[ISN] Linux Advisory Watch - May 6th 2005
InfoSec News
isn at c4i.org
Fri May 6 09:18:41 EDT 2005
+---------------------------------------------------------------------+
| LinuxSecurity.com Weekly Newsletter |
| May 6th, 2005 Volume 6, Number 18a |
+---------------------------------------------------------------------+
Editors: Dave Wreski Benjamin D. Thomas
dave at linuxsecurity.com ben at linuxsecurity.com
Linux Advisory Watch is a comprehensive newsletter that outlines the
security vulnerabilities that have been announced throughout the
week. It includes pointers to updated packages and descriptions of
each vulnerability.
This week, perhaps the most interesting articles include ethereal,
prozilla, smartlist, kdewebdev, wireless-tools, gimp, bootparamd,
tcpdump, kdelibs, vte, php, words, util-linux, lapack, gnuutils,
and glibc. The distributors include Conectiva, Debian, Fedora,
Gentoo, and Red Hat.
---
## Internet Productivity Suite: Open Source Security ##
Trust Internet Productivity Suite's open source architecture to
give you the best security and productivity applications available.
Collaborating with thousands of developers, Guardian Digital
security engineers implement the most technologically advanced
ideas and methods into their design.
Click to find out more!
http://store.guardiandigital.com/html/eng/products/software/ips_overview.shtml
---
Review: The Book of Postfix: State-of-the-Art Message Transport
By: Pete O'Hara
I was very impressed with "The Book of Postfix" by authors Ralf
Hildebrandt and Patrick Koetter and feel that it is an incredible
Postfix reference. It gives a great overall view of the operation
and management of Postfix in an extremely systematic and practical
format. It flows in a logical manner, is easy to follow and the
authors did a great job of explaining topics with attention paid
to real world applications and how to avoid many of the associated
pitfalls. I am happy to have this reference in my collection.
The authors have taken the time to clearly answer the key
questions that are of real practical value. There is no excessive
or superflous material here that, although may good to know, won't
divert attention from the topic of configuring a solid MTA. The
book is very well focused and the authors' hard work is obvious.
There are sections where someone else may have left good enough
alone but they went the extra mile to make sure that this book
answered the important questions fully.
"The Book of Postfix" starts with "A Postmaster's Primer To Email"
and continues through all of the key topics in a sensible progression
so that even if you are fairly new to administering email you are
taught in a sequential manner that promotes understanding. The
comprehensive list of topics encompasses single and multiple
domain servers, dial-ups, SMTP restrictions, internal and external
content filters, mail gateways, SMTP proxy, SMTP authentication,
SASL, LDAP, SQL integration, Transport Layer Security, chroots,
rate limiting, performance tuning, and trouble shooting. It
covers a good amount of ground.
The numerous "NOTE" and "CAUTION" sections provide great additional
detail to real world scenarious that I found extremely relevant and
useful. For each topic there is also an invaluable "TESTING"
section so that you can verify for yourself that you are in fact
getting the expected behavior. The imperative topic of security
is always kept in mind in the confugrations and the accompanying
diagrams and flow charts do an excellent job of enhancing the text
and providing extra clarity.
Read complete review:
http://www.linuxsecurity.com/content/view/119027/49/
----------------------
Measuring Security IT Success
In a time where budgets are constrained and Internet threats are
on the rise, it is important for organizations to invest in network
security applications that will not only provide them with powerful
functionality but also a rapid return on investment.
In most organizations IT success is generally calculated through
effectiveness, resource usage and, most importantly, how quickly the
investment can be returned. To correctly quantify the ROI of
information technology, organizations usually measure cost savings
and increased profits since the initial implementation. Additionally,
ROI can also be affected based on the overall impact the investment
has on employee productivity and overall work environment of the company.
http://www.linuxsecurity.com/content/view/118817/49/
---
Getting to Know Linux Security: File Permissions
Welcome to the first tutorial in the 'Getting to Know Linux Security'
series. The topic explored is Linux file permissions. It offers an
easy to follow explanation of how to read permissions, and how to set
them using chmod. This guide is intended for users new to Linux
security, therefore very simple. If the feedback is good, I'll
consider creating more complex guides for advanced users. Please
let us know what you think and how these can be improved.
Click to view video demo:
http://www.linuxsecurity.com/content/view/118181/49/
---
The Tao of Network Security Monitoring: Beyond Intrusion Detection
To be honest, this was one of the best books that I've read on network
security. Others books often dive so deeply into technical discussions,
they fail to provide any relevance to network engineers/administrators
working in a corporate environment. Budgets, deadlines, and flexibility
are issues that we must all address. The Tao of Network Security
Monitoring is presented in such a way that all of these are still
relevant. One of the greatest virtues of this book is that is offers
real-life technical examples, while backing them up with relevant case
studies.
http://www.linuxsecurity.com/content/view/118106/49/
--------
--> Take advantage of the LinuxSecurity.com Quick Reference Card!
