----------------------------------------
This Issue is Sponsored by: SPI Dynamics
ALERT: "How A Hacker Launches A Blind SQL Injection Attack Step-by-Step"!"- White Paper
Blind SQL Injection can deliver total control of your server to a hacker giving them the ability to read, write and manipulate all data stored in your backend systems! Download this *FREE* white paper from SPI Dynamics for a complete guide to protection!
https://download.spidynamics.com/1/ad/bsq.asp?Campaign_ID=70160000000CehF
------------------------------------------------------------------
I. FRONT AND CENTER
1. Password Management Concerns with IE and Firefox, part one
2. Password Management Concerns with IE and Firefox, part two
II. LINUX VULNERABILITY SUMMARY
1. 2X ThinClientServer Unauthorized Administrative Account Creation Vulnerability
2. SquirrelMail Multiple Cross Site Scripting and Input Validation Vulnerabilities
3. SMF Image File HTML Injection Vulnerability
4. Xine-Lib RuleMatches Remote Buffer Overflow Vulnerability
5. Yukihiro Matsumoto Ruby CGI.RB Library Remote Denial Of Service Vulnerability
6. L2TPNS Heartbeat Handling Denial of Service Vulnerability
7. Multiple Security Products MIME Encoding Content Filter Bypass Weakness
8. GnuPG OpenPGP Packet Processing Function Pointer Overwrite Vulnerability
9. MADWiFi Linux Kernel Device Driver Multiple Remote Buffer Overflow Vulnerabilities
10. Linux Kernel IBMTR.C Remote Denial of Service Vulnerability
11. CA Multiple BrightStor ARCserve Backup Discovery Service Remote Buffer Overflow Vulnerability
12. Clam Anti-Virus MIME Attachments Denial Of Service Vulnerability
13. Linux Kernel Multiple Vulnerabilities
III. LINUX FOCUS LIST SUMMARY
1. Pandora FMS 1.2 released
2. Selecting OS for High-availability/mission-critical web portal
3. Portsentry and Snort Question
4. Red Hat vs Debian Linux: overall security
5. How to check UID of process on the other side of local TCP/UDP connection
IV. UNSUBSCRIBE INSTRUCTIONS
V. SPONSOR INFORMATION
I. FRONT AND CENTER
---------------------
1. Password Management Concerns with IE and Firefox, part one
By Mikhael Felker
This two-part paper presents an analysis of the security mechanisms, risks, attacks, and defenses of the two most commonly used password management systems for web browsers, found in Internet Explorer and Firefox. The article specifically addresses IE 6 and 7 and Firefox 1.5 and 2.0.
http://www.securityfocus.com/infocus/1882
2. Password Management Concerns with IE and Firefox, part two
By Mikhael Felker
This two-part paper presents an analysis of the security mechanisms, risks, attacks, and defenses of the two most commonly used password management systems for web browsers, found in Internet Explorer and Firefox. The article specifically addresses IE 6 and 7 and Firefox 1.5 and 2.0.
http://www.securityfocus.com/infocus/1883
II. LINUX VULNERABILITY SUMMARY
------------------------------------
1. 2X ThinClientServer Unauthorized Administrative Account Creation Vulnerability
BugTraq ID: 21300
Remote: Yes
Date Published: 2006-12-04
Relevant URL: http://www.securityfocus.com/bid/21300
Summary:
ThinClientServer is prone to a vulnerability that may allow an unauthorized remote attacker to create an administrative account and to gain administrative access to an affected application.
2. SquirrelMail Multiple Cross Site Scripting and Input Validation Vulnerabilities
BugTraq ID: 21414
Remote: Yes
Date Published: 2006-12-04
Relevant URL: http://www.securityfocus.com/bid/21414
Summary:
SquirrelMail is prone to multiple cross-site scripting vulnerabilities because it fails to sufficiently sanitize user-supplied data.
Exploiting these issues could allow an attacker to steal cookie-based authentication credentials and to launch other attacks.
Versions prior to 1.4.9a are vulnerable.
