Date: | 5 Oct 2004 17:31:42 -0000 |
From: | "Peter Laborge" <plaborge@securityfocus.com>
| To: | linux-secnews@securityfocus.com |
Subject: | SecurityFocus Linux Newsletter #204 |
SecurityFocus Linux Newsletter #204
------------------------------------
This Issue is Sponsored By: SecurityFocus
Stay up to date. All the latest news, columns, jobs and more in a
convenient html newsletter - Even a glimpse of upcoming columns and
feature
articles! Sign up today!
http://www.securityfocus.com/htmlnewsletter/subscribe
------------------------------------------------------------------------
I. FRONT AND CENTER
1. Lessons Learned from Virus Infections
2. Strike One!
II. LINUX VULNERABILITY SUMMARY
1. Multiple Vendor TCP Packet Fragmentation Handling Denial Of ...
2. MySQL Bounded Parameter Statement Execution Remote Buffer Ov...
3. Debian GNU/Linux Sendmail Package Default SASL Password Vuln...
4. IBM CTSTRTCASD Utility Local File Corruption Vulnerability
5. Illustrate dBpowerAMP Music Converter and Audio Player Buffe...
6. XMLStarlet Command Line XML Toolkit Multiple Unspecified Buf...
7. Icecast Server HTTP Header Buffer Overflow Vulnerability
8. ParaChat Directory Traversal Vulnerability
9. Freenet6 Client Default Installation Configuration File Perm...
10. Samba Remote Arbitrary File Access Vulnerability
11. GNU GetText Unspecified Insecure Temporary File Creation
Vul...
12. W-Agora Multiple Remote Input Validation Vulnerabilities
13. GhostScript Unspecified Insecure Temporary File Creation
Vul...
14. GNU GLibC Unspecified Insecure Temporary File Creation
Vulne...
15. GNU Troff (Groff) Unspecified Insecure Temporary File
Creati...
16. GNU GZip Unspecified Insecure Temporary File Creation
Vulner...
17. MIT Kerberos 5 Unspecified Insecure Temporary File Creation
...
18. Trustix LVM Utilities Unspecified Insecure Temporary File
Cr...
19. MySQL Unspecified Insecure Temporary File Creation
Vulnerabi...
20. NetaTalk Unspecified Insecure Temporary File Creation
Vulner...
21. OpenSSL Unspecified Insecure Temporary File Creation
Vulnera...
22. Perl Unspecified Insecure Temporary File Creation
Vulnerabil...
23. PostgreSQL Unspecified Insecure Temporary File Creation
Vuln...
24. GNU Sharutils Multiple Buffer Overflow Vulnerabilities
25. Proxytunnel Local Proxy Credential Disclosure Vulnerability
26. Kerio MailServer Unspecified Vulnerability
27. RealNetworks RealOne Player And RealPlayer Unspecified Web
P...
28. RealNetworks RealOne Player And RealPlayer Unspecified File
...
29. RealNetworks RealOne Player And RealPlayer PNen3260.DLL
Remo...
III. LINUX FOCUS LIST SUMMARY
1. iptables & tcp wrappers (Thread)
IV. NEW PRODUCTS FOR LINUX PLATFORMS
1. Cyber-Ark Inter-Business Vault
2. EnCase Forensic Edition
3. KeyGhost SX
4. SafeKit
5. Astaro Linux Firewall
6. CAT Cellular Authentication Token and eAuthentication Servic...
V. NEW TOOLS FOR LINUX PLATFORMS
1. PIKT - Problem Informant/Killer Tool v1.17.0
2. ID-Synch 3.1
3. Nmap v3.70
4. THC-Hydra v4.3
5. Pads 1.1
6. cenfw 0.3b
VII. SPONSOR INFORMATION
I. FRONT AND CENTER
-------------------
1. Lessons Learned from Virus Infections
By Jason Gordon
This article discusses how a virus outbreak will produce a few unique
opportunities to examine the health of an organization's network -- and
learn ways to further harden the network from future automated attacks.
