LinuxQuestions.org
Welcome to the most active Linux Forum on the web.
Home Forums Tutorials Articles Register
Go Back   LinuxQuestions.org > Forums > Linux Forums > Linux - Security
User Name
Password
Linux - Security This forum is for all security related questions.
Questions, tips, system compromises, firewalls, etc. are all included here.

Notices


Reply
  Search this Thread
Old 06-16-2003, 07:06 PM   #1
unSpawn
Moderator
 
Registered: May 2001
Posts: 29,415
Blog Entries: 55

Rep: Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600
LQ weekly security rep - Jun 16th 2003


Jun 16th 2003
22 of 46 issues handled (SF)
1. Sun Microsystems Java Virtual Machine Insecure Temporary File Vulnerability
5. Spyke PHP Board Information Disclosure Vulnerability
6. H-Sphere HTML Template Inclusion Cross-Site Scripting Vulnerabilities
15. MNOGoSearch Search.CGI UL Buffer Overflow Vulnerability
16. MNOGoSearch Search.CGI TMPLT Buffer Overflow Vulnerability
19. XMB Forum Member.PHP U2U Private Message HTML Injection Vulnerability
20. XMB Forum Member.PHP Location Field HTML Injection Vulnerability
22. GZip ZNew Insecure Temporary File Creation Symbolic Link Vulnerability
24. RPM Package Manager FTP NLST Data Integer Overflow Remote Memory Corruption Vulnerability
25. Gnome FTP NLST Data Integer Overflow Memory Corruption Vulnerability
26. SMC Wireless Router Malformed PPTP Packet Denial of Service Vulnerability
27. Multiple Gnocatan Server Buffer Overflow Vulnerabilities
28. Ethereal DCERPC Dissector Memory Allocation Vulnerability
29. Ethereal SPNEGO Dissector Denial Of Service Vulnerability
30. Ethereal OSI Dissector Buffer Overflow Vulnerability
31. Ethereal Multiple Dissector String Handling Vulnerabilities
32. Ethereal TVB_GET_NSTRINGZ0() Memory Handling Vulnerability
33. FakeBO Syslog Format String Vulnerability
36. MySQL libmysqlclient Library mysql_real_connect() Buffer Overrun Vulnerability
41. Typespeed Remote Memory Corruption Vulnerability
42. Lyskom Server Unauthenticated User Denial Of Service Vulnerability
43. Cistron RADIUS Remote Signed NAS-Port Number Expansion Memory Corruption Vulnerability

Jun 16th 2003
40 of 62 issues handled (ISS)
Novell iChain login buffer overflow
Sun JDK/JRE/SDK untrusted Applet could access
Sun JDK/JRE/SDK untrusted Applet could access HTTP
Sun JRE/SDK untrusted Applet could allow access to
zenTrack index.php PHP file include
zenTrack debug or demo mode could allow an attacker
Debian Linux gzip znew script temporary file
zenTrack index.php directory traversal
Multiple vendor Ethernet network device driver TCP
Linux kernel large ICMP citations memory leak
Multiple vendor implementations of Java Virtual
Spyke's PHP Board stores usernames and passwords in
H-Sphere error page cross-site scripting
Nuca WebServer "dot dot" directory traversal
Unicenter TNG file_upload.pl script command
Unicenter TNG pdm_cgireport.exe unauthorized access
Unicenter TNG pdmcgi.exe could allow an attacker to
Unicenter Asset Management weak password encryption
Novell iChain long username buffer overflow
mnoGoSearch search.cgi "ul" parameter buffer
mnoGoSearch search.cgi "tmplt" parameter buffer
NewsPHP Advanced delimiter allows attacker to gain
Gnocatan multiple buffer overflows
Barricade Wireless Cable/DSL Broadband Router
ike-scan format string attack
MaxWebPortal search.asp cross-site scripting
MaxWebPortal could allow an attacker to modify form
MaxWebPortal database file access
MaxWebPortal password reset
NewsPHP comment cross-site scripting
WebBBS multiple denial of service
Cistron RADIUS NAS ports buffer overflow
PostNuke modules.php cross-site scripting
PostNuke user.php cross-site scripting
Typespeed strcspn() function buffer overflow
Progress Database dlopen() allows attacker to gain
Progress Database _dbagent allows attacker to gain
MikMod long file name buffer overflow
pMachineFree lib.inc.php PHP file include
LedNews message cross-site scripting

Jun 13th 2003
25 issues handled (LAW)
kernel
eterm
xaos
ethereal
atftp
gnocatan
nethack
buffer
cupsys
mod_php
atftp
zlib
tetex,
kon2
several
gzip
KDE
hanterm
kernel
pptpd
cups
lv
kdelibs
ghostscript
hanterm-xf
 
Old 06-16-2003, 07:07 PM   #2
unSpawn
Moderator
 
Registered: May 2001
Posts: 29,415

Original Poster
Blog Entries: 55

Rep: Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600
Jun 13th 2003 (LAW)

Linux Advisory Watch

Distribution: Debian
6/9/2003 - kernel
Multiple vulnerabilities
A number of vulnerabilities have been discovered in the Linux
kernel.
http:http://www.linuxsecurity.com/advisor...sory-3340.html

6/6/2003 - eterm
Buffer overflow vulnerability
A number of vulnerabilities have been discovered in the Linux
kernel.
http:http://www.linuxsecurity.com/advisor...sory-3341.html

6/8/2003 - xaos
Improper setuid-root execution
A number of vulnerabilities have been discovered in the Linux
kernel.
http:http://www.linuxsecurity.com/advisor...sory-3342.html

6/11/2003 - 'ethereal' buffer/integer overflows
Improper setuid-root execution
Timo Sirainen discovered several vulnerabilities in ethereal, a
network traffic analyzer. These include one-byte buffer overflows
in the AIM, GIOP Gryphon, OSPF, PPTP, Quake, Quake2, Quake3,
Rsync, SMB, SMPP, and TSP dissectors, and integer overflows in the
Mount and PPP dissectors.
http:http://www.linuxsecurity.com/advisor...sory-3349.html

