Date: | Tue, 10 Jan 2006 16:44:31 -0700 |
From: | "Peter Laborge" <plaborge@securityfocus.com>
| To: | linux-secnews@securityfocus.com |
Subject: | SecurityFocus Linux Newsletter #268 |
SecurityFocus Linux Newsletter #268
----------------------------------------
This Issue is Sponsored By: SpiDynamics
ALERT: Learn to Think Like a Hacker- Simulate a Hacker Breaking into
Your Web Apps
The speed with which Web Applications are developed make them prime
targets for attackers, often these applications were developed so quickly
that they are not coded properly or subjected to any security testing.
Hackers know this and use it as their weapon. Download this *FREE* test
guide from SPI Dynamics to check for Web application vulnerabilities.
https://download.spidynamics.com/1/ad/web.asp?Campaign_ID=701300000003P6V
------------------------------------------------------------------
I. FRONT AND CENTER
1. Zero-day holiday
II. LINUX VULNERABILITY SUMMARY
1. MTink Home Environment Variable Buffer Overflow Vulnerability
2. Drupal URL-Encoded Input HTML Injection Vulnerability
3. File::ExtAttr Extended File Attribute Off-By-One Buffer
Overflow Vulnerability
4. Gentoo Pinentry Local Privilege Escalation Vulnerability
5. Linux Kernel SET_MEMPOLICY Local Denial of Service
Vulnerability
6. Linux Kernel FIB_LOOKUP Denial of Service Vulnerability
7. Linux Kernel Sysctl_String Local Buffer Overflow
Vulnerability
8. Linux Kernel DVB Driver Local Buffer Overflow Vulnerability
9. KPdf and KWord Multiple Unspecified Buffer and Integer
Overflow Vulnerabilities
10. HylaFAX Remote PAM Authentication Bypass Vulnerability
11. Hylafax Multiple Scripts Remote Command Execution
Vulnerability
12. Apache mod_auth_pgsql Multiple Format String Vulnerabilities
III. LINUX FOCUS LIST SUMMARY
1. Hide internal address (Postfix)
2. IPS project - wanted translators
IV. UNSUBSCRIBE INSTRUCTIONS
V. SPONSOR INFORMATION
I. FRONT AND CENTER
---------------------
1. Zero-day holiday
By Kelly Martin
A few hundred million Windows XP machines lay vulnerable on the Web
today, a week after a zero-day exploit was discovered. Meanwhile, new
approaches and ideas from the academic world - that focus exclusively on
childen - may give us hope for the future after all.
http://www.securityfocus.com/columnists/377
II. LINUX VULNERABILITY SUMMARY
------------------------------------
1. MTink Home Environment Variable Buffer Overflow Vulnerability
BugTraq ID: 16095
Remote: No
Date Published: 2005-12-31
Relevant URL: http://www.securityfocus.com/bid/16095
Summary:
A buffer overflow vulnerability affects MTink. This vulnerability may
permit local attackers to execute arbitrary code with superuser
privileges.
2. Drupal URL-Encoded Input HTML Injection Vulnerability
BugTraq ID: 16117
Remote: Yes
Date Published: 2006-01-01
Relevant URL: http://www.securityfocus.com/bid/16117
Summary:
Drupal is prone to an HTML injection vulnerability when handling
URL-encoded HTML and script code in message content. This issue is due to a
failure in the application to properly sanitize user-supplied input
before using it in dynamically generated content.
Attacker-supplied HTML and script code would be executed in the context
of the affected Web site, potentially allowing for theft of
cookie-based authentication credentials. An attacker could also exploit this issue
to control how the site is rendered to the user; other attacks are also
possible.
3. File::ExtAttr Extended File Attribute Off-By-One Buffer Overflow
Vulnerability
BugTraq ID: 16118
Remote: No
Date Published: 2006-01-02
Relevant URL: http://www.securityfocus.com/bid/16118
Summary:
File::ExtAttr is prone to an off-by-one buffer overflow vulnerability.
This issue may occur when the module is used to read extended file
attributes of untrusted files.
Exploitation of the issue could potentially result in a denial of
service in the module or may allow for execution of arbitrary code.
4. Gentoo Pinentry Local Privilege Escalation Vulnerability
BugTraq ID: 16120
Remote: No
Date Published: 2006-01-03
Relevant URL: http://www.securityfocus.com/bid/16120
Summary:
pinentry is prone to a local privilege escalation vulnerability.
Successful exploitation can allow a pinentry user to read or write
arbitrary files with the privileges of group ID 0.
5. Linux Kernel SET_MEMPOLICY Local Denial of Service Vulnerability
BugTraq ID: 16135
Remote: No
Date Published: 2006-01-04
Relevant URL: http://www.securityfocus.com/bid/16135
Summary:
Linux kernel is prone to a local denial of service vulnerability.
This issue affects the 'set_mempolicy' function of the 'mm/mempolicy.c'
file.
