|
ru.linux- RU.LINUX --------------------------------------------------------------------- From : Sergey Lentsov 2:4615/71.10 04 Oct 2001 17:57:04 To : All Subject : URL: http://www.lwn.net/2001/1004/security.php3 -------------------------------------------------------------------------------- [1][LWN Logo] [2]Click Here [LWN.net] Sections: [3]Main page Security [4]Kernel [5]Distributions [6]On the Desktop [7]Development [8]Commerce [9]Linux in the news [10]Announcements [11]Linux History [12]Letters [13]All in one big page See also: [14]last week's Security page. Security News and Editorials The top 20 Internet security vulnerabilities. SANS has posted a list of [15]the 20 most critical security vulnerabilities on the net. The list makes good reading for anybody concerned about the security of their systems, though it is far from a comprehensive list of problems. The list is broken down into three large sections. The first concerns itself with general, system-independent problems. These include: * Default installations of operating systems. Many OS installations leave vulnerabilities, and install more software than is needed. * Accounts with nonexistent or weak passwords. Some things haven't changed in decades. * Bad backups. This, of course, is a general systems administration problem. If a site's backups have not been checked recently for completeness and restorability, there are probably problems. * Large numbers of open ports. Many systems run services they do not need. * Lack of address filtering on networks. A properly configured network needs to be sure that both incoming and outgoing packets carry reasonable addresses. * Insufficient logging. Without complete and secure logs, detection and analysis of intrusions is impossible. * Vulnerable CGI programs. The net probably has not yet begun to see the degree of mayhem that bad CGI programming can cause. The middle section lists Windows-specific vulnerabilities; readers interested in those are encouraged to go to the SANS page. The final section goes into Unix-specific problems: * Buffer overflows in rpc services. * Sendmail vulnerabilities. After a relatively quiet period, sendmail seems to be turning up more problems again - see below. * Bind vulnerabilities. * The rsh, rlogin, and rcp commands, which send passwords in clear text and which enable users to set up uncontrolled webs of trust. * Vulnerabilities in the lpd subsystem. * Sadmind and mountd. The former is Solaris-specific, but all systems supporting NFS have mountd. * Bad SNMP passwords. A quick look at this list reveals that many of the problems are old, and very few of them are difficult to address. Network security is hard, but, in many cases, even the easy things have not been done. A survey of PHP vulnerabilities. "Yet Another Hacker Team" has performed an automated audit of a number of PHP-based packages, and has [16]posted the results. The conclusion: much PHP code is vulnerable to remote exploits. Two PHP features are the source of the problems: (1) PHP allows global variables to be set from an HTTP request, and (2) file operations handle URLs transparently. The combination of the two allows a remote attacker to run arbitrary PHP code on the server; this, in turn, gives that attacker shell access. The survey makes this claim: PHP is not insecure by default, but makes insecure programming very easy. Reasonable people could differ on that point. PHP could be far more secure by simply isolating user-supplied information in a special "request" variable. PHP is great stuff (LWN uses a lot of it), but some aspects of the environment are, indeed, insecure by default. CRYPTO-GRAM special issue. Bruce Schneier has released [17]a special issue of his CRYPTO-GRAM Newsletter devoted to the events of September 11. "People are willing to give up liberties for vague promises of security because they think they have no choice. What they're not being told is that they can have both. It would require people to say no to the FBI's power grab. It would require us to discard the easy answers in favor of thoughtful answers." Worth a read. Conectiva cuts off 4.x. Conectiva has [18]served notice that the 4.x versions of its distribution are no longer supported, and no further updates will be available. Conectiva customers running ancient versions of the distribution are encouraged to upgrade to something more recent. Security Reports OpenSSH 2.9.9 released. [19]OpenSSH 2.9.9 has been released; it includes a security fix that will be important for people using source-based access control. A new set of sendmail vulnerabilities. Michal Zalewski has [20]found a new set of vulnerabilities in sendmail; they may be used by a local attacker to obtain unauthorized