|
ru.linux- RU.LINUX --------------------------------------------------------------------- From : Sergey Lentsov 2:4615/71.10 21 Jun 2001 17:11:55 To : All Subject : URL: http://lwn.net/2001/0621/security.php3 -------------------------------------------------------------------------------- [1][LWN Logo] [2]Click Here [LWN.net] Sections: [3]Main page Security [4]Kernel [5]Distributions [6]On the Desktop [7]Development [8]Commerce [9]Linux in the news [10]Announcements [11]Linux History [12]Letters [13]All in one big page See also: [14]last week's Security page. Security News and Editorials The Danger of Allowing Users to Post Images. A major [15]discussion thread on BugTraq this week started when John Percival posted a note entitled [16]The Danger of Allowing Users to Post Images. With it, he included an exploit developed by Chris 'stallion' Lambert which could be used with almost any web script that uses cookie session/login data to validate CGI forms. Many such web scripts, including threaded discussion forums like Infopop's Ultimate Bulletin Board or ezboard allow users to post images to the forum. This means that they accept user input in the form of HTML-embedded references or URLs. They do not, however, necessarily check the input they receive to make sure it does not contain additional HTML commands, such as possible hostile query-strings. As a result, another user clicking on such as image may be unwittingly executing HTML commands. If such a user has additional privileges, such as a forum administrator, more damage can result. BugTraq ID [17]2871 addresses this issue and currently lists four affected applications: ezboard, Infopop's Ultimate Bulletin Board, VBulletin and WWWThreads. Fixes for Ultimate Bulletin Board and VBulletin have been made available. However, the basic issue is not specific to the applications, but just a demonstration that input verification vulnerabilities are extremely wide-spread in current web-based scripts. Time to take a look at your web scripts and look at how you are currently verifying the user input you receive, particularly if that input is in the form of HTML or other executable code. CRYPTO-GRAM Newsletter. Bruce Schneier's [18]CRYPTO-GRAM Newsletter for June is out. It covers a wide range of topics, including the grc.com attacks and the Honeynet project. "The results are fascinating. A random computer on the Internet is scanned dozens of times a day. The life expectancy of a default installation of Red Hat 6.2 server, or the time before someone successfully hacks it, is less than 72 hours. A common home user setup, with Windows 98 and file sharing enabled, was hacked five times in four days. Systems are subjected to NetBIOS scans an average of 17 times a day. And the fastest time for a server being hacked: 15 minutes after plugging it into the network." One of the links inside this month's CRYPTO-GRAM is to [19]The Strange Tale of Denial of Service, an account by Steve Gibson of his research into the world of distributed denial-of-service attacks. In this case, the machines used to deploy the attacks were running Microsoft Windows operating systems, but the victims could be any machine. From his experiences, he learned that major ISPs were simply unwilling to take action in response to this type of problem, that the US Federal government has too many problems to handle and will not look at "small" problems, such as the disablement of a single site, and that age does indeed shield youthful offenders within the US from prosecution. To quote Steve, "We can not have a stable Internet economy while 13-year-old children are free to deny arbitrary Internet services with impunity". Using a Cryptographic Hardware Token with Linux: the OpenSSL Project's New Engine (Linux Journal). Linux Journal's Paul Friburg takes a look at [20]using