Date: | 10 Jun 2004 16:42:21 -0000 |
From: | "Peter Laborge" <plaborge@securityfocus.com>
| To: | linux-secnews@securityfocus.com |
Subject: | SecurityFocus Linux Newsletter #187 |
SecurityFocus Linux Newsletter #187
------------------------------------
This Issue is Sponsored By: SPI Dynamics
ALERT: "How Hackers Launch Blind SQL Injection Attacks- New White Paper
The newest web app vulnerability... Blind SQL Injection!
Even if your web application does not return error messages, it may
still
be open to a Blind SQL Injection Attack. Blind SQL Injection can
deliver
total control of your server to a hacker giving them the ability to
read,
write and manipulate all data stored in your backend systems! Download
this *FREE* white paper from SPI Dynamics for a complete guide to
protection!
http://www.securityfocus.com/sponsor/SPIDynamics_linux-secnews_040607
------------------------------------------------------------------------
I. FRONT AND CENTER
1. Wireless Attacks and Penetration Testing (part 1 of 3)
2. Catching a Virus Writer
3. Multiple Security Roles With Unix/Linux
II. LINUX VULNERABILITY SUMMARY
1. Isoqlog Multiple Buffer Overflow Vulnerabilities
2. Spamguard Multiple Buffer Overflow Vulnerabilities
3. Gatos xatitv Missing Configuration File Privilege Escalation...
4. SquirrelMail Email Header HTML Injection Vulnerability
5. Firebird Remote Pre-Authentication Database Name Buffer Over...
6. PHP-Nuke Direct Script Access Security Bypass Vulnerability
7. MIT Kerberos 5 KRB5_AName_To_Localname Multiple Principal Na...
8. Gallery Authentication Bypass Vulnerability
9. Tripwire Email Reporting Format String Vulnerability
10. Unix and Unix-based select() System Call Overflow
Vulnerabil...
11. Trend Micro Scanning Engine Report Generation HTML
Injection...
12. Michael Krax log2mail Log File Writing Format String
Vulnera...
13. Slackware Linux PHP Packages Insecure Linking Configuration
...
III. LINUX FOCUS LIST SUMMARY
1. mrtg/snmp/subinterfaces (Thread)
2. OpenVPN? (Thread)
3. Block martians with source address 127.0.0.1 (Thread)
4. Martians? (Thread)
IV. NEW PRODUCTS FOR LINUX PLATFORMS
1. Immunity CANVAS
2. SecretAgent
3. Cyber-Ark Inter-Business Vault
4. EnCase Forensic Edition
5. KeyGhost SX
6. SafeKit
V. NEW TOOLS FOR LINUX PLATFORMS
1. Devil-Linux v1.2 Beta 1
2. GNU Anubis v3.9.94
3. DNSSEC Walker v3.4
4. Ettercap v0.7.0 pre2
5. Linux Intrusion Detection System (LIDS) v2.6.6
6. Astaro Security Linux (Stable 5.x) v5.007
VI. UNSUBSCRIBE INSTRUCTIONS
VII. SPONSOR INFORMATION
I. FRONT AND CENTER
-------------------
1. Wireless Attacks and Penetration Testing (part 1 of 3)
By Jonathan Hassell
This is the first of a three part series on penetration testing for
wireless networks. This installment will detail common styles of
attacks
against wireless networks, introduce WEP key-cracking, and then discuss
some recent developments in wireless security.
http://www.securityfocus.com/infocus/1783
2. Catching a Virus Writer
By Kelly Martin
With the consumer WiFi explosion, launching a virus into the wild has
never been easier and more anonymous than it is today.
http://www.securityfocus.com/columnists/246
3. Multiple Security Roles With Unix/Linux
By Daniel Hanson
There are some areas of security where Linux and Unix have some strong
wins, and simply fit in better than anything else.
http://www.securityfocus.com/columnists/247
II. LINUX VULNERABILITY SUMMARY
-------------------------------
1. Isoqlog Multiple Buffer Overflow Vulnerabilities
BugTraq ID: 10433
Remote: Yes
Date Published: May 29 2004
Relevant URL: http://www.securityfocus.com/bid/10433
Summary:
Isoqlog is prone to multiple buffer overflow vulnerabilities that span
various source files and functions. Some of the vulnerabilities are
remotely exploitable and may permit execution of arbitrary code in the
context of the process. Others are local in nature, but as the software
is not typically installed setuid/setgid, should not present any
security risk.
