Date: | 26 Apr 2004 22:00:00 -0000 |
From: | "John Boletta" <jboletta@securityfocus.com>
| To: | linux-secnews@securityfocus.com |
Subject: | SecurityFocus Linux Newsletter #181 |
SecurityFocus Linux Newsletter #181
------------------------------------
This Issue is Sponsored By: SecurityFocus
Want to keep up on the latest security vulnerabilities? Don't have time
to
visit a myriad of mailing lists and websites to read the news? Just add
the new SecurityFocus RSS feeds to your freeware RSS reader, and see
all
the latest posts for Bugtraq and the SF Vulnernability database in one
convenient place. Or, pull in the latest news, columnists and feature
articles in the SecurityFocus aggregated news feed, and stay on top of
what's happening in the community!
http://www.securityfocus.com/rss/index.shtml
------------------------------------------------------------------------
I. FRONT AND CENTER
1. Common Security Vulnerabilities in e-commerce systems
2. Protecting Road Warriors: Managing Security for Mobile Users
(Part One)
3. Consumer Grade *nix
II. LINUX VULNERABILITY SUMMARY
1. Logcheck Insecure Temporary Directory Vulnerability
2. BSD-Games Mille Local Save Game File Name Buffer Overrun Vul...
3. PHPBB Common.php IP Address Spoofing Vulnerability
4. SSMTP Mail Transfer Agent Symbolic Link Vulnerability
5. KAME Racoon Malformed ISAKMP Packet Denial of Service Vulner...
6. PHPBB album_portal.php Remote File Include Vulnerability
7. UTempter Multiple Local Vulnerabilities
8. Linux Kernel Setsockopt MCAST_MSFILTER Integer Overflow Vuln...
9. Journalness Unspecified Post Access Vulnerability
10. PostNuke Pheonix Multiple Cross-Site Scripting And Path
Disc...
11. Xine And Xine-Lib Multiple Remote File Overwrite
Vulnerabili...
12. Epic Games Unreal Tournament Engine UMOD Manifest.INI
Remote...
III. LINUX FOCUS LIST SUMMARY
1. decent loadbalancing with 2 different ISP's with min...
(Thread)
2. Issue with Ldap group and too many users (Thread)
IV. NEW PRODUCTS FOR LINUX PLATFORMS
1. Immunity CANVAS
2. SecretAgent
3. Cyber-Ark Inter-Business Vault
4. EnCase Forensic Edition
5. KeyGhost SX
6. SafeKit
V. NEW TOOLS FOR LINUX PLATFORMS
1. OpenProtect v5.0.1.6
2. radmind v1.3.0
3. Fast Logging Project for Snort v1.2.1
4. SSpamM v0.2
5. network traffic volume capture to postgresql v2.1
6. N-Stealth HTTP Security Scanner v5.2
VI. UNSUBSCRIBE INSTRUCTIONS
VII. SPONSOR INFORMATION
I. FRONT AND CENTER
-------------------
1. Common Security Vulnerabilities in e-commerce systems
By K. K. Mookhey
This article discusses common attacks and vulnerabilities in e-commerce
shopping cart systems, with reference to SecurityFocus vulnerability
reports where relevant.
http://www.securityfocus.com/infocus/1775
2. Protecting Road Warriors: Managing Security for Mobile Users (Part
One)
By Bob Rudis
This is the first of a two-part series that focuses on the centralized
management of security for mobile users. Part one introduces vendor-
neutral questions you should consider about firewalls and anti-virus
software for your mobile users.
http://www.securityfocus.com/infocus/1777
3. Consumer Grade *nix
By Daniel Hanson
Consumer grade *nix is a powder keg looking for a place to happen.
http://www.securityfocus.com/columnists/235
II. LINUX VULNERABILITY SUMMARY
-------------------------------
1. Logcheck Insecure Temporary Directory Vulnerability
BugTraq ID: 10162
Remote: No
Date Published: Apr 17 2004
Relevant URL: http://www.securityfocus.com/bid/10162
Summary:
Logcheck performs operations on temporary directories in the /var/tmp
directory in an insecure manner.