OpenSSL's new engine to provide support for digitally-signed emails using a hardware token. "Hardware tokens are nearly tamper proof and assure that the data are originating from a given Linux PC provided that the token is plugged into it. ... Sadly, the token we were requested to integrate, the Chrysalis-ITS Luna2 PC card, was not on the list of the three tokens implemented in the engine. This forced us to go under the hood of the OpenSSL engine code. ". Security Reports sysklogd denial-of-service vulnerability. Immunix reports that the Linux kernel logging daemon klogd distributed with the sysklogd is vulnerable to a denial-of-service attack because it will shut down if it receives a null byte in a log message from the Linux kernel. A patch to fix the problem is available. * [21]Immunix fetchmail buffer overflow. Wolfram Kleff reported a [22]buffer overflow in all versions of fetchmail. This is remotely exploitable and could lead to root access if fetchmail is run by root. An upgrade to fetchmail 5.8.6 will resolve the problem. * [23]Immunix * [24]Debian * [25]Conectiva * [26]Slackware, June 18th Changelog rxvt buffer overflow. Samuel "Zorgon" Dralet reported a [27]buffer overflow in rxvt which can be exploited to gain group utmp privileges on some systems, which could allow the utmp file to be modified. A patch is available to fix the problem. * [28]Debian * [29]Slackware, June 18th Changelog * [30]Linux-Mandrake man page source buffer overflow. zen-parse reported a [31]buffer overflow in man that, when manual pages begin with a '.so' statement, may be exploited to execute arbitrary code under the 'man' group id. No patch or update for man has been posted so far. For more details, check BugTraq ID [32]2872. MDBMS query display buffer overflow. teleh0r reported a [33]buffer overflow in [34]MDBMS, an SQL database server for Unix which provides source code and is free for non-commercial use. The buffer overflow can be exploited to execute arbitrary code. An [35]updated version is available, containing a fix for the problem. BSD ptrace race condition vulnerability. The version of ptrace shipped with NetBSD and OpenBSD has been reported to [36]contain a race condition which can be exploited to allow an unprivileged user to attach to a privileged process, elevating the attacker's privileges. OpenBSD has released patches to their kernel to resolve the problem; NetBSD has fixed the problem in their CVS tree. ghttp buffer overflow. The Gaztek HTTP daemon, [37]ghttpd, is a GPL'd HTTP server with a small memory footprint that is capable of handling "thousands of simultaneous connections". A [38]buffer overflow has been reported in version 1.4 that can be exploited by a remote attacker to run arbitrary code under the privileges of the ghttpd server. No fix for the problem has been reported so far. Proprietary products. The following proprietary products were reported to contain vulnerabilities: * [39]WatchGuard Firebox 2500 and 4500 boxes are reported to contain a vulnerability which makes it possible for an intruder to bypass SMTP checking using attachments encoded in base64. No vendor response has been reported so far. * [40]ScreamingMedia SiteWare versions 2.501 and earlier and 3.1 and earlier contain a file disclosure vulnerability. An upgrade to 2.5.1 or 3.1.1 will apparent resolve the problem. BugTraq ID [41]2868. * cgiCentral's WebStore shopping cart software has been reported to contain two vulnerabilities which can be used together to allow an attacker to execute arbitrary commands on a system running Webstore. The two vulnerabilities are an [42]administrator authentication bypass vulnerability and an [43]arbitrary command execution vulnerability. A workaround for the command execution vulnerability has been posted, but no vendor response has been seen so far. * [44]The