Information Security News mailing list archives
Linux Advisory Watch - February 23rd 2001
From: vuln-newsletter-admins () linuxsecurity com
Date: Fri, 23 Feb 2001 10:37:33 -0500
+----------------------------------------------------------------+
| LinuxSecurity.com Linux Advisory Watch |
| February 23rd, 2001 Volume 2, Number 8a |
+----------------------------------------------------------------+
Editors: Dave Wreski Benjamin Thomas
dave () linuxsecurity com ben () linuxsecurity com
Linux Advisory Watch is a comprehensive newsletter that outlines the
security vulnerabilities that have been announced throughout
the week. It includes pointers to updated packages and descriptions
of each vulnerability.
This week, advisories were released for pgp4pine, vixie-cron, ssh,
CUPS, glibc, bind, and sendmail. The vendors include Immunix,
NetBSD, Mandrake, Red Hat, SuSE, TurboLinux. It is critical that you
update all vulnerable packages.
FREE SECURITY BOOKS - Guardian Digital has just announced an offer
for free 2 free security books with the purchase of any secure Linux
Lockbox. The Lockbox is an Open Source network server appliance
engineered to be a complete secure e-business solution. It can be
used as a commerce server, web server, DNS, mail, and database
server.
http://www.guardiandigital.com/bookoffer.html
HTML Version of Newsletter:
http://www.linuxsecurity.com/vuln-newsletter.html
+---------------------------------+
| Installing a new package: | ------------------------------//
+---------------------------------+
# rpm -Uvh
# dpkg -i
Packages can be installed easily by using rpm (Red Hat Package
Manager) or dpkg (Debian Package Manager). Most advisories
issued by vendors are packaged in either an rpm or dpkg.
Additional installation instructions can be found in the body
of the Advisories.
+---------------------------------+
| Checking Package Integrity: | -----------------------------//
+---------------------------------+
The md5sum command is used to compute a 128-bit fingerprint that is
strongly dependant upon the contents of the file to which it is
applied. It can be used to compare against a previously-generated
sum to determine whether the file has changed. It is commonly used
to ensure the integrity of updated packages distributed by a vendor.
# md5sum
ebf0d4a0d236453f63a797ea20f0758b
The string of numbers can then be compared against the MD5 checksum
published by the packager. While it does not take into account the
possibility that the same person that may have modified a package
also may have modified the published checksum, it is especially
useful for establishing a great deal of assurance in the integrity
of a package before installing
---
* pgp4pine expired keys vulnerability
February 21st, 2001
pgp4pine is a program which is used to interface various PGP
implementations with the popular Pine mail reading package. Version
1.75-6 of pgp4pine fails to properly identify expired keys when
working with the Gnu Privacy Guard program (GnuPG). This failure may
result in the transmission of sensitive information in clear text
across the network.
http://www.linuxsecurity.com/advisories/other_advisory-1162.html
---
+---------------------------------+
| Immunix | ----------------------------//
+---------------------------------+
* Immunix: 'vixie-cron' update
February 21st, 2001
RedHat has released an updated version of the vixie-cron packages
which fixes a number of buffer overflows that could lead to a
possible security problem by allowing a local user to gain elevated
privileges.
Precompiled binary package for Immunix 7.0-beta and 7.0
is available at:
http://immunix.org/ImmunixOS/7.0/updates/RPMS/
vixie-cron-3.0.1-61_imnx.i386.rpm
ad9a2a5a1e359943b64f5d812508b672
Vendor Advisory:
http://www.linuxsecurity.com/advisories/other_advisory-1161.html
+---------------------------------+
| NetBSD | ----------------------------//
+---------------------------------+
* NetBSD: kernel USER_LDT
February 16th, 2001
A subtle bug in validation of user-supplied arguments to a syscall
can allow allow user applications on the i386 platform to transfer
control to arbitrary addresses in kernel memory, bypassing normal
system protections.
PLEASE SEE VENDOR ADVISORY
Vendor Advisory:
http://www.linuxsecurity.com/advisories/netbsd_advisory-1157.html
* NetBSD: 'ssh' vulnerabilities
February 16th, 2001
A recent RAZOR Bindview Advisory (CAN-2001-0144) describes a buffer
overrun vulnerability in Secure Shell daemons which may be present on
some NetBSD systems. In addition, a system configuration flaw could
result in weak key generation on some systems.
PLEASE SEE VENDOR ADVISORY
Vendor Advisory:
http://www.linuxsecurity.com/advisories/netbsd_advisory-1156.html
+---------------------------------+
| Mandrake | ----------------------------//
+---------------------------------+
* Mandrake: 'CUPS' update
February 22nd, 2001
A number of problems were found by the SuSE security team recently
during an internal audit of the CUPS printing package. These problems
have been resolved with the latest CUPS release which include temp
file creation vulnerabilities, potential buffer overflows, and other
security enhancements.
http://www.linux-mandrake.com/en/ftp.php3
7.2/RPMS/cups-1.1.6-10.1mdk.i586.rpm
706b2bd00f2d7087e67d9049a256686c
7.2/RPMS/cups-devel-1.1.6-10.1mdk.i586.rpm
b61f19494cb94a322e603ba5f6c5d840
Vendor Advisory:
http://www.linuxsecurity.com/advisories/mandrake_advisory-1164.html
* Mandrake: 'vixie-cron' buffer overflow
February 21st, 2001
A buffer overflow exists in the 'crontab' command if it was called by
a user with a username longer than 20 characters. If the system
administrator has created usernames of that length, it would be
possible for those users to gain elevated privileges.
