distribution carefully, as many of them are significant.
This week, advisories were released for mana, pine, gtkhtml, openssh,
sendmail, MySQL, xfree86, buffer, kernel, and KDE.
The distributors include SCO, Conectiva, Debian, EnGarde, FreeBSD, Gentoo, Immunix, NetBSD, Red Hat, Slackware, SuSE, Trustix, TurboLinux, and Yellow Dog.
FREE Apache SSL Guide from Thawte – Are you worried about your web server security? Click here to get a FREE Thawte Apache SSL Guide and find the answers to all your Apache SSL security needs.
LinuxSecurity Feature Extras:
A Practical Approach of Stealthy Remote Administration – This paper is written for those paranoid administrators who are looking for a stealthy technique of managing sensitive servers (like your enterprise firewall console or IDS).
Expert vs. Expertise: Computer Forensics and the Alternative OS – No longer a dark and mysterious process, computer forensics have been significantly on the scene for more than five years now. Despite this, they have only recently gained the notoriety they deserve.
[ Linux Advisory Watch ] – [ Linux Security Week ] – [ PacketStorm Archive ] – [ Linux Security Documentation ]
Linux Advisory Watch is a comprehensive newsletter that outlines the security vulnerabilities that have been announced throughout the week. It includes pointers to updated packages and descriptions of each vulnerability. [ Subscribe ]
Distribution: | SCO | ||
9/15/2003 | mana | ||
  |   |
local vulnerability
There are multiple local environment variable vulnerabilities in mana. |
|
Distribution: | Conectiva | ||
9/12/2003 | pine | ||
  |   |
Multiple remote vulnerabilities
A buffer overflow and an integer overflow that can be exploited by remote attackers through the sending of specially crafted messages have been fixed. |
|
9/12/2003 | gtkhtml | ||
  |   |
Buffer overflow vulnerability Multiple buffer overflow vulnerabilities existed that could be exploited to at least crash programs linked to gtkhtml by using malformed HTML. In the case of Evolution, a remote attacker can use an HTML mail as an attack vector. |
|
9/16/2003 | openssh | ||
  |   |
buffer management error
This update fixes a potential remote vulnerability in the buffer handling code of OpenSSH. http://www.linuxsecurity.com/advisories/connectiva_advisory-3623.html |
|
9/17/2003 | openssh | ||
  |   |
Remote vulnerabilities
This update fixes new vulnerabilities found in the code that handles buffers in OpenSSH. These vulnerabilities are similiar to the ones fixed in the CLSA-2003:739 announcement and can be exploited by a remote attacker to cause a denial of service condition and potentially execute arbitrary code |
|
9/18/2003 | sendmail | ||
  |   |
buffer overflow vulnerabilities Michal Zalewski reported a remote vulnerability in sendmail versions 8.12.9 and earlier. |
|
9/18/2003 | MySQL | ||
  |   |
Multiple vulnerabilities
World writable configuration files, a double-free vulnerability, and a password handler buffer overflow have been fixed in this update. http://www.linuxsecurity.com/advisories/connectiva_advisory-3658.html |
|
Distribution: | Debian | ||
9/12/2003 | xfree86 | ||
  |   |
Multiple vulnerabilities
Four vulnerabilities have been identified and fixed in XFree86 including potential denial of service vulnerability. |
|
9/15/2003 | mysql | ||
  |   |
buffer overflow vulnerability
MySQL contains a buffer overflow condition which could be exploited by a user who has permission to execute “ALTER TABLE” commands on the tables in the “mysql” database. |
|
9/16/2003 | ssh | ||
  |   |
buffer management error
A bug has been found in OpenSSH’s buffer handling where a buffer could be marked as grown when the actual reallocation failed. |
|
9/17/2003 | openssh | ||
  |   |
multiple vulnerabilities
This advisory is an addition to the earlier DSA-382-1 advisory: two more buffer handling problems have been found in addition to the one described in DSA-382-1 |