6/11/2003 - 'atftp' buffer overflow
Improper setuid-root execution
Rick Patel discovered that atftpd is vulnerable to a buffer
overflow when a long filename is sent to the server. An attacker
could exploit this bug remotely to execute arbitrary code on the
server.
http:http://www.linuxsecurity.com/advisor...sory-3350.html

6/11/2003 - 'gnocatan' buffer overflows, DoS
Improper setuid-root execution
Bas Wijnen discovered that the gnocatan server is vulnerable to
several buffer overflows which could be exploited to execute
arbitrary code on the server system
http:http://www.linuxsecurity.com/advisor...sory-3351.html

6/11/2003 - 'nethack' buffer overflow
Improper setuid-root execution
The nethack package is vulnerable to a buffer overflow exploited
via a long '-s' command line option. This vulnerability could be
used by an attacker to gain gid 'games' on a system where nethack
is installed.
http:http://www.linuxsecurity.com/advisor...sory-3352.html

6/12/2003 - buffer
overflow in 'slashem'
The slashem package is vulnerable to a buffer overflow exploited
via a long '-s' command line option. This vulnerability could be
used by an attacker to gain gid 'games' on a system where slashem
is installed.
http:http://www.linuxsecurity.com/advisor...sory-3353.html

6/12/2003 - 'cupsys' DoS
overflow in 'slashem'
The CUPS print server in Debian is vulnerable to a denial of
service when an HTTP request is received without being properly
terminated.
http:http://www.linuxsecurity.com/advisor...sory-3354.html

Distribution: Gentoo
6/8/2003 - mod_php
Integer overflow vulnerability
Integer overflows have been fixed in several php functions.
http:http://www.linuxsecurity.com/advisor...sory-3338.html

6/8/2003 - atftp
Buffer overflow vulnerability
A buffer overflow has been fixed in atftp.
http:http://www.linuxsecurity.com/advisor...sory-3339.html

Distribution: Immunix
6/6/2003 - zlib
buffer overflow vulnerability
Richard Kettlewell has discovered a buffer overflow in zlib's
gzprintf() function, which provides printf(3)-like functionality
for compressed files. This update, includs a patch from the
OpenPKG project, fixes this problem by enabling autoconf tests for
vsnprintf(3).
http:http://www.linuxsecurity.com/advisor...sory-3330.html

6/9/2003 - tetex, psutils, w3c-libwww
buffer overflow vulnerability
Richard Kettlewell has discovered a buffer overflow in zlib's
gzprintf() function, which provides printf(3)-like functionality
for compressed files. This update, includs a patch from the
OpenPKG project, fixes this problem by enabling autoconf tests for
vsnprintf(3).
http:http://www.linuxsecurity.com/advisor...sory-3344.html

Distribution: Mandrake
6/6/2003 - kon2
buffer overflow vulnerability
A buffer overflow in the command line parsing can be exploited,
leading to local users being able to gain root privileges.
http:http://www.linuxsecurity.com/advisor...sory-3329.html

6/11/2003 - several
'kernel' vulnerabilities
Multiple vulnerabilities were discovered and fixed in the Linux
kernel.
http:http://www.linuxsecurity.com/advisor...sory-3348.html

Distribution: OpenPKG
6/11/2003 - 'gzip' symlink attack
info leak
The GNU Bash based znew(1) shell script tried to prevent itself
from overwriting existing files on shell redirection by using the
POSIX "noclobber" shell option, but accidentally forgot to check
for the results, and in case of existing files, stop further
processing. This allowed a classical "symlink" attack.
http:http://www.linuxsecurity.com/advisor...sory-3347.html

Distribution: RedHat
6/6/2003 - KDE
ssl man-in-the-middle attack
Updated KDE packages that resolve a vulnerability in KDE's SSL
implementation are now available.
http:http://www.linuxsecurity.com/advisor...sory-3331.html

6/6/2003 - hanterm
multiple vulnerabilities
Updated hanterm packages fix two security issues.
http:http://www.linuxsecurity.com/advisor...sory-3332.html

6/6/2003 - kernel
advisory updates
We have retracted two bug fix advisories that affected only the
S/390 architecture of Red Hat Linux 7.2.
http:http://www.linuxsecurity.com/advisor...sory-3333.html

Distribution: SuSE
6/6/2003 - pptpd
Remote buffer overflow vulnerability
We have retracted two bug fix advisories that affected only the
S/390 architecture of Red Hat Linux 7.2.
http:http://www.linuxsecurity.com/advisor...sory-3334.html

6/6/2003 - cups
Remote DoS vulnerability
We have retracted two bug fix advisories that affected only the
S/390 architecture of Red Hat Linux 7.2.
http:http://www.linuxsecurity.com/advisor...sory-3335.html

Distribution: Turbolinux
6/6/2003 - lv
Privilege escalation vulnerability
An attackers may be able to gain the privileges of the user
invoking lv.
http:http://www.linuxsecurity.com/advisor...sory-3336.html

6/6/2003 - kdelibs
Privilege escalation vulnerability
An attackers may be able to gain the privileges of the user
invoking lv.
http:http://www.linuxsecurity.com/advisor...sory-3337.html

Distribution: Yellow Dog
6/10/2003 - 'ghostscript' vulnerability
Privilege escalation vulnerability
A flaw in unpatched versions of Ghostscript before 7.07 allows
malicious postscript files to execute arbitrary commands even with
-dSAFER enabled.
http:http://www.linuxsecurity.com/advisor...sory-3345.html

6/10/2003 - 'hanterm-xf' vulnerabilities
Privilege escalation vulnerability
An attacker can craft an escape sequence that sets the window
title of a victim using Hangul Terminal to an arbitrary command
and then report it to the command line.
http:http://www.linuxsecurity.com/advisor...sory-3346.html
 
Old 06-16-2003, 07:09 PM   #3
unSpawn
Moderator
 
Registered: May 2001
Posts: 29,415

Original Poster
Blog Entries: 55

Rep: Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600
Jun 16th 2003 (ISS)

