News

Thursday, June 12, 2008

SecurityFocus Linux Newsletter #393

SecurityFocus Linux Newsletter #393
----------------------------------------

This issue is sponsored by IBM® Rational® AppScan

Failure to properly secure Web applications significantly impacts your ability to protect sensitive client and corporate data. IBM Rational AppScan is an automated scanner that monitors, identifies and helps remediate vulnerabilities.
Download a free trial of AppScan and see how it can help prevent against the threat of attack.
https://www.watchfire.com/securearea/appscan.aspx?id=701700000009T0r


SECURITY BLOGS
SecurityFocus has selected a few syndicated sources that stand out as conveying topics of interest for our community. We are proud to offer content from Matasano at this time and will be adding more in the coming weeks.
http://www.securityfocus.com/blogs

------------------------------------------------------------------
I. FRONT AND CENTER
1.Racing Against Reversers
2.Anti-Social Networking
II. LINUX VULNERABILITY SUMMARY
1. ikiwiki Blank Password Authentication Bypass Vulnerability
2. Gnome Evolution iCalendar Multiple Buffer Overflow Vulnerabilities
3. Sun Service Tag Registry '/var' Consumption Local Denial of Service Vulnerability
4. Asterisk-addons 'OOH323' Channel Driver Remote Denial of Service Vulnerability
5. Linux Kernel BER Decoding Remote Buffer Overflow Vulnerability
6. IBM DB2 Universal Database Prior to 9.1 Fixpak 5 Multiple Vulnerabilities
7. Linux Kernel DCCP Subsystem Buffer Overflow Vulnerability
8. Net-SNMP Remote Authentication Bypass Vulnerability
9. X.Org X Server RENDER Extension 'ProcRenderCreateCursor()' Denial of Service Vulnerability
10. X.Org X Server MIT-SHM Extension Information Disclosure Vulnerability
11. X.Org X server RENDER Extension Multiple Integer Overflow Vulnerabilities
12. Sun Java System Access Manager Authentication Bypass Vulnerability
III. LINUX FOCUS LIST SUMMARY
1. sshd log analyzer
2. ARP handler Inspection tool released
3. Spam sent through server using authid=apache or mysql
IV. UNSUBSCRIBE INSTRUCTIONS
V. SPONSOR INFORMATION

I. FRONT AND CENTER
---------------------
1.Racing Against Reversers
By Federico Biancuzzi
Each time a new digital rights management (DRM) system is released, hackers are not far behind in cracking it. Reverse engineers have taken down the security protecting content encoded for Windows Media, iTunes, DVDs, and HD-DVDs.

http://www.securityfocus.com/columnists/474

2.Anti-Social Networking
By Mark Rasch
On May 15, 2008, a federal grand jury Los Angeles indicted 49-year-old Lori Drew of O.Fallon, Missouri, on charges of unauthorized access to a computer, typically used in hacking cases. Yet, Drew's alleged actions had little to do with computer intrusions.

http://www.securityfocus.com/columnists/473


II. LINUX VULNERABILITY SUMMARY
------------------------------------
1. ikiwiki Blank Password Authentication Bypass Vulnerability
BugTraq ID: 29479
Remote: Yes
Date Published: 2008-06-02
Relevant URL: http://www.securityfocus.com/bid/29479
Summary:
The 'ikiwiki' program is prone to an authentication-bypass vulnerability.

An attacker can exploit this issue to gain unauthorized access to the affected application.

Versions between ikiwiki 1.34 and 2.47 are vulnerable.

2. Gnome Evolution iCalendar Multiple Buffer Overflow Vulnerabilities
BugTraq ID: 29527
Remote: Yes
Date Published: 2008-06-04
Relevant URL: http://www.securityfocus.com/bid/29527
Summary:
Gnome Evolution is prone to multiple buffer-overflow vulnerabilities because it fails to adequately bounds-check user-supplied input before copying it to insufficiently sized buffers. The issues arise when the application handles iCalendar attachments.

Successfully exploiting these issues will allow an attacker to execute arbitrary code in the context of the application. Failed exploit attempts will likely crash the application.

Gnome Evolution 2.21.1 is vulnerable to these issues; other versions may also be affected.

3. Sun Service Tag Registry '/var' Consumption Local Denial of Service Vulnerability
BugTraq ID: 29561
Remote: No
Date Published: 2008-06-04
Relevant URL: http://www.securityfocus.com/bid/29561
Summary:
Sun Service Tag is prone to a denial-of-service vulnerability that affects the registry.

A local unprivileged attacker can exploit this issue to fill the '/var' filesystem, resulting in a denial-of-service condition.

This issue affects the following versions and platforms:

Sun Service Tag 1.0, 1.1, and 1.2 for Solaris 8, 9, and 10 on Sparc
Sun Service Tag 1.0, 1.1, and 1.2 for Solaris 10 on x86
Sun Service Tag 1.1 and 1.2 for Enterprise Linux

4. Asterisk-addons 'OOH323' Channel Driver Remote Denial of Service Vulnerability
BugTraq ID: 29567
Remote: Yes
Date Published: 2008-06-04
Relevant URL: http://www.securityfocus.com/bid/29567
Summary:
Asterisk-addons is prone to a remote denial-of-service vulnerability that stems from a design error.

Successful exploits can crash the 'OOH323' channel driver of Asterisk-addons, causing denial-of-service conditions for legitimate users.

