Information Security News mailing list archives
Linux Advisory Watch, Dec 1st 2000
From: vuln-newsletter-admins () linuxsecurity com
Date: Fri, 1 Dec 2000 00:23:19 -0500
+----------------------------------------------------------------+
| LinuxSecurity.com Linux Advisory Watch |
| December 1st, 2000 Volume 1, Number 31a |
+----------------------------------------------------------------+
Editors: Dave Wreski Benjamin Thomas
dave () linuxsecurity com ben () linuxsecurity com
If your using Red Hat, be prepared spend some time patching your
system. 16 Red Hat Advisories were recently released! Advisories
were released for bash, fsh, ed, me, pine, netscape, joe, ethereal,
ghostscript, bind, ncurses, modutils, gnormp, usermode, apache,
cyrus-sasl, nsslap, and openssh. The vendors include Caldera,
Debian, Immunix, Mandrake, Red Hat, and SuSE. It is critical
that you update all vulnerable packages to reduce the risk of
being compromised.
Linux Advisory Watch is a comprehensive newsletter that outlines the
security vulnerabilities that have been announced throughout the
week. It includes pointers to updated packages and descriptions of
each vulnerability.
### OpenDoc Publishing ###
Our sponsor this week is OpenDoc Publishing. Their 480-page
comprehensive security book, Securing and Optimizing Linux, takes a
hands-on approach to installing, optimizing, configuring, and
securing Red Hat Linux. Topics include sendmail 8.10.1, OpenSSL,
ApacheSSL, OpenSSH and much more! Includes Red Hat 6.2 and Red Hat
6.2 PowerTools edition.
http://www.linuxsecurity.com/sponsors/opendocs.html
HTML Version:
http://www.linuxsecurity.com/vuln-newsletter.html
+---------------------------------+
| Installing a new package: | ------------------------------//
+---------------------------------+
# rpm -Uvh
# dpkg -i
Packages can be installed easily by using rpm (Red Hat Package
Manager) or dpkg (Debian Package Manager). Most advisories
issued by vendors are packaged in either an rpm or dpkg.
Additional installation instructions can be found in the body
of the Advisories.
+---------------------------------+
| Checking Package Integrity: | -----------------------------//
+---------------------------------+
The md5sum command is used to compute a 128-bit fingerprint that is
strongly dependant upon the contents of the file to which it is
applied. It can be used to compare against a previously-generated
sum to determine whether the file has changed. It is commonly used
to ensure the integrity of updated packages distributed by a vendor.
# md5sum
ebf0d4a0d236453f63a797ea20f0758b
The string of numbers can then be compared against the MD5 checksum
published by the packager. While it does not take into account the
possibility that the same person that may have modified a package
also may have modified the published checksum, it is especially
useful for establishing a great deal of assurance in the integrity
of a package before installing
+---------------------------------+
| Caldera Advisories | ----------------------------//
+---------------------------------+
* Caldera: 'bash' vulnerability
November 27th, 2000
Bash creates temp files for here scripts insecurely. This can be
exploited via a symlink attack to create or write over arbitrary
files on the system if the shell is run by root.
ftp://ftp.calderasystems.com/pub/updates/OpenLinux/2.3/current/RPMS/
310d7b5b15517054697264fa449b732e RPMS/bash-1.14.7-14.i386.rpm
Vendor Advisory:
http://www.linuxsecurity.com/advisories/caldera_advisory-925.html
+---------------------------------+
| Debian Advisories | ----------------------------//
+---------------------------------+
* Debian: 'mc' local DoS
November 25th, 2000
Maurycy Prodeus found a problem in cons.saver, a screensaver for the
console that is included in the mc package. cons.saver does not check
if it is started with a valid stdout, which combined with a bug in
its check to see if its argument is a tty (it forgot to close the
file-descriptor after opening the supposed tty) causes it to write a
NUL character to the file given as its parameter.
http://security.debian.org/dists/stable/updates/main/source/
mc_4.5.42-11.potato.5.diff.gz
MD5 checksum: 98428eb4284349e15b21b2cd36fbf55d
http://security.debian.org/dists/stable/updates/main/source/
mc_4.5.42-11.potato.5.dsc
MD5 checksum: f6bfd1c1c458247e49ec1f73a8da5a47
Vendor Advisory:
http://www.linuxsecurity.com/advisories/debian_advisory-922.html
* Debian: 'fsh' symlink attack
November 29th, 2000
Colin Phipps found an interesting symlink attack problem in fsh (a
tool to quickly run remote commands over rsh/ssh/lsh). When fshd
starts it creates a directory in /tmp to hold its sockets. It tries
to do that securely by checking of it can chown that directory if it
already exists to check if it is owner by the user invoking it.
