Главная страница


ru.linux

 
 - RU.LINUX ---------------------------------------------------------------------
 From : Sergey Lentsov                       2:4615/71.10   06 Sep 2001  17:18:39
 To : All
 Subject : URL: http://www.lwn.net/2001/0906/security.php3
 -------------------------------------------------------------------------------- 
 
    [1][LWN Logo] 
    
                                [2]Click Here 
    [LWN.net]
    
    Sections:
     [3]Main page
     Security
     [4]Kernel
     [5]Distributions
     [6]On the Desktop
     [7]Development
     [8]Commerce
     [9]Linux in the news
     [10]Announcements
     [11]Linux History
     [12]Letters
    [13]All in one big page
    
    See also: [14]last week's Security page.
    
 Security
 
 News and Editorials
 
    Trouble with Apache SQL authentication modules. The Apache web server
    supports several modules which can perform user authentication from a
    relational database. They are certainly widely used; a site does not
    have to grow very large before the classic htpasswd mechanism becomes
    unusable. So [15]this advisory pointing out "SQL insertion"
    vulnerabilities in several of these modules is worthy of some concern.
    
    SQL insertion happens when a hostile user, through a clever request to
    the web server, is able to pass arbitrary SQL code through to the
    underlying database. This code can disclose or modify data, or corrupt
    the integrity of the database in a number of ways; it can also,
    usually, be used to allow unauthorized access to the web site.
    
    This type of vulnerability comes about as a result of the combination
    of inadequate checking of user-supplied data and the passing of that
    data across module boundaries. It is an easy sort of mistake to make,
    and it is certain that numerous other, database-driven web
    applications have similar vulnerabilities.
    
    Fixing this sort of problem is relatively easy, once the programmer
    thinks of it. A "white list" of allowed characters filters out most
    such attacks without trouble. But, when passing user strings between
    modules, filtering in one module can require a knowledge of what
    strings can cause problems in the other. This kind of knowledge goes
    against the information hiding techniques that are usually seen as
    good, modular programming. As a result, programmers can be surprised,
    even if they are thinking about properly sanitizing user-supplied
    data.
    
    As applications become more component driven, the chances are that
    this sort of cross-module interaction will be seen more often.
    Security is hard, and it's not getting any easier.
    
    The X.C worm is apparently loose. This work takes advantage of the
    buffer overrun vulnerability in telnetd (see updates, below) to infect
    new systems. So far, this worm does not appear to have caused a lot of
    problems; many systems are no longer running telnet services, and,
    hopefully, most of those that still do have applied the updates.
    Nonetheless, for those who are concerned, a [16]X.C discovery and
    removal tool has been made available by William Stearns.
    
 Security Reports
 
    A security audit of xinetd. Solar Designer has performed [17]an
    extensive audit of xinetd looking for certain types of security
    vulnerabilities. So many problems were found in the code that the
    resulting patch weighed in at over 100KB. This patch was only fully
    merged as of xinetd 2.3.3.
    
    The patched xinetd will certainly be safer, but Solar Designer's
    disclaimer is worth noting:
    
      To summarize the results, xinetd may be reasonably safe to use with
      these patches, but the code remains far from clean and certain bugs
      are there by design.
      
    Distributor updates seen so far include:
      * [18]Mandrake (August 31, 2001)
    
      [19]Immunix (August 29, 2001)
    
    Fun with Bugzilla Users of the Bugzilla bug tracking system should
    upgrade to the new 2.14 release, which [20]fixes several security
    holes. The worst of these vulnerabilities could lead to the disclosure
    of "confidential" bugs, or the compromise of the Bugzilla server as a
    whole.
    
    A new lpr vulnerability. A new [21]buffer overrun vulnerability in lpr
    has been reported. This time around, an attacker crafts a special,
    incomplete print job; a subsequent request to view the printer queue
    causes the overrun to happen. The advisory only mentions BSD systems,
    but numerous Linux distributions run BSD lpr as well. Stay tuned for
    updates...
    
    An HTML injection vulnerability with gnut. The "gnut" Gnutella client
    [22]is vulnerable to the injection of arbitrary HTML (including
    scripts) if a hostile user shares a file with HTML tags embedded in
    its name. This bug is compounded by the fact that gnut, apparently,
    loads a lot of files from the local drive; browsers impose fewer
    security restrictions in this situation. Upgrade to gnut 0.4.27 for a
    fix.
    
    POP3Lite message processing vulnerability. The POP3Lite POP server
    [23]fails to escape leading dots in mail messages, opening it up to
    denial of service attacks and the creation of untraceable forged
    messages. Upgrading to version 0.2.4 fixes the problem.
    