2. Spamguard Multiple Buffer Overflow Vulnerabilities
BugTraq ID: 10434
Remote: Yes
Date Published: May 29 2004
Relevant URL: http://www.securityfocus.com/bid/10434
Summary:
Spamguard is prone to multiple buffer overflow vulnerabilities that
span various source files and functions. Some of the vulnerabilities are
remotely exploitable and may permit execution of arbitrary code in the
context of the process. Others are local in nature, but as the
software is not typically installed setuid/setgid, should not present any
security risk.
3. Gatos xatitv Missing Configuration File Privilege Escalation...
BugTraq ID: 10437
Remote: No
Date Published: May 29 2004
Relevant URL: http://www.securityfocus.com/bid/10437
Summary:
The gatos xatitv utility is prone to a local privilege escalation
vulnerability.
This issue may occur when the utility, which is installed setuid root,
fails to drop privileges due to a missing configuration file.
Unsanitized user-supplied environment variables may then be exploited to
escalate privileges.
It is noted that the software ships with a default configuration file,
so exploitation would require that the file was removed at some point.
4. SquirrelMail Email Header HTML Injection Vulnerability
BugTraq ID: 10439
Remote: Yes
Date Published: May 31 2004
Relevant URL: http://www.securityfocus.com/bid/10439
Summary:
SquirrelMail is reported to be prone to an email header HTML injection
vulnerability. This issue is due to a failure of the application to
properly sanitize user-supplied email header strings.
An attacker can exploit this issue to gain access to an unsuspecting
user's cookie based authentication credentials; disclosure of personal
email is possible. Other attacks are also possible.
5. Firebird Remote Pre-Authentication Database Name Buffer Over...
BugTraq ID: 10446
Remote: Yes
Date Published: Jun 01 2004
Relevant URL: http://www.securityfocus.com/bid/10446
Summary:
Firebird is reported prone to a remote buffer overrun vulnerability.
The issue presents itself due to a lack of sufficient boundary checks
performed when the database server is handling database names.
A remote attacker may exploit this vulnerability, without requiring
valid authentication credentials, to influence execution flow of the
affected Firebird database server. Ultimately this may lead to the execution
of attacker-supplied code in the context of the affected software.
6. PHP-Nuke Direct Script Access Security Bypass Vulnerability
BugTraq ID: 10447
Remote: Yes
Date Published: Jun 01 2004
Relevant URL: http://www.securityfocus.com/bid/10447
Summary:
PHP-Nuke is affected by a direct script access security vulnerability.
This issue is due to a failure to properly validate the location and
name of the file being accessed.
This issue will allow an attacker to gain access to sensitive scripts
such as the 'admin.php' script. The attacker may be able to exploit
this unauthorized access to carry out attacks against the affected
application.
7. MIT Kerberos 5 KRB5_AName_To_Localname Multiple Principal Na...
BugTraq ID: 10448
Remote: Yes
Date Published: Jun 01 2004
Relevant URL: http://www.securityfocus.com/bid/10448
Summary:
Kerberos 5 is prone to multiple boundary condition errors that exist in
the krb5_aname_to_localname() and helper functions and are due to
insufficient bounds checking performed on user-supplied data.
An additional boundary condition issue also exists in the
krb5_aname_to_localname() function. The condition is reported to present itself in
the explicit mapping functionality of the krb5_aname_to_localname() as
an off-by-one.
These conditions may be theoretically exploitable to execute arbitrary
code remotely in the context of the affected service.
It is reported that explicit mapping or rules-based
mapping functionality of krb5_aname_to_localname() must be enabled for
these vulnerabilities to be present. Additionally it is necessary that
the principal name used by the attacker to exploit the issue be listed
in the explicit mapping list.
These vulnerabilities are reported to affect all releases of MIT
Kerberos 5, up to and including version krb5-1.3.3.
8. Gallery Authentication Bypass Vulnerability
BugTraq ID: 10451
Remote: Yes
Date Published: Jun 02 2004
Relevant URL: http://www.securityfocus.com/bid/10451
Summary:
It has been disclosed that an attacker can bypass Gallery's
authentication process, and log in as any user without a password.
