News

Wednesday, October 18, 2006

SecurityFocus Linux Newsletter #308

SecurityFocus Linux Newsletter #308
----------------------------------------

This Issue is Sponsored by: Norwich University

EARN A MASTER OF SCIENCE IN INFORMATION ASSURANCE - ONLINE
The NSA has designated Norwich University a center of Academic Excellence in Information Security. Our program offers unparalleled Infosec management education and the case study affords you unmatched consulting experience. Using interactive e-Learning technology, you can earn this esteemed degree, without disrupting your career or home life.

http://www.msia.norwich.edu/secfocus

------------------------------------------------------------------
I. FRONT AND CENTER
1. ModSecurity 2.0 with Ivan Ristic
2. Hacking Web 2.0 Applications with Firefox
II. LINUX VULNERABILITY SUMMARY
1. OpenSSH-Portable Existing Password Remote Information Disclosure Weakness
2. Red Hat Fedora Core Libtool-LTDL Relative Path Arbitrary Code Execution Vulnerability
3. Xoops Search.PHP Cross-Site Scripting Vulnerability
4. Mozilla Bugzilla Multiple Input Validation and Information disclosure Vulnerabilities
5. NVidia Binary Graphics Driver For Linux Buffer Overflow Vulnerability
6. Libksba Signature Verification Denial of Service Vulnerability
III. LINUX FOCUS LIST SUMMARY
1. Dynamic firewall based on bandwidth usage ?
IV. UNSUBSCRIBE INSTRUCTIONS
V. SPONSOR INFORMATION

I. FRONT AND CENTER
---------------------
1. ModSecurity 2.0 with Ivan Ristic
By Federico Biancuzzi
ModSecurity is an open source web application firewall that runs as an Apache module, and version 2.0 offers many new features and improvements. Federico Biancuzzi interviewed Ivan Ristic to discuss the new logging system, events tracking and correlation, filtering AJAX or AFLAX applications, and just-in-time patching for closed source applications.
http://www.securityfocus.com/columnists/418

2. Hacking Web 2.0 Applications with Firefox
By Shreeraj Shah
This article looks at some of the methods, tools and tricks to dissect web 2.0 applications (including Ajax) and discover security holes using Firefox and its plugins.
http://www.securityfocus.com/infocus/1879


II. LINUX VULNERABILITY SUMMARY
------------------------------------
1. OpenSSH-Portable Existing Password Remote Information Disclosure Weakness
BugTraq ID: 20418
Remote: Yes
Date Published: 2006-10-09
Relevant URL: http://www.securityfocus.com/bid/20418
Summary:
OpenSSH reportedly contains an information-disclosure weakness. This issue resides in the portable version of OpenSSH, which is distributed for operating systems other than its native OpenBSD platform.

This issue has been confirmed as not deriving from either the Pluggable Authentication Module (PAM) issue disclosed in BID 11781 in 2004, nor the more recent Generic Security Services Application Programming Interface (GSSAPI)-based information leak outlined in BID 20245. Reportedly, it is possible to verify access credentials for users with an existing system password by measuring SSH authentication timing differences.

This weakness allows remote users to test for the existence of valid usernames with a password set. Knowledge of system users with established passwords may aid in further attacks.

2. Red Hat Fedora Core Libtool-LTDL Relative Path Arbitrary Code Execution Vulnerability
BugTraq ID: 20434
Remote: No
Date Published: 2006-10-10
Relevant URL: http://www.securityfocus.com/bid/20434
Summary:
The Red Hat Fedora Core Linux operating system is prone to an arbitrary code-execution vulnerability.

An attacker can exploit this issue to potentially execute arbitrary code with the privileges of the user running the affected binary.

3. Xoops Search.PHP Cross-Site Scripting Vulnerability
BugTraq ID: 20514
Remote: Yes
Date Published: 2006-10-13
Relevant URL: http://www.securityfocus.com/bid/20514
Summary:
Xoops is prone to a cross-site scripting vulnerability because it fails to properly sanitize user-supplied input.

An attacker may leverage this issue to have arbitrary script code execute in the browser of an unsuspecting user in the context of the affected site. This may help the attacker steal cookie-based authentication credentials and launch other attacks.

4. Mozilla Bugzilla Multiple Input Validation and Information disclosure Vulnerabilities
BugTraq ID: 20538
Remote: Yes
Date Published: 2006-10-16
Relevant URL: http://www.securityfocus.com/bid/20538
Summary:
Bugzilla is affected by multiple input-validation and information-disclosure vulnerabilities because the application fails to properly sanitize user-supplied input and to protect sensitive information from unauthorized users.

An attacker can leverage these issues to access attachment and deadline information that are marked private or are otherwise protected and to conduct cross-site scripting and HTML-injection attacks. Exploiting these input-validation issues may allow attackers to steal cookie-based authentication credentials and to launch other attacks.

Versions 2.18.5, 2.20.2, 2.22, and 2.23.2 are affected by these vulnerabilities.

5. NVidia Binary Graphics Driver For Linux Buffer Overflow Vulnerability
BugTraq ID: 20559
Remote: Yes
Date Published: 2006-10-16
Relevant URL: http://www.securityfocus.com/bid/20559
Summary:
The NVIDIA binary graphics driver is prone to a buffer-overflow vulnerability.

An attacker can exploit this issue to execute arbitrary code with superuser privileges, completely compromising the affected computer. Failed exploit attempts will result in a denial-of-service.

NVidia Driver for Linux versions 8774 and 8762 are vulnerable to this issue; other versions may also be affected.

6. Libksba Signature Verification Denial of Service Vulnerability
BugTraq ID: 20565
Remote: Yes
Date Published: 2006-10-16
Relevant URL: http://www.securityfocus.com/bid/20565
Summary:
The libksba library is prone to a denial-of-service vulnerability because it crashes when verifying a signature with a malformed X.509 certificate.

Attackers can exploit this issue to crash the KSBA library, and in turn cause various programs that depend on the library to cease functioning, effectively denying service.

The following versions are affected:

- SUSE Linux's version 0.9.12
- Ubuntu libksba8 version 0.9.9-2ubuntu0.5.04.

Other individual implementations may also be vulnerable.

III. LINUX FOCUS LIST SUMMARY
---------------------------------
1. Dynamic firewall based on bandwidth usage ?
http://www.securityfocus.com/archive/91/448124

IV. UNSUBSCRIBE INSTRUCTIONS
-----------------------------
To unsubscribe send an e-mail message to linux-secnews-unsubscribe@securityfocus.com from the subscribed address. The contents of the subject or message body do not matter. You will receive a confirmation request message to which you will have to answer. Alternatively you can also visit http://www.securityfocus.com/newsletters and unsubscribe via the website.

If your email address has changed email listadmin@securityfocus.com and ask to be manually removed.

V. SPONSOR INFORMATION
------------------------
This Issue is Sponsored by: Norwich University

EARN A MASTER OF SCIENCE IN INFORMATION ASSURANCE - ONLINE
The NSA has designated Norwich University a center of Academic Excellence in Information Security. Our program offers unparalleled Infosec management education and the case study affords you unmatched consulting experience. Using interactive e-Learning technology, you can earn this esteemed degree, without disrupting your career or home life.

http://www.msia.norwich.edu/secfocus

No comments:

Blog Archive