http://www.securityfocus.com/infocus/1804
2. Strike One!
By Mark Rasch
A New York judge did the right thing last week when he threw out a
USA-PATRIOT Act provision that forced ISPs to secretly cooperate with
the
FBI, and gave them no obvious avenue for appeal.
http://www.securityfocus.com/columnists/270
II. LINUX VULNERABILITY SUMMARY
-------------------------------
1. Multiple Vendor TCP Packet Fragmentation Handling Denial Of ...
BugTraq ID: 11258
Remote: Yes
Date Published: Sep 27 2004
Relevant URL: http://www.securityfocus.com/bid/11258
Summary:
Multiple vendor implementations of the TCP stack are reported prone to
a remote denial of service vulnerability.
The issue is reported to present itself due to inefficiencies present
when handling fragmented TCP packets.
The discoverer of this issue has dubbed the attack style the "New Dawn
attack", it is a variation of a previously reported attack that was
named the "Rose Attack".
This vulnerability may aid a remote attacker in impacting resources on
an affected computer. Specifically, a remote attacker may exploit this
vulnerability to deny service to a vulnerable computer.
Microsoft Windows 2000/XP, Linux kernel 2.4 tree and undisclosed Cisco
systems are reported prone to this vulnerability other products may
also be affected.
2. MySQL Bounded Parameter Statement Execution Remote Buffer Ov...
BugTraq ID: 11261
Remote: Yes
Date Published: Sep 27 2004
Relevant URL: http://www.securityfocus.com/bid/11261
Summary:
It is reported that MySQL is susceptible to a buffer overflow
vulnerability. This issue is due to a failure of the application to properly
ensure the size of a buffer is sufficient to handle user-supplied input
data before performing operations that may overflow into adjacent memory
regions.
This vulnerability reportedly allows for remote attackers to crash
affected servers. It is unconfirmed, but there may be a possibility of
remote code execution in the context of the affected server. It would
likely require a complex exploit, in order to take advantage of overwriting
memory contents with NULL bytes. Attackers may be able to take
advantage of the structured, predictable nature of the memory operations in
order to control the flow of execution of the application.
MySQL versions 4.1.3-beta and 4.1.4 are reported vulnerable, but other
versions are also likely affected.
3. Debian GNU/Linux Sendmail Package Default SASL Password Vuln...
BugTraq ID: 11262
Remote: Yes
Date Published: Sep 27 2004
Relevant URL: http://www.securityfocus.com/bid/11262
Summary:
It is reported that the Sendmail package contained in the Debian
GNU/Linux operating system is prone to a default password vulnerability,
potentially allowing unauthorized use of the Sendmail MTA. This would
likely facilitate UCE (Unsolicited Commercial Email, or SPAM) message
relaying through affected installations.
Versions of the Debian Sendmail packages prior to 8.12.3-7.1 for Debian
stable (woody), and versions prior to 8.13.1-13 for Debian unstable
(sid) are reported vulnerable.
4. IBM CTSTRTCASD Utility Local File Corruption Vulnerability
BugTraq ID: 11264
Remote: No
Date Published: Sep 27 2004
Relevant URL: http://www.securityfocus.com/bid/11264
Summary:
It is reported that IBMs 'ctstrtcasd' utility is susceptible to a local
file corruption vulnerability. This issue is due to a failure of the
application to properly validate the permissions of the invoking user
before overwriting a file specified by the user. This utility is setuid to
the superuser, allowing for the overwriting of any file on affected
computers, or the creation of files in any location.
As this vulnerability allows attackers to overwrite arbitrary files
with superuser privileges, attackers have the ability to destroy data, or
cause the computer to fail in such a manner that it will have to be
reinstalled from backups. This will deny service to legitimate users.