However an attacker can circumvent this check by inserting a symlink
to a file that is owner by the user who runs fhsd and replacing that
with a directory just before fshd creates thesocket.
http://security.debian.org/dists/stable/updates/main/binary-i386/
fsh_1.0.post.1-3potato_i386.deb
MD5 checksum: 6d6dd446e87bff6ed57c7176813609c8
Vendor Advisory:
http://www.linuxsecurity.com/advisories/debian_advisory-945.html
* Debian: 'ed' vulnerability
November 28th, 2000
Alan Cox discovered that GNU ed (a classed line editor tool) created
temporary files unsafely. This has been fixed in version0.2-18.1.
http://security.debian.org/dists/stable/updates/main/
binary-i386/ed_0.2-18.1_i386.deb
MD5 checksum: bb6dbb9648a71c56d2cf1eb353407acf
Vendor Advisory:
http://www.linuxsecurity.com/advisories/debian_advisory-944.html
+---------------------------------+
| Mandrake Advisories | ----------------------------//
+---------------------------------+
* Mandrake: 'pine' vulnerability
November 27th, 2000
By adding specific headers to messages, the pine mail reader could be
made to exit with an error message when users attempted to manipulate
mail folders containing those messages.
http://www.linuxsecurity.com/advisories/mandrake_advisory-935.html
* Mandrake: 'bash1' vulnerability
November 28th, 2000
The bash1 shell program has the same << vulnerability that tcsh has
and incorrectly creates temporary files without the O_EXCL flag. This
vulnerability does not exist in bash2 which uses the O_EXCL flag when
creating temporary files.
http://www.linuxsecurity.com/advisories/mandrake_advisory-943.html
+---------------------------------+
| Immunix Advisories | ----------------------------//
+---------------------------------+
* Immunix: 'joe' vulnerability
November 28th, 2000
A local root exploit is possible if the root user is running the joe
editor.
http://www.immunix.org:8080/ImmunixOS/7.0-beta/updates/RPMS/
joe-2.8-43_StackGuard.i386.rpm
MD5 Checksum: 56831a982a06cdf37e5c358b2f41aa34
Vendor Advisory:
http://www.linuxsecurity.com/advisories/other_advisory-936.html
* Immunix: 'netscape' buffer overflow
November 28th, 2000
New netscape packages are available that fix a buffer overflow when
parsing HTML
http://www.immunix.org:8080/ImmunixOS/7.0-beta/updates/RPMS/
netscape-common-4.76-1.i386.rpm
MD5 Checksum: dfa6bdfa255b83d3f68c83fa83765aca
http://www.immunix.org:8080/ImmunixOS/7.0-beta/updates/RPMS/
netscape-communicator-4.76-1.i386.rpm
MD5 Checksum: f8d77e2fee0f5315fed6aeb8fd083d2f
http://www.immunix.org:8080/ImmunixOS/7.0-beta/updates/RPMS/
netscape-navigator-4.76-1.i386.rpm
MD5 Checksum: aaf7a0497d972380432d98ca09616660
Vendor Advisory:
http://www.linuxsecurity.com/advisories/other_advisory-937.html
+---------------------------------+
| Red Hat Advisories | ----------------------------//
+---------------------------------+
* RedHat: 'ethereal' buffer overflow
November 29th, 2000
Versions of Ethereal prior to 0.8.14 are vulnerable to buffer
overflows.The ethereal-0.8.14 packages correct this problem.