    SuSE updates screen. SuSE has issued [24]a security update to screen
    fixing a local root exploit vulnerability in that package. It seems
    that, if screen is installed setuid root, a clever user can engage in
    some /tmp trickery to get root privileges. SuSE's fix deals with the
    problem in the code, and also removes the setuid bit. That, in turn,
    reduces the functionality of screen slightly; see the advisory for
    information on whether you might need to restore the setuid bit after
    applying the update.
    
    web scripts.
    The following web scripts were reported to contain vulnerabilities:
      * PhpMyExplorer (a file manager) has a [25]a directory traversal
        vulnerability which can be used to read any file on the system.
        Upgrading to version 1.2.1 fixes the problem.
        
    Proprietary products.
    The following proprietary products were reported to contain
    vulnerabilities:
      * [26]A problem in PGP's key validity display has been discovered;
        given enough assumptions, it could be used to fool users into
        accepting keys that are not valid. Fixes are available.
      * The Informix-SQL application [27]has a vulnerability which allows
        local users to create any file with root privileges.
        
 Updates
 
    Buffer overrun vulnerabilities in fetchmail. (Found by Salvatore
    Sanfilippo). Two buffer overrun vulnerabilities exist in the much-used
    fetchmail program. Given a hostile server, arbitrary code can be run
    on the system running fetchmail. The solution is to upgrade to
    fetchmail 5.8.17. See [28]the August 16 Security page for the initial
    report.
    
    New updates:
      * [29]Conectiva (September 5, 2001)
        
      [30]Mandrake (August 31, 2001)
    
    Previous updates:
      * [31]Debian (August 10, 2001)
        
      [32]EnGarde (August 16, 2001)
    
      [33]Progeny (August 14, 2001)
    
      [34]SuSE (August 16, 2001) OpenSSL Pseudo-random number generator
    weakness A weakness has been discovered in the OpenSSL Pseudo random
    number generator that can allow an attacker to discover the PNRG's
    state and predict future values. (First reported [35]July 12).
    
    This week's updates:
      * [36]Conectiva (August 30, 2001)
        
    Previous updates:
      * [37]EnGarde (July 12)
      * [38]Progeny (August 14, 2001)
        
      [39]Trustix (July 12) Input validation problem with sendmail. An
    input validation error exists in versions of sendmail prior to 8.11.6
    (or 8.12.0Beta19) which may be exploited by local users to obtain root
    access. See [40]the August 23 Security Page for the initial report.
    
    This week's updates:
      * [41]Mandrake (August 31, 2001)
        
    Previous updates:
      * [42]Caldera (August 24, 2001)
        
      [43]Conectiva (August 23, 2001)
    
      [44]Immunix (August 23, 2001)
    
      [45]Slackware (August 27, 2001)
    
      [46]SuSE (August 23, 2001)
    
    Multiple vendor telnetd vulnerability. This vulnerability, originally
    thought to be confined to BSD-derived systems, was first covered in
    the [47]July 26th Security Summary. It is now known that Linux telnet
    daemons are vulnerable as well.
    
    This week's updates:
      * [48]SuSE (September 3, 2001)
        
    Previous updates:
      * [49]Caldera (August 10, 2001)
        
      [50]Conectiva (August 24, 2001)
    
      [51]Debian (August 14, 2001) (SSL version)
    
      [52]Debian (August 14, 2001) (Update for Sparc version)
    
      [53]Mandrake (August 13, 2001)
    
      [54]Progeny (August 14, 2001)
    
      [55]Red Hat (August 9, 2001)
    
      [56]Red Hat (August 9, 2001) (kerberos version).
    
      [57]Slackware (August 9, 2001)
    
      [58]Yellow Dog (August 10, 2001)
    
      [59]Yellow Dog (August 10, 2001) (kerberos version).
    
    Buffer overruns in Window Maker A buffer overrun exists in Window
    Maker which could, conceivably, be exploited remotely if the user runs
    a hostile application. This problem initially appeared in the
    [60]August 16, 2001 LWN security page.
    
    This week's updates:
      * [61]Mandrake (August 31, 2001)
        
    Previous updates:
      * [62]Conectiva (August 13, 2001)
        
      [63]Debian (August 12, 2001)
    
      [64]Progeny (August 14, 2001) Buffer overflows in xloadimage This
    problem was first covered in the [65]July 12 Security page.
    