RSCT versions 2.3.0.0 and higher running on AIX 5.2 and 5.3 on pSeries,
AIX on i5/OS (iSeries), Linux (pSeries, xSeries, zSeries), and
pSeries/iSeries Hardware Management Console are reported vulnerable.
5. Illustrate dBpowerAMP Music Converter and Audio Player Buffe...
BugTraq ID: 11266
Remote: Yes
Date Published: Sep 28 2004
Relevant URL: http://www.securityfocus.com/bid/11266
Summary:
dBpowerAMP Music Converter and Audio Player reported prone to remote
buffer overflow vulnerabilities when processing malformed audio and
playlist files. This issues exists due to insufficient boundary checks
performed by the applications and may allow an attacker to gain unauthorized
access to a vulnerable computer.
Reportedly, these issues affect dBPowerAmp Music Converter 10.0 and
Audio Player 2.0. Other versions may be vulnerable as well.
6. XMLStarlet Command Line XML Toolkit Multiple Unspecified Buf...
BugTraq ID: 11270
Remote: Yes
Date Published: Sep 28 2004
Relevant URL: http://www.securityfocus.com/bid/11270
Summary:
XMLStarlet command line XML toolkit is affected by multiple unspecified
buffer overflow vulnerabilities. These issues are caused by a failure
of the application to validate the lengths of user-supplied strings
prior to copying them into finite process buffers.
An attacker may leverage this issue to manipulate process memory,
potentially facilitating arbitrary code execution.
7. Icecast Server HTTP Header Buffer Overflow Vulnerability
BugTraq ID: 11271
Remote: Yes
Date Published: Sep 28 2004
Relevant URL: http://www.securityfocus.com/bid/11271
Summary:
It is reported that the Icecast server is susceptible to a buffer
overflow vulnerability. This issue is due to a failure of the application to
properly enforce boundary conditions when dealing with user-supplied
input data.
This vulnerability allows for remote code execution in the context of
the Icecast server.
It is reported that this vulnerability is only exploitable to execute
remote code on Microsoft Windows platforms. This buffer overflow affects
all platforms, however it is only exploitable if a sensitive address is
located adjacent to the affected buffer. On other platforms, denial of
service or code execution may be possible, but this has not been
confirmed.
Verions 2.x up to 2.0.1 are reported vulnerable to this issue.
8. ParaChat Directory Traversal Vulnerability
BugTraq ID: 11272
Remote: Yes
Date Published: Sep 28 2004
Relevant URL: http://www.securityfocus.com/bid/11272
Summary:
It is reported that ParaChat is susceptible to a directory traversal
vulnerability. This issue is due to a failure of the application to
properly sanitize user-supplied input data.
This vulnerability allows remote attackers to retrieve the contents of
arbitrary, potentially sensitive files located on the serving computer
with the credentials of the ParaChat server process.
Version 5.5 is reported susceptible to this vulnerability. Other
versions may also be affected.
9. Freenet6 Client Default Installation Configuration File Perm...
BugTraq ID: 11280
Remote: No
Date Published: Sep 30 2004
Relevant URL: http://www.securityfocus.com/bid/11280
Summary:
Freenet6 is affected by a default install configuration file permission
vulnerability. This issue is due to a default configuration error..
An attacker may leverage this issue to steal authentication information
from the configuration file that is by default set as world readable.
10. Samba Remote Arbitrary File Access Vulnerability
BugTraq ID: 11281
Remote: Yes
Date Published: Sep 30 2004
Relevant URL: http://www.securityfocus.com/bid/11281
Summary:
Samba is affected by a remote arbitrary file access vulnerability.
This issue is due to a failure of the application to properly validate
user-supplied file names.
An attacker may leverage this issue to gain access to files outside of
a Samba share's path on a vulnerable computer. Information gained in
this way may reveal sensitive information aiding in further attacker
against the computer.
