Information Security News mailing list archives
Linux Advisory Watch - December 29th 2000
From: vuln-newsletter-admins () linuxsecurity com
Date: Fri, 29 Dec 2000 02:29:11 -0500
+----------------------------------------------------------------+
| LinuxSecurity.com Linux Advisory Watch |
| December 15th, 2000 Volume 1, Number 35a |
+----------------------------------------------------------------+
Editors: Dave Wreski Benjamin Thomas
dave () linuxsecurity com ben () linuxsecurity com
Linux Advisory Watch is a comprehensive newsletter that outlines the
security vulnerabilities that have been announced throughout the
week. It includes pointers to updated packages and descriptions of
each vulnerability.
This week, advisories were released for gnupg, stunnel, dialog, and
fetchmail. The vendors include Debian and TurboLinux. I'm sure
many of you are happy that it is a light week and nothing major has
surfaced.
Happy New Year to all subscribers and thank you for the kind words and
constructive suggestions you have sent during the past year. If you have
suggestions that would make our newsletters or website more effective,
please let us know.
In addition to our Vulnerability Watch newsletter, we also provide a
security news newsletter that summarizes the most important security news
and events of the week. Be sure to visit LinuxSecurity.com for
subscription information.
### OpenDoc Publishing ###
Our sponsor this week is OpenDoc Publishing. Their 480-page
comprehensive security book, Securing and Optimizing Linux, takes a
hands-on approach to installing, optimizing, configuring, and
securing Red Hat Linux. Topics include sendmail 8.10.1, OpenSSL,
ApacheSSL, OpenSSH and much more! Includes Red Hat 6.2 and Red Hat
6.2 PowerTools edition.
http://www.linuxsecurity.com/sponsors/opendocs.html
HTML Version:
http://www.linuxsecurity.com/vuln-newsletter.html
+---------------------------------+
| Installing a new package: | ------------------------------//
+---------------------------------+
# rpm -Uvh
# dpkg -i
Packages can be installed easily by using rpm (Red Hat Package
Manager) or dpkg (Debian Package Manager). Most advisories
issued by vendors are packaged in either an rpm or dpkg.
Additional installation instructions can be found in the body
of the Advisories.
+---------------------------------+
| Checking Package Integrity: | -----------------------------//
+---------------------------------+
The md5sum command is used to compute a 128-bit fingerprint that is
strongly dependant upon the contents of the file to which it is
applied. It can be used to compare against a previously-generated
sum to determine whether the file has changed. It is commonly used
to ensure the integrity of updated packages distributed by a vendor.
# md5sum
ebf0d4a0d236453f63a797ea20f0758b
The string of numbers can then be compared against the MD5 checksum
published by the packager. While it does not take into account the
possibility that the same person that may have modified a package
also may have modified the published checksum, it is especially
useful for establishing a great deal of assurance in the integrity
of a package before installing
+---------------------------------+
| Debian Advisories | ----------------------------//
+---------------------------------+
* Debian: 'gnupg' vulnerabilities
December 25th, 2000
There is a problem in the way gpg checks detached signatures which
can lead to false positives. Detached signature can be verified with
a command like this: gpg --verify detached.sig < mydata If someone
replaced detached.sig with a signed text (ie not a detached
signature) and then modified mydata gpg would still report a
successfully verified signature.
Alpha architecture:
http://security.debian.org/dists/stable/updates/main/
binary-alpha/gnupg_1.0.4-1.1_alpha.deb
MD5 checksum: 616e391a4eb5561bf32714e40bed38c5
ARM architecture:
http://security.debian.org/dists/stable/updates/main/
binary-arm/gnupg_1.0.4-1.1_arm.deb
MD5 checksum: e496f7aed98098feef2869be81b774b7
Intel ia32 architecture:
http://security.debian.org/dists/stable/updates/main/
binary-i386/gnupg_1.0.4-1.1_i386.deb
MD5 checksum: a6c0494c737250b0ccc7dc33056d8e7c
Motorola 680x0 architecture:
http://security.debian.org/dists/stable/updates/main/
binary-m68k/gnupg_1.0.4-1.1_m68k.deb
MD5 checksum: a07cbf5bce2890fe85cfae4d796c5b0d
PowerPC architecture:
http://security.debian.org/dists/stable/updates/main/
binary-powerpc/gnupg_1.0.4-1.1_powerpc.deb
MD5 checksum: e251364c24066cc88a3de11b4ba23275
Sun Sparc architecture:
http://security.debian.org/dists/stable/updates/main/
binary-sparc/gnupg_1.0.4-1.1_sparc.deb
MD5 checksum: b15f4ad07949fb0fa24a221b656691ae
Vendor Advisory:
http://www.linuxsecurity.com/advisories/debian_advisory-1016.html
* Debian: 'dialog' vulnerability
December 24th, 2000
Matt Kraai reported that he found a problem in the way dialog creates
lock-files: it did not create them safely which made it susceptible
to a symlink attack. This has been fixed in version
0.9a-20000118-3bis.