Cisco Node Route Processor 2 card has been reported to allow unauthorized telnet access in its default configuration. An upgrade to Cisco 6400 NRP2 12.1DC will resolve the problem. * [45]NetSQL, a light-weight SQL database server for Linux and Solaris, has been reported to [46]contain a remotely exploitable buffer overflow which can give an remote attacker root access on the server. No vendor response has been seen so far. * [47]Microburst uDirectory, a Perl CGI script, has been reported to contain an input validation error which can be exploited remotely to execute arbitrary commands on the host. No vendor response has been seen so far. Updates exim format string vulnerability. Check the [48]June 14th LWN Security Summary for the original report. This week's updates: * [49]Red Hat [Note, one user reported [50]problems with the Red Hat 7.0 packages in this update]. Previous updates: * [51]Debian (June 14th) * [52]Conectiva (June 14th) xinetd buffer overflow. Check the [53]June 14th LWN Security Summary for the initial report. The buffer overflow is in the ident logging portion of xinetd, so one workaround to the problem is to disable ident logging. This week's updates: * [54]Debian * [55]Conectiva xinetd default umask vulnerability. Check the [56]June 7th LWN Security Summary for the original report. Fixing the problem simply requires that the default umask for xinetd be set to 022 instead of 000. This is also covered in BugTraq ID [57]2826. This week's updates: * [58]Debian * [59]Conectiva Previous updates: * [60]Red Hat (June 7th) * [61]Linux-Mandrake (June 14th) * [62]Immunix (June 14th) OpenSSH tmplink vulnerability. Check the [63]June 7th LWN Security Summary for the initial report. This is also covered in BugTraq ID [64]2825. This week, [65]OpenSSH 2.9.p2 was released with a fix for the problem. ispell symbolic link vulnerabilities. Check the [66]June 7th LWN Security Summary for the original report. This week's updates: * [67]Linux-Mandrake Previous updates: * [68]Red Hat (June 7th) * [69]Debian, fixed in ispell-3.1.20-8, updated January 26, 2000. (June 14th) Webmin environment variable inheritance vulnerability. Check the [70]May 31st LWN Security Summary for the original report. This week's updates: * [71]Linux-Mandrake Previous updates: * [72]Caldera, disabling Webmin recommended, no updated packages available yet. (May 31st) * [73]Caldera, updated packages now available (June 7th) gnupg format string vulnerability. Check the [74]May 31st LWN Security Summary for the initial report. gnupg 1.0.5 and earlier are vulnerable; gnupg 1.0.6 contains a fix for this problem and an upgrade is recommended. Werner Koch also sent out [75]a note warning of minor build problems with gnupg 1.0.6 when compiled without gcc. This week's updates: * [76]Debian, official Previous updates: * [77]Engarde (May 31st) * [78]Progeny (May 31st) * [79]Linux-Mandrake (June 7th) * [80]Immunix (June 7th) * [81]Trustix (June 7th) * [82]SuSE (June 7th) * [83]Conectiva (June 14th) * [84]Red Hat (June 14th) * [85]Turbolinux (June 14th) * [86]Caldera (June 14th) * [87]Debian, unstable upgrade to 1.0.6 on May 29th. (June 14th) gnupg. [88]gnupg 1.0.5 was released on April 29th. Check the [89]May 3rd LWN Security Summary for details. An upgrade to 1.0.5 is recommended. This week's updates: * [90]Debian Previous updates: * [91]Linux-Mandrake (May 10th) * [92]Immunix (May 3rd) * [93]Red Hat (May 24th) * [94]Caldera (May 24th) Denial-of-service vulnerability in FTP server implementations. Check the [95]March 22nd LWN Security Summary for the original report. Affected FTP daemons include ProFTPd, NetBSD FTP, PureFTPd (to some variants of this attack), BeroFTPD, and FreeBSD FTP. This week's updates: * [96]Linux-Mandrake Previous updates: * [97]ProFTPd (workaround only) (March 22nd) * [98]ProFTPD 1.2.2rc1 