Internet Security Systems


Date Reported: 06/05/2003
Brief Description: Novell iChain login buffer overflow
Risk Factor: Low
Attack Type: Network Based
Platforms: iChain 2.2, Linux Any version, Novell NetWare Any
version, Solaris Any version, Windows Any version
Vulnerability: ichain-login-bo
X-Force URL: http://www.iss.net/security_center/static/12207.php

Date Reported: 06/06/2003
Brief Description: Sun JDK/JRE/SDK untrusted Applet could access
restricted resources
Risk Factor: Medium
Attack Type: Network Based
Platforms: Linux Any version, Solaris Any version, Sun JDK
1.1.8_008 and prior, Sun JDK 1.1.8_14 and earlier,
Sun JRE 1.3.0_05 and earlier, Sun JRE 1.3.1_02 and
earlier, Sun SDK 1.2.2_010 and prior, Sun SDK
1.3.0_05 and earlier, Sun SDK 1.3.1_02 and earlier,
Windows Any version
Vulnerability: sun-applet-resources-access
X-Force URL: http://www.iss.net/security_center/static/12210.php

Date Reported: 06/06/2003
Brief Description: Sun JDK/JRE/SDK untrusted Applet could access HTTP
request properties
Risk Factor: Medium
Attack Type: Network Based
Platforms: Linux Any version, Solaris Any version, Sun JDK
1.1.8_008 and prior, Sun JDK 1.1.8_14 and earlier,
Sun JRE 1.2.2_011 and prior, Sun JRE 1.3.0_05 and
earlier, Sun JRE 1.3.1_02 and earlier, Sun SDK
1.2.2_011 and prior, Sun SDK 1.3.0_05 and earlier,
Sun SDK 1.3.1_02 and earlier, Windows Any version
Vulnerability: sun-applet-properties-access
X-Force URL: http://www.iss.net/security_center/static/12211.php

Date Reported: 06/06/2003
Brief Description: Sun JRE/SDK untrusted Applet could allow access to
authentication credentials
Risk Factor: Medium
Attack Type: Network Based
Platforms: Linux Any version, Solaris Any version, Sun JRE
1.2.2_014 or earlier, Sun JRE 1.3.1_06 and earlier,
Sun JRE 1.4.0_03 and earlier, Sun JRE 1.4.1_01 and
earlier, Sun SDK 1.2.2_014 or earlier, Sun SDK
1.3.1_06 and earlier, Sun SDK 1.4.0_03 and earlier,
Sun SDK 1.4.1_01 and earlier, Windows Any version
Vulnerability: sun-applet-authentication-access
X-Force URL: http://www.iss.net/security_center/static/12212.php

Date Reported: 06/05/2003
Brief Description: zenTrack index.php PHP file include
Risk Factor: Medium
Attack Type: Network Based
Platforms: Linux Any version, Unix Any version, Windows Any
version, zenTrack 2.4.1 and earlier
Vulnerability: zentrack-index-file-include
X-Force URL: http://www.iss.net/security_center/static/12213.php

Date Reported: 06/06/2003
Brief Description: zenTrack debug or demo mode could allow an attacker
to obtain information
Risk Factor: Medium
Attack Type: Network Based
Platforms: Linux Any version, Unix Any version, Windows Any
version, zenTrack 2.4.1 and earlier
Vulnerability: zentrack-debug-obtain-information
X-Force URL: http://www.iss.net/security_center/static/12214.php

Date Reported: 06/06/2003
Brief Description: Debian Linux gzip znew script temporary file
symlink attack
Risk Factor: High
Attack Type: Host Based
Platforms: Debian Linux 2.2, Debian Linux 3.0, Gentoo Linux
Any version, OpenPKG 1.1, OpenPKG 1.2, OpenPKG
CURRENT
Vulnerability: gzip-znew-tmpfile-symlink
X-Force URL: http://www.iss.net/security_center/static/12215.php

Date Reported: 06/06/2003
Brief Description: zenTrack index.php directory traversal
Risk Factor: Medium
Attack Type: Network Based
Platforms: Linux Any version, Unix Any version, Windows Any
version, zenTrack 2.4.1 and earlier
Vulnerability: zentrack-index-directory-traversal
X-Force URL: http://www.iss.net/security_center/static/12216.php

Date Reported: 06/09/2003
Brief Description: Multiple vendor Ethernet network device driver TCP
packet information leak
Risk Factor: Medium
Attack Type: Network Based
Platforms: Linux Any version, Unix Any version, Windows Any
version
Vulnerability: ethernet-tcp-information-leak
X-Force URL: http://www.iss.net/security_center/static/12218.php

Date Reported: 06/09/2003
Brief Description: Linux kernel large ICMP citations memory leak
Risk Factor: Medium
Attack Type: Network Based
Platforms: Linux Any version, Linux kernel 2.0 through 2.0.39
Vulnerability: linux-kernel-memory-leak
X-Force URL: http://www.iss.net/security_center/static/12223.php

Date Reported: 06/09/2003
Brief Description: Multiple vendor implementations of Java Virtual
Machine jpsock symlink attack
Risk Factor: High
Attack Type: Host Based
Platforms: Linux Any version, Solaris Any version, Windows Any
version
Vulnerability: jvm-jpsock-symlink
X-Force URL: http://www.iss.net/security_center/static/12224.php

Date Reported: 06/09/2003
Brief Description: Spyke's PHP Board stores usernames and passwords in
plain text
Risk Factor: Medium
Attack Type: Host Based
Platforms: Linux Any version, PHP Any version, Spyke's PHP
Board 2.1, Unix Any version, Windows Any version
Vulnerability: spyke-phpboard-plaintext-password
X-Force URL: http://www.iss.net/security_center/static/12229.php

Date Reported: 06/09/2003
Brief Description: H-Sphere error page cross-site scripting
Risk Factor: Medium
Attack Type: Network Based
Platforms: BSD Any version, H-Sphere 2.0.x, H-Sphere 2.1.x, H-
Sphere 2.2.x, H-Sphere 2.3.x, Linux Any version,
Windows 2000 Any version
Vulnerability: hsphere-error-page-xss
X-Force URL: http://www.iss.net/security_center/static/12230.php

