Главная страница


ru.linux

 
 - RU.LINUX ---------------------------------------------------------------------
 From : Sergey Lentsov                       2:4615/71.10   08 Feb 2002  14:32:46
 To : All
 Subject : URL: http://www.lwn.net/2002/0207/security.php3
 -------------------------------------------------------------------------------- 
 
    [1][LWN Logo] [No ads right now]
    [LWN.net]
 
    Sections:
     [2]Main page
     Security
     [3]Kernel
     [4]Distributions
     [5]Development
     [6]Commerce
     [7]Linux in the news
     [8]Announcements
     [9]Letters
    [10]All in one big page
 
    See also: [11]last week's Security page.
 
 Security
 
 News and Editorials
 
    Checking for root kits. After his security tutorial at Linux World,
    LWN asked Michael H. Warfield, of [12]Internet Security Systems, if
    there was one current security issue our readers should watch. It is
    "root kits installed by intruders after they cracked your site to hide
    their activities and protect their backdoors." Michael also mentioned,
    in his talks, that "common worms have new exploits plus root kits
    wrapped up with some crude scripting glue to propagate from system to
    system and install backdoors with the rootkits hiding them."
 
    Michael recommends regularly checking exposed systems by running
    [13]chkrootkit. This nifty tool locally checks for signs of a rootkit.
    Running it regularly and using diff to compare the results to past
    runs is one way to look for compromised systems.
 
    The Sardonix security auditing portal. Crispin Cowan has [14]announced
    a new security portal designed to encourage auditing of code. "The
    whole project is intended to leverage community skepticism of claims
    of security, and the community's joyful habit of criticizing the work
    of others, and so we call it Sardonix." There will be features to
    track the auditing of various packages; it will also be able to audit
    the auditors by tracking how many bugs are found after somebody has
    declared it clean. The project is in an early stage, and contributors
    are being sought. This work is supported by a DARPA grant.
 
    Out of the box, Linux is 'dreadfully insecure' (Register). The
    Register [15]reminds us that default installations for most Linux
    distibutions are insecure. "Jay Beale, the lead developer of Bastille
    Linux and an independent security consultant, says it's not the
    Unix-based systems with interesting stuff on them that get hacked,
    it's the vulnerable ones. And if you're not prepared to tighten up
    what you get from the vendor, it's just a matter of time."
 
 Security Reports
 
    Mandrake Linux Security Update - gzip. Mandrake has issued a security
    advisory for [16]gzip. This fixes two problems with the gzip archiving
    program; the first is a crash when an input file name is over 1020
    characters, and the second is a buffer overflow that could be
    exploited if gzip is run on a server such as an FTP server.
 
    Net::FTPServer security fix. The Net::FTPServer project released this
    [17]security fix to close a potential vulnerability "allowing users to
    list directories to which they should not have access. If your
    configuration file uses 'list rule', then you need to upgrade to
    version 1.034."
 
    PHP Safe Mode Filesystem Circumvention Problem. According to this
    [18]post to Bugtraq: "If an attacker has access to a MySQL server
    [...], he can use it as a proxy by which to download files residing on
    the [PHP] safe_mode-enabled web server".
 
    web scripts.
    The following web scripts were reported to contain vulnerabilities:
      * [19]Faq-O-Matic has a cross-site scripting vulnerability described
        in this [20]Bugtraq post. There is a fix available in CVS
        according to this [21]subsequent post.
 
    Proprietary products.
    The following proprietary products were reported to contain
    vulnerabilities:
      * Multiple vulnerabilities in Oracle 9i and 9iAS are described in
        Bugtraq posts from NGSSoftware Insight. They are charaterized as
        potential [22]remote compromise, [23]multiple buffer overflows and
        [24]JSP translation file access. Although the vulnerabilties are
        described as present on "all operating systems" no mention is made
        of verification on Linux.
      * texis(CGI) has a path disclosure vulnerability described in
        [25]this Bugtraq post.
 
 Updates
 
    Remotely exploitable vulnerability in pine. Pine has an unpleasant
    vulnerability in URL handling vulnerability which can lead to command
    execution by remote attackers. (First LWN report: [26] January 17th).
 
