Date: | 16 Nov 2004 21:13:06 -0000 |
From: | "Peter Laborge" <plaborge@securityfocus.com>
| To: | linux-secnews@securityfocus.com |
Subject: | SecurityFocus Linux Newsletter #210 |
SecurityFocus Linux Newsletter #210
------------------------------------
This Issue is Sponsored By: Symantec
Need to know what's happening on YOUR network? Symantec DeepSight
Analyzer
is a free service that gives you the ability to track and manage
attacks.
Analyzer automatically correlates attacks from various Firewall and
network
based Intrusion Detection Systems, giving you a comprehensive view of
your
computer or general network. Sign up today!
http://www.securityfocus.com/sponsor/Symantec_linux-secnews_041116
------------------------------------------------------------------------
I. FRONT AND CENTER
1. The Worst Case Scenario
II. LINUX VULNERABILITY SUMMARY
1. Gentoo Linux Multiple PDF EBuild Updates Unspecified Vulnera...
2. Gentoo Portage Dispatch-Conf Insecure Temporary File Creatio...
3. Gentoo Gentoolkit QPKG Insecure Temporary File Creation Vuln...
4. Yukihiro Matsumoto Ruby CGI Module Unspecified Denial Of Ser...
5. Samba Remote Wild Card Denial Of Service Vulnerability
6. EGroupWare JiNN Application Unspecified Vulnerability
7. Pavuk Multiple Unspecified Remote Buffer Overflow Vulnerabil...
8. Up-IMAPProxy Multiple Remote Vulnerabilities
9. Nucleus CMS Multiple Unspecified Input Validation Vulnerabil...
10. SQLgrey Postfix Greylisting Service SQL Injection
Vulnerabil...
11. Samhain Labs Samhain Database Update Local Heap Overflow
Vul...
12. MTink Insecure Temporary File Creation Vulnerability
13. Mozilla Firefox Download Dialogue Box File Name Spoofing
Vul...
14. Mozilla Firefox Insecure Default Installation Vulnerability
15. Linux Kernel BINFMT_ELF Loader Local Privilege Escalation
Vu...
16. BNC getnickuserhost IRC Server Response Buffer Overflow
Vuln...
17. SquirrelMail decodeHeader HTML Injection Vulnerability
18. JWhois Double Free Memory Corruption Vulnerability
19. EZ-IPupdate Remote Format String Vulnerability
20. Davfs2 Insecure Temporary File Creation Vulnerability
21. GD Graphics Library Multiple Unspecified Remote Buffer
overf...
22. ARJ Software UNARJ Remote Buffer Overflow Vulnerability
23. OpenSkat Weak Encryption Key Generation Vulnerability
24. GratiSoft Sudo Restricted Command Execution Bypass
Vulnerabi...
III. LINUX FOCUS LIST SUMMARY
NO NEW POSTS FOR THE WEEK 2004-11-09 to 2004-11-16.
IV. NEW PRODUCTS FOR LINUX PLATFORMS
1. Cyber-Ark Inter-Business Vault
2. EnCase Forensic Edition
3. KeyGhost SX
4. SafeKit
5. Astaro Linux Firewall
6. CAT Cellular Authentication Token and eAuthentication Servic...
V. NEW TOOLS FOR LINUX PLATFORMS
1. ksb26-2.6.9 Kernel Socks Bouncer for 2.6.x kernels 2.6.9
2. rootsh 0.2
3. Maillog View v1.03.3
4. BullDog Firewall 20040918
5. PIKT - Problem Informant/Killer Tool v1.17.0
6. ID-Synch 3.1
VII. SPONSOR INFORMATION
I. FRONT AND CENTER
-------------------
1. The Worst Case Scenario
By Mark Rasch
The fine print in an insurance policy becomes an issue when a bizarre
chain
of IT disasters leaves a company without a single copy of the source
code
to its flagship product.
http://www.securityfocus.com/columnists/276
II. LINUX VULNERABILITY SUMMARY
-------------------------------
1. Gentoo Linux Multiple PDF EBuild Updates Unspecified Vulnera...
BugTraq ID: 11614
Remote: Yes
Date Published: Nov 06 2004
Relevant URL: http://www.securityfocus.com/bid/11614
Summary:
Gentoo Linux released updated Xpdf, CUPS, GPdf, KPDF and KOffice
eBuilds to address the vulnerability described in BID 11501 (Xpdf PDFTOPS
Multiple Integer Overflow Vulnerabilities) on October 28, 2004.