The vulnerability affects the following:

- Versions prior to Asterisk-addons 1.2.9
- Versions prior to Asterisk-addons 1.4.7

5. Linux Kernel BER Decoding Remote Buffer Overflow Vulnerability
BugTraq ID: 29589
Remote: Yes
Date Published: 2008-06-06
Relevant URL: http://www.securityfocus.com/bid/29589
Summary:
The Linux Kernel is prone to a remote buffer-overflow vulnerability because the software fails to perform adequate boundary checks on user-supplied data.

An attacker can exploit this issue to execute arbitrary code with kernel-level privileges. Successfully exploiting this issue will result in the complete compromise of affected computers. Failed exploit attempts will result in a denial-of-service condition.

6. IBM DB2 Universal Database Prior to 9.1 Fixpak 5 Multiple Vulnerabilities
BugTraq ID: 29601
Remote: Yes
Date Published: 2008-06-02
Relevant URL: http://www.securityfocus.com/bid/29601
Summary:
IBM DB2 Universal Database is prone to multiple vulnerabilities, including buffer-overflow issues, local privilege-escalation issues, and an unspecified issue.

An attacker may exploit these issues to execute arbitrary code, gain elevated privileges, or crash the affected application, denying service to legitimate users.

These vulnerabilities affect versions prior to DB2 9.1 Fixpak 5.

7. Linux Kernel DCCP Subsystem Buffer Overflow Vulnerability
BugTraq ID: 29603
Remote: Yes
Date Published: 2008-06-09
Relevant URL: http://www.securityfocus.com/bid/29603
Summary:
The Linux kernel is prone to a buffer-overflow vulnerability caused by insufficient boundary checking.

Attackers can exploit this issue to execute arbitrary code within the context of the affected application. Failed exploit attempts will result in a denial-of-service condition.

Linux kernel 2.6.18 is known to be vulnerable, but other versions are likely affected as well.

8. Net-SNMP Remote Authentication Bypass Vulnerability
BugTraq ID: 29623
Remote: Yes
Date Published: 2008-06-10
Relevant URL: http://www.securityfocus.com/bid/29623
Summary:
Net-SNMP is prone to a remote authentication-bypass vulnerability caused by a design error.

Successfully exploiting this issue will allow attackers to gain unauthorized access to the affected application.

Net-SNMP 5.4.1, 5.3.2, 5.2.4, and prior versions are vulnerable.

9. X.Org X Server RENDER Extension 'ProcRenderCreateCursor()' Denial of Service Vulnerability
BugTraq ID: 29665
Remote: Yes
Date Published: 2008-06-11
Relevant URL: http://www.securityfocus.com/bid/29665
Summary:
X.Org X Server is prone to a denial-of-service vulnerability because the software fails to properly handle exceptional conditions.

Attackers who can connect to a vulnerable X Server may exploit this issue to crash the targeted server, denying further service to legitimate users.

10. X.Org X Server MIT-SHM Extension Information Disclosure Vulnerability
BugTraq ID: 29669
Remote: Yes
Date Published: 2008-06-11
Relevant URL: http://www.securityfocus.com/bid/29669
Summary:
X.Org X Server is prone to an information-disclosure vulnerability that lets X clients read arbitrary X server memory.

Attackers can exploit this issue to obtain sensitive information that may lead to further attacks.

11. X.Org X server RENDER Extension Multiple Integer Overflow Vulnerabilities
BugTraq ID: 29670
Remote: Yes
Date Published: 2008-06-11
Relevant URL: http://www.securityfocus.com/bid/29670
Summary:
The RENDER component for X Server is prone to multiple integer-overflow vulnerabilities because it fails to perform adequate boundary checks on user-supplied data.

Successful exploits may allow attackers to execute arbitrary code with the privileges of a user running the software. Failed exploit attempts likely cause denial-of-service conditions.

12. Sun Java System Access Manager Authentication Bypass Vulnerability
BugTraq ID: 29676
Remote: Yes
Date Published: 2008-06-11
Relevant URL: http://www.securityfocus.com/bid/29676
Summary:
Sun Java System Access Manager is prone to an authentication-bypass vulnerability.

Exploiting this issue can allow remote attackers to access resources in an unauthorized manner or to gain administrative privileges to the application. This may aid in further attacks.

Sun Java System Access Manager 7.1 is affected by this issue.

III. LINUX FOCUS LIST SUMMARY
---------------------------------
1. sshd log analyzer
http://www.securityfocus.com/archive/91/493280

2. ARP handler Inspection tool released
http://www.securityfocus.com/archive/91/492905

3. Spam sent through server using authid=apache or mysql
http://www.securityfocus.com/archive/91/492810

IV. UNSUBSCRIBE INSTRUCTIONS
-----------------------------
To unsubscribe send an e-mail message to linux-secnews-unsubscribe@securityfocus.com from the subscribed address. The contents of the subject or message body do not matter. You will receive a confirmation request message to which you will have to answer. Alternatively you can also visit http://www.securityfocus.com/newsletters and unsubscribe via the website.

If your email address has changed email listadmin@securityfocus.com and ask to be manually removed.

V. SPONSOR INFORMATION
------------------------
This issue is sponsored by IBM® Rational® AppScan

Failure to properly secure Web applications significantly impacts your ability to protect sensitive client and corporate data. IBM Rational AppScan is an automated scanner that monitors, identifies and helps remediate vulnerabilities.
Download a free trial of AppScan and see how it can help prevent against the threat of attack.
https://www.watchfire.com/securearea/appscan.aspx?id=701700000009T0r

No comments:

Blog Archive