![[LWN Logo]](/images/lcorner.png) |
|
![[LWN.net]](/images/Included.png) |
From: InfoSec News <isn@c4i.org>
To: isn@attrition.org
Subject: [ISN] Linux Advisory Watch - August 24th 2001
Date: Sun, 26 Aug 2001 04:52:39 -0500 (CDT)
+----------------------------------------------------------------+
| LinuxSecurity.com Linux Advisory Watch |
| August 24th, 2001 Volume 2, Number 34a |
+----------------------------------------------------------------+
Editors: Dave Wreski Benjamin Thomas
dave@linuxsecurity.com ben@linuxsecurity.com
Linux Advisory Watch is a comprehensive newsletter that outlines the
security vulnerabilities that have been announced throughout the week.It
includes pointers to updated packages and descriptions of each
vulnerability.
This week, advisories were released for fetchmail, groff, ucd-snmp, ipfw,
sdb, gdm, telnetd, procfd, openssl prng, dump, sendmail, and tcp wrappers.
The vendors include Caldera, Conectiva, FreeBSD, Mandrake, NetBSD,
Progeny, and SuSE.
Maximize your security with EnGarde! EnGarde was designed from the ground
up as a secure solution, starting with the principle of least privilege,
and carrying it through every aspect of its implementation.
http://www.engardelinux.org
Take advantage of our Linux Security discussion list! This mailing list
is for general security-related questions and comments. To subscribe send
an e-mail to security-discuss-request@linuxsecurity.com with "subscribe"
as the subject.
HTML Version:
http://www.linuxsecurity.com/vuln-newsletter.html
+---------------------------------+
| fetchmail | ----------------------------//
+---------------------------------+
Fetchmail is a tool for retrieving and forwarding mail. Two
vulnerabilities in the code of fetchmail were found in the last weeks.
i386 Intel Platform: SuSE-7.2
ftp://ftp.suse.com/pub/suse/i386/update/7.2/n1/
fetchmail-5.8.0-48.i386.rpm
995660f54f997eb33120c6dcdab5ca73
SuSE Vendor Advisory:
http://www.linuxsecurity.com/advisories/suse_advisory-1556.html
+---------------------------------+
| groff | ----------------------------//
+---------------------------------+
groff, the GNU version of troff, has the potential of a remotely
exploitable vulnerability in Progeny versions prior to 1.17.2-6 if being
used with certain configurations of lpd.
i385: Progeny
http://archive.progeny.com/progeny/updates/newton/
groff-base_1.17.2-6_i386.deb
534cc0161fef71e64747938be33bf782
groff_1.17.2-6_i386.deb
277aba2ede78bc5b5035df566aacbb07
groff-x11_1.17.2-6_i386.deb
674fb9f76dce60c0c8cd3604d4f092be
Progeny Vendor Advisory:
http://www.linuxsecurity.com/advisories/other_advisory-1558.html
+---------------------------------+
| ucd-snmp | ----------------------------//
+---------------------------------+
In a routine security audit of the ucd-snmp package we have found several
problems, including several potentially exploitable buffer overflows,
format string bugs, signedness issues and tempfile race conditions. Some
of these might allow remote attackers to gain access to the UID under
which snmpd is running. This update fixes all known problems and also
makes the snmpd run as user 'nobody', reducing the impact of further
problems.
i386: Caldera
ftp://ftp.caldera.com/pub/updates/eServer/2.3/current/RPMS
RPMS/ucd-snmp-4.2.1-6b.i386.rpm
cb200e856acac6bd14fec9eb67eabb14
RPMS/ucd-snmp-devel-4.2.1-6b.i386.rpm
0c8f8963ce490f80a47681996e9370ab
RPMS/ucd-snmp-utils-4.2.1-6b.i386.rpm
d584b6cd0b799b4b928dadce9f2ec058
Caldera Vendor Advisory:
http://www.linuxsecurity.com/advisories/caldera_advisory-1559.html
+---------------------------------+
| ipfw | ----------------------------//
+---------------------------------+
ipfw is a system facility which allows IP packet filtering, redirecting,
and traffic accounting. ipfw `me' rules are filter rules that specify a
source or destination address of `me', intended to match any IP address
configured on a local interface.
FreeBSD:
ftp://ftp.freebsd.org/pub/FreeBSD/CERT/patches/
SA-01:53/ipfw.patch
FreeBSD Vendor Advisory:
http://www.linuxsecurity.com/advisories/freebsd_advisory-1560.html
+---------------------------------+
| sdb | ----------------------------//
+---------------------------------+
Sdbsearch.cgi is Perl script which is part of the sdb package of SuSE
Linux was found vulnerable by using untrustworthy client input
(HTTP_REFERER). By exploiting this trust an attacker could force the
sdbsearch.cgi script to open a malicious keylist file which includes
keywords and filenames.
i386 Intel Platform: SuSE-7.2
ftp://ftp.suse.com/pub/suse/i386/update/7.2/doc1/
sdb-2001.5.15-6.noarch.rpm
4230c06f2e703753e79ee0e50339567b
SuSE Vendor Advisory:
http://www.linuxsecurity.com/advisories/suse_advisory-1561.html
+---------------------------------+
| gdm | ----------------------------//
+---------------------------------+
A buffer overrun exists in the XDMCP handling code used in gdm. By
sending a properly crafted XDMCP message, it is possible for a remote
attacker to execute arbitrary commands as root on the susceptible machine.
