Date: | 27 Apr 2005 17:04:43 -0000 |
From: | "Peter Laborge" <plaborge@securityfocus.com>
| To: | linux-secnews@securityfocus.com |
Subject: | SecurityFocus Linux Newsletter #233 |
SecurityFocus Linux Newsletter #233
------------------------------------
This Issue is Sponsored By: CanSecWest/core05
It won't affect you unless you run Linux, OSX, some BSDs, or Windows...
Can/SecWest/core05 - Vancouver, Canada - May 4-6 2005
World Security Pros. Cutting Edge Training, Tools, and Techniques
Security Masters Dojo May 3/4 2005
http://www.securityfocus.com/sponsor/CanSecWest_sf-news_050427
------------------------------------------------------------------------
Need to know what's happening on YOUR network? Symantec DeepSight
Analyzer
is a free service that gives you the ability to track and manage
attacks.
Analyzer automatically correlates attacks from various Firewall and
network
based Intrusion Detection Systems, giving you a comprehensive view of
your
computer or general network. Sign up today!
http://www.securityfocus.com/sponsor/Symantec_sf-news_041130
------------------------------------------------------------------------
I. FRONT AND CENTER
1. Apple's Big Virus
2. Bluetooth Security Review, Part 1
II. LINUX VULNERABILITY SUMMARY
1. Webmin And Usermin Configuration File Unauthorized Access Vu...
2. Mozilla Suite And Firefox Search Plug-In Remote Script Code ...
3. Multiple Vendor TCP Session Acknowledgement Number Denial Of...
4. Mozilla Suite And Firefox Favicon Link Tag Remote Script Cod...
5. CVS Unspecified Buffer Overflow And Memory Access Vulnerabil...
6. Mozilla Firefox PLUGINSPAGE Remote Script Code Execution Vul...
7. Mozilla Suite And Firefox Blocked Pop-Up Window Remote Scrip...
8. Mozilla Suite And Firefox Global Scope Pollution Cross-Site ...
9. Mozilla Firefox Search Target Sidebar Panel Script Code Exec...
10. Mozilla Suite And Firefox XPInstall JavaScript Object
Instan...
11. Mozilla Suite And Firefox Document Object Model Nodes Code
E...
12. XV Image Decoders Multiple Unspecified Input Validation
Vuln...
13. XV Planetary Data System Image Decoder Unspecified Input
Val...
14. XV Planetary Data System Image Decoder Format String
Vulnera...
15. XV Tagged Image File Format Image Decoder Format String
Vuln...
16. XV Image File Name Remote Command Execution Vulnerability
17. RealNetworks RealPlayer Enterprise RAM File Parsing Buffer
O...
18. Linux Kernel Unw_Unwind_To_User Local Denial of Service
Vuln...
19. Linux Kernel Fib_Seq_Start Local Denial of Service
Vulnerabi...
20. MPlayer RTSP Server Line Response Remote Buffer Overflow
Vul...
21. MPlayer MMST Stream ID Remote Buffer Overflow Vulnerability
22. Logwatch Secure Script Denial Of Service Vulnerability
23. Real Networks Helix Player Unspecified Vulnerability
24. PHProjekt Chatroom Text Submission HTML Injection
Vulnerabil...
25. GNU GZip Filename Directory Traversal Vulnerability
26. CPIO Filename Directory Traversal Vulnerability
27. KDE Kommander Unspecified Arbitrary Script Execution
Vulnera...
28. PixySoft E-Cart Cat Parameter Remote Command Execution
Vulne...
29. PixySoft E-Cart Art Parameter Remote Command Execution
Vulne...