PLEASE SEE VENDOR ADVISORY FOR UPDATE
Vendor Advisory:
http://www.linuxsecurity.com/advisories/debian_advisory-1014.html
* Debian: 'stunnel' vulnerabilities
December 24th, 2000
Lez discovered a format string problem in stunnel (a tool to create
Universal SSL tunnel for other network daemons). Brian Hatch
responded by stating he was already preparing a new release with
multiple security fixes:
Alpha architecture:
http://security.debian.org/dists/stable/updates/main/
binary-alpha/stunnel_3.10-0potato1_alpha.deb
MD5 checksum: 832ad31f899dbc655b1796b56cb98c80
Intel ia32 architecture:
http://security.debian.org/dists/stable/updates/
main/binary-i386/stunnel_3.10-0potato1_i386.deb
MD5 checksum: b64009319600749c58c60d39874db79d
Motorola 680x0 architecture:
http://security.debian.org/dists/stable/updates/
main/binary-m68k/stunnel_3.10-0potato1_m68k.deb
MD5 checksum: 89c199d09858d14c9563522f4f6fba67
PowerPC architecture:
http://security.debian.org/dists/stable/updates/
main/binary-powerpc/stunnel_3.10-0potato1_powerpc.deb
MD5 checksum: cd145736ba23c54f98a41afe7bb5469f
Sun Sparc architecture:
http://security.debian.org/dists/stable/updates/
main/binary-sparc/stunnel_3.10-0potato1_sparc.deb
MD5 checksum: 12d12072d96e1ddc6caa50cbc179619f
Vendor Advisory:
http://www.linuxsecurity.com/advisories/debian_advisory-1013.html
* Debian: 'dialog' symlink attack
December 24th, 2000
Matt Kraai reported that he found a problem in the way dialog creates
lock-files: it did not create them safely which made it susceptible
to a symlink attack. This has been fixed in version
0.9a-20000118-3bis.
Alpha architecture:
http://security.debian.org/dists/stable/updates/main/
binary-alpha/dialog_0.9a-20000118-3bis_alpha.deb
MD5 checksum: 57c04e1f8dec33de5dffee92d0b162cb
ARM architecture:
http://security.debian.org/dists/stable/updates/main/
binary-arm/dialog_0.9a-20000118-3bis_arm.deb
MD5 checksum: 5735033a17262209a1130459229a0982
Intel ia32 architecture:
http://security.debian.org/dists/stable/updates/main/
binary-i386/dialog_0.9a-20000118-3bis_i386.deb
MD5 checksum: f38bbfaa0076a590fe2421eb2ab68a9f
Motorola 680x0 architecture:
http://security.debian.org/dists/stable/updates/main/
binary-m68k/dialog_0.9a-20000118-3bis_m68k.deb
MD5 checksum: e7d0985d05a750c6550dd778ab14863e
PowerPC architecture:
http://security.debian.org/dists/stable/updates/main/
binary-powerpc/dialog_0.9a-20000118-3bis_powerpc.deb
MD5 checksum: 13033d33c56d4e18e8442cc2debaa6f8
Sun Sparc architecture:
http://security.debian.org/dists/stable/updates/main/
binary-sparc/dialog_0.9a-20000118-3bis_sparc.deb
MD5 checksum: c310130da0b7ba8ad8d52003db9669c3
Vendor Advisory:
http://www.linuxsecurity.com/advisories/debian_advisory-1012.html
* Debian: multiple 'stunnel' vulnerabilities
December 24th, 2000
Lez discovered a format string problem in stunnel (a tool to create
Universal SSL tunnel for other network daemons). Brian Hatch
responded by stating he was already preparing a new release with
multiple security fixes:
Alpha architecture:
http://security.debian.org/dists/stable/updates/
main/binary-alpha/stunnel_3.10-0potato1_alpha.deb
MD5 checksum: 832ad31f899dbc655b1796b56cb98c80
Intel ia32 architecture:
http://security.debian.org/dists/stable/updates/
main/binary-i386/stunnel_3.10-0potato1_i386.deb
MD5 checksum: b64009319600749c58c60d39874db79d
Motorola 680x0 architecture:
http://security.debian.org/dists/stable/updates/
main/binary-m68k/stunnel_3.10-0potato1_m68k.deb
MD5 checksum: 89c199d09858d14c9563522f4f6fba67
PowerPC architecture:
http://security.debian.org/dists/stable/updates/
main/binary-powerpc/stunnel_3.10-0potato1_powerpc.deb
MD5 checksum: cd145736ba23c54f98a41afe7bb5469f
Sun Sparc architecture:
http://security.debian.org/dists/stable/updates/
main/binary-sparc/stunnel_3.10-0potato1_sparc.deb
MD5 checksum: 12d12072d96e1ddc6caa50cbc179619f
Vendor Advisory:
http://www.linuxsecurity.com/advisories/debian_advisory-1015.html
+---------------------------------+
| Turbo Linux Advisories | ----------------------------//
+---------------------------------+
* TurboLinux: 'fetchmail' vulnerability
December 28th, 2000
The updated IMAP server released in errata advisory RHSA:102-04
exposes a bug in fetchmail's implementation of the AUTHENTICATE
GSSAPI command.
ftp://ftp.turbolinux.com/pub/updates/6.0/
security/fetchmail-5.5.0-3.i386.rpm
MD5 Checksum: 75f5c835b99182e5f7ca73d669f670c7
Vendor Advisory:
http://www.linuxsecurity.com/advisories/turbolinux_advisory-1017.html
------------------------------------------------------------------------
Distributed by: Guardian Digital, Inc. LinuxSecurity.com
To unsubscribe email vuln-newsletter-request () linuxsecurity com
with "unsubscribe" in the subject of the message.
------------------------------------------------------------------------
ISN is hosted by SecurityFocus.com
---
To unsubscribe email LISTSERV () SecurityFocus com with a message body of
"SIGNOFF ISN".
Current thread:
- Linux Advisory Watch - December 29th 2000 vuln-newsletter-admins (Dec 30)