    This week's updates:
      * [66]Mandrake (August 31, 2001)
        
    Previous updates:
      * [67]Conectiva (August 28, 2001)
        
      [68]Debian (August 9, 2001)
    
      [69]Progeny (August 14, 2001)
    
      [70]Red Hat (July 12)
    
      [71]SuSE (July 26)
    
      [72]Yellow Dog (July 25, 2001)
    
 Resources
 
    The LinuxSecurity.com Weekly Newsletter for September 3 is
    [73]available.
    
 Events
 
    Computer Security Mexico will be held November 24 to 30 in Mexico
    City. The [74]call for papers has been issued; with submissions being
    due by October 12.
    
    Upcoming Security Events.
    
    Date Event Location
    September 11 - 13, 2001 [75]New Security Paradigms Workshop 2001(NSPW)
    Cloudcroft, New Mexico, USA
    September 28 - 30, 2001 [76]Canadian Association for Security and
    Intelligence Studies(CASIS 2001) (Dalhousie University)Halifax, Nova
    Scotia, Canada.
    October 10 - 12, 2001 [77]Fourth International Symposium on Recent
    Advances in Intrusion Detection(RAID 2001) Davis, CA
    November 5 - 8, 2001 [78]8th ACM Conference on Computer and
    Communication Security(CCS-8) Philadelphia, PA, USA
    
    For additional security-related events, included training courses
    (which we don't list above) and events further in the future, check
    out Security Focus' [79]calendar, one of the primary resources we use
    for building the above list. To submit an event directly to us, please
    send a plain-text message to [80]lwn@lwn.net.
    
    Section Editor: [81]Jonathan Corbet
    September 6, 2001
    
                               [82]Click Here 
    LWN Resources
    [83]Security alerts archive
    Secured Distributions:
    [84]Blue Linux
    [85]Castle
    [86]Engarde Secure Linux
    [87]Immunix
    [88]Kaladix
    [89]NSA Security Enhanced
    [90]Openwall GNU/Linux
    [91]Trustix
    Security Projects
    [92]Bastille
    [93]Linux Security Audit Project
    [94]Linux Security Module
    [95]OpenSSH
    Security List Archives
    [96]Bugtraq Archive
    [97]Firewall Wizards Archive
    [98]ISN Archive
    Distribution-specific links
    [99]Caldera Advisories
    [100]Conectiva Updates
    [101]Debian Alerts
    [102]Kondara Advisories
    [103]Esware Alerts
    [104]LinuxPPC Security Updates
    [105]Mandrake Updates
    [106]Red Hat Errata
    [107]SuSE Announcements
    [108]Yellow Dog Errata
    BSD-specific links
    [109]BSDi
    [110]FreeBSD
    [111]NetBSD
    [112]OpenBSD
    Security mailing lists [113]Caldera
    [114]Cobalt
    [115]Conectiva
    [116]Debian
    [117]Esware
    [118]FreeBSD
    [119]Kondara
    [120]LASER5
    [121]Linux From Scratch
    [122]Linux-Mandrake
    [123]NetBSD
    [124]OpenBSD
    [125]Red Hat
    [126]Slackware
    [127]Stampede
    [128]SuSE
    [129]Trustix
    [130]turboLinux
    [131]Yellow Dog
    Security Software Archives
    [132]munitions
    [133]ZedZ.net (formerly replay.com)
    Miscellaneous Resources
    [134]CERT
    [135]CIAC
    [136]Comp Sec News Daily
    [137]Crypto-GRAM
    [138]LinuxLock.org
    [139]LinuxSecurity.com
    [140]OpenSEC
    [141]Security Focus
    [142]SecurityPortal
    
    
                                                         [143]Next: Kernel
    
    [144]Eklektix, Inc. Linux powered! Copyright Л 2001 [145]Eklektix,
    Inc., all rights reserved
    Linux (R) is a registered trademark of Linus Torvalds
 