The vendor has reported that these updated eBuilds introduced an
unspecified vulnerability. The vulnerability is reported to present itself
only on 64-bit platforms.
2. Gentoo Portage Dispatch-Conf Insecure Temporary File Creatio...
BugTraq ID: 11616
Remote: No
Date Published: Nov 07 2004
Relevant URL: http://www.securityfocus.com/bid/11616
Summary:
The Gentoo dispatch-conf script is affected by an unspecified insecure
temporary file creation vulnerability. This issue is likely due to a
design error that causes the application to fail to verify the existence
of a file before writing to it.
An attacker may leverage this issue to overwrite arbitrary files with
the privileges of an unsuspecting user that activates the vulnerable
application.
3. Gentoo Gentoolkit QPKG Insecure Temporary File Creation Vuln...
BugTraq ID: 11617
Remote: No
Date Published: Nov 07 2004
Relevant URL: http://www.securityfocus.com/bid/11617
Summary:
The qpkg utility is affected by an unspecified insecure temporary file
creation vulnerability. This issue is likely due to a design error
that causes the application to fail to verify the existence of a file
before writing to it.
An attacker may leverage this issue to overwrite arbitrary files with
the privileges of an unsuspecting user that activates the vulnerable
application.
4. Yukihiro Matsumoto Ruby CGI Module Unspecified Denial Of Ser...
BugTraq ID: 11618
Remote: Yes
Date Published: Nov 08 2004
Relevant URL: http://www.securityfocus.com/bid/11618
Summary:
Ruby is reported prone to a remote denial of service vulnerability. It
is reported that when the Ruby CGI module handles certain requests, it
may fall into an infinite loop and consume system CPU resources.
A remote attacker may exploit this vulnerability to deny service to a
computer that is running the affected Ruby CGI module.
5. Samba Remote Wild Card Denial Of Service Vulnerability
BugTraq ID: 11624
Remote: Yes
Date Published: Nov 08 2004
Relevant URL: http://www.securityfocus.com/bid/11624
Summary:
A remote denial of service vulnerability affects the wild card file
name functionality of Samba. This issue is caused due to a failure of the
application to properly validate malformed user-supplied strings.
An attacker may leverage this issue to cause the affected application
to hang, effectively denying service to legitimate users.
6. EGroupWare JiNN Application Unspecified Vulnerability
BugTraq ID: 11625
Remote: Yes
Date Published: Nov 08 2004
Relevant URL: http://www.securityfocus.com/bid/11625
Summary:
eGroupWare JiNN application is reported prone to an unspecified
vulnerability.
Further details of this issue are not available at the time of writing.
This BID will be updated as details are released.
7. Pavuk Multiple Unspecified Remote Buffer Overflow Vulnerabil...
BugTraq ID: 11626
Remote: Yes
Date Published: Nov 08 2004
Relevant URL: http://www.securityfocus.com/bid/11626
Summary:
Pavuk is reported prone to multiple unspecified remote buffer overflow
vulnerabilities. These issue exist due to insufficient boundary checks
performed by the application. A remote attacker may exploit these
vulnerabilities to cause a denial of service condition or execute arbitrary
code on a vulnerable computer.
In addition to these vulnerabilities, Pavuk is reported prone to other
buffer overflow vulnerabilities affecting the digest authentication
handler and the HTTP header processing functionality. It is likely that
these issues are related to BIDS 10633 and 10797. This information
cannot be confirmed at the moment. This BID will be updated as more
information becomes available.
Pavuk versions 0.9pl30b and prior are affected by these
vulnerabilities.
8. Up-IMAPProxy Multiple Remote Vulnerabilities
BugTraq ID: 11630
Remote: Yes
Date Published: Nov 08 2004
Relevant URL: http://www.securityfocus.com/bid/11630
Summary:
up-imapproxy is reported prone to multiple remote vulnerabilities. The
following specific issues are reported:
It is reported that multiple denial of service conditions exist in the
way up-imapproxy handles literal values. Literal data processed by
affected functions will result in a denial of service. Additionally, a
literal value passed as a command to the affected service will result in a
denial of service if the command does not exist.
A remote attacker may exploit these vulnerabilities to crash the
affected service effectively denying service to legitimate users.
Finally, it is reported that literal value sizes are stored in signed
integer format. The discoverer of these vulnerabilities reports that
this may result in a boundary condition on 64-bit platforms.
A remote attacker may potentially exploit this condition to reveal
potentially sensitive data.
It should be noted that reports indicate that up-imapproxy may not
actually execute on 64-bit platforms.
