[ISN] Linux Advisory Watch - October 22nd 2004
InfoSec News
isn at c4i.org
Mon Oct 25 05:58:55 EDT 2004
+---------------------------------------------------------------------+
| LinuxSecurity.com Weekly Newsletter |
| October 22nd, 2004 Volume 5, Number 42a |
+---------------------------------------------------------------------+
Editors: Dave Wreski Benjamin D. Thomas
dave at linuxsecurity.com ben at linuxsecurity.com
Linux Advisory Watch is a comprehensive newsletter that outlines the
security vulnerabilities that have been announced throughout the week.
It includes pointers to updated packages and descriptions of each
vulnerability.
This week, advisories were released for libtiff, libpng, ecartis, cupsys,
BNC, phpMyAdmin, Squid, PostgreSQL, Ghostscript, glibc, mod_ssl, mozilla,
cvs, gaim, wxGTK2, squid, wxGTK2, xpdf, gpdf, kdegraphics, ImageMagick,
and mysql. The distributors include Conectiva, Debian, Fedora, Gentoo,
Mandrake, Red Hat, SuSE, and Trustix.
-----
>> The Perfect Productivity Tools <<
WebMail, Groupware and LDAP Integration provide organizations with the
ability to securely access corporate email from any computer, collaborate
with co-workers and set-up comprehensive addressbooks to consistently keep
employees organized and connected.
http://ads.linuxsecurity.com/cgi-bin/newad_redirect.pl?id=gdn05
-----
xlock and vlock
If you wander away from your machine from time to time, it is nice to be
able to "lock" your console so that no one tampers with or looks at your
work. Two programs that do this are: xlock and vlock.
Xlock is a X display locker. It should be included in any Linux
distributions that support X. Check out the man page for it for more
options, but in general you can run xlock from any xterm on your console
and it will lock the display and require your password to unlock.
vlock is a simple little program that allows you to lock some or all of
the virtual consoles on your Linux box. You can lock just the one you are
working in or all of them. If you just lock one, others can come in and
use the console, they will just not be able to use your virtual TTY until
you unlock it. vlock ships with Red Hat Linux, but your mileage may vary.
Of course locking your console will prevent someone from tampering with
your work, but does not prevent them from rebooting your machine or
otherwise disrupting your work. It also does not prevent them from
accessing your machine from another machine on the network and causing
problems.
More importantly, it does not prevent someone from switching out of the X
Window System entirely, and going to a normal virtual console login
prompt, or to the VC that X11 was started from, and suspending it, thus
obtaining your privileges. For this reason, you might consider only using
it while under control of xdm. At the very least, start X in the
background, and log out of the console
Excerpt from the LinuxSecurity Administrator's Guide:
http://www.linuxsecurity.com/docs/SecurityAdminGuide/SecurityAdminGuide.html
Written by: Dave Wreski (dave at guardiandigital.com)
-----
Mass deploying Osiris
Osiris is a centralized file-integrity program that uses a client/server
architecture to check for changes on a system. A central server maintains
the file-integrity database and configuration for a client and at a
specified time, sends the configuration file over to the client, runs a
scan and sends the results back to the server to compare any changes.
Those changes are then sent via email, if configured, to a system admin or
group of people. The communication is all done over an encrypted
communication channel.
http://www.linuxsecurity.com/feature_stories/feature_story-175.html
--> Take advantage of the LinuxSecurity.com Quick Reference Card!
--> http://www.linuxsecurity.com/docs/QuickRefCard.pdf
+---------------------------------+
| Distribution: Conectiva | ----------------------------//
+---------------------------------+
10/18/2004 - gtk+ image loading vulnerabilities fix
A vulnerability found in the gdk-pixbuf bmp loader could allow a
specially crafted BMP image to hang applications in an infinite
loop (CAN-2004-0753[2]).
http://www.linuxsecurity.com/advisories/conectiva_advisory-4965.html
+---------------------------------+
| Distribution: Debian | ----------------------------//
+---------------------------------+
10/15/2004 - libtiff
remote code execution fix
Several problems have been discovered in libtiff, the Tag Image
File Format library for processing TIFF graphics files. An
attacker could prepare a specially crafted TIFF graphic that would
cause the client to execute arbitrary code or crash.
http://www.linuxsecurity.com/advisories/debian_advisory-4960.html
10/16/2004 - cyrus-sasl-mit arbitrary code execution fix
remote code execution fix
A vulnerability has been discovered in the Cyrus implementation of
the SASL library, the Simple Authentication and Security Layer, a
method for adding authentication support to connection-based
protocols.
