News

Sunday, August 12, 2007

SecurityFocus Linux Newsletter #349

SecurityFocus Linux Newsletter #349
----------------------------------------

This Issue is Sponsored by: Watchfire

As web applications become increasingly complex, tremendous amounts of sensitive data - including personal, medical and financial information - are exchanged, and stored. This paper examines a few vulnerability detection methods - specifically comparing and contrasting manual penetration testing with automated scanning tools. Download Watchfire's "Web Application Security: Automated Scanning or Manual Penetration Testing?" whitepaper today!

https://www.watchfire.com/securearea/whitepapers.aspx?id=701700000008yka


SECURITY BLOGS
SecurityFocus has selected a few syndicated sources that stand out as conveying topics of interest for our community. We are proud to offer content from Matasano at this time and will be adding more in the coming weeks.
http://www.securityfocus.com/blogs

------------------------------------------------------------------
I. FRONT AND CENTER
1. Delete This!
2. Security conferences versus practical knowledge
II. LINUX VULNERABILITY SUMMARY
1. Dovecot ACL Plugin Security Bypass Vulnerability
2. Sun Java System Web Server Multiple HTTP Redirect Vulnerabilities
3. GNOME Display Manager G_Strsplit Function Local Denial Of Service Vulnerability
4. Linux Kernel TIF_SINGLESTEP Check Local Denial of Service Vulnerability
5. Linux Kernel AACRAID Driver Local Security Bypass Vulnerability
6. Asterisk Skinny Channel Driver Remote Denial of Service Vulnerability
7. Linux Kernel i965 Chipsets Insecure Batchbuffer Local Privilege Escalation Vulnerability
III. LINUX FOCUS LIST SUMMARY
IV. UNSUBSCRIBE INSTRUCTIONS
V. SPONSOR INFORMATION

I. FRONT AND CENTER
---------------------
1. Delete This!
By Mark Rasch
A series of legal events means that companies that have no business reason to retain documents or records may be compelled to create and retain such records just so they can become available for discovery.
http://www.securityfocus.com/columnists/450

2. Security conferences versus practical knowledge
By Don Parker
While the training industry as a whole has evolved rather well to suit the needs of their clients, the computer conference - specifically the computer security conference - has declined in relevance to the everyday sys-admin and network security practitioners.
http://www.securityfocus.com/columnists/449


II. LINUX VULNERABILITY SUMMARY
------------------------------------
1. Dovecot ACL Plugin Security Bypass Vulnerability
BugTraq ID: 25182
Remote: Yes
Date Published: 2007-08-02
Relevant URL: http://www.securityfocus.com/bid/25182
Summary:
Dovecot ACL plugin is prone to a security-bypass vulnerability.

An attacker can exploit this issue to bypass mailbox restrictions and elevate privileges by altering ACL permission flags.

Versions prior to Dovecot 1.0.3 are vulnerable to this issue.

2. Sun Java System Web Server Multiple HTTP Redirect Vulnerabilities
BugTraq ID: 25190
Remote: Yes
Date Published: 2007-08-02
Relevant URL: http://www.securityfocus.com/bid/25190
Summary:
Sun Java System Web Server is prone to multiple vulnerabilities regarding 'redirect' functionality. The vulnerabilities include HTTP-response splitting, HTTP-header injection, and unauthorized access to system resources.

An attacker may exploit the HTTP-response-splitting vulnerability to influence or misrepresent how web content is served, cached, or interpreted. This could aid in various attacks that attempt to entice client users into a false sense of trust.

Attackers typically exploit HTTP-header-injection issues to inject arbitrary cookie attributes into a session cookie. Since session IDs are usually stored in cookie form, an attacker can inject arbitrary cookie data attributes into a session cookie and then launch various attacks on active web sessions.

3. GNOME Display Manager G_Strsplit Function Local Denial Of Service Vulnerability
BugTraq ID: 25191
Remote: No
Date Published: 2007-08-03
Relevant URL: http://www.securityfocus.com/bid/25191
Summary:
GNOME Display Manager is prone to a local denial-of-service vulnerability because the application fails to handle specially crafted GDM socket commands.

A local attacker can exploit this issue to crash the affected application, denying service to legitimate users.

Versions prior to GNOME Display Manager 2.14.13, 2.16.7, 2.18.4, and 2.19.5 are vulnerable.

4. Linux Kernel TIF_SINGLESTEP Check Local Denial of Service Vulnerability
BugTraq ID: 25200
Remote: No
Date Published: 2007-08-04
Relevant URL: http://www.securityfocus.com/bid/25200
Summary:
The Linux kernel is prone to a denial-of-service vulnerability.

A local attacker may exploit this issue to trigger an infinite loop in the kernel, causing a denial of service to legitimate users.

Versions prior to 2.6.21.7 are vulnerable.

5. Linux Kernel AACRAID Driver Local Security Bypass Vulnerability
BugTraq ID: 25216
Remote: No
Date Published: 2007-08-06
Relevant URL: http://www.securityfocus.com/bid/25216
Summary:
The Linux kernel is prone to a security-bypass vulnerability.

A local attacker may exploit this vulnerability to issue IOCTL commands to AACRAID devices. This may lead to denial-of-service conditions, including data loss and computer crashes.

Versions prior to 2.6.23-rc2 are vulnerable.

6. Asterisk Skinny Channel Driver Remote Denial of Service Vulnerability
BugTraq ID: 25228
Remote: Yes
Date Published: 2007-08-07
Relevant URL: http://www.securityfocus.com/bid/25228
Summary:
Asterisk is prone to a remote denial-of-service vulnerability because the application fails to properly handle certain specially crafted packets.

Exploiting this issue allows remote attackers to cause the application to crash, effectively denying service to legitimate users.

These versions are vulnerable:

Asterisk Open Source prior to 1.4.10
AsteriskNOW pre-release prior to beta7
Asterisk Appliance Developer Kit prior to 0.7.0
Asterisk s800i (Asterisk Appliance) prior to 1.0.3

7. Linux Kernel i965 Chipsets Insecure Batchbuffer Local Privilege Escalation Vulnerability
BugTraq ID: 25263
Remote: No
Date Published: 2007-08-09
Relevant URL: http://www.securityfocus.com/bid/25263
Summary:
The Linux kernel is prone to a local privilege-escalation vulnerability.

Exploiting this issue may allow local attackers to gain elevated privileges, facilitating the complete compromise of affected computers.

Versions of Linux kernel prior to 2.6.22.2 are vulnerable to this issue.

III. LINUX FOCUS LIST SUMMARY
---------------------------------
IV. UNSUBSCRIBE INSTRUCTIONS
-----------------------------
To unsubscribe send an e-mail message to linux-secnews-unsubscribe@securityfocus.com from the subscribed address. The contents of the subject or message body do not matter. You will receive a confirmation request message to which you will have to answer. Alternatively you can also visit http://www.securityfocus.com/newsletters and unsubscribe via the website.

If your email address has changed email listadmin@securityfocus.com and ask to be manually removed.

V. SPONSOR INFORMATION
------------------------
This Issue is Sponsored by: Watchfire

As web applications become increasingly complex, tremendous amounts of sensitive data - including personal, medical and financial information - are exchanged, and stored. This paper examines a few vulnerability detection methods - specifically comparing and contrasting manual penetration testing with automated scanning tools. Download Watchfire's "Web Application Security: Automated Scanning or Manual Penetration Testing?" whitepaper today!

https://www.watchfire.com/securearea/whitepapers.aspx?id=701700000008yka

No comments:

Blog Archive