9. Nucleus CMS Multiple Unspecified Input Validation Vulnerabil...
BugTraq ID: 11631
Remote: Yes
Date Published: Nov 09 2004
Relevant URL: http://www.securityfocus.com/bid/11631
Summary:
Multiple unspecified vulnerabilities reportedly affect Nucleus CMS.
These issue are due to a failure of the application to properly sanitize
user-supplied input prior to employing it in critical locations
including dynamic content and database queries.
A remote attacker may leverage these issues to steal cookie-based
authentication credentials, reveal sensitive data and corrupt database
contents.
10. SQLgrey Postfix Greylisting Service SQL Injection Vulnerabil...
BugTraq ID: 11633
Remote: Yes
Date Published: Nov 08 2004
Relevant URL: http://www.securityfocus.com/bid/11633
Summary:
SQLgrey Postfix Greylisting Service is prone to an SQL injection
vulnerability. This issue is reportedly due to insufficient sanitization of
SQL syntax from fields in email processed by the software.
The issue could be exploited to influence SQL queries, potentially
allowing for compromise of the software or other attacks that impact
database security.
11. Samhain Labs Samhain Database Update Local Heap Overflow Vul...
BugTraq ID: 11635
Remote: No
Date Published: Nov 08 2004
Relevant URL: http://www.securityfocus.com/bid/11635
Summary:
A locally exploitable heap-based buffer overflow exists in Samhain.
This issue is exposed when the database is run in update mode and may
allow a malicious local user to execute arbitrary code with superuser
privileges if successfully exploited.
12. MTink Insecure Temporary File Creation Vulnerability
BugTraq ID: 11640
Remote: No
Date Published: Nov 09 2004
Relevant URL: http://www.securityfocus.com/bid/11640
Summary:
The MTink package is affected by an unspecified insecure temporary file
creation vulnerability. This issue is likely due to a design error
that causes the application to fail to verify the existence of a file
before writing to it.
An attacker may leverage this issue to overwrite arbitrary files with
the privileges of an unsuspecting user that activates the vulnerable
application.
13. Mozilla Firefox Download Dialogue Box File Name Spoofing Vul...
BugTraq ID: 11643
Remote: Yes
Date Published: Nov 10 2004
Relevant URL: http://www.securityfocus.com/bid/11643
Summary:
A download dialogue box file name spoofing vulnerability affects
Mozilla Firefox. This issue is due to a design error that facilitates the
spoofing of file names.
An attacker may leverage this issue to spoof downloaded file names to
unsuspecting users. This issue may lead to a compromise of the target
computer as well as other consequences.
NOTE: This issue has been fixed by reducing the number of space
characters displayed in the dialogue box. It should be noted that this issue
may still be triggered by using other characters to fill the space such
as non-displayable characters and even extremely long file names.
Users should be cautious about downloading files with the affected
application.
14. Mozilla Firefox Insecure Default Installation Vulnerability
BugTraq ID: 11644
Remote: No
Date Published: Nov 10 2004
Relevant URL: http://www.securityfocus.com/bid/11644
Summary:
Mozilla Firefox is a Web browser developed and supported by the Mozilla
Organization. It is freely available for most UNIX and Linux based
operating systems as well as Microsoft Windows.
An insecure default installation vulnerability affects Mozilla Firefox.
This issue is due to a failure of the application to place secure
permissions on installed files. It should be noted that this issue only
affects the vulnerable application installed on the Apple Mac OS X
platform.
An unsuspecting user that double-clicks on such an affected application
may have attacker-specified code executing with their privileges,
potentially facilitating privilege escalation.
15. Linux Kernel BINFMT_ELF Loader Local Privilege Escalation Vu...
BugTraq ID: 11646
Remote: No
Date Published: Nov 10 2004
Relevant URL: http://www.securityfocus.com/bid/11646
Summary:
Multiple vulnerabilities have been identified in the Linux ELF binary
loader. These issues can allow local attackers to gain elevated
privileges. The source of these issues is present in the 'load_elf_binary'
function of the 'binfmt_elf.c' file.
The first issue results from an improper check performed on the return
value of the 'kernel_read' function. An attacker may gain control over
execution flow of a setuid binary by modifying the memory layout of a
binary.
The second issue results from improper error handling when the mmap()
function fails.
The third vulnerability results from a bad return value when the
program interpreter (linker) is mapped into memory. It is reported that this
issue only occurs in the 2.4.x versions of the Linux kernel.