http://www.linuxsecurity.com/advisories/debian_advisory-4961.html
10/18/2004 - netkit-telnet-ssl denial of service fix
remote code execution fix
Michal Zalewski discovered a bug in the netkit-telnet server
(telnetd) whereby a remote attacker could cause the telnetd
process to free an invalid pointer.
http://www.linuxsecurity.com/advisories/debian_advisory-4963.html
10/18/2004 - netkit-telnet denial of service real fix
remote code execution fix
Michal Zalewski discovered a bug in the netkit-telnet server
(telnetd) whereby a remote attacker could cause the telnetd
process to free an invalid pointer.
http://www.linuxsecurity.com/advisories/debian_advisory-4964.html
10/20/2004 - libpng
several vulnerabilities fix
Several integer overflows have been discovered by its upstream
developers in libpng, a commonly used library to display PNG
graphics. They could be exploited to cause arbitrary code to be
executed when a specially crafted PNG image is processed.
http://www.linuxsecurity.com/advisories/debian_advisory-4974.html
10/20/2004 - libpng3
several vulnerabilities fix
Several integer overflows have been discovered by its upstream
developers in libpng, a commonly used library to display PNG
graphics. They could be exploited to cause arbitrary code to be
executed when a specially crafted PNG image is processed.
http://www.linuxsecurity.com/advisories/debian_advisory-4975.html
10/21/2004 - ecartis
unauthorised access to admin interface fix
A problem has been discovered in ecartis, a mailing-list manager,
which allows an attacker in the same domain as the list admin to
gain administrator privileges and alter list settings.
http://www.linuxsecurity.com/advisories/debian_advisory-4986.html
10/21/2004 - cupsys
arbitrary code execution fix
Chris Evans discovered several integer overflows in xpdf, that are
also present in CUPS, the Common UNIX Printing System, which can
be exploited remotely by a specially crafted PDF document.
http://www.linuxsecurity.com/advisories/debian_advisory-4988.html
+---------------------------------+
| Distribution: Fedora | ----------------------------//
+---------------------------------+
10/15/2004 - gimp-2.0.5-0.fc2.3 update
arbitrary code execution fix
A brown paper bag release -- I missed that 1bpp and 24bpp are also
valid for BMP.
http://www.linuxsecurity.com/advisories/fedora_advisory-4958.html
10/18/2004 - glib2-2.4.7-1.1 update
arbitrary code execution fix
Glib 2.4.7 contains many bug fixes, notably a fix for bug 126666.
http://www.linuxsecurity.com/advisories/fedora_advisory-4966.html
10/18/2004 - gtk2-2.4.13-2.1 update
arbitrary code execution fix
GTK+ 2.4.13 contains many bug fixes, with an emphasis on making
the new file chooser work better.
http://www.linuxsecurity.com/advisories/fedora_advisory-4967.html
10/21/2004 - tzdata-2004e-1.fc2 update
arbitrary code execution fix
Previous tzdata-2004e-1.fc2 announcement from 2004-10-12 had wrong
md5sums (before signing).
http://www.linuxsecurity.com/advisories/fedora_advisory-4991.html
10/21/2004 - xpdf-3.00-3.4 update
arbitrary code execution fix
Chris Evans and others discovered a number of integer overflow
bugs that affected all versions of xpdf. An attacker could
construct a carefully crafted PDF file that could cause xpdf to
crash or possibly execute arbitrary code when opened.
http://www.linuxsecurity.com/advisories/fedora_advisory-4992.html
10/21/2004 - openoffice.org-1.1.2-10.fc2 update
arbitrary code execution fix
This update is equivalent to the Fedora Core 3 version of
OpenOffice.org. The changes since the previous version of
OpenOffice.org in Fedora Core 2 are too numerous to list here, but
there are quite a few notable improvements.
http://www.linuxsecurity.com/advisories/fedora_advisory-4996.html
+---------------------------------+
| Distribution: Gentoo | ----------------------------//
+---------------------------------+
10/15/2004 - BNC
Input validation flaw
BNC contains an input validation flaw which might allow a remote
attacker to issue arbitrary IRC related commands.
http://www.linuxsecurity.com/advisories/gentoo_advisory-4957.html
10/18/2004 - phpMyAdmin
Vulnerability in MIME-based transformation system
A vulnerability has been found in the MIME-based transformation
system of phpMyAdmin, which may allow remote execution of
arbitrary commands if PHP's "safe mode" is disabled.
