Linux Security News
SecurityFocus Linux Newsletter #432 Mar 26 2009 05:10PM
sfa securityfocus com
SecurityFocus Linux Newsletter #432
----------------------------------------

This issue is sponsored by Entrust

Securing What's at Risk: A Common Sense Approach to Protecting Users Online

This white paper outlines issues with managing online identities across a diverse customer base when faced with increasing threats. It proposes a common sense approach that matches security to the assessed risk for users, actions and applications.

http://dinclinx.com/Redirect.aspx?36;3123;45;189;0;7;259;4e7f07a589d9493
8

SECURITY BLOGS
SecurityFocus has selected a few syndicated sources that stand out as conveying topics of interest for our community. We are proud to offer content from Matasano at this time and will be adding more in the coming weeks.
http://www.securityfocus.com/blogs

------------------------------------------------------------------
I. FRONT AND CENTER
1. Time to Shield Researchers
2. Contracting For Secure Code
II. LINUX VULNERABILITY SUMMARY
1. Autonomy KeyView Module 'wp6sr.dll' Buffer Overflow Vulnerability
2. WeeChat IRC Message Remote Denial Of Service Vulnerability
3. Ghostscript Multiple Input Validation and Integer Overflow Vulnerabilities
4. Little CMS Memory Leak and Multiple Memory Corruption Vulnerabilities
5. SW-HTTPD Incomplete HTTP Request Remote Denial of Service Vulnerability
6. Sun Java System Identity Manager Multiple Vulnerabilities
7. Linux Kernel nfsd 'CAP_MKNOD' Unauthorized Access Vulnerability
8. WebCit Mini_Calendar Component Format String Vulnerability
9. PADL nss_ldap '/etc/nss_ldapd.conf' Local Information Disclosure Vulnerability
10. Linux Kernel 'ecryptfs_write_metadata_to_contents()' Information Disclosure Vulnerability
11. Sun Java Runtime Environment and Java Development Kit Multiple Security Vulnerabilities
12. OpenSSL Multiple Vulnerabilities
13. SystemTap Local Privilege Escalation Vulnerability
III. LINUX FOCUS LIST SUMMARY
IV. UNSUBSCRIBE INSTRUCTIONS
V. SPONSOR INFORMATION

I. FRONT AND CENTER
---------------------
1. Time to Shield Researchers
By Oliver Day
Research is the backbone of the security industry but the legal climate has become so adverse that researchers have had to worry about injunctions, FBI visits, and even arrest.
http://www.securityfocus.com/columnists/495

2. Contracting For Secure Code
By Chris Wysopal
Forcing suppliers to attest to the security of provided software is gaining adherents: Just ask Kaspersky Lab.
http://www.securityfocus.com/columnists/494

II. LINUX VULNERABILITY SUMMARY
------------------------------------
1. Autonomy KeyView Module 'wp6sr.dll' Buffer Overflow Vulnerability
BugTraq ID: 34086
Remote: Yes
Date Published: 2009-03-17
Relevant URL: http://www.securityfocus.com/bid/34086
Summary:
Autonomy KeyView module is prone to a buffer-overflow vulnerability because it fails to perform adequate boundary checks on user-supplied data before copying it to insufficiently sized buffers.

Exploiting this issue will allow an attacker to corrupt memory and to cause denial-of-service conditions or potentially to execute arbitrary code in the context of the application using the module.

Multiple products using the KeyView module are affected.

2. WeeChat IRC Message Remote Denial Of Service Vulnerability
BugTraq ID: 34148
Remote: Yes
Date Published: 2009-03-17
Relevant URL: http://www.securityfocus.com/bid/34148
Summary:
WeeChat is prone to a remote denial-of-service vulnerability.

An attacker may exploit this issue crash the application, resulting in a denial-of-service condition.

Versions prior to WeeChat 0.2.6.1 are vulnerable.

3. Ghostscript Multiple Input Validation and Integer Overflow Vulnerabilities
BugTraq ID: 34184
Remote: Yes
Date Published: 2009-03-19
Relevant URL: http://www.securityfocus.com/bid/34184
Summary:
Ghostscript is prone to multiple integer-overflow and input-validation vulnerabilities.

Successful exploits may allow remote attackers to execute arbitrary code in the context of the user running the affected application. Failed attacks will cause denial-of-service conditions.

4. Little CMS Memory Leak and Multiple Memory Corruption Vulnerabilities
BugTraq ID: 34185
Remote: Yes
Date Published: 2009-03-19
Relevant URL: http://www.securityfocus.com/bid/34185
Summary:
Little CMS is prone to a denial-of-service vulnerability and multiple memory-corruption vulnerabilities because it fails to perform adequate checks on user-supplied input.

Attackers may leverage these issues to execute arbitrary code in the context of the application or launch denial-of-service attacks.

Versions prior to Little CMS 1.18beta2 are vulnerable.

NOTE: Other applications that use Little CMS (such as Mozilla Firefox, OpenJDK, and GIMP) are vulnerable to these issues as well.

5. SW-HTTPD Incomplete HTTP Request Remote Denial of Service Vulnerability
BugTraq ID: 34188
Remote: Yes
Date Published: 2009-03-19
Relevant URL: http://www.securityfocus.com/bid/34188
Summary:
SW-HTTPD is prone to a denial-of-service vulnerability because the application fails to handle malformed HTTP requests.

An attacker can exploit this issue to prevent the server from handling new requests, denying service to legitimate users.

SW-HTTP 0.1 is vulnerable; other versions may also be affected.