Red Hat Powertools 7.0:
alpha:
ftp://updates.redhat.com/powertools/7.0/alpha/ethereal-0.8.14-3.alpha.rpm
MD5 Checksum: f66c8f700e762f1fcd03659f0e27626a
i386:
ftp://updates.redhat.com/powertools/7.0/i386/ethereal-0.8.14-3.i386.rpm
MD5 Checksum: fd164d3509dde25d21fd7cb926ba0e65
Vendor Advisory:
http://www.linuxsecurity.com/advisories/redhat_advisory-946.html
* Redhat: 'netscape' buffer overflow
November 28th, 2000
A buffer overflow exists in Netscape's HTML parsing code. By using
specially designed code, a remote website could cause arbitrary code
to be run on the local machine.
Red Hat Linux 7.0
alpha:
ftp://updates.redhat.com/7.0/alpha/netscape-common-4.76-1.alpha.rpm
ftp://updates.redhat.com/7.0/alpha/netscape-communicator-4.76-1.alpha.rpm
ftp://updates.redhat.com/7.0/alpha/netscape-navigator-4.76-1.alpha.rpm
i386:
ftp://updates.redhat.com/7.0/i386/netscape-common-4.76-1.i386.rpm
ftp://updates.redhat.com/7.0/i386/netscape-communicator-4.76-1.i386.rpm
ftp://updates.redhat.com/7.0/i386/netscape-navigator-4.76-1.i386.rpm
MD5 Checksum in vendor advisory.
Vendor Advisory:
http://www.linuxsecurity.com/advisories/redhat_advisory-938.html
* Redhat: 'bind' update
November 28th, 2000
A bug in bind 8.2.2_P5 allows for a denial of service attack. If
named is open to zone transfers and recursive resolving, it will
crash after a ZXFR for the authoritative zone and a query of a remote
hostname.
Red Hat Linux 7.0:
alpha
ftp://updates.redhat.com/7.0/alpha/bind-8.2.2_P7-2.alpha.rpm
ftp://updates.redhat.com/7.0/alpha/bind-devel-8.2.2_P7-2.alpha.rpm
ftp://updates.redhat.com/7.0/alpha/bind-utils-8.2.2_P7-2.alpha.rpm
i386:
ftp://updates.redhat.com/7.0/i386/bind-8.2.2_P7-1.i386.rpm
ftp://updates.redhat.com/7.0/i386/bind-devel-8.2.2_P7-1.i386.rpm
ftp://updates.redhat.com/7.0/i386/bind-utils-8.2.2_P7-1.i386.rpm
MD5 Checksums available in vendor advisory.
Vendor Advisory:
http://www.linuxsecurity.com/advisories/redhat_advisory-941.html
* Redhat: 'ghostscript' vulnerabilities
November 28th, 2000
ghostscript makes use of mktemp to create temp files, which is an
insecure and predictable apporoach, it is now patched to use mkstemp,
which avoid the race condition on the name.It also uses improper
LD_RUN_PATH values, causing ghostscript to search for libraries to
load in current directorys.
Red Hat Linux 7.0:
alpha:
ftp://updates.redhat.com/7.0/alpha/ghostscript-5.50-8.alpha.rpm
MD5 Checksum: bd8b80bada77d59ee28aa72f6e5674e4
i386:
ftp://updates.redhat.com/7.0/i386/ghostscript-5.50-8.i386.rpm
MD5 Checksum: 0d5f4448d5245721b1e2762f360791f2
Vendor Advisory:
http://www.linuxsecurity.com/advisories/redhat_advisory-942.html
* Redhat: 'ncurses' vulnerabilty
November 28th, 2000
Attackers can force a privileged application to use their own termcap
file containing a special terminal entry which will trigger the
ncurses vulnerability, allowing them to execute arbitrary code with
the privileges of the exploited binary.
Red Hat Linux 7.0: i386:
ftp://updates.redhat.com/7.0/i386/ncurses-devel-5.2-2.i386.rpm
MD5 Checksum: 9affe6c75ae33d616ea695766c10e44e
ftp://updates.redhat.com/7.0/i386/ncurses-devel-5.2-2.i386.rpm
MD5 Checksum: a555ec460de5650c4a2c42abc5de838c
Vendor Advisory:
http://www.linuxsecurity.com/advisories/redhat_advisory-923.html
* RedHat: 'nss_ldap' vulnerabilities
November 27th, 2000
A race condition has been found in the nss_ldap package. On a system
running nscd, a malicious user can cause the system to hang.
