Date: | 25 May 2005 15:38:22 -0000 |
From: | "Peter Laborge" <plaborge@securityfocus.com>
| To: | linux-secnews@securityfocus.com |
Subject: | SecurityFocus Linux Newsletter #237 |
SecurityFocus Linux Newsletter #237
------------------------------------
Need to know what's happening on YOUR network? Symantec DeepSight
Analyzer
is a free service that gives you the ability to track and manage
attacks.
Analyzer automatically correlates attacks from various Firewall and
network
based Intrusion Detection Systems, giving you a comprehensive view of
your
computer or general network. Sign up today!
http://www.securityfocus.com/sponsor/Symantec_sf-news_041130
------------------------------------------------------------------------
I. FRONT AND CENTER
1. Is Deleting Spyware A Crime?
2. Chrooted Snort on Solaris
3. Sit Back and React
II. LINUX VULNERABILITY SUMMARY
1. PServ Symbolic Link Information Disclosure Vulnerability
2. PostNuke Blocks Module Directory Traversal Vulnerability
3. PServ Remote Source Code Disclosure Vulnerability
4. Mozilla Suite And Firefox Multiple Script Manager Security B...
5. Pserv Directory Traversal Vulnerability
6. Mozilla Suite And Firefox DOM Property Overrides Code Execut...
7. Pserv completedPath Remote Buffer Overflow Vulnerability
8. Multiple Linux Kernel IOCTL Handlers Local Memory Corruption...
9. bzip2 Remote Denial of Service Vulnerability
10. MySQL mysql_install_db Insecure Temporary File Creation
Vuln...
11. Cheetah Local Privilege Escalation Vulnerability
12. Linux Kernel 64 Bit EXT3 Filesystem Extended Attribute
Denia...
13. PPXP Local Privilege Escalation Vulnerability
14. NetWin SurgeMail Multiple Unspecified Input Validation
Vulne...
15. GDB Multiple Vulnerabilities
16. Gedit Filename Format String Vulnerability
17. ImageMagick And GraphicsMagick XWD Decoder Denial Of
Service...
III. LINUX FOCUS LIST SUMMARY
1. Secure Kickstart Installation (Thread)
2. Bind cache availability... (Thread)
IV. NEW PRODUCTS FOR LINUX PLATFORMS
1. CoreGuard Core Security System
2. EnCase Forensic Edition
3. KeyGhost SX
4. SafeKit
5. Astaro Linux Firewall
6. CAT Cellular Authentication Token and eAuthentication Servic...
V. NEW TOOLS FOR LINUX PLATFORMS
1. webcvtsa 0.0.8
2. Umbrella v0.6
3. Kernel Socks Bouncer 2.6.11
4. NuFW 1.0.0
5. ldaupenum 0.02alpha
6. File System Saint 1.02a
VII. SPONSOR INFORMATION
I. FRONT AND CENTER
-------------------
1. Is Deleting Spyware A Crime?
By Mark Rasch
The murky waters that sustain the spyware companies may have a few
unpleasant surprises just beneath the surface.
http://www.securityfocus.com/columnists/329
2. Chrooted Snort on Solaris
By Andre Lue-Fook-Sang
This article discussed installation and configuration of a chrooted
Snort
IDS on most versions of Solaris.
http://www.securityfocus.com/infocus/1833
3. Sit Back and React
By Daniel Hanson
As the security industry moves more mainstream, it's becoming stagnant
due
to a lack of vision. Who will lead the charge?
http://www.securityfocus.com/columnists/328
II. LINUX VULNERABILITY SUMMARY
-------------------------------
1. PServ Symbolic Link Information Disclosure Vulnerability
BugTraq ID: 13634
Remote: No
Date Published: May 16 2005
Relevant URL: http://www.securityfocus.com/bid/13634
Summary:
pServ is prone to an information disclosure vulnerability through
symbolic link files. This occurs because the application will follow
symbolic links to files outside the Web root.
This issue was reported to affect pServ 3.2 and 3.3; other versions are
likely vulnerable.
2. PostNuke Blocks Module Directory Traversal Vulnerability
BugTraq ID: 13636
Remote: Yes
Date Published: May 16 2005
Relevant URL: http://www.securityfocus.com/bid/13636
Summary:
PostNuke Blocks module is affected by a directory traversal
vulnerability.