The fourth vulnerable condition presents itself because a user can
execute a binary with a malformed interpreter name string. This issue can
lead to a system crash.
The final issue exists in the execve() code. This issue may allow an
attacker to disclose sensitive data that can potentially be used to gain
elevated privileges.
These issues are currently undergoing further analysis. This BID will
be updated and divided into separate BIDS in the future.
16. BNC getnickuserhost IRC Server Response Buffer Overflow Vuln...
BugTraq ID: 11647
Remote: Yes
Date Published: Nov 10 2004
Relevant URL: http://www.securityfocus.com/bid/11647
Summary:
A remotely exploitable stack-based buffer overflow has been reported in
BNC. This issue may be triggered when a malformed IRC (Internet Relay
Chat) server response is handled by the proxy.
If successfully exploited, this would allow execution of arbitrary code
in the context of the proxy.
17. SquirrelMail decodeHeader HTML Injection Vulnerability
BugTraq ID: 11653
Remote: Yes
Date Published: Nov 10 2004
Relevant URL: http://www.securityfocus.com/bid/11653
Summary:
SquirrelMail is reported to be prone to an email header HTML injection
vulnerability. This issue is due to a failure of the application to
properly sanitize user-supplied email header strings.
An attacker can exploit this issue to gain access to an unsuspecting
user's cookie based authentication credentials; disclosure of personal
email is possible. Other attacks are also possible.
18. JWhois Double Free Memory Corruption Vulnerability
BugTraq ID: 11656
Remote: Yes
Date Published: Nov 10 2004
Relevant URL: http://www.securityfocus.com/bid/11656
Summary:
It is reported that jwhois is susceptible to a double free
vulnerability.
If jwhois attempts to process whois requests that result in more than
one redirection, it is reported that a double free condition will occur.
It is conjectured that it may be possible for remote attackers to
exploit this vulnerability to write to arbitrary locations in memory,
facilitating the execution of attacker-supplied code. This has not been
confirmed.
This vulnerability may not actually be exploitable. This BID will be
updated or retired as further information is disclosed.
19. EZ-IPupdate Remote Format String Vulnerability
BugTraq ID: 11657
Remote: Yes
Date Published: Nov 11 2004
Relevant URL: http://www.securityfocus.com/bid/11657
Summary:
EZ-IPupdate is vulnerable to a remotely exploitable format string
vulnerability when running in daemon-mode. The vulnerability is present
even if "quiet" mode is enabled.
20. Davfs2 Insecure Temporary File Creation Vulnerability
BugTraq ID: 11661
Remote: No
Date Published: Nov 11 2004
Relevant URL: http://www.securityfocus.com/bid/11661
Summary:
Davfs2 is affected by an insecure temporary file creation
vulnerability. This issue is likely due to a design error that causes the
application to fail to verify a files existence before writing to it.
An attacker may leverage this issue to overwrite arbitrary files with
the privileges of an unsuspecting user that activates the vulnerable
application.
21. GD Graphics Library Multiple Unspecified Remote Buffer overf...
BugTraq ID: 11663
Remote: Yes
Date Published: Nov 12 2004
Relevant URL: http://www.securityfocus.com/bid/11663
Summary:
Multiple unspecified remote buffer overflow vulnerabilities have been
identified in the GD Graphics Library. These issues are due to a
failure of the library to do sufficient bounds checking prior to processing
user-specified strings.
An attacker may leverage these issues to remotely execute arbitrary
code on a computer with the privileges of a user that views a malicious
image file. This may facilitate unauthorized access or privilege
escalation.
22. ARJ Software UNARJ Remote Buffer Overflow Vulnerability
BugTraq ID: 11665
Remote: Yes
Date Published: Nov 12 2004
Relevant URL: http://www.securityfocus.com/bid/11665
Summary:
A remote buffer overflow vulnerability affects ARJ Software's unarj.
This issue is caused by a failure of the application to carry out
sufficient bounds checking on user-supplied strings prior to processing.
A remote attacker may leverage this issue to execute arbitrary code
with the privileges of a user that process a malicious file with the
affected application. This may facilitate unauthorized access or privilege
escalation.
23. OpenSkat Weak Encryption Key Generation Vulnerability
BugTraq ID: 11667
Remote: Yes
Date Published: Nov 12 2004
Relevant URL: http://www.securityfocus.com/bid/11667
Summary:
A weak encryption key generation vulnerability affects openSkat. This
issue is due to a design error that causes the application to generate
weak encryption keys.
An attacker may leverage this issue to derive the private keys of a
user running the vulnerable application through factorization attacks.