11. GNU GetText Unspecified Insecure Temporary File Creation Vul...
BugTraq ID: 11282
Remote: No
Date Published: Sep 30 2004
Relevant URL: http://www.securityfocus.com/bid/11282
Summary:
GNU gettext is affected by an unspecified insecure temporary file
creation vulnerability. This issue is likely due to a design error that
causes the application to fail to verify the existance of a file before
writing to it.
An attacker may leverage this issue to overwrite arbitrary files with
the privileges of an unsuspecting user that activates the vulnerable
application. Reportedly this issue is unlikely to facilitate privilege
escalation.
12. W-Agora Multiple Remote Input Validation Vulnerabilities
BugTraq ID: 11283
Remote: Yes
Date Published: Sep 30 2004
Relevant URL: http://www.securityfocus.com/bid/11283
Summary:
Multiple vulnerabilities are reported to affect the application. These
issues arise due to insufficient sanitization of user-supplied data. A
remote attacker may leverage these vulnerabilities to carry out SQL
injection, cross-site scripting, and HTTP response splitting attacks.
These issues were identified in W-Agora 4.1.6a, however, it is possible
that other versions are also affected.
13. GhostScript Unspecified Insecure Temporary File Creation Vul...
BugTraq ID: 11285
Remote: No
Date Published: Sep 30 2004
Relevant URL: http://www.securityfocus.com/bid/11285
Summary:
Ghostscript is affected by an unspecified insecure temporary file
creation vulnerability. This issue is likely due to a design error that
causes the application to fail to verify the existence of a file before
writing to it.
An attacker may leverage this issue to overwrite arbitrary files with
the privileges of an unsuspecting user that activates the vulnerable
application. Reportedly this issue is unlikely to facilitate privilege
escalation.
14. GNU GLibC Unspecified Insecure Temporary File Creation Vulne...
BugTraq ID: 11286
Remote: No
Date Published: Sep 30 2004
Relevant URL: http://www.securityfocus.com/bid/11286
Summary:
GNU glibc is affected by an unspecified insecure temporary file
creation vulnerability. This issue is likely due to a design error that
causes the application to fail to verify the existence of a file before
writing to it.
An attacker may leverage this issue to overwrite arbitrary files with
the privileges of an unsuspecting user that activates the vulnerable
application. Reportedly this issue is unlikely to facilitate privilege
escalation.
15. GNU Troff (Groff) Unspecified Insecure Temporary File Creati...
BugTraq ID: 11287
Remote: No
Date Published: Sep 30 2004
Relevant URL: http://www.securityfocus.com/bid/11287
Summary:
GNU Troff (groff) is affected by an unspecified insecure temporary file
creation vulnerability. This issue is likely due to a design error
that causes the application to fail to verify the existance of a file
before writing to it.
An attacker may leverage this issue to overwrite arbitrary files with
the privileges of an unsuspecting user that activates the vulnerable
application. Reportedly this issue is unlikely to facilitate privilege
escalation.
16. GNU GZip Unspecified Insecure Temporary File Creation Vulner...
BugTraq ID: 11288
Remote: No
Date Published: Sep 30 2004
Relevant URL: http://www.securityfocus.com/bid/11288
Summary:
GNU gzip is affected by an unspecified insecure temporary file creation
vulnerability. This issue is likely due to a design error that causes
the application to fail to verify the existence of a file before
writing to it.
An attacker may leverage this issue to overwrite arbitrary files with
the privileges of an unsuspecting user that activates the vulnerable
application. Reportedly this issue is unlikely to facilitate privilege
escalation.
17. MIT Kerberos 5 Unspecified Insecure Temporary File Creation ...
BugTraq ID: 11289
Remote: No
Date Published: Sep 30 2004
Relevant URL: http://www.securityfocus.com/bid/11289
Summary:
MIT Kerberos 5 is affected by an unspecified insecure temporary file
creation vulnerability. This issue is likely due to a design error that
causes the application to fail to verify the existence of a file before
writing to it.
An attacker may leverage this issue to overwrite arbitrary files with
the privileges of an unsuspecting user that activates the vulnerable
application. Reportedly this issue is unlikely to facilitate privilege
escalation.
