Author: Preston St. Pierre
yardradius, AbiWord, unarj, pdftohtml, ProZilla, phpBB, TWiki, XFree86, libxpm4,
a2ps, zip, kdebase, and kdelibs. The distributors include Conectiva, Debian,
Fedora, Gentoo, Mandrake, Openwall, and Trustix.
Security Basics
In the ever-changing world of global data communications, inexpensive Internet
connections, and fast-paced software development, security is becoming more
and more of an issue. Security is now a basic requirement because global computing
is inherently insecure. As your data goes from point A to point B on the Internet,
for example, it may pass through several other points along the way, giving
other users the opportunity to intercept, and even alter, your data. Even other
users on your system may maliciously transform your data into something you
did not intend. Unauthorized access to your system may be obtained by intruders,
also known as “crackers”, who then use advanced knowledge to impersonate you,
steal information from you, or even deny you access to your own resources. If
you’re still wondering what the difference is between a “Hacker” and a “Cracker”,
see Eric Raymond’s document, “How to Become A Hacker”, available at: http://www.catb.org/~esr/faqs/hacker-howto.html
How Vulnerable Are We?
While it is difficult to determine just how vulnerable a particular
system is, there are several indications we can use:
- The Computer Emergency Response Team consistently reports an increase in
computer vulnerabilities and exploits. - TCP and UDP, the protocols that comprise the Internet, were not written
with security as their first priority when it was created more than 30 years
ago. - A version of software on one host has the same vulnerabilities as the same
version of software on another host. Using this information, an intruder can
exploit multiple systems using the same attack method. - Many administrators don’t even take simple security measures necessary to
protect their site, or don’t understand the ramifications of implementing
some services. Many administrators are not given the additional time necessary
to integrate the necessary security measures.
Distribution: | Conectiva | ||
11/23/2004 | shadow-utils authentication bypass vulnerability fix | ||
Martin Schulze reported a vulnerability[2] in the passwd_check() |
|||
11/23/2004 | bugzilla | ||
remote vulnerability fix
Bugzilla versions prior to 2.16.7 have a vulnerability[3] which allows |
|||
11/25/2004 | samba | ||
denial of service vulnerability fix
Karol Wiesek found a vulnerability[2] in the input validation routines |
|||
Distribution: | Debian | ||
11/24/2004 | bnc | ||
buffer overflow
Leon Juranic discovered that BNC, an IRC session bouncing proxy, does |
|||
11/24/2004 | sudo | ||
privilege escalation fix
Liam Helmer noticed that sudo, a program that provides limited super |
|||
11/24/2004 | sudo | ||
removes debug output
Liam Helmer noticed that sudo, a program that provides limited super |
|||
11/25/2004 | Cyrus | ||
IMAP arbitrary code execution fix
Stefan Esser discovered several security related problems in the Cyrus |
|||
11/25/2004 | yardradius | ||
arbitrary code execution fix
Max Vozeler noticed that yardradius, the YARD radius authentication and |
|||
11/25/2004 | tetex-bin arbitrary code execution | ||
arbitrary code execution fix
Chris Evans discovered several integer overflows in xpdf, that are also |
|||
Distribution: | Fedora | ||
11/19/2004 | system-config-users-1.2.28-0.fc3.1 update | ||
arbitrary code execution fix
check for running processes of a user about to be deleted (#132902) |
|||
11/19/2004 | system-config-users-1.2.28-0.fc2.1 update | ||
arbitrary code execution fix
check for running processes of a user about to be deleted (#132902) |
|||