An attacker can override configuration variables by passing them in
GET, POST or cookie arguments. Gallery simulates the 'register_globals'
PHP setting by extracting the values of the various $HTTP_ global
variables into the global namespace. Therefore, regardless of the
'register_globals' PHP setting, an attacker can override configuration variables.
An attacker can change configuration variables and cause Gallery to
skip the authentication steps.
Versions prior to 1.4.3-pl2 are reported to be vulnerable.
9. Tripwire Email Reporting Format String Vulnerability
BugTraq ID: 10454
Remote: Yes
Date Published: Jun 03 2004
Relevant URL: http://www.securityfocus.com/bid/10454
Summary:
Tripwire is affected by an email reporting format string vulnerability.
This issue is due to a failure to properly inplement a formatted string
function.
This vulnerability will allow for execution of arbitrary code on a
system running the affected software. This would occur in the security
context of the user invoking the vulnerable application; typically the
superuser.
**Update - It is reported that this issue only presents itself when the
MAILMETHOD is sendmail.
10. Unix and Unix-based select() System Call Overflow Vulnerabil...
BugTraq ID: 10455
Remote: Unknown
Date Published: Jun 03 2004
Relevant URL: http://www.securityfocus.com/bid/10455
Summary:
The select() system call may be vulnerable to an overflow condition,
possibly allowing attackers to write data past the end of a fixed size
buffer.
select() uses arguments of type 'fd_set', which is of a fixed size in
many Unix variants. fd_set is used to keep track of open file
descriptors.
If a process raises its rlimit for open files past 1024, it is
theoretically possible to cause select to change individual bits past the end
of the fixed size fds_bits structure. In theory, an attacker may be able
to use this vulnerability to cause a denial of service condition, or
possibly execute arbitrary code.
It should be noted that rlimits can only be raised by root, and that
only processes with rlimits allowing more than 1024 file descriptors
would be affected.
This is a theoretical issue, and it has not been confirmed by any
vendor. This BID will be updated when further information is released.
11. Trend Micro Scanning Engine Report Generation HTML Injection...
BugTraq ID: 10456
Remote: Yes
Date Published: Jun 03 2004
Relevant URL: http://www.securityfocus.com/bid/10456
Summary:
Trend Micro's scanning engine is reportedly affected by an HTML
injection vulnerability in its report generation feature. This issue is due to
a failure to properly sanitize user-supplied before including it in a
HTML report.
It has been speculated that the offending HTML alert reports run from
the local zone on the affected computer, although this has not been
verified.
This issue may be exploited by a remote attacker to execute arbitrary
HTML or script code on an affected computer; potentially resulting in
unauthorized access. Other attackers are also possible.
12. Michael Krax log2mail Log File Writing Format String Vulnera...
BugTraq ID: 10460
Remote: No
Date Published: Jun 03 2004
Relevant URL: http://www.securityfocus.com/bid/10460
Summary:
Michael Krax log2mail is reported prone to a log file writing format
string vulnerability. This issue is due to a failure of the application
to properly implement a formatted string function.
This vulnerability will ultimately allow for execution of arbitrary
code on a system running the affected software. This would occur in the
security context of the user invoking the vulnerable application;
typically the 'log2mail' user with group 'adm'.
13. Slackware Linux PHP Packages Insecure Linking Configuration ...
BugTraq ID: 10461
Remote: No
Date Published: Jun 02 2004
Relevant URL: http://www.securityfocus.com/bid/10461
Summary:
Slackware Linux PHP Packages are reportedly affected by an insecure
linking configuration vulnerability. This issue is due to a configuration
error that links PHP to be linked against shared libraries in insecure
directories.
This issue can be leveraged by an attacker to execute arbitrary code in
the security context of the user running the affected PHP process;
typically the user 'nobody'.
III. LINUX FOCUS LIST SUMMARY
-----------------------------
1. mrtg/snmp/subinterfaces (Thread)
Relevant URL:
http://www.securityfocus.com/archive/91/365318
2. OpenVPN? (Thread)
Relevant URL:
http://www.securityfocus.com/archive/91/365209
3. Block martians with source address 127.0.0.1 (Thread)
Relevant URL:
http://www.securityfocus.com/archive/91/365207
4. Martians? (Thread)
Relevant URL:
http://www.securityfocus.com/archive/91/364805
IV. NEW PRODUCTS FOR LINUX PLATFORMS
------------------------------------
1. Immunity CANVAS
By: Immunity, Inc.