III. LINUX FOCUS LIST SUMMARY
1. Any way to automatically change arbitrary headers of...
(Thread)
IV. NEW PRODUCTS FOR LINUX PLATFORMS
1. CoreGuard Core Security System
2. EnCase Forensic Edition
3. KeyGhost SX
4. SafeKit
5. Astaro Linux Firewall
6. CAT Cellular Authentication Token and eAuthentication Servic...
V. NEW TOOLS FOR LINUX PLATFORMS
1. Umbrella v0.6
2. Kernel Socks Bouncer 2.6.11
3. NuFW 1.0.0
4. ldaupenum 0.02alpha
5. File System Saint 1.02a
6. Travesty 1.0
VI. UNSUBSCRIBE INSTRUCTIONS
VII. SPONSOR INFORMATION
I. FRONT AND CENTER
-------------------
1. Apple's Big Virus
By Kelly Martin
After your identity has been stolen, your bank accounts compromised, 53
critical patches and 27 reboots later, when will you decide that you've
had
enough?
http://www.securityfocus.com/columnists/319
2. Bluetooth Security Review, Part 1
By Marek Bialoglowy
This two-part series looks at Bluetooth security and privacy issues,
including methods of detection, data loss prevention and social
engineering.
http://www.securityfocus.com/infocus/1830
II. LINUX VULNERABILITY SUMMARY
-------------------------------
1. Webmin And Usermin Configuration File Unauthorized Access Vu...
BugTraq ID: 13205
Remote: Yes
Date Published: Apr 16 2005
Relevant URL: http://www.securityfocus.com/bid/13205
Summary:
Usermin and Webmin are affected by a configuration file access
validation vulnerability. This issue is due to a design error that causes
certain configuration files to be assigned insecure permissions.
An attacker may leverage this issue to gain access to various,
potentially sensitive system configuration files. This may facilitate
privilege escalation or other attacks.
2. Mozilla Suite And Firefox Search Plug-In Remote Script Code ...
BugTraq ID: 13211
Remote: Yes
Date Published: Apr 16 2005
Relevant URL: http://www.securityfocus.com/bid/13211
Summary:
A remote script code execution vulnerability affects Mozilla Suite and
Mozilla Firefox. This issue is due to a failure of the application to
provide secure access validation prior to carrying out remotely
supplied script code execution.
An attacker may leverage this issue to execute arbitrary code in the
context of a Web site that is being viewed by an unsuspecting user; if
the Web page being viewed is a privileged page, remote code execution is
possible. This may facilitate cross-site scripting as well as a
compromise of an affected computer.
It should be noted that this issue was previously reported in BID 13208
(Mozilla Suite Multiple Code Execution, Cross-Site Scripting, And
Policy Bypass Vulnerabilities); it has been assigned its own BID.
3. Multiple Vendor TCP Session Acknowledgement Number Denial Of...
BugTraq ID: 13215
Remote: Yes
Date Published: Apr 18 2005
Relevant URL: http://www.securityfocus.com/bid/13215
Summary:
Multiple Vendor TCP/IP stack implementations are reported prone to a
denial of service vulnerability.
A report indicates that the vulnerability manifests when an erroneous
TCP acknowledgement number is encountered in an active TCP session
stream.
A successful attack may result in a degradation of the target
connection, effectively denying service for legitimate users. Additionally,
reports indicate that the computer being attacked may suffer CPU
performance degradation, potentially denying service for local users too.
4. Mozilla Suite And Firefox Favicon Link Tag Remote Script Cod...
BugTraq ID: 13216
Remote: Yes
Date Published: Apr 16 2005
Relevant URL: http://www.securityfocus.com/bid/13216
Summary:
A remote script code execution vulnerability affects Mozilla Suite and
Mozilla Firefox. This issue is due to a failure of the application to
deny remote unauthorized access to trusted local interfaces.
An attacker may be able to exploit this issue to execute arbitrary
script code with the privileges of an unsuspecting user that activated the
affected Web browser. This may facilitate the installation and
execution of malicious applications on an affected computer.
It should be noted that this issue was previously reported in BID 13208
(Mozilla Suite Multiple Code Execution, Cross-Site Scripting, And
Policy Bypass Vulnerabilities); it has been assigned its own BID.