http://www.linuxsecurity.com/advisories/gentoo_advisory-4962.html
10/18/2004 - Squid
Remote DoS vulnerability
Squid contains a vulnerability in the SNMP module which may lead
to a denial of service.
http://www.linuxsecurity.com/advisories/gentoo_advisory-4968.html
10/18/2004 - PostgreSQL
Insecure temporary file use in make_oidjoins_check
The make_oidjoins_check script, part of the PostgreSQL package, is
vulnerable to symlink attacks, potentially allowing a local user
to overwrite arbitrary files with the rights of the user running
the utility.
http://www.linuxsecurity.com/advisories/gentoo_advisory-4969.html
10/20/2004 - OpenOffice.org Temporary files disclosure
Insecure temporary file use in make_oidjoins_check
OpenOffice.org uses insecure temporary files which could allow a
malicious local user to gain knowledge of sensitive information
from other users' documents.
http://www.linuxsecurity.com/advisories/gentoo_advisory-4982.html
10/20/2004 - Ghostscript
Insecure temporary file use in multiple scripts
Multiple scripts in the Ghostscript package are vulnerable to
symlink attacks, potentially allowing a local user to overwrite
arbitrary files with the rights of the user running the script.
http://www.linuxsecurity.com/advisories/gentoo_advisory-4983.html
10/21/2004 - glibc
Insecure tempfile handling in catchsegv script
The catchsegv script in the glibc package is vulnerable to symlink
attacks, potentially allowing a local user to overwrite arbitrary
files with the rights of the user running the script.
http://www.linuxsecurity.com/advisories/gentoo_advisory-4989.html
10/21/2004 - CUPS
Multiple integer overflows
Multiple integer overflows were discovered in Xpdf, potentially
resulting in execution of arbitrary code upon viewing a malicious
PDF file. CUPS includes Xpdf code and therefore is vulnerable to
the same issues.
http://www.linuxsecurity.com/advisories/gentoo_advisory-4990.html
10/21/2004 - mod_ssl
Bypass of SSLCipherSuite directive
In certain configurations, it can be possible to bypass
restrictions set by the "SSLCipherSuite" directive of mod_ssl.
http://www.linuxsecurity.com/advisories/gentoo_advisory-4995.html
+---------------------------------+
| Distribution: Mandrake | ----------------------------//
+---------------------------------+
10/20/2004 - mozilla
update fix
A number of vulnerabilities were fixed in mozilla 1.7.3.
http://www.linuxsecurity.com/advisories/mandrake_advisory-4971.html
10/20/2004 - libtiff
update fix
Several vulnerabilities have been discovered in the libtiff
package.
http://www.linuxsecurity.com/advisories/mandrake_advisory-4972.html
10/20/2004 - cvs
update fix
iDEFENSE discovered a flaw in CVS versions prior to 1.1.17 in an
undocumented switch implemented in CVS' history command. The -X
switch specifies the name of the history file which allows an
attacker to determine whether arbitrary system files and
directories exist and whether or not the CVS process has access to
them.
http://www.linuxsecurity.com/advisories/mandrake_advisory-4973.html
10/20/2004 - libtiff
multiple vulnerabilities fix
Several vulnerabilities have been discovered in the libtiff
package.
http://www.linuxsecurity.com/advisories/mandrake_advisory-4976.html
10/21/2004 - cvs
vulnerability fix
iDEFENSE discovered a flaw in CVS versions prior to 1.1.17 in an
undocumented switch implemented in CVS' history command. The -X
switch specifies the name of the history file which allows an
attacker to determine whether arbitrary system files and
directories exist and whether or not the CVS process has access to
them.
http://www.linuxsecurity.com/advisories/mandrake_advisory-4984.html
10/21/2004 - mozilla
vulnerabilities fix
A number of vulnerabilities were fixed in mozilla 1.7.3.
http://www.linuxsecurity.com/advisories/mandrake_advisory-4985.html
10/21/2004 - gaim
vulnerabilities fix
More vulnerabilities in gaim include nstalling smiley themes could
allow remote attackers to execute arbitrary commands via shell
metacharacters in the filename of the tar file that is dragged to
the smiley selector. There is also a buffer overflow in the way
gaim handles receiving very long URLs.
http://www.linuxsecurity.com/advisories/mandrake_advisory-4993.html
10/21/2004 - wxGTK2
vulnerabilities fix
Several vulnerabilities have been discovered in the libtiff
package; wxGTK2 uses a libtiff code tree, so it may have the same
vulnerabilities.
