access conditions. http://www.linuxsecurity.com/content/view/125052/171/ --- Packet Sniffing Overview The best way to secure you against sniffing is to use encryption. While this won't prevent a sniffer from functioning, it will ensure that what a sniffer reads is pure junk. http://www.linuxsecurity.com/content/view/123570/49/ -------- --> Take advantage of the LinuxSecurity.com Quick Reference Card! --> http://www.linuxsecurity.com/docs/QuickRefCard.pdf +---------------------------------+ | Distribution: Debian | ----------------------------// +---------------------------------+ * Debian: New PostgreSQL packages fix several vulnerabilities 15th, February, 2007 Updated package. http://www.linuxsecurity.com/content/view/127090 +---------------------------------+ | Distribution: Gentoo | ----------------------------// +---------------------------------+ * Gentoo: Fail2ban Denial of Service 15th, February, 2007 A flaw in Fail2ban may allow remote attackers to deny access to arbitrary hosts. http://www.linuxsecurity.com/content/view/127091 * Gentoo: BIND Denial of Service 17th, February, 2007 ISC BIND contains two vulnerabilities allowing a Denial of Service under certain conditions. http://www.linuxsecurity.com/content/view/127101 * Gentoo: Sun JDK/JRE Execution of arbitrary code 17th, February, 2007 Sun Java Development Kit (JDK) and Java Runtime Environment (JRE) contain a memory corruption flaw that allows the applets to gain elevated privileges potentially leading to the execute of arbitrary code. http://www.linuxsecurity.com/content/view/127102 * Gentoo: AMD64 x86 emulation Sun's J2SE Development Kit Multiple vulnerabilities 17th, February, 2007 Multiple unspecified vulnerabilities have been identified in Sun Java Development Kit (JDK) and Sun Java Runtime Environment (JRE). http://www.linuxsecurity.com/content/view/127103 * Gentoo: OpenSSH Denial of Service 20th, February, 2007 A flaw in the OpenSSH daemon allows remote unauthenticated attackers to cause a Denial of Service. http://www.linuxsecurity.com/content/view/127128 +---------------------------------+ | Distribution: Mandriva | ----------------------------// +---------------------------------+ * Mandriva: Updated amavisd-new packages fix configuration 15th, February, 2007 The default configuration for Amavisd had an incorrect location for the ClamAV socket file. This update corrects the default configuration so it looks in the correct place, thus letting the AV scanner function work. http://www.linuxsecurity.com/content/view/127089 * Mandriva: Updated clamav packages address multiple issues. 19th, February, 2007 Clam AntiVirus ClamAV before 0.90 does not close open file descriptors under certain conditions, which allows remote attackers to cause a denial of service (file descriptor consumption and failed scans) via CAB archives with a cabinet header record length of zero, which causes a function to return without closing a file descriptor. http://www.linuxsecurity.com/content/view/127121 * Mandriva: Updated ekiga packages fix string vulnerabilities. 21st, February, 2007 A format string flaw was discovered in how ekiga processes certain messages, which could permit a remote attacker that can connect to ekiga to potentially execute arbitrary code with the privileges of the user running ekiga. Updated package have been patched to correct this issue. http://www.linuxsecurity.com/content/view/127144 * Mandriva: Updated gnomemeeting packages fix string vulnerabilities 21st, February, 2007 A format string flaw was discovered in how GnomeMeeting process is certain messages, which could permit a remote attacker that can connect to GnomeMeeting to potentially execute arbitrary code with the privileges of the user running GnomeMeeting. Updated package have been patched to correct this issue. http://www.linuxsecurity.com/content/view/127145 * Mandriva: Updated gnucash packages fix temp file issues. 21st, February, 2007 Gnucash 2.0.4 and earlier allows local users to overwrite arbitrary files via a symlink attack on the (1) gnucash.trace, (2) qof.trace, and (3) qof.trace.[PID] temporary files. Updated package have been patched to correct this issue. http://www.linuxsecurity.com/content/view/127146 * Mandriva: Updated kernel packages fix multiple vulnerabilities and bugs 21st, February, 2007 A double free vulnerability in the squashfs module could allow a local user to cause a Denial of Service by mounting a crafted squashfs filesystem (CVE-2006-5701). http://www.linuxsecurity.com/content/view/127154 +---------------------------------+ | Distribution: Red Hat | ----------------------------// +---------------------------------+ * RedHat: Moderate: ImageMagick security update 15th, February, 2007 Updated ImageMagick packages that correct several security issues are now available. This update has been rated as having moderate security impact by the Red Hat Security Response Team. http://www.linuxsecurity.com/content/view/127080 * RedHat: Moderate: samba security update 15th, February, 2007 Updated samba packages that fix a denial of service vulnerability are now available. This update has been rated as having important security impact by