5. CVS Unspecified Buffer Overflow And Memory Access Vulnerabil...
BugTraq ID: 13217
Remote: Yes
Date Published: Apr 18 2005
Relevant URL: http://www.securityfocus.com/bid/13217
Summary:
CVS is prone to unspecified buffer overflow, memory access
vulnerabilities, and a NULL pointer dereference denial of service.
It is conjectured that the issues may be leveraged by a remote
authenticated user to disclose regions of the CVS process memory, and to
corrupt CVS process memory. The two issues combined may lead to a remote
attacker reliably executing arbitrary code in the context of the vulnerable
process, although this is not confirmed.
This BID will be updated as soon as further information is made
available.
6. Mozilla Firefox PLUGINSPAGE Remote Script Code Execution Vul...
BugTraq ID: 13228
Remote: Yes
Date Published: Apr 16 2005
Relevant URL: http://www.securityfocus.com/bid/13228
Summary:
A remote script code execution vulnerability affects Mozilla Firefox.
This issue is due to a failure of the application to deny remote
unauthorized access to malicious Plugin Finder Service links.
An attacker may be able to exploit this issue to execute arbitrary
script code with the privileges of an unsuspecting user that activated the
affected Web browser. This may facilitate the installation and
execution of malicious applications, subsequently facilitating unauthorized
access.
It should be noted that this issue was previously reported in BID 13208
(Mozilla Suite Multiple Code Execution, Cross-Site Scripting, And
Policy Bypass Vulnerabilities); it has been assigned its own BID.
7. Mozilla Suite And Firefox Blocked Pop-Up Window Remote Scrip...
BugTraq ID: 13229
Remote: Yes
Date Published: Apr 16 2005
Relevant URL: http://www.securityfocus.com/bid/13229
Summary:
A remote script code execution vulnerability affects Mozilla Suite and
Mozilla Firefox. This issue is due to a failure of the application to
execute JavaScript in blocked pop-up windows securely.
An attacker may be able to exploit this issue to execute arbitrary
script code with the privileges of an unsuspecting user that activated the
affected Web browser. This may facilitate the installation and
execution of malicious applications, subsequently facilitating unauthorized
access.
It should be noted that this issue was previously reported in BID 13208
(Mozilla Suite Multiple Code Execution, Cross-Site Scripting, And
Policy Bypass Vulnerabilities); it has been assigned its own BID.
8. Mozilla Suite And Firefox Global Scope Pollution Cross-Site ...
BugTraq ID: 13230
Remote: Yes
Date Published: Apr 16 2005
Relevant URL: http://www.securityfocus.com/bid/13230
Summary:
A remote cross-site scripting vulnerability affects Mozilla Suite and
Mozilla Firefox. This issue is due to a failure of the application to
properly clear stored parameters.
An attacker may exploit this issue to execute arbitrary script code in
the context of a page that is currently being viewed. This may
facilitate the theft of cookie based authentication credentials as well a other
attacks.
It should be noted that this issue was previously reported in BID 13208
(Mozilla Suite Multiple Code Execution, Cross-Site Scripting, And
Policy Bypass Vulnerabilities); it has been assigned its own BID.
9. Mozilla Firefox Search Target Sidebar Panel Script Code Exec...
BugTraq ID: 13231
Remote: Yes
Date Published: Apr 16 2005
Relevant URL: http://www.securityfocus.com/bid/13231
Summary:
A remote script code execution vulnerability affects Mozilla Firefox.
This issue is due to a failure of the application to securely run
script code targeted at the sidebar panel.
An attacker may be able to exploit this issue to execute arbitrary
script code with the privileges of an unsuspecting user that activated the
affected Web browser. This may facilitate the installation and
execution of malicious applications, subsequently facilitating unauthorized
access.
It should be noted that this issue was previously reported in BID 13208
(Mozilla Suite Multiple Code Execution, Cross-Site Scripting, And
Policy Bypass Vulnerabilities); it has been assigned its own BID.
