Home Blog Page 8854

Multi-format DVD writer arrives

Author: JT Smith

From The Register: “Hitachi-LG Data Storage (HLDS) has developed a multiple format drive that is able to write in both DVD-RAM and DVD-RW formats, as well as DVD-R and CD-RW. HLDS has not yet announced pricing on the product (the GMA-4120B), although it claims the drive will be cheaper than existing DVD writing products. HP currently sells its DVD+RW/CD-RW combo drive for $599.”

Category:

  • Unix

SuSE webalizer update

Author: JT Smith

“An exploitable bug was found in webalizer which allows a remote attacker
to execute commands on other client machines or revealing sensitive
information by placing HTML tags in the right place. This is possible
due to missing sanity checks on untrusted data – hostnames and search
keywords in this case – that are received by webalizer. This kind of attack
is also known as “Cross-Site Scripting Vulnerability.””

-----BEGIN PGP SIGNED MESSAGE-----

______________________________________________________________________________

                        SuSE Security Announcement

        Package:                webalizer
        Announcement-ID:        SuSE-SA:2001:040
        Date:                   Tuesday, Nov 06th, 2001 12.00 MET
        Affected SuSE versions: 7.1, 7.2, 7.3
        Vulnerability Type:     remote privilege escalation
                                (cross-site scripting)
        Severity (1-10):        5
        SuSE default package:   no
        Other affected systems: all linux-like systems using this version
                                of webalizer

        Content of this advisory:
        1) security vulnerability resolved: webalizer
           problem description, discussion, solution and upgrade information
        2) pending vulnerabilities, solutions, workarounds
        3) standard appendix (further information)

______________________________________________________________________________

1)  problem description, brief discussion, solution, upgrade information

    The webalizer is a widely used tool for analyzing web server logs and
    produce statistics in HTML format.
    An exploitable bug was found in webalizer which allows a remote attacker
    to execute commands on other client machines or revealing sensitive
    information by placing HTML tags in the right place. This is possible
    due to missing sanity checks on untrusted data - hostnames and search
    keywords in this case - that are received by webalizer. This kind of attack
    is also known as "Cross-Site Scripting Vulnerability".
    Additionally the untrusted data will be written to files on the server
    running webalizer; this may lead to further problems when using this
    data as input for third-party software/scripts.

    There is no known temporary fix, so please update your system with
    the new RPMs from our FTP server.

    Download the update package from locations described below and install
    the package with the command:
        rpm -Uhv file.rpm
    The md5sum for each file is in the line below. You can verify the
    integrity of the rpm files using the command:
        rpm --checksig --nogpg file.rpm
    independently from the md5 signatures below.




    i386 Intel Platform:

    SuSE-7.3
    ftp://ftp.suse.com/pub/suse/i386/update/7.3/n2/webalizer-2.01.06-140.i386.rpm
      3525fd6ab9c27be34edad9bef05ff061
    source rpm:
    ftp://ftp.suse.com/pub/suse/i386/update/7.3/zq1/webalizer-2.01.06-140.src.rpm
      898d975f34991a02f02da603b6bcd529

    SuSE-7.2
    ftp://ftp.suse.com/pub/suse/i386/update/7.2/n2/webalizer-2.01.06-139.i386.rpm
      593a7f033158f57bac47cf2fa9cb83bc
    source rpm:
    ftp://ftp.suse.com/pub/suse/i386/update/7.2/zq1/webalizer-2.01.06-139.src.rpm
      70ceb86a0373070a06f6d39ec0bc4377

    SuSE-7.1
    ftp://ftp.suse.com/pub/suse/i386/update/7.1/n2/webalizer-2.01.06-139.i386.rpm
      74288622703dec120b18c0fbb5003917
    source rpm:
    ftp://ftp.suse.com/pub/suse/i386/update/7.1/zq1/webalizer-2.01.06-139.src.rpm
      213f7a394052dc193be05a882768054a



    Sparc Platform:

    SuSE-7.1
    ftp://ftp.suse.com/pub/suse/sparc/update/7.1/n2/webalizer-2.01.06-54.sparc.rpm
      5aa3b7511d704415498fbec3bfc2ccd5
    source rpm:
    ftp://ftp.suse.com/pub/suse/sparc/update/7.1/zq1/webalizer-2.01.06-54.src.rpm
      792efab485712286fc848234b1aa249d



    AXP Alpha Platform:

    SuSE-7.1
    ftp://ftp.suse.com/pub/suse/axp/update/7.1/n2/webalizer-2.01.06-49.alpha.rpm
      aa93070e8358b1cfd91b7fabffbfa985
    source rpm:
    ftp://ftp.suse.com/pub/suse/axp/update/7.1/zq1/webalizer-2.01.06-49.src.rpm
      2065dd78c3f8147a94f97994fb37e6ce



    PPC Power PC Platform:


    SuSE-7.3
    ftp://ftp.suse.com/pub/suse/ppc/update/7.3/n2/webalizer-2.01.06-72.ppc.rpm
      cc28460b1d6fac8f87cc4658fae45d3e
    source rpm:
    ftp://ftp.suse.com/pub/suse/ppc/update/7.3/zq1/webalizer-2.01.06-72.src.rpm
      7d7cec18f488f97187338723b0151426

    SuSE-7.1
    ftp://ftp.suse.com/pub/suse/ppc/update/7.1/n2/webalizer-2.01.06-70.ppc.rpm
      3630f538b0445ee462b73475b488b146
    source rpm:
    ftp://ftp.suse.com/pub/suse/ppc/update/7.1/zq1/webalizer-2.01.06-70.src.rpm
      4c998066d5eb545bb1551e246f2724c1


______________________________________________________________________________

2)  Pending vulnerabilities in SuSE Distributions and Workarounds:

    - openssh
      After stabilizing the openssh package, updates for the distributions
      6.4-7.2 are currently being prepared. The update packages fix a security
      problem related to the recently discovered problems with source ip
      based access restrictions in a user's ~/.ssh/authorized_keys2 file.
      The packages will appear shortly on our ftp servers. Please note that
      packages for the distributions 6.3 and up including 7.0 containing
      cryptographic software are located on the German ftp server ftp.suse.de,
      all other packages can be found on ftp.suse.com at the usual location.
      We will issue a dedicated Security announcement for the openssh package.

    - nvi
      Takeshi Uno found a format tag vulnerability in all versions of nvi.
      The bug will be fixed in future version of SuSE Linux.

    - Please watch out for more announcements that are currently in our queue.

______________________________________________________________________________

3)  standard appendix:

    SuSE runs two security mailing lists to which any interested party may
    subscribe:

    suse-security@suse.com
        -   general/linux/SuSE security discussion.
            All SuSE security announcements are sent to this list.
            To subscribe, send an email to
                <suse-security-subscribe@suse.com>.

    suse-security-announce@suse.com
        -   SuSE's announce-only mailing list.
            Only SuSE's security annoucements are sent to this list.
            To subscribe, send an email to
                <suse-security-announce-subscribe@suse.com>.