Red Hat Linux 7.0:
alpha:
ftp://updates.redhat.com/7.0/alpha/nss_ldap-122-1.7.alpha.rpm
MD5 Checksum: 8c47242abcd4aa16174cb41da27cdd12
i386:
ftp://updates.redhat.com/7.0/i386/nss_ldap-122-1.7.i386.rpm
MD5 Checksum: 95337178e79472118cf33b0584462679
Vendor Advisory:
http://www.linuxsecurity.com/advisories/redhat_advisory-927.html
* RedHat7: 'cyrus-sasl' vulnerabilities
November 27th, 2000
An error existed in the authorization checks in the version of
cyrus-sasl shipped with Red Hat Linux 7. Due to this bug, users who
had been successfully authenticated could be allowed access to
resources even if the system had been configured to deny these users
access. Versions of cyrus-sasl included in previous releases of Red
Hat Power Tools did not implement this function and are not affected
by this bug.
Red Hat Linux 7.0:
alpha:
ftp://updates.redhat.com/7.0/alpha/cyrus-sasl-1.5.24-11.alpha.rpm
MD5 Checksum: 0e6f0edb4df1489e1a12e5ea16f9f828
i386:
ftp://updates.redhat.com/7.0/i386/cyrus-sasl-1.5.24-11.i386.rpm
MD5 Checksum: 59aaec92c60ddaed257bd581d976055b
Vendor Advisory:
http://www.linuxsecurity.com/advisories/redhat_advisory-928.html
* RedHat: Apache and other updates
November 27th, 2000
A vulnerability in the mod_rewrite module and vulnerabilities in the
virtual hosting facility in versions of Apache prior to 1.3.14 may
allow attackers to view files on the server which are meant to be
inaccessible. Format string vulnerabilities have been found in PHP
versions 3 and 4.
PLEASE SEE VENDOR ADVISORY FOR UPDATE
Vendor Advisory:
http://www.linuxsecurity.com/advisories/redhat_advisory-929.html
* RedHat: 'usermode' vulnerability
November 27th, 2000
The usermode package contains a binary (/usr/bin/userhelper), which
is used to control access to programs which are to be executed as
root. Because programs invoked by userhelper are not actually running
setuid-root, security measures built into recent versions of glibc
are not active.
Red Hat Linux 7.0:
alpha:
ftp://updates.redhat.com/7.0/alpha/usermode-1.37-2.alpha.rpm
MD5 Checksum: 6cd3999fa6015fcf301b502d4a416373
i386:
ftp://updates.redhat.com/7.0/i386/usermode-1.37-2.i386.rpm
MD5 Checksum: c32888b6f362b04f8a3805d4465c042a
Vendor Advisory:
http://www.linuxsecurity.com/advisories/redhat_advisory-930.html
* RedHat: UPDATE: 'gnorpm' vulnerability
November 27th, 2000
While fixing other problems with the gnorpm package, a
locally-exploitable security hole was found where a normal user could
trick root running GnoRPM into writing to arbitrary files due to a
bug in the gnorpm tmp filehandling.
Red Hat Linux 7.0:
alpha:
ftp://updates.redhat.com/7.0/alpha/gnorpm-0.95.1-5.alpha.rpm
MD5 Checksum: 48f5f0dc6a0b17cd204a9bc6ab6c2a86
i386:
ftp://updates.redhat.com/7.0/i386/gnorpm-0.95.1-5.i386.rpm
MD5 Checksum: 1df97ee9659fc0f10c2f06ef69954228
Vendor Advisory:
http://www.linuxsecurity.com/advisories/redhat_advisory-931.html
* RedHat: 'joe' symlink vulnerability
November 27th, 2000
When exiting joe in a nonstandard way (such as a system crash,
closing an xterm, or a network connection going down), joe will
unconditionally append its open buffers to the file "DEADJOE". This
could be exploited by the creation of DEADJOE symlinks in directories
where root would normally use joe. In this way, joe could be used to
append garbage topotentially-sensitive files, resulting in a denial
of service.
