Date: Tue, 11 Apr 2006 15:25:33 -0600
From:"Peter Laborge" <plaborge@securityfocus.com>
To:linux-secnews@securityfocus.com
Subject: SecurityFocus Linux Newsletter #281
SecurityFocus Linux Newsletter #281
----------------------------------------

This Issue is Sponsored By: SPI Dynamics

ALERT: "How A Hacker Launches A Blind SQL Injection Attack 
Step-by-Step"!"- White Paper Blind SQL Injection can deliver total control of your 
server to a hacker giving them the ability to read, write and 
manipulate all data stored in your backend systems! Download this *FREE* white 
paper from SPI Dynamics for a complete guide to protection!

https://download.spidynamics.com/1/ad/bsq.asp?Campaign_ID=70130000000CGKl

------------------------------------------------------------------
I.   FRONT AND CENTER
        1. This Means Warcraft!
        2. Two attacks against VoIP
II.  LINUX VULNERABILITY SUMMARY
        1. Util-VServer SUEXEC Privilege Escalation Weakness
        2. PHP PHPInfo Large Input Cross-Site Scripting Vulnerability
        3. MPG123 Malformed MP3 File Memory Corruption Vulnerability
        4. HP Color LaserJet 2500/4600 Toolbox Directory Traversal 
Vulnerability
        5. Doomsday Multiple Remote Format String Vulnerabilities
        6. Kaffeine Remote HTTP_Peek Buffer Overflow Vulnerability
        7. Eset Software NOD32 Antivirus Local Arbitrary File Creation 
Vulnerability
        8. Clam AntiVirus ClamAV Multiple Vulnerabilities
        9. OpenVPN Client Remote Code Execution Vulnerability
        10. BSD-Games Multiple Local Buffer Overflow Vulnerabilities
        11. Linux Kernel SYSFS PAGE_SIZE Local Denial of Service 
Vulnerability
        12. XZGV Image Viewer JPEG File Remote Heap Buffer Overflow 
Vulnerability
        13. Tony Cook Imager JPEG and TGA Images Denial Of Service 
Vulnerability
        14. TalentSoft Web+ Shop Deptname Parameter Cross-Site 
Scripting Vulnerability
        15. Linux Kernel __keyring_search_one Local Denial of Service 
Vulnerability
III. LINUX FOCUS LIST SUMMARY
        1. Syncing iptables rules between two servers
        2. R: IPtables and C programming??
        3. IPtables and C programming??
V.   SPONSOR INFORMATION

I.   FRONT AND CENTER
---------------------
1. This Means Warcraft!
By Mark Rasch
A recent World of Warcraft case involved a WoW book by Brian Knopp that 
was being sold on eBay. It resulted in automated takedown notices by 
"lawyerbots" and shows how the legal process today can end up silencing 
legitimate uses of trademarks and copyrights.
http://www.securityfocus.com/columnists/396

2. Two attacks against VoIP
By Peter Thermos
This purpose of this article is to discuss two of the most well known 
attacks that can be carried out in current VoIP deployments. The first 
attack demonstrates the ability to hijack a user's VoIP Subscription and 
subsequent communications. The second attack looks at the ability to 
eavesdrop in to VoIP communications.
http://www.securityfocus.com/infocus/1862


SecurityFocus is looking for the best technical articles from the 
community. In addition to becoming instantly famous, publication of your 
research, technical work, installation guide or security HOWTO will 
benefit the community as a whole. Interested parties should consult the 
submission guidelines below and review some recent Infocus articles. Start 
with an idea and a one-page outline. Submit your article idea now!
http://www.securityfocus.com/static/submissions.html


II.  LINUX VULNERABILITY SUMMARY
------------------------------------
1. Util-VServer SUEXEC Privilege Escalation Weakness
BugTraq ID: 17361
Remote: Yes
Date Published: 2006-04-03
Relevant URL: http://www.securityfocus.com/bid/17361
Summary:
The util-vserver package for the Linux-VServer project is susceptible 
to a privilege-escalation weakness.

This issue allows remote attackers that exploit latent vulnerabilities 
in services to potentially gain superuser privileges in a guest virtual 
server. This may aid them in further attacks.

2. PHP PHPInfo Large Input Cross-Site Scripting Vulnerability
BugTraq ID: 17362
Remote: Yes
Date Published: 2006-04-03
Relevant URL: http://www.securityfocus.com/bid/17362
Summary:
PHP is prone to a cross-site scripting vulnerability. This issue is due 
to a failure in the application to properly sanitize user-supplied 
input.