10. Mozilla Suite And Firefox XPInstall JavaScript Object Instan...
BugTraq ID: 13232
Remote: Yes
Date Published: Apr 16 2005
Relevant URL: http://www.securityfocus.com/bid/13232
Summary:
Mozilla Suite and Mozilla Firefox are affected by an input validation
vulnerability. This issue is due to a failure in the application to
verify input passed to installation objects.
An attacker may be able to exploit this issue to execute malicious code
in the context of the affected browser, subsequently facilitating
unauthorized access.
It should be noted that this issue was previously reported in BID 13208
(Mozilla Suite Multiple Code Execution, Cross-Site Scripting, And
Policy Bypass Vulnerabilities); it has been assigned its own BID.
11. Mozilla Suite And Firefox Document Object Model Nodes Code E...
BugTraq ID: 13233
Remote: Yes
Date Published: Apr 16 2005
Relevant URL: http://www.securityfocus.com/bid/13233
Summary:
Mozilla Suite and Mozilla Firefox are affected by a code execution
vulnerability. This issue is due to a failure in the application to
properly verify Document Object Model (DOM) property values.
An attacker may leverage this issue to execute arbitrary code with the
privileges of the user that activated the vulnerable Web browser,
ultimately facilitating a compromise of the affected computer.
It should be noted that this issue was previously reported in BID 13208
(Mozilla Suite Multiple Code Execution, Cross-Site Scripting, And
Policy Bypass Vulnerabilities); it has been assigned its own BID.
12. XV Image Decoders Multiple Unspecified Input Validation Vuln...
BugTraq ID: 13243
Remote: Yes
Date Published: Apr 19 2005
Relevant URL: http://www.securityfocus.com/bid/13243
Summary:
Multiple unspecified input validation vulnerabilities affect xv. These
issues are due to a failure of the application to properly sanitize
input prior to using it to carry out critical functions.
Although unconfirmed, it is likely that these issues may be exploited
to cause the affected application to crash, and potentially execute
arbitrary commands or machine code. This BID will be updated and
potentially split into seperate BIDs with the release of further details.
13. XV Planetary Data System Image Decoder Unspecified Input Val...
BugTraq ID: 13244
Remote: Yes
Date Published: Apr 19 2005
Relevant URL: http://www.securityfocus.com/bid/13244
Summary:
An unspecified input validation vulnerability affects xv. This issues
is due to a failure of the application to properly sanitize input prior
to using it to carry out critical functions.
Although unconfirmed, it is likely that these issues may be exploited
to cause the affected application to crash, and potentially execute
arbitrary commands or machine code. This BID will be updated with the
release of further details.
Reportedly this issue is distinct from those outlined in BID 13243 (XV
Image Decoders Multiple Unspecified Input Validation Vulnerabilities).
14. XV Planetary Data System Image Decoder Format String Vulnera...
BugTraq ID: 13245
Remote: Yes
Date Published: Apr 19 2005
Relevant URL: http://www.securityfocus.com/bid/13245
Summary:
A remote, client-side format string vulnerability affects xv. This
issue is due to a failure of the application to securely implement a
formatted printing function.
An attacker may leverage this issue to execute arbitrary code with the
privileges of an unsuspecting user that activated the vulnerable
utility.
15. XV Tagged Image File Format Image Decoder Format String Vuln...
BugTraq ID: 13246
Remote: Yes
Date Published: Apr 19 2005
Relevant URL: http://www.securityfocus.com/bid/13246
Summary:
A remote, client-side format string vulnerability affects xv. This
issue is due to a failure of the application to securely implement a
formatted printing function.
An attacker may leverage this issue to execute arbitrary code with the
privileges of an unsuspecting user that activated the vulnerable
utility.
16. XV Image File Name Remote Command Execution Vulnerability
BugTraq ID: 13247
Remote: Yes
Date Published: Apr 19 2005
Relevant URL: http://www.securityfocus.com/bid/13247
Summary:
A remote, client-side command execution vulnerability affects xv. This
issue is due to a failure of the application to properly sanitize input
prior to using it to carry out critical functions.
An attacker may leverage this issue to execute arbitrary commands with
the privileges on an unsuspecting user.
