Date: | Tue, 18 Apr 2006 15:43:24 -0600 |
From: | "Peter Laborge" <plaborge@securityfocus.com>
| To: | linux-secnews@securityfocus.com |
Subject: | SecurityFocus Linux Newsletter #282 |
SecurityFocus Linux Newsletter #282
----------------------------------------
This Issue is Sponsored By: Patchlink
Automatically analyze, deploy and track security patches
Does your patch management solution automatically track and re-deploy
to ensure network security?
20% of patches unknowingly become un-patched. Learn more about
automating the analysis, distribution and tracking of security patches using
PatchLink's security patch & vulnerability management solution -- the
world's largest repository of tested patches. Request a free trial disk.
http://a.gklmedia.com/sfln/nl/148
------------------------------------------------------------------
I. FRONT AND CENTER
1. Virtualization for security
2. Stop the bots
II. LINUX VULNERABILITY SUMMARY
1. Linux Kernel __keyring_search_one Local Denial of Service
Vulnerability
2. XScreenSaver Local Password Disclosure Vulnerability
3. Debian mnoGoSearch-Common Local Database Administrator
Password Disclosure Vulnerability
4. Linux Kernel Perfmon.c Local Denial of Service Vulnerability
5. Plone MembershipTool Access Control Bypass Vulnerability
6. Opera Web Browser Stylesheet Attribute Buffer Overflow
Vulnerability
7. Mozilla Suite, Firefox, SeaMonkey, and Thunderbird Multiple
Remote Vulnerabilities
8. FCheck Insecure Temporary File Creation Vulnerability
9. Avast! Linux Home Edition Insecure Temporary File Creation
Vulnerability
10. Linux Kernel Intel EM64T SYSRET Local Denial of Service
Vulnerability
11. Asterisk JPEG File Handling Integer Overflow Vulnerability
12. Xine Playlist Handling Remote Format String Vulnerability
13. Linux Kernel Shared Memory Security Restriction Bypass
Vulnerability
III. LINUX FOCUS LIST SUMMARY
1. about /dev/shm?
2. Syncing iptables rules between two servers
3. R: IPtables and C programming??
4. IPtables and C programming??
V. SPONSOR INFORMATION
I. FRONT AND CENTER
---------------------
1. Virtualization for security
By Scott Granneman
Scott Granneman gives an overview of the virtualization options for all
three major operating system families and looks at the many ways the
technology can improve your security posture in an organization or at
home.
http://www.securityfocus.com/columnists/397
2. Stop the bots
By Kelly Martin
Botnets are a major source of evil on the Internet, from spam, phishing
attacks, virus propagation and denial-of-service attacks to the
stealing of financial information and other illegal activity. Does disbanding
them raise legal and ethical implications?
http://www.securityfocus.com/columnists/398
II. LINUX VULNERABILITY SUMMARY
------------------------------------
1. Linux Kernel __keyring_search_one Local Denial of Service
Vulnerability
BugTraq ID: 17451
Remote: No
Date Published: 2006-04-11
Relevant URL: http://www.securityfocus.com/bid/17451
Summary:
Linux kernel is susceptible to a local denial-of-service vulnerability.
This vulnerability arises in the '__keyring_search_one' function. This
issue allows local users to crash the kernel, denying service to
legitimate users.
Kernel versions prior to 2.6.16.3 are vulnerable to this issue.
2. XScreenSaver Local Password Disclosure Vulnerability
BugTraq ID: 17471
Remote: Yes
Date Published: 2006-04-11
Relevant URL: http://www.securityfocus.com/bid/17471
Summary:
XScreenSaver is prone to a local password-disclosure vulnerability.
This issue is due to a flaw in the application that may result in the
screen-unlock password being passed onto other applications that are
already running on the computer.
This may disclose the password used to unlock the applications. The
login password is typically used to unlock XScreenSaver, so this issue may
reveal login passwords to attackers.