The problem presents itself when an attacker passes a name for a target
file, along with directory traversal sequences, to the affected
application.
An attacker may leverage this issue to disclose arbitrary files on an
affected computer. It was also reported that an attacker can supply
NULL bytes with a target file name. This may aid in other attacks such as
crashing the server.
3. PServ Remote Source Code Disclosure Vulnerability
BugTraq ID: 13638
Remote: Yes
Date Published: May 16 2005
Relevant URL: http://www.securityfocus.com/bid/13638
Summary:
pServ is affected by a remote source code disclosure vulnerability.
When handling a specially-crafted URI request, the application
discloses the source code of scripts in the 'cgi-bin' directory.
Information gathered through this attack could be used to launch
further attacks against a system.
4. Mozilla Suite And Firefox Multiple Script Manager Security B...
BugTraq ID: 13641
Remote: Yes
Date Published: May 16 2005
Relevant URL: http://www.securityfocus.com/bid/13641
Summary:
Multiple issues exist in Mozilla Suite and Firefox. These issues allow
attackers to bypass security checks in the script security manager.
Security checks in the script security manager are designed to prevent
script injection vulnerabilities.
An attacker sending certain undisclosed JavaScript in 'view-source:',
and 'jar:' pseudo protocol URIs, may bypass these security checks.
An undisclosed, nested URI, as well as a variant of BID 13216 are
reportedly also able to bypass security checks.
These vulnerabilities allow remote attackers to execute script code
with elevated privileges, leading to the installation and execution of
malicious applications on an affected computer. Cross-site scripting, and
other attacks are also likely possible.
The vendor has not provided enough information to determine how many
specific instances of the issue were addressed, and has not clarified
whether or not they have addressed a single general vulnerability or
multiple specific vulnerabilities. This BID may be split into its separate
issues as further information is disclosed.
Further details are scheduled to be released in the future. This BID
will be updated at that time.
5. Pserv Directory Traversal Vulnerability
BugTraq ID: 13642
Remote: Yes
Date Published: May 16 2005
Relevant URL: http://www.securityfocus.com/bid/13642
Summary:
pServ is prone to a directory traversal vulnerability. This occurs
because the application does not implement a proper method for filtering
directory traversal sequences from URIs. Since this can be done from
the cgi-bin directory, it is possible to execute commands to which the
Web server has permission.
This issue was reported to affect pServ version 3.2; earlier versions
are like vulnerable.
6. Mozilla Suite And Firefox DOM Property Overrides Code Execut...
BugTraq ID: 13645
Remote: Yes
Date Published: May 16 2005
Relevant URL: http://www.securityfocus.com/bid/13645
Summary:
Mozilla Suite and Mozilla Firefox are affected by a code execution
vulnerability. This issue is due to a failure in the application to
properly verify Document Object Model (DOM) property values.
An attacker may leverage this issue to execute arbitrary code with the
privileges of the user that activated the vulnerable Web browser,
ultimately facilitating a compromise of the affected computer.
This issue is reportedly a variant of BID 13233. Further details are
scheduled to be released in the future, and this BID will be updated
accordingly.
7. Pserv completedPath Remote Buffer Overflow Vulnerability
BugTraq ID: 13648
Remote: Yes
Date Published: May 16 2005
Relevant URL: http://www.securityfocus.com/bid/13648
Summary:
pServ is prone to a remotely exploitable buffer overflow vulnerability.
The issue occurs because proper boundary checks are not performed
allowing an internal buffer to be overrun. This vulnerability could
potentially be exploited to execute arbitrary code in the context of the Web
server.
This issue was fixed in pServ 3.3; earlier versions are likely
vulnerable.
8. Multiple Linux Kernel IOCTL Handlers Local Memory Corruption...
BugTraq ID: 13651
Remote: No
Date Published: May 17 2005
Relevant URL: http://www.securityfocus.com/bid/13651
Summary:
The Linux kernel raw device and pktcdvd block device ioctl handlers are
reported prone to local kernel-based memory corruption vulnerabilities.
The issues manifest due to a lack of sanity checks performed on
argument values that are passed to the 'raw_ioctl()' and 'pkt_ioctl()'
functions.