This issue may only be exploited when the program removes said
directories. The issue could be exploited by a local attacker to corrupt root
owned files. This will most likely result in destruction of data and
denial of service.
2. BSD-Games Mille Local Save Game File Name Buffer Overrun Vul...
BugTraq ID: 10165
Remote: No
Date Published: Apr 17 2004
Relevant URL: http://www.securityfocus.com/bid/10165
Summary:
bsd-games mille is prone to a locally exploitable buffer overrun
vulnerability. This issue is due to insufficient bounds checking when the
user inputs a file name when saving a game.
This game is typically installed setgid games so may allow privileges
to be escalated to this level if exploited.
3. PHPBB Common.php IP Address Spoofing Vulnerability
BugTraq ID: 10170
Remote: Yes
Date Published: Apr 19 2004
Relevant URL: http://www.securityfocus.com/bid/10170
Summary:
It has been reported that phpBB may be prone to a vulnerability that
may allow a remote attacker to spoof their IP address. As a result, an
attacker would hide their identity and bypass IP restrictions enabled by
an administrator.
phpBB versions 2.0.8a and prior are reported to be affected by this
issue.
4. SSMTP Mail Transfer Agent Symbolic Link Vulnerability
BugTraq ID: 10171
Remote: Yes
Date Published: Apr 19 2004
Relevant URL: http://www.securityfocus.com/bid/10171
Summary:
It has been reported that ssmtp is prone to a symbolic link
vulnerability. This issue is due to a design error that causes the application to
fail to validate files before writing to them.
This issue could be leveraged to corrupt arbitrary, attacker-specified
system files. It may be possible for an attacker to gain escalated
privileges on the affected system; it is certainly possible to cause a
system wide denial of service condition.
5. KAME Racoon Malformed ISAKMP Packet Denial of Service Vulner...
BugTraq ID: 10172
Remote: Yes
Date Published: Apr 19 2004
Relevant URL: http://www.securityfocus.com/bid/10172
Summary:
It has been reported that racoon is prone to a denial of service
vulnerability when handling malformed ISAKMP packets. This issue may allow a
remote attacker to cause the application to exhaust memory resources
leading to a crash or hang.
6. PHPBB album_portal.php Remote File Include Vulnerability
BugTraq ID: 10177
Remote: Yes
Date Published: Apr 19 2004
Relevant URL: http://www.securityfocus.com/bid/10177
Summary:
It has been reported that phpBB may be prone to a file include
vulnerability that may allow remote attackers to include a remote malicious
script to be executed on a vulnerable system.
7. UTempter Multiple Local Vulnerabilities
BugTraq ID: 10178
Remote: No
Date Published: Apr 19 2004
Relevant URL: http://www.securityfocus.com/bid/10178
Summary:
It has been reported that utempter is affected by multiple local
vulnerabilities. The first issue is due to an input validation error that
causes the application to exit improperly; facilitating symbolic link
attacks. The second issue is due to a failure of the application to
properly validate buffer boundaries.
The first issue results in a symbolic link vulnerability. Since
utempter runs with root privileges, this issue could be leveraged to corrupt
arbitrary, attacker-specified system files.
The second problem presents itself when utempter processes certain
strings. These errors may cause the affected process to crash. It has
been conjectured that this may be leveraged to execute arbitrary code on
the affected system, however this is currently unverified.
This BID will be updated as new information becomes available.
8. Linux Kernel Setsockopt MCAST_MSFILTER Integer Overflow Vuln...
BugTraq ID: 10179
Remote: No
Date Published: Apr 20 2004
Relevant URL: http://www.securityfocus.com/bid/10179
Summary:
An integer overflow vulnerability has been reported in the setsockopt()
system call. This was introduced as of the 2.4.22/2.6.1 kernel
releases.
