Date: | Tue, 28 Feb 2006 15:09:21 -0700 |
From: | "Peter Laborge" <plaborge@securityfocus.com>
| To: | linux-secnews@securityfocus.com |
Subject: | SecurityFocus Linux Newsletter #275 |
SecurityFocus Linux Newsletter #275
----------------------------------------
This Issue is Sponsored By: SpiDynamics
ALERT: "How a Hacker Launches a SQL Injection Attack!"- SPI Dynamics
White Paper It's as simple as placing additional SQL commands into a Web
Form input box giving hackers complete access to all your backend
systems! Firewalls and IDS will not stop such attacks because SQL Injections
are NOT seen as intruders. Download this *FREE* white paper from SPI
Dynamics for a complete guide to protection!
https://download.spidynamics.com/1/ad/sql.asp?Campaign_ID=70130000000C543
------------------------------------------------------------------
I. FRONT AND CENTER
1. John the Ripper 1.7, by Solar Designer
2. Zero to IPSec in 4 minutes
3. Spreading security awareness for OS X
II. LINUX VULNERABILITY SUMMARY
1. Bugzilla Whinedays SQL Injection Vulnerability
2. Bugzilla User Credentials Information Disclosure
Vulnerability
3. SquirrelMail Multiple Cross-Site Scripting and IMAP
Injection Vulnerabilities
4. Linux Kernel SDLA_XFER Kernel Memory Disclosure
Vulnerability
5. GNU Tar Invalid Headers Buffer Overflow Vulnerability
6. ViRobot Linux Server Authentication Bypass Vulnerability
7. Mozilla Thunderbird IFRAME JavaScript Execution
Vulnerability
8. SUSE CASA Pam_Micasa Remote Buffer Overflow Vulnerability
9. Zoo Misc.c Buffer Overflow Vulnerability
10. PHPWebSite Topics.PHP SQL Injection Vulnerability
11. Simple Machines X-Forwarded-For HTML Injection
Vulnerability
12. MySQL Query Logging Bypass Vulnerability
III. LINUX FOCUS LIST SUMMARY
1. Kryptor Whitepaper released
V. SPONSOR INFORMATION
I. FRONT AND CENTER
---------------------
1. John the Ripper 1.7, by Solar Designer
By Federico Biancuzzi
Federico Biancuzzi interviews Solar Designer, creator of the popular
John the Ripper password cracker. Solar Designer discusses what's new in
version 1.7, the advantages of popular cryptographic hashes, the
relative speed at which many passwords can now be cracked, and how one can
choose strong passphrases (forget passwords) that are harder to break.
http://www.securityfocus.com/columnists/388
2. Zero to IPSec in 4 minutes
By Dragos Ruiu
This short article looks at how to get a fully functional IPSec VPN up
and running between two fresh OpenBSD installations in about four
minutes flat.
http://www.securityfocus.com/infocus/1859
3. Spreading security awareness for OS X
By Robert Lemos
Robert Lemos interviews Kevin Finisterre, founder of security startup
Digital Munition, who created the three recent versions of the InqTana
worm to raise awareness of security in Apple's OS X. Finisterre
discusses his reasons for creating the worms, the problems with Mac OS X
security, and why he does not fear prosecution.
http://www.securityfocus.com/columnists/389
II. LINUX VULNERABILITY SUMMARY
------------------------------------
1. Bugzilla Whinedays SQL Injection Vulnerability
BugTraq ID: 16738
Remote: Yes
Date Published: 2006-02-21
Relevant URL: http://www.securityfocus.com/bid/16738
Summary:
Bugzilla is prone to an SQL-injection vulnerability. This issue is due
to a failure in the application to properly sanitize user-supplied
input before using it in an SQL query.
Successful exploitation could allow an attacker to compromise the
application, access or modify data, or exploit vulnerabilities in the
underlying database implementation.
Exploitation of this issue requires the attacker to have administrative
access to the affected application.
2. Bugzilla User Credentials Information Disclosure Vulnerability
BugTraq ID: 16745
Remote: Yes
Date Published: 2006-02-21
Relevant URL: http://www.securityfocus.com/bid/16745
Summary:
Bugzilla is prone to an information-disclosure vulnerability. This
issue is due to a design error in the application.
An attacker can exploit this issue by tricking a victim user into
following a malicious URI and then retrieving the victim user's login
credentials.
To successfully exploit this issue, the attacker requires the name of
the path where the login page resides and resolves to a computer on the
local network of the victim user.
3. SquirrelMail Multiple Cross-Site Scripting and IMAP Injection
Vulnerabilities
BugTraq ID: 16756
Remote: Yes
Date Published: 2006-02-21
Relevant URL: http://www.securityfocus.com/bid/16756
Summary:
SquirrelMail is susceptible to multiple cross-site scripting and
IMAP-injection vulnerabilities. These issues are due to the application's
failure to properly sanitize user-supplied input.
An attacker may leverage any of the cross-site scripting issues to have
arbitrary script code executed in the browser of an unsuspecting user
in the context of the affected site. This may facilitate the theft of
cookie-based authentication credentials as well as other attacks.
An attacker may leverage the IMAP-injection issue to execute arbitrary
IMAP commands on the configured IMAP server. This may aid attackers in
further attacks as well as allow them to exploit latent vulnerabilities
in the IMAP server.
4. Linux Kernel SDLA_XFER Kernel Memory Disclosure Vulnerability
BugTraq ID: 16759
Remote: No
Date Published: 2006-02-21
Relevant URL: http://www.securityfocus.com/bid/16759
Summary:
The Linux kernel is affected by a local memory-disclosure
vulnerability.