24. GratiSoft Sudo Restricted Command Execution Bypass Vulnerabi...
BugTraq ID: 11668
Remote: No
Date Published: Nov 12 2004
Relevant URL: http://www.securityfocus.com/bid/11668
Summary:
A restricted command execution bypass vulnerability affects GratiSoft's
Sudo application. This issue is due to a design error that causes the
application to fail to properly sanitize user-supplied environment
variables.
An attacker with sudo privileges may leverage this issue to execute
commands that are explicitly disallowed. This may facilitate privileges
escalation and certainly leads to a false sense of security.
III. LINUX FOCUS LIST SUMMARY
-----------------------------
NO NEW POSTS FOR THE WEEK 2004-11-09 to 2004-11-16.
IV. NEW PRODUCTS FOR LINUX PLATFORMS
------------------------------------
1. Cyber-Ark Inter-Business Vault
By: Cyber-Ark
Platforms: Linux, Windows 2000, Windows NT, Windows XP
Relevant URL:
http://www.cyber-ark.com/datasecuritysoftware/inter-business_vault.htm
Summary:
Based on Cyber-Ark Software's Vaulting Technology, the Inter-Business
Vault, an information security solution that enables organizations to
safely overcome traditional network boundaries in order to securely share
business information among customers, business partners, and remote
branches. It provides a seamless, LAN-like experience over the Internet
that includes all the security, performance, accessibility, and ease of
administration required to allow organizations to share everyday
information worldwide. To learn more about these core attributes of the
Inter-Business Vault click on the relevant link below:
2. EnCase Forensic Edition
By: Guidance Software Inc.
Platforms: DOS, FreeBSD, Linux, MacOS, NetBSD, OpenBSD, PalmOS,
Solaris, UNIX, Windows 2000, Windows 95/98, Windows NT, Windows XP
Relevant URL:
http://www.guidancesoftware.com/products/EnCaseForensic/index.shtm
Summary:
EnCase Forensic Edition Version 4 delivers the most advanced features
for computer forensics and investigations. With an intuitive GUI and
superior performance, EnCase Version 4 provides investigators with the
tools to conduct large-scale and complex investigations with accuracy and
efficiency. Guidance Software?s award winning solution yields
completely non-invasive computer forensic investigations while allowing
examiners to easily manage large volumes of computer evidence and view all
relevant files, including "deleted" files, file slack and unallocated
space.
The integrated functionality of EnCase allows the examiner to perform
all functions of the computer forensic investigation process. EnCase's
EnScript, a powerful macro-programming language and API included within
EnCase, allows investigators to build customized and reusable forensic
scripts.
3. KeyGhost SX
By: KeyGhost Ltd
Platforms: BeOS, DOS, Linux, OS/2, Solaris, SunOS, Windows 2000,
Windows 95/98, Windows NT, Windows XP
Relevant URL: http://www.keyghost.com/SX/
Summary:
KeyGhost SX discreetly captures and records all keystrokes typed,
including chat conversations, email, word processor, or even activity within
an accounting or specialist system. It is completely undetectable by
software scanners and provides you with one of the most powerful stealth
surveillance applications offered anywhere.
Because KeyGhost uses STRONG 128-Bit encryption to store the recorded
data in it?s own internal memory (not on the hard drive), it is
impossible for a network intruder to gain access to any sensitive data stored
within the device.
4. SafeKit
By: Evidian Inc.
Platforms: AIX, HP-UX, Linux, Solaris, Windows 2000
Relevant URL: http://www.evidian.com/safekit/index.htm
Summary:
Evidian's SafeKit technology makes it possible to render any
application available 24 hours per day. With no extra hardware: just use your
existing servers and install this software-only solution.
This provides ultimate scalability. As your needs grow, all you need to
do is add more standard servers into the cluster. With the load
balancing features of SafeKit, you can distribute applications over multiple
servers. If one system fails completely, the others will continue to
serve your users.
5. Astaro Linux Firewall
By: Astaro
Platforms: Linux
Relevant URL: http://www.astaro.com/php/statics.php?action=asl&lang=gb
Summary:
Astaro Linux Firewall: All-in-one firewall, virus protection, content
filtering and spam protection internet security software package for
Linux.
Free download for home users.
6. CAT Cellular Authentication Token and eAuthentication Servic...
By: Mega AS Consulting Ltd
Platforms: Java, Linux, OpenBSD, Os Independent, SecureBSD, Solaris,
UNIX, Windows 2000, Windows NT
Relevant URL: http://www.megaas.co.nz
Summary:
Low cost, easy to use Two Factor Authentication One Time Password token
using the Cellular. Does not use SMS or communication, manages multiple
OTP accounts - new technology. For any business that want a safer
access to its Internet Services. More information at our site.