The specific issue exists in the net/ipv4/ip_sockglue.c source file and
is present in the ip_setsockopt() subroutine of the setsockopt() system
call. Within this subroutine there is an integer overflow within the
IP_MSFILTER_SIZE macro, which is used when setting the MCAST_MSFILTER
socket option.
This issue may be exploited by a local user to compromise the system.
Exploitation could also result in a denial of service. It should be
noted that this type of vulnerability may provide a generic means of
privilege escalation across Linux distributions once a remote attacker has
gained unauthorized access as a lower privileged user.
9. Journalness Unspecified Post Access Vulnerability
BugTraq ID: 10187
Remote: Yes
Date Published: Apr 21 2004
Relevant URL: http://www.securityfocus.com/bid/10187
Summary:
An unspecified vulnerability has been reported in Journalness that may
permit unauthorized users to create or modify journal posts.
10. PostNuke Pheonix Multiple Cross-Site Scripting And Path Disc...
BugTraq ID: 10191
Remote: Yes
Date Published: Apr 21 2004
Relevant URL: http://www.securityfocus.com/bid/10191
Summary:
Multiple vulnerabilities were reported to exist in PostNuke Pheonix.
The following specific vulnerabilities were reported:
- Multiple path disclosure vulnerabilities that occur when a user
directly requests scripts in the "/includes/blocks/" and "pnadodb"
directories. This issue also affects scripts that are associated in multiple
modules.
- Multiple cross-site scripting vulnerabilities were reported in the
Downloads and Web_Links modules as well as the openwindow.php script.
These issues may permit remote attackers to cause hostile HTML and script
code to be interpreted by a victim user's browser.
11. Xine And Xine-Lib Multiple Remote File Overwrite Vulnerabili...
BugTraq ID: 10193
Remote: Yes
Date Published: Apr 22 2004
Relevant URL: http://www.securityfocus.com/bid/10193
Summary:
It has been reported that the xine media player and the xine media
library are affected by multiple remote file overwrite vulnerabilities.
This is due to a design error that allows various media resource file
configurations to write to arbitrary files.
It is possible to set these configuration parameters to write to
arbitrary files on the affected system. It should be noted that this issue,
as it is currently known, only affects Sun based systems as well as
those using the DXR3 or Hollywood+ MPEG decoder audio card. It has been
conjectured however that similar configuration parameters exists that
affect other systems.
12. Epic Games Unreal Tournament Engine UMOD Manifest.INI Remote...
BugTraq ID: 10196
Remote: Yes
Date Published: Apr 22 2004
Relevant URL: http://www.securityfocus.com/bid/10196
Summary:
Reportedly the Unreal Tournament Engine is affected by a local file
overwrite vulnerability due to the UMOD manifest.ini file. This issue is
due to an input validation error that allows a malicious user specify
arbitrary files for writing, potentially leading to a system wide denial
of service condition.
III. LINUX FOCUS LIST SUMMARY
-----------------------------
1. decent loadbalancing with 2 different ISP's with min... (Thread)
Relevant URL:
http://www.securityfocus.com/archive/91/360950
2. Issue with Ldap group and too many users (Thread)
Relevant URL:
http://www.securityfocus.com/archive/91/360818
IV. NEW PRODUCTS FOR LINUX PLATFORMS
------------------------------------
1. Immunity CANVAS
By: Immunity, Inc.
Platforms: Linux, Windows 2000
Relevant URL: http://www.immunitysec.com/CANVAS/
Summary:
Immunity CANVAS is 100% pure Python, and every license includes full
access to the entire CANVAS codebase. Python is one of the easiest
languages to learn, so even novice programmers can be productive on the
CANVAS API, should they so chose.
Immunity CANVAS is both a valuable demonstration tool for enterprise
information security teams or system adminstrators, and an advanced
development platform for exploit developers, or people learning to become
exploit developers.
