Linux Advisory Watch - June 15th 2007

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



+---------------------------------------------------------------------+
|  LinuxSecurity.com                               Weekly Newsletter  |
|  June 15th 2007                                Volume 8, Number 24a |
+---------------------------------------------------------------------+

  Editors:      Dave Wreski                     Benjamin D. Thomas
                dave@xxxxxxxxxxxxxxxxx          ben@xxxxxxxxxxxxxxxxx

Linux Advisory Watch is a comprehensive newsletter that outlines the
security vulnerabilities that have been announced throughout the week. It
includes pointers to updated packages and descriptions of each
vulnerability.

This week advisories were released for openoffice, ipsec-tools, iceape,
gimp, freetype, xulrunner, icedove, iceweasel, libexif, mod_perl,
spamassassin, Thunderbird, Firefox, freetype2, gd, tetex, fetchmail,
shadow-utils, pam, gcc, iscsi-initiator-utils, kernel, file,
libpng, and xscreensaver.  The distributors include Debian,
Mandriva, Red Hat, Slackware, and Ubuntu.

---

Vyatta - Linux-based Router, Firewall & VPN

Vyatta software and appliances combine the features, performance
and reliability of enterprise-class networking gear with the
cost-savings and flexibility of linux-based solutions. Vyatta
empowers you to replace overpriced proprietary router, firewall
and VPN equipment with commercially supported open-source solutions.

    Free Vyatta Software & Live Webinars
 >> http://www.linuxsecurity.com/ads/adclick.php?bannerid=28

---

* EnGarde Secure Linux v3.0.13 Now Available

Guardian Digital is happy to announce the release of EnGarde Secure
Community 3.0.13 (Version 3.0, Release 13). This release includes several
bug fixes and feature enhancements to the SELinux policy and several
updated packages.

http://wiki.engardelinux.org/index.php/ReleaseNotes3.0.13

---

Review: Practical Packet Analysis

In the introduction, McIlwraith points out that security awareness
training properly consists of communication, raising of issues, and
encouragement to modify behaviour. (This will come as no surprise
to those who recall the definition of training as the modification
of attitudes and behaviour.) He also notes that security professionals
frequently concentrate solely on presentation of problems. The
remainder of the introduction looks at other major security
activities, and the part that awareness plays in ensuring that
they actually work.

http://www.linuxsecurity.com/content/view/128459/171/

---


Robert Slade Review: "Information Security and Employee Behaviour"

The best way to secure you against sniffing is to use encryption. While
this won't prevent a sniffer from functioning, it will ensure that what a
sniffer reads is pure junk.

http://www.linuxsecurity.com/content/view/128404/171/

--------

-->  Take advantage of the LinuxSecurity.com Quick Reference Card!
-->  http://www.linuxsecurity.com/docs/QuickRefCard.pdf


+---------------------------------+
|  Distribution: Debian           | ----------------------------//
+---------------------------------+

* Debian: New OpenOffice.org packages fix arbitrary code execution
  12th, June, 2007

John Heasman discovered a heap overflow in the routines of
OpenOffice.org that parse RTF files.

http://www.linuxsecurity.com/content/view/128510


* Debian: New ipsec-tools packages fix denial of service
  7th, June, 2007

It was discovered that a specially-crafted packet sent to the racoon
ipsec key exchange server could cause a tunnel to crash, resulting in
a denial of service. We recommend that you upgrade your racoon
package.

http://www.linuxsecurity.com/content/view/128465


* Debian: New iceape packages fix several vulnerabilities
  7th, June, 2007

Several remote vulnerabilities have been discovered in the Iceape
internet suite, an unbranded version of the Seamonkey Internet Suite.
The Common Vulnerabilities and Exposures project identifies the
following problem and others.

