[ISN] Linux Advisory Watch - November 19th 2004

InfoSec News isn at c4i.org
Mon Nov 22 07:10:17 EST 2004


+---------------------------------------------------------------------+
|  LinuxSecurity.com                             Weekly Newsletter    |
|  November 19th, 2004                          Volume 5, Number 46a  |
+---------------------------------------------------------------------+

  Editors:      Dave Wreski                     Benjamin D. Thomas
                dave at linuxsecurity.com          ben at linuxsecurity.com

Linux Advisory Watch is a comprehensive newsletter that outlines the
security vulnerabilities that have been announced throughout the week.
It includes pointers to updated packages and descriptions of each
vulnerability.

This week, advisories were released for libxml2, MySQL, imagemagick,
Apache, fetch, Ruby, BNC, Squirrelmail, gd, sudo, totem, drakxtools,
httpd, freeradius, libxml2, and iptables.  The distributors include
Conectiva, Debian, Fedora, FreeBSD, Gentoo, Mandrake, Red Hat, Suse, and
Trustix.

----- LinuxSecurity.com Version 2 -----

Get ready ... on December 1st the new LinuxSecurity.com site will be
revealed. The same great content you've come to expect with a whole new
look and great new features. A sneak preview is coming soon!

http://ads.linuxsecurity.com/cgi-bin/ads.pl?banner=lsv2flashdemo

------

Root Security

The most sought-after account on your machine is the superuser account.
This account has authority over the entire machine, which may also include
authority over other machines on the network. Remember that you should
only use the root account for very short specific tasks and should mostly
run as a normal user. Running as root all the time is a very very very bad
idea.

Several tricks to avoid messing up your own box as root:

* When doing some complex command, try running it first in a non
destructive way...especially commands that use globbing: e.g., you are
going to do a rm foo*.bak, instead, first do: ls foo*.bak and make sure
you are going to delete the files you think you are. Using echo in place
of destructive commands also sometimes works.

* Provide your users with a default alias to the /bin/rm command to ask
for confirmation for deletion of files.

* Only become root to do single specific tasks. If you find yourself
trying to figure out how to do something, go back to a normal user shell
until you are sure what needs to be done by root.

* The command path for the root user is very important.  The command path,
or the PATH environment variable, defines the location the shell searches
for programs.  Try and limit the command path for the root user as much as
possible, and never use '.', meaning 'the current directory', in your PATH
statement.  Additionally, never have writable directories in your search
path, as this can allow attackers to modify or place new binaries in your
search path, allowing them to run as root the next time you run that
command.

* Never use the rlogin/rsh/rexec (called the ``r-utilities'') suite of
tools as root. They are subject to many sorts of attacks, and are
downright dangerous run as root. Never create a .rhosts file for root.

* The /etc/securetty file contains a list of terminals that root can login
from. By default (on Red Hat Linux) this is set to only the local virtual
consoles (vtys). Be very careful of adding anything else to this file. You
should be able to login remotely as your regular user account and then use
su if you need to (hopefully over ssh or other encrypted channel), so
there is no need to be able to login directly as root.

* Always be slow and deliberate running as root. Your actions could affect
a lot of things. Think before you type!

If you absolutely positively need to allow someone (hopefully very
trusted) to have superuser access to your machine, there are a few tools
that can help. sudo allows users to use their password to access a limited
set of commands as root. sudo keeps a log of all successful and
unsuccessful sudo attempts, allowing you to track down who used what
command to do what. For this reason sudo works well even in places where a
number of people have root access, but use sudo so you can keep track of
changes made.

Although sudo can be used to give specific users specific privileges for
specific tasks, it does have several shortcomings. It should be used only
for a limited set of tasks, like restarting a server, or adding new users.
Any program that offers a shell escape will give the user root access.
This includes most editors, for example.  Also, a program as innocuous as
/bin/cat can be used to overwrite files, which could allow root to be
exploited. Consider sudo as a means for accountability, and don't expect
it to replace the root user yet be secure.