    For general information or the frequently asked questions (faq)
    send mail to:
        <suse-security-info@suse.com> or
        <suse-security-faq@suse.com> respectively.

    ===============================================
    SuSE's security contact is <security@suse.com>.
    ===============================================

______________________________________________________________________________

    The information in this advisory may be distributed or reproduced,
    provided that the advisory is not modified in any way.
    SuSE GmbH makes no warranties of any kind whatsoever with respect
    to the information contained in this security advisory.


-----BEGIN PGP SIGNATURE-----
Version: 2.6.3i
Charset: noconv

iQEVAwUBO+e7oney5gA9JdPZAQEOhgf/YYGOy0R1hVScGRcrMR1jNNNzKSe/xtqS
SC5SO8qFKnSIT5aFhDbc1BMdmPIGiJp8c0CS9M9mPyRop6LT55uPPdtRoLMgZkp0
TQVWVldz1F8Ou6fIjDXcv5blHR94ZRLi2is6Tzn+x1GC5srMJA6FDNMmwVWWdtjp
nJGulyqBrTdNMb6GkFKdCstc55WCa4/GExKbb0bMaJz3JR8EFD6PlBltYbf8Zk3g
PUeBMEkP7BeuzNci9I5SfD76/zbC3tta7i6h6SsjPFS8TE0GOojWWrBcc2yHOCZQ
i7PiWXqvSD/GnfCRIn/BuUlqEw4sTf412l4Ls7V+ubWniK6tZRrjcA==
=n24I
-----END PGP SIGNATURE-----

Bye,
     Thomas
-- 
  Thomas Biege, SuSE GmbH, Schanzaeckerstr. 10, 90443 Nuernberg
  E@mail: thomas@suse.de      Function: Security Support & Auditing
  "lynx -source http://www.suse.de/~thomas/contact/thomas.asc | pgp -fka"
  Key fingerprint = 51 AD B9 C7 34 FC F2 54  01 4A 1C D4 66 64 09 83
-- 
	Trete durch die Form ein, und trete aus der Form heraus.


-- 
To unsubscribe, e-mail: suse-security-announce-unsubscribe@suse.com
For additional commands, e-mail: suse-security-announce-help@suse.com

Category:

  • Linux

WLAN’s hit 22Mbps

Author: JT Smith

a href=”http://www.theregister.co.uk/content/5/22689.html”>Reported at The Register: “Buffalo Technology has announced its a range of 802.11b-based WLAN (Wireless LAN) products which allow a theoretical transfer rate of up to 22Mbps.

This is twice the transfer rate of regular 11Mbps 802.11b products.

The range is the first to ship based on Texas Instruments’ (TI) ACX100 chipset.”

EnGarde: Syncookie vulnerability

Author: JT Smith

“There are is a vulnerability in the kernel’s syncookie code which can
allow a remote attacker to potentially guess the cookie and bypass
firewall rules.”

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1


+------------------------------------------------------------------------+
| EnGarde Secure Linux Security Advisory               November 06, 2001 |
| http://www.engardelinux.org/                           ESA-20011106-01 |
|                                                                        |
| Package:  kernel                                                       |
| Summary:  Syncookie vulnerability                                      |
+------------------------------------------------------------------------+

  EnGarde Secure Linux is a secure distribution of Linux that features
  improved access control, host and network intrusion detection, Web
  based secure remote management, complete e-commerce using AllCommerce,
  and integrated open source security tools.


OVERVIEW
- --------
  There are is a vulnerability in the kernel's syncookie code which can
  allow a remote attacker to potentially guess the cookie and bypass
  firewall rules.


DETAIL
- ------
  Some firewall systems implement rules based on the TCP flags set.
  They may drop or reject incoming packets that have the SYN bit set,
  which normally indicates the start of a new connection.  It is
  possible for an attacker to flood the server with SYN packets, causing
  a DoS attack.  To protect against this DoS the kernel implements
  something called "syncookies".

  In the syncookie model, the server sends a cryptographically secure
  "cookie" back to the client with the "SYN ACK" packet.  To finish the
  handshake, the client sends a final ACK, with the cookie, back to the
  server.  This cookie is comprised of various bits including the
  source/destination address and port.

  The problem lies in the fact that:

    a) Many firewalls implement rules based upon the SYN flag.
    b) With syncookies enabled, the client need only send an ACK with a
         valid cookie.
    c) All the cookies come from the same source.

  While the cookies themselves are secure, they can be brute forced in a
  few hours on a fast connection.  To fix this problem the syncookies are
  now tied into a particular port.

  Syncookies are enabled by default on EnGarde.


SOLUTION
- --------
  All users should upgrade to the most recent version, as outlined in
  this advisory.

  Please note that kernel upgrades are not available through Guardian
  Digital Secure Update.  Please follow the steps outlined below to
  upgrade your system manually.  Updates can be obtained from:

    ftp://ftp.engardelinux.org/pub/engarde/stable/updates/http://ftp.engardelinux.org/pub/engarde/stable/updates/

  Please read and understand this entire section before you attempt to
  upgrade the kernel.

  Initial Steps
  -------------
    1) Verify the machine is either:

       a) booted into a "standard" kernel; or
       b) LIDS is disabled (/sbin/lidsadm -S -- -LIDS_GLOBAL)

    2) Determine which kernels you currently have installed:

         # rpm -qa --qf "%{NAME}n" | grep kernel

    3) Download the new kernels that match what you have installed
       (based on step 2) from the "UPDATED PACKAGES" section of this
       advisory.


  Installation Steps
  ------------------
    4) Install the new packages.  The packages will automagically
       update /etc/lilo.conf by commenting out any old EnGarde images
       and replacing them with the new ones:

         # rpm --replacefiles -i <kernel 1> <kernel 2> ...

    5) Re-run LILO.  If you see any errors then open /etc/lilo.conf in
       your favorite text editor and make the appropriate changes:

         #  /sbin/lilo

  
  Final Steps
  -----------
    6) If you did not see any LILO errors then your new kernel is now
       installed and your machine is ready to be rebooted:

         # reboot


UPDATED PACKAGES
- ----------------
  These updated packages are for EnGarde Secure Linux 1.0.1 (Finestra).