Apache directory listing error. Check the [99]March 8th LWN Security Summary for the initial report. Apache 1.3.18 and earlier are vulnerable; Apache 1.3.19 contains a fix for the problem. Note that this week is the first week where we've seen distribution updates for this problem, even though it was initially reported three months ago. * [100]Trustix Resources Bastille Linux 1.2. The Bastille Linux development team [101]announced the release of Bastille Linux 1.2, a hardening script for multiple Linux distributions. CryptoMail 0.90. The first public release of CryptoMail, [102]version 0.90, was announced this week. CryptoMail is an end-to-end secure email system. MySQL, Apache and Sendmail are required in order to run the server. More information is available at [103]http://www.cryptomail.org. Events Upcoming Security Events. Date Event Location June 21 - 22, 2001 [104]13th Annual Computer Security Incident Handling Conference (FIRST 2001) Toulouse, France June 21, 2001 [105]PKI Forum Members Meeting (Kempinski Hotel Airport Munchen)Munich, Germany July 11 - 12, 2001 [106]Black Hat Briefings USA '01 Las Vegas, Nevada, USA. July 17, 2001 [107]The Open Group Security Forum briefing Austin, Texas August 6 - 10, 2001 [108]CERT Conference 2001 Omaha, NE, USA. August 7, 2001 [109]CIBC World Markets First Annual Security & Privacy Conference New York, NY, USA. August 13 - 17, 2001 [110]10th USENIX Security Symposium 2001 Conference Washington, D.C. August 13 - 17, 2001 [111]HAL2001 Enschede, The Netherlands For additional security-related events, included training courses (which we don't list above) and events further in the future, check out Security Focus' [112]calendar, one of the primary resources we use for building the above list. To submit an event directly to us, please send a plain-text message to [113]lwn@lwn.net. Section Editor: [114]Liz Coolbaugh June 21, 2001 [115]Click Here Secured Distributions: [116]Engarde Secure Linux [117]Immunix [118]Kaladix [119]Nexus [120]NSA Security Enhanced [121]Openwall GNU/Linux [122]SLinux [123]Trustix Security Projects [124]Bastille [125]Linux Security Audit Project [126]Linux Security Module [127]OpenSSH Security List Archives [128]Bugtraq Archive [129]Firewall Wizards Archive [130]ISN Archive Distribution-specific links [131]Caldera Advisories [132]Conectiva Updates [133]Debian Alerts [134]Kondara Advisories [135]Esware Alerts [136]LinuxPPC Security Updates [137]Mandrake Updates [138]Red Hat Errata [139]SuSE Announcements [140]Yellow Dog Errata BSD-specific links [141]BSDi [142]FreeBSD [143]NetBSD [144]OpenBSD Security mailing lists [145]Caldera [146]Cobalt [147]Conectiva [148]Debian [149]Esware [150]FreeBSD [151]Kondara [152]LASER5 [153]Linux From Scratch [154]Linux-Mandrake [155]NetBSD [156]OpenBSD [157]Red Hat [158]Slackware [159]Stampede [160]SuSE [161]Trustix [162]turboLinux [163]Yellow Dog Security Software Archives [164]munitions [165]ZedZ.net (formerly replay.com) Miscellaneous Resources [166]CERT [167]CIAC [168]Comp Sec News Daily [169]Crypto-GRAM [170]LinuxLock.org [171]LinuxSecurity.com [172]OpenSEC [173]Security Focus [174]SecurityPortal [175]Next: Kernel [176]Eklektix, Inc. Linux powered! Copyright Л 2001 [177]Eklektix, Inc., all rights reserved Linux (R) is a registered trademark of Linus Torvalds References 1. http://lwn.net/ 2. http://ads.tucows.com/click.ng/pageid=001-012-132-000-000-002-000-000-012 3. http://lwn.net/2001/0621/ 4. http://lwn.net/2001/0621/kernel.php3 5. http://lwn.net/2001/0621/dists.php3 6. http://lwn.net/2001/0621/desktop.php3 7. http://lwn.net/2001/0621/devel.php3 8. http://lwn.net/2001/0621/commerce.php3 9. http://lwn.net/2001/0621/press.php3 10. http://lwn.net/2001/0621/announce.php3 11. http://lwn.net/2001/0621/history.php3 12. http://lwn.net/2001/0621/letters.php3 