18. Trustix LVM Utilities Unspecified Insecure Temporary File Cr...
BugTraq ID: 11290
Remote: No
Date Published: Sep 30 2004
Relevant URL: http://www.securityfocus.com/bid/11290
Summary:
Trustix LVM Utilities are affected by an unspecified insecure temporary
file creation vulnerability. This issue is likely due to a design
error that causes the application to fail to verify a files existence
before writing to it.
An attacker may leverage this issue to overwrite arbitrary files with
the privileges of an unsuspecting user that activates the vulnerable
application. Reportedly this issue is unlikely to facilitate privilege
escalation.
19. MySQL Unspecified Insecure Temporary File Creation Vulnerabi...
BugTraq ID: 11291
Remote: No
Date Published: Sep 30 2004
Relevant URL: http://www.securityfocus.com/bid/11291
Summary:
MySQL is affected by an unspecified insecure temporary file creation
vulnerability. This issue is likely due to a design error that causes
the application to fail to verify the existance of a file before writing
to it.
An attacker may leverage this issue to overwrite arbitrary files with
the privileges of an unsuspecting user that activates the vulnerable
application. Reportedly this issue is unlikely to facilitate privilege
escalation.
20. NetaTalk Unspecified Insecure Temporary File Creation Vulner...
BugTraq ID: 11292
Remote: No
Date Published: Sep 30 2004
Relevant URL: http://www.securityfocus.com/bid/11292
Summary:
Netatalk is affected by an unspecified insecure temporary file creation
vulnerability. This issue is likely due to a design error that causes
the application to fail to verify the existance of a file before
writing to it.
An attacker may leverage this issue to overwrite arbitrary files with
the privileges of an unsuspecting user that activates the vulnerable
application. Reportedly this issue is unlikely to facilitate privilege
escalation.
21. OpenSSL Unspecified Insecure Temporary File Creation Vulnera...
BugTraq ID: 11293
Remote: No
Date Published: Sep 30 2004
Relevant URL: http://www.securityfocus.com/bid/11293
Summary:
OpenSSL is affected by an unspecified insecure temporary file creation
vulnerability. This issue is likely due to a design error that causes
the application to fail to verify the existance of a file before
writing to it.
An attacker may leverage this issue to overwrite arbitrary files with
the privileges of an unsuspecting user that activates the vulnerable
application. Reportedly this issue is unlikely to facilitate privilege
escalation.
22. Perl Unspecified Insecure Temporary File Creation Vulnerabil...
BugTraq ID: 11294
Remote: No
Date Published: Sep 30 2004
Relevant URL: http://www.securityfocus.com/bid/11294
Summary:
Perl is affected by an unspecified insecure temporary file creation
vulnerability. This issue is likely due to a design error that causes the
application to fail to verify the existance of a file before writing to
it.
An attacker may leverage this issue to overwrite arbitrary files with
the privileges of an unsuspecting user that activates the vulnerable
application. Reportedly this issue is unlikely to facilitate privilege
escalation.
23. PostgreSQL Unspecified Insecure Temporary File Creation Vuln...
BugTraq ID: 11295
Remote: No
Date Published: Sep 30 2004
Relevant URL: http://www.securityfocus.com/bid/11295
Summary:
PostgreSQL is affected by an unspecified insecure temporary file
creation vulnerability. This issue is likely due to a design error that
causes the application to fail to verify the existance of a file before
writing to it.
An attacker may leverage this issue to overwrite arbitrary files with
the privileges of an unsuspecting user that activates the vulnerable
application. Reportedly this issue is unlikely to facilitate privilege
escalation.
24. GNU Sharutils Multiple Buffer Overflow Vulnerabilities
BugTraq ID: 11298
Remote: Yes
Date Published: Oct 01 2004
Relevant URL: http://www.securityfocus.com/bid/11298
Summary:
GNU Sharutils are affected by multiple buffer overflow vulnerabilities.