A local attacker, that has read access to a sufficient block device,
may leverage this memory corruption to execute arbitrary
attacker-supplied code in the context of the system kernel (ring-0).
9. bzip2 Remote Denial of Service Vulnerability
BugTraq ID: 13657
Remote: Yes
Date Published: May 17 2005
Relevant URL: http://www.securityfocus.com/bid/13657
Summary:
bzip2 is prone to a remote denial of service vulnerability. This issue
arises when the application processes malformed archives.
A successful attack can result in resource exhaustion and trigger a
denial of service condition.
bzip2 version 1.0.2 is reportedly affected by this issue. Other
version are likely vulnerable as well.
10. MySQL mysql_install_db Insecure Temporary File Creation Vuln...
BugTraq ID: 13660
Remote: No
Date Published: May 17 2005
Relevant URL: http://www.securityfocus.com/bid/13660
Summary:
MySQL is reportedly affected by a vulnerability that can allow local
attackers to gain unauthorized access to the database or gain elevated
privileges. This issue results from a design error due to the creation
of temporary files in an insecure manner.
The vulnerability affects the 'mysql_install_db' script.
Due to the nature of the script it may be possible to create database
accounts or gain elevated privileges.
MySQL versions prior to 4.0.12 and MySQL 5.x releases 5.0.4 and prior
versions are reported to be affected.
11. Cheetah Local Privilege Escalation Vulnerability
BugTraq ID: 13662
Remote: No
Date Published: May 17 2005
Relevant URL: http://www.securityfocus.com/bid/13662
Summary:
Cheetah is prone to a local privilege escalation vulnerability.
The issue arises because the application imports modules from the
'/tmp' directory before searching for the path from the 'PYTHONPATH'
variable.
This can result in arbitrary code execution granting elevated
privileges to an attacker.
Cheetah versions prior to 0.9.17-rc1 are affected by this issue.
12. Linux Kernel 64 Bit EXT3 Filesystem Extended Attribute Denia...
BugTraq ID: 13680
Remote: No
Date Published: May 19 2005
Relevant URL: http://www.securityfocus.com/bid/13680
Summary:
The Linux Kernel is prone to a local denial of service vulnerability.
Reports indicate the issue manifests on 64-bit platforms and is because
of a flaw present in offset handling for the extended attribute file
system code.
A local attacker may trigger this issue to crash the system kernel.
13. PPXP Local Privilege Escalation Vulnerability
BugTraq ID: 13681
Remote: No
Date Published: May 19 2005
Relevant URL: http://www.securityfocus.com/bid/13681
Summary:
ppxp is prone to a local privilege escalation vulnerability. An
attacker may abuse the issue to open a shell with superuser privileges.
14. NetWin SurgeMail Multiple Unspecified Input Validation Vulne...
BugTraq ID: 13689
Remote: Yes
Date Published: May 19 2005
Relevant URL: http://www.securityfocus.com/bid/13689
Summary:
Multiple unspecified vulnerabilities affect SurgeMail. Reportedly,
these issues are due to a failure of the application to properly sanitize
user-supplied input prior to employing it in critical locations
including dynamic content. A successful attack may allow attackers to execute
arbitrary HTML and script code in a user's browser.
SurgeMail 3.0c2 is reported to be affected by these issues. Other
versions may be vulnerable as well.
Due to a lack of details, further information cannot be provided at the
moment. This BID will be updated when more details are available.
15. GDB Multiple Vulnerabilities
BugTraq ID: 13697
Remote: Yes
Date Published: May 20 2005
Relevant URL: http://www.securityfocus.com/bid/13697
Summary:
GDB is reportedly affected by multiple vulnerabilities. These issues
can allow an attacker to execute arbitrary code and commands on an
affected computer. A successful attack may result in the attacker gaining
elevated privileges or unauthorized access.
The following specific issues were identified:
The application is affected by a remote heap overflow vulnerability
when loading malformed object files.
Another vulnerability affecting the application may allow local
attackers to gain elevated privileges.
GDB 6.3 is reportedly affected by these issues. Other versions are
likely vulnerable as well.