Date Reported: 06/10/2003
Brief Description: Nuca WebServer "dot dot" directory traversal
Risk Factor: Medium
Attack Type: Network Based
Platforms: Linux Any version, Nuca WebServer 0.01, Unix Any
version, Windows Any version
Vulnerability: nuca-webserver-directory-traversal
X-Force URL: http://www.iss.net/security_center/static/12232.php

Date Reported: 06/04/2003
Brief Description: Unicenter TNG file_upload.pl script command
execution
Risk Factor: High
Attack Type: Network Based
Platforms: Linux Any version, UnicenterTNG 2.1, UnicenterTNG
2.4, UnicenterTNG 2.4.2, Unix Any version, Windows
Any version
Vulnerability: unicentertng-fileupload-execute-code
X-Force URL: http://www.iss.net/security_center/static/12240.php

Date Reported: 06/04/2003
Brief Description: Unicenter TNG pdm_cgireport.exe unauthorized access
Risk Factor: Medium
Attack Type: Network Based
Platforms: Linux Any version, UnicenterTNG 2.1, UnicenterTNG
2.4, UnicenterTNG 2.4.2, Unix Any version, Windows
Any version
Vulnerability: unicentertng-pdmcgireport-unauth-access
X-Force URL: http://www.iss.net/security_center/static/12242.php

Date Reported: 06/04/2003
Brief Description: Unicenter TNG pdmcgi.exe could allow an attacker to
view requests
Risk Factor: Medium
Attack Type: Network Based
Platforms: Linux Any version, UnicenterTNG 2.1, UnicenterTNG
2.4, UnicenterTNG 2.4.2, Unix Any version, Windows
Any version
Vulnerability: unicentertng-pdmcgi-view-requests
X-Force URL: http://www.iss.net/security_center/static/12245.php

Date Reported: 06/04/2003
Brief Description: Unicenter Asset Management weak password encryption
Risk Factor: Medium
Attack Type: Network Based
Platforms: Linux Any version, Unicenter Asset Management Any
version, Unix Any version, Windows Any version
Vulnerability: unicenter-weak-password-encryption
X-Force URL: http://www.iss.net/security_center/static/12248.php

Date Reported: 06/05/2003
Brief Description: Novell iChain long username buffer overflow
Risk Factor: Low
Attack Type: Network Based
Platforms: iChain 2.2, Linux Any version, Solaris Any version,
Windows Any version
Vulnerability: ichain-long-username-bo
X-Force URL: http://www.iss.net/security_center/static/12250.php

Date Reported: 06/11/2003
Brief Description: mnoGoSearch search.cgi "ul" parameter buffer
overflow
Risk Factor: High
Attack Type: Network Based
Platforms: Linux Any version, mnoGoSearch 3.1.20, mnoGoSearch
3.2.10, Unix Any version
Vulnerability: mnogosearch-search-ul-bo
X-Force URL: http://www.iss.net/security_center/static/12253.php

Date Reported: 06/11/2003
Brief Description: mnoGoSearch search.cgi "tmplt" parameter buffer
overflow
Risk Factor: High
Attack Type: Network Based
Platforms: Linux Any version, mnoGoSearch 3.1.20, mnoGoSearch
3.2.10, Unix Any version
Vulnerability: mnogosearch-search-tmplt-bo
X-Force URL: http://www.iss.net/security_center/static/12254.php

Date Reported: 06/05/2003
Brief Description: NewsPHP Advanced delimiter allows attacker to gain
low-level administrative privileges
Risk Factor: High
Attack Type: Network Based
Platforms: Linux Any version, NewsPHP Advanced 216, Unix Any
version, Windows Any version
Vulnerability: newsphp-delimiter-gain-privileges
X-Force URL: http://www.iss.net/security_center/static/12255.php

Date Reported: 06/11/2003
Brief Description: Gnocatan multiple buffer overflows
Risk Factor: High
Attack Type: Host Based / Network Based
Platforms: Debian Linux 3.0, Gnocatan Any version
Vulnerability: gnocatan-multiple-bo
X-Force URL: http://www.iss.net/security_center/static/12260.php

Date Reported: 06/11/2003
Brief Description: Barricade Wireless Cable/DSL Broadband Router
packet denial of service
Risk Factor: Low
Attack Type: Network Based
Platforms: Barricade Wireless Router (SMC7004VWBR) prior to
1.23
Vulnerability: barricade-router-packet-dos
X-Force URL: http://www.iss.net/security_center/static/12263.php

Date Reported: 06/12/2003
Brief Description: ike-scan format string attack
Risk Factor: High
Attack Type: Host Based
Platforms: ike-scan prior to 1.2, Linux Any version, Unix Any
version, Windows Any version
Vulnerability: ike-scan-format-string
X-Force URL: http://www.iss.net/security_center/static/12276.php

Date Reported: 06/06/2003
Brief Description: MaxWebPortal search.asp cross-site scripting
Risk Factor: Medium
Attack Type: Network Based
Platforms: Linux Any version, MaxWebPortal 1.30, Windows Any
version
Vulnerability: maxwebportal-search-xss
X-Force URL: http://www.iss.net/security_center/static/12277.php

Date Reported: 06/06/2003
Brief Description: MaxWebPortal could allow an attacker to modify form
fields
Risk Factor: Medium
Attack Type: Network Based
Platforms: Linux Any version, MaxWebPortal 1.30, Windows Any
version
Vulnerability: maxwebportal-form-field-modify
X-Force URL: http://www.iss.net/security_center/static/12278.php

Date Reported: 06/06/2003
Brief Description: MaxWebPortal database file access
Risk Factor: Medium
Attack Type: Network Based
Platforms: Linux Any version, MaxWebPortal 1.30, Windows Any
version
Vulnerability: maxwebportal-database-access
X-Force URL: http://www.iss.net/security_center/static/12279.php

Date Reported: 06/06/2003
Brief Description: MaxWebPortal password reset
Risk Factor: Medium
Attack Type: Network Based
Platforms: Linux Any version, MaxWebPortal 1.30, Windows Any
version
Vulnerability: maxwebportal-password-reset
X-Force URL: http://www.iss.net/security_center/static/12280.php