  Source Packages:

    SRPMS/kernel-2.2.19-1.0.21.src.rpm
      MD5 Sum:  08257690f8af73feab70e8720611100c

  Binary Packages:

    i386/kernel-2.2.19-1.0.21.i386.rpm
      MD5 Sum:  39618bc729d2b92a354f426ae794dbbd

    i386/kernel-lids-mods-2.2.19-1.0.21.i386.rpm
      MD5 Sum:  9135e610cd5ebd9e16e823a4b8d76995

    i386/kernel-smp-lids-mods-2.2.19-1.0.21.i386.rpm
      MD5 Sum:  02a90cd041e405fa008fbb5f29e59ffb

    i386/kernel-smp-mods-2.2.19-1.0.21.i386.rpm
      MD5 Sum:  de5734faa2fa08b6b30954524ba5197b


    i686/kernel-2.2.19-1.0.21.i686.rpm
      MD5 Sum:  a52ba054ae0ee1c298963c2f511fce97

    i686/kernel-lids-mods-2.2.19-1.0.21.i686.rpm
      MD5 Sum:  01d004993e324cabf4305816f9a85d0e

    i686/kernel-smp-lids-mods-2.2.19-1.0.21.i686.rpm
      MD5 Sum:  f2d980723f90988b0c4fe0cfa2189dfe

    i686/kernel-smp-mods-2.2.19-1.0.21.i686.rpm
      MD5 Sum:  9b21a28a31b4f7cba4f30db9d68e53d8


REFERENCES
- ----------

  Guardian Digital's public key:
    http://ftp.engardelinux.org/pub/engarde/ENGARDE-GPG-KEY

  Credit for the discovery/fixing of this bug goes to:
    Manfred Spraul
    Andi Kleen <ak@suse.de>

  Official Web Site of the Linux Kernel:
    http://www.kernel.org/

  Security Contact:    security@guardiandigital.com
  EnGarde Advisories:  http://www.engardelinux.org/advisories.html

- --------------------------------------------------------------------------
$Id: ESA-20011106-01-kernel,v 1.1 2001/11/06 05:58:24 rwm Exp $
- --------------------------------------------------------------------------
Author: Ryan W. Maple, <ryan@guardiandigital.com> 
Copyright 2001, Guardian Digital, Inc.

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.4 (GNU/Linux)
Comment: For info see http://www.gnupg.org

iD8DBQE7531+HD5cqd57fu0RAkQoAJ9CilSgHhx8mm/+Tz3rv2ZXpxTCygCePVF/
tTcRXcfrB+u/FmNIxctui54=
=l5kN
-----END PGP SIGNATURE-----

------------------------------------------------------------------------
     To unsubscribe email engarde-security-request@engardelinux.org
         with "unsubscribe" in the subject of the message.

Copyright(c) 2001 Guardian Digital, Inc.                EnGardeLinux.org
------------------------------------------------------------------------

Category:

  • Linux

Alan Cox goes for a seat on the GNOME board, sort of

Author: JT Smith

by Tina Gasperson
November 8 is the deadline for announcing a candidacy for the GNOME foundation board of directors. The roll is filling up quickly, and even kernel hacker Alan Cox posted his intentions — of “remaining a nuisance,” that is.Cox said he was throwing his hat in the ring “to encourage other people to ensure I don’t get voted in.” He wrote that if voted in, he would continue to be a nuisance. “So don’t vote for me, stand as a candidate.” He also wanted to know “how come the gnome desktop isn’t fitting nicely into 64Mb when over 50%
of PC’s in the USA today have 64Mb?”

The election atmosphere is casual and self-deprecating. “I would like to publicly denounce … I mean announce…my candidacy to the GNOME Foundation Board,” wrote Glynn Foster, who also boasts of having an @goatsex.org email address.

Rhett Creighton, who could boast about his @mit.edu address but doesn’t, registered his candidacy with these comments: “I haven’t done doodly squat for GNOME. There is absolutely no reason to
vote for me. I ran last year and got the least number of votes (3,
including my own).

“I believe that free software is overrated. If elected, I will try to
adopt a for-profit software model to the GNOME foundation. Actually,
GNOME will stop making software altogether. Instead, it will make bowling
balls.”

Wrote the venerable George Lebl: “The GNOME world has been subjected to my crack since sometime
in ’97. At one point I have even been paid for my madness by
Eazel. By the time they realized their mistake of hiring me
it was too late.” He said if elected, he’ll press for world peace and a cure for cancer.

Maciej Stachowiak is not running for re-election, but was kind enough to proffer a voting list for others. “I would like to mention a few
of the current board members that I feel most deserve to be
re-elected, and a few non-members that I think deserve a seat. I don’t
know if the people I mention will choose to run, but I hope they do.”

Current board member Havoc Pennington was the only person who sounded really serious about getting elected. He was almost somber in comparison to others when announcing his candidacy. Pennington pointed out that things are going smoothly now and are expected to continue doing so. “The thing I
like best is the huge range of people working on things pretty
autonomously — we have the translation team, docs team, usability
team, release team, all of these building up their own communities and
getting stuff done.

“I think I only missed one or two board meetings this year, and
generally try to do a good job.”

All 11 spots on the GNOME foundation board are up for re-election. The election will be held by email from November 13 to 20. Only GNOME foundation members are eligible to vote. If you’d like to become a member, you must turn in an application by November 8. According to the Membership Policy, any contributor to GNOME is eligible for membership. Contributions may be code, documentation, translations, maintenance, or other “non-trivial activities.”

Category:

  • Open Source

Caldera: syncookies firewall breaking problem

Author: JT Smith

“…the syncookies design allows a remote attacker to
bypass SYN filtering firewalls in case there is one open port which
the attacker can flood.”

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

______________________________________________________________________________
		   Caldera International, Inc.  Security Advisory

Subject:		Linux - syncookies firewall breaking problem
Advisory number: 	CSSA-2001-038.0
Issue date: 		2001, November 05
Cross reference:
______________________________________________________________________________


1. Problem Description

   The Linux kernel implements a method called 'syn cookies' to avoid
   denial of service attacks by using a stateless connection setup.

   There is also a common form of firewalls, which are based on SYN
   filtering to block only incoming TCP connections, but let outgoing
   connections pass.

   Unfortunately the syncookies design allows a remote attacker to
   bypass SYN filtering firewalls in case there is one open port which
   the attacker can flood.

   The Linux 2.2 and 2.4 kernels had the syncookies state as a systemwide
   global, so it was enabled for all sockets at once in case of flood to
   an open port, allowing a remote attacker to gain access to firewalled
   ports, effectively bypassing the firewall.

   Even though the attack requires a very large number of IP packets,
   it is not unthinkable for a determined attacker to exploit this problem.


2. Vulnerable Versions

   System                       Package
   -----------------------------------------------------------
   OpenLinux 2.3                 All packages previous to      
                                 linux-2.2.10-14 
   
   OpenLinux eServer 2.3.1       All packages previous to      
   and OpenLinux eBuilder        linux-2.2.14-13S
   
   OpenLinux eDesktop 2.4        All packages previous to      
                                 linux-2.2.14-9            
   
   OpenLinux Server 3.1          All packages previous to      
                                 linux-2.4.2-14S 
   
   OpenLinux Workstation 3.1     All packages previous to      
                                 linux-2.4.2-14D 
   


3. Solution

   Workaround

     Disable syncookies by doing:

     	echo -n 0 > /proc/sys/net/ipv4/tcp_syncookies

   The proper solution is to upgrade to the latest packages.

