Information Security News mailing list archives
Linux Security Week, August 21, 2000 (fwd)
From: InfoSec News <isn () C4I ORG>
Date: Tue, 22 Aug 2000 02:08:41 -0500
Forwarded By: newsletter-admins () linuxsecurity com +---------------------------------------------------------------------+ | LinuxSecurity.com Weekly Newsletter | | August 21, 2000 Volume 1, Number 17 | | | | Editorial Team: Dave Wreski dave () linuxsecurity com | | Benjamin Thomas ben () linuxsecurity com | +---------------------------------------------------------------------+ Thank you for reading the LinuxSecurity.com weekly security newsletter. The purpose of this document is to provide our readers with a quick summary of each week's most relevant Linux security headlines and system advisories. This week, advisories for xlockmore, zope, apache-ssl, cvsweb, dhclient, perl, proftpd, and ntop were released. Of these, proftpd, dhclient and perl have root vulnerabilities. ------------------- Sponsor: Our sponsor this week is WebTrends. Their Security Analyzer has the most vulnerability tests available for Red Hat & VA Linux. It uses advanced agent-based technology, enabling you to scan your Linux servers from your Windows NT/2000 console and protect them against potential threats. Now with over 1,000 tests available. http://www.webtrends.com/redirect/linuxsecurity1.htm HTML Version: http://www.linuxsecurity.com/newsletter.html --------------------- Advisories This Week: --------------------- * Conectiva: xlockmore vulnerabilty August 18th, 2000 Xlock is a screensaver with locking capabilities. It is a SUID root program, but drops its privileges as soon as possible, but the encrypted user passwords remain in memory. http://www.linuxsecurity.com/advisories/other_advisory-641.html * Debian: xlockmore vulnerability August 17th, 2000 Xlock is a screensaver with locking capabilities. It is a SUID root program, but drops its privileges as soon as possible, but the encrypted user passwords remain in memory. A format bug exists in the processing of the -d command line option that could allow an attacker to read these encrypted passwords. http://www.linuxsecurity.com/advisories/debian_advisory-640.html * Mandrake: zope vulnerability August 16th, 2000 A problem exists in the Zope package with the getRoles method of user objects contained in the default UserFolder implementation. Users with the ability to edit DTML could arrange to give themselves extra roles for the duration of a single request by mutating the roles list as a part of the request process. http://www.linuxsecurity.com/advisories/mandrake_advisory-639.html * Conectiva: zope vulnerability August 16th, 2000 The issue involves the fact that the getRoles method of user objects contained in the default UserFolder implementation returns a mutable Python type. Because the mutable object is still associated with the persistent User object, users with the ability to edit DTML could arrange to give themselves extra roles for the duration of a single request by mutating the roles list as a part of the request processing. http://www.linuxsecurity.com/advisories/other_advisory-638.html * Trustix: apache-ssl vulnerability August 15th, 2000 Due to a typo in the rpm spec file for apache-ssl, /usr/sbin/httpsd on a Trustix system will be installed with mode 756 instead of 755, making a binary file that will be run by root world writable. It should not be necessary to explain why this is an extremely bad thing. http://www.linuxsecurity.com/advisories/other_advisory-637.html * FreeBSD: zope vulerability August 14th, 2000 The zope port is not installed by default, nor is it "part of FreeBSD" as such: it is part of the FreeBSD ports collection, which contains nearly 3700 third-party applications in a ready-to-install format. The ports collections shipped with FreeBSD 3.5 contains this problem, but FreeBSD 4.1 did not ship with the proftpd package (and the port was disabled to prevent building) because the vulnerability was known but not yet fixed. http://www.linuxsecurity.com/advisories/freebsd_advisory-636.html * FreeBSD: cvsweb vulnerability August 14th, 2000 The cvsweb port, versions prior to 1.86, contains a vulnerability which allows users with commit access to a CVS repository monitored by cvsweb to execute arbitrary code as the user running the cvsweb.cgi script, which may be located on another machine where the committer has no direct access. The vulnerability is that cvsweb does not correctly process input obtained from the repository and is vulnerable to embedding of commands in committed filenames. Such an action is however usually highly visible in the CVS repository and provides an audit trail of sorts for such abuses unless the committer has access to modify the repository files directly to cover his or her tracks. http://www.linuxsecurity.com/advisories/freebsd_advisory-635.html * Trustix: perl and mailx vulnerability August 14th, 2000 Exploit code for this hole is "in the wild" so all people running Trustix Secure Linux, especially on systems with untrusted local users, should