http://www.linuxsecurity.com/content/view/128467


* Debian: New Gimp packages fix arbitrary code execution
  9th, June, 2007

A buffer overflow has been identified in Gimp's SUNRAS plugin in
versions prior to 2.2.15.  This bug could allow an attacker to
execute arbitrary code on the victim's computer by inducing the
victim to open a specially crafted RAS file.

http://www.linuxsecurity.com/content/view/128474


* Debian: New lighttpd packages fix denial of service
  10th, June, 2007

Two problems were discovered with lighttpd, a fast webserver with
minimal memory footprint, which could allow denial of service.
The Common Vulnerabilities and Exposures project identifies problems.
One is a remote attackers could cause denial of service by
disconnecting
  partway through making a request.


http://www.linuxsecurity.com/content/view/128476


* Debian: New freetype packages fix integer overflow
  10th, June, 2007

A problem was discovered with freetype, a FreeTyp2 font engine, which
could allow the execution of arbitary code via an integer overflow in
specially crafted TTF files.

http://www.linuxsecurity.com/content/view/128477


* Debian: New xulrunner packages fix several vulnerabilities
  12th, June, 2007

Several remote vulnerabilities have been discovered in Xulrunner, a
runtime environment for XUL applications. The Common Vulnerabilities
and Exposures project identifies the some problems.

http://www.linuxsecurity.com/content/view/128509


* Debian: New icedove packages fix several vulnerabilities
  13th, June, 2007

Several remote vulnerabilities have been discovered in the Icedove
mail client, an unbranded version of the Thunderbird client.

http://www.linuxsecurity.com/content/view/128520


* Debian: New iceweasel packages fix several vulnerabilities
  14th, June, 2007

Several remote vulnerabilities have been discovered in the Iceweasel
web browser, an unbranded version of the Firefox browser. The Common
Vulnerabilities and Exposures project identified the problems.

http://www.linuxsecurity.com/content/view/128538


+---------------------------------+
|  Distribution: Fedora           | ----------------------------//
+---------------------------------+

* Fedora Core 6 Update: libexif-0.6.15-1.fc6
  11th, June, 2007

This update to the latest upstream release fixes a number of
bugs, among them a possible integer overflow in the
exif_data_load_data_entry function (CVE-2007-2645), which
allows user-assisted remote attackers to cause a denial of
service (crash) or possibly execute arbitrary code via
crafted EXIF data.

http://www.linuxsecurity.com/content/view/128492


* Fedora Core 5 Update: mod_perl-2.0.2-5.2.fc5
  11th, June, 2007

This update fixes a security issue in mod_perl.
An issue was found in the "namespace_from_uri" method of the
ModPerl::RegistryCooker class. If a server implemented a
mod_perl registry module using this method, a remote
attacker requesting a carefully crafted URI can cause
resource consumption, which could lead to a denial of
service. (CVE-2007-1349)

http://www.linuxsecurity.com/content/view/128494


* Fedora Core 6 Update: mod_perl-2.0.2-6.2.fc6
  11th, June, 2007

This update fixes a security issue in mod_perl.
An issue was found in the "namespace_from_uri" method of the
ModPerl::RegistryCooker class. If a server implemented a
mod_perl registry module using this method, a remote
attacker requesting a carefully crafted URI can cause
resource consumption, which could lead to a denial of
service. (CVE-2007-1349)

http://www.linuxsecurity.com/content/view/128495


* Fedora Core 6 Update: spamassassin-3.1.9-1.fc6
  13th, June, 2007

Local symlink vulnerability. Fedora is not vulnerable in any
default or common configurations. Read upstream's
announcement for details.

http://www.linuxsecurity.com/content/view/128521


* Fedora Core 5 Update: spamassassin-3.1.9-1.fc5.1
  13th, June, 2007

Local symlink vulnerability. Fedora is not vulnerable in any
default or common configurations. Read upstream's
announcement for details

http://www.linuxsecurity.com/content/view/128522


* Fedora Core 6 Update: openoffice.org-2.0.4-5.5.23
  13th, June, 2007

A heap overflow flaw was found in the RTF import filer. An
attacker could create a carefully crafted RTF file that
could cause OpenOffice.org to crash or possibly execute
arbitrary code if the file was opened by a victim.
All users of OpenOffice.org are advised to upgrade to these
updated packages, which contain a backported fix to correct
this issue.

