|
|
ru.linux- RU.LINUX --------------------------------------------------------------------- From : Sergey Lentsov 2:4615/71.10 18 Feb 2002 13:16:46 To : All Subject : URL: http://www.lwn.net/2002/0214/security.php3 --------------------------------------------------------------------------------
[1][LWN Logo] [No ads right now]
[LWN.net]
Sections:
[2]Main page
Security
[3]Kernel
[4]Distributions
[5]Development
[6]Commerce
[7]Linux in the news
[8]Announcements
[9]Letters
[10]All in one big page
See also: [11]last week's Security page.
Security
News and Editorials
Multiple security problems with SNMP. Here's [12]a CERT advisory
warning of many problems with Simple Network Management Protocol
(SNMP) implementations. To summarize, SNMP implementations are full of
nasty bugs. If you are running SNMP on your Linux systems, you should
apply the available vendor updates (we've seen them, so far, from
[13]Red Hat and [14]Yellow Dog Linux). It is important to be aware of
other devices on your network that may be running SNMP, however:
routers, printers, etc. Some of those could be hard to update;
disabling SNMP wherever possible would be a good idea.
The SNMP vulnerabilities were discovered by the [15]Oulu University
Secure Programming Group (OUSPG) of Oulu University, Finland. This is
the same group which uncovered a wide variety of vulnerabilities
across several LDAP products last year.
OUSPG developed and applied the [16]PROTOS Test-Suite: c06-snmpv1 as a
primary investigation tool. The test-suite's purpose is to "evaluate
implementation level security and robustness of ... SNMP
implementations." Licensed under version 2 of the GNU GPL, OUSPG
encourages widespread use of the test-suite for the evaluation and
development of SNMPv1 products.
Simple Network Management Protocol (SNMP) is routinely used in
installations all over the Earth for monitoring and controlling
systems that include printers, routers, ATM switches, servers of all
kinds and workstations. Designed in the late 80's and widely deployed
in the 90's, SNMP is the most popular protocol in use to manage
networked devices. It has been so successful that finding a practical
alternative for a network of even moderate complexity, that can
quickly and easily be put into service, is unlikely.
CERT has received reports of SNMP port scanning and, as yet
unverified, reports of exploitation of these vulnerabilities. If you
are responsible for a network which uses SNMP for monitoring and
control, you are strongly encouraged to read the [17]CERT advisory.
Security Reports
Debian security update to CUPS. The Debian project has released [18]a
security update to the CUPS printing system fixing a buffer overflow
vulnerability in that package.
Debian security update to faq-o-matic. The Debian Project has issued
what appears to be [19]the first update from a Linux distributor for
the cross-site scripting vulnerability in faqomatic. (First LWN
report: [20]February, 7th).
Debian update to wmtv. Debian has released new packages that fix a
symlink vulnerability in [21]wmtv.
Autoresponder vulnerable to spamers. [22]Autoresponder is a script for
answering mail. Put it in your .forward or .qmail file, and it will
reply to all incoming messages with a specified response. On Friday,
11 January 2002, someone reported on Bugtraq that autoresponder
package "...could be tricked by spamers to send unsolicited mail to
victim's address if option reply with copy of original message
attached to response is enabled in autoresponder's configuration." The
problem is fixed in version 1.15.0, and later, available from the
[23]MeepZor Free Software page.
GNU Ada compiler (GNAT) advisory. CERT has issued this [24]advisory
for handling of temporary files in an unsafe manner by the GNU Ada
compiler. All POSIX multi-user systems running GNAT-compiled binaries
which use Ada language facilities for creating temporary files are
affected. GNAT versions known to have this defect are 3.12p, 3.13p and
3.14p. The advisory also notes that "the unreleased version of GNAT
from the GCC CVS fixes this security defect on GNU/Linux, but
introduces another one. Its use is strongly discouraged until this
problem has been addressed."
Updates
Heap corruption vulnerability in at. The at command has a potentially
exploitable heap corruption bug. (First LWN report:
[25] January 17th).