These issues are due to a failure of the affected application to verify
the length of user-supplied strings prior to copying them into finite
process buffers.
Successful exploitation would immediately produce a denial of service
condition in the affected process. This issue may also be leveraged to
execute code on the affected system with the privileges of the user that
invoked the vulnerable application.
25. Proxytunnel Local Proxy Credential Disclosure Vulnerability
BugTraq ID: 11299
Remote: No
Date Published: Oct 01 2004
Relevant URL: http://www.securityfocus.com/bid/11299
Summary:
A vulnerability exists in proxytunnel that has the potential to expose
proxy credentials to other local users. Reportedly proxyuser/proxypass
data is not passed to the program in a secure manner, potentially
exposing this data to other users on the computer.
26. Kerio MailServer Unspecified Vulnerability
BugTraq ID: 11300
Remote: Yes
Date Published: Oct 01 2004
Relevant URL: http://www.securityfocus.com/bid/11300
Summary:
Kerio MailServer version 6.0.3 has been released. This release
addresses a potential security vulnerability in the Kerio MailServer
application. The cause and impact of this issue is currently unknown, however
this BID will be updated as more information becomes available.
All versions of Kerio MailServer prior to 6.0.3 are considered
vulnerable.
27. RealNetworks RealOne Player And RealPlayer Unspecified Web P...
BugTraq ID: 11307
Remote: Yes
Date Published: Sep 29 2004
Relevant URL: http://www.securityfocus.com/bid/11307
Summary:
RealOne Player and RealPlayer are affected by an unspecified
vulnerability. This issue may reportedly be exploited by a malicious Web page to
execute arbitrary code in the context of the software.
This issue was originally described in BID 11273 (RealNetworks RealOne
Player And RealPlayer Remote Vulnerabilities) and is now being assigned
its own BID.
28. RealNetworks RealOne Player And RealPlayer Unspecified File ...
BugTraq ID: 11308
Remote: Yes
Date Published: Sep 29 2004
Relevant URL: http://www.securityfocus.com/bid/11308
Summary:
RealPlayer and RealOne Player are prone to a vulnerability that may
allow an attacker to delete files on the client computer. The attacker
must know the path to the file that is targeted.
This issue was originally described in BID 11273 (RealNetworks RealOne
Player And RealPlayer Remote Vulnerabilities) and is now being assigned
its own BID.
29. RealNetworks RealOne Player And RealPlayer PNen3260.DLL Remo...
BugTraq ID: 11309
Remote: Yes
Date Published: Sep 29 2004
Relevant URL: http://www.securityfocus.com/bid/11309
Summary:
RealPlayer and RealOne Player are prone to a remote integer overflow
vulnerability. It is reported that the vulnerability exists in the
'pnen3260.dll' linked library of both RealPlayer and RealOne Player for
Microsoft Windows, Linux, and Mac OS platforms. The 'pnen3260.dll' library
is responsible for processing real-media '.rm' files.
The overflow will cause the corruption of heap-based memory management
structures. Ultimately this may permit an attacker to write to an
arbitrary location in the memory of the active process and in doing so
control execution flow.
A remote attacker may therefore exploit this vulnerability to execute
arbitrary attacker-supplied instructions in the context of a user that
is running a vulnerable version of the software.
This issue was originally described in BID 11273 (RealNetworks RealOne
Player And RealPlayer Remote Vulnerabilities) and is now being assigned
its own BID.