2. SecretAgent
By: Information Security Corporation (ISC)
Platforms: Linux, MacOS, UNIX, Windows 2000, Windows 95/98, Windows NT,
Windows XP
Relevant URL:
http://www.infoseccorp.com/products/secretagent/contents.htm
Summary:
SecretAgent is a file encryption and digital signature utility,
supporting cross-platform interoperability over a wide range of platforms:
Windows, Linux, Mac OS X, and UNIX systems.
It's the perfect solution for your data security requirements,
regardless of the size of your organization.
Using the latest recognized standards in encryption and digital
signature technology, SecretAgent ensures the confidentiality, integrity, and
authenticity of your data.
3. Cyber-Ark Inter-Business Vault
By: Cyber-Ark
Platforms: Linux, Windows 2000, Windows NT, Windows XP
Relevant URL:
http://www.cyber-ark.com/datasecuritysoftware/inter-business_vault.htm
Summary:
Based on Cyber-Ark Software's Vaulting Technology, the Inter-Business
Vault, an information security solution that enables organizations to
safely overcome traditional network boundaries in order to securely share
business information among customers, business partners, and remote
branches. It provides a seamless, LAN-like experience over the Internet
that includes all the security, performance, accessibility, and ease of
administration required to allow organizations to share everyday
information worldwide. To learn more about these core attributes of the
Inter-Business Vault click on the relevant link below:
4. EnCase Forensic Edition
By: Guidance Software Inc.
Platforms: DOS, FreeBSD, Linux, MacOS, NetBSD, OpenBSD, PalmOS,
Solaris, UNIX, Windows 2000, Windows 95/98, Windows NT, Windows XP
Relevant URL:
http://www.guidancesoftware.com/products/EnCaseForensic/index.shtm
Summary:
EnCase Forensic Edition Version 4 delivers the most advanced features
for computer forensics and investigations. With an intuitive GUI and
superior performance, EnCase Version 4 provides investigators with the
tools to conduct large-scale and complex investigations with accuracy and
efficiency. Guidance Software?s award winning solution yields
completely non-invasive computer forensic investigations while allowing
examiners to easily manage large volumes of computer evidence and view all
relevant files, including "deleted" files, file slack and unallocated
space.
The integrated functionality of EnCase allows the examiner to perform
all functions of the computer forensic investigation process. EnCase's
EnScript, a powerful macro-programming language and API included within
EnCase, allows investigators to build customized and reusable forensic
scripts.
5. KeyGhost SX
By: KeyGhost Ltd
Platforms: BeOS, DOS, Linux, OS/2, Solaris, SunOS, Windows 2000,
Windows 95/98, Windows NT, Windows XP
Relevant URL: http://www.keyghost.com/SX/
Summary:
KeyGhost SX discreetly captures and records all keystrokes typed,
including chat conversations, email, word processor, or even activity within
an accounting or specialist system. It is completely undetectable by
software scanners and provides you with one of the most powerful stealth
surveillance applications offered anywhere.
Because KeyGhost uses STRONG 128-Bit encryption to store the recorded
data in it?s own internal memory (not on the hard drive), it is
impossible for a network intruder to gain access to any sensitive data stored
within the device.
6. SafeKit
By: Evidian Inc.
Platforms: AIX, HP-UX, Linux, Solaris, Windows 2000
Relevant URL: http://www.evidian.com/safekit/index.htm
Summary:
Evidian's SafeKit technology makes it possible to render any
application available 24 hours per day. With no extra hardware: just use your
existing servers and install this software-only solution.
This provides ultimate scalability. As your needs grow, all you need to
do is add more standard servers into the cluster. With the load
balancing features of SafeKit, you can distribute applications over multiple
servers. If one system fails completely, the others will continue to
serve your users.
V. NEW TOOLS FOR LINUX PLATFORMS
--------------------------------
1. OpenProtect v5.0.1.6
By: OpenProtect is a server-side email protector which guards against
spam and viruses in addition to pr
Relevant URL: http://opencomputing.sf.net
Platforms: Linux
Summary:
OpenProtect is a server-side email protector which guards against spam
and viruses in addition to providing content filtering, using a variety
of open- source packages. It supports Sendmail, Postfix, Exim and
qmail, and is easy to install and maintain.
