----------------------------------------
This issue is sponsored by Black Hat USA:
Attend Black Hat USA, August 2-7 in Las Vegas, the world's premier technical event for ICT security experts. Featuring 40 hands-on training courses and 80 Briefings presentations with lots of new content and new tools. Network with 4,000 delegates from 50 nations. Visit product displays by 30 top sponsors in a relaxed setting.
SECURITY BLOGS
SecurityFocus has selected a few syndicated sources that stand out as conveying topics of interest for our community. We are proud to offer content from Matasano at this time and will be adding more in the coming weeks.
http://www.securityfocus.com/blogs
------------------------------------------------------------------
I. FRONT AND CENTER
1. Anti-Social Networking
2. Thinking Beyond the Ivory Towers
II. LINUX VULNERABILITY SUMMARY
1. mtr 'split.c' Remote Stack Buffer Overflow Vulnerability
2. GnuTLS Prior to 2.2.5 Multiple Remote Vulnerabilities
3. Linux Kernel 'hrtimer_forward()' Local Denial of Service Vulnerability
4. libxslt XSL File Processing Buffer Overflow Vulnerability
5. SETroubleShoot sealert Insecure Temporary File Creation Vulnerability
6. vsftpd FTP Server 'deny_file' Option Remote Denial of Service Vulnerability
7. SETroubleShoot sealert Arbitrary Script Injection Vulnerability
8. Snort Time To Live Fragment Reassembly Security Bypass Weakness
9. Sun Java System Web Server Advanced Search Mechanism Cross-Site Scripting Vulnerability
III. LINUX FOCUS LIST SUMMARY
1. CfP hack.lu 2008
IV. UNSUBSCRIBE INSTRUCTIONS
V. SPONSOR INFORMATION
I. FRONT AND CENTER
---------------------
1. Anti-Social Networking
By Mark Rasch
On May 15, 2008, a federal grand jury Los Angeles indicted 49-year-old Lori Drew of O.Fallon, Missouri, on charges of unauthorized access to a computer, typically used in hacking cases. Yet, Drew's alleged actions had little to do with computer intrusions.
http://www.securityfocus.com/columnists/473
2. Thinking Beyond the Ivory Towers
By Dave Aitel
In the information-security industry, there are clear and vast gaps in the way academia interacts with professional researchers. While these gaps will be filled in due time, their existence means that security professionals outside the hallowed halls of colleges and universities need to be aware of the differences in how researchers and professionals think.
http://www.securityfocus.com/columnists/472
II. LINUX VULNERABILITY SUMMARY
------------------------------------
1. mtr 'split.c' Remote Stack Buffer Overflow Vulnerability
BugTraq ID: 29290
Remote: Yes
Date Published: 2008-05-20
Relevant URL: http://www.securityfocus.com/bid/29290
Summary:
The 'mtr' utility is prone to a remote stack-based buffer-overflow vulnerability because the application fails to perform adequate boundary checks on user-supplied data.
An attacker can exploit this issue to execute arbitrary code with superuser privileges. Successfully exploiting this issue will result in the complete compromise of affected computers. Failed exploit attempts will result in a denial-of-service condition.
2. GnuTLS Prior to 2.2.5 Multiple Remote Vulnerabilities
BugTraq ID: 29292
Remote: Yes
Date Published: 2008-05-20
Relevant URL: http://www.securityfocus.com/bid/29292
Summary:
GnuTLS is prone to multiple remote vulnerabilities, including:
- A buffer-overflow vulnerability
- Multiple denial-of-service vulnerabilities
An attacker can exploit these issues to execute arbitrary code within the context of the affected application or crash the application, denying service to legitimate users.
Versions prior to GnuTLS 2.2.5 are vulnerable.
3. Linux Kernel 'hrtimer_forward()' Local Denial of Service Vulnerability
BugTraq ID: 29294
Remote: No
Date Published: 2008-05-20
Relevant URL: http://www.securityfocus.com/bid/29294
Summary:
The Linux kernel is prone to a local denial-of-service vulnerability because it fails to properly handle certain large timer expiry values.
Attackers can exploit this issue to cause the application to enter an infinite loop, denying service to legitimate users.