    This vulnerability is remotely exploitable; updating is a good idea.
 
    Note: If an update isn't yet available for your distribution, setting
    enable-msg-view-urls to "off" in pine's setup will avoid the
    vulnerability. (Thanks to Greg Herlein).
 
    This week's updates:
      * [27]Conectiva (January 31, 2002)
 
    Previous updates:
      * [28]EnGarde (January 14, 2002)
 
      [29]Red Hat (January 14, 2002)
 
      [30]Slackware (January 13, 2002)
 
      [31]Yellow Dog (January 27, 2002) A remotely exploitable hole in
    rsync. A vulnerability has been found in the rsync server: it seems
    that the server did not pay enough attention to the sign of numbers it
    reads from the client connection. This oversight allows an attacker to
    write bytes containing zero almost anywhere in the stack, with results
    similar to those caused by buffer overflows. Sites running rsync in
    its daemon mode are thus vulnerable to remote root compromises.
    Versions of rsync prior to 2.5.2 are vulnerable. (First LWN report:
    [32] January 31th).
 
    This week's updates:
      * [33]Debian (February 3, 2002)
 
    (note: if you applied [34]the original update, which broke rsync, you
    need to update again.) Previous updates:
      * [35]Conectiva (January 25, 2002)
 
      [36]EnGarde (January 25, 2002)
 
      [37]Mandrake (January 28, 2002)
 
      [38]Red Hat (January 30, 2002) (note that this alert was updated; if
    you applied [39]the original version you should update again.)
 
      [40]Slackware (January 26, 2002)
 
      [41]SuSE (January 25, 2002)
 
      [42]Trustix (January 28, 2002)
 
      [43]Yellow Dog (January 27, 2002)
 
 Events
 
    Upcoming Security Events.
 
    The schedule for CodeCon 2002 has [44]been announced. "CodeCon is the
    premier event in 2002 for the P2P, cypherpunk, and network/security
    application developer community." CodeCon 2002 will be held at DNA
    lounge in San Francisco, February 15th to 17th.
 
    Date Event Location
    February 15 - 17, 2002 [45]CODECON 2002 San Francisco, California, USA
    February 18 - 22, 2002 [46]RSA Conference 2002 San Jose, CA., USA
    March 11 - 14, 2002 [47]Financial Cryptography 2002 Sothhampton,
    Bermuda
    March 18 - 21, 2002 [48]Sixth Annual Distributed Objects and
    Components Security Workshop (Pier 5 Hotel at the Inner
    Harbor)Baltimore, Maryland, USA
    April 7 - 10, 2002 [49]Techno-Security 2002 Conference Myrtle Beach,
    SC
 
    For additional security-related events, included training courses
    (which we don't list above) and events further in the future, check
    out Security Focus' [50]calendar, one of the primary resources we use
    for building the above list. To submit an event directly to us, please
    send a plain-text message to [51]lwn@lwn.net.
 
    Section Editor: [52]Dennis Tenney
    February 7, 2002
 
    LWN Resources
    [53]Security alerts archive
    Secured Distributions:
    [54]Astaro Security
    [55]Blue Linux
    [56]Castle
    [57]Engarde Secure Linux
    [58]Immunix
    [59]Kaladix Linux
    [60]NSA Security Enhanced
    [61]Openwall GNU/Linux
    [62]Trustix
    Security Projects
    [63]Bastille
    [64]Linux Security Audit Project
    [65]Linux Security Module
    [66]OpenSSH
    Security List Archives
    [67]Bugtraq Archive
    [68]Firewall Wizards Archive
    [69]ISN Archive
    Distribution-specific links
    [70]Caldera Advisories
    [71]Conectiva Updates
    [72]Debian Alerts
    [73]Kondara Advisories
    [74]Esware Alerts
    [75]LinuxPPC Security Updates
    [76]Mandrake Updates
    [77]Red Hat Errata
    [78]SuSE Announcements
    [79]Turbolinux
    [80]Yellow Dog Errata
    BSD-specific links
    [81]BSDi
    [82]FreeBSD
    [83]NetBSD
    [84]OpenBSD
    Security mailing lists
    [85]Caldera
    [86]Cobalt
    [87]Conectiva
    [88]Debian
    [89]Esware
    [90]FreeBSD
    [91]Kondara
    [92]LASER5
    [93]Linux From Scratch
    [94]Linux-Mandrake
    [95]NetBSD
    [96]OpenBSD
    [97]Red Hat
    [98]Slackware
    [99]Stampede
    [100]SuSE
    [101]Trustix
    [102]turboLinux
    [103]Yellow Dog
    Security Software Archives
    [104]munitions
    [105]ZedZ.net (formerly replay.com)
    Miscellaneous Resources
    [106]CERT
    [107]CIAC
    [108]Comp Sec News Daily
    [109]Crypto-GRAM
    [110]LinuxLock.org
    [111]LinuxSecurity.com
    [112]Security Focus
    [113]SecurityPortal
                                                         [114]Next: Kernel
 
