2004.09_Webmin, Dhcp, Apache, Squirrelmail.pdf
(
225 KB
)
Pobierz
Layout 1
NEWS
Insecurity
Insecurity News
Pavuk
Pavuk is an application used to mirror
contents of WWW documents or files. It
transfers documents from HTTP, FTP,
Gopher, and optionally from HTTPS
(HTTP over SSL) servers.
Ulf Härnhammar discovered a vulnera-
bility in pavuk. In this error, an over-
sized HTTP 305 response sent by a mali-
cious server could potentially cause
arbitrary code to be executed with the
privileges that belong to the pavuk
process.
The Common Vulnerabilities and
Exposures project has assigned the name
CAN-2004-0456 to this issue.
rlpr
rlpr makes it possible to print files on
remote sites to your local printer.
jaguar@felinemenace.org
has discov-
ered a format string vulnerability in rlpr.
While investigating this flaw, a buffer
overflow was also discovered in related
code. By exploiting one of these vulnera-
bilities, a local or remote user could
potentially cause arbitrary code to be
executed with the privileges of 1) the
rlprd process (remote), or 2) root (local).
The first error is a format string vul-
nerability via syslog(3) in msg() function
in rlpr. The Common Vulnerabilities and
Exposures project has assigned the name
CAN-2004-0393 to this issue.
The other error is a buffer overflow in
the msg() function in rlpr. The Common
Vulnerabilities and Exposures project has
assigned the name CAN-2004-0454 to
this issue.
Webmin
Webmin is an interface for system
administration. Using a browser that
supports tables and forms you can setup
user accounts, Apache, DNS and so on.
A bug in Webmin 1.140 allows remote
attackers to bypass access control rules
and gain read access to configuration
information. The Common Vulnerabili-
ties and Exposures project has assigned
the name CAN-2004-0582 to this issue.
The account lockout functionality in
(1) Webmin 1.140 and (2) Usermin 1.070
does not parse certain character strings,
which allows remote attackers to con-
duct a brute force attack to guess user
IDs and passwords. The Common Vul-
nerabilities and Exposures project has
assigned the name CAN-2004-0583 to
this issue.
■
Debian reference DSA-527-1 pavuk --
buffer overflow
Gentoo reference GLSA 200406-22 /
Pavuk
DHCP
The Dynamic Host Configuration Proto-
col (DHCP) server is used to configure
clients that dynamically connect to a net-
work (WLAN hotspots, customer
networks, …).
A vulnerability in how ISC’s DHCPD
handles the logging code of the server
with syslog messages can allow a mali-
cious attacker with the ability to send
special packets to the DHCPD listening
port to crash the daemon, thus causing a
Denial of Service. It is also possible that
they may be able to execute arbitrary
code on the vulnerable server with the
permissions of the user running DHCPD,
which is usually root. The United States
Computer Emergency Readiness Team
has assigned the name VU#317350 to
this issue.
A similar vulnerability also exists in
the way ISC’s DHCPD makes use of the
vsnprintf() function on systems that do
not support vsnprintf(). This vulnerabil-
ity could also be used to execute
arbitrary code and/or perform a DoS
attack. The vsnprintf() statements that
have this problem are defined after the
vulnerable code noted above, which
would trigger the previous problem
rather than this one. The United States
Computer Emergency Readiness Team
has assigned the name VU#654390 to
this issue.
■
Debian reference DSA-526-1 webmin --
several vulnerabilities
Gentoo reference GLSA 200406-12 /
Webmin
■
Debian reference DSA-524-1 rlpr -- several
vulnerabilities
Security Posture of Major Distributions
Distributor
Security Sources
Comments
Debian
Info:
http://www.debian.org/security/
The current Debian security advisories are included
List:
http://lists.debian.org/debian-
on the homepage. Advisories are provided as HTML
security-announce/
Reference: DSA-… 1)
pages with links to the patches. The security advisory
also contains a reference to the mailing list.
Gentoo
Info:
http://www.gentoo.org/
The current security advisories for Gentoo are listed on
security/en/glsa/index.xml
the Gentoo security site linked off the homepage.