This issue is currently known to affect users who are running RDesktop
on the locked computer, due to the interaction between the
applications. This may result in the disclosure of the login password across the
network. Other unknown applications in conjunction with XScreenSaver may
result in a similar issue.
Version 4.14, and 4.16 are vulnerable to this issue; other versions may
also be affected.
3. Debian mnoGoSearch-Common Local Database Administrator Password
Disclosure Vulnerability
BugTraq ID: 17477
Remote: No
Date Published: 2006-04-11
Relevant URL: http://www.securityfocus.com/bid/17477
Summary:
Debian GNU/Linux is susceptible to a local information-disclosure
vulnerability. This issue is due to the 'debconf' package improperly storing
sensitive information in world-readable files.
This issue allows local users to gain access to the database
administrator password to the 'mnogosearch-common' package. Information gained
through exploiting this issue may aid malicious users in further attacks.
4. Linux Kernel Perfmon.c Local Denial of Service Vulnerability
BugTraq ID: 17482
Remote: No
Date Published: 2006-04-12
Relevant URL: http://www.securityfocus.com/bid/17482
Summary:
The Linux kernel is prone to a local denial-of-service vulnerability.
This issue arises in 'perfmon.c' on ia64 platforms.
This vulnerability allows local users to crash the kernel, denying
further service to legitimate users.
5. Plone MembershipTool Access Control Bypass Vulnerability
BugTraq ID: 17484
Remote: Yes
Date Published: 2006-04-12
Relevant URL: http://www.securityfocus.com/bid/17484
Summary:
Plone is susceptible to a remote access-control bypass vulnerability.
This issue is due to the application's failure to properly enforce
privileges to various MembershipTool methods.
This issue allows remote, anonymous attackers to modify and delete
portrait images of members. This may help attackers exploit latent
vulnerabilities in image-rendering software. Other attacks may also be
possible.
6. Opera Web Browser Stylesheet Attribute Buffer Overflow Vulnerability
BugTraq ID: 17513
Remote: Yes
Date Published: 2006-04-13
Relevant URL: http://www.securityfocus.com/bid/17513
Summary:
Opera is prone to a buffer-overflow vulnerability. This issue is due to
the application's failure to properly bounds-check user-supplied input
before using it in a string-copy operation.
This issue allows remote attackers to crash affected web browsers. Due
to the nature of this issue, attackers may be able to exploit this
issue to execute machine code, but this has not been confirmed.
Opera version 8.52 is vulnerable to this issue; other versions may also
be affected.
7. Mozilla Suite, Firefox, SeaMonkey, and Thunderbird Multiple Remote
Vulnerabilities
BugTraq ID: 17516
Remote: Yes
Date Published: 2006-04-13
Relevant URL: http://www.securityfocus.com/bid/17516
Summary:
The Mozilla Foundation has released 9 security advisories specifying
security vulnerabilities in Mozilla Suite, Firefox, SeaMonkey, and
Thunderbird.
These vulnerabilities allow attackers to:
- execute arbitrary machine code in the context of the vulnerable
application
- crash affected applications
- gain elevated privileges in JavaScript code, potentially allowing
remote machine code execution
- gain access to potentially sensitive information
- bypass security checks
- spoof window contents.
Other attacks may also be possible.
The issues described here will be split into individual BIDs as the
information embargo on the Mozilla Bugzilla entries is lifted, and further
information becomes available. This BID will then be retired.
These issues are fixed in:
- Mozilla Firefox versions 1.0.8 and 1.5.0.2
- Mozilla Thunderbird versions 1.0.8 and 1.5.0.2
- Mozilla Suite version 1.7.13
- Mozilla SeaMonkey version 1.0.1
8. FCheck Insecure Temporary File Creation Vulnerability
BugTraq ID: 17524
Remote: No
Date Published: 2006-04-15
Relevant URL: http://www.securityfocus.com/bid/17524
Summary:
FCheck creates temporary files in an insecure manner.