III. LINUX FOCUS LIST SUMMARY
-----------------------------
1. iptables & tcp wrappers (Thread)
Relevant URL:
http://www.securityfocus.com/archive/91/377415
IV. NEW PRODUCTS FOR LINUX PLATFORMS
------------------------------------
1. Cyber-Ark Inter-Business Vault
By: Cyber-Ark
Platforms: Linux, Windows 2000, Windows NT, Windows XP
Relevant URL:
http://www.cyber-ark.com/datasecuritysoftware/inter-business_vault.htm
Summary:
Based on Cyber-Ark Software's Vaulting Technology, the Inter-Business
Vault, an information security solution that enables organizations to
safely overcome traditional network boundaries in order to securely share
business information among customers, business partners, and remote
branches. It provides a seamless, LAN-like experience over the Internet
that includes all the security, performance, accessibility, and ease of
administration required to allow organizations to share everyday
information worldwide. To learn more about these core attributes of the
Inter-Business Vault click on the relevant link below:
2. EnCase Forensic Edition
By: Guidance Software Inc.
Platforms: DOS, FreeBSD, Linux, MacOS, NetBSD, OpenBSD, PalmOS,
Solaris, UNIX, Windows 2000, Windows 95/98, Windows NT, Windows XP
Relevant URL:
http://www.guidancesoftware.com/products/EnCaseForensic/index.shtm
Summary:
EnCase Forensic Edition Version 4 delivers the most advanced features
for computer forensics and investigations. With an intuitive GUI and
superior performance, EnCase Version 4 provides investigators with the
tools to conduct large-scale and complex investigations with accuracy and
efficiency. Guidance Software?s award winning solution yields
completely non-invasive computer forensic investigations while allowing
examiners to easily manage large volumes of computer evidence and view all
relevant files, including "deleted" files, file slack and unallocated
space.
The integrated functionality of EnCase allows the examiner to perform
all functions of the computer forensic investigation process. EnCase's
EnScript, a powerful macro-programming language and API included within
EnCase, allows investigators to build customized and reusable forensic
scripts.
3. KeyGhost SX
By: KeyGhost Ltd
Platforms: BeOS, DOS, Linux, OS/2, Solaris, SunOS, Windows 2000,
Windows 95/98, Windows NT, Windows XP
Relevant URL: http://www.keyghost.com/SX/
Summary:
KeyGhost SX discreetly captures and records all keystrokes typed,
including chat conversations, email, word processor, or even activity within
an accounting or specialist system. It is completely undetectable by
software scanners and provides you with one of the most powerful stealth
surveillance applications offered anywhere.
Because KeyGhost uses STRONG 128-Bit encryption to store the recorded
data in it?s own internal memory (not on the hard drive), it is
impossible for a network intruder to gain access to any sensitive data stored
within the device.
4. SafeKit
By: Evidian Inc.
Platforms: AIX, HP-UX, Linux, Solaris, Windows 2000
Relevant URL: http://www.evidian.com/safekit/index.htm
Summary:
Evidian's SafeKit technology makes it possible to render any
application available 24 hours per day. With no extra hardware: just use your
existing servers and install this software-only solution.
This provides ultimate scalability. As your needs grow, all you need to
do is add more standard servers into the cluster. With the load
balancing features of SafeKit, you can distribute applications over multiple
servers. If one system fails completely, the others will continue to
serve your users.
5. Astaro Linux Firewall
By: Astaro
Platforms: Linux
Relevant URL: http://www.astaro.com/php/statics.php?action=asl&lang=gb
Summary:
Astaro Linux Firewall: All-in-one firewall, virus protection, content
filtering and spam protection internet security software package for
Linux.
Free download for home users.
6. CAT Cellular Authentication Token and eAuthentication Servic...
By: Mega AS Consulting Ltd
Platforms: Java, Linux, OpenBSD, Os Independent, SecureBSD, Solaris,
UNIX, Windows 2000, Windows NT
Relevant URL: http://www.megaas.co.nz
Summary:
Low cost, easy to use Two Factor Authentication One Time Password token
using the Cellular. Does not use SMS or communication, manages multiple
OTP accounts - new technology. For any business that want a safer
access to its Internet Services. More information at our site.
We also provide eAuthentication service for businesses that will not
buy an Authentication product but would prefer to pay a monthly charge
for authentication services from our our CAT Server.