http://www.linuxsecurity.com/content/view/128523


* Fedora Core 5 Update:
  13th, June, 2007

This update to iscsi-initiator-utils is a rebase to the
upstream open-iscsi-2.0-865 release. This release includes
two security fixes which are described here
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=243719
bug fixes and new features.

http://www.linuxsecurity.com/content/view/128526


* Fedora Core 6 Update:
  13th, June, 2007

This update to iscsi-initiator-utils is a rebase to the
upstream open-iscsi-2.0-865 release. This release includes
two security fixes, which are described here:

http://www.linuxsecurity.com/content/view/128527


+---------------------------------+
|  Distribution: Mandriva         | ----------------------------//
+---------------------------------+

* Mandriva: Updated libexif packages fix crash and possible
  8th, June, 2007

Integer overflow in the exif_data_load_data_entry function in
exif-data.c in libexif before 0.6.14 allows user-assisted remote
attackers to cause a denial of service (crash) or possibly execute
arbitrary code via crafted EXIF data. Updated packages have been
patched to prevent this issue.

http://www.linuxsecurity.com/content/view/128472


* Mandriva: Updated Thunderbird packages fix multiple
  12th, June, 2007

 A number of security vulnerabilities have been discovered and
corrected in the latest Mozilla Thunderbird program, version 1.5.0.12.
This update provides the latest Thunderbird to correct these issues.

http://www.linuxsecurity.com/content/view/128511


* Mandriva: Updated Firefox packages fix multiple
  12th, June, 2007

A number of security vulnerabilities have been discovered and
corrected in the latest Mozilla Firefox program, version 1.5.0.12.
This update provides the latest Firefox to correct these issues.

http://www.linuxsecurity.com/content/view/128512


* Mandriva: Updated freetype2 packages fix integer overflow
  13th, June, 2007

 An integer overflow vulnerability was discovered in the way the
FreeType font engine processed TTF files.  If a user were to load a
special font file with a program linked against freetype, it could
cause the application to crash or possibly execute arbitrary code as
the user running the program.

http://www.linuxsecurity.com/content/view/128530


* Mandriva: Updated gd packages fix vulnerability
  13th, June, 2007

A flaw in libgd2 was found by Xavier Roche where it would not
correctly validate PNG callback results.

http://www.linuxsecurity.com/content/view/128531


* Mandriva: Updated libwmf packages fix vulnerability
  13th, June, 2007

A flaw in libgd2 was found by Xavier Roche where it would not
correctly validate PNG callback results. If an application linked
against libgd2 was tricked into processing a specially-crafted
PNG file, it could cause a denial of service scenario via CPU
resource consumption.

http://www.linuxsecurity.com/content/view/128532


* Mandriva: Updated tetex packages fix vulnerability
  13th, June, 2007

A flaw in libgd2 was found by Xavier Roche where it would not
correctly validate PNG callback results. If an application linked
against libgd2 was tricked into processing a specially-crafted PNG
file, it could cause a denial of service scenario via CPU resource
consumption. Tetex uses an embedded copy of the gd source and may
also be affected by this issue. The updated packages have been
patched to prevent this issue.

http://www.linuxsecurity.com/content/view/128533



+---------------------------------+
|  Distribution: Red Hat          | ----------------------------//
+---------------------------------+

* RedHat: Moderate: fetchmail security update
  7th, June, 2007

An updated fetchmail package that fixes a security bug is now
available for Red Hat Enterprise Linux 2.1, 3, 4 and 5. Fetchmail
is a remote mail retrieval and forwarding utility intended for use
over on-demand TCP/IP links, like SLIP or PPP connections. This
update has been rated as having moderate security impact by the
Red Hat Security Response Team.

http://www.linuxsecurity.com/content/view/128462


* RedHat: Moderate: freetype security update
  11th, June, 2007

Updated freetype packages that fix a security flaw are now available
for Red Hat Enterprise Linux 2.1, 3, 4, and 5.An integer overflow flaw was
found in the way the FreeType font engine processed TTF font files.
This update has been rated as having moderate security impact by the
Red Hat Security Response Team.

http://www.linuxsecurity.com/content/view/128479


* RedHat: Low: shadow-utils security and bug fix update
  11th, June, 2007

An updated shadow-utils package that fixes a security issue and
several bugs is now available.A flaw was found in the useradd tool in
shadow-utils. A new user's mailbox, when created, could have random
permissions for a short period.

http://www.linuxsecurity.com/content/view/128482


* RedHat: Moderate: pam security and bug fix update
  11th, June, 2007

Updated pam packages that resolves several bugs and security flaws
are now
available for Red Hat Enterprise Linux 3. A flaw was found in the way
pam_console set console device permissions. It was possible for
various console devices to retain ownership of the console user after
logging out, possibly leaking information to an unauthorized user.
This update has been rated as having moderate security impact by the
Red Hat Security Response Team.

http://www.linuxsecurity.com/content/view/128484


* RedHat: Low: gdb security and bug fix update
  11th, June, 2007

An updated gdb package that fixes a security issue and various bugs
is now available.Various buffer overflows and underflows were found in
the DWARF expression computation stack in GDB.

http://www.linuxsecurity.com/content/view/128485


* RedHat: Moderate: gcc security and bug fix update
  11th, June, 2007

Updated gcc packages that fix a security issue and another bug are
now available.Jrgen Weigert discovered a directory traversal flaw in
fastjar. An attacker could create a malicious JAR file which, if unpacked
using fastjar, could write to any files the victim had write access to.
This update has been rated as having moderate security impact by the
Red Hat Security Response Team.

http://www.linuxsecurity.com/content/view/128486


* RedHat: Important: openoffice.org security update
  13th, June, 2007

Updated openoffice.org packages to correct a security issue are now
available for Red Hat Enterprise Linux 3, 4, and 5. A heap overflow
flaw was found in the RTF import filer.  An attacker could create a
carefully crafted RTF file that could cause OpenOffice.org to crash
or possibly execute arbitrary code if the file was opened by a
victim.  This update has been rated as having important security
impact by the Red Hat Security Response Team.

http://www.linuxsecurity.com/content/view/128517


* RedHat: Moderate: spamassassin security update
  13th, June, 2007

Updated spamassassin packages that fix a security issue are now
available for Red Hat Enterprise Linux 4 and 5.Martin Krafft
discovered a symlink issue in SpamAssassin that affects certain
non-default configurations. A local user could use this flaw to
create or overwrite files writable by the spamd process. This
update has been rated as having moderate security impact by the
Red Hat Security Response Team.

http://www.linuxsecurity.com/content/view/128518


* RedHat: Important: kdebase security update
  13th, June, 2007

Updated kdebase packages that resolve an interaction security issue
with Adobe Flash Player are now available.A problem with the interaction
between the Flash Player and the Konqueror web browser was found. The
problem could lead to key presses leaking to the Flash Player applet
instead of the browser. This update has been rated as having important
security impact by the Red Hat Security Response Team.

http://www.linuxsecurity.com/content/view/128519


* RedHat: Low: mod_perl security update
  14th, June, 2007

Updated mod_perl packages that fix a security issue are now available
for Red Hat Enterprise Linux 3, 4, 5. An issue was found in the
"namespace_from_uri" method of the ModPerl::RegistryCooker class.

http://www.linuxsecurity.com/content/view/128535


* RedHat: Moderate: iscsi-initiator-utils security update
  14th, June, 2007

Updated iscsi-initiator-utils packages that fix a security flaw in
open-iscsi are now available for Red Hat Enterprise Linux 5. Olaf
Kirch discovered two flaws in open-iscsi.  A local attacker could use
these flaws to cause the server daemon to stop responding, leading to
a denial of service.  This update has been rated as having moderate
security impact by the Red Hat Security Response Team.

http://www.linuxsecurity.com/content/view/128536


* RedHat: Important: kernel security and bug fix update
  14th, June, 2007

Updated kernel packages that fix security issues and bugs in the Red
Hat Enterprise Linux 5 kernel are now available. This update has been
rated as having important security impact by the Red Hat Security
Response Team.

http://www.linuxsecurity.com/content/view/128537


* RedHat: Moderate: libexif integer overflow
  14th, June, 2007

Updated libexif packages that fix an integer overflow flaw are now
available for Red Hat Enterprise Linux 4 and 5.
This update has been rated as having moderate security impact by the
Red Hat Security Response Team.

http://www.linuxsecurity.com/content/view/128539


+---------------------------------+
|  Distribution: Slackware        | ----------------------------//
+---------------------------------+

* Slackware:   libexif
  14th, June, 2007

New libexif packages are available for Slackware 10.2, 11.0, and
-current to fix a crash and potential security issue. More details
about this issue may be found in the Common Vulnerabilities and
Exposures (CVE) database:

http://www.linuxsecurity.com/content/view/128534



+---------------------------------+
|  Distribution: Ubuntu           | ----------------------------//
+---------------------------------+

* Ubuntu:  Linux kernel vulnerabilities
  8th, June, 2007

USN-464-1 fixed several vulnerabilities in the Linux kernel.  Some
additional code changes were accidentally included in the Feisty
update which caused trouble for some people who were not using
UUID-based filesystem mounts.

http://www.linuxsecurity.com/content/view/128473


* Ubuntu:  file vulnerability
  11th, June, 2007

USN-439-1 fixed a vulnerability in file.  The original fix did not
fully solve the problem.  This update provides a more complete
solution.

http://www.linuxsecurity.com/content/view/128503


* Ubuntu:  libexif vulnerability
  11th, June, 2007

Victor Stinner discovered that libexif did not correctly validate the
size of some EXIF header fields.  By tricking a user into opening an
image with specially crafted EXIF headers, a remote attacker could
cause the application using libexif to crash, resulting in a denial of
service.

http://www.linuxsecurity.com/content/view/128504


* Ubuntu:  libpng vulnerability
  11th, June, 2007

It was discovered that libpng did not correctly handle corrupted CRC
in grayscale PNG images.  By tricking a user into opening a specially
crafted PNG, a remote attacker could cause the application using
libpng to crash, resulting in a denial of service.

http://www.linuxsecurity.com/content/view/128505


* Ubuntu:  libgd2 vulnerabilities
  11th, June, 2007

A buffer overflow was discovered in libgd2's font renderer.  By
tricking an application using libgd2 into rendering a specially
crafted string with a JIS encoded font, a remote attacker could
read heap memory or crash the application, leading to a denial of
service.

http://www.linuxsecurity.com/content/view/128506


* Ubuntu:  xscreensaver vulnerability
  12th, June, 2007

It was discovered that xscreensaver did not correctly validate the
return values from network authentication systems such as LDAP or
NIS. A local attacker could bypass a locked screen if they were able to
interrupt network connectivity.


http://www.linuxsecurity.com/content/view/128513


------------------------------------------------------------------------
Distributed by: Guardian Digital, Inc.                LinuxSecurity.com

     To unsubscribe email vuln-newsletter-request@xxxxxxxxxxxxxxxxx
         with "unsubscribe" in the subject of the message.
------------------------------------------------------------------------


[Index of Archives]     [Fedora Announce]     [Linux Crypto]     [Kernel]     [Netfilter]     [Bugtraq]     [USB]     [Fedora Security]

  Powered by Linux