Forum:
http://forums.gentoo.org/
Advisories are provided as HTML pages with the
List:
http://www.gentoo.org/main/
coding to emerge the corrected versions.
en/lists.xml
Reference: GLSA: … 1)
Mandrake
Info:
http://www.mandrakesecure.net
MandrakeSoft runs its own Web site on security topics.
List:
http://www.mandrakesecure.net/
Among other things, it includes security advisories
en/mlist.php
Reference: MDKSA-… 1)
and references to the mailing lists. The advisories are
HTML pages, but there are no links to the patches.
Red Hat
Info:
http://www.redhat.com/errata/
Red Hat files security advisories as so-called Errata:
List:
http://www.redhat.com/mailing
Issues for each Red Hat Linux version are then
-lists/
Reference: RHSA-… 1)
grouped. The security advisories are provided in the
form of an HTML page with links to patches.
Slackware
Info:
http://www.slackware.com/
The start page contains links to the security mailing
security/
List:
http://www.slackware.
list archive. No additional information on Slackware
com/lists/
(slackware-security)
security is available.
Reference: [slackware-security] … 1)
Suse
Info:
http://www.suse.de/uk/private/
There is no longer a link to the security page after
support/security/
Patches:
http://www.
changes to the Web site. It contains information on the
suse.de/uk/private/download/updates/
mailing list and the advisories. The security patches for
List: suse-security-announce
the individual Suse Linux versions are shown in red on
Reference: SUSE-SA … 1)
the general updates site. A short description of the
vulnerability the patch resolves is provided
■
Suse reference SuSE-SA:2004:019
Mandrake reference MDKSA-2004:061
1) All distributors indicate security mails in the subject line.
14
September 2004
www.linux-magazine.com
■
■
■
■
Insecurity
NEWS
Kernel
Multiple security vulnerabilities of the
Linux kernel have been found recently.
Michael Schroeder and Ruediger Oer-
tel found that Missing Discretionary
Access Control (DAC) checks in the
chown(2) system call allow an attacker
with a local account to change the group
ownership of arbitrary files, which leads
to root privileges. It is specific to version
2.6 based systems, that only local shell
access is needed to exploit this vulnera-
bility. The Common Vulnerabilities and
Exposures project has assigned the name
CAN-2004-0497 to this issue.
A flaw was found in Linux kernel ver-
sions 2.4 and 2.6 for x86 and x86_64 that
allowed local users to cause a denial of
service (system crash) by triggering a
signal handler with a certain sequence of
fsave and frstor instructions. The Com-
mon Vulnerabilities and Exposures
project has assigned the name CAN-
2004-0554 to this issue.
Another flaw was discovered in an
error path supporting the clone() system
call that allowed local users to cause a
denial of service (memory leak) by pass-
ing invalid arguments to clone() running
in an infinite loop of a user’s program.
The Common Vulnerabilities and Expo-
sures project has assigned the name
CAN-2004-0427 to this issue.
Enhancements were committed to the
2.6 kernel by Al Viro which enabled the
Sparse source code checking tool to
check for a certain class of kernel bugs.
Kernel memory access vulnerabilities are
fixed in the e1000, decnet, acpi_asus,
alsa, airo/WLAN, pss and mpu401 dri-
vers. These vulnerabilities can lead to
kernel memory read access, write access
and local Denial of Service conditions,
resulting in access to the root account for
an attacker with a local account on the
affected system. The Common Vulnera-
bilities and Exposures project has
assigned the name CAN-2004-0495 to
these issues.
An information leak vulnerability that
affects only ia64 systems was also dis-
covered. The Common Vulnerabilities
and Exposures project has assigned the
name CAN-2004-0565 to these issues.
Subversion
Subversion is a version control system
like the well known CVS.
The subversion code is vulnerable to a
remotely exploitable buffer overflow on
the heap. The error appears before any
authentication takes place. An attacker is
able to execute arbitrary code by abusing
this vulnerability.
The Common Vulnerabilities and
Exposures project has assigned the name
CAN-2004-0413 to this issue.
Apache
The Apache HTTP server is a powerful
and freely-available Web server.