http://www.linux-mandrake.com/en/ftp.php3
7.2/RPMS/vixie-cron-3.0.1-46.1mdk.i586.rpm
ad51423d9bcfa372640219d8e8e1f9ce
Vendor Advisory:
http://www.linuxsecurity.com/advisories/mandrake_advisory-1163.html
+---------------------------------+
| Red Hat | ----------------------------//
+---------------------------------+
* Red Hat: 'vixie-cron' buffer overflow
February 19th, 2001
New vixie-cron packages are available that fix a buffer overflow in
the 'crontab' command; this could allow certain users to gain
elevated privileges. It is recommended that all users update to the
fixed packages.
alpha:
ftp://updates.redhat.com/7.0/alpha/vixie-cron-3.0.1-61.alpha.rpm
b0cfceed1c6d1df1229f434d7adec14d
i386:
ftp://updates.redhat.com/7.0/i386/vixie-cron-3.0.1-61.i386.rpm
13707ef913e7801da32f9d47a419f81b
Vendor Advisory:
http://www.linuxsecurity.com/advisories/redhat_advisory-1159.html
+---------------------------------+
| SuSE | ----------------------------//
+---------------------------------+
* SuSE: 'ssh' remote compromise
February 16th, 2001
Attackers can remotely brute-force passwords without getting noticed
or logged. In the ssh package from the SuSE distribution, root login
is allowed, as well as password authentication. Even though
brute-forcing a password may take an enormous amount of time and
resources, the issue is to be taken seriously. Other problems also
exist.
SuSE-7.1
ftp://ftp.suse.de/pub/suse/i386/update/7.1/sec2/
ssh-1.2.27-226.i386.rpm
ae68bf3ac28b5e81f9c5f2a1d1d8980e
SuSE-7.0
ftp://ftp.suse.de/pub/suse/i386/update/7.0/sec1/
ssh-1.2.27-220.i386.rpm
f88b339dea96ef186e70872ce9444c24
Vendor Advisory:
http://www.linuxsecurity.com/advisories/suse_advisory-1154.html
SuSE: UPDATED: 'ssh' vulnerabilities - 2/16/2001
http://www.linuxsecurity.com/advisories/suse_advisory-1155.html
* SuSE: UPDATED: 'ssh' vulnerabilities
February 16th, 2001
http://www.linuxsecurity.com/advisories/suse_advisory-1155.html
+---------------------------------+
| TurboLinux | ----------------------------//
+---------------------------------+
* TurboLinux: 'bind' vulnerabilities
February 22nd, 2001
This vulnerability may allow an attacker to execute code with the
same privileges as the BIND server. Because BIND is typically run by
a superuser account, the execution would occur with superuser
privileges.
ftp://ftp.turbolinux.com/pub/updates/6.0/security/
bind-8.2.3-2.i386.rpm
dec967e3a1dd16bdcca0c6fe6e9114d6
ftp://ftp.turbolinux.com/pub/updates/6.0/security/
bind-contrib-8.2.3-2.i386.rpm
2e84bbbcd6a09d7c5060dd01480ff3de
ftp://ftp.turbolinux.com/pub/updates/6.0/security/
bind-devel-8.2.3-2.i386.rpm
06612093126372f8d618ea842fd402ec
ftp://ftp.turbolinux.com/pub/updates/6.0/security/
bind-utils-8.2.3-2.i386.rpm
3f390ce4d1b7ceaa477df62cc3fe3174
Vendor Advisory:
http://www.linuxsecurity.com/advisories/turbolinux_advisory-1165.html
* TurboLinux: 'sendmail' segmentation fault
February 22nd, 2001
Sendmail, launched with the -bt command-line switch, enters its
special "address test" mode. Under these conditions, it is vulnerable
to a segmentation fault which can occur when trying to set a class in
ad- dress test mode due to a negative array index.
ftp://ftp.turbolinux.com/pub/updates/6.0/security/
sendmail-8.11.2-5.i386.rpm
38eee0653839595aedad386cc8d2346f
Vendor Advisory:
http://www.linuxsecurity.com/advisories/turbolinux_advisory-1166.html
* TurboLinux: 'glibc' vulnerability
February 16th, 2001
It is therefore possible to load a library from /lib or /usr/lib
prior to the execution of a SUID or SGID program. This flaw makes it
possible for a user with malicious motives to create files in re-
stricted locations, or overwrite files outside of the access of this
user, including system files.
ftp://ftp.turbolinux.com/pub/updates/6.0/security/
glibc-2.1.3-27.i386.rpm
13afe999cdcc5133aca98fc0a59c4340
ftp://ftp.turbolinux.com/pub/updates/6.0/security/
glibc-devel-2.1.3-27.i386.rpm
4a55428c154311387844fbf84600e789
ftp://ftp.turbolinux.com/pub/updates/6.0/security/
glibc-profile-2.1.3-27.i386.rpm
6b48d26d9dc0ce224e4ea9c7a56fcc92
Vendor Advisory:
http://www.linuxsecurity.com/advisories/turbolinux_advisory-1158.html
------------------------------------------------------------------------
Distributed by: Guardian Digital, Inc. LinuxSecurity.com
To unsubscribe email vuln-newsletter-request () linuxsecurity com
with "unsubscribe" in the subject of the message.
------------------------------------------------------------------------
ISN is hosted by SecurityFocus.com
---
To unsubscribe email LISTSERV () SecurityFocus com with a message body of
"SIGNOFF ISN".
Current thread:
- Linux Advisory Watch - February 23rd 2001 vuln-newsletter-admins (Feb 24)