4. OpenLinux 2.3

    4.1 Location of Fixed Packages

       The upgrade packages can be found on Caldera's FTP site at:

       ftp://ftp.caldera.com/pub/updates/OpenLinux/2.3/current/RPMS

       The corresponding source code package can be found at:

       ftp://ftp.caldera.com/pub/updates/OpenLinux/2.3/current/SRPMS

   4.2 Verification

       f112b7346070972c44770b562df912db  linux-kernel-binary-2.2.10-14.i386.rpm
       7a8d2803e68227576998b9c12fb90976  linux-kernel-doc-2.2.10-14.i386.rpm
       8c9a3a28c69d03efb6e325e1f83eca9a  linux-kernel-include-2.2.10-14.i386.rpm
       29020f946a358838cde15d54ee6a294c  linux-source-alpha-2.2.10-14.i386.rpm
       0a841ec165ee97425afb8d86f74a2eb4  linux-source-arm-2.2.10-14.i386.rpm
       dead286ad1491ceccabde12fd24eab88  linux-source-common-2.2.10-14.i386.rpm
       b8e37b6be024ceb02dbcff7e9191e067  linux-source-i386-2.2.10-14.i386.rpm
       9789e6ea513b88f8dbdf4fd58405c69f  linux-source-m68k-2.2.10-14.i386.rpm
       14ae8aa4e6e075b1ce891048b4eb25ed  linux-source-mips-2.2.10-14.i386.rpm
       d85b4cc17890c262a776bef9c100aa07  linux-source-ppc-2.2.10-14.i386.rpm
       9a4398514eea89a9cae7bd28038b7d6b  linux-source-sparc-2.2.10-14.i386.rpm
       5f0c0e296f83cc1a0ed8e8f2b03087ba  linux-source-sparc64-2.2.10-14.i386.rpm
       25901d75de5b22e8eda388895a261564  pcmcia-cs-3.0.14-5.i386.rpm
       dfe1a96017b6a43949d740a5a2f17369  linux-2.2.10-14.src.rpm
       f07c67c7eeb6778d2b7320591bbecd14  pcmcia-cs-3.0.14-5.src.rpm
       

   4.3 Installing Fixed Packages

       Upgrade the affected packages with the following commands:


	 /sbin/modprobe loop
         rpm -Fvh --force linux-kernel-binary-2.2.10-14.i386.rpm 
              linux-kernel-doc-2.2.10-14.i386.rpm 
              linux-kernel-include-2.2.10-14.i386.rpm 
              linux-source-alpha-2.2.10-14.i386.rpm 
              linux-source-arm-2.2.10-14.i386.rpm 
              linux-source-common-2.2.10-14.i386.rpm 
              linux-source-i386-2.2.10-14.i386.rpm 
              linux-source-m68k-2.2.10-14.i386.rpm 
              linux-source-mips-2.2.10-14.i386.rpm 
              linux-source-ppc-2.2.10-14.i386.rpm 
              linux-source-sparc-2.2.10-14.i386.rpm 
              linux-source-sparc64-2.2.10-14.i386.rpm 
              pcmcia-cs-3.0.14-5.i386.rpm
         

5. OpenLinux eServer 2.3.1 and OpenLinux eBuilder for ECential 3.0

    5.1 Location of Fixed Packages

       The upgrade packages can be found on Caldera's FTP site at:

       ftp://ftp.caldera.com/pub/updates/eServer/2.3/current/RPMS

       The corresponding source code package can be found at:

       ftp://ftp.caldera.com/pub/updates/eServer/2.3/current/SRPMS

   5.2 Verification

       e2f0150caeb4d7318716d05d5d4cb32e  linux-kernel-binary-2.2.14-13S.i386.rpm
       9c0940b9a84ff72c8a40e8a10add3d4b  linux-kernel-doc-2.2.14-13S.i386.rpm
       8cdfa9651a5e75d04a095696d4681663  linux-kernel-include-2.2.14-13S.i386.rpm
       db564909d2065c238271ae63c9ffd49a  linux-source-alpha-2.2.14-13S.i386.rpm
       4f80288d523347ec39e9cc38e7230f50  linux-source-arm-2.2.14-13S.i386.rpm
       9c915c6026e86680299522da3e053e72  linux-source-common-2.2.14-13S.i386.rpm
       c7f9415335c293a9878b18abb5ed1864  linux-source-i386-2.2.14-13S.i386.rpm
       3218946ecbd2b98c6661770757fa4e8d  linux-source-m68k-2.2.14-13S.i386.rpm
       6ab8925bdf73efe2b014ebcd3c2188bc  linux-source-mips-2.2.14-13S.i386.rpm
       035a4e5970bf0dc709c301daf751bc67  linux-source-ppc-2.2.14-13S.i386.rpm
       d611132b945774cb4b3a0e57ef323f1b  linux-source-sparc-2.2.14-13S.i386.rpm
       3b4048225724cab325a247d66bac2afe  linux-source-sparc64-2.2.14-13S.i386.rpm
       d653ecbe3fa48e87f6c6ebbce81d8345  pcmcia-cs-3.1.4-5.i386.rpm
       222e40903ce9f4fa823485984764369e  linux-2.2.14-13S.src.rpm
       d78e703763fe9828627006706d65292e  pcmcia-cs-3.1.4-5.src.rpm
       

   5.3 Installing Fixed Packages

       Upgrade the affected packages with the following commands:

	 /sbin/modprobe loop
         rpm -Fvh linux-kernel-binary-2.2.14-13S.i386.rpm 
              linux-kernel-doc-2.2.14-13S.i386.rpm 
              linux-kernel-include-2.2.14-13S.i386.rpm 
              linux-source-alpha-2.2.14-13S.i386.rpm 
              linux-source-arm-2.2.14-13S.i386.rpm 
              linux-source-common-2.2.14-13S.i386.rpm 
              linux-source-i386-2.2.14-13S.i386.rpm 
              linux-source-m68k-2.2.14-13S.i386.rpm 
              linux-source-mips-2.2.14-13S.i386.rpm 
              linux-source-ppc-2.2.14-13S.i386.rpm 
              linux-source-sparc-2.2.14-13S.i386.rpm 
              linux-source-sparc64-2.2.14-13S.i386.rpm 
              pcmcia-cs-3.1.4-5.i386.rpm
         

