News

Thursday, May 31, 2007

SecurityFocus Linux Newsletter #339

SecurityFocus Linux Newsletter #339
----------------------------------------

This Issue is Sponsored by: ByteCrusher

"Please come in and trash the place - I'll be back in 8 hours"
Fact: It can take up to 8 hours for anti-virus companies to fix a new security hole. WindowZones by ByteCrusher protects your computer in that critical 8 hour period when your Anti-Virus is "out to lunch". Learn More.

http://landing.bytecrusher.com/windowzones/sflanding1.aspx?Referrer=sf-A21sfLin-wz1&cm_mmc=Security%20Focus-_-USA-_-Newsletter-_-Newsletter%3A%20Other%3A%20A21%3A%20sfLin%3A%20wz1


SECURITY BLOGS
SecurityFocus has selected a few syndicated sources that stand out as conveying topics of interest for our community. We are proud to offer content from Matasano at this time and will be adding more in the coming weeks.
http://www.securityfocus.com/blogs

------------------------------------------------------------------
I. FRONT AND CENTER
1. Security Analogies
2. Your Space, My Space, Everybody's Space
II. LINUX VULNERABILITY SUMMARY
1. Freetype TT_Load_Simple_Glyph() TTF File Integer Overflow Vulnerability
2. MadWifi Multiple Denial of Service Vulnerabilities
3. Linux Kernel VFat Compat IOCTLS Local Denial of Service Vulnerability
4. GForge Unspecified Remote Arbitrary Command Execution Vulnerability
5. File Multiple Denial of Service Vulnerabilities
6. Apache Tomcat JK Connector Double Encoding Security Bypass Vulnerability
7. Linux Kernel GEODE-AES Unspecified Vulnerability
8. Avira Antivir Antivirus Multiple Remote Vulnerabilities
9. Mutt Mutt_Gecos_Name Function Local Buffer Overflow Vulnerability
10. Multiple F-Secure Products Packed Executables and Archives Denial of Service Vulnerability
11. F-Secure Anti-Virus LHA Processing Buffer Overflow Vulnerability
12. F-Secure Multiple Products Real-time Scanning Component Local Privilege Escalation Vulnerability
13. Avira Antivir Tar Archive Handling Remote Denial Of Service Vulnerability
14. Mozilla Products Multiple Remote Vulnerabilities
III. LINUX FOCUS LIST SUMMARY
1. Survey on Supercomputer Cluster Security
2. Security Videos
IV. UNSUBSCRIBE INSTRUCTIONS
V. SPONSOR INFORMATION

I. FRONT AND CENTER
---------------------
1. Security Analogies
By Scott Granneman
Scott Granneman discusses security analogies and their function in educating the masses on security concepts.
http://www.securityfocus.com/columnists/445

2. Your Space, My Space, Everybody's Space
By Mark Rasch
Privacy is about protecting data when somebody wants it for some purpose. It is easy to protect data that nobody wants.
http://www.securityfocus.com/columnists/444


II. LINUX VULNERABILITY SUMMARY
------------------------------------
1. Freetype TT_Load_Simple_Glyph() TTF File Integer Overflow Vulnerability
BugTraq ID: 24074
Remote: Yes
Date Published: 2007-05-21
Relevant URL: http://www.securityfocus.com/bid/24074
Summary:
FreeType is prone to an integer-overflow vulnerability because it fails to properly validate TTF files.

An attacker may exploit this issue by enticing victims into opening maliciously crafted TTF Files.

Successful exploits will allow attackers to execute arbitrary code in the context in the context of applications that use the affected library. Failed exploit attempts will likely result in denial-of-service conditions.

This issue affects FreeType 2.3.4 and prior versions.

2. MadWifi Multiple Denial of Service Vulnerabilities
BugTraq ID: 24114
Remote: Yes
Date Published: 2007-05-23
Relevant URL: http://www.securityfocus.com/bid/24114
Summary:
MadWifi is prone to multiple denial-of-service vulnerabilities.

Exploiting these issues may permit attackers to cause system crashes and deny service to legitimate users.

Versions of MadWifi prior to 0.9.3.1 are vulnerable.

3. Linux Kernel VFat Compat IOCTLS Local Denial of Service Vulnerability
BugTraq ID: 24134
Remote: No
Date Published: 2007-05-24
Relevant URL: http://www.securityfocus.com/bid/24134
Summary:
The Linux Kernel is prone to a denial-of-service vulnerability.

A local attacker can exploit this issue to cause the kernel to crash, effectively denying service to legitimate users.

4. GForge Unspecified Remote Arbitrary Command Execution Vulnerability
BugTraq ID: 24141
Remote: Yes
Date Published: 2007-05-24
Relevant URL: http://www.securityfocus.com/bid/24141
Summary:
GForge is prone to a remote command-execution vulnerability because the application fails to sanitize user-supplied data passed through URI parameters.

An attacker can supply arbitrary shell commands through the affected parameter to be run in the context of the affected server.

5. File Multiple Denial of Service Vulnerabilities
BugTraq ID: 24146
Remote: Yes
Date Published: 2007-05-24
Relevant URL: http://www.securityfocus.com/bid/24146
Summary:
The 'file' utility is prone to multiple denial-of-service vulnerabilities because it fails to handle exceptional conditions.

An attacker could exploit this issue by enticing a victim to open a specially crafted file. A denial-of-service condition can occur. Arbitrary code execution may be possible, but Symantec has not confirmed this.

6. Apache Tomcat JK Connector Double Encoding Security Bypass Vulnerability
BugTraq ID: 24147
Remote: Yes
Date Published: 2007-05-24
Relevant URL: http://www.securityfocus.com/bid/24147
Summary:
Apache HTTP server running with the Tomcat JK Web Server Connector is prone to a security-bypass vulnerability because it decodes request URLs multiple times.

