Thomas –
This week, advisories were released for openssl, mutt, ethereal, xfsdump, kdegraphics,
lprng, gs-common, epic, lpr, rinetd, glibc, evolution, gdkhtml, eyeofgnome,
samba, and krb5. The distributors include Conectiva, Debian, Immunix,
Mandrake, Red Hat, and Turbo Linux.
LinuxSecurity Feature Extras:
Making
It Big: Large Scale Network Forensics (Part 2 of 2) – Proper methodology
for computer forensics would involve a laundry-list of actions and thought processes
that an investigator needs to consider in order to have the basics covered.Making
It Big: Large Scale Network Forensics (Part 1 of 2) – Computer forensics
have hit the big time. A previously superniche technology, forensics have
moved into the collective consciousness of IT sys. admins. and Corporate CSOs.
Advisory Watch ] – [ Linux
Security Week ] – [ PacketStorm
Archive ] – [ Linux Security
Documentation ]
The Linux Advisory Watch newsletter is developed by the community of volunteers
at
by Guardian Digital, Inc., the open
source security company.
Package: | openssl |
Description: | There are multiple vulnerabilities in OpenSSL. |
Vendor Alerts: | Conectiva:
Debian:
|
Package: | mutt |
Description: | There is a buffer overflow vulnerability in the mutt code that handles IMAP folders. |
Vendor Alerts: | Conectiva:
|
Package: | ethereal |
Description: | There are multiple vulnerablilites in ethereal. |
Vendor Alerts: | Conectiva:
|
Package: | xfsdump |
Description: | Ethan Benson discovered a problem in xfsdump, that contains administrative utilities for the XFS filesystem. When filesystem quotas are enabled xfsdump runs xfsdq to save the quota information into a file at the root of the filesystem being dumped. The manner in which this file is created is unsafe. |
Vendor Alerts: | Debian:
Mandrake:
|
Package: | kdegraphics |
Description: | The KDE team discoverd a vulnerability in the way KDE uses Ghostscript software for processing of PostScript (PS) and PDF files. An attacker could provide a malicious PostScript or PDF file via mail or websites that could lead to executing arbitrary commands under the privileges of the user viewing the file or when the browser generates a directory listing with thumbnails. |
Vendor Alerts: | Debian:
Gentoo:
Turbo Linux:
|
Package: | lprng |
Description: | Karol Lewandowski discovered that psbanner, a printer filter that creates a PostScript format banner and is part of LPRng, insecurely creates a temporary file for debugging purpose when it is configured as filter. The program does not check whether this file already exists or is linked to another place writes its current environment and called arguments to the file unconditionally with the user id daemon. |
Vendor Alerts: | Debian:
|
Package: | gs-common |
Description: | Paul Szabo discovered insecure creation of a temporary file in ps2epsi, a script that is distributed as part of gs-common which contains common files for different Ghostscript releases. ps2epsiuses a temporary file in the process of invoking ghostscript. This file was created in an insecure fashion, which could allow a local attacker to overwrite files owned by a user who invokes ps2epsi. |
Vendor Alerts: | Debian:
|
Package: | epic |
Description: | Timo Sirainen discovered several problems in EPIC, a popular client for Internet Relay Chat (IRC). A malicious server could craft special reply strings, triggering the client to write beyond buffer boundaries. This could lead to a denial of service if the client only crashes, but may also lead to executing of arbitrary code under the user id of the chatting user. |
Vendor Alerts: | Debian:
|
Package: | lpr |
Description: | A buffer overflow has been discovered in lpr, a BSD lpr/lpd line printer spooling system. This problem can be exploited by a local user to gain root privileges, even if the printer system is set up properly. |
Vendor Alerts: | Debian:
|
Package: | rinetd |
Description: | Sam Hocevar discovered a security problem in rinetd, an IP connection redirection server. When the connection list is full, rinetd resizes the list in order to store the new incoming connection. However, this is done improperly, resulting in a denial of service and potentially execution of arbitrary code. |
Vendor Alerts: | Debian:
|
Package: | glibc |
Description: | Researchers at eEye Digital Security have found integer overflow flaws in the XDR library typically used with Sun RPC. While there are no known exploits for this problem circulating, we recommend upgrading as soon as possible, as it is unlikely StackGuard will prevent exploitation of this flaw. Upgrading is especially important for sites using RPC services. |
Vendor Alerts: | Immunix:
Red Hat:
|
Package: | evolution |
Description: | Several vulnerabilities were discovered in the Evolution email client. These problems make it possible for a carefully constructed email message to crash the program, causing general system instability by starving resources. |
Vendor Alerts: | Mandrake:
|
Package: | gtkhtml |
Description: | A vulnerability in GtkHTML was discovered by Alan Cox with the Evolution email client. GtkHTML is used to handle HTML messages in Evolution and certain malformed messages could cause Evolution to crash due to this bug. |
Vendor Alerts: | Mandrake:
Red Hat:
|
Package: | eyeofgnome |
Description: | A vulnerability was discovered in the Eye of GNOME (EOG) program, version 2.2.0 and earlier, that is used for displaying graphics. A carefully crafted filename passed to eog could lead to the execution of arbitrary code as the user executing eog. |
Vendor Alerts: | Mandrake:
|
Package: | samba |
Description: | A buffer overrun condition exists in the samba SMB protocol implementation. These vulnerabilities may allow remote attackers to gain the root privileges. |
Vendor Alerts: | Turbo Linux:
|
Package: | krb5 |
Description: | These vulnerabilities may allow remote attackers to gain the realm and to cause a denial of krb5 service. |
Vendor Alerts: | Turbo Linux:
|
Category:
- Security