A stack buffer overflow in mod_ssl
that could be triggered if using the Fake-
BasicAuth option. If mod_ssl was sent a
client certificate with a subject DN field
longer than 6000 characters, a stack
overflow occurred if FakeBasicAuth had
been enabled. To exploit this issue the
malicious certificate would have to be
signed by a Certificate Authority which
mod_ssl is configured to trust. The Com-
mon Vulnerabilities and Exposures
project has assigned the name CAN-
2004-0488 to this issue.
A remotely triggered memory leak in
the Apache HTTP Server earlier than ver-
sion 2.0.50 was also discovered. This
allowed a remote attacker to perform a
Denial of Service attack against the server
by forcing it to consume large amounts of
memory. The Common Vulnerabilities
and Exposures project has assigned the
name CAN-2004-0493 to this issue.
A Denial of Service (Dos) condition
was discovered in Apache 2.x by George
Guninski. This can lead to httpd con-
suming an arbitrary amount of memory.
On 64bit systems with more than 4GB of
virtual memory, this may also lead to a
heap-based overflow.
A buffer overflow vulnerability was
also found in Apache’s mod_proxy mod-
ule, which can be exploited by a remote
user to potentially execute arbitrary code
with the privileges of a httpd child
process (user apache, by default, user
www-data). This can only be exploited,
however, if mod_proxy is actually in use.
Note that this bug exists in a module
in the apache-common package, shared
by apache, apache-ssl and apache-perl,
so this update is sufficient to correct the
bug for all three builds of Apache httpd.
However, on systems using apache-ssl or
apache-perl, httpd will not automatically
be restarted. The Common Vulnerabili-
ties and Exposures project has assigned
the name CAN-2004-0492 to this issue.
■
Mandrake reference MDKSA-2004:064
and MDKSA-2004:065
Red Hat reference RHSA-2004:342-10
Debian reference DSA-525-1 apache --
buffer overflow
Gentoo reference GLSA 200407-03 /
Apache
■
Suse reference SuSE-SA:2004:018
Gentoo reference GLSA 200406-07 /
Subversion
SquirrelMail
SquirrelMail is a webmail package writ-
ten in PHP. Multiple vulnerabilities have
been found which affect a version of
SquirrelMail.
An SQL injection flaw was found in
SquirrelMail version 1.4.2 and earlier. If
SquirrelMail is configured to store user
address books in the database, a remote
attacker could use this flaw to execute
arbitrary SQL statements. The Common
Vulnerabilities and Exposures project has
assigned the name CAN-2004-0521 to
this issue.
A number of cross-site scripting (XSS)
flaws in SquirrelMail version 1.4.2 and
earlier could allow remote attackers to
execute script as other web users. The
Common Vulnerabilities and Exposures
project has assigned the names CAN-
2004-0519 and CAN-2004-0520 to these
issues.
■
Red Hat reference RHSA-2004:240-06
Gentoo reference GLSA 200405-16 / Squir-
relMail
Libpng
An attacker could carefully craft a PNG
file in such a way that it would cause an
application linked to libpng to crash
when opened by a victim.
A buffer overflow vulnerability was
discovered in libpng due to a wrong cal-
culation of some loop offset values. This
buffer overflow can lead to Denial of Ser-
vice or even remote compromise. The
Common Vulnerabilities and Exposures
project has assigned the name CAN-
2002-1363 to this issue.
■
Suse reference SUSE-SA:2004:020
Mandrake reference MDKSA-2004:066
Red Hat reference RHSA-2004:255-10
■
Mandrake reference MDKSA-2004:063
Red Hat reference RHSA-2004:249-070
www.linux-magazine.com
September 2004
15
■
■
■
■
■
Plik z chomika:
SOLARIX33
Inne pliki z tego folderu:
2008.05_Insecurity News.pdf
(496 KB)
2005.05_Insecurity News.pdf
(347 KB)
2005.04_Insecurity News.pdf
(417 KB)
2005.03_Insecurity News.pdf
(457 KB)
2004.12_Problems with Cups, Getmail, and Mozilla.pdf
(383 KB)
Inne foldery tego chomika:
Ask Klaus
Beginners
Comment
Community
Community Notebook
Zgłoś jeśli
naruszono regulamin