6. Sun Java System Identity Manager Multiple Vulnerabilities
BugTraq ID: 34191
Remote: Yes
Date Published: 2009-03-20
Relevant URL: http://www.securityfocus.com/bid/34191
Summary:
Sun Java System Identity Manager is prone to multiple vulnerabilities, including information-disclosure issues, cross-site scripting issues, privilege-escalation issues, and a remote code-execution vulnerability.

Successful exploits may allow an attacker to obtain sensitive information, execute arbitrary script code in the browser of an unsuspecting user in the context of a site, perform unauthorized actions, or gain unauthorized access to the affected application. This may aid in the complete compromise of the computer. Other attacks are also possible.

These issues affect the following versions:

Sun Java System Identity Manager 7.0
Sun Java System Identity Manager 7.1
Sun Java System Identity Manager 7.1.1
Sun Java System Identity Manager 8.0

7. Linux Kernel nfsd 'CAP_MKNOD' Unauthorized Access Vulnerability
BugTraq ID: 34205
Remote: Yes
Date Published: 2009-03-23
Relevant URL: http://www.securityfocus.com/bid/34205
Summary:
The Linux Kernel is prone to an unauthorized-access vulnerability that can occur when users with certain capabilities connect to the 'nfsd' service.

An attacker with authenticated access to the affected application can exploit this issue to perform privileged operations on a vulnerable computer; this may aid in further attacks.

8. WebCit Mini_Calendar Component Format String Vulnerability
BugTraq ID: 34206
Remote: Yes
Date Published: 2009-03-23
Relevant URL: http://www.securityfocus.com/bid/34206
Summary:
WebCit is prone to a remote format-string vulnerability because it fails to sufficiently sanitize user-supplied input before using it in a formatted-printing function.

An attacker can exploit this issue by enticing an unsuspecting victim to open a malicious file.

Successfully exploiting this issue will allow the attacker to execute arbitrary code in the context of the affected application. Failed exploit attempts will likely crash the application.

9. PADL nss_ldap '/etc/nss_ldapd.conf' Local Information Disclosure Vulnerability
BugTraq ID: 34211
Remote: No
Date Published: 2009-03-23
Relevant URL: http://www.securityfocus.com/bid/34211
Summary:
PADL's 'nss_ldap' library is prone to an information-disclosure vulnerability because it stores authentication credentials in an insecure manner.

An unprivileged local attacker may exploit this issue to obtain sensitive information that can aid in further attacks.

10. Linux Kernel 'ecryptfs_write_metadata_to_contents()' Information Disclosure Vulnerability
BugTraq ID: 34216
Remote: No
Date Published: 2009-03-23
Relevant URL: http://www.securityfocus.com/bid/34216
Summary:
The Linux Kernel is prone to an information-disclosure vulnerability because it fails to properly initialize certain memory before using using it in a user-accessible operation.

Successful exploits will allow attackers to view portions of kernel memory. Information harvested may be used in further attacks.

The Linux Kernel 2.6.28 through 2.6.28.8 are vulnerable.

11. Sun Java Runtime Environment and Java Development Kit Multiple Security Vulnerabilities
BugTraq ID: 34240
Remote: Yes
Date Published: 2009-03-25
Relevant URL: http://www.securityfocus.com/bid/34240
Summary:
Sun Java Runtime Environment and Java Development Kit are prone to multiple security vulnerabilities.

Successful exploits may allow attackers to violate the same-origin policy, obtain sensitive information, bypass security restrictions, run untrusted applets with elevated privileges, and cause denial-of-service conditions. This may result in a compromise of affected computers.

These issues affect versions *prior to* the following:

JDK and JRE 6 Update 13
JDK and JRE 5.0 Update 18
SDK and JRE 1.4.2_20
SDK and JRE 1.3.1_25

12. OpenSSL Multiple Vulnerabilities
BugTraq ID: 34256
Remote: Yes
Date Published: 2009-03-25
Relevant URL: http://www.securityfocus.com/bid/34256
Summary:
OpenSSL is prone to multiple vulnerabilities that may allow attackers to trigger denial-of-service conditions or bypass certain security checks.

Versions prior to OpenSSL 0.9.8k are vulnerable.

13. SystemTap Local Privilege Escalation Vulnerability
BugTraq ID: 34260
Remote: No
Date Published: 2009-03-25
Relevant URL: http://www.securityfocus.com/bid/34260
Summary:
SystemTap is prone to a local privilege-escalation vulnerability because of a race condition error.

An attacker can exploit this vulnerability to run arbitrary code with elevated privileges.

This issue affects SystemTap 0.0.20080705 and 0.0.20090314.

III. LINUX FOCUS LIST SUMMARY
---------------------------------
IV. UNSUBSCRIBE INSTRUCTIONS
-----------------------------
To unsubscribe send an e-mail message to linux-secnews-unsubscribe (at) securityfocus (dot) com [email concealed] from the subscribed address. The contents of the subject or message body do not matter. You will receive a confirmation request message to which you will have to answer. Alternatively you can also visit http://www.securityfocus.com/newsletters and unsubscribe via the website.

If your email address has changed email listadmin (at) securityfocus (dot) com [email concealed] and ask to be manually removed.

V. SPONSOR INFORMATION
------------------------
This issue is sponsored by Entrust

Securing What's at Risk: A Common Sense Approach to Protecting Users Online

This white paper outlines issues with managing online identities across a diverse customer base when faced with increasing threats. It proposes a common sense approach that matches security to the assessed risk for users, actions and applications.

http://dinclinx.com/Redirect.aspx?36;3123;45;189;0;7;259;4e7f07a589d9493
8

[ reply ]


 

Privacy Statement
Copyright 2010, SecurityFocus