Date: | Tue, 07 Feb 2006 17:06:48 -0700 |
From: | "Peter Laborge" <plaborge@securityfocus.com>
| To: | linux-secnews@securityfocus.com |
Subject: | SecurityFocus Linux Newsletter #272 |
SecurityFocus Linux Newsletter #272
----------------------------------------
This Issue is Sponsored By: 8e6 Technologies
Stop Spyware Now - Free White Paper!
Spyware remains a problem for most companies, disrupting productivity,
wasting time and money. Now 8e6 Technologies' free White Paper proposes
breakthrough solutions to counteract the Spyware problem: recognize
potential infections, stop unauthorized programs at the source. Get the
Free White Paper.
http://a.gklmedia.com/sfln/nl/110
------------------------------------------------------------------
I. FRONT AND CENTER
1. Malicious Malware: attacking the attackers, part 2
2. Nmap 4.00 with Fyodor
II. LINUX VULNERABILITY SUMMARY
1. Communigate Pro Server LDAP Denial of Service Vulnerability
2. Linux Kernel Multiple Security Vulnerabilities
3. Pioneers Chat Buffer Denial Of Service Vulnerability
4. MyDNS DNS Query Denial Of Service Vulnerability
5. Mail-Audit Insecure Temporary File Creation Vulnerability
6. Fcron Convert-FCronTab Local Buffer Overflow Vulnerability
7. Multiple Mozilla Products Memory Corruption/Code
Injection/Access Restriction Bypass Vulnerabilities
III. LINUX FOCUS LIST SUMMARY
V. SPONSOR INFORMATION
I. FRONT AND CENTER
---------------------
1. Malicious Malware: attacking the attackers, part 2
By Thorsten Holz, Frederic Raynal
This article explores measures to attack those malicious attackers who
seek to harm our legitimate systems. The proactive use of exploits and
bot networks that fight other bot networks, along with social
engineering and attacker techniques are all discussed in an ethical manner. Part
two of two.
http://www.securityfocus.com/infocus/1857
2. Nmap 4.00 with Fyodor
By Federico Biancuzzi
After more than eight years since its first release in Phrack magazine,
Fyodor has announced Nmap 4.00. Curious as usual, Federico Biancuzzi
interviewed Fyodor on behalf of SecurityFocus to discuss the new port
scanning engine, version detection improvements, and the new stack
fingerprinting algorithm under work by the community.
http://www.securityfocus.com/columnists/384
II. LINUX VULNERABILITY SUMMARY
------------------------------------
1. Communigate Pro Server LDAP Denial of Service Vulnerability
BugTraq ID: 16407
Remote: Yes
Date Published: 2006-01-28
Relevant URL: http://www.securityfocus.com/bid/16407
Summary:
CommuniGate Pro Server is prone to a remote denial-of-service
vulnerability with a potential for arbitrary code execution. This issue
reportedly resides in the LDAP component of the application.
CommuniGate Pro Server 5.0.6 is vulnerable; earlier versions may also
be affected.
2. Linux Kernel Multiple Security Vulnerabilities
BugTraq ID: 16414
Remote: Yes
Date Published: 2006-01-30
Relevant URL: http://www.securityfocus.com/bid/16414
Summary:
Linux kernel is prone to multiple vulnerabilities. These issues can
allow local and remote attackers to trigger denial-of-service conditions
or to corrupt memory to potentially execute arbitrary code.
These issues affect kernel versions 2.6.15 and prior.
3. Pioneers Chat Buffer Denial Of Service Vulnerability
BugTraq ID: 16429
Remote: Yes
Date Published: 2006-01-30
Relevant URL: http://www.securityfocus.com/bid/16429
Summary:
Pioneers is prone to a remote denial-of-service vulnerability. This
issue is due to a failure in the application to handle exceptional
conditions.
An attacker can exploit this issue to crash the affected Pioneers
server and possibly clients connected to a vulnerable Pioneers server.
This issue is reported to affect version 0.9.40; other versions may
also be vulnerable.
4. MyDNS DNS Query Denial Of Service Vulnerability
BugTraq ID: 16431
Remote: Yes
Date Published: 2006-01-30
Relevant URL: http://www.securityfocus.com/bid/16431
Summary:
MyDNS is prone to a remote denial-of-service vulnerability. This issue
is due to a failure in the application to properly handle DNS queries.
An attacker can exploit this issue to crash the affected service,
effectively denying service to legitimate users.
The vendor has addressed this issue in version 1.1.0; earlier versions
are reportedly vulnerable.
5. Mail-Audit Insecure Temporary File Creation Vulnerability
BugTraq ID: 16434
Remote: No
Date Published: 2006-01-31
Relevant URL: http://www.securityfocus.com/bid/16434
Summary:
Mail-Audit creates temporary files in an insecure manner. This issue
arises only when logging has been enabled.
Exploitation would most likely result in loss of data or a denial of
service if critical files are overwritten in the attack. Other attacks
may be possible as well.
Mail-Audit 2.1 and prior versions are considered vulnerable.
6. Fcron Convert-FCronTab Local Buffer Overflow Vulnerability
BugTraq ID: 16467
Remote: No
Date Published: 2006-02-01
Relevant URL: http://www.securityfocus.com/bid/16467
Summary:
Fcron is susceptible to a local buffer-overflow vulnerability. This
issue is due to the application's failure to properly bounds-check
user-supplied data before copying it to an insufficiently sized memory buffer.
This issue allows local attackers to execute arbitrary machine code
with superuser privileges, since the affected utility is installed
setuid-superuser by default in some installations. This allows attackers to
completely compromise affected computers.
Fcron version 3.0 is affected by this issue; previous versions may also
be affected.
Update: This issue is now retired. Further analysis reveals that this
issue cannot be exploited for code execution; therefore, this is not a
vulnerability.
7. Multiple Mozilla Products Memory Corruption/Code Injection/Access
Restriction Bypass Vulnerabilities
BugTraq ID: 16476
Remote: Yes
Date Published: 2006-02-02
Relevant URL: http://www.securityfocus.com/bid/16476
Summary:
Multiple Mozilla products are prone to multiple vulnerabilities. These
issues include various memory-corruption, code-injection, and
access-restriction-bypass vulnerabilities. Other undisclosed issues may have
also been addressed in the various updated vendor applications.
Successful exploitation of these issues may permit an attacker to
execute arbitrary code in the context of the affected application. This may
facilitate a compromise of the affected computer; other attacks are
also possible.
III. LINUX FOCUS LIST SUMMARY
---------------------------------
V. SPONSOR INFORMATION
------------------------
This Issue is Sponsored By: 8e6 Technologies
Stop Spyware Now - Free White Paper!
Spyware remains a problem for most companies, disrupting productivity,
wasting time and money. Now 8e6 Technologies' free White Paper proposes
breakthrough solutions to counteract the Spyware problem: recognize
potential infections, stop unauthorized programs at the source. Get the
Free White Paper.
http://a.gklmedia.com/sfln/nl/110