This week's updates:
* [26]Red Hat (February 7, 2002)
(update to the [27]original advisory, issued January 22, 2002, to fix
a Red Hat 6.2 specific problem) Previous updates:
* [28]Debian (January 16, 2002)
[29]Debian (January 18, 2002) (first update did not fix the
problem).
[30]Mandrake (January 18, 2002)
[31]Red Hat (January 22, 2002) Red Hat Linux 7.2 is not vulnerable;
earlier releases are.
[32]Slackware (January 22, 2002)
[33]SuSE (January 16, 2001)
[34]Yellow Dog (January 27, 2002)
Buffer overflow in groff. The groff package has a buffer overflow
vulnerability; if it is used with the print system, it is conceivably
exploitable remotely.
This week's updates:
* [35]Mandrake (February 7, 2002)
Previous updates:
* [36]Red Hat (January 14, 2002)
[37]Trustix (January 18, 2002)
[38]Yellow Dog (January 27, 2002)
Flaw in OpenLDAP. OpenLDAP versions 2.0.0 through 2.0.19 do not
properly check permissions when using access control lists and a user
tries to remove an attribute from an object in the directory by
replacing it's values with an empty list. Schema checking is still
enforced, so a user can only remove attributes that the schema does
not require the object to possess. Please note that in 2.0 versions
prior to 2.0.8, this flaw is not restricted to authenticated users
(i.e., anonymous users can abuse the flaw as well).
This week's updates:
* [39]Caldera (January 16, 2002)
[40]Mandrake (February 11, 2002)
Previous updates:
* [41]Conectiva (January 28, 2002)
[42]Red Hat (January 22, 2002)
Remotely exploitable security problem in mutt. Most of the major
distributions have provided updates for this buffer overflow
vulnerabilty which was [43]fixed in mutt versions 1.2.5.1 and 1.3.25.
This is a remotely exploitable hole; applying the update is a very
good idea. It was first mentioned in [44] the January 3rd LWN security
page.
This week's updates:
* [45]Caldera (January 25, 2002)
Previous updates:
* [46]Conectiva (January 7, 2002)
[47]Debian (January 2, 2002)
[48]Debian (January 3, 2002) (Sparc architecture)
[49]Mandrake (January 8, 2002)
[50]Red Hat (January 7, 2002)
[51]Slackware (January 8, 2002)
[52]SuSE (January 7, 2001)
[53]Trustix (January 4, 2002)
[54]Yellow Dog (January 27, 2002) A remotely exploitable hole in
rsync. A vulnerability has been found in the rsync server: it seems
that the server did not pay enough attention to the sign of numbers it
reads from the client connection. This oversight allows an attacker to
write bytes containing zero almost anywhere in the stack, with results
similar to those caused by buffer overflows. Sites running rsync in
its daemon mode are thus vulnerable to remote root compromises.
Versions of rsync prior to 2.5.2 are vulnerable. (First LWN report:
[55] January 31th).
This week's updates:
* [56]Caldera (January 24, 2002)
Previous updates:
* [57]Conectiva (January 25, 2002)
[58]Debian (February 3, 2002) (note: if you applied [59]the original
update, which broke rsync, you need to update again.)
[60]EnGarde (January 25, 2002)
[61]Mandrake (January 28, 2002)
[62]Red Hat (January 30, 2002) (note that this alert was updated; if
you applied [63]the original version you should update again.)
[64]Slackware (January 26, 2002)
[65]SuSE (January 25, 2002)
[66]Trustix (January 28, 2002)
[67]Yellow Dog (January 27, 2002)
Multiple vendor telnetd vulnerability. This vulnerability, originally
thought to be confined to BSD-derived systems, was first covered in
the [68]July 26th Security Summary. It is now known that Linux telnet
daemons are vulnerable as well.