6. OpenLinux eDesktop 2.4

    6.1 Location of Fixed Packages

       The upgrade packages can be found on Caldera's FTP site at:

       ftp://ftp.caldera.com/pub/updates/eDesktop/2.4/current/RPMS

       The corresponding source code package can be found at:

       ftp://ftp.caldera.com/pub/updates/eDesktop/2.4/current/SRPMS

   6.2 Verification

       3274fe3fbb7b302d6d0bee7186820fef  hwprobe-20000214-6.i386.rpm
       064ebec44665beb14eaa85ad4ecfc838  iBCS-2.1-12.i386.rpm
       d87d3c6f0cb937a0e51e68c6984b2c62  iBCS-extras-2.1-12.i386.rpm
       7fd4443b17bc58f072572548b3c54886  iBCS-module-2.1_2.2.14-12.i386.rpm
       4366e46e2ff02f9dadde291a483f1cf2  linux-kernel-binary-2.2.14-9.i386.rpm
       d54b1d4e4ad58022d5298e8c5359dad9  linux-kernel-doc-2.2.14-9.i386.rpm
       320d182140b90c771993b031c66f2d4a  linux-kernel-include-2.2.14-9.i386.rpm
       ad69ebbc9d8ee30de552e81f5c3b3cdf  linux-source-alpha-2.2.14-9.i386.rpm
       3f5434fc2fe4486e258a5981cd65dc36  linux-source-arm-2.2.14-9.i386.rpm
       a8fc5f92bf99b27674772966f390ce1d  linux-source-common-2.2.14-9.i386.rpm
       6fd8bde1cd3caf58195f6be09983a9cf  linux-source-i386-2.2.14-9.i386.rpm
       997e6d546da8149c8a9b4e78932a3ab5  linux-source-m68k-2.2.14-9.i386.rpm
       27dcf591ef399c3b1a02011900cf92e3  linux-source-mips-2.2.14-9.i386.rpm
       ce4998917dcded5161b954672b9e7728  linux-source-ppc-2.2.14-9.i386.rpm
       7b258bc6c66ac6d9305bc71e41ecd24c  linux-source-sparc-2.2.14-9.i386.rpm
       fb5d48c243c3b10067f59f58f6f922f4  linux-source-sparc64-2.2.14-9.i386.rpm
       d4fbca082ccb49d9a9ed26b2e4868767  pcmcia-cs-3.1.8-5.i386.rpm
       b5465215f5dbe5c430e684a9899af9f7  hwprobe-20000214-6.src.rpm
       ccbfc2eab5d5111866abcba90e551116  iBCS-2.1-12.src.rpm
       ada8415ed350c5013bf29fc84931741b  linux-2.2.14-9.src.rpm
       14b4fb11304a0083ee44edd27dba4543  pcmcia-cs-3.1.8-5.src.rpm
       

   6.3 Installing Fixed Packages

       Upgrade the affected packages with the following commands:

	 /sbin/modprobe loop
         rpm -Fvh hwprobe-20000214-6.i386.rpm iBCS-2.1-12.i386.rpm 
              iBCS-extras-2.1-12.i386.rpm 
              iBCS-module-2.1_2.2.14-12.i386.rpm 
              linux-kernel-binary-2.2.14-9.i386.rpm 
              linux-kernel-doc-2.2.14-9.i386.rpm 
              linux-kernel-include-2.2.14-9.i386.rpm 
              linux-source-alpha-2.2.14-9.i386.rpm 
              linux-source-arm-2.2.14-9.i386.rpm 
              linux-source-common-2.2.14-9.i386.rpm 
              linux-source-i386-2.2.14-9.i386.rpm 
              linux-source-m68k-2.2.14-9.i386.rpm 
              linux-source-mips-2.2.14-9.i386.rpm 
              linux-source-ppc-2.2.14-9.i386.rpm 
              linux-source-sparc-2.2.14-9.i386.rpm 
              linux-source-sparc64-2.2.14-9.i386.rpm 
              pcmcia-cs-3.1.8-5.i386.rpm
         

7. OpenLinux 3.1 Server

    7.1 Location of Fixed Packages

       The upgrade packages can be found on Caldera's FTP site at:

       ftp://ftp.caldera.com/pub/updates/OpenLinux/3.1/Server/current/RPMS

       The corresponding source code package can be found at:

       ftp://ftp.caldera.com/pub/updates/OpenLinux/3.1/Server/current/SRPMS

   7.2 Verification

       87b5f36b72bb16e6e834c59233106b37  linux-kernel-binary-2.4.2-14S.i386.rpm
       5188757fbd1cbcc307d53c0bbbba6aed  linux-kernel-include-2.4.2-14S.i386.rpm
       4723ba116d77e1afaaab9108d4f67392  linux-source-alpha-2.4.2-14S.i386.rpm
       8d5b667a2238e549d01523a9028d0def  linux-source-arm-2.4.2-14S.i386.rpm
       7b1040fce5eb2c13069f12e0f98f459f  linux-source-common-2.4.2-14S.i386.rpm
       d4d72adbd977c3cd736d6d292fa96f66  linux-source-i386-2.4.2-14S.i386.rpm
       e13ee045818e08ea58ebac07e3a7683b  linux-source-ia64-2.4.2-14S.i386.rpm
       63f8af9364b41a5ed8529922b2b86085  linux-source-m68k-2.4.2-14S.i386.rpm
       1efcb66cef3cfb73267bc383192977e5  linux-source-mips-2.4.2-14S.i386.rpm
       eb531f7e844276dadcfb64a61e14d91b  linux-source-ppc-2.4.2-14S.i386.rpm
       bdbb2c789f16563881f1bb24384a1e13  linux-source-s390-2.4.2-14S.i386.rpm
       afab346de67d5298b680d9f3f585df85  linux-source-sparc-2.4.2-14S.i386.rpm
       4365699de967a365b09f92f683447b90  linux-source-superH-2.4.2-14S.i386.rpm
       38226719588775988ffdd5db0adacb10  linux-2.4.2-14S.src.rpm
       

   7.3 Installing Fixed Packages

       Upgrade the affected packages with the following commands:

	 /sbin/modprobe loop
         rpm -Fvh linux-kernel-binary-2.4.2-14S.i386.rpm 
              linux-kernel-include-2.4.2-14S.i386.rpm 
              linux-source-alpha-2.4.2-14S.i386.rpm 
              linux-source-arm-2.4.2-14S.i386.rpm 
              linux-source-common-2.4.2-14S.i386.rpm 
              linux-source-i386-2.4.2-14S.i386.rpm 
              linux-source-ia64-2.4.2-14S.i386.rpm 
              linux-source-m68k-2.4.2-14S.i386.rpm 
              linux-source-mips-2.4.2-14S.i386.rpm 
              linux-source-ppc-2.4.2-14S.i386.rpm 
              linux-source-s390-2.4.2-14S.i386.rpm 
              linux-source-sparc-2.4.2-14S.i386.rpm 
              linux-source-superH-2.4.2-14S.i386.rpm
         