17. RealNetworks RealPlayer Enterprise RAM File Parsing Buffer O...
BugTraq ID: 13264
Remote: Yes
Date Published: Apr 19 2005
Relevant URL: http://www.securityfocus.com/bid/13264
Summary:
RealNetworks RealPlayer Enterprise is reported prone to a buffer
overflow vulnerability. It is reported that the issue manifests when a
malicious RAM file is parsed.
A remote attacker may exploit this vulnerability to execute arbitrary
code in the context of a user that uses a vulnerable version of the
media player to load a malicious RAM file.
18. Linux Kernel Unw_Unwind_To_User Local Denial of Service Vuln...
BugTraq ID: 13266
Remote: No
Date Published: Apr 19 2005
Relevant URL: http://www.securityfocus.com/bid/13266
Summary:
A local denial of service vulnerability affects the Linux kernel.
A local attacker may leverage this issue to cause an affected Linux
kernel to panic, effectively denying service to legitimate users.
19. Linux Kernel Fib_Seq_Start Local Denial of Service Vulnerabi...
BugTraq ID: 13267
Remote: No
Date Published: Apr 19 2005
Relevant URL: http://www.securityfocus.com/bid/13267
Summary:
A local denial of service vulnerability affects the Linux kernel.
A local attacker may leverage this issue to cause an affected Linux
kernel to panic, effectively denying service to legitimate users.
Although only the Linux kernel version 2.6.9 is reported vulnerable, it
is likely that other versions are vulnerable as well.
20. MPlayer RTSP Server Line Response Remote Buffer Overflow Vul...
BugTraq ID: 13270
Remote: Yes
Date Published: Apr 20 2005
Relevant URL: http://www.securityfocus.com/bid/13270
Summary:
A remote heap-based buffer overflow vulnerability affects MPlayer. This
issue is due to a failure of the application to properly validate the
length of user-supplied strings prior to copying them into static
process buffers.
An attacker may exploit this issue to execute arbitrary code with the
privileges of the user that activated the vulnerable application. This
may facilitate unauthorized access or privilege escalation.
21. MPlayer MMST Stream ID Remote Buffer Overflow Vulnerability
BugTraq ID: 13271
Remote: Yes
Date Published: Apr 20 2005
Relevant URL: http://www.securityfocus.com/bid/13271
Summary:
A remote heap-based buffer overflow vulnerability affects MPlayer. This
issue is due to a failure of the application to properly validate the
length of user-supplied strings prior to copying them into static
process buffers.
An attacker may exploit this issue to execute arbitrary code with the
privileges of the user that activated the vulnerable application. This
may facilitate unauthorized access or privilege escalation.
22. Logwatch Secure Script Denial Of Service Vulnerability
BugTraq ID: 13273
Remote: Yes
Date Published: Apr 20 2005
Relevant URL: http://www.securityfocus.com/bid/13273
Summary:
Logwatch is prone to a denial of vulnerability in the secure script.
This issue may be exploited by a local attacker who can inject a
malicious string into a log file, causing a denial of service condition. As
a result, the utility may not detect subsequent malicious activity.
23. Real Networks Helix Player Unspecified Vulnerability
BugTraq ID: 13280
Remote: Unknown
Date Published: Apr 20 2005
Relevant URL: http://www.securityfocus.com/bid/13280
Summary:
An unspecified vulnerability affects Real Networks Helix Player. The
cause of this issue is currently unknown.
The potential impact of this issue is currently unknown; this BID will
be updated as more information is released.
It should be noted that it is likely that this issue corresponds with
that reported in BID 13264 (RealNetworks RealPlayer Enterprise RAM File
Parsing Buffer Overflow Vulnerability). If it is confirmed that this
issue corresponds to the RealPlayer issue, this BID will be retired.
Note: This BID is being retired as it has been confirmed that this
issue affecting Helix Player is the same issue affecting RealPlayer as
reported in BID 13264 (RealNetworks RealPlayer Enterprise RAM File Parsing
Buffer Overflow Vulnerability).