This week's updates:
* [69]Red Hat (February 7, 2002)
(Update, for Red Hat 5.2, 6.2, 7.0, and 7.1, to the [70]original
advisory, issued August 9, 2001.) Previous updates:
* [71]Caldera (August 10, 2001)
[72]Conectiva (August 24, 2001)
[73]Debian (August 14, 2001) (SSL version)
[74]Debian (August 14, 2001) (Update for Sparc version)
[75]Mandrake (August 13, 2001)
[76]Mandrake (December 17, 2001) (kerberos version)
[77]Progeny (August 14, 2001)
[78]Red Hat (August 9, 2001)
[79]Red Hat (August 9, 2001) (kerberos version)
[80]Slackware (August 9, 2001)
[81]SuSE (September 3, 2001)
[82]Yellow Dog (August 10, 2001)
[83]Yellow Dog (August 10, 2001) (kerberos version) Uucp local user
exploits. There is a vulnerability in the command-line argument
handling of uucp which can be exploited by a local user to obtain
uid/gid uucp. See [84]the September 13, 2001 LWN security page for the
initial report.
New updates:
* [85]Debian (February 8, 2002)
(update to the [86]original advisory issued September 24, 2001.)
Previous updates:
* [87]Caldera (September 7, 2001)
[88]Conectiva (September 11, 2001)
[89]Debian (September 24, 2001)
[90]Mandrake (September 21, 2001)
[91]Progeny (October 5, 2001)
[92]SuSE (October 31, 2001)
Resources
Deanonymizing Users of the SafeWeb Anonymizing Service. Although
[93]Deanonymizing Users of the SafeWeb Anonymizing Service (PDF
Format) isn't about open source software, it is worth a read if you
are concerned with how "fundamentally incompatible requirements" can
jeopardize security. Written by researchers from Boston University and
the Workplace Surveillance Project Privacy Foundation, it describes
how "fundamentally incompatible requirements were realized in
SafeWeb's architecture, resulting in spectacular failure modes under
simple JavaScript attacks."
Events
Upcoming Security Events.
Date Event Location
February 15 - 17, 2002 [94]CODECON 2002 San Francisco, California, USA
February 18 - 22, 2002 [95]RSA Conference 2002 San Jose, CA., USA
February 25 - March 1, 2002 [96]Secure Trusted OS Consortium -
Quarterly Meeting(STOS) (Hyperdigm Research)Chantilly, VA, USA
March 11 - 14, 2002 [97]Financial Cryptography 2002 Sothhampton,
Bermuda
March 18 - 21, 2002 [98]Sixth Annual Distributed Objects and
Components Security Workshop (Pier 5 Hotel at the Inner
Harbor)Baltimore, Maryland, USA
March 18 - 20, 2002 [99]InfoSec World Conference and Expo/2002
Orlando, FL, USA
April 1 - 7, 2002 [100]SANS 2002 Orlando, FL., USA
April 5 - 7, 2002 [101]Rubicon Detroit, Michigan, USA
April 7 - 10, 2002 [102]Techno-Security 2002 Conference Myrtle Beach,
SC
April 14 - 15, 2002 [103]Workshop on Privacy Enhancing Technologies
2002 (Cathedral Hill Hotel)San Francisco, California, USA
For additional security-related events, included training courses
(which we don't list above) and events further in the future, check
out Security Focus' [104]calendar, one of the primary resources we use
for building the above list. To submit an event directly to us, please
send a plain-text message to [105]lwn@lwn.net.