--> http://www.linuxsecurity.com/docs/QuickRefCard.pdf
+---------------------------------+
| Distribution: Conectiva | ----------------------------//
+---------------------------------+
* Conectiva: kernel Kernel update
2nd, May, 2005
The Linux kernel is responsible for handling the basic functions of
the GNU/Linux operating system.
http://www.linuxsecurity.com/content/view/119036
+---------------------------------+
| Distribution: Debian | ----------------------------//
+---------------------------------+
* Debian: New ethereal packages fix buffer overflow
28th, April, 2005
Updated package.
http://www.linuxsecurity.com/content/view/119006
* Debian: New prozilla packages fix arbitrary code execution
28th, April, 2005
Updated package.
http://www.linuxsecurity.com/content/view/119007
* Debian: New ethereal packages fix buffer overflow
28th, April, 2005
Updated package.
http://www.linuxsecurity.com/content/view/119009
* Debian: New smartlist packages fix unauthorised un/subscription
3rd, May, 2005
Updated package.
http://www.linuxsecurity.com/content/view/119045
+---------------------------------+
| Distribution: Fedora | ----------------------------//
+---------------------------------+
* Fedora Core 3 Update: kdewebdev-3.3.1-2.1
28th, April, 2005
Updated package
http://www.linuxsecurity.com/content/view/119013
* Fedora Core 3 Update: wireless-tools-27-2.2.0.fc3
28th, April, 2005
Fix iwlist command for devices that need more time to scan
all their channels (ie Atheros 5212abg cards)
http://www.linuxsecurity.com/content/view/119016
* Fedora Core 3 Update: spamassassin-3.0.3-3.fc3
29th, April, 2005
Updated package.
http://www.linuxsecurity.com/content/view/119020
* Fedora Core 3 Update: gimp-2.2.6-0.fc3.2
30th, April, 2005
Updated package.
http://www.linuxsecurity.com/content/view/119025
* Fedora Core 3 Update: bootparamd-0.17-19.FC3
2nd, May, 2005
Updated package
http://www.linuxsecurity.com/content/view/119032
* Fedora Core 3 Update: tcpdump-3.8.2-8.FC3
2nd, May, 2005
Updated package.
http://www.linuxsecurity.com/content/view/119033
* Fedora Core 3 Update: kdelibs-3.3.1-2.12.FC3
2nd, May, 2005
A buffer overflow was found in the kimgio library for KDE 3.3.1. An
attacker could create a carefully crafted PCX image in such a way
that it would cause kimgio to execute arbitrary code when processing
the image.
http://www.linuxsecurity.com/content/view/119034
* Fedora Core 3 Update: vte-0.11.13-1.fc3
2nd, May, 2005
A whole bunch of upstream fixes for speed, rendering glitches
and memory use reduction.
http://www.linuxsecurity.com/content/view/119037
* Fedora Core 3 Update: perl-5.8.5-12.FC3
2nd, May, 2005
Security and packaging fixes.
http://www.linuxsecurity.com/content/view/119038
* Fedora Core 3 Update: php-4.3.11-2.5
3rd, May, 2005
This update fixes a compatibility issue between the PHP "snmp"
extension (in the php-snmp package) and the recent upgrade of
the net-snmp library=20 to version 5.2.1
http://www.linuxsecurity.com/content/view/119044
* Fedora Core 3 Update: policycoreutils-1.18.1-2.12
3rd, May, 2005
Updated package.
http://www.linuxsecurity.com/content/view/119046
* Fedora Core 3 Update: words-3.0-2.3
4th, May, 2005
Updated package.
http://www.linuxsecurity.com/content/view/119052
* Fedora Core 3 Update: util-linux-2.12a-24.1
4th, May, 2005
Updated package.
http://www.linuxsecurity.com/content/view/119053
* Fedora Core 3 Update: system-config-bind-4.0.0-11
4th, May, 2005
Updated package.
http://www.linuxsecurity.com/content/view/119054
* Fedora Core 3 Update: dhcp-3.0.1-42_FC3
4th, May, 2005
Updated package.
http://www.linuxsecurity.com/content/view/119055
* Fedora Core 3 Update: lapack-3.0-26.fc3
5th, May, 2005
This update fixes problems in some lapack libraries (problems with
compiler optimalization). This version contains all patches present
in fc4 lapack version.
