News

Tuesday, April 08, 2008

SecurityFocus Linux Newsletter #384

SecurityFocus Linux Newsletter #384
----------------------------------------

This issue is sponsored by Industry Brains

Seagate SURVEILLANCE SOLUTIONS are everywhere, 24x7
Seagate® gives you a portfolio of hard drives optimized for specific surveillance situations.
http://newsletter.industrybrains.com/c?fe;1;7791a;212ac;4a9;0;da4


SECURITY BLOGS
SecurityFocus has selected a few syndicated sources that stand out as conveying topics of interest for our community. We are proud to offer content from Matasano at this time and will be adding more in the coming weeks.
http://www.securityfocus.com/blogs

------------------------------------------------------------------
I. FRONT AND CENTER
1.On the Border
2.Catch Them if You can
II. LINUX VULNERABILITY SUMMARY
1. Mondo Rescue Prior to 2.2.5 Unspecified Vulnerability
2. Linux Audit Daemon 'audit_log_user_command()' Local Buffer Overflow Vulnerability
3. OpenSSH ForceCommand Command Execution Weakness
4. CUPS 'gif_read_lzw()' GIF File Buffer Overflow Vulnerability
5. IBM DB2 Content Manager Unspecified Security Vulnerability
6. Gnome Desktop Screensaver NIS Authentication Local Unauthorized Access Vulnerability
7. iMatix Xitami Multiple Format String Vulnerabilities
8. openMosix 'libmosix.c' Remote Stack-Based Buffer Overflow Vulnerability
9. LICQ File Descriptor Remote Denial of Service Vulnerability
III. LINUX FOCUS LIST SUMMARY
IV. UNSUBSCRIBE INSTRUCTIONS
V. SPONSOR INFORMATION

I. FRONT AND CENTER
---------------------
1.On the Border
By Mark Rasch
Recently, I was going through an airport with my shoes, coat, jacket, and belt off as well as with my carry-on bag, briefcase, and laptop all separated for easy inspection. I was heading through security at the Washington D.C., Ronald Reagan National Airport in Arlington, Virginia, or "National" as we locals call it. As I passed through the new magnetometer which gently puffed air all over my body -- which to me seems to be a cross between a glaucoma test and Marilyn Monroe in Gentlemen Prefer Blondes -- a TSA employee absent-mindedly asked if he could "inspect" my laptop computer. While the inspection was cursory, the situation immediately gave me pause: What was in my laptop anyway?
http://www.securityfocus.com/columnists/469

2.Catch Them if You Can
By Don Parker
High-profile network security breaches have proliferated over the past few years. While many "breaches" consist of lost data or a stolen laptop, true breaches -- where a online attacker compromises a network and removes data -- have become very common
http://www.securityfocus.com/columnists/468


II. LINUX VULNERABILITY SUMMARY
------------------------------------
1. Mondo Rescue Prior to 2.2.5 Unspecified Vulnerability
BugTraq ID: 28522
Remote: No
Date Published: 2008-03-31
Relevant URL: http://www.securityfocus.com/bid/28522
Summary:
Mondo Rescue is prone to an unspecified vulnerability.

Very few technical details are currently available. We will update this BID as more information emerges.

Versions prior to Mondo Rescue 2.2.5 are vulnerable.

2. Linux Audit Daemon 'audit_log_user_command()' Local Buffer Overflow Vulnerability
BugTraq ID: 28524
Remote: No
Date Published: 2008-03-31
Relevant URL: http://www.securityfocus.com/bid/28524
Summary:
The Linux Audit daemon is prone to a local buffer-overflow vulnerability because the software fails to properly bounds-check user-supplied input.

Successfully exploiting this issue allows local attackers to execute arbitrary machine code with elevated privileges. This may facilitate the compromise of affected computers.

Versions prior to Linux Audit 1.7 are vulnerable.

3. OpenSSH ForceCommand Command Execution Weakness
BugTraq ID: 28531
Remote: No
Date Published: 2008-03-31
Relevant URL: http://www.securityfocus.com/bid/28531
Summary:
OpenSSH is prone to a weakness that may allow attackers to execute arbitrary commands.