This issue affects the Linux kernel 2.6.21-rc4 and prior version srunning on 64-bit architectures.
4. libxslt XSL File Processing Buffer Overflow Vulnerability
BugTraq ID: 29312
Remote: Yes
Date Published: 2008-05-21
Relevant URL: http://www.securityfocus.com/bid/29312
Summary:
The 'libxslt' library is prone to a buffer-overflow vulnerability because the software fails to perform adequate boundary checks on user-supplied data.
An attacker may exploit this issue to execute arbitrary code with the privileges of the user running an application that relies on the affected library. Failed exploit attempts will likely result in denial-of-service conditions.
This issue affects libxslt 1.1.23 and prior versions.
5. SETroubleShoot sealert Insecure Temporary File Creation Vulnerability
BugTraq ID: 29320
Remote: No
Date Published: 2008-05-21
Relevant URL: http://www.securityfocus.com/bid/29320
Summary:
SETroubleShoot sealert creates temporary files in an insecure way.
An attacker with local access could potentially exploit this issue to perform symbolic-link attacks, overwriting arbitrary files in the context of the affected application. This may result in denial-of-service conditions; other attacks are also possible.
6. vsftpd FTP Server 'deny_file' Option Remote Denial of Service Vulnerability
BugTraq ID: 29322
Remote: Yes
Date Published: 2008-05-21
Relevant URL: http://www.securityfocus.com/bid/29322
Summary:
The 'vsftpd' FTP server is prone to a remote denial-of-service vulnerability because it fails to free allocated memory.
Successfully exploiting this issue allows remote attackers to crash the affected application, denying service to legitimate users.
7. SETroubleShoot sealert Arbitrary Script Injection Vulnerability
BugTraq ID: 29324
Remote: No
Date Published: 2008-05-21
Relevant URL: http://www.securityfocus.com/bid/29324
Summary:
SETroubleShoot sealert is prone to a script-injection vulnerability when handling certain log records.
Attackers can exploit the issue to execute arbitrary script code in the browser of an unsuspecting user.
8. Snort Time To Live Fragment Reassembly Security Bypass Weakness
BugTraq ID: 29327
Remote: Yes
Date Published: 2008-05-21
Relevant URL: http://www.securityfocus.com/bid/29327
Summary:
Snort is prone to a security-bypass weakness because of a design error affected by the Time To Live values of disassembled network packets.
Attackers can exploit this issue to bypass all Snort rules. This may facilitate further attacks.
This issue affects Snort 2.8 and 2.6 on multiple platforms.
9. Sun Java System Web Server Advanced Search Mechanism Cross-Site Scripting Vulnerability
BugTraq ID: 29355
Remote: Yes
Date Published: 2008-05-23
Relevant URL: http://www.securityfocus.com/bid/29355
Summary:
Sun Java System Web Server is prone to a cross-site scripting vulnerability because the application fails to properly sanitize user-supplied input.
An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of a site that uses the affected functionality. This may help the attacker steal cookie-based authentication credentials and launch other attacks.
This issue affects Sun Java System Web Server 6.1 and 7.0 for SPARC, x86, Linux, Windows, HP-UX, and AIX platforms.
III. LINUX FOCUS LIST SUMMARY
---------------------------------
1. CfP hack.lu 2008
http://www.securityfocus.com/archive/91/492320
IV. UNSUBSCRIBE INSTRUCTIONS
-----------------------------
To unsubscribe send an e-mail message to linux-secnews-unsubscribe@securityfocus.com from the subscribed address. The contents of the subject or message body do not matter. You will receive a confirmation request message to which you will have to answer. Alternatively you can also visit http://www.securityfocus.com/newsletters and unsubscribe via the website.
If your email address has changed email listadmin@securityfocus.com and ask to be manually removed.
V. SPONSOR INFORMATION
------------------------
This issue is sponsored by Black Hat USA:
Attend Black Hat USA, August 2-7 in Las Vegas, the world's premier technical event for ICT security experts. Featuring 40 hands-on training courses and 80 Briefings presentations with lots of new content and new tools. Network with 4,000 delegates from 50 nations. Visit product displays by 30 top sponsors in a relaxed setting.
No comments:
Post a Comment