Section Editor: [106]Dennis Tenney
February 14, 2002
LWN Resources
[107]Security alerts archive
Secured Distributions:
[108]Astaro Security
[109]Blue Linux
[110]Castle
[111]Engarde Secure Linux
[112]Immunix
[113]Kaladix Linux
[114]NSA Security Enhanced
[115]Openwall GNU/Linux
[116]Trustix
Security Projects
[117]Bastille
[118]Linux Security Audit Project
[119]Linux Security Module
[120]OpenSSH
Security List Archives
[121]Bugtraq Archive
[122]Firewall Wizards Archive
[123]ISN Archive
Distribution-specific links
[124]Caldera Advisories
[125]Conectiva Updates
[126]Debian Alerts
[127]Kondara Advisories
[128]Esware Alerts
[129]LinuxPPC Security Updates
[130]Mandrake Updates
[131]Red Hat Errata
[132]SuSE Announcements
[133]Turbolinux
[134]Yellow Dog Errata
BSD-specific links
[135]BSDi
[136]FreeBSD
[137]NetBSD
[138]OpenBSD
Security mailing lists
[139]Caldera
[140]Cobalt
[141]Conectiva
[142]Debian
[143]Esware
[144]FreeBSD
[145]Kondara
[146]LASER5
[147]Linux From Scratch
[148]Linux-Mandrake
[149]NetBSD
[150]OpenBSD
[151]Red Hat
[152]Slackware
[153]Stampede
[154]SuSE
[155]Trustix
[156]turboLinux
[157]Yellow Dog
Security Software Archives
[158]munitions
[159]ZedZ.net (formerly replay.com)
Miscellaneous Resources
[160]CERT
[161]CIAC
[162]Comp Sec News Daily
[163]Crypto-GRAM
[164]LinuxLock.org
[165]LinuxSecurity.com
[166]Security Focus
[167]SecurityPortal
[168]Next: Kernel
[169]Eklektix, Inc. Linux powered! Copyright Л 2002 [170]Eklektix,
Inc., all rights reserved
Linux (R) is a registered trademark of Linus Torvalds
References
1. http://lwn.net/
2. http://lwn.net/2002/0214/
3. http://lwn.net/2002/0214/kernel.php3
4. http://lwn.net/2002/0214/dists.php3
5. http://lwn.net/2002/0214/devel.php3
6. http://lwn.net/2002/0214/commerce.php3
7. http://lwn.net/2002/0214/press.php3
8. http://lwn.net/2002/0214/announce.php3
9. http://lwn.net/2002/0214/letters.php3
10. http://lwn.net/2002/0214/bigpage.php3
11. http://lwn.net/2002/0207/security.php3
12. http://lwn.net/2002/0214/a/cert-snmp.php3
13. http://lwn.net/alerts/RedHat/RHSA-2001:163-20.php3
14. http://lwn.net/alerts/YellowDog/YDU-20020211-1.php3
15. http://www.ee.oulu.fi/research/ouspg/
16. http://www.ee.oulu.fi/research/ouspg/protos/testing/c06/snmpv1/
17. http://lwn.net/2002/0214/a/cert-snmp.php3
18. http://lwn.net/alerts/Debian/DSA-110-1.php3
19. http://lwn.net/alerts/Debian/DSA-109-1.php3
20. http://lwn.net/2002/0207/security.php3#faqomatic
21. http://lwn.net/alerts/Debian/DSA-108-1.php3
22. http://meepzor.com/packages/autoresponder/
23. http://meepzor.com/packages/autoresponder/
24. http://lwn.net/2002/0214/a/gnuada.php3
25. http://lwn.net/2002/0117/security.php3#at
26. http://lwn.net/alerts/RedHat/RHSA-2002:015-15.php3
27. http://lwn.net/alerts/RedHat/RHSA-2002:015-13.php3
28. http://lwn.net/alerts/Debian/DSA-102-1.php3
29. http://lwn.net/alerts/Debian/DSA-102-2.php3
30. http://lwn.net/alerts/Mandrake/MDKSA-2002:007.php3
31. http://lwn.net/alerts/RedHat/RHSA-2002:015-13.php3
32. http://lwn.net/alerts/Slackware/sl-1011706104.php3
33. http://lwn.net/alerts/SuSE/SuSE-SA:2002:003.php3
34. http://lwn.net/alerts/YellowDog/YDU-20020127-9.php3
35. http://lwn.net/alerts/Mandrake/MDKSA-2002:012.php3
36. http://lwn.net/alerts/RedHat/RHSA-2002:004-06.php3