16. Gedit Filename Format String Vulnerability
BugTraq ID: 13699
Remote: Yes
Date Published: May 30 2005
Relevant URL: http://www.securityfocus.com/bid/13699
Summary:
gEdit is prone to a format string vulnerability. Exploitation may
occur when the program is invoked with a filename that includes malicious
format specifiers. This issue could be exploited to corrupt arbitrary
regions of memory with attacker-supplied data, potentially resulting in
execution of arbitrary code in the context of the user running the
program.
17. ImageMagick And GraphicsMagick XWD Decoder Denial Of Service...
BugTraq ID: 13705
Remote: Yes
Date Published: May 21 2005
Relevant URL: http://www.securityfocus.com/bid/13705
Summary:
A remote, client-side denial of service vulnerability affects
ImageMagick and GraphicsMagick. This issue is due to a failure of the
application to handle malformed XWD image files.
A remote attacker may leverage this issue to cause the affected
application to enter into an infinite loop condition, consuming CPU resources
on the affected computer, denying service to legitimate users.
III. LINUX FOCUS LIST SUMMARY
-----------------------------
1. Secure Kickstart Installation (Thread)
Relevant URL:
http://www.securityfocus.com/archive/91/398817
2. Bind cache availability... (Thread)
Relevant URL:
http://www.securityfocus.com/archive/91/398739
IV. NEW PRODUCTS FOR LINUX PLATFORMS
------------------------------------
1. CoreGuard Core Security System
By: Vormetric
Platforms: AIX, Linux, Solaris, Windows 2000, Windows XP
Relevant URL: http://www.vormetric.com/products/#overview
Summary:
CoreGuard System profile
The CoreGuard System is the industry's first solution that enforces
acceptable use policy for sensitive digital information assets and
protects personal data privacy across an enterprise IT environment.
CoreGuard's innovative architecture and completeness of technology
provide a comprehensive, extensible solution that tightly integrates
all
the elements required to protect information across a widespread,
heterogeneous enterprise network, while enforcing separation of duties
between security and IT administration. At the same time, CoreGuard is
transparent to users, applications and storage infrastructures for ease
of deployment and system management.
CoreGuard enables customers to:
* Protect customer personal data privacy and digital information assets
* Protect data at rest from unauthorized viewing by external attackers
and unauthorized insiders
* Enforce segregation of duties between IT administrators and security
administration
* Ensure host & application integrity * Block malicious code, including
zero-day exploits
2. EnCase Forensic Edition
By: Guidance Software Inc.
Platforms: DOS, FreeBSD, Linux, MacOS, NetBSD, OpenBSD, PalmOS,
Solaris, UNIX, Windows 2000, Windows 95/98, Windows NT, Windows XP
Relevant URL:
http://www.guidancesoftware.com/products/EnCaseForensic/index.shtm
Summary:
EnCase Forensic Edition Version 4 delivers the most advanced features
for computer forensics and investigations. With an intuitive GUI and
superior performance, EnCase Version 4 provides investigators with the
tools to conduct large-scale and complex investigations with accuracy and
efficiency. Guidance Software?s award winning solution yields
completely non-invasive computer forensic investigations while allowing
examiners to easily manage large volumes of computer evidence and view all
relevant files, including "deleted" files, file slack and unallocated
space.
The integrated functionality of EnCase allows the examiner to perform
all functions of the computer forensic investigation process. EnCase's
EnScript, a powerful macro-programming language and API included within
EnCase, allows investigators to build customized and reusable forensic
scripts.
3. KeyGhost SX
By: KeyGhost Ltd
Platforms: BeOS, DOS, Linux, OS/2, Solaris, SunOS, Windows 2000,
Windows 95/98, Windows NT, Windows XP
Relevant URL: http://www.keyghost.com/SX/
Summary:
KeyGhost SX discreetly captures and records all keystrokes typed,
including chat conversations, email, word processor, or even activity within
an accounting or specialist system. It is completely undetectable by
software scanners and provides you with one of the most powerful stealth
surveillance applications offered anywhere.
Because KeyGhost uses STRONG 128-Bit encryption to store the recorded
data in it?s own internal memory (not on the hard drive), it is
impossible for a network intruder to gain access to any sensitive data stored
within the device.
4. SafeKit
By: Evidian Inc.