http://www.linuxsecurity.com/advisories/mandrake_advisory-4994.html
10/21/2004 - squid
SNMP processing vulnerability fix
iDEFENSE discovered a Denial of Service vulnerability in squid
version 2.5.STABLE6 and previous. The problem is due to an ASN1
parsing error where certain header length combinations can slip
through the validations performed by the ASN1 parser, leading to
the server assuming there is heap corruption or some other
exceptional condition, and closing all current connections then
restarting.
http://www.linuxsecurity.com/advisories/mandrake_advisory-4997.html
10/21/2004 - wxGTK2
vulnerabilities fix
Several vulnerabilities have been discovered in the libtiff
package; wxGTK2 uses a libtiff code tree, so it may have the same
vulnerabilities.
http://www.linuxsecurity.com/advisories/mandrake_advisory-4998.html
10/21/2004 - gaim
vulnerabilities fix
More vulnerabilities have been discovered in the gaim instant
messenger client.
http://www.linuxsecurity.com/advisories/mandrake_advisory-4999.html
10/22/2004 - xpdf
vulnerabilities fix
Chris Evans discovered numerous vulnerabilities in the xpdf
package which can result in DOS or possibly arbitrary code
execution.
http://www.linuxsecurity.com/advisories/mandrake_advisory-5000.html
10/22/2004 - gpdf
DoS vulnerability fix
Chris Evans discovered numerous vulnerabilities in the xpdf
package, which also effect software using embedded xpdf code, such
as gpdf.
http://www.linuxsecurity.com/advisories/mandrake_advisory-5001.html
10/22/2004 - cups
DoS vulnerabilities fix
Chris Evans discovered numerous vulnerabilities in the xpdf
package, which also effect software using embedded xpdf code.
http://www.linuxsecurity.com/advisories/mandrake_advisory-5002.html
10/22/2004 - kdegraphics
DoS vulnerability fix
Chris Evans discovered numerous vulnerabilities in the xpdf
package, which also effect software using embedded xpdf code, such
as kpdf.
http://www.linuxsecurity.com/advisories/mandrake_advisory-5003.html
+---------------------------------+
| Distribution: Red Hat | ----------------------------//
+---------------------------------+
10/20/2004 - ImageMagick
security vulnerabilities fix
Updated ImageMagick packages that fix various security
vulnerabilities are now available.
http://www.linuxsecurity.com/advisories/redhat_advisory-4977.html
10/20/2004 - mysql
minor security issues and bugs fix
Updated mysql packages that fix various temporary file security
issues, as well as a number of bugs, are now available.
http://www.linuxsecurity.com/advisories/redhat_advisory-4978.html
10/20/2004 - squid
vulnerability fix
An updated squid package that fixes a remote denial of service
vulnerability is now avaliable.
http://www.linuxsecurity.com/advisories/redhat_advisory-4979.html
10/20/2004 - mysql
security issues and bugs fixes
Updated mysql packages that fix various security issues, as well
as a number of bugs, are now available for Red Hat Enterprise
Linux 2.1.
http://www.linuxsecurity.com/advisories/redhat_advisory-4980.html
10/20/2004 - gaim
security issues and bugs fixes
An updated gaim package that fixes security issues, fixes various
bugs, and includes various enhancements for Red Hat Enterprise
Linux 3 is now avaliable.
http://www.linuxsecurity.com/advisories/redhat_advisory-4981.html
+---------------------------------+
| Distribution: Suse | ----------------------------//
+---------------------------------+
10/21/2004 - kernel
remote denial of service
An integer underflow problem in the iptables firewall logging
rules can allow a remote attacker to crash the machine by using a
handcrafted IP packet. This attack is only possible with
firewalling enabled.
http://www.linuxsecurity.com/advisories/suse_advisory-4987.html
+---------------------------------+
| Distribution: Trustix | ----------------------------//
+---------------------------------+
10/15/2004 - libtiff, mysql, squid, cyrus-sasl Multiple security
vulnerabilities
remote denial of service
Multiple security vulnerabilities in mysql, squid, cyrus-sasl and
libtiff.
http://www.linuxsecurity.com/advisories/trustix_advisory-4959.html
------------------------------------------------------------------------
Distributed by: Guardian Digital, Inc. LinuxSecurity.com
To unsubscribe email vuln-newsletter-request at linuxsecurity.com
with "unsubscribe" in the subject of the message.
------------------------------------------------------------------------
More information about the ISN
mailing list