	 /sbin/depmod -a

8. OpenLinux 3.1 Workstation

    8.1 Location of Fixed Packages

       The upgrade packages can be found on Caldera's FTP site at:

       ftp://ftp.caldera.com/pub/updates/OpenLinux/3.1/Workstation/current/RPMS

       The corresponding source code package can be found at:

       ftp://ftp.caldera.com/pub/updates/OpenLinux/3.1/Workstation/current/SRPMS

   8.2 Verification

       b170636148d3d057237913b3870d916f  linux-kernel-binary-2.4.2-14D.i386.rpm
       a1f3dd1fe8ac717999a8fc963227c40e  linux-kernel-include-2.4.2-14D.i386.rpm
       b033e7f2b3bea97b65b636cc5ab67de9  linux-source-alpha-2.4.2-14D.i386.rpm
       c8fd9e36df0d6008fad4c3beb31e3bdb  linux-source-arm-2.4.2-14D.i386.rpm
       452b0df69c68d10f3bdac57c08e9cf17  linux-source-common-2.4.2-14D.i386.rpm
       d7e8c4157df7a7b9bb0116f673c67b1d  linux-source-i386-2.4.2-14D.i386.rpm
       25911c50aa631b48712da3b877eb4c72  linux-source-ia64-2.4.2-14D.i386.rpm
       3ea9d607e08b15ff646d45100754c05f  linux-source-m68k-2.4.2-14D.i386.rpm
       339be8f2e0fd2eafefb41c256acf0412  linux-source-mips-2.4.2-14D.i386.rpm
       47ce33f13fde399aa62b0d20b677150b  linux-source-ppc-2.4.2-14D.i386.rpm
       9a3f948f6e104bb7bbc8c2105b218bcf  linux-source-s390-2.4.2-14D.i386.rpm
       fa3416e60a2af27c529a72cf446885ed  linux-source-sparc-2.4.2-14D.i386.rpm
       07f6fc32a1002845413fc77bdd7c61f0  linux-source-superH-2.4.2-14D.i386.rpm
       1d13bd90b32d5fa065b0afa2484df0f2  linux-2.4.2-14D.src.rpm
       

   8.3 Installing Fixed Packages

       Upgrade the affected packages with the following commands:

	 /sbin/modprobe loop
         rpm -Fvh linux-kernel-binary-2.4.2-14D.i386.rpm 
              linux-kernel-include-2.4.2-14D.i386.rpm 
              linux-source-alpha-2.4.2-14D.i386.rpm 
              linux-source-arm-2.4.2-14D.i386.rpm 
              linux-source-common-2.4.2-14D.i386.rpm 
              linux-source-i386-2.4.2-14D.i386.rpm 
              linux-source-ia64-2.4.2-14D.i386.rpm 
              linux-source-m68k-2.4.2-14D.i386.rpm 
              linux-source-mips-2.4.2-14D.i386.rpm 
              linux-source-ppc-2.4.2-14D.i386.rpm 
              linux-source-s390-2.4.2-14D.i386.rpm 
              linux-source-sparc-2.4.2-14D.i386.rpm 
              linux-source-superH-2.4.2-14D.i386.rpm
         
	 /sbin/depmod -a


9. References

   This and other Caldera security resources are located at:

   http://www.caldera.com/support/security/index.html

   This security fix closes Caldera's internal Problem Report 10835.


10. Disclaimer

   Caldera International, Inc. is not responsible for the misuse of
   any of the information we provide on this website and/or through our
   security advisories. Our advisories are a service to our customers
   intended to promote secure installation and use of Caldera OpenLinux.

11. Acknowledgements

   Caldera International Inc. wants to thank Andi Kleen of SuSE for
   spotting and sending a patch and David Miller for refining it.
______________________________________________________________________________
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.6 (GNU/Linux)
Comment: For info see http://www.gnupg.org

iD8DBQE75qM/18sy83A/qfwRAmQWAJ9+1yMqGz7TmiV5qO1bvgYpQjASuQCgtP6q
+bK2B7diVD8AM78+qv5yYkI=
=8D+y
-----END PGP SIGNATURE-----

---------------------------------------------------------------------
To unsubscribe, e-mail: announce-unsubscribe@lists.caldera.com
For additional commands, e-mail: announce-help@lists.caldera.com

Category:

  • Linux

Torvalds, Cox agree on the future kernel

Author: JT Smith

eWEEK: “The battle over the Linux kernel that has divided the developer community appears to be over—at least for now. Last week, Linux creator Linus Torvalds and Linux developer Alan Cox told eWEEK that they will both embrace a new Virtual Memory manager and implement it in forthcoming iterations of the operating system. Cox has, until now, continued to use the existing VM in the version of the 2.4 kernel he maintains.”

Category:

  • Linux

Borland ships Kylix 2

Author: JT Smith

Posted at BusinessWire: “Borland Software Corporation (Nasdaq:BORL) today announced the general availability of Borland(R) Kylix(TM) 2 for the rapid development of e-business applications for Linux(R). The latest version of Borland’s award-winning, rapid application development (RAD) environment for the Linux operating system, Kylix 2 enables companies to rapidly build and deploy applications that simplify e-business integration with Web Services across diverse platforms between customers, suppliers, business partners and employees worldwide.”

CERT: Multiple vulnerabilities in lpd

Author: JT Smith

“There are multiple vulnerabilities in several implementations of the
line printer daemon (lpd), affecting several systems. Some of these
problems have been publicly disclosed previously. However, we believe
many system and network administrators may have overlooked one or more
of these vulnerabilities.”

-----BEGIN PGP SIGNED MESSAGE-----

CERT Advisory CA-2001-30 Multiple Vulnerabilities in lpd

   Original release date: November 05, 2001
   Last revised: --
   Source: CERT/CC

   A complete revision history can be found at the end of this file.

Systems Affected

     * BSDi BSD/OS Version 4.1 and earlier
     * Debian GNU/Linux 2.1 and 2.1r4
     * FreeBSD   All   released   versions   FreeBSD  4.x,  3.x,  FreeBSD
       4.3-STABLE, 3.5.1-STABLE prior to the correction date
     * Hewlett-Packard  HP9000  Series  700/800  running  HP-UX  releases
       10.01, 10.10, 10.20, 11.00, and 11.11
     * IBM AIX Versions 4.3 and AIX 5.1
     * Mandrake Linux Versions 6.0, 6.1, 7.0, 7.1
     * NetBSD 1.5.2 and earlier
     * OpenBSD Version 2.9 and earlier
     * Red Hat Linux 6.0 all architectures
     * SCO OpenServer Version 5.0.6a and earlier
     * SGI IRIX 6.5-6.5.13
     * Sun Solaris 8 and earlier
     * SuSE Linux Versions 6.1, 6.2, 6.3, 6.4, 7.0, 7.1, 7.2

Overview

   There  are  multiple vulnerabilities in several implementations of the
   line  printer  daemon  (lpd).  The line printer daemon enables various
   clients to share printers over a network. Review your configuration to
   be  sure  you have applied all relevant patches. We also encourage you
   to restrict access to the lpd service to only authorized users.

I. Description

   There  are  multiple vulnerabilities in several implementations of the
   line  printer  daemon  (lpd), affecting several systems. Some of these
   problems  have been publicly disclosed previously. However, we believe
   many system and network administrators may have overlooked one or more
   of  these  vulnerabilities.  We are issuing this document primarily to
   encourage  system and network administators to check their systems for
   exposure to each of these vulnerabilities, even if they have addressed
   some lpd vulnerabilities recently.

   Most  of  these vulnerabilities are buffer overflows allowing a remote
   intruder  to  gain  root  access to the lpd server. For the latest and
   most  detailed information about the known vulnerabilities, please see
   the vulnerability notes linked to below.

 VU#274043 - BSD line printer daemon buffer overflow in displayq()

   There is a buffer overflow in several implementations of in.lpd, a BSD
   line  printer  daemon.  An intruder can send a specially crafted print
   job  to  the  target  and then request a display of the print queue to
   trigger  the  buffer  overflow.  The  intruder  may  be  able use this
   overflow  to  execute  arbitrary commands on the system with superuser
   privileges.

   The  line  printer  daemon  must be enabled and configured properly in
   order for an intruder to exploit this vulnerability. This is, however,
   trivial  as  the  line  printer  daemon is commonly enabled to provide
   printing  functionality.  In order to exploit the buffer overflow, the
   intruder  must  launch  his attack from a system that is listed in the
   "/etc/hosts.equiv" or "/etc/hosts.lpd" file of the target system.

 VU#388183   -   IBM   AIX  line  printer  daemon  buffer  overflow  in
                 kill_print()

   A  buffer  overflow  exists  in  the kill_print() function of the line
   printer  daemon  (lpd)  on AIX systems. An intruder could exploit this
   vulnerability  to obtain root privileges or cause a denial of service
   (DoS).   The  intruder  would  need  to  be  listed  in  the  victim's
   /etc/hosts.lpd  or  /etc/hosts.equiv  file,  however,  to exploit this
   vulnerability.

 VU#722143   -   IBM   AIX  line  printer  daemon  buffer  overflow  in
                 send_status()

   A  buffer  overflow  exists  in the send_status() function of the line
   printer  daemon  (lpd)  on AIX systems. An intruder could exploit this
   vulnerability  to  obtain root privileges or cause a denial of service
   (DoS).   The  intruder  would  need  to  be  listed  in  the  victim's
   /etc/hosts.lpd  or  /etc/hosts.equiv  file,  however,  to exploit this
   vulnerability.

 VU#466239 - IBM AIX line printer daemon buffer overflow in chk_fhost()

   A  buffer  overflow  exists  in  the  chk_fhost() function of the line
   printer  daemon  (lpd)  on AIX systems. An intruder could exploit this
   vulnerability  to  obtain root privileges or cause a denial of service
   (DoS).  The  intruder  would need control of the DNS server to exploit
   this vulnerability.

 VU#39001 - line printer daemon allows options to be passed to sendmail

   There  exists  a vulnerability in the line printer daemon that permits
   an  intruder  to send options to sendmail. These options could be used
   to  specify  another  configuration  file allowing an intruder to gain
   root access.

 VU#30308  -  line printer daemon hostname authentication bypassed with
              spoofed DNS

   A  vulnerability  exists in the line printer daemon (lpd) shipped with
   the printer package for several systems. The authentication method was
   not  thorough  enough.  If a remote user was able to control their own
   DNS  so  that  their  IP address resolved to the hostname of the print
   server, access would be granted when it should not be.

 VU#966075 - Hewlett-Packard HP-UX line printer daemon buffer overflow

   A  buffer  overflow  exists in HP-UX's line printer daemon (rlpdaemon)
   that  may  allow  an intruder to execute arbitrary code with superuser
   privilege  on the target system. The rlpdaemon is installed by default
   and  is active even if it is not being used. An intruder does not need
   any  prior  knowledge,  or privileges on the target system, in order to
   exploit this vulnerability.

II. Impact

   All of these vulnerabilities can be exploited remotely. In most cases,
   they  allow  an intruder to execute arbitrary code with the privileges
   of  the  lpd  server. In some cases, an intruder must have access to a
   machine  listed  in  /etc/hosts.equiv  or  /etc/hosts.lpd, and in some
   cases, an intruder must be able to control a nameserver.

   One vulnerability (VU#39001) allows you to specify options to sendmail
   that  can  be  used  to  execute arbitrary commands.  Ordinarily, this
   vulnerability is only exploitable from machines that are authorized to
   use the lpd server. However, in conjunction with another vulnerability
   (VU#30308), permitting  intruders  to  gain access to the lpd service,
   this vulnerability can be used by intruders not normally authorized to
   use the lpd service.

   For   specific   information  about  the  impacts  of  each  of  these
   vulnerabilities,  please consult the CERT Vulnerability Notes Database
   (http://www.kb.cert.org/vuls).

III. Solution

Apply a patch from your vendor

   Appendix A contains information provided by vendors for this advisory.
   As  vendors report new information to the CERT/CC, we will update this
   section  and note the changes in our revision history. If a particular
   vendor  is  not  listed  below,  we  have not received their comments.
   Please contact your vendor directly.

   This  table  represents  the status of each vendor with regard to each
   vulnerability. Please be aware that vendors produce multiple products;
   if they are listed in this table, not all products may be affected. If
   a vendor is not listed in the table below, then their status should be
   considered  unknown. For specific information about the status of each
   of  these vulnerabilities, please consult the CERT Vulnerability Notes
   Database (http://www.kb.cert.org/vuls).

+ = Affected
- - = Not Affected
? = Unknown
   
VU# ->  |274043 |388183 |722143 |466239 |39001  |30308  |966075
Vendors ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Apple   |   -   |   ?   |   ?   |   ?   |   ?   |   ?   |   -
BSDI    |   +   |   ?   |   ?   |   ?   |   ?   |   ?   |   ?
Caldera |   -   |   -   |   -   |   -   |   -   |   -   |   -
Cray    |   ?   |   -   |   -   |   -   |   -   |   ?   |   -
Debian  |   ?   |   ?   |   ?   |   ?   |   +   |   +   |   ?
Engarde |   -   |   -   |   -   |   -   |   -   |   -   |   -
FreeBSD |   +   |   -   |   -   |   -   |   -   |   -   |   -
Fujitsu |   -   |   -   |   -   |   -   |   -   |   -   |   -
HP      |   ?   |   ?   |   ?   |   ?   |   ?   |   ?   |   +
IBM     |   -   |   +   |   +   |   +   |   -   |   +   |   -
Mandrake|   ?   |   ?   |   ?   |   ?   |   +   |   ?   |   ?
NetBSD  |   +   |   ?   |   ?   |   ?   |   ?   |   ?   |   ?
OpenBSD |   +   |   ?   |   ?   |   ?   |   ?   |   ?   |   ?
Red Hat |   ?   |   ?   |   ?   |   ?   |   +   |   +   |   ?
SCO     |   +   |   ?   |   ?   |   ?   |   ?   |   ?   |   ?
SGI     |   +   |   ?   |   ?   |   ?   |   ?   |   ?   |   ?
SuSE    |   +   |   ?   |   ?   |   ?   |   ?   |   ?   |   ?
Sun     |   -   |   -   |   -   |   -   |   +   |   -   |   -


Restrict access to the lpd service

   As  a  general  practice, we recommend disabling all services that are
   not  explicitly  required.  You  may  wish to disable the line printer
   daemon if there is not a patch available from your vendor.

   If  you  cannot  disable  the  service, you can limit your exposure to
   these vulnerabilities by using a router or firewall to restrict access
   to port 515/TCP (printer). Note that this does not protect you against
   attackers from within your network.