 References
 
    1. http://lwn.net/
    2. http://ads.tucows.com/click.ng/pageid=001-012-132-000-000-002-000-000-012
    3. http://lwn.net/2001/0906/
    4. http://lwn.net/2001/0906/kernel.php3
    5. http://lwn.net/2001/0906/dists.php3
    6. http://lwn.net/2001/0906/desktop.php3
    7. http://lwn.net/2001/0906/devel.php3
    8. http://lwn.net/2001/0906/commerce.php3
    9. http://lwn.net/2001/0906/press.php3
   10. http://lwn.net/2001/0906/announce.php3
   11. http://lwn.net/2001/0906/history.php3
   12. http://lwn.net/2001/0906/letters.php3
   13. http://lwn.net/2001/0906/bigpage.php3
   14. http://lwn.net/2001/0830/security.php3
   15. http://lwn.net/2001/0906/a/sql-auth-modules.php3
   16. http://www.ists.dartmouth.edu/IRIA/knowledge_base/tools/xcfind.htm
   17. http://lwn.net/2001/0906/a/xinetd-audit.php3
   18. http://lwn.net/alerts/Mandrake/MDKSA-2001:076.php3
   19. http://lwn.net/alerts/Immunix/IMNX-2001-70-033-01.php3
   20. http://lwn.net/2001/0906/a/bugzilla.php3
   21. http://lwn.net/2001/0906/a/lpr.php3
   22. http://lwn.net/2001/0906/a/gnut.php3
   23. http://lwn.net/2001/0906/a/pop3lite.php3
   24. http://lwn.net/alerts/SuSE/SuSE-SA:2001:030.php3
   25. http://lwn.net/2001/0906/a/PhpMyExplorer.php3
   26. http://lwn.net/2001/0906/a/pgpsdk.php3
   27. http://lwn.net/2001/0906/a/informix.php3
   28. http://lwn.net/2001/0816/security.php3#fetchmail
   29. http://lwn.net/alerts/Conectiva/CLA-2001:419.php3
   30. http://lwn.net/alerts/Mandrake/MDKSA-2001:072.php3
   31. http://lwn.net/alerts/Debian/DSA-071-1.php3
   32. http://lwn.net/alerts/EnGarde/ESA-20010816-01.php3
   33. http://lwn.net/alerts/Progeny/PROGENY-SA-2001-29.php3
   34. http://lwn.net/alerts/SuSE/SuSE-SA:2001:026.php3
   35. http://lwn.net/2001/0712/security.php3#openssl
   36. http://lwn.net/alerts/Conectiva/CLA-2001:418.php3
   37. http://lwn.net/2001/0712/a/eng-openssl.php3
   38. http://lwn.net/alerts/Progeny/PROGENY-SA-2001-23.php3
   39. http://lwn.net/2001/0712/a/trustix-openssl.php3
   40. http://lwn.net/2001/0823/security.php3#sendmail
   41. http://lwn.net/alerts/Mandrake/MDKSA-2001:075.php3
   42. http://lwn.net/alerts/Caldera/CSSA-2001-032.0.php3
   43. http://lwn.net/alerts/Conectiva/CLA-2001:412.php3
   44. http://lwn.net/alerts/Immunix/IMNX-2001-70-032-01.php3
   45. http://lwn.net/alerts/Slackware/sl-998919787.php3
   46. http://lwn.net/alerts/SuSE/SuSE-SA:2001:028.php3
   47. http://lwn.net/2001/0726/security.php3#mtelnetd
   48. http://lwn.net/alerts/SuSE/SuSE-SA:2001:029.php3
   49. http://lwn.net/alerts/Caldera/CSSA-2001-030.0.php3
   50. http://lwn.net/alerts/Conectiva/CLA-2001:413.php3
   51. http://lwn.net/alerts/Debian/DSA-075-1.php3
   52. http://lwn.net/alerts/Debian/DSA.php3
   53. http://lwn.net/alerts/Mandrake/MDKSA-2001:068.php3
   54. http://lwn.net/alerts/Progeny/PROGENY-SA-2001-27.php3
   55. http://lwn.net/alerts/RedHat/RHSA-2001:099-06.php3
   56. http://lwn.net/alerts/RedHat/RHSA-2001:100-02.php3
   57. http://lwn.net/alerts/Slackware/sl-997726350.php3
   58. http://lwn.net/alerts/YellowDog/YDU-20010810-1.php3
   59. http://lwn.net/alerts/YellowDog/YDU-20010810-2.php3
   60. http://lwn.net/2001/0816/security.php3
   61. http://lwn.net/alerts/Mandrake/MDKSA-2001:074.php3
   62. http://lwn.net/alerts/Conectiva/CLA-2001:411.php3
   63. http://lwn.net/alerts/Debian/DSA-074-1.php3
   64. http://lwn.net/alerts/Progeny/PROGENY-SA-2001-32.php3
   65. http://lwn.net/2001/0712/security.php3#xloadimage
   66. http://lwn.net/alerts/Mandrake/MDKSA-2001:073.php3
   67. http://lwn.net/alerts/Conectiva/CLA-2001:415.php3
   68. http://lwn.net/alerts/Debian/DSA-069-1.php3
   69. http://lwn.net/alerts/Progeny/PROGENY-SA-2001-31.php3
   70. http://lwn.net/2001/0712/a/rh-xloadimage.php3