access to the mail system. Versions of sendmail through 8.12 are vulnerable; 8.12.1 has been released and contains fixes for all of the problems. We'll pass on distributor updates as we see them. Zope DTML scripting security update. There is [21]a new Zope security update out there, fixing a vulnerability in DTML scripting. A suitably clueful user could use the vulnerability to obtain unauthorized access. A fix has been provided by Zope Corp.; expect updates shortly from the distributors that ship Zope as well. Proprietary products. The following proprietary products were reported to contain vulnerabilities: * The Cisco PIX firewall has [22]a vulnerability in its mailguard facility; the restrictions on SMTP commands can be bypassed by an attacker. Updates Format string vulnerability in groff. A format string problem exists in groff; apparently it could be remotely exploited when it is configured to be used with the lpd printing system. New updates: * [23]Conectiva (October 2, 2001) Previous updates: * [24]Debian (August 10, 2001) * [25]Progeny (August 16, 2001) SQL injection vulnerabilities in Apache authentication modules. Several Apache authentication modules have vulnerabilities that could allow an attacker to feed arbitrary SQL code to the underlying database, resulting in a compromise of database integrity and unauthorized access to the server. See [26]the September 6 security page for more information. New updates: * [27]Conectiva (September 28, 2001) (mod_auth_pgsql) Previous updates: * [28]Conectiva (September 6, 2001) (mod_auth_mysql) Resources Linux Security Week from LinuxSecurity.com is [29]available in its October 1 edition. Also available is [30]Linux Advisory Watch for September 28. CERT has a new PGP key, following the expiration of its previous key at the end of September. See [31]the announcement for the new CERT key information. Events The International Cryptography Institute 2001 will be held November 29 and 30 in Washington, DC. Speakers include Dorothy Denning, Whitfield Diffie, Bruce Sterling, and Phil Zimmermann. See [32]the announcement for details. Upcoming Security Events. Date Event Location October 10 - 12, 2001 [33]Fourth International Symposium on Recent Advances in Intrusion Detection(RAID 2001) Davis, CA November 5 - 8, 2001 [34]8th ACM Conference on Computer and Communication Security(CCS-8) Philadelphia, PA, USA November 13 - 15, 2001 [35]International Conference on Information and Communications Security(ICICS 2001) Xian, China November 19 - 22, 2001 [36]Black Hat Briefings Amsterdam November 21 - 23, 2001 [37]International Information Warfare Symposium AAL, Lucerne, Swizerland. November 24 - 30, 2001 [38]Computer Security Mexico Mexico City November 29 - 30, 2001 [39]International Cryptography Institute Washington, DC December 2 - 7, 2001 [40]Lisa 2001 15th Systems Administration Conference San Diego, CA. For additional security-related events, included training courses (which we don't list above) and events further in the future, check out Security Focus' [41]calendar, one of the primary resources we use for building the above list. To submit an event directly to us, please send a plain-text message to [42]lwn@lwn.net. Section Editor: [43]Jonathan Corbet October 4, 2001 [44]Click Here LWN Resources [45]Security alerts archive Secured Distributions: [46]Blue Linux [47]Castle [48]Engarde Secure Linux [49]Immunix [50]Kaladix Linux [51]NSA Security Enhanced [52]Openwall GNU/Linux [53]Trustix Security Projects [54]Bastille [55]Linux Security Audit Project [56]Linux Security Module [57]OpenSSH Security List Archives [58]Bugtraq Archive [59]Firewall Wizards Archive [60]ISN Archive Distribution-specific links [61]Caldera Advisories [62]Conectiva Updates [63]Debian Alerts [64]Kondara Advisories [65]Esware Alerts [66]LinuxPPC Security Updates [67]Mandrake Updates [68]Red Hat Errata [69]SuSE Announcements [70]Yellow Dog Errata BSD-specific links [71]BSDi [72]FreeBSD [73]NetBSD [74]OpenBSD Security mailing lists [75]Caldera [76]Cobalt [77]Conectiva [78]Debian [79]Esware [80]FreeBSD [81]Kondara [82]LASER5 [83]Linux From Scratch [84]Linux-Mandrake [85]NetBSD [86]OpenBSD [87]Red Hat [88]Slackware [89]Stampede [90]SuSE [91]Trustix [92]turboLinux [93]Yellow Dog Security Software Archives [94]munitions [95]ZedZ.net (formerly replay.com) Miscellaneous Resources [96]CERT [97]CIAC [98]Comp Sec News Daily [99]Crypto-GRAM [100]LinuxLock.org [101]LinuxSecurity.com [102]OpenSEC [103]Security Focus [104]SecurityPortal [105]Next: Kernel [106]Eklektix, Inc. Linux powered! Copyright Л 2001 [107]Eklektix, Inc., all rights reserved Linux (R) is a registered trademark of Linus Torvalds References 1. http://lwn.net/ 