upgrade. The hole affects both release 1.0x and 1.1 - Users of 1.0x should use the updates from the 1.1 directory. http://www.linuxsecurity.com/advisories/other_advisory-631.html * FreeBSD: dhclient vulnerability August 14th, 2000 The dhclient utility (DHCP client), versions 2.0pl2 and before (for the version 2.x series), and versions 3.0b1pl16 and before (for the version 3.x series) does not correctly validate input from the server, allowing a malicious DHCP server to execute arbitrary commands as root on the client. DHCP may be enabled if your system was initially configured from a DHCP server at install-time, or if you have specifically enabled it after installation. http://www.linuxsecurity.com/advisories/freebsd_advisory-632.html * FreeBSD: proftpd vulnerability August 14th, 2000 The proftpd port, versions prior to 1.2.0rc2, contains a vulnerability which allows FTP users, both anonymous FTP users and those with a valid account, to execute arbitrary code as root on the local machine, by inserting string-formatting operators into command input, which are incorrectly parsed by the FTP server. http://www.linuxsecurity.com/advisories/freebsd_advisory-633.html * FreeBSD: ntop vulnerability August 14th, 2000 The ntop software is written in a very insecure style, with many potentially exploitable buffer overflows (including several demonstrated ones) which could in certain conditions allow the local or remote user to execute arbitrary code on the local system with increased privileges. http://www.linuxsecurity.com/advisories/freebsd_advisory-634.html ----------------------- Top Articles This Week: ----------------------- * Web Privacy: ActivatorDesk(tm) To Respond To Issues On CBS's 60 Minutes August 18th, 2000 There is a new tool in the fight for web privacy. After viewing 60 Minutes Sunday August 13th, world-renowned inventor Roger Heath was inspired to announce its pending release. It's called ActivatorDesk, and with it you may automatically block advertisers from snooping on you as you browse. You may also view and manage the cookies you collect as you browse the web. "As I watched 60 Minutes I realized it would frighten those watching, and I want everyone to know we have been working on a solution," said Mr. Heath,"there is some light at the end of the privacy tunnel." http://www.linuxsecurity.com/articles/privacy_article-1398.html * Do security holes demand full disclosure? August 16th, 2000 Weld Pond writes "Every once in a while we need to step back and reassess the effects of the release of detailed security information and tools on the real world. And that's what happened recently at DEF CON 8.0, the annual hacking conference held in Las Vegas." Mr. Pond offers a very good perspective. While I for one am 100% for full disclosure I can see both sides of the argument. http://www.linuxsecurity.com/articles/security_sources_article-1369.html * Tracking your every move August 15th, 2000 Robert O'Harrow writes: "A Boston technology firm is surreptitiously tracking computer users across the Internet on behalf of pharmaceutical companies, a practice that demonstrates the limits of a recent agreement to protect the privacy of Web surfers." http://www.linuxsecurity.com/articles/privacy_article-1361.html * GAO calls for proactive Internet Security August 18th, 2000 The Internet will never be fully secure, but diligence and a number of safeguards applied by businesses and government could curb hackers' access to proprietary information, a General Accounting Office official said Wednesday. "The Internet is not secure for a reason," said Rahul Gupta, assistant director in the Office of the Chief Technologist at GAO. "It was designed to share information, not protect it from something." Gupta addressed the American Institute of Certified Public Accountants' national auditing update conference. http://www.linuxsecurity.com/articles/general_article-1381.html * Securing The Corporate Network August 18th, 2000 Another security paper? That might be your initial response, but this will not be just "another" expose of the ever increasing problems with technological security in the computerized world. This is the final word on how to maintain your sanity and save your organization from feeling like a tennis ball at Wimbledon. http://www.linuxsecurity.com/articles/general_article-1382.html * Security : A daft assertion, or the insecurity of security August 16th, 2000 An article appeared on the Silicon.com website in March in which a "security expert" claimed that Linux was insecure because of the open source nature of the code, a surprising if not astonishing claim. The expert went on to claim that Unix in general was less secure than other operating systems because of its more open nature, which, given the modern history of computing, is curious to say the least. One has to ask, are these experts serious? http://www.linuxsecurity.com/articles/general_article-1362.html * VPNs take center stage August 15th, 2000 Virtual private networks merge IP technology with encryption to offer significant cost savings on WAN