Information Security News mailing list archives

Linux Advisory Watch - December 8th 2000


From: vuln-newsletter-admins () linuxsecurity com
Date: Fri, 8 Dec 2000 01:35:19 -0500

+----------------------------------------------------------------+
|  LinuxSecurity.com                      Linux  Advisory Watch  |
|   December 8th, 2000                     Volume 1, Number 32a  |
+----------------------------------------------------------------+

  Editors:     Dave Wreski                  Benjamin Thomas
               dave () linuxsecurity com       ben () linuxsecurity com

This week, advisories were released for tcsh, openssh, bash,
ghostscript, ncurses, diskcheck and pam.  The vendors include
Caldera, Conectiva, Immunix, and Red Hat.  It is critical that you
update all vulnerable packages to reduce the risk of being
compromised.

Linux Advisory Watch is a comprehensive newsletter that outlines the
security vulnerabilities that have been announced throughout the
week.  It includes pointers to updated packages and descriptions of
each vulnerability.


###  OpenDoc Publishing   ###

Our sponsor this week is OpenDoc Publishing.  Their 480-page
comprehensive security book, Securing and Optimizing Linux, takes a
hands-on approach to installing, optimizing, configuring, and
securing Red Hat Linux. Topics include sendmail 8.10.1, OpenSSL,
ApacheSSL, OpenSSH and much more! Includes Red Hat 6.2 and Red Hat
6.2 PowerTools edition.

http://www.linuxsecurity.com/sponsors/opendocs.html


HTML Version:
http://www.linuxsecurity.com/vuln-newsletter.html


+---------------------------------+
|   Installing a new package:     | ------------------------------//
+---------------------------------+

   # rpm  -Uvh
   # dpkg -i

Packages can be installed easily by using rpm (Red Hat Package
Manager) or dpkg (Debian Package Manager).  Most advisories
issued by vendors are packaged in either an rpm or dpkg.
Additional installation instructions can be found in the body
of the Advisories.

+---------------------------------+
|   Checking Package Integrity:   | -----------------------------//
+---------------------------------+

The md5sum command is used to compute a 128-bit fingerprint that is
strongly dependant upon the contents of the file to which it is
applied.  It can be used to compare against a previously-generated
sum to determine whether the file has changed. It is commonly used
to ensure the integrity of updated packages distributed by a vendor.

  # md5sum
    ebf0d4a0d236453f63a797ea20f0758b

The string of numbers can then be compared against the MD5 checksum
published by the packager.  While it does not take into account the
possibility that the same person that may have modified a package
also may have modified the published checksum, it is especially
useful for establishing a great deal of assurance in the integrity
of a package before installing


+---------------------------------+
|        Caldera Advisories       | ----------------------------//
+---------------------------------+


* Caldera:  'tcsh' vulnerability
December 6th, 2000

When evaluating a so-called "here script", tcsh writes the contents
of that script to a temporary file, which is created insecurely.
Symlink attacks can be used to make tcsh overwrite arbitrary files
owned by the invoking user.

 OpenLinux Desktop 2.3
 ftp://ftp.calderasystems.com/pub/updates/OpenLinux/2.3/current/RPMS/
 Packages:  tcsh-6.10.00-2.i386.rpm, tcsh-doc-html-6.10.00-2.i386.rpm

 MD5 Checksum:
 9b89b9670997f3352f2e4c8a436db7ff     tcsh-6.10.00-2.i386.rpm
 b917e204011a7df41b0bcdfb3d3669eb   tcsh-doc-html-6.10.00-2.i386.rpm

 Vendor Advisory:
 http://www.linuxsecurity.com/advisories/caldera_advisory-958.html



+---------------------------------+
|       Conectiva Advisories      | ----------------------------//
+---------------------------------+


* Conectiva:  'openssh' update
December 6th, 2000

In versions prior to 2.3.0, if the openssh client receives a request
for ssh-agent or X11 forwarding, it does not check if this feature
has been negotiated during session setup and grants access. This
could allow remote access to the client's display and ssh-agent
service.

 ftp://atualizacoes.conectiva.com.br/6.0/RPMS/
 openssh-2.3.0p1-1cl.i386.rpm

 ftp://atualizacoes.conectiva.com.br/6.0/RPMS/
 openssh-askpass-2.3.0p1-1cl.i386.rpm

 ftp://atualizacoes.conectiva.com.br/6.0/RPMS/
 openssh-askpass-gnome-2.3.0p1-1cl.i386.rpm

 ftp://atualizacoes.conectiva.com.br/6.0/RPMS/
 openssh-clients-2.3.0p1-1cl.i386.rpm

 ftp://atualizacoes.conectiva.com.br/6.0/RPMS/
 openssh-server-2.3.0p1-1cl.i386.rpm

