Thomas –
This week, advisories were released for the Linux kernel, eterm,
xaos, ethereal, atftp, gnocatan, nethack, slashem, cupsys, mod_php, zlib, kon2,
gzip, KDE, hanterm, pptpd, cups, and lv. The distributors include Debian, Gentoo,
Immunix, Mandrake, OpenPKG, RedHat, SuSE, Turbolinux, and Yellow Dog.
Last week, I discussed how HIPAA should be viewed as a step in
the right direction, rather than a burden for U.S. healthcare companies. I received
a lot of positive feedback from readers who are happy that they now have an
adequate budget to address security problems. This week, I wanted to take a
look at BS7799 and ISO17799. BS7799 was first developed by the UK Department
of Trade and Industry’s (DTI) Commercial Computer Security Centre (CCSC) and
prepared by the British Standards Institution with the goal of developing a
set of security management standards that can be used across many industries.
Soon after establishing the BS7799, it was submitted to the International Organization
for Standardization (ISO). After several revisions, BS7799 was accepted and
used as a basis for ISO17799.
the specific purpose of providing an established starting point for organizations
to develop an information security program. Similar to HIPAA, the ‘7799’ standards
intend to help an organization maintain strict data confidentiality, integrity,
and availability. The standards and recommendations are written with upper information
security management as an intended audience. What makes up the standards? Each
standard outlines organizations security issues, asset classification, personnel
security, security policy, physical and operational security, access control,
systems development, business continuity management, and standards compliance.
standards. Although one could argue the case that ‘7799’ is incomplete, it does
accomplish its goals. These standards provide the basic building blocks for
constructing an information security program in your organization.
LinuxSecurity Feature Extras:
Real-Time
Alerting with Snort – Real-time alerting is a feature of an IDS or any
other monitoring application that notifies a person of an event in an acceptably
short amount of time. The amount of time that is acceptable is different for
every person.Intrusion
Detection Systems: An Introduction
Intrusion Detection is the process and methodology of inspecting data for
malicious, inaccurate or anomalous activity. At the most basic levels there
are two forms of Intrusion Detection Systems that you will encounter: Host
and Network based.[ Linux
Advisory Watch ] – [ Linux
Security Week ] – [ PacketStorm
Archive ] – [ Linux Security
Documentation ]
Linux Advisory Watch is a comprehensive newsletter that outlines the security
vulnerabilities that have been announced throughout the week. It includes pointers
to updated packages and descriptions of each vulnerability.
[ Subscribe
]
Distribution: | Debian | ||
6/9/2003 | kernel | ||
Multiple vulnerabilities
A number of vulnerabilities have been discovered in the Linux kernel. |
|||
6/6/2003 | eterm | ||
Buffer overflow vulnerability
A number of vulnerabilities have been discovered in the Linux kernel. |
|||
6/8/2003 | xaos | ||
Improper setuid-root execution
A number of vulnerabilities have been discovered in the Linux kernel. |
|||
6/11/2003 | ‘ethereal’ buffer/integer overflows | ||
Improper setuid-root execution
Timo Sirainen discovered several vulnerabilities in ethereal, a network |
|||
6/11/2003 | ‘atftp’ buffer overflow | ||
Improper setuid-root execution
Rick Patel discovered that atftpd is vulnerable to a buffer overflow when |
|||
6/11/2003 | ‘gnocatan’ buffer overflows, DoS | ||
Improper setuid-root execution
Bas Wijnen discovered that the gnocatan server is vulnerable to several |
|||
6/11/2003 | ‘nethack’ buffer overflow | ||
Improper setuid-root execution
The nethack package is vulnerable to a buffer overflow exploited via a long |
|||
6/12/2003 | buffer overflow in ‘slashem | ||
The slashem package is vulnerable to a buffer overflow exploited via a long ‘-s’ command line option. This vulnerability could be used by an attacker to gain gid ‘games’ on a system where slashem is installed. http://www.linuxsecurity.com/advisories/debian_advisory-3353.html |
|||
6/12/2003 | ‘cupsys’ DoS | ||
overflow in ‘slashem’
The CUPS print server in Debian is vulnerable to a denial of service when |
|||
Distribution: | Gentoo | ||
6/8/2003 | mod_php | ||
Integer overflow vulnerability
Integer overflows have been fixed in several php functions. |
|||
6/8/2003 | atftp | ||
Buffer overflow vulnerability
A buffer overflow has been fixed in atftp. |
|||
Distribution: | Immunix | ||
6/6/2003 | zlib | ||
buffer overflow vulnerability
Richard Kettlewell has discovered a buffer overflow in zlib’s gzprintf() |
|||
6/9/2003 | tetex, psutils, w3c-libwww | ||
buffer overflow vulnerability
Richard Kettlewell has discovered a buffer overflow in zlib’s gzprintf() |
|||
Distribution: | Mandrake | ||
6/6/2003 | kon2 | ||
buffer overflow vulnerability
A buffer overflow in the command line parsing can be exploited, leading |
|||
6/11/2003 | several | ||
‘kernel’ vulnerabilities
Multiple vulnerabilities were discovered and fixed in the Linux kernel. |
|||
Distribution: | OpenPKG | ||
6/11/2003 | ‘gzip’ symlink attack | ||
info leak
The GNU Bash based znew(1) shell script tried to prevent itself from overwriting |
|||
Distribution: | RedHat | ||
6/6/2003 | KDE | ||
ssl man-in-the-middle attack
Updated KDE packages that resolve a vulnerability in KDE’s SSL implementation |
|||
6/6/2003 | hanterm | ||
multiple vulnerabilities
Updated hanterm packages fix two security issues. |
|||
6/6/2003 | kernel | ||
advisory updates
We have retracted two bug fix advisories that affected only the S/390 architecture |
|||
Distribution: | SuSE | ||
6/6/2003 | pptpd | ||
Remote buffer overflow vulnerability
We have retracted two bug fix advisories that affected only the S/390 architecture |
|||
6/6/2003 | cups | ||
Remote DoS vulnerability
We have retracted two bug fix advisories that affected only the S/390 architecture |
|||
Distribution: | Turbolinux | ||
6/6/2003 | lv | ||
Privilege escalation vulnerability
An attackers may be able to gain the privileges of the user invoking lv. |
|||
6/6/2003 | kdelibs | ||
Privilege escalation vulnerability
An attackers may be able to gain the privileges of the user invoking lv. |
|||
Distribution: | Yellow Dog | ||
6/10/2003 | ‘ghostscript’ vulnerability | ||
Privilege escalation vulnerability
A flaw in unpatched versions of Ghostscript before 7.07 allows malicious |
|||
6/10/2003 | ‘hanterm-xf’ vulnerabilities | ||
Privilege escalation vulnerability
An attacker can craft an escape sequence that sets the window title of a |
|||
Category:
- Security