Platforms: Linux, Windows 2000
Relevant URL: http://www.immunitysec.com/CANVAS/
Summary:
Immunity CANVAS is 100% pure Python, and every license includes full
access to the entire CANVAS codebase. Python is one of the easiest
languages to learn, so even novice programmers can be productive on the
CANVAS API, should they so chose.
Immunity CANVAS is both a valuable demonstration tool for enterprise
information security teams or system adminstrators, and an advanced
development platform for exploit developers, or people learning to become
exploit developers.
2. SecretAgent
By: Information Security Corporation (ISC)
Platforms: Linux, MacOS, UNIX, Windows 2000, Windows 95/98, Windows NT,
Windows XP
Relevant URL:
http://www.infoseccorp.com/products/secretagent/contents.htm
Summary:
SecretAgent is a file encryption and digital signature utility,
supporting cross-platform interoperability over a wide range of platforms:
Windows, Linux, Mac OS X, and UNIX systems.
It's the perfect solution for your data security requirements,
regardless of the size of your organization.
Using the latest recognized standards in encryption and digital
signature technology, SecretAgent ensures the confidentiality, integrity, and
authenticity of your data.
3. Cyber-Ark Inter-Business Vault
By: Cyber-Ark
Platforms: Linux, Windows 2000, Windows NT, Windows XP
Relevant URL:
http://www.cyber-ark.com/datasecuritysoftware/inter-business_vault.htm
Summary:
Based on Cyber-Ark Software's Vaulting Technology, the Inter-Business
Vault, an information security solution that enables organizations to
safely overcome traditional network boundaries in order to securely share
business information among customers, business partners, and remote
branches. It provides a seamless, LAN-like experience over the Internet
that includes all the security, performance, accessibility, and ease of
administration required to allow organizations to share everyday
information worldwide. To learn more about these core attributes of the
Inter-Business Vault click on the relevant link below:
4. EnCase Forensic Edition
By: Guidance Software Inc.
Platforms: DOS, FreeBSD, Linux, MacOS, NetBSD, OpenBSD, PalmOS,
Solaris, UNIX, Windows 2000, Windows 95/98, Windows NT, Windows XP
Relevant URL:
http://www.guidancesoftware.com/products/EnCaseForensic/index.shtm
Summary:
EnCase Forensic Edition Version 4 delivers the most advanced features
for computer forensics and investigations. With an intuitive GUI and
superior performance, EnCase Version 4 provides investigators with the
tools to conduct large-scale and complex investigations with accuracy and
efficiency. Guidance Software?s award winning solution yields
completely non-invasive computer forensic investigations while allowing
examiners to easily manage large volumes of computer evidence and view all
relevant files, including "deleted" files, file slack and unallocated
space.
The integrated functionality of EnCase allows the examiner to perform
all functions of the computer forensic investigation process. EnCase's
EnScript, a powerful macro-programming language and API included within
EnCase, allows investigators to build customized and reusable forensic
scripts.
5. KeyGhost SX
By: KeyGhost Ltd
Platforms: BeOS, DOS, Linux, OS/2, Solaris, SunOS, Windows 2000,
Windows 95/98, Windows NT, Windows XP
Relevant URL: http://www.keyghost.com/SX/
Summary:
KeyGhost SX discreetly captures and records all keystrokes typed,
including chat conversations, email, word processor, or even activity within
an accounting or specialist system. It is completely undetectable by
software scanners and provides you with one of the most powerful stealth
surveillance applications offered anywhere.
Because KeyGhost uses STRONG 128-Bit encryption to store the recorded
data in it?s own internal memory (not on the hard drive), it is
impossible for a network intruder to gain access to any sensitive data stored
within the device.
6. SafeKit
By: Evidian Inc.
Platforms: AIX, HP-UX, Linux, Solaris, Windows 2000
Relevant URL: http://www.evidian.com/safekit/index.htm
Summary:
Evidian's SafeKit technology makes it possible to render any
application available 24 hours per day. With no extra hardware: just use your
existing servers and install this software-only solution.
This provides ultimate scalability. As your needs grow, all you need to
do is add more standard servers into the cluster. With the load
balancing features of SafeKit, you can distribute applications over multiple
servers. If one system fails completely, the others will continue to
serve your users.