    [115]Eklektix, Inc. Linux powered! Copyright Л 2002 [116]Eklektix,
    Inc., all rights reserved
    Linux (R) is a registered trademark of Linus Torvalds
 
 References
 
    1. http://lwn.net/
    2. http://lwn.net/2002/0207/
    3. http://lwn.net/2002/0207/kernel.php3
    4. http://lwn.net/2002/0207/dists.php3
    5. http://lwn.net/2002/0207/devel.php3
    6. http://lwn.net/2002/0207/commerce.php3
    7. http://lwn.net/2002/0207/press.php3
    8. http://lwn.net/2002/0207/announce.php3
    9. http://lwn.net/2002/0207/letters.php3
   10. http://lwn.net/2002/0207/bigpage.php3
   11. http://lwn.net/2002/0131/security.php3
   12. http://www.iss.net/
   13. http://www.chkrootkit.org/
   14. http://lwn.net/2002/0207/a/sardonix.php3
   15. http://www.theregister.co.uk/content/55/23901.html
   16. http://lwn.net/alerts/Mandrake/MDKSA-2002:011.php3
   17. http://lwn.net/2002/0207/a/net-ftpserver.php3
   18. http://lwn.net/2002/0207/a/phpsafemode.php3
   19. http://faqomatic.sourceforge.net/
   20. http://lwn.net/2002/0207/a/faqomatic.php3
   21. http://lwn.net/2002/0207/a/faqomatic2.php3
   22. http://lwn.net/2002/0207/a/oracle1.php3
   23. http://lwn.net/2002/0207/a/oracle2.php3
   24. http://lwn.net/2002/0207/a/oracle3.php3
   25. http://lwn.net/2002/0207/a/texis.php3
   26. http://lwn.net/2002/0117/security.php3#pine
   27. http://lwn.net/alerts/Conectiva/CLA-2002:460.php3
   28. http://lwn.net/alerts/EnGarde/ESA-20020114-002.php3
   29. http://lwn.net/alerts/RedHat/RHSA-2002:009-06.php3
   30. http://lwn.net/alerts/Slackware/sl-1010936849.php3
   31. http://lwn.net/alerts/YellowDog/YDU-20020127-8.php3
   32. http://lwn.net/2002/0131/security.php3#rsync
   33. http://lwn.net/alerts/Debian/DSA-106-2.php3
   34. http://lwn.net/alerts/Debian/DSA-106-1.php3
   35. http://lwn.net/alerts/Conectiva/CLA-2002:458.php3
   36. http://lwn.net/alerts/EnGarde/ESA-20020125-004.php3
   37. http://lwn.net/alerts/Mandrake/MDKSA-2002:009.php3
   38. http://lwn.net/alerts/RedHat/RHSA-2002:018-10.php3
   39. http://lwn.net/alerts/RedHat/RHSA-2002:018-05.php3
   40. http://lwn.net/alerts/Slackware/sl-1012057608.php3
   41. http://lwn.net/alerts/SuSE/SuSE-SA:2002:004.php3
   42. http://lwn.net/alerts/Trustix/2002-0025.php3
   43. http://lwn.net/alerts/YellowDog/YDU-20020127-3.php3
   44. http://lwn.net/2002/0207/a/codeconschedule.php3
   45. http://www.codecon.org/
   46. http://www.rsaconference.com/
   47. http://www.fc02.ai/
   48. http://www.omg.org/news/meetings/docsec2002/call.htm
   49. http://www.TECHSEC.com/
   50. http://securityfocus.com/calendar
   51. mailto:lwn@lwn.net
   52. mailto:lwn@lwn.net
   53. http://lwn.net/alerts/
   54. http://www.astaro.com/products/index.html
   55. http://bluelinux.sourceforge.net/
   56. http://castle.altlinux.ru/
   57. http://www.engardelinux.org/
   58. http://www.immunix.org/
   59. http://www.kaladix.org/
   60. http://www.nsa.gov/selinux/