Successful exploitation causes the kernel to crash, leading to a denial
of service condition.
6. Linux Kernel FIB_LOOKUP Denial of Service Vulnerability
BugTraq ID: 16139
Remote: Yes
Date Published: 2006-01-04
Relevant URL: http://www.securityfocus.com/bid/16139
Summary:
Linux kernel is prone to a denial of service vulnerability.
This issue arises when the kernel handles specially crafted fib_lookup
netlink messages.
Successful exploitation may allow remote attackers to trigger a denial
of service condition. Local exploitation may be possible as well.
7. Linux Kernel Sysctl_String Local Buffer Overflow Vulnerability
BugTraq ID: 16141
Remote: No
Date Published: 2006-01-04
Relevant URL: http://www.securityfocus.com/bid/16141
Summary:
Linux kernel is prone to a local buffer overflow vulnerability. This
issue is due to an off-by-one error in the sysctl subsystem.
A successful attack may result in a denial of service condition or
possibly arbitrary code execution in the context of the local kernel.
Linux kernel versions prior to 2.6.15 in the 2.6 series are considered
vulnerable to this issue.
8. Linux Kernel DVB Driver Local Buffer Overflow Vulnerability
BugTraq ID: 16142
Remote: No
Date Published: 2006-01-04
Relevant URL: http://www.securityfocus.com/bid/16142
Summary:
Linux kernel is prone to a local buffer overflow vulnerability. This
issue is due to a flaw in the DVB (Digital Video Broadcasting) driver
subsystem. This issue is only exploitable on computers with the affected
DVB module compiled, enabled, and accessible to local malicious users.
A successful attack may result in a denial of service condition or
possibly arbitrary code execution in the context of the local kernel.
Linux kernel versions prior to 2.6.15 in the 2.6 series are considered
vulnerable to this issue.
9. KPdf and KWord Multiple Unspecified Buffer and Integer Overflow
Vulnerabilities
BugTraq ID: 16143
Remote: Yes
Date Published: 2006-01-05
Relevant URL: http://www.securityfocus.com/bid/16143
Summary:
KPdf and KWord are prone to multiple buffer and integer overflows.
Successful exploitation could result in arbitrary code execution in the
context of the user running the vulnerable application.
Specific details of these issues are not currently available. This
record will be updated when more information becomes available.
kdegraphics and KPdf versions 3.4.3 and earlier and KOffice and KWord
versions 1.4.2 and earlier are vulnerable.
10. HylaFAX Remote PAM Authentication Bypass Vulnerability
BugTraq ID: 16150
Remote: Yes
Date Published: 2006-01-05
Relevant URL: http://www.securityfocus.com/bid/16150
Summary:
The HylaFAX daemon is reported prone to a vulnerability that could
allow unauthorized access to the HylaFAX service. It is reported that the
issue presents itself due to a flaw in its PAM (Pluggable Authentication
Modules) usage.
A remote attacker may exploit this vulnerability to gain unauthorized
access to the affected service.
11. Hylafax Multiple Scripts Remote Command Execution Vulnerability
BugTraq ID: 16151
Remote: Yes
Date Published: 2006-01-05
Relevant URL: http://www.securityfocus.com/bid/16151
Summary:
Hylafax is vulnerable to multiple arbitrary command execution
vulnerabilities. This issue is due to a failure in the application to properly
sanitize user-supplied input.
These vulnerabilities allow an attacker to execute arbitrary commands
in the context of the affected application. Successful exploitation may
facilitate a compromise of the underlying system.
12. Apache mod_auth_pgsql Multiple Format String Vulnerabilities
BugTraq ID: 16153
Remote: Yes
Date Published: 2006-01-06
Relevant URL: http://www.securityfocus.com/bid/16153
Summary:
mod_auth_pgsql is prone to multiple format string vulnerabilities.
These issues are due to a failure of the application to properly sanitize
user-supplied input prior to including it in the format-specification
argument of formatted printing functions.
These issues could allow remote attackers to execute arbitrary code in
the context of the Web server user and gain unauthorized access.
III. LINUX FOCUS LIST SUMMARY
---------------------------------
1. Hide internal address (Postfix)
http://www.securityfocus.com/archive/91/421374
2. IPS project - wanted translators
http://www.securityfocus.com/archive/91/421243
V. SPONSOR INFORMATION
------------------------
This Issue is Sponsored By: SpiDynamics
ALERT: Learn to Think Like a Hacker- Simulate a Hacker Breaking into
Your Web Apps
The speed with which Web Applications are developed make them prime
targets for attackers, often these applications were developed so quickly
that they are not coded properly or subjected to any security testing.
Hackers know this and use it as their weapon. Download this *FREE* test
guide from SPI Dynamics to check for Web application vulnerabilities.
https://download.spidynamics.com/1/ad/web.asp?Campaign_ID=701300000003P6V