Excerpt from the LinuxSecurity Administrator's Guide:
http://www.linuxsecurity.com/docs/SecurityAdminGuide/SecurityAdminGuide.html

Written by: Dave Wreski (dave at guardiandigital.com)

-----

Mass deploying Osiris

Osiris is a centralized file-integrity program that uses a client/server
architecture to check for changes on a system.  A central server maintains
the file-integrity database and configuration for a client and at a
specified time, sends the configuration file over to the client, runs a
scan and sends the results back to the server to compare any changes.
Those changes are then sent via email, if configured, to a system admin or
group of people.  The communication is all done over an encrypted
communication channel.

http://www.linuxsecurity.com/feature_stories/feature_story-175.html

-->  Take advantage of the LinuxSecurity.com Quick Reference Card!
-->  http://www.linuxsecurity.com/docs/QuickRefCard.pdf

+---------------------------------+
|  Distribution: Conectiva        | ----------------------------//
+---------------------------------+

 11/18/2004 - libxml2
   buffer overflow vulnerabilities fix

   This update fixes a buffer overflow vulnerability[2,3] in the URI
   parsing code found by "infamous41md" at the nanoftp and nanohttp
   modules of libxml2. An attacker may exploit this vulnerability to
   execute arbitrary code with the privileges of the user running an
   affected application.
   http://www.linuxsecurity.com/advisories/conectiva_advisory-5193.html

 11/18/2004 - MySQL
   vulnerabilities fix

   Oleksandr Byelkin noticed[2] that ALTER TABLE ... RENAME checks
   CREATE/INSERT rights of the old table instead of the new one.
   Lukasz Wojtow noticed[3] a buffer overrun in the
   mysql_real_connect() function.
   http://www.linuxsecurity.com/advisories/conectiva_advisory-5194.html


+---------------------------------+
|  Distribution: Debian           | ----------------------------//
+---------------------------------+

 11/12/2004 - ez-ipupdate format string vulnerability fix
   vulnerabilities fix

   Ulf Hrnhammar from the Debian Security Audit Project discovered a
   format string vulnerability in ez-ipupdate, a client for many
   dynamic DNS services. This problem can only be exploited if
   ez-ipupdate is running in daemon mode (most likely) with many but
   not all service types.
   http://www.linuxsecurity.com/advisories/debian_advisory-5162.html

 11/16/2004 - imagemagick
   arbitrary code execution fix

   A vulnerability has been reported for ImageMagick, a commonly used
   image manipulation library.  Due to a boundary error within the
   EXIF parsing routine, a specially crafted graphic images could
   lead to the execution of arbitrary code.
   http://www.linuxsecurity.com/advisories/debian_advisory-5172.html

 11/17/2004 - Apache
   arbitrary code execution fix

   "Crazy Einstein" has discovered a vulnerability in the
   "mod_include" module, which can cause a buffer to be overflown and
   could lead to the execution of arbitrary code.
   http://www.linuxsecurity.com/advisories/debian_advisory-5180.html


+---------------------------------+
|  Distribution: Fedora           | ----------------------------//
+---------------------------------+

 11/12/2004 - httpd-2.0.51-2.9 update
   arbitrary code execution fix

   This update includes the fixes for an issue in mod_ssl which could
   lead to a bypass of an SSLCipherSuite setting in directory or
   location context (CVE CAN-2004-0885), and a memory consumption
   denial of service issue in the handling of request header lines
   (CVE CAN-2004-0942).
   http://www.linuxsecurity.com/advisories/fedora_advisory-5166.html

 11/12/2004 - httpd-2.0.52-3.1 update
   arbitrary code execution fix

   This update includes the fix for a memory consumption denial of
   service issue in the handling of request header lines (CVE
   CAN-2004-0942).
   http://www.linuxsecurity.com/advisories/fedora_advisory-5167.html

 11/12/2004 - subversion-1.0.9-1 update
   arbitrary code execution fix

   This update includes the latest release of Subversion 1.0,
   including the fix for a regression in the performance of
   repository browsing since version 1.0.8.
   http://www.linuxsecurity.com/advisories/fedora_advisory-5168.html

 11/12/2004 - subversion-1.1.1-1.1 update
   arbitrary code execution fix

   This update includes the latest release of Subversion 1.1,
   including the fix for a regression in the performance of
   repository browsing since version 1.1.0 and a variety of other bug
   fixes.
   http://www.linuxsecurity.com/advisories/fedora_advisory-5169.html

 11/12/2004 - gdb-6.1post-1.20040607.43 update
   arbitrary code execution fix

   #136455 workaround to prevent gdb from failing and getting stuck
   when hitting certain DWARF-2 symbols.
   http://www.linuxsecurity.com/advisories/fedora_advisory-5170.html