|
9/17/2003 | openssh-krb5 buffer handling vulnerability | ||
  |   |
multiple vulnerabilities
Several bugs have been found in OpenSSH’s buffer handling. It is not known if these bugs are exploitable, but as a precaution an upgrade is advised. |
|
9/18/2003 | sendmail | ||
  |   |
buffer overlow vulnerabilities
There are multiple buffer overflow vulnerabilities in the sendmail package. |
|
Distribution: | EnGarde | ||
9/16/2003 | OpenSSH | ||
  |   |
buffer management error
The OpenSSH daemon shipped with all versions of EnGarde Secure Linux contains a potentially exploitable buffer management error. |
|
9/18/2003 | Additional | ||
  |   |
‘OpenSSH’ buffer management bugs
After the release of ESA-20030916-023, the OpenSSH team discovered more buffer management bugs (fixed in OpenSSH 3.7.1) of the same type. Additionally, Solar Designer fixed additional bugs of this class. His fixes are included in this update. |
|
9/18/2003 | ‘MySQL’ buffer overflow | ||
  |   |
‘OpenSSH’ buffer management bugs
The MySQL daemon contains a buffer overflow which may be exploited by any user who has ALTER TABLE permissions on the “mysql” database |
|
Distribution: | FreeBSD | ||
9/16/2003 | buffer | ||
  |   |
management error A bug has been found in OpenSSH’s buffer handling where a buffer could be marked as grown when the actual reallocation failed. |
|
9/17/2003 | sendmail | ||
  |   |
Multiple overflow vulnerabilities
A buffer overflow that may occur during header parsing was identified. An attacker could create a specially crafted message that may cause sendmail to execute arbitrary code with the privileges of the user running sendmail, typically root. http://www.linuxsecurity.com/advisories/freebsd_advisory-3647.html |
|
Distribution: | Gentoo | ||
9/15/2003 | mysql | ||
  |   |
buffer overflow vulnerability
Anyone with global administrative privileges on a MySQL server may execute arbitrary code even on a host he isn’t supposed to have a shell on, with the privileges of the system account running the MySQL server. |
|
9/16/2003 | exim | ||
  |   |
buffer overflow vulnerability
There’s a heap overflow in all versions of exim3 and exim4 prior to version 4.21. It can be exercised by anyone who can make an SMTP connection to the exim daemon. |
|
9/16/2003 | openssh | ||
  |   |
Buffer management error
ll versions of OpenSSH’s sshd prior to 3.7 contain a buffer management error. It is uncertain whether this error is potentially exploitable, however, we prefer to see bugs fixed proactively. |
|
9/17/2003 | sendmail | ||
  |   |
Buffer overflow vulnerabilities Fix a buffer overflow in address parsing. Fix a potential buffer overflow in ruleset parsing. This problem is not exploitable in the default sendmail configuration. |
|
Distribution: | Immunix | ||
9/16/2003 | openssh | ||
  |   |
buffer management error
A bug has been found in OpenSSH’s buffer handling where a buffer could be marked as grown when the actual reallocation failed. |
|
9/17/2003 | openssh | ||
  |   |
buffer management error
This advisory has been updated to reflect that the OpenSSH team has found more instances of the programming idiom in question in their codebase. |
|
9/18/2003 | sendmail | ||
  |   |
buffer overflow vulnerabilities
Michal Zalewski discovered flaws in sendmail’s prescan() function. |
|
Distribution: | NetBSD | ||
9/17/2003 | openssh | ||
  |   |
buffer overflow vulnerability
A buffer overwrite with unknown consequences has been found in OpenSSH. |
|
9/17/2003 | kernel | ||
  |   |
memory disclosure vulnerability
The iBCS2 system call translator for statfs erroneously used the user-supplied length parameter when copying a kernel data structure into userland. |
|
9/17/2003 | sysctl | ||
  |   |
multiple vulnerabilities Three unrelated problems with inappropriate argument handling were found in the kernel sysctl code, which could be exploited by malicious local user. |