 Vendor Advisory:
 http://www.linuxsecurity.com/advisories/other_advisory-959.html



* Conectiva:  'bash' vulnerability
December 5th, 2000

Bash is the default shell used in a standard Conectiva Linux
installation. There is a vulnerability regarding the use of "<<"
redirectors. If used, the shell creates a temporary file in /tmp with
a predictable filename (the only variant is the PID). Additionally,
it was not being opened exclusively. This can be used by an attacker
to overwrite arbitrary files in the system. At least one
initialization script (rc.sysinit) uses "<<", and it is run as root
at boot time

 ftp://atualizacoes.conectiva.com.br/6.0/RPMS/
 bash1-1.14.7-31cl.i386.rpm

 Vendor Advisory:
 http://www.linuxsecurity.com/advisories/other_advisory-956.html




+---------------------------------+
|       Immunix Advisories        | ----------------------------//
+---------------------------------+


* Immunix:  'ghostscript' vulnerability
December 5th, 2000

The ghostscript program creates easily guessable temp files which can
lots of potential problems. It also uses improper LD_RUN_PATH values
which can cause it to search for libraries in the current directory.

 Package Name:  ghostscript-5.50-8_StackGuard.i386.rpm
 http://www.immunix.org/ImmunixOS/7.0-beta/updates/RPMS/
 MD5 Checksum:  863ae311e2ac05717a9a84b26faf2c37

 Vendor Advisory:
 http://www.immunix.org/ImmunixOS/7.0-beta/updates/RPMS/



* Immunix:  'ncurses' vulnerability
December 1st, 2000

A exploit was recently found by Jouko Pynn?nen in the ncurses package
that affected any setuid or setguid programs that use the ncurses
library.

 Package Name:  ncurses-5.2-2_StackGuard.i386.rpm
 http://www.immunix.org/ImmunixOS/7.0-beta/updates/RPMS/
 MD5 Checksum:  fefb2a040003b8e5964996451855ec10

 Vendor Advisory:
 http://www.linuxsecurity.com/advisories/other_advisory-951.html





+---------------------------------+
|       Red Hat Advisories        | ----------------------------//
+---------------------------------+


* Redhat:  'diskcheck' race condition
December 5th, 2000

A race vulnerability exists where a user can replace the tempfile
used by diskcheck with symlinks to other files on the system, making
it possible to corrupt those files.

 Red Hat Powertools 6.0, 6.1, and 6.2: noarch:
  ftp://updates.redhat.com/powertools/6.2/noarch/
 diskcheck-3.1.1-10.6x.noarch.rpm

 MD5 Checksum: ab3afbea96341fce252c72e304039362

 Vendory Advisory:
 http://www.linuxsecurity.com/advisories/redhat_advisory-955.html




* Redhat:  'tcsh' symlink vulnerability
December 1st, 2000

Versions 6.09 and below of tcsh are vulnerable to a symbolic link
attack. This attack can be used to cause users to destroy the
contents of any file to which they have write access.

 Red Hat Linux 7.0:
 alpha:
 ftp://updates.redhat.com/7.0/alpha/tcsh-6.10-1.alpha.rpm
 MD5 Checksum: c4ce83f418496f40e3e802da03db3e6f

 i386:
 ftp://updates.redhat.com/7.0/i386/tcsh-6.10-1.i386.rpm
 MD5 Checksum: 1fee54c9b1fc394c03a8d960937a9747

 Vendor Advisory:
 http://www.linuxsecurity.com/advisories/redhat_advisory-953.html



* Redhat:  'pam' update
December 1st, 2000

Red Hat Linux 7 and a previous PAM errata issued for Red Hat Linux
6.x both included a new module, pam_localuser. Although this module
is not used in any default configurations, the version included was
vulnerable to a buffer overflow. These updates remove this
vulnerability and fix various otherbugs.

 Red Hat Linux 7.0
 alpha:
 ftp://updates.redhat.com/7.0/alpha/pam-0.72-37.alpha.rpm
 MD5 Checksum: 35b9f1e8b06a18f091fd7d9f4e61caa9

 i386:
 ftp://updates.redhat.com/7.0/i386/pam-0.72-37.i386.rpm
 MD5 Checksum: 9357b4322e4b08e140e7a5a1558fef48

 Vendor Advisory:
 http://www.linuxsecurity.com/advisories/redhat_advisory-952.html


------------------------------------------------------------------------
Distributed by: Guardian Digital, Inc.                LinuxSecurity.com

     To unsubscribe email vuln-newsletter-request () linuxsecurity com
         with "unsubscribe" in the subject of the message.
------------------------------------------------------------------------

ISN is hosted by SecurityFocus.com
---
To unsubscribe email LISTSERV () SecurityFocus com with a message body of
"SIGNOFF ISN".


Current thread: