[ISN] Linux Advisory Watch - April 23rd 2004

InfoSec News isn at c4i.org
Mon Apr 26 02:32:36 EDT 2004


+----------------------------------------------------------------+
|  LinuxSecurity.com                        Linux Advisory Watch |
|  April 23rd, 2004                         Volume 5, Number 17a |
+----------------------------------------------------------------+

  Editors:     Dave Wreski                Benjamin Thomas
               dave at linuxsecurity.com     ben at linuxsecurity.com

Linux Advisory Watch is a comprehensive newsletter that outlines the
security vulnerabilities that have been announced throughout the week.
It includes pointers to updated packages and descriptions of each
vulnerability.

This week, advisories were released for cvs, neon, perl, logcheck, kernel,
iproute, xchat, ident2, utempter, cadaver, libneon, MySQL, samba,
utempter, OpenSSL, tcp, IA64, XFree86, tcpdump, and xine.  The
distributors include Debian, Fedora, Gentoo, Mandrake, NetBSD, Red Hat,
Slackware, and Trustix.

----

>> Free Trial SSL Certificate from Thawte <<

Take your first step towards giving your online business a competitive
advantage. Test-drive a Thawte SSL certificate 02 our easy online guide
will show you how.

http://ads.linuxsecurity.com/cgi-bin/newad_redirect.pl?id=thawten04

----

Data Classification

One of the biggest problems in security today is that business managers
and security administrators do not have a good idea of how much their
organization's proprietary data is worth.  Consider the example of a
company's client details or schematics for a new product.  How much money
should be spent to protect it?  Who should access it?  If this information
is leaked to competitors, how much impact would if have on the business?
If you aren't asking these types of questions, you should be.

One of the first steps in risk management in any organization is
determining the assets.  Later, a value is assigned to each asset and
known risks are either accepted, transferred, or mitigated. When
determining the value of an organization's information, it can very easily
become infinitely complex.

A technique commonly used to assist with the valuation of information is
data classification.  The concept involves assigning a label and in some
cases a classification to a piece of information, or a document.  For
example, documents in any government agency will be assigned labels such
as unclassified, classified, secret, or top secret.  Sometimes labeling is
more granular including labels such as unclassified but sensitive, or
internal.  Most governments implement this in slightly different ways.  A
security classification describes who the information is intended for.
For example, a budgeting document could be labeled classified and only
intended for the finance and accounting departments.  This means that the
document's label is classified and the classification is finance and
accounting.  In theory, only those individuals in the finance and
accounting departments with classified clearance should be able to access
that particular document.

Assigning labels to information gives security administrators a logical
way to create a protection strategy.  Appropriately applying security
controls can be easier if similar data is held in similar places.  Back to
the budgeting document example, because it is classified and intended only
for finance or accounting, it should only be stored on a confidential,
accounting or finance data-store/server.  It is not always necessary to
have separate servers for each label.  Segmentation can be done just as
easily by assigning group permissions to specific directories on a single
server.

Data classification allows managers to more easily determine the type and
quantity of information used by an organization. Also, it can simplify the
security administrator's role of providing consistent access control
across all information used.

Until next time, cheers!
Benjamin D. Thomas
ben at linuxsecurity.com

----

Guardian Digital Launches Next Generation Internet
Defense & Detection System

Guardian Digital has announced the first fully open source system designed
to provide both intrusion detection and prevention functions. Guardian
Digital Internet Defense & Detection System (IDDS) leverages best-in-class
open source applications to protect networks and hosts using a unique
multi-layered approach coupled with the security expertise and ongoing
security vigilance provided by Guardian Digital.

http://www.linuxsecurity.com/feature_stories/feature_story-163.html

--------------------------------------------------------------------

Interview with Siem Korteweg: System Configuration Collector

In this interview we learn how the System Configuration Collector (SCC)
project began, how the software works, why Siem chose to make it open
source, and information on future developments.

http://www.linuxsecurity.com/feature_stories/feature_story-162.html

--------------------------------------------------------------------

>> Internet Productivity Suite:  Open Source Security <<

Trust Internet Productivity Suite's open source architecture to give you
the best security and productivity applications available. Collaborating
with thousands of developers, Guardian Digital security engineers
implement the most technologically advanced ideas and methods into their
design.


http://ads.linuxsecurity.com/cgi-bin/newad_redirect.pl?id=gdn10


-->  Take advantage of the LinuxSecurity.com Quick Reference Card!
-->  http://www.linuxsecurity.com/docs/QuickRefCard.pdf

+---------------------------------+
|  Distribution: Debian           | ----------------------------//
+---------------------------------+

 4/17/2004 - cvs
   Multiple vulnerabilities

   Patch fixes bugs for both server and client which allows the
   creation of arbitrary files.
   http://www.linuxsecurity.com/advisories/debian_advisory-4243.html