|
Distribution: | RedHat | ||
9/16/2003 | openssh | ||
  |   |
buffer management error
A bug has been found in OpenSSH’s buffer handling where a buffer could be marked as grown when the actual reallocation failed. |
|
9/16/2003 | KDE | ||
  |   |
Multiple vulnerabilities
Updated KDE packages that resolve a local security issue with KDM PAM support and weak session cookie generation are now available. |
|
9/17/2003 | OpenSSH | ||
  |   |
Buffer manipulation vulnerabilities Updated packages are now available to fix additional buffer manipulation problems which were fixed in OpenSSH 3.7.1. |
|
9/17/2003 | sendmail | ||
  |   |
Multiple overflow vulnerabilities
Updated Sendmail packages that fix a potentially-exploitable vulnerability are now available. The sucessful exploitation of this bug can lead to heap and stack structure overflows. |
|
Distribution: | Slackware | ||
9/16/2003 | openssh | ||
  |   |
Buffer management error
These fix a buffer management error found in versions of OpenSSH earlier than 3.7. The possibility exists that this error could allow a remote exploit, so we recommend all sites running OpenSSH upgrade to the new OpenSSH package immediately. |
|
9/17/2003 | openssh | ||
  |   |
buffer management errors These packages fix additional buffer management errors that were not corrected in the recent 3.7p1 release. |
|
9/17/2003 | sendmail | ||
  |   |
multiple vulnerabilities
There are multiple vulnerabilities in the sendmail package. http://www.linuxsecurity.com/advisories/slackware_advisory-3640.html |
|
Distribution: | SuSE | ||
9/16/2003 | openssh | ||
  |   |
Buffer management vulnerability
A programming error has been found in code responsible for buffer management. If exploited by a (remote) attacker, the error may lead to unauthorized access to the system, allowing the execution of arbitrary commands. |
|
9/18/2003 | openssh | ||
  |   |
management errors
A programming error has been found in code responsible for buffer management. |
|
Distribution: | Trustix | ||
9/17/2003 | openssh | ||
  |   |
buffer management error
All versions of OpenSSH’s sshd prior to 3.7.1 contain buffer management errors. http://www.linuxsecurity.com/advisories/trustix_advisory-3641.html |
|
9/17/2003 | mysql | ||
  |   |
buffer overflow vulnerability
Fixed buffer overflow in SET PASSWORD which could potentially be exploited by MySQL users with root privileges to execute random code or to gain shell access. |
|
Distribution: | TurboLinux | ||
9/17/2003 | openssh | ||
  |   |
buffer management error
This vulnerability may allow a remote attacker to execute arbitrary code. |
|
9/18/2003 | sendmail | ||
  |   |
buffer overflow vulnerabilities
The potential buffer overflows are in ruleset parsing and address parsing for sendmail. |
|
Distribution: | YellowDog | ||
9/18/2003 | openssh | ||
  |   |
buffer management errors
Updated packages are now available to fix additional buffer manipulation problems which were fixed in OpenSSH 3.7.1. |
|
9/18/2003 | sendmail | ||
  |   |
buffer overflow vulnerabilities
Michal Zalewski found a bug in the prescan() function of unpatched Sendmail versions prior to 8.12.10. |
|
…. |
INTRODUCING: Secure Mail Suite from Guardian DigitalUnparalleled E-Mail Security. Secure Mail Suite is the most Dynamic, Rigorous Protection for Your Email System on the market today. It Clobbers Spam. Detects and Disables Viruses. And its Killer Firewall Keeps Your Data — and Your System and Safe and Secure. All in an Easy-to-Manage Application that’s Simple to Administer and Maintain. Secure Mail Suite is Guardian Digital’s Optimum Solution to Mail Security. It’s based on Open-Source Engineering, so it’s constantly Improving. And with Guardian Digital Engarde Support, Secure Mail Suite Stays On Guard for You — for Many Reliable Years. Secure Mail Suite. Sweet! From the First Name in Open-Source Security. Guardian Digital. |
|
|
Category:
- Security