37. http://lwn.net/alerts/Trustix/2002-0020.php3
38. http://lwn.net/alerts/YellowDog/YDU-20020127-11.php3
39. http://lwn.net/alerts/Caldera/CSSA-2002-001.0.php3
40. http://lwn.net/alerts/Mandrake/MDKSA-2002:013.php3
41. http://lwn.net/alerts/Conectiva/CLA-2002:459.php3
42. http://lwn.net/alerts/RedHat/RHSA-2002:014-07.php3
43. http://lwn.net/2002/0103/a/mutt.php3
44. http://lwn.net/2002/0103/security.php3#mutt
45. http://lwn.net/alerts/Caldera/CSSA-2002-002.0.php3
46. http://lwn.net/alerts/Conectiva/CLA-2002:449.php3
47. http://lwn.net/alerts/Debian/DSA-096-1.php3
48. http://lwn.net/alerts/Debian/DSA-096-2.php3
49. http://lwn.net/alerts/Mandrake/MDKSA-2002:002.php3
50. http://lwn.net/alerts/RedHat/RHSA-2002:003-10.php3
51. http://lwn.net/alerts/Slackware/sl-1010504811.php3
52. http://lwn.net/alerts/SuSE/SuSE-SA:2002:001.php3
53. http://lwn.net/alerts/Trustix/2002-0003.php3
54. http://lwn.net/alerts/YellowDog/YDU-20020127-4.php3
55. http://lwn.net/2002/0131/security.php3#rsync
56. http://lwn.net/alerts/Caldera/CSSA-2002-003.0.php3
57. http://lwn.net/alerts/Conectiva/CLA-2002:458.php3
58. http://lwn.net/alerts/Debian/DSA-106-2.php3
59. http://lwn.net/alerts/Debian/DSA-106-1.php3
60. http://lwn.net/alerts/EnGarde/ESA-20020125-004.php3
61. http://lwn.net/alerts/Mandrake/MDKSA-2002:009.php3
62. http://lwn.net/alerts/RedHat/RHSA-2002:018-10.php3
63. http://lwn.net/alerts/RedHat/RHSA-2002:018-05.php3
64. http://lwn.net/alerts/Slackware/sl-1012057608.php3
65. http://lwn.net/alerts/SuSE/SuSE-SA:2002:004.php3
66. http://lwn.net/alerts/Trustix/2002-0025.php3
67. http://lwn.net/alerts/YellowDog/YDU-20020127-3.php3
68. http://lwn.net/2001/0726/security.php3#mtelnetd
69. http://lwn.net/alerts/RedHat/RHSA-2001:099-09.php3
70. http://lwn.net/alerts/RedHat/RHSA-2001:099-06.php3
71. http://lwn.net/alerts/Caldera/CSSA-2001-030.0.php3
72. http://lwn.net/alerts/Conectiva/CLA-2001:413.php3
73. http://lwn.net/alerts/Debian/DSA-075-1.php3
74. http://lwn.net/alerts/Debian/DSA-075-2.php3
75. http://lwn.net/alerts/Mandrake/MDKSA-2001:068.php3
76. http://lwn.net/alerts/Mandrake/MDKSA-2001:093.php3
77. http://lwn.net/alerts/Progeny/PROGENY-SA-2001-27.php3
78. http://lwn.net/alerts/RedHat/RHSA-2001:099-06.php3
79. http://lwn.net/alerts/RedHat/RHSA-2001:100-02.php3
80. http://lwn.net/alerts/Slackware/sl-997726350.php3
81. http://lwn.net/alerts/SuSE/SuSE-SA:2001:029.php3
82. http://lwn.net/alerts/YellowDog/YDU-20010810-1.php3
83. http://lwn.net/alerts/YellowDog/YDU-20010810-2.php3
84. http://lwn.net/2001/0913/security.php3#uucp
85. http://lwn.net/alerts/Debian/DSA-079-2.php3
86. http://lwn.net/alerts/Debian/DSA-079-1.php3
87. http://lwn.net/alerts/Caldera/CSSA-2001-033.0.php3
88. http://lwn.net/alerts/Conectiva/CLA-2001:425.php3
89. http://lwn.net/alerts/Debian/DSA-079-1.php3
90. http://lwn.net/alerts/Mandrake/MDKSA-2001:078.php3
91. http://lwn.net/alerts/Progeny/PROGENY-SA-2001-36.php3
92. http://lwn.net/alerts/SuSE/SuSE-SA:2001:38.php3
93. http://www.cs.bu.edu/techreports/pdf/2002-003-deanonymizing-safeweb.pdf
94. http://www.codecon.org/
95. http://www.rsaconference.com/
96. http://www.stosdarwin.org/
97. http://www.fc02.ai/
98. http://www.omg.org/news/meetings/docsec2002/call.htm
99.