 4/17/2004 - neon
   Format string vulnerability

   These vulnerabilities could exploited by a malicious WebDAV server
   to execute arbitrary code with libneon's privileges.
   http://www.linuxsecurity.com/advisories/debian_advisory-4244.html

 4/19/2004 - perl
   Information leak vulnerabilities

   DSA 431-1 incorporated a partial fix for this problem.  This
   advisory includes a more complete fix which corrects some
   additional cases.
   http://www.linuxsecurity.com/advisories/debian_advisory-4245.html

 4/19/2004 - logcheck
   Insecure temporary directory

   This bug may be exploited to write or read arbitrary directories
   to which the user has access.
   http://www.linuxsecurity.com/advisories/debian_advisory-4246.html

 4/19/2004 - kernel
   2.4.17 Multiple vulnerabilities

   This patch takes care of multiple kernel vulnerabilities,
   specifially for kernal 2.4.17 on the PowerPC/apus and S/390
   architectures.
   http://www.linuxsecurity.com/advisories/debian_advisory-4247.html

 4/19/2004 - kernel
   2.4.19 Multiple vulnerabilities

   Several serious problems have been discovered in the Linux kernel.
   This update takes care of Linux 2.4.17 for the MIPS architecture.
   http://www.linuxsecurity.com/advisories/debian_advisory-4248.html

 4/19/2004 - zope
   Arbitrary code execution vulnerability

   A flaw in the security settings of ZCatalog allows anonymous users
   to call arbitrary methods of catalog indexes.  The vulnerability
   also allows untrusted code to do the same.
   http://www.linuxsecurity.com/advisories/debian_advisory-4249.html

 4/19/2004 - iproute
   Denial of service vulnerability

   Herbert Xu reported that local users could cause a denial of
   service against iproute, a set of tools for controlling networking
   in Linux kernels.
   http://www.linuxsecurity.com/advisories/debian_advisory-4250.html

 4/21/2004 - xchat
   Buffer overflow vulnerability

   This bug allows an attacker to execute arbitrary code on the
   users' machine.
   http://www.linuxsecurity.com/advisories/debian_advisory-4263.html

 4/22/2004 - ident2
   Buffer overflow vulnerability

   This vulnerability could be exploited by a remote attacker to
   execute arbitrary code with the privileges of the ident2 daemon
   (by default, the "identd" user).
   http://www.linuxsecurity.com/advisories/debian_advisory-4269.html


+---------------------------------+
|  Distribution: Fedora           | ----------------------------//
+---------------------------------+

 4/21/2004 - utempter
   Improper directory traversal vulnerability

   An updated utempter package that fixes a potential symlink
   vulnerability is now available.
   http://www.linuxsecurity.com/advisories/fedora_advisory-4265.html


+---------------------------------+
|  Distribution: Gentoo           | ----------------------------//
+---------------------------------+

 4/19/2004 - cadaver
   Multiple format string vulnerabilities

   There are multiple format string vulnerabilities in the neon
   library used in cadaver, possibly leading to execution of
   arbitrary code.
   http://www.linuxsecurity.com/advisories/gentoo_advisory-4251.html

 4/19/2004 - XChat
   Stack overflow vulnerability

   XChat is vulnerable to a stack overflow that may allow a remote
   attacker to run arbitrary code.
   http://www.linuxsecurity.com/advisories/gentoo_advisory-4252.html

 4/19/2004 - monit
   Multiple vulnerabilities

   Two new vulnerabilities have been found in the HTTP interface of
   monit, possibly leading to denial of service or execution of
   arbitrary code.
   http://www.linuxsecurity.com/advisories/gentoo_advisory-4253.html


+---------------------------------+
|  Distribution: Mandrake         | ----------------------------//
+---------------------------------+

 4/19/2004 - utempter
   Multiple vulnerabilities

   Incorrect path validation and denial of service vulnerabilities
   are patched here.
   http://www.linuxsecurity.com/advisories/mandrake_advisory-4257.html

 4/20/2004 - libneon
   Format string vulnerabilities

   A number of various format string vulnerabilities were discovered
   in the error output handling of Neon.
   http://www.linuxsecurity.com/advisories/mandrake_advisory-4259.html

 4/20/2004 - xine-ui Temporary file vulnerability
   Format string vulnerabilities

   This problem could allow  local attackers to overwrite arbitrary
   files with the privileges  of the user invoking the script.
   http://www.linuxsecurity.com/advisories/mandrake_advisory-4260.html

 4/20/2004 - MySQL
   Temporary file vulnerabilities

   An attacker could create symbolic links in /tmp that could allow
   for overwriting of files with the privileges of the user running
   the scripts.
   http://www.linuxsecurity.com/advisories/mandrake_advisory-4261.html