Successful exploits may allow attackers to execute arbitrary commands, contrary to the wishes of administrators and bypassing the intent of the 'ForceCommand' option.

Versions prior to OpenSSH 4.9 are vulnerable.

4. CUPS 'gif_read_lzw()' GIF File Buffer Overflow Vulnerability
BugTraq ID: 28544
Remote: Yes
Date Published: 2008-04-01
Relevant URL: http://www.securityfocus.com/bid/28544
Summary:
CUPS is prone to a buffer-overflow vulnerability because it fails to perform adequate boundary checks on user-supplied GIF image data before copying it to an insufficiently sized buffer.

Successful exploits allow attackers to execute arbitrary code with the privileges of a user running the utilities. Failed exploit attempts likely cause denial-of-service conditions.

CUPS 1.3.6 is vulnerable; other versions may also be affected.

5. IBM DB2 Content Manager Unspecified Security Vulnerability
BugTraq ID: 28567
Remote: No
Date Published: 2008-04-02
Relevant URL: http://www.securityfocus.com/bid/28567
Summary:
IBM DB2 Content Manager is prone to an unspecified security vulnerability.

Very few technical details are currently available. We will update this BID as more information emerges.

Versions prior to 8.3 Fix Pack 8 are vulnerable.

6. Gnome Desktop Screensaver NIS Authentication Local Unauthorized Access Vulnerability
BugTraq ID: 28575
Remote: No
Date Published: 2008-04-02
Relevant URL: http://www.securityfocus.com/bid/28575
Summary:
Gnome Desktop is prone to a local unauthorized-access vulnerability.

A local attacker can exploit this issue to gain access to the affected computer. Successfully exploiting this issue may lead to other attacks.

7. iMatix Xitami Multiple Format String Vulnerabilities
BugTraq ID: 28603
Remote: Yes
Date Published: 2008-04-03
Relevant URL: http://www.securityfocus.com/bid/28603
Summary:
Xitami is prone to multiple format-string vulnerabilities because the application fails to adequately sanitize user-supplied input before passing it as the format specifier to a formatted-printing function.

A remote attacker may potentially execute arbitrary code in the context of the affected application. Failed exploit attempts will likely result in a denial of service.

These issues affect Xitami 2.5c2; other versions may be affected as well.

8. openMosix 'libmosix.c' Remote Stack-Based Buffer Overflow Vulnerability
BugTraq ID: 28663
Remote: Yes
Date Published: 2008-04-07
Relevant URL: http://www.securityfocus.com/bid/28663
Summary:
openMosix is prone to a stack-based buffer-overflow vulnerability because it fails to perform adequate boundary checks on user-supplied input.

Attackers can exploit this issue to cause denial-of-service conditions and possibly execute arbitrary code in the context of applications that use the openMosix API.

openMosix 2.4.20-3 is vulnerable; other versions may also be affected.

9. LICQ File Descriptor Remote Denial of Service Vulnerability
BugTraq ID: 28679
Remote: Yes
Date Published: 2008-04-08
Relevant URL: http://www.securityfocus.com/bid/28679
Summary:
LICQ is prone to a remote denial-of-service vulnerability. This issue occurs because the application fails to handle exceptional conditions.

An attacker can exploit this issue to crash the affected application, denying service to legitimate users.

III. LINUX FOCUS LIST SUMMARY
---------------------------------
IV. UNSUBSCRIBE INSTRUCTIONS
-----------------------------
To unsubscribe send an e-mail message to linux-secnews-unsubscribe@securityfocus.com from the subscribed address. The contents of the subject or message body do not matter. You will receive a confirmation request message to which you will have to answer. Alternatively you can also visit http://www.securityfocus.com/newsletters and unsubscribe via the website.

If your email address has changed email listadmin@securityfocus.com and ask to be manually removed.

V. SPONSOR INFORMATION
------------------------
This issue is sponsored by Industry Brains

Seagate SURVEILLANCE SOLUTIONS are everywhere, 24x7
Seagate® gives you a portfolio of hard drives optimized for specific surveillance situations.
http://newsletter.industrybrains.com/c?fe;1;7791a;212ac;4a9;0;da4

No comments:

Blog Archive