http://www.misti.com/northamerica.asp?page=4&subpage=2&disp=showconf&id=os02®
ion=1
100. http://www.sans.org/SANS2002.php
101. http://www.rubi-con.org/
102. http://www.TECHSEC.com/
103. http://www.pet2002.org/
104. http://securityfocus.com/calendar
105. mailto:lwn@lwn.net
106. mailto:lwn@lwn.net
107. http://lwn.net/alerts/
108. http://www.astaro.com/products/index.html
109. http://bluelinux.sourceforge.net/
110. http://castle.altlinux.ru/
111. http://www.engardelinux.org/
112. http://www.immunix.org/
113. http://www.kaladix.org/
114. http://www.nsa.gov/selinux/
115. http://www.openwall.com/Owl/
116. http://www.trustix.com/
117. http://www.bastille-linux.org/
118. http://lsap.org/
119. http://lsm.immunix.org/
120. http://www.openssh.com/
121. http://www.securityfocus.com/archive/1
122. http://www.nfr.net/firewall-wizards/
123. http://www.jammed.com/Lists/ISN/
124. http://www.calderasystems.com/support/security/
125. http://www.conectiva.com.br/atualizacoes/
126. http://www.debian.org/security/
127. http://www.kondara.org/errata/k12-security.html
128. http://www.esware.com/actualizaciones.html
129. http://linuxppc.org/security/advisories/
130. http://www.linux-mandrake.com/en/fupdates.php3
131. http://www.redhat.com/support/errata/index.html
132. http://www.suse.de/security/index.html
133. http://www.turbolinux.com/security/
134. http://www.yellowdoglinux.com/resources/
135. http://www.BSDI.COM/services/support/patches/
136. http://www.freebsd.org/security/security.html
137. http://www.NetBSD.ORG/Security/
138. http://www.openbsd.org/security.html
139. http://www.calderasystems.com/support/forums/announce.html
140. http://www.cobalt.com/support/resources/usergroups.html
141. http://distro.conectiva.com.br/atualizacoes/
142. http://www.debian.org/MailingLists/subscribe
143. http://www.esware.com/lista_correo.html
144. http://www.freebsd.org/handbook/eresources.html#ERESOURCES-MAIL
145. http://www.kondara.org/mailinglist.html.en
146. http://l5web.laser5.co.jp/ml/ml.html
147. http://www.linuxfromscratch.org/services/mailinglistinfo.php
148. http://www.linux-mandrake.com/en/flists.php3
149. http://www.netbsd.org/MailingLists/
150. http://www.openbsd.org/mail.html
151. http://www.redhat.com/mailing-lists/
152. http://www.slackware.com/lists/
153. http://www.stampede.org/mailinglists.php3
154. http://www.suse.com/en/support/mailinglists/index.html
155. http://www.trustix.net/support/
156. http://www.turbolinux.com/mailman/listinfo/tl-security-announce
157. http://lists.yellowdoglinux.com/ydl_updates.shtml
158. http://munitions.vipul.net/
159. http://www.zedz.net/
160. http://www.cert.org/nav/alerts.html
161. http://ciac.llnl.gov/ciac/
162. http://www.MountainWave.com/
163. http://www.counterpane.com/crypto-gram.html
164. http://linuxlock.org/
165. http://linuxsecurity.com/
166. http://www.securityfocus.com/
167. http://www.securityportal.com/
168. http://lwn.net/2002/0214/kernel.php3
169. http://www.eklektix.com/
170. http://www.eklektix.com/
--- ifmail v.2.14.os7-aks1
* Origin: Unknown (2:4615/71.10@fidonet)
Вернуться к списку тем, сортированных по: возрастание даты уменьшение даты тема автор
Архивное /ru.linux/198612754fd93.html, оценка из 5, голосов 10
|