traffic.Sure you want a VPN. It can save you money. It can give you a better-meshed network. It can let more people share your enterprise resources securely. http://www.linuxsecurity.com/articles/network_security_article-1355.html * Stupid, Stupid Protocols: Telnet, FTP, rsh/rcp/rlogin August 14th, 2000 In this article, I start by discussing the weaknesses of each of the these absolutely horrid protocols. I then introduce secure shell (ssh) and provide an in-depth guide to using it. Before some of you write this off, realize that if you're still using passwords, you're not using ssh's strongest method of authentication. User-level public/private key authentication, somewhat similar to PGP signatures, is powerful and safe. Combine this with ssh-agent, which implements "single-signon," and you can save yourself hours a week, while remaining secure. http://www.linuxsecurity.com/articles/network_security_article-1343.html * Is a Firewall Enough? August 14th, 2000 Erick Lee writes: "Is a firewall enough to provide security to your network? The answer is no. A common misconception is that firewalls recognize attacks and block them. In fact, firewalls perform only limited, specific functions in network security." http://www.linuxsecurity.com/articles/network_security_article-1344.html * Feds certify lab to test security apps August 18th, 2000 The government has certified CygnaCom Solutions Inc.'s Security Evaluation Laboratory to test information security software to assure users that security products perform the functions that vendors claim. http://www.linuxsecurity.com/articles/government_article-1386.html * Guardian Digital Introduces The Linux Lockbox Secure E-Business Solution August 16th, 2000 Guardian Digital, Inc.(tm), the expert in open source security solutions, today announced the availability of the Linux Lockbox(tm), a secure turnkey e-business server. With the release of the Linux Lockbox, Guardian Digital has become the first company to market a complete open-source alternative to proprietary security solutions for e-business. http://www.linuxsecurity.com/articles/vendors_products_article-1367.html * OpenSales Announces Open Source E-Commerce Security Alliance with Guardian Digital August 16th, 2000 OpenSales, Inc., the leading provider of open source e-commerce applications, today announced that its freely available OpenSales AllCommerce(tm) application suite has been bundled with the Linux LockBox(tm), a secure, turnkey e-business server manufactured by Guardian Digital, Inc.(tm), the expert in open source security solutions. http://www.linuxsecurity.com/articles/vendors_products_article-1368.html * Crypto-Gram August 15, 2000 August 15th, 2000 In this months newsletter, Bruce Schneier covers digital security in a networked world, java security, quantum cryptography, and Bluetooth. I'm a very big fan of Bluetooth and what it has to offer the technical community but am a little bit concerned about all of my data going wireless. If you don't know anything about cryptography or are a crypto professional this newsletter is always a very good read. http://www.linuxsecurity.com/articles/cryptography_article-1349.html * Wireless Web privacy hole still wide open August 18th, 2000 Mobile phone Web surfers from several service providers discovered last March that their wireless Web services were distributing their phone numbers to Web sites without telling them. The disclosure enraged privacy advocates and prompted at least one company--Sprint PCS--to promise quick changes. http://www.linuxsecurity.com/articles/privacy_article-1383.html * Open source to change the face of software says report August 18th, 2000 Proprietary software vendors are "mercenary developers" versus open source revolutionaries according to Forrester. Open source ideas will change the face of the software industry by the year 2004, according to new research published by research company Forrester. http://www.linuxsecurity.com/articles/general_article-1385.html * Democrats champion privacy August 17th, 2000 Honing in on the controversy now surrounding privacy, Democratic operatives on Wednesday at the Los Angeles convention will aim to point out the difference between the two political parties on the hot-button issue. Although offering few details ahead of the scheduled discussion, U.S. Rep. Jay Inslee, of Washington, announced that he -- along with Washington's Attorney General Christine Gregoire and others -- will host a discussion on privacy. http://www.linuxsecurity.com/articles/privacy_article-1377.html ------------------------------------------------------------------------ Distributed by: Guardian Digital, Inc. LinuxSecurity.com To unsubscribe email newsletter-request () linuxsecurity com with "unsubscribe" in the subject of the message. ------------------------------------------------------------------------ ISN is hosted by SecurityFocus.com --- To unsubscribe email LISTSERV () SecurityFocus com with a message body of "SIGNOFF ISN".
Current thread:
- Linux Security Week, August 21, 2000 (fwd) InfoSec News (Aug 22)