3. SMF Image File HTML Injection Vulnerability
BugTraq ID: 21431
Remote: Yes
Date Published: 2006-12-04
Relevant URL: http://www.securityfocus.com/bid/21431
Summary:
SMF is prone to an HTML-injection vulnerability because it fails to properly sanitize user-supplied input before using it in dynamically generated content.
Attacker-supplied HTML and script code would execute in the context of the affected website, potentially allowing an attacker to steal cookie-based authentication credentials or to control how the site is rendered to the user; other attacks are also possible.
Note that this vulnerability may be triggered only in the Internet Explorer browser.
SMF version 1.1 is vulnerable to this issue.
4. Xine-Lib RuleMatches Remote Buffer Overflow Vulnerability
BugTraq ID: 21435
Remote: Yes
Date Published: 2006-12-04
Relevant URL: http://www.securityfocus.com/bid/21435
Summary:
xine-lib library running on real media is prone to a remote buffer-overflow vulnerability because the application fails to properly bounds-check user-supplied data before copying it into an insufficiently sized buffer.
An attacker can exploit this issue to execute arbitrary code with the privileges of the currently logged in user. Failed exploit attempts will result in a denial-of-service.
5. Yukihiro Matsumoto Ruby CGI.RB Library Remote Denial Of Service Vulnerability
BugTraq ID: 21441
Remote: Yes
Date Published: 2006-12-04
Relevant URL: http://www.securityfocus.com/bid/21441
Summary:
Ruby is prone to a remote denial-of-service vulnerability because the application's CGI library fails to properly handle specially crafted HTTP requests.
Successful exploits may allow remote attackers to cause denial-of-service conditions on computers running the affected Ruby CGI library.
6. L2TPNS Heartbeat Handling Denial of Service Vulnerability
BugTraq ID: 21443
Remote: Yes
Date Published: 2006-12-05
Relevant URL: http://www.securityfocus.com/bid/21443
Summary:
The l2tpns program is prone to a denial-of-service vulnerability because it fails to properly handle user-supplied data.
Attackers can exploit this issue to crash the affected application, effectively denying service to legitimate users. Attackers may be able to exploit this issue to execute arbitrary code, but this has not been confirmed.
7. Multiple Security Products MIME Encoding Content Filter Bypass Weakness
BugTraq ID: 21461
Remote: Yes
Date Published: 2006-12-06
Relevant URL: http://www.securityfocus.com/bid/21461
Summary:
Various security products are prone to a filter-bypass weakness. These products include:
- BitDefender Mail Protection for SMB 2.0
- ClamAV 0.88.6
- F-prot AntiVirum for Linux x86 Mail Servers 4.6.6
- Kaspersky Anti-Virus for Linux Mail Server 5.5.10
Other applications and versions may also be affected.
This issue occurs because the application fails to handle malformed input that may allow an attacker to bypass the file-filtering mechanism.
8. GnuPG OpenPGP Packet Processing Function Pointer Overwrite Vulnerability
BugTraq ID: 21462
Remote: Yes
Date Published: 2006-12-06
Relevant URL: http://www.securityfocus.com/bid/21462
Summary:
GnuPG is prone to a vulnerability that could permit an attacker to overwrite a function pointer.
This issue occurs because of a design error when dealing with OpenPGP packets. Attackers may exploit this issue to execute arbitrary code.
Successful exploits may result in the remote compromise of computers using the vulnerable application.
9. MADWiFi Linux Kernel Device Driver Multiple Remote Buffer Overflow Vulnerabilities
BugTraq ID: 21486
Remote: Yes
Date Published: 2006-12-07
Relevant URL: http://www.securityfocus.com/bid/21486
Summary:
The MADWiFi device driver is prone to multiple remote stack-based buffer-overflow vulnerabilities because the software fails to do proper bounds-checking of user-supplied data before copying it to an insufficiently sized memory buffer.
These issues affect only computers with the vulnerable device driver compiled, installed, and enabled on Linux operating systems. Also, victims must be running a local application to scan available access points for the return packets.
A remote attacker may exploit these issues to cause denial-of-service conditions or to possibly execute arbitrary code in the context of the affected kernel. Successful exploits can result in a complete compromise of affected computers.
Versions of the MADWiFi device driver prior to 0.9.2.1 are vulnerable.
10. Linux Kernel IBMTR.C Remote Denial of Service Vulnerability
BugTraq ID: 21490
Remote: Yes
Date Published: 2006-12-08
Relevant URL: http://www.securityfocus.com/bid/21490
Summary:
The Linux kernel is prone to a remote denial-of-service vulnerability.
This vulnerability resides in the 'drivers/net/tokenring/ibmtr.c' file.
Exploiting this vulnerability can allow remote attackers to crash the affected kernel, resulting in denial-of-service conditions. Attackers may also be able to execute arbitrary code, but this has not been confirmed.
Kernel versions from 2.6.0 up to and including 2.6.19 are vulnerable to this issue.
11. CA Multiple BrightStor ARCserve Backup Discovery Service Remote Buffer Overflow Vulnerability
BugTraq ID: 21502
Remote: Yes
Date Published: 2006-12-08
Relevant URL: http://www.securityfocus.com/bid/21502
Summary:
Computer Associates BrightStor ARCserve Backup is affected by a remote buffer-overflow vulnerability because the application fails to perform proper bounds-checking on data supplied to the application.
A remote attacker may exploit this issue to execute arbitrary code on a vulnerable computer with SYSTEM privileges. Failed exploit attempts may cause denial-of-service conditions. Successful exploits can lead to a complete compromise of affected computers.
This issue affects multiple BrightStor ARCserve Backup application agents and the base product.
12. Clam Anti-Virus MIME Attachments Denial Of Service Vulnerability
BugTraq ID: 21510
Remote: Yes
Date Published: 2006-12-09
Relevant URL: http://www.securityfocus.com/bid/21510
Summary:
ClamAV is prone to a denial-of-service vulnerability because it fails to handle specific MIME attachments.
A successful exploit of this issue will cause the application to crash, resulting in a denial-of-service condition.
ClamAV versions prior to 0.88.4-2 are vulnerable; other versions may also be affected.
13. Linux Kernel Multiple Vulnerabilities
BugTraq ID: 21523
Remote: No
Date Published: 2006-12-10
Relevant URL: http://www.securityfocus.com/bid/21523
Summary:
Linux Kernel is prone to multiple vulnerabilities that can allow local attackers to carry out various attacks, including denial-of-service attacks.
Kernel 2.6.8 and prior versions are reported affected.
III. LINUX FOCUS LIST SUMMARY
---------------------------------
1. Pandora FMS 1.2 released
http://www.securityfocus.com/archive/91/454078
2. Selecting OS for High-availability/mission-critical web portal
http://www.securityfocus.com/archive/91/453320
3. Portsentry and Snort Question
http://www.securityfocus.com/archive/91/452881
4. Red Hat vs Debian Linux: overall security
http://www.securityfocus.com/archive/91/452878
5. How to check UID of process on the other side of local TCP/UDP connection
http://www.securityfocus.com/archive/91/452761
IV. UNSUBSCRIBE INSTRUCTIONS
-----------------------------
To unsubscribe send an e-mail message to linux-secnews-unsubscribe@securityfocus.com from the subscribed address. The contents of the subject or message body do not matter. You will receive a confirmation request message to which you will have to answer. Alternatively you can also visit http://www.securityfocus.com/newsletters and unsubscribe via the website.
If your email address has changed email listadmin@securityfocus.com and ask to be manually removed.
V. SPONSOR INFORMATION
------------------------
This Issue is Sponsored by: SPI Dynamics
ALERT: "How A Hacker Launches A Blind SQL Injection Attack Step-by-Step"!"- White Paper
Blind SQL Injection can deliver total control of your server to a hacker giving them the ability to read, write and manipulate all data stored in your backend systems! Download this *FREE* white paper from SPI Dynamics for a complete guide to protection!
https://download.spidynamics.com/1/ad/bsq.asp?Campaign_ID=70160000000CehF
No comments:
Post a Comment