11/19/2004 | rhgb-0.16.1-1.FC3 update | ||
arbitrary code execution fix
This should fix the problem where rhgb blocks the boot process when X |
|||
11/22/2004 | redhat-menus-3.7-2.2.fc3 update | ||
arbitrary code execution fix
This update adds additional file types to the list of file types |
|||
11/22/2004 | kernel-2.6.9-1.6_FC2 update | ||
arbitrary code execution fix
This update brings a rebase to 2.6.9, including various security fixes |
|||
11/22/2004 | kernel-2.6.9-1.681_FC3 update | ||
arbitrary code execution fix
This update brings an updated -ac patch which which adds several |
|||
11/22/2004 | redhat-menus-3.7.1-1.fc3 update | ||
arbitrary code execution fix
This update fixes the missing evolution icon bug (#rh138282). |
|||
11/23/2004 | system-config-display-1.0.24-1 update | ||
arbitrary code execution fix
This fixes tracebacks experienced by some users with dual head support |
|||
11/24/2004 | system-config-samba-1.2.22-0.fc3.1 update | ||
arbitrary code execution fix
add missing options (#137756) |
|||
11/24/2004 | system-config-samba-1.2.22-0.fc2.1 update | ||
arbitrary code execution fix
add missing options (#137756), don’t raise exception when writing |
|||
11/25/2004 | AbiWord | ||
bug fixes
Fixes for tempnam usages and startup geometry crashes |
|||
Distribution: | Gentoo | ||
11/19/2004 | X.org, Xfree vulnerabilities | ||
bug fixes
libXpm contains several vulnerabilities that could lead to a Denial of Service and arbitrary code execution. |
|||
11/19/2004 | unarj | ||
Long filenames buffer overflow and a path traversal vulnerability
unarj contains a buffer overflow and a directory traversal |
|||
11/23/2004 | pdftohtml | ||
Vulnerabilities in included Xpdf
pdftohtml includes vulnerable Xpdf code to handle PDF files, making it |
|||
11/23/2004 | ProZilla | ||
Multiple vulnerabilities
ProZilla contains several buffer overflow vulnerabilities that can be |
|||
11/23/2004 | phpBB | ||
Remote command execution
phpBB contains a vulnerability which allows a remote attacker to |
|||
11/24/2004 | TWiki | ||
Arbitrary command execution
A bug in the TWiki search function allows an attacker to execute |
|||
11/25/2004 | Cyrus | ||
IMAP Multiple remote vulnerabilities
The Cyrus IMAP Server contains multiple vulnerabilities which could lead to remote execution of arbitrary code. |
|||
Distribution: | Mandrake | ||
11/23/2004 | XFree86 | ||
vulnerabilities fix
A source code review of the XPM library, done by Thomas Biege of the |
|||
11/23/2004 | libxpm4 | ||
vulnerabilities fix
A source code review of the XPM library, done by Thomas Biege of the |
|||
11/25/2004 | Cyrus | ||
IMAP multiple vulnerabilities
A number of vulnerabilities in the Cyrus-IMAP server were found by |
|||
11/25/2004 | a2ps | ||
vulnerability fix
The GNU a2ps utility fails to properly sanitize filenames, which can be |
|||
11/25/2004 | zip | ||
vulnerability fix
A vulnerability in zip was discovered where zip would not check the |
|||
11/26/2004 | kdebase | ||
various bugs fixes
A number of bugs in kdebase are fixed with this update. |
|||
11/26/2004 | kdelibs | ||
various bugs fix
A number of bugs in kdelibs are fixed with this update. |
|||
Distribution: | Openwall | ||
11/23/2004 | 2.4.28-ow1 security-related bugs | ||
various bugs fix
Linux 2.4.28, and thus 2.4.28-ow1, fixes a number of security-related |
|||
Distribution: | Trustix | ||
11/22/2004 | apache, kernel, sudo Multiple vulnerabilities | ||
various bugs fix
An issue was discovered where the field length limit was not enforced |
|||
11/22/2004 | amavisd-new, anaconda, courier-imap, ppp, setup, spamassassin, swup, tftp-hpa, tsl-utils Package bugfixes | ||
various bugs fix
amavisd-new: Add tmpwatch of the virusmails directory to keep it from |
|||