Date Reported: 06/05/2003
Brief Description: NewsPHP comment cross-site scripting
Risk Factor: Medium
Attack Type: Network Based
Platforms: Linux Any version, NewsPHP Any version, Unix Any
version, Windows Any version
Vulnerability: newsphp-comment-xss
X-Force URL: http://www.iss.net/security_center/static/12281.php

Date Reported: 06/12/2003
Brief Description: WebBBS multiple denial of service
Risk Factor: Low
Attack Type: Network Based
Platforms: WebBBS Pro 1.8, Windows Any version
Vulnerability: webbbs-multiple-dos
X-Force URL: http://www.iss.net/security_center/static/12287.php

Date Reported: 06/04/2003
Brief Description: Cistron RADIUS NAS ports buffer overflow
Risk Factor: High
Attack Type: Network Based
Platforms: Cistron RADIUS Any version, Debian Linux 3.0, SuSE
Linux 7.2, SuSE Linux 7.3, SuSE Linux 8.0
Vulnerability: cistron-radius-nas-bo
X-Force URL: http://www.iss.net/security_center/static/12290.php

Date Reported: 06/13/2003
Brief Description: PostNuke modules.php cross-site scripting
Risk Factor: Medium
Attack Type: Network Based
Platforms: Linux Any version, PostNuke Phoenix 0.7.2.3, Unix
Any version, Windows Any version
Vulnerability: postnuke-modulesphp-xss
X-Force URL: http://www.iss.net/security_center/static/12291.php

Date Reported: 06/13/2003
Brief Description: PostNuke user.php cross-site scripting
Risk Factor: Medium
Attack Type: Network Based
Platforms: Linux Any version, PostNuke Phoenix 0.7.2.3, Unix
Any version, Windows Any version
Vulnerability: postnuke-user-xss
X-Force URL: http://www.iss.net/security_center/static/12292.php

Date Reported: 06/12/2003
Brief Description: Typespeed strcspn() function buffer overflow
Risk Factor: High
Attack Type: Network Based
Platforms: Linux Any version, Typespeed 0.4.1 and earlier
Vulnerability: typespeed-strcspn-bo
X-Force URL: http://www.iss.net/security_center/static/12297.php

Date Reported: 06/13/2003
Brief Description: Progress Database dlopen() allows attacker to gain
privileges
Risk Factor: High
Attack Type: Host Based
Platforms: Linux Any version, Progress Database 9.1D through
9.1D06, Unix Any version
Vulnerability: progress-dlopen-gain-privileges
X-Force URL: http://www.iss.net/security_center/static/12300.php

Date Reported: 06/13/2003
Brief Description: Progress Database _dbagent allows attacker to gain
privileges
Risk Factor: High
Attack Type: Host Based
Platforms: Linux Any version, Progress Database 9.1D through
9.1D06, Unix Any version
Vulnerability: progress-dbagent-gain-privileges
X-Force URL: http://www.iss.net/security_center/static/12301.php

Date Reported: 06/13/2003
Brief Description: MikMod long file name buffer overflow
Risk Factor: High
Attack Type: Host Based
Platforms: Debian Linux 2.2, Debian Linux 3.0, MikMod Any
version
Vulnerability: mikmod-long-filename-bo
X-Force URL: http://www.iss.net/security_center/static/12302.php

Date Reported: 06/14/2003
Brief Description: pMachineFree lib.inc.php PHP file include
Risk Factor: Medium
Attack Type: Network Based
Platforms: Linux Any version, pMachineFree 2.2.1, Unix Any
version, Windows Any version
Vulnerability: pmachinefree-php-file-include
X-Force URL: http://www.iss.net/security_center/static/12303.php

Date Reported: 06/15/2003
Brief Description: LedNews message cross-site scripting
Risk Factor: Medium
Attack Type: Network Based
Platforms: LedNews 0.7, Linux Any version, Unix Any version,
Windows Any version
Vulnerability: lednews-message-xss
X-Force URL: http://www.iss.net/security_center/static/12304.php
 
Old 06-16-2003, 07:10 PM   #4
unSpawn
Moderator
 
Registered: May 2001
Posts: 29,415

Original Poster
Blog Entries: 55

Rep: Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600
Jun 16th 2003 (SF) pt. 1/2

SecurityFocus

1. Sun Microsystems Java Virtual Machine Insecure Temporary File Vulnerability
BugTraq ID: 7848
Remote: No
Date Published: Jun 08 2003 12:00AM
Relevant URL: http://www.securityfocus.com/bid/7848
Summary:

The Java Virtual Machine is a component of the Java Runtime Environment,
distributed by Sun Microsystems.

A problem has been reported that may make it possible for an attacker to
gain unauthorized privileges.

It has been reported that the Java Virtual Machine distributed by Sun does
not safely generate temporary files. Because of this, an attacker may be
able to launch a symbolic link attack.

The problem is in the handling temporary files. When the Java Virtual
Machine is invoked, it creates a temporary file in the /tmp directory with
the prefix of jpsock.**_*, and varying characters in the place of the
asterisks. An attacker could create a range of symbolic links pointing to
a specific file, attempting to predict the future name of a temporary file
created by the JVM. Upon a successful guess, the file at the end of the
symbolic link would be overwritten.

5. Spyke PHP Board Information Disclosure Vulnerability
BugTraq ID: 7856
Remote: Yes
Date Published: Jun 09 2003 12:00AM
Relevant URL: http://www.securityfocus.com/bid/7856
Summary:

Spyke PHP Board is a web-based Content Management System (CMS) implemented
in PHP. It is available for a variety of platforms including Microsoft
Windows and Unix variant operating environments.

A vulnerability has been reported for Spyke's PHP Board that may result in
an attacker obtaining access to sensitive information.

The vulnerability exists due to the way the CMS stores data. Specifically,
the system uses plaintext files for the storage of sensitive information.

An attacker can exploit this vulnerability to issue a request for the
'info.dat' configuration file. This will return a plaintext file to the
attacker the contents of which contain administrative authentication
information.

