[LWN Logo]
[LWN.net]

Sections:
 Main page
 Security
 Kernel
 Distributions
 Development
 Commerce
 Linux in the news
 Announcements
 Linux History
 Letters
All in one big page

See also: last week's Security page.

Security


News and Editorials

A new PhpNuke at last. Back in September, a severe vulnerability was reported in PhpNuke; with a carefully-formed URL, arbitrary files could be uploaded to the server. Fixes were available, but the PhpNuke project itself was entirely silent on the matter for over a month. Not exactly what one wants to see when faced with a complete, well-documented, remote vulnerability.

Finally, however, the project has responded; a look at the PhpNuke downloads page shows that version 5.3 was released on November 7. This release includes, of course, the relevant security fixes. Any PhpNuke sites out there that have not already applied the unofficial fix will certainly want to upgrade now.

Bug secrecy vs. full disclosure (ZDNet). ZDNet is running a lengthy piece by Bruce Schneier responding to Microsoft's attempts to silence those who disclose security vulnerabilities. "What we've learned during the past eight or so years is that full disclosure helps much more than it hurts. Since full disclosure has become the norm, the computer industry has transformed itself from a group of companies that ignores security and belittles vulnerabilities into one that fixes vulnerabilities as quickly as possible. A few companies are even going further, and taking security seriously enough to attempt to build quality software from the beginning: to fix vulnerabilities before the product is released."

Security Reports

Red Hat security update to lpr. Red Hat has updated lpr to fix a remotely exploitable hole in that package. If you have lpr running on your (6.x only) systems, this one is almost certainly worth applying.

Horde IMP 2.2.7 security release. If you're running the Horde IMP mail system, do have a look at the IMP 2.2.7 release, which contains a fix for a nasty session hijacking vulnerability. No distributor updates have been as of this writing.

Red Hat updates iptables. Red Hat has issued an iptables update fixing a (Red Hat specific) problem wherein the firewall rules could fail to be set up at boot time.

Updates

Configuration file vulnerability in ht://Dig. The ht://Dig search engine contains a vulnerability which allows a remote user to specify an alternate configuration file. If that user is able to place a suitable file in a location where ht://Dig can read it, the system may be compromised. See the original report from the ht://Dig project for details. This vulnerability first appeared in the October 11 LWN security page.

This week's updates:

Previous updates: Input validation problem with sendmail. An input validation error exists in versions of sendmail prior to 8.11.6 (or 8.12.0Beta19) which may be exploited by local users to obtain root access. See the August 23 Security Page for the initial report.

This week's updates:

Previous updates:

Webalizer tag vulnerability. The "webalizer" logfile analysis program has a vulnerability which can allow an attacker to place arbitrary HTML tags into the reports. When the reports are viewed, these tags can be used toward unpleasant ends, including cross-site scripting attacks. A fix is available which closes the vulnerability. (First reported in the November 8, 2001 LWN security page).

This week's updates:

Previous updates

Remotely exploitable buffer overflow in w3m. w3m is a text-based browser similar to Lynx. A buffer overflow in w3m can be triggered when a base-64 encoded string longer than 32 characters is found in a MIME header field. Source code patches to fix the problem were posted to the w3m developers' list. (First LWN report: June 28, 2001).

This week's updates:

Previous updates:

Debian security update to ssh-nonfree. The Debian Project has released a security update to its non-free ssh package fixing the remotely exploitable vulnerability there. This vulnerability has long been fixed in OpenSSH, but it remains in the non-free version. The real recommendation is to switch to OpenSSH; however, there is a new non-free ssh package available for those not wanting to make that change.

Resources

Bastille-Linux 1.3.0-pre1 is available from the Bastille-Linux web site. This version is oriented toward the hardening of Red Hat Linux 7.2. It is a testing prerelease, so the usual cautions apply.

vsftpd 1.0.0 released. Chris Evans has announced the 1.0.0 release of his "very secure FTP daemon." It may be version 1.0, but vsftp already has a track record: apparently Red Hat used it to handle the load (15,000 concurrent users) when 7.2 was released.

Chris is contemplating a very secure ssh server as his next project.

ssh exploit analysis. A detailed analysis of the ssh crc32 compensation attack detector exploit has been posted by David A. Dittrich. Those interested in the low-level mechanics of how this (old) exploit was managed should have a look.

Brute force web application session ID exploits are the subject of this paper published by iDEFENSE labs.

LinuxSecurity.com's newsletters, Linux Advisory Watch and Linux Security Week, for this week are available.

Events

Upcoming Security Events.
Date Event Location
November 15, 2001International Conference on Information and Communications Security(ICICS 2001)Xian, China
November 19 - 22, 2001Black Hat BriefingsAmsterdam
November 21 - 23, 2001International Information Warfare SymposiumAAL, Lucerne, Swizerland.
November 24 - 30, 2001Computer Security MexicoMexico City
November 29 - 30, 2001International Cryptography InstituteWashington, DC
December 2 - 7, 2001Lisa 2001 15th Systems Administration ConferenceSan Diego, CA.
December 5 - 6, 2001InfoSecurity Conference & ExhibitionJacob K. Javits Center, New York, NY.
December 10 - 14, 2001Annual Computer Security Applications ConferenceNew Orleans, LA

For additional security-related events, included training courses (which we don't list above) and events further in the future, check out Security Focus' calendar, one of the primary resources we use for building the above list. To submit an event directly to us, please send a plain-text message to lwn@lwn.net.

Section Editor: Jonathan Corbet


November 15, 2001

LWN Resources


Secured Distributions:
Astaro Security
Castle
Engarde Secure Linux
Immunix
Kaladix Linux
NSA Security Enhanced
Openwall GNU/Linux
Trustix

Security Projects
Bastille
Linux Security Audit Project
Linux Security Module
OpenSSH

Security List Archives
Bugtraq Archive
Firewall Wizards Archive
ISN Archive

Distribution-specific links
Caldera Advisories
Conectiva Updates
Debian Alerts
Kondara Advisories
Esware Alerts
LinuxPPC Security Updates
Mandrake Updates
Red Hat Errata
SuSE Announcements
Turbolinux
Yellow Dog Errata

BSD-specific links
BSDi
FreeBSD
NetBSD
OpenBSD

Security mailing lists
Caldera
Cobalt
Conectiva
Debian
Esware
FreeBSD
Kondara
LASER5
Linux From Scratch
Linux-Mandrake
NetBSD
OpenBSD
Red Hat
Slackware
Stampede
SuSE
Trustix
turboLinux
Yellow Dog

Security Software Archives
munitions
ZedZ.net (formerly replay.com)

Miscellaneous Resources
CERT
CIAC
Comp Sec News Daily
Crypto-GRAM
LinuxLock.org
LinuxSecurity.com
Security Focus
SecurityPortal

 

Next: Kernel

 
Eklektix, Inc. Linux powered! Copyright © 2001 Eklektix, Inc., all rights reserved
Linux ® is a registered trademark of Linus Torvalds