Red Hat Linux 7.0:i386:
ftp://updates.redhat.com/7.0/i386/joe-2.8-43.i386.rpm
MD5 Checksum: 1578b0e184b76b23d2a30b101f1665d4
Vendor Advisory:
http://www.linuxsecurity.com/advisories/redhat_advisory-932.html
* RedHat: 'modutils' vulnerability
November 27th, 2000
The previous packages of modutils released to address a local root
compromise contained an error in new safe guards that caused them to
not properly be enabled when run as root from the kmod process. These
new safe guards check the arguments passed to modules. The new 2.3.21
modutils package fixes this error and correctly checks the arguments
when running from kmod, limiting kernel module arguments to those
specified in /etc/conf.modules (on Red Hat Linux 6.2) or
/etc/modules.conf (on Red Hat Linux 7). This release supersedes the
previous modutils errata packages.
Red Hat Linux 7.0:
alpha:
ftp://updates.redhat.com/7.0/alpha/modutils-2.3.21-1.alpha.rpm
MD5 Checksum: 6f68c415e4ec7f18bc68e987e488056b
i386:
ftp://updates.redhat.com/7.0/i386/modutils-2.3.21-1.i386.rpm
MD5 Checksum: 46b7f3331bccd927d9d7fefbec74f721
Vendor Advisory:
http://www.linuxsecurity.com/advisories/redhat_advisory-933.html
* RedHat: 'pine' denial of service vulnerability
November 27th, 2000
By adding specific headers to messages, the pine mail reader and the
imap server could be made to exit with an error message when users
attempted to manipulate mail folders containing those messages. This
release also introduces SSL support to Red Hat Linux 6.x, Kerberos
support for Red Hat Linux 6.0 and 6.1, and LDAP support for Red Hat
Linux 6.0. This means that the packages from the enhancement
advisories for these packages will also need to be installed.
Red Hat Linux 7.0:
alpha:
ftp://updates.redhat.com/7.0/alpha/pine-4.30-2.alpha.rpm
ftp://updates.redhat.com/7.0/alpha/imap-2000-3.alpha.rpm
ftp://updates.redhat.com/7.0/alpha/imap-devel-2000-3.alpha.rpm
i386:
ftp://updates.redhat.com/7.0/i386/pine-4.30-2.i386.rpm
ftp://updates.redhat.com/7.0/i386/imap-2000-3.i386.rpm
ftp://updates.redhat.com/7.0/i386/imap-devel-2000-3.i386.rpm
MD5 Checksums available in vendor advisory
Vendor Advisory:
http://www.linuxsecurity.com/advisories/redhat_advisory-934.html
* Redhat: 'bash 1.x' vulnerability
November 27th, 2000
The << operator in bash 1.x used predictable filenames, leading to a
potential denial of service attack. A local user account is required
to exploit the security leak.
Red Hat Linux 6.2:
alpha:
ftp://updates.redhat.com/6.2/alpha/bash-1.14.7-23.6x.alpha.rpm
MD5 Checksum: 19ed96c0935ef630215736d242911c98
sparc:
ftp://updates.redhat.com/6.2/sparc/bash-1.14.7-23.6x.sparc.rpm
MD5 Checksum: 1a92e61a4d5c7989b26d687dfe881a5c
i386:
ftp://updates.redhat.com/6.2/i386/bash-1.14.7-23.6x.i386.rpm
MD5 Checksum: 9fe492b13c08e7993a918d0395fda486
Vendor Advisory:
http://www.linuxsecurity.com/advisories/redhat_advisory-924.html
* RedHat7: 'openssh' vulnerability
November 27th, 2000
An OpenSSH client will do agent or X11 forwarding at the request of a
server, even if the user has not requested that it be done. A
malicious server can exploit this vulnerability to gain access to the
user's display.
i386:
ftp://updates.redhat.com/7.0/i386/openssh-2.3.0p1-4.i386.rpm
ftp://updates.redhat.com/7.0/i386/openssh-clients-2.3.0p1-4.i386.rpm
ftp://updates.redhat.com/7.0/i386/openssh-server-2.3.0p1-4.i386.rpm
ftp://updates.redhat.com/7.0/i386/openssh-askpass-2.3.0p1-4.i386.rpm
ftp://updates.redhat.com/7.0/i386/
openssh-askpass-gnome-2.3.0p1-4.i386.rpm
MD5 Checksum's available in advisory.