User authentication information is stored under the 'user' directory with
a .TXT extension.

Information obtained in this manner may allow an attacker to launch
further destructive attacks against a vulnerable system.

This vulnerability was reported for Spyke PHP Board 2.1.

6. H-Sphere HTML Template Inclusion Cross-Site Scripting Vulnerabilities
BugTraq ID: 7855
Remote: Yes
Date Published: Jun 09 2003 12:00AM
Relevant URL: http://www.securityfocus.com/bid/7855
Summary:

H-Sphere is a multiserver web hosting application. H-Sphere is available
for Microsoft Windows, Linux, and Unix operating systems.

H-Sphere is prone to multiple cross-site scripting vulnerabilities via the
HTML template feature in the Hosting Control Panel. HTML and script code
will not be filtered from pages which are generated when a request for an
invalid or unknown template is made.

This could be exploited if a web user follows a malicious link to a site
hosting the vulnerable software that includes hostile HTML or script code.
This code would be executed in the context of the site hosting the
software. The link may also need to contain the username of a valid,
logged in user.

Successful exploitation could permit theft of cookie-based authentication
credentials from legitimate users of the Hosting Control Panel, which may
in turn permit unauthorized access to resources that are managed by the
software. Other attacks may also be possible.

15. MNOGoSearch Search.CGI UL Buffer Overflow Vulnerability
BugTraq ID: 7865
Remote: Yes
Date Published: Jun 10 2003 12:00AM
Relevant URL: http://www.securityfocus.com/bid/7865
Summary:

mnoGoSearch is multi-platform web search engine software for Intranet and
Internet servers.

mnoGoSearch 'search.cgi' has been reported prone to a buffer overflow
vulnerability.

The issue is a result of a lack of sufficient bounds checking performed on
a user-supplied URI parameter that is passed to the 'search.cgi'
application.

Reportedly, if a 'ul' URI parameter containing excessive data is passed in
a HTTP request for 'search.cgi', the bounds of an internal memory buffer
will be overrun. Memory adjacent to the affected buffer will be corrupted
with attacker-supplied values.

It has been reported that adjacent memory space contains values that are
crucial to the control of program execution flow. It is therefore possible
for the attacker to seize control of the 'search.cgi' application, and
have arbitrary code executed in the context of the web-server process.

This vulnerability was reported to exist in mnoGoSearch 3.1.20.

16. MNOGoSearch Search.CGI TMPLT Buffer Overflow Vulnerability
BugTraq ID: 7866
Remote: Yes
Date Published: Jun 10 2003 12:00AM
Relevant URL: http://www.securityfocus.com/bid/7866
Summary:

mnoGoSearch is multi-platform web search engine software for Intranet and
Internet servers.

mnoGoSearch 'search.cgi' has been reported prone to a buffer overflow
vulnerability.

The issue is a result of a lack of sufficient bounds checking performed on
a user-supplied URI parameter that is passed to the 'search.cgi'
application.

Reportedly, if a 'tmplt' URI parameter containing excessive data is passed
in a HTTP request for 'search.cgi', the bounds of an internal memory
buffer will be overrun. Memory adjacent to the affected buffer will be
corrupted with attacker-supplied values.

It has been reported that adjacent memory space contains values that are
crucial to the control of program execution flow. It is therefore possible
for the attacker to seize control of the 'search.cgi' application, and
have arbitrary code executed in the context of the web-server process.

This vulnerability was reported to exist in mnoGoSearch 3.2.10.

19. XMB Forum Member.PHP U2U Private Message HTML Injection Vulnerability
BugTraq ID: 7869
Remote: Yes
Date Published: Jun 10 2003 12:00AM
Relevant URL: http://www.securityfocus.com/bid/7869
Summary:

XMB Forum 1.8 is a web based discussion forum.

A vulnerability has been reported for XMB Forum 1.8 which may make it
prone to HTML injection attacks. The problem is said to occur while
viewing U2U private messages.

Specifically, U2U private messages may not be sufficiently sanitized of
malicious content. This may make it possible for an attacker to place HTML
or script code within the message body of a private U2U message for
another user. When the legitimate forum user attempts to view the message
the malicious code will be interpreted by their browser in the security
context of the forum website.

Attackers may potentially exploit this issue to manipulate web content or
to steal cookie-based authentication credentials. It may be possible to
take arbitrary actions as the victim user.

20. XMB Forum Member.PHP Location Field HTML Injection Vulnerability
BugTraq ID: 7870
Remote: Yes
Date Published: Jun 10 2003 12:00AM
Relevant URL: http://www.securityfocus.com/bid/7870
Summary:

XMB Forum is a web-based discussion forum.

A vulnerability has been reported in XMB Forum that may result in HTML
injection. The vulnerability occurs because XMB Forum fails to
sufficiently sanitize user-supplied input that is used for the 'Location'
field in a registered user's personal information page. Other fields may
also be similarly affected.

Due to this condition, a malicious user may be able to submit arbitrary
HTML code, as 'Location' field data. The arbitrary code will then be
displayed to unsuspecting users who view the XMB Forum member's profile
information. Any attacker-supplied code will be interpreted in a victim
user's web browser in the security context of the site hosting the
software.

It may be possible to steal the unsuspecting user's cookie-based
authentication credentials, as well as other sensitive information. Other
attacks may also be possible.

22. GZip ZNew Insecure Temporary File Creation Symbolic Link Vulnerability
BugTraq ID: 7872
Remote: No
Date Published: Jun 11 2003 12:00AM
Relevant URL: http://www.securityfocus.com/bid/7872
Summary:

gzip is a freely available, open source file compression utility. It is
maintained by public domain, and available for the Unix, Linux, and
Microsoft operating systems.

A problem with the utility may make the local destruction of data
possible.

It has been reported that gzip does not securely handle temporary files in
the znew script. Because of this, a local attacker may be able to launch
a symbolic link attack against sensitive files.