By default, XDMCP is disabled in gdm.conf on Mandrake Linux.
Mandrake Linux 8.0:
8.0/RPMS/gdm-2.2.3.2-2.1mdk.i586.rpm
41c178fc24d9acb2ead1438e837f0325
http://www.linux-mandrake.com/en/ftp.php3
Mandrake Vendor Advisory:
http://www.linuxsecurity.com/advisories/mandrake_advisory-1562.html
+---------------------------------+
| telnetd | ----------------------------//
+---------------------------------+
Due to incorrect bounds checking of data buffered for output to the remote
client, an attacker can cause the telnetd process to overflow the buffer
and crash, or execute arbitrary code as the user running telnetd, usually
root. A valid user account and password is not required to exploit this
vulnerability, only the ability to connect to a telnetd server.
PLEASE SEE VENDOR ADVISORY
FreeBSD Vendor Advisory:
http://www.linuxsecurity.com/advisories/freebsd_advisory-1563.html
+---------------------------------+
| procfs | ----------------------------//
+---------------------------------+
Attackers may be able to extract sensitive system information, such as
password hashes from the /etc/master.passwd file, from setuid or setgid
processes, such as su(1). This information could be used by attackers to
escalate their privileges, possibly yielding root privileges on the local
system.
FreeBSD:
ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/patches/
SA-01:55/procfs.patch
FreeBSD Vendor Advisory:
http://www.linuxsecurity.com/advisories/freebsd_advisory-1564.html
+---------------------------------+
| openssl prng | ----------------------------//
+---------------------------------+
The OpenSSL libcrypto includes a PRNG (pseudo random number generator)
implementation. The logic used for PRNG was not strong enough, and allows
attackers to guess the internal state of the PRNG. Therefore, attackers
can predict future PRNG output.
NetBSD:
ftp://ftp.netbsd.org/pub/NetBSD/security/patches/
SA2001-013-openssl-1.5.patch
NetBSD Vendor Advisory:
http://www.linuxsecurity.com/advisories/netbsd_advisory-1565.html
+---------------------------------+
| dump | ----------------------------//
+---------------------------------+
The dump(8) command (installed as /sbin/dump) and the dump_lfs(8) command
(installed as /sbin/dump_lfs) are setgid tty. dump(8) and dump_lfs(8) did
not drop those setgid tty rights while performing functions other than
those the rights were provided for, including execution of a user supplied
RCMD_CMD environment variable.
NetBSD:
ftp://ftp.netbsd.org/pub/NetBSD/security/patches/
SA2001-014-dump-1.5.patch
NetBSD Vendor Advisory:
http://www.linuxsecurity.com/advisories/netbsd_advisory-1566.html
+---------------------------------+
| sendmail | ----------------------------//
+---------------------------------+
Cade Cairns from Security Focus discovered an input validation error in
sendmail's debugging functionality. The function that handles the "-d"
command line option uses a signed integer for that value and uses it as an
index to an internal vector. This function does not check for negative
values of this index, which allows a local attacker to cause a signed
integer overflow by supplying large numbers to this parameter which can be
used to write data outside that vector.
PLEASE SEE VENDOR ADVISORY
Conectiva Vendor Advisory:
http://www.linuxsecurity.com/advisories/other_advisory-1567.html
SuSE Vendor Advisory:
http://www.linuxsecurity.com/advisories/suse_advisory-1568.html
+---------------------------------+
| tcp wrappers | ----------------------------//
+---------------------------------+
An attacker that can influence the results of reverse DNS lookups can
bypass certain tcp_wrappers PARANOID ACL restrictions by impersonating a
trusted host. Such an attacker would need to be able to spoof reverse DNS
lookups, or more simply the attacker may be the administrator of the DNS
zone including the IP address of the remote host.
FreeBSD:
ftp://ftp.freebsd.org/pub/FreeBSD/CERT/patches/
SA-01:56/tcp_wrappers.patch
FreeBSD Vendor Advisory:
http://www.linuxsecurity.com/advisories/freebsd_advisory-1569.html
------------------------------------------------------------------------
Distributed by: Guardian Digital, Inc. LinuxSecurity.com
To unsubscribe email vuln-newsletter-request@linuxsecurity.com
with "unsubscribe" in the subject of the message.
------------------------------------------------------------------------
-
ISN is currently hosted by Attrition.org
To unsubscribe email majordomo@attrition.org with 'unsubscribe isn' in the BODY
of the mail.