V. NEW TOOLS FOR LINUX PLATFORMS
--------------------------------
1. Devil-Linux v1.2 Beta 1
By: Heiko Zuerker <heiko@devil-linux.org>
Relevant URL: http://www.devil-linux.org/download.htm
Platforms: Linux
Summary:
Devil-Linux is a special Linux distribution which is used for
firewalls/routers. The goal of Devil-Linux is to have a small, customizable, and
secure Linux system. Configuration is saved on a floppy disk, and it
has several optional packages.
2. GNU Anubis v3.9.94
By: Wojciech Polak
Relevant URL: http://www.gnu.org/software/anubis/
Platforms: Linux, POSIX
Summary:
GNU Anubis is an outgoing mail processor. It goes between the MUA (Mail
User Agent) and the MTA (Mail Transport Agent), and can perform various
sorts of processing and conversion on-the-fly in accordance with the
sender's specified rules, based on a highly configurable regular
expressions system. It operates as a proxy server, and can edit outgoing mail
headers, encrypt or sign mail with the GnuPG, build secure SMTP tunnels
using the TLS/SSL encryption even if your mail user agent doesn't
support it, or tunnel a connection through a SOCKS proxy server.
3. DNSSEC Walker v3.4
By: Simon Josefsson
Relevant URL: http://josefsson.org/walker/
Platforms: Linux, UNIX
Summary:
DNSSEC Walker is a tool to recover DNS zonefiles using the DNS
protocol. The server does not have to support zonetransfer, but the zone must
contain DNSSEC "NXT" records.
4. Ettercap v0.7.0 pre2
By: ALoR <alor@users.sourceforge.net>
Relevant URL: http://ettercap.sourceforge.net/
Platforms: FreeBSD, Linux, MacOS, NetBSD, Windows 2000, Windows NT,
Windows XP
Summary:
Ettercap is a network sniffer/interceptor/logger for ethernet LANs. It
supports active and passive dissection of many protocols (even ciphered
ones, like SSH and HTTPS). Data injection in an established connection
and filtering on the fly is also possible, keeping the connection
synchronized. Many sniffing modes were implemented to give you a powerful
and complete sniffing suite. Plugins are supported. It has the ability to
check whether you are in a switched LAN or not, and to use OS
fingerprints (active or passive) to let you know the geometry of the LAN.
5. Linux Intrusion Detection System (LIDS) v2.6.6
By: Xie Hua Gang, xhg@gem.ncic.ac.cn
Relevant URL: http://www.lids.org/download.html
Platforms: Linux
Summary:
The Linux Intrusion Detection System is a patch which enhances the
kernel's security. When it is in effect, chosen files access, all
system/network administration operations, any capability use, raw device, mem,
and I/O access can be made impossible even for root. You can define
which program can access which file. It uses and extends the system
capabilities bounding set to control the whole system and adds some network
and filesystem security features to the kernel to enhance the security.
You can finely tune the security protections online, hide sensitive
processes, receive security alerts through the network, and more.
6. Astaro Security Linux (Stable 5.x) v5.007
By: astaro
Relevant URL: http://www.astaro.com/
Platforms: Linux, POSIX
Summary:
Astaro Security Linux is a firewall solution. It does stateful packet
inspection filtering, content filtering, user authentication, virus
scanning, VPN with IPSec and PPTP, and much more. With its Web-based
management tool, WebAdmin, and the ability to pull updates via the Internet,
it is pretty easy to manage. It is based on a special hardened Linux
2.4 distribution where most daemons are running in change-roots and are
protected by kernel capabilities.
If your email address has changed email listadmin@securityfocus.com and
ask to be manually removed.
VII. SPONSOR INFORMATION
-----------------------
This Issue is Sponsored By: SPI Dynamics
ALERT: "How Hackers Launch Blind SQL Injection Attacks- New White Paper
The newest web app vulnerability... Blind SQL Injection!
Even if your web application does not return error messages, it may
still
be open to a Blind SQL Injection Attack. Blind SQL Injection can
deliver
total control of your server to a hacker giving them the ability to
read,
write and manipulate all data stored in your backend systems! Download
this *FREE* white paper from SPI Dynamics for a complete guide to
protection!
http://www.securityfocus.com/sponsor/SPIDynamics_linux-secnews_040607
------------------------------------------------------------------------