The problem is in the handling of checking for existing files. When the
znew script executes, it does not sufficiently validate the value returned
when the program checks for the existence of a file in the temporary
directory. Because of this, znew could potentially write to a symbolic
link that would destroy the data at the end of the symbolic link, provided
the user has sufficient privileges to write to the file. This may also
potentially lead to elevated privileges, though this theory is
unconfirmed.

24. RPM Package Manager FTP NLST Data Integer Overflow Remote Memory Corruption Vulnerability
BugTraq ID: 7874
Remote: Yes
Date Published: Jun 11 2003 12:00AM
Relevant URL: http://www.securityfocus.com/bid/7874
Summary:

The RPM Package Manager is a command line utility for creating, installing
and managing RPM packages. It is available for a wide range of Linux
distributions.

A vulnerability has been reported for the RPM Package Manager. The problem
occurs when using the application to access FTP listings on a remote
server. Specifically, RPM fails to sufficiently carry out sanity checks on
the size of data returned by an FTP NLST listing. The size value is
subsequently shifted 2 bits to the left, effectively increasing it's size
exponentially by 3, and is then used as a malloc() function parameter. The
NLST data is then copied into the buffer returned by malloc().

An attacker could exploit this issue by controlling a malicious FTP server
configured in such a way as to transmit NLST data in excess of 1 gigabyte.
If this were to occur, when the RPM application carried out the shift
procedure, the size value would overflow. As a result, an insufficient
memory buffer will be allocated to store the data.

The exploitability of this vulnerability to execute code is highly
implausible as copying data of this size will typically result in a page
fault. However, this issue could result in the exhaustion of available
system resources and would ultimately cause the RPM utility to crash.

25. Gnome FTP NLST Data Integer Overflow Memory Corruption Vulnerability
BugTraq ID: 7875
Remote: Yes
Date Published: Jun 11 2003 12:00AM
Relevant URL: http://www.securityfocus.com/bid/7875
Summary:

A vulnerability has been reported for Gnome. It has been reported that
when processing NLST data from an FTP server, various Gnome functions or
utilities may fail to sufficiently handle the size of data returned. Due
to subsequent calculations, insufficient data may be allocated for storage
of the NLST data. This may result in excessive data being copied into
insufficient memory, effectively causing a denial of service.

It should be noted that this issue presents itself when a large amount of
NLST data in excess of 1 gigabyte is received. As such, exploitation of
this issue will inevitably result in the exhaustion of available
resources, followed by a segmentation violation. Also, due to the
excessive amount of data copied to memory, the exploitability of this
issue to execute code may not be plausible. Furthermore, it is said that
the exploitation of this issue may only be possible on architectures with
specific variable width characteristics, typically 64-bit systems.

It should be noted that the precise details regarding this vulnerability
are currently unknown. The problem may lie in specific Gnome utilities or
possibly in Gnome library string parsing functions linked to by other
applications.

26. SMC Wireless Router Malformed PPTP Packet Denial of Service Vulnerability
BugTraq ID: 7876
Remote: Yes
Date Published: Jun 11 2003 12:00AM
Relevant URL: http://www.securityfocus.com/bid/7876
Summary:

SMC SMC7004VWBR is a wireless Cable/DSL broadband router with integrated
wireless access point and SPI firewall.

It has been discovered this device is prone to a denial of service attack.
The problem occurs when processing a sequence of malformed PPTP packets
transmitted to the router's internal interface.

The successful exploitation of this vulnerability will result in the
router no longer responding to internal wireless traffic. This will
effectively deny legitimate wireless users further network services.

It should be noted that the device would need to be physically reset to
restore typical functionality.

This vulnerability affects firmware versions earlier then 1.23.

27. Multiple Gnocatan Server Buffer Overflow Vulnerabilities
BugTraq ID: 7877
Remote: Yes
Date Published: Jun 12 2003 12:00AM
Relevant URL: http://www.securityfocus.com/bid/7877
Summary:

Gnocatan is a multiplayer game. It is available for Microsoft Windows and
Linux operating systems.

The Gnocatan game server is prone to multiple remotely exploitable buffer
overflow vulnerabilities. The vulnerabilities are due to insufficient
bounds checking of data supplied to the server, which could result in
corruption of memory with attacker-supplied values. These conditions
could potentially be exploited to execute malicious code in the context of
the server or to launch denial of service attacks.

Specific technical details regarding these vulnerabilities are not
available at this time. This BID will be updated as more details become
available.

28. Ethereal DCERPC Dissector Memory Allocation Vulnerability
BugTraq ID: 7878
Remote: Yes
Date Published: Jun 11 2003 12:00AM
Relevant URL: http://www.securityfocus.com/bid/7878
Summary:

Ethereal is a freely available, open source network traffic analysis tool.
It is maintained by the Ethereal Project and is available for most Unix
and Linux variants as well as Microsoft Windows operating systems.

The DCERPC dissector of Ethereal is prone to a condition whereby too much
memory may be allocated when decoding certain NDR strings.

The precise technical details of this vulnerability are currently unknown.
This BID will be updated as further information is available.

An attacker may be able to exploit this vulnerability by crafting a
specially formed packet and sending it to a system using the vulnerable
dissector or by convincing a victim user to use Ethereal to read a
malformed packet trace file.

This may result in the vulnerable Ethereal process allocating too much
memory. Repeated decoding of malformed NDR packets may result in the
consumption of all available memory resources which may lead to a denial
of service condition.

This vulnerability affects Ethereal 0.9.12 and earlier.

29. Ethereal SPNEGO Dissector Denial Of Service Vulnerability
BugTraq ID: 7879
Remote: Yes
Date Published: Jun 11 2003 12:00AM
Relevant URL: http://www.securityfocus.com/bid/7879
Summary:

Ethereal is a freely available, open source network traffic analysis tool.
It is maintained by the Ethereal Project and is available for most Unix
and Linux variants as well as Microsoft Windows operating systems.

The SPNEGO dissector of Ethereal, when parsing certain ASN.1 codes, may
cause a segmentation fault.

The precise technical details of this vulnerability are currently unknown.
This BID will be updated as further information is available.

An attacker may be able to exploit this vulnerability by crafting a
specially formed packet with an invalid ASN.1 value and sending it to a
system using the vulnerable dissector.