24. PHProjekt Chatroom Text Submission HTML Injection Vulnerabil...
BugTraq ID: 13286
Remote: Yes
Date Published: Apr 20 2005
Relevant URL: http://www.securityfocus.com/bid/13286
Summary:
PHProjekt is prone to an HTML injection vulnerability in the Chatroom
text submission form. The application fails to sanitize user-supplied
input that is in turn displayed to all users of the chatroom.
An attacker may leverage this issue to have arbitrary script code
executed in the browser of an unsuspecting user. This may facilitate the
theft of cookie-based authentication credentials as well as other
attacks.
25. GNU GZip Filename Directory Traversal Vulnerability
BugTraq ID: 13290
Remote: Yes
Date Published: Apr 20 2005
Relevant URL: http://www.securityfocus.com/bid/13290
Summary:
gzip is prone to a directory traversal vulnerability. The issue
manifests when gunzip is invoked on a malicious archive using the '-N' switch.
An archive containing an absolute path for a filename that contains '/'
characters, results in the file getting written using the absolute path
contained in the filename.
A remote attacker may leverage this issue using a malicious archive to
corrupt arbitrary files with the privileges of the user that is running
the vulnerable software.
26. CPIO Filename Directory Traversal Vulnerability
BugTraq ID: 13291
Remote: Yes
Date Published: Apr 20 2005
Relevant URL: http://www.securityfocus.com/bid/13291
Summary:
cpio is prone to a directory traversal vulnerability. The issue
manifests when cpio is invoked on a malicious archive.
An archive containing an absolute path for a filename that contains '/'
characters, results in the file getting written using the absolute path
contained in the filename.
A remote attacker may leverage this issue using a malicious archive to
corrupt arbitrary files with the privileges of the user that is running
the vulnerable software.
27. KDE Kommander Unspecified Arbitrary Script Execution Vulnera...
BugTraq ID: 13313
Remote: Yes
Date Published: Apr 22 2005
Relevant URL: http://www.securityfocus.com/bid/13313
Summary:
KDE Kommander is prone to a vulnerability that could allow arbitrary
script code to be executed without user interaction. Such code would
execute in the security context of the user running Kommander.
This issue was reported to affect Quanta 3.1.x and KDE from 3.2 to
3.4.0.
28. PixySoft E-Cart Cat Parameter Remote Command Execution Vulne...
BugTraq ID: 13316
Remote: Yes
Date Published: Apr 22 2005
Relevant URL: http://www.securityfocus.com/bid/13316
Summary:
PixySoft E-Cart is prone to a remote arbitrary command execution
vulnerability. This issue presents itself due to insufficient sanitization
of user-supplied data.
Specifically, the user-specified 'cat' URI parameter is supplied to a
Perl open() routine.
PixySoft E-Cart versions 1.1 is reported vulnerable to this issue.
29. PixySoft E-Cart Art Parameter Remote Command Execution Vulne...
BugTraq ID: 13321
Remote: Yes
Date Published: Apr 22 2005
Relevant URL: http://www.securityfocus.com/bid/13321
Summary:
PixySoft E-Cart is prone to a remote arbitrary command execution
vulnerability. This issue presents itself due to insufficient sanitization
of user-supplied data.
Specifically, the user-specified 'art' URI parameter is supplied to a
Perl open() routine.
PixySoft E-Cart versions 1.1 is reported vulnerable to this issue.
III. LINUX FOCUS LIST SUMMARY
-----------------------------
1. Any way to automatically change arbitrary headers of... (Thread)
Relevant URL:
http://www.securityfocus.com/archive/91/396758
IV. NEW PRODUCTS FOR LINUX PLATFORMS
------------------------------------
1. CoreGuard Core Security System
By: Vormetric
Platforms: AIX, Linux, Solaris, Windows 2000, Windows XP
Relevant URL: http://www.vormetric.com/products/#overview
Summary:
CoreGuard System profile
The CoreGuard System is the industry's first solution that enforces
acceptable use policy for sensitive digital information assets and
protects personal data privacy across an enterprise IT environment.