We also provide eAuthentication service for businesses that will not
buy an Authentication product but would prefer to pay a monthly charge
for authentication services from our our CAT Server.
V. NEW TOOLS FOR LINUX PLATFORMS
--------------------------------
1. ksb26-2.6.9 Kernel Socks Bouncer for 2.6.x kernels 2.6.9
By: Paolo Ardoino
Relevant URL: http://ardoino.altervista.org/kernel.php
Platforms: Linux
Summary:
KSB26 [Kernel Socks Bouncer] is Linux Kernel 2.6.x patch that redirects
full tcp connections [SSH, telnet, ...] to follow through socks5. KSB26
uses a character device to pass socks5 and target ips to the Linux
Kernel. I have choosen to write in kernel space to enjoy myself [I know
that there are easier and safer ways to write this in userspace].
2. rootsh 0.2
By: Gerhard Lausser
Relevant URL: http://sourceforge.net/projects/rootsh/
Platforms: AIX, HP-UX, Linux, POSIX, SINIX, Solaris, UNIX
Summary:
Rootsh is a wrapper for shells which logs all echoed keystrokes and
terminal output to a file and/or to syslog. It's main purpose is the
auditing of users who need a shell with root privileges. They start rootsh
through the sudo mechanism. I's in heavy use here at a big bavarian car
manufacturer (three letters, fast, cool,...) for project users whom you
can't deny root privileges.
3. Maillog View v1.03.3
By: Angelo 'Archie' Amoruso
Relevant URL: http://www.netorbit.it/modules.html
Platforms: Linux
Summary:
Maillog View is a Webmin module that allows you to easily view all your
/var/log/maillog.* files. It features autorefresh, message size
indication, ascending/descending view order, compressed file support, and a
full statistics page. Sendmail, Postfix, Exim, and Qmail (partially) are
supported. Courier MTA support is experimental.
4. BullDog Firewall 20040918
By: Robert APM Darin
Relevant URL: http://tanaya.net/BullDog
Platforms: Linux
Summary:
Bulldog is a powerful but lightweight firewall for heavy use systems.
With many features, this firewall can be used by anyone who wants to
protect his/her systems.
This system allow dynamic and static rules sets for maximum protection
and has several advance features.
This firewall will work for the hobbyist or a military base. Generation
7 is a complete rewrite and redesign from scratch.
Be prepared to spend some time setting this up.
5. PIKT - Problem Informant/Killer Tool v1.17.0
By: Robert Osterlund, robert.osterlund@gsb.uchicago.edu
Relevant URL: http://pikt.org
Platforms: AIX, FreeBSD, HP-UX, IRIX, Linux, Solaris, SunOS
Summary:
PIKT is a cross-categorical, multi-purpose toolkit to monitor and
configure computer systems, organize system security, format documents,
assist command-line work, and perform other common systems administration
tasks.
PIKT's primary purpose is to report and fix problems, but its
flexibility and extendibility evoke many other uses limited only by your
imagination.
6. ID-Synch 3.1
By: M-Tech Information Technology, Inc.
Relevant URL: http://idsynch.com/
Platforms: AIX, AS/400, DG-UX, Digital UNIX/Alpha, HP-UX, IRIX, Linux,
MacOS, MPE/iX, Netware, OpenBSD, OpenVMS, OS/2, OS/390, RACF, Solaris,
SunOS, True64 UNIX, Ultrix, VM, VMS, VSE, Windows 2000, Windows NT
Summary:
ID-Synch is enterprise user provisioning software. It reduces the cost
of user administration, helps new and reassigned users get to work more
quickly, and ensures prompt and reliable access termination. This is
accomplished through automatic propagation of changes to user profiles
from systems of record to managed systems, with self service workflow for
security change requests, through consolidated and delegated user
administration, and with federation.
VII. SPONSOR INFORMATION
-----------------------
This Issue is Sponsored By: Symantec
Need to know what's happening on YOUR network? Symantec DeepSight
Analyzer
is a free service that gives you the ability to track and manage
attacks.
Analyzer automatically correlates attacks from various Firewall and
network
based Intrusion Detection Systems, giving you a comprehensive view of
your
computer or general network. Sign up today!
http://www.securityfocus.com/sponsor/Symantec_linux-secnews_041116