An attacker with local access could potentially exploit this issue to
view files and obtain privileged information. The attacker may also
perform symlink attacks, overwriting arbitrary files in the context of the
affected application.
A successful attack would most likely result in loss of confidentiality
and theft of privileged information. Successful exploitation of a
symlink attack may allow an attacker to overwrite sensitive files. This may
result in a denial of service; other attacks may also be possible.
9. Avast! Linux Home Edition Insecure Temporary File Creation
Vulnerability
BugTraq ID: 17535
Remote: No
Date Published: 2006-04-14
Relevant URL: http://www.securityfocus.com/bid/17535
Summary:
Avast! Linux Home Edition creates temporary files in an insecure
manner.
An attacker with local access could potentially exploit this issue to
view files and obtain privileged information. The attacker may also
perform symlink attacks, overwriting arbitrary files in the context of the
affected application.
A successful attack would most likely result in loss of confidentiality
and theft of privileged information. Successful exploitation of a
symlink attack may allow an attacker to overwrite sensitive files. This may
result in a denial of service; other attacks may also be possible.
10. Linux Kernel Intel EM64T SYSRET Local Denial of Service
Vulnerability
BugTraq ID: 17541
Remote: No
Date Published: 2006-04-17
Relevant URL: http://www.securityfocus.com/bid/17541
Summary:
The Linux kernel is prone to a local denial-of-service vulnerability.
This issue arises in Intel EM64T CPUs when returning program control
using SYSRET.
This vulnerability allows local users to crash the kernel, denying
further service to legitimate users.
11. Asterisk JPEG File Handling Integer Overflow Vulnerability
BugTraq ID: 17561
Remote: Yes
Date Published: 2006-04-17
Relevant URL: http://www.securityfocus.com/bid/17561
Summary:
Asterisk is prone to an integer-overflow vulnerability.
This issue arises when the application handles a malformed JPEG file.
An attacker could exploit this vulnerability to execute arbitrary code
in the context of the vulnerable application.
12. Xine Playlist Handling Remote Format String Vulnerability
BugTraq ID: 17579
Remote: Yes
Date Published: 2006-04-18
Relevant URL: http://www.securityfocus.com/bid/17579
Summary:
xine is reported prone to a remote format-string vulnerability.
This issue arises when the application handles specially-crafted
playlist files. An attacker can exploit this vulnerability by crafting a
malicious file that contains format specifiers and sending the file to an
unsuspecting user.
A successful attack may crash the application or lead to arbitrary code
execution.
All versions of xine are considered vulnerable at the moment.
13. Linux Kernel Shared Memory Security Restriction Bypass
Vulnerability
BugTraq ID: 17587
Remote: No
Date Published: 2006-04-18
Relevant URL: http://www.securityfocus.com/bid/17587
Summary:
The Linux kernel is prone to a vulnerability regarding shared memory
access.
A local attacker could potentially gain read and write access to shared
memory and write access to read-only tmpfs filesystems, bypassing
security restrictions.
An attacker can exploit this issue to possibly corrupt applications and
their data when the applications use temporary files or shared memory.
III. LINUX FOCUS LIST SUMMARY
---------------------------------
1. about /dev/shm?
http://www.securityfocus.com/archive/91/431111
2. Syncing iptables rules between two servers
http://www.securityfocus.com/archive/91/430423
3. R: IPtables and C programming??
http://www.securityfocus.com/archive/91/430003
4. IPtables and C programming??
http://www.securityfocus.com/archive/91/429848
V. SPONSOR INFORMATION
------------------------
This Issue is Sponsored By: Patchlink
Automatically analyze, deploy and track security patches
Does your patch management solution automatically track and re-deploy
to ensure network security?
20% of patches unknowingly become un-patched. Learn more about
automating the analysis, distribution and tracking of security patches using
PatchLink's security patch & vulnerability management solution -- the
world's largest repository of tested patches. Request a free trial disk.
http://a.gklmedia.com/sfmn/nl/148