2. radmind v1.3.0
By: UMich RSUG
Relevant URL: http://rsug.itd.umich.edu/software/radmind/
Platforms: FreeBSD, Linux, MacOS, OpenBSD, Solaris, SunOS, UNIX
Summary:
radmind is a suite of Unix command-line tools and a server designed to
remotely administer the file systems of multiple Unix machines. At its
core, radmind operates as a tripwire. It is able to detect changes to
any managed filesystem object, e.g. files, directories, links, etc.
However, radmind goes further than just integrity checking: once a change
is detected, radmind can optionally reverse the change. Each managed
machine may have its own loadset composed of multiple, layered overloads.
This allows, for example, the operating system to be described
separately from applications. Loadsets are stored on a remote server. By
updating a loadset on the server, changes can be pushed to managed machines.
3. Fast Logging Project for Snort v1.2.1
By: DG <Dirk@geschke.online.de>
Relevant URL: http://www.geschke-online.de/FLoP
Platforms: Linux, Solaris, SunOS
Summary:
FLoP is designed to gather alerts with a payload from distributed Snort
sensors at a central server, and to store them in a database
(PostgreSQL and MySQL are supported). On the sensor, the output is written via a
Unix domain socket to a process called sockserv. This process is
threaded; one receives and buffers the alert packets, and the other thread
forwards them to a central server. With this approach, the output is
decoupled from Snort, which can proceed in sniffing instead of waiting for
the output plugins. At the central server, a process called servsock
gathers all alerts from the remote sensors and feeds them via a Unix
domain socket to the database. All alerts are buffered to avoid blocking
due to a hanging database access (or a slow network on the senor side). A
short description of alerts with high priority together with the
database ID can be sent via email to a list of recipients.
4. SSpamM v0.2
By: Sami-Pekka Hallikas
Relevant URL: http://sourceforge.net/projects/sspamm/
Platforms: Linux, Os Independent, POSIX, UNIX
Summary:
Semi's Spam Milter (sspamm) is a spam filter for Sendmail that utilizes
spambayes, heurestic spam filtering, and virus scanning (BitDefender,
not included).
5. network traffic volume capture to postgresql v2.1
By: Rob Fowler
Relevant URL: http://gborg.postgresql.org/project/tcap/projdisplay.php
Platforms: Linux, POSIX
Summary:
This is a Unix daemon that captures traffic packet size, source,
destination, and times and saves this data into a postgres database in near
real time, from which traffic reports may be made. It does not save the
actual data or headers. Works on ethX or cooked devices like ppp0. It
uses Postgres embedded SQL to insert the data, pcap to capture traffic,
and pthreads to capure and write at the same time. It is written in C++
using STL. Pcap filters can be specified on the command line. Logs go
to syslog.
6. N-Stealth HTTP Security Scanner v5.2
By: qw erty <qw@erty.net >
Relevant URL: http://www.nstalker.com/products/nstealth/download.php
Platforms: Linux, Windows 2000, Windows 95/98, Windows NT
Summary:
N-Stealth is a comprehensive web server security-auditing tool that
scans for over 30,000 vulnerabilities. It is ideal for system
administrators, security consultant and IT professionals.
VII. SPONSOR INFORMATION
-----------------------
This Issue is Sponsored By: SecurityFocus
Want to keep up on the latest security vulnerabilities? Don't have time
to
visit a myriad of mailing lists and websites to read the news? Just add
the new SecurityFocus RSS feeds to your freeware RSS reader, and see
all
the latest posts for Bugtraq and the SF Vulnernability database in one
convenient place. Or, pull in the latest news, columnists and feature
articles in the SecurityFocus aggregated news feed, and stay on top of
what's happening in the community!
http://www.securityfocus.com/rss/index.shtml
------------------------------------------------------------------------