Platforms: AIX, HP-UX, Linux, Solaris, Windows 2000
Relevant URL: http://www.evidian.com/safekit/index.htm
Summary:
Evidian's SafeKit technology makes it possible to render any
application available 24 hours per day. With no extra hardware: just use your
existing servers and install this software-only solution.
This provides ultimate scalability. As your needs grow, all you need to
do is add more standard servers into the cluster. With the load
balancing features of SafeKit, you can distribute applications over multiple
servers. If one system fails completely, the others will continue to
serve your users.
5. Astaro Linux Firewall
By: Astaro
Platforms: Linux
Relevant URL: http://www.astaro.com/php/statics.php?action=asl&lang=gb
Summary:
Astaro Linux Firewall: All-in-one firewall, virus protection, content
filtering and spam protection internet security software package for
Linux.
Free download for home users.
6. CAT Cellular Authentication Token and eAuthentication Servic...
By: Mega AS Consulting Ltd
Platforms: Java, Linux, OpenBSD, Os Independent, SecureBSD, Solaris,
UNIX, Windows 2000, Windows NT
Relevant URL: http://www.megaas.co.nz
Summary:
Low cost, easy to use Two Factor Authentication One Time Password token
using the Cellular. Does not use SMS or communication, manages multiple
OTP accounts - new technology. For any business that want a safer
access to its Internet Services. More information at our site.
We also provide eAuthentication service for businesses that will not
buy an Authentication product but would prefer to pay a monthly charge
for authentication services from our our CAT Server.
V. NEW TOOLS FOR LINUX PLATFORMS
--------------------------------
1. webcvtsa 0.0.8
By: Paolo Ardoino
Relevant URL:
http://cvtsa.sourceforge.net/http://cvtsa.sourceforge.net/
Platforms: Linux
Summary:
WEBCVTSA is a tool that allows users to administrate their computers
[running GNU/Linux] using a form on a web page to post commands.
2. Umbrella v0.6
By: Umbrella
Relevant URL: http://umbrella.sourceforge.net/
Platforms: Linux
Summary:
Umbrella is a security mechanism that implements a combination of
Process-Based Access Control (PBAC) and authentication of binaries through
Digital Signed Binaries (DSB). The scheme is designed for Linux-based
consumer electronic devices ranging from mobile phones to settop boxes.
Umbrella is implemented on top of the Linux Security Modules (LSM)
framework. The PBAC scheme is enforced by a set of restrictions on each
process.
3. Kernel Socks Bouncer 2.6.11
By: Paolo Ardoino
Relevant URL: http://ksb.sourceforge.net/
Platforms: Linux
Summary:
Kernel Socks Bouncer is a Linux Kernel 2.6.x patch that redirects tcp
connections [SSH, telnet, browsers...] to follow through socks5. KSB26
uses a character device to pass socks5 and target ips to the Linux
Kernel.
4. NuFW 1.0.0
By: INL
Relevant URL: http://www.nufw.org
Platforms: Linux
Summary:
NuFW performs an authentication of every single connections passing
through the IP filter, by transparently requesting user's credentials
before any filtering decision is taken. Practically, this brings the notion
of user ID down to the IP layers.
5. ldaupenum 0.02alpha
By: Roni Bachar & Sol Zehnwirth
Relevant URL: https://sourceforge.net/projects/ldapenum
Platforms: Linux, Perl (any system supporting perl), Windows 2000,
Windows 95/98, Windows NT, Windows XP
Summary:
ldapenum is a perl script designed to enumerate system and password
information from domain controllers using the LDAP service when IPC$ is
locked. The script has been tested on windows and linux.
6. File System Saint 1.02a
By: Joshua Fritsch
Relevant URL: http://www.unixgeeks.org/saint
Platforms: Linux, UNIX
Summary:
A fast, flexible, lightweight perl-based host IDS.
VII. SPONSOR INFORMATION
-----------------------
Need to know what's happening on YOUR network? Symantec DeepSight
Analyzer
is a free service that gives you the ability to track and manage
attacks.
Analyzer automatically correlates attacks from various Firewall and
network
based Intrusion Detection Systems, giving you a comprehensive view of
your
computer or general network. Sign up today!
http://www.securityfocus.com/sponsor/Symantec_sf-news_041130
------------------------------------------------------------------------