http://www.linuxsecurity.com/content/view/119060
* Fedora Core 3 Update: system-config-bind-4.0.0-12
5th, May, 2005
Updated package.
http://www.linuxsecurity.com/content/view/119061
* Fedora Core 3 Update: gnutls-1.0.20-3.1.1
5th, May, 2005
New gnutls version fixes CAN-2005-1431 problem (possible DOS attack)
http://www.linuxsecurity.com/content/view/119062
+---------------------------------+
| Distribution: Gentoo | ----------------------------//
+---------------------------------+
* Gentoo: Heimdal Buffer overflow vulnerabilities
28th, April, 2005
Buffer overflow vulnerabilities have been found in the telnet client
in Heimdal which could lead to execution of arbitrary code.
http://www.linuxsecurity.com/content/view/119008
* Gentoo: Pound Buffer overflow vulnerability
30th, April, 2005
Pound is vulnerable to a buffer overflow that could lead to the
remote execution of arbitrary code.
http://www.linuxsecurity.com/content/view/119022
* Gentoo: eGroupWare XSS and SQL injection vulnerabilities
30th, April, 2005
eGroupWare is affected by several SQL injection and cross-site
scripting (XSS) vulnerabilities.
http://www.linuxsecurity.com/content/view/119023
* Gentoo: phpMyAdmin Insecure SQL script installation
30th, April, 2005
phpMyAdmin leaves the SQL install script with insecure permissions,
potentially leading to a database compromise.
http://www.linuxsecurity.com/content/view/119024
* Gentoo: Horde Framework Multiple XSS vulnerabilities
1st, May, 2005
Various modules of the Horde Framework are vulnerable to multiple
cross-site scripting (XSS) vulnerabilities.
http://www.linuxsecurity.com/content/view/119026
* Gentoo: Oops! Remote code execution
5th, May, 2005
The Oops! proxy server contains a remotely exploitable format string
vulnerability, which could potentially lead to the execution of
arbitrary code.
http://www.linuxsecurity.com/content/view/119063
+---------------------------------+
| Distribution: Red Hat | ----------------------------//
+---------------------------------+
* RedHat: Low: glibc security update
28th, April, 2005
Updated glibc packages that address several bugs are now available.
This update has been rated as having low security impact by the Red
Hat
http://www.linuxsecurity.com/content/view/119010
* RedHat: Important: kernel security update
28th, April, 2005
Updated kernel packages are now available as part of ongoing support
and maintenance of Red Hat Enterprise Linux version 2.1. This is the
seventh regular update. This security advisory has been rated as having
important security impact by the Red Hat Security Response Team.
http://www.linuxsecurity.com/content/view/119011
* RedHat: Important: kernel security update
28th, April, 2005
Updated kernel packages are now available as part of ongoing support
and maintenance of Red Hat Enterprise Linux version 2.1 for 64-bit
architectures. This is the seventh regular update.
This security advisory has been rated as having important security
impact by the Red Hat Security Response Team.
http://www.linuxsecurity.com/content/view/119012
* RedHat: Important: Mozilla security update
28th, April, 2005
Updated Mozilla packages that fix various security bugs are now
available. This update has been rated as having Important security
impact by the Red Hat Security Response Team.
http://www.linuxsecurity.com/content/view/119014
* RedHat: Moderate: PHP security update
28th, April, 2005
Updated PHP packages that fix various security issues are now
available. This update has been rated as having moderate security
impact by the Red Hat Security Response Team.
http://www.linuxsecurity.com/content/view/119015
* RedHat: Low: nasm security update
4th, May, 2005
An updated nasm package that fixes multiple security issues is now
available. This update has been rated as having low security impact
by the Red Hat Security Response Team.
http://www.linuxsecurity.com/content/view/119049
* RedHat: Moderate: evolution security update
4th, May, 2005
Updated evolution packages that fix various security issues are now
available. This update has been rated as having moderate security
impact by theRed Hat Security Response Team.
http://www.linuxsecurity.com/content/view/119050
* RedHat: Moderate: PHP security update
4th, May, 2005
Updated PHP packages that fix various security issues are now
available. This update has been rated as having moderate security
impact by the Red Hat Security Response Team.
http://www.linuxsecurity.com/content/view/119051
------------------------------------------------------------------------
Distributed by: Guardian Digital, Inc. LinuxSecurity.com
To unsubscribe email vuln-newsletter-request at linuxsecurity.com
with "unsubscribe" in the subject of the message.
------------------------------------------------------------------------
More information about the ISN
mailing list