Exploiting this issue allows attackers to access restricted files in the Tomcat web directory. This can expose sensitive information that could help attackers launch further attacks.

This issue is present in versions of Apache Tomcat JK Connector prior to 1.2.23.

7. Linux Kernel GEODE-AES Unspecified Vulnerability
BugTraq ID: 24150
Remote: No
Date Published: 2007-05-24
Relevant URL: http://www.securityfocus.com/bid/24150
Summary:
The Linux kernel is prone to an unspecified vulnerability.

This issue has been identified in versions prior to 2.6.21.3.

8. Avira Antivir Antivirus Multiple Remote Vulnerabilities
BugTraq ID: 24187
Remote: Yes
Date Published: 2007-05-28
Relevant URL: http://www.securityfocus.com/bid/24187
Summary:
Avira Antivir Antivirus is prone to multiple remote vulnerabilities.

Successfully exploiting these issues allows remote attackers to execute arbitrary machine code with elevated privileges, facilitating the complete compromise of affected computers. Attackers may also trigger denial-of-service conditions by crashing the application or causing infinite loops.

These issues affect:

Avira Antivir AVPack versions prior to 7.03.00.09
Engine versions prior to 7.04.00.24

9. Mutt Mutt_Gecos_Name Function Local Buffer Overflow Vulnerability
BugTraq ID: 24192
Remote: No
Date Published: 2007-05-28
Relevant URL: http://www.securityfocus.com/bid/24192
Summary:
Mutt is prone to a local buffer-overflow vulnerability because it fails to properly bounds-check user-supplied input before using it in a memory copy operation.

An attacker can exploit this issue to execute arbitrary code with the with the privileges of the victim. Failed exploit attempts will result in a denial of service.

10. Multiple F-Secure Products Packed Executables and Archives Denial of Service Vulnerability
BugTraq ID: 24234
Remote: Yes
Date Published: 2007-05-30
Relevant URL: http://www.securityfocus.com/bid/24234
Summary:
Multiple F-Secure products are prone to a denial-of-service vulnerability because the software fails to handle exceptional conditions.

An attacker can exploit this issue to cause a denial-of-service conditon.

11. F-Secure Anti-Virus LHA Processing Buffer Overflow Vulnerability
BugTraq ID: 24235
Remote: Yes
Date Published: 2007-05-30
Relevant URL: http://www.securityfocus.com/bid/24235
Summary:
Multiple F-Secure Anti-Virus applications are prone to a buffer-overflow vulnerability when they process certain files. This issue occurs because the applications fail to properly check boundaries on user-supplied data before copying it to an insufficiently sized memory buffer.

Successful exploits can allow attackers to execute arbitrary code with the privileges of the vulnerable application. Failed exploit attempts will likely result in denial-of-service conditions.

12. F-Secure Multiple Products Real-time Scanning Component Local Privilege Escalation Vulnerability
BugTraq ID: 24237
Remote: No
Date Published: 2007-05-30
Relevant URL: http://www.securityfocus.com/bid/24237
Summary:
Multiple F-Secure workstation and file-server products are prone to a local privilege-escalation vulnerability.

Exploiting this vulnerability allows local attackers to gain superuser or SYSTEM-level privileges, leading to a complete compromise of the affected computer.

13. Avira Antivir Tar Archive Handling Remote Denial Of Service Vulnerability
BugTraq ID: 24239
Remote: Yes
Date Published: 2007-05-30
Relevant URL: http://www.securityfocus.com/bid/24239
Summary:
Avira Antivir is prone to a denial-of-service vulnerability because the application fails to handle certain TAR archives.

Remote attackers may exploit this issue by enticing victims into opening maliciously crafted TAR archives.

A successful attack may allow an attacker to cause denial-of-service conditions.

14. Mozilla Products Multiple Remote Vulnerabilities
BugTraq ID: 24242
Remote: Yes
Date Published: 2007-05-31
Relevant URL: http://www.securityfocus.com/bid/24242
Summary:
The Mozilla Foundation has released six security advisories specifying vulnerabilities in Firefox, SeaMonkey, and Thunderbird.

These vulnerabilities allow attackers to:

- Execute arbitrary code
- Cause denial-of-service conditions
- Perform cross-site scripting attacks
- Obtain potentially sensitive information
- Spoof legitimate content

Other attacks may also be possible.

III. LINUX FOCUS LIST SUMMARY
---------------------------------
1. Survey on Supercomputer Cluster Security
http://www.securityfocus.com/archive/91/469540

2. Security Videos
http://www.securityfocus.com/archive/91/469297

IV. UNSUBSCRIBE INSTRUCTIONS
-----------------------------
To unsubscribe send an e-mail message to linux-secnews-unsubscribe@securityfocus.com from the subscribed address. The contents of the subject or message body do not matter. You will receive a confirmation request message to which you will have to answer. Alternatively you can also visit http://www.securityfocus.com/newsletters and unsubscribe via the website.

If your email address has changed email listadmin@securityfocus.com and ask to be manually removed.

V. SPONSOR INFORMATION
------------------------
This Issue is Sponsored by: ByteCrusher

"Please come in and trash the place - I'll be back in 8 hours"
Fact: It can take up to 8 hours for anti-virus companies to fix a new security hole. WindowZones by ByteCrusher protects your computer in that critical 8 hour period when your Anti-Virus is "out to lunch". Learn More.

http://landing.bytecrusher.com/windowzones/sflanding1.aspx?Referrer=sf-A21sfLin-wz1&cm_mmc=Security%20Focus-_-USA-_-Newsletter-_-Newsletter%3A%20Other%3A%20A21%3A%20sfLin%3A%20wz1

No comments:

Blog Archive