V. NEW TOOLS FOR LINUX PLATFORMS
--------------------------------
1. PIKT - Problem Informant/Killer Tool v1.17.0
By: Robert Osterlund, robert.osterlund@gsb.uchicago.edu
Relevant URL: http://pikt.org
Platforms: AIX, FreeBSD, HP-UX, IRIX, Linux, Solaris, SunOS
Summary:
PIKT is a cross-categorical, multi-purpose toolkit to monitor and
configure computer systems, organize system security, format documents,
assist command-line work, and perform other common systems administration
tasks.
PIKT's primary purpose is to report and fix problems, but its
flexibility and extendibility evoke many other uses limited only by your
imagination.
2. ID-Synch 3.1
By: M-Tech Information Technology, Inc.
Relevant URL: http://idsynch.com/
Platforms: AIX, AS/400, DG-UX, Digital UNIX/Alpha, HP-UX, IRIX, Linux,
MacOS, MPE/iX, Netware, OpenBSD, OpenVMS, OS/2, OS/390, RACF, Solaris,
SunOS, True64 UNIX, Ultrix, VM, VMS, VSE, Windows 2000, Windows NT
Summary:
ID-Synch is enterprise user provisioning software. It reduces the cost
of user administration, helps new and reassigned users get to work more
quickly, and ensures prompt and reliable access termination. This is
accomplished through automatic propagation of changes to user profiles
from systems of record to managed systems, with self service workflow for
security change requests, through consolidated and delegated user
administration, and with federation.
3. Nmap v3.70
By: Fyodor
Relevant URL: http://www.insecure.org/nmap/
Platforms: AIX, BSDI, FreeBSD, HP-UX, IRIX, Linux, NetBSD, OpenBSD,
Solaris, SunOS, UNIX
Summary:
Nmap is a utility for port scanning large networks, although it works
fine for single hosts. Sometimes you need speed, other times you may
need stealth. In some cases, bypassing firewalls may be required. Not to
mention the fact that you may want to scan different protocols (UDP,
TCP, ICMP, etc.). Nmap supports Vanilla TCP connect() scanning, TCP SYN
(half open) scanning, TCP FIN, Xmas, or NULL (stealth) scanning, TCP ftp
proxy (bounce attack) scanning, SYN/FIN scanning using IP frag
4. THC-Hydra v4.3
By: THC
Relevant URL: http://www.thc.org/releases/hydra-4.3-src.tar.gz
Platforms: AIX, FreeBSD, HP-UX, IRIX, Linux, NetBSD, OpenBSD, Solaris,
UNIX
Summary:
THC-Hydra - parallized login hacker is available: for Samba, FTP, POP3,
IMAP, Telnet, HTTP Auth, LDAP, NNTP, MySQL, VNC, ICQ, Socks5, PCNFS,
Cisco and more. Includes SSL support and is part of Nessus. Visit the
project web site to download Win32, Palm and ARM binaries. Changes:
important bugfix!
5. Pads 1.1
By: Matt Shelton
Relevant URL:
http://freshmeat.net/projects/pads/?branch_id=52504&release_id=169973
Platforms: Linux
Summary:
Pads (Passive Asset Detection System) is a signature-based detection
engine used to passively detect network assets. It is designed to
complement IDS technology by providing context to IDS alerts.
6. cenfw 0.3b
By: Peter Robinson
Relevant URL: http://www.securegateway.org
Platforms: Linux, Windows 2000, Windows NT, Windows XP
Summary:
The Centron IPTables Firewall Gui is an object oriented, database
driven, windows interface to linux IPtables firewall rules.
VII. SPONSOR INFORMATION
-----------------------
This Issue is Sponsored By: SecurityFocus
Stay up to date. All the latest news, columns, jobs and more in a
convenient html newsletter - Even a glimpse of upcoming columns and
feature
articles! Sign up today!
http://www.securityfocus.com/htmlnewsletter/subscribe