CoreGuard's innovative architecture and completeness of technology
provide a comprehensive, extensible solution that tightly integrates
all
the elements required to protect information across a widespread,
heterogeneous enterprise network, while enforcing separation of duties
between security and IT administration. At the same time, CoreGuard is
transparent to users, applications and storage infrastructures for ease
of deployment and system management.
CoreGuard enables customers to:
* Protect customer personal data privacy and digital information assets
* Protect data at rest from unauthorized viewing by external attackers
and unauthorized insiders
* Enforce segregation of duties between IT administrators and security
administration
* Ensure host & application integrity * Block malicious code, including
zero-day exploits
2. EnCase Forensic Edition
By: Guidance Software Inc.
Platforms: DOS, FreeBSD, Linux, MacOS, NetBSD, OpenBSD, PalmOS,
Solaris, UNIX, Windows 2000, Windows 95/98, Windows NT, Windows XP
Relevant URL:
http://www.guidancesoftware.com/products/EnCaseForensic/index.shtm
Summary:
EnCase Forensic Edition Version 4 delivers the most advanced features
for computer forensics and investigations. With an intuitive GUI and
superior performance, EnCase Version 4 provides investigators with the
tools to conduct large-scale and complex investigations with accuracy and
efficiency. Guidance Software?s award winning solution yields
completely non-invasive computer forensic investigations while allowing
examiners to easily manage large volumes of computer evidence and view all
relevant files, including "deleted" files, file slack and unallocated
space.
The integrated functionality of EnCase allows the examiner to perform
all functions of the computer forensic investigation process. EnCase's
EnScript, a powerful macro-programming language and API included within
EnCase, allows investigators to build customized and reusable forensic
scripts.
3. KeyGhost SX
By: KeyGhost Ltd
Platforms: BeOS, DOS, Linux, OS/2, Solaris, SunOS, Windows 2000,
Windows 95/98, Windows NT, Windows XP
Relevant URL: http://www.keyghost.com/SX/
Summary:
KeyGhost SX discreetly captures and records all keystrokes typed,
including chat conversations, email, word processor, or even activity within
an accounting or specialist system. It is completely undetectable by
software scanners and provides you with one of the most powerful stealth
surveillance applications offered anywhere.
Because KeyGhost uses STRONG 128-Bit encryption to store the recorded
data in it?s own internal memory (not on the hard drive), it is
impossible for a network intruder to gain access to any sensitive data stored
within the device.
4. SafeKit
By: Evidian Inc.
Platforms: AIX, HP-UX, Linux, Solaris, Windows 2000
Relevant URL: http://www.evidian.com/safekit/index.htm
Summary:
Evidian's SafeKit technology makes it possible to render any
application available 24 hours per day. With no extra hardware: just use your
existing servers and install this software-only solution.
This provides ultimate scalability. As your needs grow, all you need to
do is add more standard servers into the cluster. With the load
balancing features of SafeKit, you can distribute applications over multiple
servers. If one system fails completely, the others will continue to
serve your users.
5. Astaro Linux Firewall
By: Astaro
Platforms: Linux
Relevant URL: http://www.astaro.com/php/statics.php?action=asl&lang=gb
Summary:
Astaro Linux Firewall: All-in-one firewall, virus protection, content
filtering and spam protection internet security software package for
Linux.
Free download for home users.
6. CAT Cellular Authentication Token and eAuthentication Servic...
By: Mega AS Consulting Ltd
Platforms: Java, Linux, OpenBSD, Os Independent, SecureBSD, Solaris,
UNIX, Windows 2000, Windows NT
Relevant URL: http://www.megaas.co.nz
Summary:
Low cost, easy to use Two Factor Authentication One Time Password token
using the Cellular. Does not use SMS or communication, manages multiple
OTP accounts - new technology. For any business that want a safer
access to its Internet Services. More information at our site.