This issue allows an attacker to read kernel memory. Information
gathered via exploitation may aid malicious users in further attacks.
This issue affects kernel versions 2.4.x up to 2.4.29-rc1, and 2.6.x up
to 2.6.5.
5. GNU Tar Invalid Headers Buffer Overflow Vulnerability
BugTraq ID: 16764
Remote: Yes
Date Published: 2006-02-22
Relevant URL: http://www.securityfocus.com/bid/16764
Summary:
GNU Tar is prone to a buffer overflow when handling invalid headers.
Successful exploitation could potentially lead to arbitrary code
execution, though this has not been confirmed.
Tar versions 1.14 and above are vulnerable.
6. ViRobot Linux Server Authentication Bypass Vulnerability
BugTraq ID: 16768
Remote: Yes
Date Published: 2006-02-22
Relevant URL: http://www.securityfocus.com/bid/16768
Summary:
ViRobot Linux Server is prone to an authentication-bypass
vulnerability.
Remote attackers can exploit this issue to gain access to the
application's file-scanning functionality.
Presumably, the exploitation of this issue may allow attackers to carry
out other attacks, such as triggering denial-of-service conditions by
scanning a large number of large files. Other attacks due to latent
vulnerabilities in the application are possible.
ViRobot Linux Server 2.0 (20050817) is reportedly vulnerable. Other
versions may be affected as well.
7. Mozilla Thunderbird IFRAME JavaScript Execution Vulnerability
BugTraq ID: 16770
Remote: Yes
Date Published: 2006-02-22
Relevant URL: http://www.securityfocus.com/bid/16770
Summary:
Mozilla Thunderbird is prone to a script-execution vulnerability.
The vulnerability presents itself when an attacker supplies a specially
crafted email to a user containing malicious script code in an IFRAME
and the user tries to reply to the mail. Arbitrary JavaScript can be
executed even if the user has disabled JavaScript execution in the client.
Mozilla Thunderbird 1.0.7 and prior versions are reportedly affected.
8. SUSE CASA Pam_Micasa Remote Buffer Overflow Vulnerability
BugTraq ID: 16779
Remote: Yes
Date Published: 2006-02-22
Relevant URL: http://www.securityfocus.com/bid/16779
Summary:
SUSE CASA is prone to a remote buffer-overflow vulnerability.
This issue can allow remote attackers to gain superuser privileges to a
vulnerable computer by executing arbitrary code.
The 'pam_micasa' module is affected.
9. Zoo Misc.c Buffer Overflow Vulnerability
BugTraq ID: 16790
Remote: Yes
Date Published: 2006-02-23
Relevant URL: http://www.securityfocus.com/bid/16790
Summary:
Zoo is prone to a buffer-overflow vulnerability. This issue is due to a
failure in the application to do proper bounds checking on
user-supplied data before using it in a finite-sized buffer.
An attacker can exploit this issue to execute arbitrary code in the
context of the victim user running the affected application.
10. PHPWebSite Topics.PHP SQL Injection Vulnerability
BugTraq ID: 16825
Remote: Yes
Date Published: 2006-02-25
Relevant URL: http://www.securityfocus.com/bid/16825
Summary:
phpWebSite is prone to an SQL injection vulnerability. This issue is
due to a failure in the application to properly sanitize user-supplied
input before using it in an SQL query.
Successful exploitation could result in a compromise of the
application, disclosure or modification of data, or may permit an attacker to
exploit vulnerabilities in the underlying database implementation.
11. Simple Machines X-Forwarded-For HTML Injection Vulnerability
BugTraq ID: 16841
Remote: Yes
Date Published: 2006-02-24
Relevant URL: http://www.securityfocus.com/bid/16841
Summary:
Simple Machines is prone to an HTML injection vulnerability. This issue
is due to a failure in the application to properly sanitize
user-supplied input.
Attacker-supplied HTML and script code would be executed in the context
of the affected website, potentially allowing for theft of cookie-based
authentication credentials. An attacker could also exploit this issue
to control how the site is rendered to the user; other attacks are also
possible.
This issue is reported to affect Simple Machines version 1.0.6 and
earlier.
12. MySQL Query Logging Bypass Vulnerability
BugTraq ID: 16850
Remote: Yes
Date Published: 2006-02-27
Relevant URL: http://www.securityfocus.com/bid/16850
Summary:
MySQL is susceptible to a query logging bypass vulnerability. This
issue is due to a discrepency between the handling of NULL bytes in input
data.
This issue allows attackers to bypass the query logging functionality
of the database, so they can cause malicious SQL queries to be
improperly logged. This may aid them in hiding the traces of malicious activity
from administrators.
This issue affects MySQL version 5.0.18; other versions may also be
affected.
III. LINUX FOCUS LIST SUMMARY
---------------------------------
1. Kryptor Whitepaper released
http://www.securityfocus.com/archive/91/425067
V. SPONSOR INFORMATION
------------------------
This Issue is Sponsored By: SpiDynamics
ALERT: "How a Hacker Launches a SQL Injection Attack!"- SPI Dynamics
White Paper It's as simple as placing additional SQL commands into a Web
Form input box giving hackers complete access to all your backend
systems! Firewalls and IDS will not stop such attacks because SQL Injections
are NOT seen as intruders. Download this *FREE* white paper from SPI
Dynamics for a complete guide to protection!
https://download.spidynamics.com/1/ad/sql.asp?Campaign_ID=70130000000C543