Appendix A. - Vendor Information

   This  appendix  contains  information  provided  by  vendors  for this
   advisory.  As  vendors  report new information to the CERT/CC, we will
   update this section and note the changes in our revision history. If a
   particular  vendor  is  not  listed  below, we have not received their
   comments.

Apple Computer, Inc.

   Mac  OS  X  does not have the line printer daemon vulnerability issues
   described in these advisories.

Berkeley Software Design, Inc. (BSDI)

   Some  (older)  versions are affected. The current (BSD/OS 4.2) release
   is  not  vulnerable.  Systems are only vulnerable to attack from hosts
   which  are  allowed  via  the  /etc/hosts.lpd  file (which is empty as
   shipped).
   BSD/OS  4.1  is  the only vulnerable version which is still officially
   supported  by  Wind  River Systems. A patch (M410-044) is available in
   the  normal  locations, ftp://ftp.bsdi.com/bsdi/patches or via our web
   site at http://www.bsdi.com/support

Compaq

   Compaq  has not been able to reproduce the problems identified in this
   advisory  for TRU64 UNIX. We will continue testing and address the LPD
   issues if a problem is discovered and provide patches as necessary.

Cray

   Cray,  Inc. has been unable to prove an lpd vulnerability. However, it
   was  deemed  that a buffer overflow may be possible and so did tighten
   up the code. See Cray SPR 721101 for more details.

Debian

   http://www.debian.org/security/2000/20000109

FreeBSD, Inc.

 ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-01%3A58.lpd.asc

Hewlett-Packard Company

   Hewlett-Packard has released
   HPSBUX0108-163 Sec. Vulnerability in rlpdaemon
   Bulletin and patches available from http://itrc.hp.com
   Details  to  access http://itrc.hp.com are include at the last half of
   any HP Bulletin.

IBM Corporation

 http://www-1.ibm.com/services/continuity/recover1.nsf/4699c03b46f2d4f68525678c006d45ae/85256a3400529a8685256ac7005cf00a/$FILE/oar391.txt

Mandrake Software

   http://www.linux-mandrake.com/en/updates/2000/MDKSA-2000-054.php3

NetBSD

   If  lpd has been enabled, this issue affects NetBSD versions 1.5.2 and
   prior  releases,  and  NetBSD-current prior to August 30, 2001. lpd is
   disabled by default in NetBSD installations.
   
   Detailed information will be released subsequent to the publication of
   this CERT advisory.
   
   An up-to-date PGP signed copy of the release will be maintained at

   ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2001-018.txt.asc
   
   Information   about  NetBSD  and  NetBSD  security  can  be  found  at
   http://www.NetBSD.ORG and http://www.NetBSD.ORG/Security/.

OpenBSD

   http://www.openbsd.org/errata29.html#lpd

RedHat Inc.

   http://www.redhat.com/support/errata/RHSA2000002-01.6.0.html

Santa Cruz Operation, Inc. (SCO)

   ftp://stage.caldera.com/pub/security/openserver/CSSA-2001-SCO.20/

SGI

   ftp://patches.sgi.com/support/free/security/advisories/20011003-01-P

SuSE

 http://lists2.suse.com/archive/suse-security-announce/2001-Oct/0000.html
     _________________________________________________________________

   The  CERT Coordination Center thanks Internet Security Systems and IBM
   for the information provided in their advisories.
     _________________________________________________________________

   Feedback  on  this  document  can  be directed to the author, 
   Jason A. Rafail
     _________________________________________________________________

   References
     * http://www.kb.cert.org/vuls/id/274043
     * http://www.kb.cert.org/vuls/id/388183
     * http://www.kb.cert.org/vuls/id/722143
     * http://www.kb.cert.org/vuls/id/466239
     * http://www.kb.cert.org/vuls/id/39001
     * http://www.kb.cert.org/vuls/id/30308
     * http://www.kb.cert.org/vuls/id/966075
     * http://www.kb.cert.org/vuls
   ______________________________________________________________________

   This document is available from:
   http://www.cert.org/advisories/CA-2001-30.html
   ______________________________________________________________________

CERT/CC Contact Information

   Email: cert@cert.org
          Phone: +1 412-268-7090 (24-hour hotline)
          Fax: +1 412-268-6989
          Postal address:
          CERT Coordination Center
          Software Engineering Institute
          Carnegie Mellon University
          Pittsburgh PA 15213-3890
          U.S.A.

   CERT/CC   personnel   answer  the  hotline  08:00-17:00  EST(GMT-5)  /
   EDT(GMT-4)  Monday  through  Friday;  they are on call for emergencies
   during other hours, on U.S. holidays, and on weekends.

Using encryption

   We  strongly  urge you to encrypt sensitive information sent by email.
   Our public PGP key is available from

   http://www.cert.org/CERT_PGP.key

   If  you  prefer  to  use  DES,  please  call the CERT hotline for more
   information.

Getting security information

   CERT  publications  and  other security information are available from
   our web site

   http://www.cert.org/

   To  subscribe  to  the CERT mailing list for advisories and bulletins,
   send  email  to majordomo@cert.org. Please include in the body of your
   message

   subscribe cert-advisory

   *  "CERT"  and  "CERT  Coordination Center" are registered in the U.S.
   Patent and Trademark Office.
   ______________________________________________________________________

   NO WARRANTY
   Any  material furnished by Carnegie Mellon University and the Software
   Engineering  Institute  is  furnished  on  an  "as is" basis. Carnegie
   Mellon University makes no warranties of any kind, either expressed or
   implied  as  to  any matter including, but not limited to, warranty of
   fitness  for  a  particular purpose or merchantability, exclusivity or
   results  obtained from use of the material. Carnegie Mellon University
   does  not  make  any warranty of any kind with respect to freedom from
   patent, trademark, or copyright infringement.
     _________________________________________________________________

   Conditions for use, disclaimers, and sponsorship information

   Copyright 2001 Carnegie Mellon University.

   Revision History
November 05, 2001:  Initial release

-----BEGIN PGP SIGNATURE-----
Version: PGP 6.5.8

iQCVAwUBO+boKKCVPMXQI2HJAQFLWgP/R8K+kw9GrKp0rF5hdrsiowPOBaO716OM
M4dRX+5Ek+svlY9/P948FfU4CyKG1c4M9FzSMgoKTUmvsnB+NVFgln/d0+jMfAy0
IyzHxyp5bSbF6pbfEyyr7gy8S3xaaVyDbAmhuLAW0Kiwy1xMmOFjZLu0W+A99rf7
XMm+KQhJe6o=
=pB53
-----END PGP SIGNATURE-----

Category:

  • Linux

No relief in sight for MS security

Author: JT Smith

“After the one-two combination of the Code Red and Nimda worms that targeted the company’s server and PC software this past summer, the titan announced an initiative in early October to promote security-savvy administration among its partners.

However, almost every week since it announced its Strategic Technology Protection Program, a new security flaw has cropped up.” From ZDNet News.

Category:

  • Linux