   71. http://lwn.net/2001/0726/a/suse-xli.php3
   72. http://lwn.net/alerts/YellowDog/YDU-20010725-11.php3
   73. http://lwn.net/2001/0906/a/security-week.php3
   74. http://lwn.net/2001/0906/a/mexico.php3
   75. http://www.nspw.org/
   76. http://www.sfu.ca/igs/CASIS/
   77. http://www.raid-symposium.org/Raid2001
   78. http://www.bell-labs.com/user/reiter/ccs8/
   79. http://securityfocus.com/calendar
   80. mailto:lwn@lwn.net
   81. mailto:lwn@lwn.net
   82. http://ads.tucows.com/click.ng/buttonpos=lwnbuttonsecurity
   83. http://lwn.net/alerts/
   84. http://bluelinux.sourceforge.net/
   85. http://castle.altlinux.ru/
   86. http://www.engardelinux.org/
   87. http://www.immunix.org/
   88. http://www.maganation.com/~kaladix/
   89. http://www.nsa.gov/selinux/
   90. http://www.openwall.com/Owl/
   91. http://www.trustix.com/
   92. http://www.bastille-linux.org/
   93. http://lsap.org/
   94. http://lsm.immunix.org/
   95. http://www.openssh.com/
   96. http://www.securityfocus.com/bugtraq/archive/
   97. http://www.nfr.net/firewall-wizards/
   98. http://www.jammed.com/Lists/ISN/
   99. http://www.calderasystems.com/support/security/
  100. http://www.conectiva.com.br/atualizacoes/
  101. http://www.debian.org/security/
  102. http://www.kondara.org/errata/k12-security.html
  103. http://www.esware.com/actualizaciones.html
  104. http://linuxppc.org/security/advisories/
  105. http://www.linux-mandrake.com/en/fupdates.php3
  106. http://www.redhat.com/support/errata/index.html
  107. http://www.suse.de/security/index.html
  108. http://www.yellowdoglinux.com/resources/errata.shtml
  109. http://www.BSDI.COM/services/support/patches/
  110. http://www.freebsd.org/security/security.html
  111. http://www.NetBSD.ORG/Security/
  112. http://www.openbsd.org/security.html
  113. http://www.calderasystems.com/support/forums/announce.html
  114. http://www.cobalt.com/support/resources/usergroups.html
  115. http://distro.conectiva.com.br/atualizacoes/
  116. http://www.debian.org/MailingLists/subscribe
  117. http://www.esware.com/lista_correo.html
  118. http://www.freebsd.org/handbook/eresources.html#ERESOURCES-MAIL
  119. http://www.kondara.org/mailinglist.html.en
  120. http://l5web.laser5.co.jp/ml/ml.html
  121. http://www.linuxfromscratch.org/services/mailinglistinfo.php
  122. http://www.linux-mandrake.com/en/flists.php3
  123. http://www.netbsd.org/MailingLists/
  124. http://www.openbsd.org/mail.html
  125. http://www.redhat.com/mailing-lists/
  126. http://www.slackware.com/lists/
  127. http://www.stampede.org/mailinglists.php3
  128. http://www.suse.com/en/support/mailinglists/index.html
  129. http://www.trustix.net/support/
  130. http://www.turbolinux.com/mailman/listinfo/tl-security-announce
  131. http://lists.yellowdoglinux.com/ydl_updates.shtml
  132. http://munitions.vipul.net/
  133. http://www.zedz.net/
  134. http://www.cert.org/nav/alerts.html
  135. http://ciac.llnl.gov/ciac/
  136. http://www.MountainWave.com/
  137. http://www.counterpane.com/crypto-gram.html
  138. http://linuxlock.org/
  139. http://linuxsecurity.com/
  140. http://www.opensec.net/
  141. http://www.securityfocus.com/
  142. http://www.securityportal.com/
  143. http://lwn.net/2001/0906/kernel.php3
  144. http://www.eklektix.com/
  145. http://www.eklektix.com/
 
 --- ifmail v.2.14.os7-aks1
  * Origin: Unknown (2:4615/71.10@fidonet)
 
 

Вернуться к списку тем, сортированных по: возрастание даты  уменьшение даты  тема  автор 

 Тема:    Автор:    Дата:  
 URL: http://www.lwn.net/2001/0906/security.php3   Sergey Lentsov   06 Sep 2001 17:18:39 
Архивное /ru.linux/198612d55cbe2.html, оценка 3 из 5, голосов 12
Яндекс.Метрика
Valid HTML 4.01 Transitional