13. http://lwn.net/2001/0621/bigpage.php3 14. http://lwn.net/2001/0614/security.php3 15. http://securityfocus.com/frames/?content=/templates/archive.pike%3Ftid%3D192006% 26start%3D2001-06-17%26fromthread%3D0%26threads%3D1%26list%3D1%26end%3D2001-06-2 3%26 16. http://www.securityfocus.com/archive/1/191114 17. http://www.securityfocus.com/bid/2871 18. http://lwn.net/2001/0621/a/crypto-gram.php3 19. http://grc.com/dos/grcdos.htm 20. http://noframes.linuxjournal.com/articles/style/0006.html 21. http://lwn.net/2001/0621/a/im-sysklogd.php3 22. http://www.securityfocus.com/bid/2877 23. http://lwn.net/2001/0621/a/im-fetchmail.php3 24. http://lwn.net/2001/0621/a/deb-fetchmail.php3 25. http://lwn.net/2001/0621/a/con-fetchmail.php3 26. http://www.slackware.com/changelog/current.php?cpu=i386 27. http://www.securityfocus.com/bid/2878 28. http://lwn.net/2001/0621/a/deb-rxvt.php3 29. http://www.slackware.com/changelog/current.php?cpu=i386 30. http://lwn.net/2001/0621/a/lm-rxvt.php3 31. http://www.securityfocus.com/archive/1/190136 32. http://www.securityfocus.com/bid/2872 33. http://www.securityfocus.com/archive/1/190933 34. http://www.hinttech.com/mdbms/ 35. http://www.hinttech.com/mdbms/download.html 36. http://www.securityfocus.com/bid/2873 37. http://www.gaztek.org/ghttpd/index.html 38. http://www.securityfocus.com/bid/2879 39. http://www.securityfocus.com/bid/2855 40. http://www.securityfocus.com/bid/2869 41. http://www.securityfocus.com/bid/ 42. http://www.securityfocus.com/bid/2860 43. http://www.securityfocus.com/bid/2861 44. http://www.securityfocus.com/bid/2874 45. http://www.munica.com/webpak/ 46. http://www.securityfocus.com/bid/2885 47. http://www.securityfocus.com/bid/2884 48. http://lwn.net/2001/0614/security.php3#exim 49. http://lwn.net/2001/0621/a/rh-exim.php3 50. http://lwn.net/2001/0621/a/rh-exim-problems.php3 51. http://lwn.net/2001/0614/a/deb-exim.php3 52. http://lwn.net/2001/0614/a/con-exim.php3 53. http://lwn.net/2001/0614/security.php3#xinetdbo 54. http://lwn.net/2001/0621/a/deb-xinetd.php3 55. http://lwn.net/2001/0621/a/con-xinetd.php3 56. http://lwn.net/2001/0607/security.php3#xinetd 57. http://www.securityfocus.com/bid/2826 58. http://lwn.net/2001/0621/a/deb-xinetd.php3 59. http://lwn.net/2001/0621/a/con-xinetd.php3 60. http://lwn.net/2001/0607/a/rh-xinetd.php3 61. http://lwn.net/2001/0614/a/lm-xinetd.php3 62. http://lwn.net/2001/0614/a/im-xinetd.php3 63. http://lwn.net/2001/0607/security.php3#opensshtmplink 64. http://www.securityfocus.com/bid/ 65. http://freshmeat.net/releases/50683/ 66. http://lwn.net/2001/0607/security.php3#ispell 67. http://lwn.net/2001/0621/a/lm-ispell.php3 68. http://lwn.net/2001/0607/a/rh-ispell.php3 69. http://lwn.net/2001/0614/a/db-ispell.php3 70. http://lwn.net/2001/0531/security.php3#webmin 71. http://lwn.net/2001/0621/a/lm-webmin.php3 72. http://lwn.net/2001/0531/a/caldera-webmin.php3 73. http://lwn.net/2001/0607/a/caldera-webmin.php3 74. http://lwn.net/2001/0531/security.php3#gnupgformatstring 75. http://lwn.net/2001/0607/a/gnupggcc.php3 76. http://lwn.net/2001/0621/a/deb-gnupg.php3 77. http://lwn.net/2001/0531/a/esl-gnupg.php3 78. http://lwn.net/2001/0531/a/pr-gnupg.php3 79. http://lwn.net/2001/0607/a/lm-gnupg.php3 80. http://lwn.net/2001/0607/a/im-gnupg.php3 81. http://lwn.net/2001/0607/a/trustix-gnupg.php3 82. http://lwn.net/2001/0607/a/suse-gnupg.php3 83. http://lwn.net/2001/0614/a/conectiva-gnupg.php3 84. http://lwn.net/2001/0614/a/rh-gnupg.php3 85. http://lwn.net/2001/0614/a/tl-gnupg.php3 86. http://lwn.net/2001/0614/a/cald-gnupg.php3 87. http://lwn.net/2001/0614/a/db-gnupg.php3 88. http://www.gnupg.org/whatsnew.html#rn20010429 89. http://lwn.net/2001/0503/security.php3#gnupg1.0.5 90. http://lwn.net/2001/0621/a/deb-gnupg.php3 91. http://lwn.net/2001/0510/a/lm-gnupg.php3 92. http://lwn.net/2001/0503/a/im-gnupg.php3 93. http://lwn.net/2001/0524/a/rh-gnupg.php3 