We also provide eAuthentication service for businesses that will not
buy an Authentication product but would prefer to pay a monthly charge
for authentication services from our our CAT Server.
V. NEW TOOLS FOR LINUX PLATFORMS
--------------------------------
1. Umbrella v0.6
By: Umbrella
Relevant URL: http://umbrella.sourceforge.net/
Platforms: Linux
Summary:
Umbrella is a security mechanism that implements a combination of
Process-Based Access Control (PBAC) and authentication of binaries through
Digital Signed Binaries (DSB). The scheme is designed for Linux-based
consumer electronic devices ranging from mobile phones to settop boxes.
Umbrella is implemented on top of the Linux Security Modules (LSM)
framework. The PBAC scheme is enforced by a set of restrictions on each
process.
2. Kernel Socks Bouncer 2.6.11
By: Paolo Ardoino
Relevant URL: http://ksb.sourceforge.net/
Platforms: Linux
Summary:
Kernel Socks Bouncer is a Linux Kernel 2.6.x patch that redirects tcp
connections [SSH, telnet, browsers...] to follow through socks5. KSB26
uses a character device to pass socks5 and target ips to the Linux
Kernel.
3. NuFW 1.0.0
By: INL
Relevant URL: http://www.nufw.org
Platforms: Linux
Summary:
NuFW performs an authentication of every single connections passing
through the IP filter, by transparently requesting user's credentials
before any filtering decision is taken. Practically, this brings the notion
of user ID down to the IP layers.
4. ldaupenum 0.02alpha
By: Roni Bachar & Sol Zehnwirth
Relevant URL: https://sourceforge.net/projects/ldapenum
Platforms: Linux, Perl (any system supporting perl), Windows 2000,
Windows 95/98, Windows NT, Windows XP
Summary:
ldapenum is a perl script designed to enumerate system and password
information from domain controllers using the LDAP service when IPC$ is
locked. The script has been tested on windows and linux.
5. File System Saint 1.02a
By: Joshua Fritsch
Relevant URL: http://www.unixgeeks.org/saint
Platforms: Linux, UNIX
Summary:
A fast, flexible, lightweight perl-based host IDS.
6. Travesty 1.0
By: Robert Wesley McGrew
Relevant URL: http://cse.msstate.edu/~rwm8/travesty/
Platforms: Linux
Summary:
Travesty is an interactive program for managing the hardware addresses
(MAC) of ethernet devices on your computer. It supports manually
changing the MAC, generating random addresses, and applying different vendor
prefixes to the current address.
It also allows the user to import their own lists of hardware
addresses and descriptions that can be navigated from within the Travesty
interface. Travesty is written in Python, and is very simple to add
functionality to, or modify.
VI. UNSUBSCRIBE INSTRUCTIONS
----------------------------
To unsubscribe send an e-mail message to
linux-secnews-unsubscribe@securityfocus.com from the subscribed
address. The contents of the subject or message body do not matter. You will
receive a confirmation request message to which you will have to answer.
Alternatively you can also visit
http://www.securityfocus.com/newsletters and unsubscribe via the
website.
If your email address has changed email listadmin@securityfocus.com and
ask to be manually removed.
VII. SPONSOR INFORMATION
-----------------------
This Issue is Sponsored By: CanSecWest/core05
It won't affect you unless you run Linux, OSX, some BSDs, or Windows...
Can/SecWest/core05 - Vancouver, Canada - May 4-6 2005
World Security Pros. Cutting Edge Training, Tools, and Techniques
Security Masters Dojo May 3/4 2005
http://www.securityfocus.com/sponsor/CanSecWest_sf-news_050427
------------------------------------------------------------------------
Need to know what's happening on YOUR network? Symantec DeepSight
Analyzer
is a free service that gives you the ability to track and manage
attacks.
Analyzer automatically correlates attacks from various Firewall and
network
based Intrusion Detection Systems, giving you a comprehensive view of
your
computer or general network. Sign up today!
http://www.securityfocus.com/sponsor/Symantec_sf-news_041130
------------------------------------------------------------------------