Vendor Advisory:
http://www.linuxsecurity.com/advisories/redhat_advisory-926.html
* Redhat; 'ncurses' vulnerability
November 26th, 2000
Attackers can force a privileged application to use their own termcap
file containing a special terminal entry which will trigger the
ncurses vulnerability, allowing them to execute arbitrary code with
the privileges of the exploited binary.
Red Hat Linux 7.0: i386:
ftp://updates.redhat.com/7.0/i386/ncurses-devel-5.2-2.i386.rpm
MD5 Checksum: 9affe6c75ae33d616ea695766c10e44e
ftp://updates.redhat.com/7.0/i386/ncurses-devel-5.2-2.i386.rpm
MD5 Checksum: a555ec460de5650c4a2c42abc5de838c
Vendor Advisory:
http://www.linuxsecurity.com/advisories/redhat_advisory-923.html
+---------------------------------+
| SuSE Advisories | ----------------------------//
+---------------------------------+
* SuSE: 'netscape' buffer overflow
November 30th, 2000
It may be possible for an attacker to supply a webpage that executes
arbitrary code as the user running netscape. As of today, no exploit
code is known to exist in the wild.
Intel i386 Platform SuSE-7.0 SuSE-6.4 SuSE-6.3 SuSE-6.2
ftp://ftp.suse.com/pub/suse/i386/update/7.0/xap1/
netscape-4.76.glibc21.i386.rpm
MD5 Checksum: 7ccebaca7df0937a3c08fc30a27af858
SuSE-6.1 SuSE-6.0
ftp://ftp.suse.com/pub/suse/i386/update/5.3/xap1/
netscape-4.76.libc5.i386.rpm
MD5 Checksum: 3c4f06c5fea4755083524eb135627380
* SuSE: 'openssh/ssh' vulnerability
November 24th, 2000
Many vulnerabilities have been found in the openssh package, along
with a compilation roblem in the openssh and ssh packages in the
SuSE-7.0 distribution: An openssh client (the ssh program) can accept
X11- or ssh-agent forwarding requests even though these forwarding
capabilities have not been requested by the client side after
successful authentication. Using these weaknesses, an attacker could
gain access to the authentication agent which may hold multiple
user-owned authentification identities, or to the X-server on the
client side as if requested by the user.
i386 Intel Platform: SuSE-7.0
ftp://ftp.suse.de/pub/suse/i386/update/7.0/sec1/
openssh-2.3.0p1-0.i386.rpm
MD5 Checksum: 3c7b9044ffb64f9f74c904eb2b278eb2
Sparc Platform: SuSE-7.0
ftp://ftp.suse.de/pub/suse/sparc/update/7.0/sec1/
openssh-2.3.0p1-0.sparc.rpm
MD5 Checksum: 898aaaacee88777429496f1a5658076f
AXP Alpha Platform: SuSE-7.0
ftp://ftp.suse.de/pub/suse/axp/update/7.0/sec1/
openssh-2.3.0p1-0.alpha.rpm
MD5 Checksum: dd12c60b2744455780c976b115b26f27
PPC Power PC Platform: SuSE-7.0
ftp://ftp.suse.de/pub/suse/ppc/update/7.0/sec1/
openssh-2.3.0p1-0.ppc.rpm
MD5 Checksum: 72f7c339991e54a476585012423dda62
Vendor Advisory:
http://www.linuxsecurity.com/advisories/suse_advisory-916.html
------------------------------------------------------------------------
Distributed by: Guardian Digital, Inc. LinuxSecurity.com
To unsubscribe email vuln-newsletter-request () linuxsecurity com
with "unsubscribe" in the subject of the message.
------------------------------------------------------------------------
ISN is hosted by SecurityFocus.com
---
To unsubscribe email LISTSERV () SecurityFocus com with a message body of
"SIGNOFF ISN".
Current thread:
- Linux Advisory Watch, Dec 1st 2000 vuln-newsletter-admins (Dec 02)