the Red Hat Security Response Team. http://www.linuxsecurity.com/content/view/127081 * RedHat: Low: mysql security update 19th, February, 2007 Updated MySQL packages for the Red Hat Application Stack comprising the v1.1 release are now available. This update also resolves some minor security issues rated as having low security impact by the Red Hat Security Response Team. http://www.linuxsecurity.com/content/view/127117 * RedHat: Important: php security update 19th, February, 2007 Updated PHP packages that fix several security issues are now available for Red Hat Enterprise Linux 3 and 4. This update has been rated as having important security impact by the Red Hat Security Response Team. http://www.linuxsecurity.com/content/view/127120 * RedHat: Critical: gnomemeeting security update 20th, February, 2007 Updated gnomemeeting packages that fix a security issue are now available for Red Hat Enterprise Linux. This update has been rated as having critical security impact by the Red Hat Security Response Team. http://www.linuxsecurity.com/content/view/127124 * RedHat: Moderate: koffice security update 20th, February, 2007 Updated KOffice packages that fix a security issue are now available for Red Hat Enterprise Linux 2.1. This update has been rated as having moderate security impact by the Red Hat Security Response Team. http://www.linuxsecurity.com/content/view/127127 * RedHat: Important: php security update 21st, February, 2007 Updated PHP packages that fix several security issues are now available for Red Hat Enterprise Linux 2.1. This update has been rated as having important security impact by the Red Hat Security Response Team. http://www.linuxsecurity.com/content/view/127134 * RedHat: Important: spamassassin security update 21st, February, 2007 Updated spamassassin packages that fix a security issue are now available for Red Hat Enterprise Linux 4. This update has been rated as having important security impact by the Red Hat Security Response Team. http://www.linuxsecurity.com/content/view/127148 * RedHat: Important: php security update 22nd, February, 2007 Updated PHP packages that fix several security issues are now available for Red Hat Application Stack v1.1. This update has been rated as having important security impact by the Red Hat Security Response Team. http://www.linuxsecurity.com/content/view/127157 +---------------------------------+ | Distribution: SuSE | ----------------------------// +---------------------------------+ * SuSE: AppArmor (SUSE-SA:2007:015) 15th, February, 2007 Updated package. http://www.linuxsecurity.com/content/view/127074 * SuSE: samba remote denial of service 15th, February, 2007 Updated package. http://www.linuxsecurity.com/content/view/127077 +---------------------------------+ | Distribution: Ubuntu | ----------------------------// +---------------------------------+ * Ubuntu: ImageMagick vulnerabilities 15th, February, 2007 Vladimir Nadvornik discovered that the fix for CVE-2006-5456, released in USN-372-1, did not correctly solve the original flaw in PALM image handling. By tricking a user into processing a specially crafted image with an application that uses imagemagick, an attacker could execute arbitrary code with the user's privileges. http://www.linuxsecurity.com/content/view/127088 * Ubuntu: MoinMoin vulnerabilities 20th, February, 2007 A flaw was discovered in MoinMoin's debug reporting sanitizer which could lead to a cross-site scripting attack. By tricking a user into viewing a crafted MoinMoin URL, an attacker could execute arbitrary JavaScript as the current MoinMoin user, possibly exposing the user's authentication information for the domain where MoinMoin was hosted. http://www.linuxsecurity.com/content/view/127131 * Ubuntu: PHP vulnerabilities 21st, February, 2007 Multiple buffer overflows have been discovered in various PHP modules. If a PHP application processes untrusted data with functions of the session or zip module, or various string functions, a remote attacker could exploit this to execute arbitrary code with the privileges of the web server. http://www.linuxsecurity.com/content/view/127147 * Ubuntu: slocate vulnerability 21st, February, 2007 A flaw was discovered in the permission checking code of slocate. When reporting matching files, locate would not correctly respect the parent directory's "read" bits. This could result in filenames being displayed when the file owner had expected them to remain hidden from other system users. http://www.linuxsecurity.com/content/view/127155 * Ubuntu: Ekiga vulnerabilities 22nd, February, 2007 Mu Security discovered a format string vulnerability in Ekiga. If a user was running Ekiga and listening for incoming calls, a remote attacker could send a crafted call request, and execute arbitrary code with the user's privileges. http://www.linuxsecurity.com/content/view/127156 ------------------------------------------------------------------------ Distributed by: Guardian Digital, Inc. LinuxSecurity.com To unsubscribe email vuln-newsletter-request@xxxxxxxxxxxxxxxxx with "unsubscribe" in the subject of the message. ------------------------------------------------------------------------