An attacker may leverage this issue to have arbitrary script code 
executed in the browser of an unsuspecting user in the context of the 
affected site. This may help the attacker steal cookie-based authentication 
credentials and launch other attacks.

3. MPG123 Malformed MP3 File Memory Corruption Vulnerability
BugTraq ID: 17365
Remote: Yes
Date Published: 2006-04-03
Relevant URL: http://www.securityfocus.com/bid/17365
Summary:
The mpg123 application is prone to a memory-corruption vulnerability 
related to the handling of MP3 streams.

An attacker may be able to exploit this vulnerability to execute 
arbitrary code in the context of the user running the player, but this has 
not been confirmed.

This issue may be related to the one described in BID 12218 (MPG123 
Layer 2 Frame Header Heap Overflow Vulnerability).

4. HP Color LaserJet 2500/4600 Toolbox Directory Traversal 
Vulnerability
BugTraq ID: 17367
Remote: Yes
Date Published: 2006-04-04
Relevant URL: http://www.securityfocus.com/bid/17367
Summary:
The HP Color LaserJet 2500/4600 Toolbox is prone to a 
directory-traversal vulnerability. This issue is due to a failure in the application to 
properly sanitize user-supplied input.

An attacker can exploit this vulnerability to retrieve arbitrary files 
from the vulnerable system in the context of the affected application. 
Information obtained may aid attackers in further attacks.

5. Doomsday Multiple Remote Format String Vulnerabilities
BugTraq ID: 17369
Remote: Yes
Date Published: 2006-04-04
Relevant URL: http://www.securityfocus.com/bid/17369
Summary:
Doomsday is prone to multiple remote format-string vulnerabilities.

These issues are due to a failure in the application to properly 
sanitize user-supplied input.

An attacker can exploit these issues to execute arbitrary code in the 
context of the vulnerable application or crash the affected game server, 
effectively denying service to legitimate users.

6. Kaffeine Remote HTTP_Peek Buffer Overflow Vulnerability
BugTraq ID: 17372
Remote: Yes
Date Published: 2006-04-04
Relevant URL: http://www.securityfocus.com/bid/17372
Summary:
Kaffiene is reportedly affected by a remote buffer-overflow 
vulnerability because the application fails to perform sufficient boundary checks 
on user-supplied strings before copying them into finite stack-based 
buffers.

An attacker can leverage this issue remotely to execute arbitrary code 
on an affected computer with the privileges of an unsuspecting user 
that executed the vulnerable software.

7. Eset Software NOD32 Antivirus Local Arbitrary File Creation 
Vulnerability
BugTraq ID: 17374
Remote: No
Date Published: 2006-04-04
Relevant URL: http://www.securityfocus.com/bid/17374
Summary:
NOD32 Antivirus is affected by a local arbitrary file-creation 
vulnerability. This issue is due to the application's failure to properly drop 
SYSTEM privileges when performing operations on behalf of a local user. 
Attackers cannot overwrite already-existing files by exploiting this 
issue.

This issue allows local attackers to create files in arbitrary 
locations with SYSTEM-level privileges. This may allow then them to execute 
arbitrary code with elevated privileges, facilitating the compromise of 
affected computers.

Versions prior to 2.51.26 are affected by this issue.

8. Clam AntiVirus ClamAV Multiple Vulnerabilities
BugTraq ID: 17388
Remote: Yes
Date Published: 2006-04-05
Relevant URL: http://www.securityfocus.com/bid/17388
Summary:
ClamAV is prone to multiple vulnerabilities:

- An integer-overflow vulnerability.
- A format-string vulnerability.
- A denial-of-service vulnerability.

The first two issues may permit attackers to execute arbitrary code, 
which can facilitate a compromise of an affected computer.

If an attacker can successfully exploit the denial-of-service issue, 
this may crash the affected application, which may aid an attacker in 
further attacks if the antivirus software no longer works.

9. OpenVPN Client Remote Code Execution Vulnerability
BugTraq ID: 17392
Remote: Yes
Date Published: 2006-04-06
Relevant URL: http://www.securityfocus.com/bid/17392
Summary:
OpenVPN is reported prone to a remote code-execution vulnerability. 
This issue is due to a lack of proper sanitization of server-supplied 
data.

A remote attacker may exploit this issue to execute arbitrary code with 
elevated privileges on a vulnerable computer to gain unauthorized 
access.