94. http://lwn.net/2001/0524/a/caldera-gnupg.php3 95. http://lwn.net/2001/0322/security.php3#ftpds 96. http://lwn.net/2001/0621/a/lm-proftpd.php3 97. http://lwn.net/2001/0322/a/proftpd-dos.php3 98. http://freshmeat.net/releases/44640/ 99. http://lwn.net/2001/0308/security.php3#apache 100. http://lwn.net/2001/0621/a/trustix-apache.php3 101. http://lwn.net/2001/0621/a/bastille-1.2.php3 102. http://freshmeat.net/releases/50589/ 103. http://www.cryptomail.org/ 104. http://www.first.org/conference/2001/ 105. http://www.pkiforum.org/meetings/20010619/index.html 106. http://www.blackhat.com/ 107. http://www.opengroup.org/austin2001/security_outline.htm 108. http://www.certconf.org/ 109. http://www.cibcwm.com/eq/conference/security/ 110. http://www.usenix.org/events/sec2001 111. http://www.hal2001.org/hal/01Home/index.html 112. http://securityfocus.com/calendar 113. mailto:lwn@lwn.net 114. mailto:lwn@lwn.net 115. http://ads.tucows.com/click.ng/buttonpos=lwnbuttonsecurity 116. http://www.engardelinux.org/ 117. http://www.immunix.org/ 118. http://www.maganation.com/~kaladix/ 119. http://Nexus-Project.net/ 120. http://www.nsa.gov/selinux/ 121. http://www.openwall.com/Owl/ 122. http://www.slinux.org/ 123. http://www.trustix.com/ 124. http://www.bastille-linux.org/ 125. http://lsap.org/ 126. http://lsm.immunix.org/ 127. http://www.openssh.com/ 128. http://www.securityfocus.com/bugtraq/archive/ 129. http://www.nfr.net/firewall-wizards/ 130. http://www.jammed.com/Lists/ISN/ 131. http://www.calderasystems.com/support/security/ 132. http://www.conectiva.com.br/atualizacoes/ 133. http://www.debian.org/security/ 134. http://www.kondara.org/errata/k12-security.html 135. http://www.esware.com/actualizaciones.html 136. http://linuxppc.org/security/advisories/ 137. http://www.linux-mandrake.com/en/fupdates.php3 138. http://www.redhat.com/support/errata/index.html 139. http://www.suse.de/security/index.html 140. http://www.yellowdoglinux.com/resources/errata.shtml 141. http://www.BSDI.COM/services/support/patches/ 142. http://www.freebsd.org/security/security.html 143. http://www.NetBSD.ORG/Security/ 144. http://www.openbsd.org/security.html 145. http://www.calderasystems.com/support/forums/announce.html 146. http://www.cobalt.com/support/resources/usergroups.html 147. http://distro.conectiva.com.br/atualizacoes/ 148. http://www.debian.org/MailingLists/subscribe 149. http://www.esware.com/lista_correo.html 150. http://www.freebsd.org/handbook/eresources.html#ERESOURCES-MAIL 151. http://www.kondara.org/mailinglist.html.en 152. http://l5web.laser5.co.jp/ml/ml.html 153. http://www.linuxfromscratch.org/services/mailinglistinfo.php 154. http://www.linux-mandrake.com/en/flists.php3 155. http://www.netbsd.org/MailingLists/ 156. http://www.openbsd.org/mail.html 157. http://www.redhat.com/mailing-lists/ 158. http://www.slackware.com/lists/ 159. http://www.stampede.org/mailinglists.php3 160. http://www.suse.com/en/support/mailinglists/index.html 161. http://www.trustix.net/support/ 162. http://www.turbolinux.com/mailman/listinfo/tl-security-announce 163. http://lists.yellowdoglinux.com/ydl_updates.shtml 164. http://munitions.vipul.net/ 165. http://www.zedz.net/ 166. http://www.cert.org/nav/alerts.html 167. http://ciac.llnl.gov/ciac/ 168. http://www.MountainWave.com/ 169. http://www.counterpane.com/crypto-gram.html 170. http://linuxlock.org/ 171. http://linuxsecurity.com/ 172. http://www.opensec.net/ 173. http://www.securityfocus.com/ 174. http://www.securityportal.com/ 175. http://lwn.net/2001/0621/kernel.php3 176. http://www.eklektix.com/ 177. http://www.eklektix.com/ --- ifmail v.2.14.os7-aks1 * Origin: Unknown (2:4615/71.10@fidonet) Вернуться к списку тем, сортированных по: возрастание даты уменьшение даты тема автор
Архивное /ru.linux/203089ff5da92.html, оценка из 5, голосов 10
|