 4/20/2004 - samba
   Privilege escalation vulnerability

   A user can use smbmnt along with a remote suid program to gain
   root privileges remotely.
   http://www.linuxsecurity.com/advisories/mandrake_advisory-4262.html


 4/22/2004 - utempter
   Update to patch MDKSA-2004:031

   This patch corrects some small problems with the original utempter
   patch, released April 19th.
   http://www.linuxsecurity.com/advisories/mandrake_advisory-4270.html


 4/22/2004 - xchat
   Improper execution vulnerability

   Successful exploitation could lead to arbitrary code execution as
   the user running XChat.
   http://www.linuxsecurity.com/advisories/mandrake_advisory-4271.html


+---------------------------------+
|  Distribution: NetBSD           | ----------------------------//
+---------------------------------+

 4/21/2004 - OpenSSL
   Denial of service vulnerabilities

   This patch fixes two seperate Denial of Service vulnerabilities.
   http://www.linuxsecurity.com/advisories/netbsd_advisory-4267.html

 4/21/2004 - tcp
   Denial of service vulnerability

   Patch modifies the TCP/IP stack to minimize the probability of a
   disconnection or data injection attack, even without using IPSec.
   http://www.linuxsecurity.com/advisories/netbsd_advisory-4268.html


+---------------------------------+
|  Distribution: Openwall         | ----------------------------//
+---------------------------------+

 4/19/2004 - kernel
   Multiple vulnerabiltiies

   Descriptions and links for the newest kernel patches.
   http://www.linuxsecurity.com/advisories/openwall_advisory-4256.html


+---------------------------------+
|  Distribution: Red Hat          | ----------------------------//
+---------------------------------+

 4/21/2004 - kernel
   Multiple vulnerabilities

   Updated kernel packages that fix several minor security
   vulnerabilities are now available.
   http://www.linuxsecurity.com/advisories/redhat_advisory-4266.html

 4/22/2004 - kernel
   Buffer overflow vulnerability

   Updated kernel packages that fix a security vulnerability which
   may allow local users to gain root privileges are now available.
   http://www.linuxsecurity.com/advisories/redhat_advisory-4272.html

 4/22/2004 - IA64
   kernel Multiple vulnerabilities

   Updated IA64 kernel packages fix a variety of security
   vulnerabilities.
   http://www.linuxsecurity.com/advisories/redhat_advisory-4273.html

 4/22/2004 - XFree86
   Denial of service vulnerability

   Flaws in XFree86 4.1.0 allows local or remote attackers who are
   able to connect to the X server to cause a denial of service.
   http://www.linuxsecurity.com/advisories/redhat_advisory-4274.html


+---------------------------------+
|  Distribution: Slackware        | ----------------------------//
+---------------------------------+

 4/19/2004 - tcpdump
   Denial of service vulnerability

   Upgraded tcpdump packages are available for Slackware 8.1, 9.0,
   9.1, and -current to fix denial-of-service issues.
   http://www.linuxsecurity.com/advisories/slackware_advisory-4254.html

 4/19/2004 - cvs
   Arbitrary file creation vulnerabilities

   Two seperate cvs vulnerabilities, one for the client and one for
   the server, allow the creation of files at arbitrary paths.
   http://www.linuxsecurity.com/advisories/slackware_advisory-4255.html

 4/20/2004 - utempter
   Insecure symlink vulnerability

   Steve Grubb has identified an issue with utempter-0.5.2 where
   under certain circumstances an attacker could cause it to
   overwrite files through a symlink.
   http://www.linuxsecurity.com/advisories/slackware_advisory-4258.html

 4/21/2004 - xine
   Insecure temporary file vulnerability

   This release fixes a security problem where opening a malicious
   MRL could write to system (or other) files.
   http://www.linuxsecurity.com/advisories/slackware_advisory-4264.html


+---------------------------------+
|  Distribution: Trustix          | ----------------------------//
+---------------------------------+

 4/16/2004 - ppp/squid ACL escape vulnerability
   Insecure temporary file vulnerability

   The PPP fix is a simple bugfix. The Squid fix involves the ability
   to craft a URL to be ignored by Squid's ACLs.
   http://www.linuxsecurity.com/advisories/trustix_advisory-4241.html

 4/16/2004 - kernel
   Multiple vulnerabilities

   This patch fixes a variety of kernel sercurity holes, some
   filesystem related.
   http://www.linuxsecurity.com/advisories/trustix_advisory-4242.html

 4/22/2004 - kernel
   Integer overflow vulnerability

   A successful exploit could lead to full superuser privileges.
   http://www.linuxsecurity.com/advisories/trustix_advisory-4275.html

------------------------------------------------------------------------
Distributed by: Guardian Digital, Inc.                LinuxSecurity.com

     To unsubscribe email vuln-newsletter-request at linuxsecurity.com
         with "unsubscribe" in the subject of the message.
------------------------------------------------------------------------





More information about the ISN mailing list