Thomas –This week, advisories were released for openssl, apcupsd, bonsai, krb5, lpr,
mutt, heimdal, kernel, ecartis, glibc, mysql, bitchx, mod_ssl, netpbm, rxvt,
zlib, evolution, samba, kerberos, ethereal, and file. The distributors
include, Caldera, Debian, Guardian Digital’s EnGarde Secure Linux, Gentoo, Mandrake,
NetBSD, Red Hat, SuSE, Trustix, and Turbolinux.
LinuxSecurity Feature Extras:
Making
It Big: Large Scale Network Forensics (Part 1 of 2) – Computer
forensics have hit the big time. A previously superniche technology, forensics
have moved into the collective consciousness of IT sys. admins. and Corporate
CSOs.Remote
Syslog with MySQL and PHP – Msyslog has the ability to log syslog
messages to a database. This allows for easier monitoring of multiple servers
and the ability to be display and search for syslog messages using PHP
or any other programming language that can communicate with the database.by
that, too.
[ Linux
Advisory Watch ] – [ Linux
Security Week ] – [ PacketStorm
Archive ] – [ Linux Security
Documentation ]
The Linux Advisory Watch newsletter is developed by the community
of volunteers at
and sponsored by Guardian Digital, Inc., the open
source security company.
Package: | apcupsd |
Date: | 03-22-2003 |
Description: | Multiple vulnerabilities in apcupsd including a buffer overflow and format string vulnerability have been fixed. |
Vendor Alerts: | Caldera:
SuSE:
|
Package: | bonsai |
Date: | 03-21-2003 |
Description: | Several security related bugs have been fix in bonsai. |
Vendor Alerts: | Debian:
|
Package: | krb5 |
Date: | 03-21-2003 |
Description: | Several vulnerabilities have been discovered in krb5, an implementation of MIT Kerberos. |
Vendor Alerts: | Debian:
|
Package: | lpr |
Date: | 03-24-2003 |
Description: | A buffer overflow has been discovered in lpr, a BSD lpr/lpd line printer spooling system. This problem can be exploited by a local user to gain root privileges, even if the printer system is set up properly. |
Vendor Alerts: | Debian:
TurboLinux:
|
Package: | mutt |
Date: | 03-25-2003 |
Description: | Core Security Technologies discovered a buffer overflow in the IMAP code of Mutt, a text-oriented mail reader supporting IMAP, MIME, GPG, PGP and threading. This problem allows a remote malicious IMAP server to cause a denial of service (crash) and possibly execute arbitrary code via a specially crafted mail folder. |
Vendor Alerts: | Debian:
Gentoo:
SuSE:
|
Package: | heimdal |
Date: | 03-25-2003 |
Description: | A cryptographic weakness in version 4 of the Kerberos protocol allows an attacker to use a chosen-plaintext attack to impersonate any principal in a realm. Additional cryptographic weaknesses in the krb4 implementation permit the use of cut-and-paste attacks to fabricate krb4 tickets for unauthorized client principals if triple-DES keys are used to key krb4 services. These attacks can subvert a site’s entire Kerberos authentication infrastructure. |
Vendor Alerts: | Debian:
|
Package: | kernel |
Date: | 03-27-2003 |
Description: | The kernel module loader in Linux 2.2 and Linux 2.4 kernels has a flaw in ptrace. This hole allows local users to obtain root privileges by using ptrace to attach to a child process that is spawned by the kernel. Remote exploitation of this hole is not possible. |
Vendor Alerts: | Debian:
SuSE:
|
Package: | ecartis |
Date: | 03-27-2003 |
Description: | A problem has been discovered in ecartis, a mailing list manager, formerly known as listar. This vulnerability enables an attacker to reset the password of any user defined on the list server, including the list admins. |
Vendor Alerts: | Debian:
|
Package: | glibc |
Date: | 03-21-2003 |
Description: | This update fixes an integer overflow in the xdrmem_getbytes() function of glibc. |
Vendor Alerts: | EnGarde:
Gentoo:
Mandrake:
NetBSD:
Trustix:
|
Package: | mysql |
Date: | 03-21-2003 |
Description: | Versions of MySQL prior to 3.23.56 contained a vulnerability which could allow MySQL users to gain root privileges by using “SELECT * INFO OUTFILE” to overwrite a configuration file, causing MySQL to run as root upon its next restart. |
Vendor Alerts: | EnGarde:
|
Package: | bitchx |
Date: | 03-24-2003 |
Description: | Bitchx is full of sprintf() calls and relying on BIG_BUFFER_SIZE being large enough. |
Vendor Alerts: | Gentoo:
|
Package: | mod_ssl |
Date: | 03-24-2003 |
Description: | “Researchers have discovered a timing attack on RSA keys, to which OpenSSL is generally vulnerable, unless RSA blinding has been turned on.” |
Vendor Alerts: | Gentoo:
|
Package: | netpbm |
Date: | 03-25-2003 |
Description: | Several math overflow errors were found in NetPBM by Al Viro and Alan Cox. While these programs are not installed suid root, they are often used to prepare data for processing. These errors may permit remote attackers to cause a denial of service or execute arbitrary code in any programs or scripts that use these graphics conversion tools. |
Vendor Alerts: | Mandrake:
|
Package: | rxvt |
Date: | 03-25-2003 |
Description: | Digital Defense Inc. released a paper detailing insecurities in various terminal emulators, including rxvt. Many of the features supported by these programs can be abused when untrusted data is displayed on the screen. This abuse can be anything from garbage data being displayed to the screen or a system compromise. |
Vendor Alerts: | Mandrake:
TurboLinux:
|
Package: | zlib |
Date: | 03-25-2003 |
Description: | The gzprintf function in zlib did not do bounds checking on user supplied data. Depending on how the function is used in an application, malign source data can be designed to overflow a buffer and execute arbitrary code as the user of the application. |
Vendor Alerts: | NetBSD:
|
Package: | evolution |
Date: | 03-21-2003 |
Description: | Updated Evolution packages are available which fix several vulnerabilities. |
Vendor Alerts: | Red Hat:
|
Package: | samba |
Date: | 03-21-2003 |
Description: | Updated samba packages are now available to fix security vulnerabilities found during a code audit. |
Vendor Alerts: | Red Hat:
|
Package: | kerberos |
Date: | 03-26-2003 |
Description: | Updated Kerberos packages fix a number of vulnerabilities found in MIT Kerberos. |
Vendor Alerts: | Red Hat:
|
Package: | ethereal |
Date: | 03-26-2003 |
Description: | Ethereal is a GUI for analyzing and displaying network traffic. Ethereal is vulnerable to a format string bug in it’s SOCKS code and to a heap buffer overflow in it’s NTLMSSP code. These bugs can be abused to crash ethereal or maybe to execute arbitrary code on the machine running ethereal. |
Vendor Alerts: | SuSE:
|
Package: | file |
Date: | 03-21-2003 |
Description: | The file command can be used to determine the type of files. iDEFENSE published a security report about a buffer overflow in the handling-routines for the ELF file-format. |
Vendor Alerts: | SuSE:
|
Category:
- Security