To be vulnerable to this issue, client OpenVPN computers must be 
configured to use 'up' or 'down' scripts and must have either the 'pull' 
configuration directive or a 'client' macro set up.

OpenVPN versions 2.0.0 through 2.0.5 are affected by this issue.

10. BSD-Games Multiple Local Buffer Overflow Vulnerabilities
BugTraq ID: 17401
Remote: No
Date Published: 2006-04-06
Relevant URL: http://www.securityfocus.com/bid/17401
Summary:
Multiple games in the BSD-games package are prone to locally 
exploitable buffer-overflow vulnerabilities. These issues are due to insufficient 
bounds-checking when copying user-supplied input to insufficiently 
sized memory buffers.

Since these games are installed 'setgid games' on many operating 
systems, attackers may be able to exploit these issues to escalate privileges 
to this level.

11. Linux Kernel SYSFS PAGE_SIZE Local Denial of Service Vulnerability
BugTraq ID: 17402
Remote: No
Date Published: 2006-04-07
Relevant URL: http://www.securityfocus.com/bid/17402
Summary:
Linux kernel is susceptible to a local denial-of-service vulnerability.

This issue arises in SYSFS and allows local users to crash the kernel, 
denying service to legitimate users.

Kernel versions 2.6.12 to versions prior to 2.6.17-rc1 are affected.

12. XZGV Image Viewer JPEG File Remote Heap Buffer Overflow 
Vulnerability
BugTraq ID: 17409
Remote: Yes
Date Published: 2006-04-07
Relevant URL: http://www.securityfocus.com/bid/17409
Summary:
The 'xzgv' viewer is reported prone to a remote heap-overflow 
vulnerability.

This issue is reported to present itself when the application handles a 
specially crafted JPEG image. A remote attacker may execute arbitrary 
code in the context of a user running the application. As a result, the 
attacker can gain unauthorized access to the vulnerable computer.

This issue affects 'xzgv' 0.8 and prior. The 'zgv' viewer may be 
vulnerable to this issue as well, but this has not been confirmed.

13. Tony Cook Imager JPEG and TGA Images Denial Of Service 
Vulnerability
BugTraq ID: 17415
Remote: Yes
Date Published: 2006-04-07
Relevant URL: http://www.securityfocus.com/bid/17415
Summary:
The Perl Imager module is susceptible to a denial-of-service 
vulnerability. This issue is due to a failure of the software to properly handle 
unexpected image data.

Malformed image files may cause a crash in applications that use the 
affected Perl module, resulting in a denial-of-service condition.

14. TalentSoft Web+ Shop Deptname Parameter Cross-Site Scripting 
Vulnerability
BugTraq ID: 17418
Remote: Yes
Date Published: 2006-04-07
Relevant URL: http://www.securityfocus.com/bid/17418
Summary:
Web+ Shop is prone to a cross-site scripting vulnerability. This issue 
is due to a failure in the application to properly sanitize 
user-supplied input.

An attacker may leverage this issue to have arbitrary script code 
executed in the browser of an unsuspecting user in the context of the 
affected site. This may help the attacker steal cookie-based authentication 
credentials and launch other attacks.

15. Linux Kernel __keyring_search_one Local Denial of Service 
Vulnerability
BugTraq ID: 17451
Remote: No
Date Published: 2006-04-11
Relevant URL: http://www.securityfocus.com/bid/17451
Summary:
Linux kernel is susceptible to a local denial-of-service vulnerability. 
This vulnerability arises in the '__keyring_search_one' function. This 
issue allows local users to crash the kernel, denying service to 
legitimate users.

Kernel versions prior to 2.6.16.3 are vulnerable to this issue.

III. LINUX FOCUS LIST SUMMARY
---------------------------------
1. Syncing iptables rules between two servers
http://www.securityfocus.com/archive/91/430423

2. R: IPtables and C programming??
http://www.securityfocus.com/archive/91/430003

3. IPtables and C programming??
http://www.securityfocus.com/archive/91/429848

V.   SPONSOR INFORMATION
------------------------
This Issue is Sponsored By: SPI Dynamics

ALERT: "How A Hacker Launches A Blind SQL Injection Attack 
Step-by-Step"!"- White Paper Blind SQL Injection can deliver total control of your 
server to a hacker giving them the ability to read, write and 
manipulate all data stored in your backend systems! Download this *FREE* white 
paper from SPI Dynamics for a complete guide to protection!

https://download.spidynamics.com/1/ad/bsq.asp?Campaign_ID=70130000000CGKl