 11/16/2004 - abiword-2.0.12-4.fc3 update
   arbitrary code execution fix

   Backport fix to stop #rh139201# crash on CTRL-A and making font
   changes
   http://www.linuxsecurity.com/advisories/fedora_advisory-5178.html

 11/16/2004 - authd-1.4.3-1 update
   arbitrary code execution fix

   fix double-free prob detected on x86_64 glibc (#136392)
   http://www.linuxsecurity.com/advisories/fedora_advisory-5182.html

 11/16/2004 - gaim-1.0.3-0.FC3 update
   arbitrary code execution fix

   1.0.3 another bugfix release
   http://www.linuxsecurity.com/advisories/fedora_advisory-5183.html

 11/17/2004 - xorg-x11-6.7.0-10 update
   arbitrary code execution fix

   Several integer overflow flaws in the X.Org libXpm library used to
   decode XPM (X PixMap) images have been found and addressed. An
   attacker could create a carefully crafted XPM file which would
   cause an application to crash or potentially execute arbitrary
   code if opened by a victim.
   http://www.linuxsecurity.com/advisories/fedora_advisory-5191.html

 11/17/2004 - xorg-x11-6.8.1-12.FC3.1 update
   arbitrary code execution fix

   Several integer overflow flaws in the X.Org libXpm library used to
   decode XPM (X PixMap) images have been found and addressed. An
   attacker could create a carefully crafted XPM file which would
   cause an application to crash or potentially execute arbitrary
   code if opened by a victim.
   http://www.linuxsecurity.com/advisories/fedora_advisory-5192.html


+---------------------------------+
|  Distribution: FreeBSD          | ----------------------------//
+---------------------------------+

 11/18/2004 - fetch
   Overflow error

   An integer overflow condition in the processing of HTTP headers
   can result in a buffer overflow.
   http://www.linuxsecurity.com/advisories/freebsd_advisory-5195.html


+---------------------------------+
|  Distribution: Gentoo           | ----------------------------//
+---------------------------------+

 11/16/2004 - Ruby
   Denial of Service issue

   The CGI module in Ruby can be sent into an infinite loop,
   resulting in a Denial of Service condition.
   http://www.linuxsecurity.com/advisories/gentoo_advisory-5173.html

 11/16/2004 - BNC
   Buffer overflow vulnerability

   BNC contains a buffer overflow vulnerability that may lead to
   Denial of Service and execution of arbitrary code.
   http://www.linuxsecurity.com/advisories/gentoo_advisory-5174.html

 11/17/2004 - Squirrelmail
   Encoded text XSS vulnerability

   Squirrelmail fails to properly sanitize user input, which could
   lead to a compromise of webmail accounts.
   http://www.linuxsecurity.com/advisories/gentoo_advisory-5189.html

 11/17/2004 - GIMPS, SETI at home, ChessBrain Insecure installation
   Encoded text XSS vulnerability

   Improper file ownership allows user-owned files to be run with
   root privileges by init scripts.
   http://www.linuxsecurity.com/advisories/gentoo_advisory-5190.html


+---------------------------------+
|  Distribution: Mandrake         | ----------------------------//
+---------------------------------+

 11/17/2004 - gd
   integer overflows fix

   Integer overflows were reported in the GD Graphics Library (libgd)
   2.0.28, and possibly other versions. These overflows allow remote
   attackers to  cause a denial of service and possibly execute
   arbitrary code via PNG image files with large image rows values
   that lead to a heap-based buffer overflow in the
   gdImageCreateFromPngCtx() function.
   http://www.linuxsecurity.com/advisories/mandrake_advisory-5185.html

 11/17/2004 - sudo
   vulnerability fix

   Liam Helmer discovered a flow in sudo's environment sanitizing.
   This flaw could allow a malicious users with permission to run a
   shell script that uses the bash shell to run arbitrary commands.
   http://www.linuxsecurity.com/advisories/mandrake_advisory-5186.html

 11/17/2004 - Apache
   buffer overflow fix

   A possible buffer overflow exists in the get_tag() function of
   mod_include, and if SSI (Server Side Includes) are enabled, a
   local attacker may be able to run arbitrary code with the rights
   of an httpd child process.
   http://www.linuxsecurity.com/advisories/mandrake_advisory-5187.html