   61. http://www.openwall.com/Owl/
   62. http://www.trustix.com/
   63. http://www.bastille-linux.org/
   64. http://lsap.org/
   65. http://lsm.immunix.org/
   66. http://www.openssh.com/
   67. http://www.securityfocus.com/archive/1
   68. http://www.nfr.net/firewall-wizards/
   69. http://www.jammed.com/Lists/ISN/
   70. http://www.calderasystems.com/support/security/
   71. http://www.conectiva.com.br/atualizacoes/
   72. http://www.debian.org/security/
   73. http://www.kondara.org/errata/k12-security.html
   74. http://www.esware.com/actualizaciones.html
   75. http://linuxppc.org/security/advisories/
   76. http://www.linux-mandrake.com/en/fupdates.php3
   77. http://www.redhat.com/support/errata/index.html
   78. http://www.suse.de/security/index.html
   79. http://www.turbolinux.com/security/
   80. http://www.yellowdoglinux.com/resources/
   81. http://www.BSDI.COM/services/support/patches/
   82. http://www.freebsd.org/security/security.html
   83. http://www.NetBSD.ORG/Security/
   84. http://www.openbsd.org/security.html
   85. http://www.calderasystems.com/support/forums/announce.html
   86. http://www.cobalt.com/support/resources/usergroups.html
   87. http://distro.conectiva.com.br/atualizacoes/
   88. http://www.debian.org/MailingLists/subscribe
   89. http://www.esware.com/lista_correo.html
   90. http://www.freebsd.org/handbook/eresources.html#ERESOURCES-MAIL
   91. http://www.kondara.org/mailinglist.html.en
   92. http://l5web.laser5.co.jp/ml/ml.html
   93. http://www.linuxfromscratch.org/services/mailinglistinfo.php
   94. http://www.linux-mandrake.com/en/flists.php3
   95. http://www.netbsd.org/MailingLists/
   96. http://www.openbsd.org/mail.html
   97. http://www.redhat.com/mailing-lists/
   98. http://www.slackware.com/lists/
   99. http://www.stampede.org/mailinglists.php3
  100. http://www.suse.com/en/support/mailinglists/index.html
  101. http://www.trustix.net/support/
  102. http://www.turbolinux.com/mailman/listinfo/tl-security-announce
  103. http://lists.yellowdoglinux.com/ydl_updates.shtml
  104. http://munitions.vipul.net/
  105. http://www.zedz.net/
  106. http://www.cert.org/nav/alerts.html
  107. http://ciac.llnl.gov/ciac/
  108. http://www.MountainWave.com/
  109. http://www.counterpane.com/crypto-gram.html
  110. http://linuxlock.org/
  111. http://linuxsecurity.com/
  112. http://www.securityfocus.com/
  113. http://www.securityportal.com/
  114. http://lwn.net/2002/0207/kernel.php3
  115. http://www.eklektix.com/
  116. http://www.eklektix.com/
 
 --- ifmail v.2.14.os7-aks1
  * Origin: Unknown (2:4615/71.10@fidonet)
 
 

Вернуться к списку тем, сортированных по: возрастание даты  уменьшение даты  тема  автор 

 Тема:    Автор:    Дата:  
 URL: http://www.lwn.net/2002/0207/security.php3   Sergey Lentsov   08 Feb 2002 14:32:46 
Архивное /ru.linux/19861a4821370.html, оценка 3 из 5, голосов 10
Яндекс.Метрика
Valid HTML 4.01 Transitional