2. http://ads.tucows.com/click.ng/pageid=001-012-132-000-000-002-000-000-012 3. http://lwn.net/2001/1004/ 4. http://lwn.net/2001/1004/kernel.php3 5. http://lwn.net/2001/1004/dists.php3 6. http://lwn.net/2001/1004/desktop.php3 7. http://lwn.net/2001/1004/devel.php3 8. http://lwn.net/2001/1004/commerce.php3 9. http://lwn.net/2001/1004/press.php3 10. http://lwn.net/2001/1004/announce.php3 11. http://lwn.net/2001/1004/history.php3 12. http://lwn.net/2001/1004/letters.php3 13. http://lwn.net/2001/1004/bigpage.php3 14. http://lwn.net/2001/0927/security.php3 15. http://www.sans.org/top20.htm 16. http://lwn.net/2001/1004/a/php-vulnerabilities.php3 17. http://lwn.net/2001/1004/a/cryptogram-special.php3 18. http://lwn.net/2001/1004/a/conectiva-cutoff.php3 19. http://lwn.net/2001/1004/a/openssh.php3 20. http://lwn.net/2001/1004/a/sendmail-vulnerabilities.php3 21. http://lwn.net/2001/1004/a/zope-dtml-fmt.php3 22. http://lwn.net/2001/1004/a/cisco-smtp.php3 23. http://lwn.net/alerts/Conectiva/CLA-2001:428.php3 24. http://lwn.net/alerts/Debian/DSA-072-1.php3 25. http://lwn.net/alerts/Progeny/PROGENY-SA-2001-33.php3 26. http://lwn.net/2001/0906/security.php3 27. http://lwn.net/alerts/Conectiva/CLA-2001:427.php3 28. http://lwn.net/alerts/Conectiva/CLA-2001:421.php3 29. http://lwn.net/2001/1004/a/security-week.php3 30. http://lwn.net/2001/1004/a/advisory-watch.php3 31. http://lwn.net/2001/1004/a/cert-key.php3 32. http://lwn.net/2001/1004/a/ici.php3 33. http://www.raid-symposium.org/Raid2001 34. http://www.bell-labs.com/user/reiter/ccs8/ 35. http://homex.coolconnect.com/member2/icisa/icics2001.html 36. http://www.blackhat.com/ 37. http://www.sympinfowarfare.ch/ 38. http://www.seguridad2001.unam.mx/ 39. http://www.nipli.org/isse/events/2001/cryptography 40. http://www.usenix.org/events/lisa2001/ 41. http://securityfocus.com/calendar 42. mailto:lwn@lwn.net 43. mailto:lwn@lwn.net 44. http://ads.tucows.com/click.ng/buttonpos=lwnbuttonsecurity 45. http://lwn.net/alerts/ 46. http://bluelinux.sourceforge.net/ 47. http://castle.altlinux.ru/ 48. http://www.engardelinux.org/ 49. http://www.immunix.org/ 50. http://www.kaladix.org/ 51. http://www.nsa.gov/selinux/ 52. http://www.openwall.com/Owl/ 53. http://www.trustix.com/ 54. http://www.bastille-linux.org/ 55. http://lsap.org/ 56. http://lsm.immunix.org/ 57. http://www.openssh.com/ 58. http://www.securityfocus.com/bugtraq/archive/ 59. http://www.nfr.net/firewall-wizards/ 60. http://www.jammed.com/Lists/ISN/ 61. http://www.calderasystems.com/support/security/ 62. http://www.conectiva.com.br/atualizacoes/ 63. http://www.debian.org/security/ 64. http://www.kondara.org/errata/k12-security.html 65. http://www.esware.com/actualizaciones.html 66. http://linuxppc.org/security/advisories/ 67. http://www.linux-mandrake.com/en/fupdates.php3 68. http://www.redhat.com/support/errata/index.html 69. http://www.suse.de/security/index.html 70. http://www.yellowdoglinux.com/resources/errata.shtml 71. http://www.BSDI.COM/services/support/patches/ 72. http://www.freebsd.org/security/security.html 73. http://www.NetBSD.ORG/Security/ 74. http://www.openbsd.org/security.html 75. http://www.calderasystems.com/support/forums/announce.html 76. http://www.cobalt.com/support/resources/usergroups.html 77. http://distro.conectiva.com.br/atualizacoes/ 78. http://www.debian.org/MailingLists/subscribe 79. http://www.esware.com/lista_correo.html 80. http://www.freebsd.org/handbook/eresources.html#ERESOURCES-MAIL 81. http://www.kondara.org/mailinglist.html.en 82. http://l5web.laser5.co.jp/ml/ml.html 83. http://www.linuxfromscratch.org/services/mailinglistinfo.php 84. http://www.linux-mandrake.com/en/flists.php3 85. http://www.netbsd.org/MailingLists/ 86. http://www.openbsd.org/mail.html 87. http://www.redhat.com/mailing-lists/ 88. http://www.slackware.com/lists/ 89. http://www.stampede.org/mailinglists.php3 90. http://www.suse.com/en/support/mailinglists/index.html 91. http://www.trustix.net/support/ 92. http://www.turbolinux.com/mailman/listinfo/tl-security-announce 93. http://lists.yellowdoglinux.com/ydl_updates.shtml 94. http://munitions.vipul.net/ 95. http://www.zedz.net/ 96. http://www.cert.org/nav/alerts.html 97. http://ciac.llnl.gov/ciac/ 98. http://www.MountainWave.com/ 99. http://www.counterpane.com/crypto-gram.html 100. http://linuxlock.org/ 101. http://linuxsecurity.com/ 102. http://www.opensec.net/ 103. http://www.securityfocus.com/ 104. http://www.securityportal.com/ 105. http://lwn.net/2001/1004/kernel.php3 106. http://www.eklektix.com/ 107. http://www.eklektix.com/ --- ifmail v.2.14.os7-aks1 * Origin: Unknown (2:4615/71.10@fidonet) Вернуться к списку тем, сортированных по: возрастание даты уменьшение даты тема автор
Архивное /ru.linux/1986176f8dd4d.html, оценка из 5, голосов 10
|