 11/17/2004 - Apache2
   request DoS fix

   A vulnerability in apache 2.0.35-2.0.52 was discovered by Chintan
   Trivedi; he found that by sending a large amount of specially-
   crafted HTTP GET requests, a remote attacker could cause a Denial
   of Service on the httpd server.
   http://www.linuxsecurity.com/advisories/mandrake_advisory-5188.html

 11/18/2004 - bootloader-utils kheader issue fix
   request DoS fix

   A problem with generating kernel headers exists when using the
   newer kernel-i686-up-64GB package.  The updated bootloader-utils
   package corrects the issue.
   http://www.linuxsecurity.com/advisories/mandrake_advisory-5196.html

 11/18/2004 - totem
   problem with blue screen fix

   There is a problem in the totem package where in some cases when
   running totem a blue screen would appear.  Resizing the screen
   seems to fix the problem temporarily, however upon minimizing or
   maximizing the screen it would once again become blue.
   http://www.linuxsecurity.com/advisories/mandrake_advisory-5197.html

 11/18/2004 - drakxtools
   various issues fix

   A number of fixes are available in the updated drakxtools package.
   http://www.linuxsecurity.com/advisories/mandrake_advisory-5198.html


+---------------------------------+
|  Distribution: Red Hat          | ----------------------------//
+---------------------------------+

 11/12/2004 - httpd
   security issue and bugs fix

   Updated httpd packages that include fixes for two security issues,
   as well as other bugs, are now available.
   http://www.linuxsecurity.com/advisories/redhat_advisory-5163.html

 11/12/2004 - freeradius
   security flaws fix

   Updated freeradius packages that fix a number of denial of service
   vulnerabilities as well as minor bugs are now available for Red
   Hat Enterprise Linux 3.
   http://www.linuxsecurity.com/advisories/redhat_advisory-5164.html

 11/12/2004 - libxml2
   security vulnerabilities fix

   An updated libxml2 package that fixes multiple buffer overflows is
   now available.
   http://www.linuxsecurity.com/advisories/redhat_advisory-5165.html

 11/16/2004 - samba
   security vulnerabilities fix

   Updated samba packages that fix various security vulnerabilities
   are now available.
   http://www.linuxsecurity.com/advisories/redhat_advisory-5179.html


+---------------------------------+
|  Distribution: Suse             | ----------------------------//
+---------------------------------+

 11/15/2004 - samba
   remote buffer overflow

   There is a problem in the Samba file sharing service daemon, which
   allows a remote user to have the service consume lots of computing
   power and potentially crash the service by querying special
   wildcarded filenames.
   http://www.linuxsecurity.com/advisories/suse_advisory-5171.html

 11/17/2004 - xshared, XFree86-libs, xorg-x11-libs remote system
compromises remote buffer overflow

   The XPM library which is part of the XFree86/XOrg project is used
   by several GUI applications to process XPM image files. A source
   code review done by Thomas Biege of the SuSE Security-Team
   revealed several different kinds of bugs.
   http://www.linuxsecurity.com/advisories/suse_advisory-5184.html


+---------------------------------+
|  Distribution: Trustix          | ----------------------------//
+---------------------------------+

 11/16/2004 - gd
   samba sqlgrey sudo Various security fixes

   gd is a graphics library. It allows your code to quickly draw
   images complete with lines, arcs, text, multiple colors, cut and
   paste from other images, and flood fills, and write out the result
   as a PNG or JPEG file.
   http://www.linuxsecurity.com/advisories/trustix_advisory-5175.html

 11/16/2004 - apache
   automake bind console-tools Package bugfix

   Apache is a full featured web server that is freely available, and
   also happens to be the most widely used.
   http://www.linuxsecurity.com/advisories/trustix_advisory-5176.html

 11/16/2004 - iptables
   Loading too many modules

   Olaf Rempel pointed out that the list of modules we autoload is
   too large. This has now been fixed.
   http://www.linuxsecurity.com/advisories/trustix_advisory-5177.html

 11/16/2004 - gd
   samba sqlgrey sudo several overflows

   There has been found serveral overflows in gd.  This can be used
   to execute arbitary code in programs using the gd library.
   http://www.linuxsecurity.com/advisories/trustix_advisory-5181.html

------------------------------------------------------------------------
Distributed by: Guardian Digital, Inc.                LinuxSecurity.com

     To unsubscribe email vuln-newsletter-request at linuxsecurity.com
         with "unsubscribe" in the subject of the message.
------------------------------------------------------------------------





More information about the ISN mailing list