Due to the nature of this vulnerability, it may be possible for an
attacker to create a situation in which sensitive memory could be
overwritten. If successful this may allow for the execution of arbitrary
code with the privileges of the Ethereal process.

This vulnerability affects Ethereal 0.9.12 and earlier.

30. Ethereal OSI Dissector Buffer Overflow Vulnerability
BugTraq ID: 7880
Remote: Yes
Date Published: Jun 11 2003 12:00AM
Relevant URL: http://www.securityfocus.com/bid/7880
Summary:

Ethereal is a freely available, open source network traffic analysis tool.
It is maintained by the Ethereal Project and is available for most Unix
and Linux variants as well as Microsoft Windows operating systems.

The OSI dissector is prone to a buffer overflow condition when handling
bad IPv4 or IPv6 prefix lengths. This is likely due to insufficient bounds
checking.

It may be possible to construct an IPv4 or IPv6 packet that will, when
decoded by Ethereal, trigger the overflow condition. Successful
exploitation of this vulnerability may result in the attacker gaining
access to the Ethereal host via execution of attacker-supplied
instructions.

This BID will be updated when further technical details are disclosed.

This vulnerability affects Ethereal 0.9.12 and earlier.

31. Ethereal Multiple Dissector String Handling Vulnerabilities
BugTraq ID: 7881
Remote: Yes
Date Published: Jun 11 2003 12:00AM
Relevant URL: http://www.securityfocus.com/bid/7881
Summary:

Ethereal is a freely available, open source network traffic analysis tool.
It is maintained by the Ethereal Project and is available for most Unix
and Linux variants as well as Microsoft Windows operating systems.

Several dissectors included with Ethereal do not properly handle strings.
Exploitation of this issue may allow an attacker to cause Ethereal to
behave in an unpredictable manner. The BGP, WTP, DNS, 802.11, ISAKMP, WSP,
CLNP, ISIS, and RMI dissectors are vulnerable to this issue.

The precise technical details of this vulnerability are currently unknown.
This BID will be updated as further information is available.

An attacker may be able to exploit this vulnerability by crafting a
specially formed packet and sending it to a system using the vulnerable
dissectors or by convincing a victim user to use Ethereal to read a
malformed packet trace file.

Due to the nature of this vulnerability, it may be possible for an
attacker to create a situation in which sensitive memory could be
overwritten. If successful this may allow for the execution of arbitrary
code with the privileges of the Ethereal process.

This vulnerability affects Ethereal 0.9.12 and earlier.

32. Ethereal TVB_GET_NSTRINGZ0() Memory Handling Vulnerability
BugTraq ID: 7883
Remote: Yes
Date Published: Jun 11 2003 12:00AM
Relevant URL: http://www.securityfocus.com/bid/7883
Summary:

Ethereal is a freely available, open source network traffic analysis tool.
It is maintained by the Ethereal Project and is available for most Unix
and Linux variants as well as Microsoft Windows operating systems.

An Ethereal routine, tvb_get_nstringz0(), has been reported prone to a
memory handling vulnerability. Reportedly tvb_get_nstringz0() incorrectly
handles a zero-length buffer size. Although unconfirmed, it has been
conjectured that this issue may be due to an incorrect allocation of
memory, caused when an unsigned integer is used when calculating the size
of memory to be allocated.

Exploitation of this issue may allow an attacker to cause Ethereal to
behave in an unpredictable manner.

Due to the nature of this vulnerability, it may be possible for an
attacker to create a situation in which sensitive memory could be
overwritten. If successful this may allow for either a remotely triggered
denial of service condition or ultimately in the execution of arbitrary
code with the privileges of the Ethereal process.

The precise technical details of this vulnerability are currently unknown.
This BID will be updated, as further information is available.

This vulnerability affects Ethereal 0.9.12 and earlier.

33. FakeBO Syslog Format String Vulnerability
BugTraq ID: 7882
Remote: Yes
Date Published: Jun 12 2003 12:00AM
Relevant URL: http://www.securityfocus.com/bid/7882
Summary:

FakeBO is a utility to log common trojan attempts in an effort to possibly
emulate one. It may also be used in a honeypot setup to facilitate
security monitoring. It is available for Microsoft Windows, Linux, and
Unix variant operating systems.

A vulnerability has been reported for FakeBO that may result in an
attacker obtaining elevated privileges on a target system.

Due to a programming error, it may be possible to exploit a format string
vulnerability in the affected utility. Specifically, a logging function in
FakeBO contains insecure syslog() calls. This could result in the
execution of attacker-supplied code.

The vulnerability occurs when FakeBO resolves a carefully constructed
hostname that include malicious format string specifiers. In the event
that this vulnerability is exploited, an attacker could cause arbitrary
locations in memory to be corrupted with attacker-specified data and
execute code with elevated privileges.

This vulnerability was reported for FakeBO 0.4.1.

36. MySQL libmysqlclient Library mysql_real_connect() Buffer Overrun Vulnerability
BugTraq ID: 7887
Remote: Yes
Date Published: Jun 12 2003 12:00AM
Relevant URL: http://www.securityfocus.com/bid/7887
Summary:

MySQL is an open source relational database project, and is available for
a number of operating systems, including Microsoft Windows.

MySQL contains a library called libmysqlclient. A problem exists in the
sql_real_connect() function of the libmysqlclient library that could
result in a buffer being overrun.

The problem likely occurs due to insufficient bounds checking of
user-supplied parameters and could allow an attacker to corrupt sensitive
process memory. It is possible to trigger this condition by supplying a
parameter containing approximately 350 or more bytes of data.

An attacker could potentially be capable of exploiting this issue to
execute arbitrary code on a remote system. It should be noted that this
issue would be required to be exploited in conjunction with an unrelated
remote SQL injection attack or possibly used on a system which allows for
the uploading of scripts.

41. Typespeed Remote Memory Corruption Vulnerability
BugTraq ID: 7891
Remote: Yes
Date Published: Jun 13 2003 12:00AM
Relevant URL: http://www.securityfocus.com/bid/7891
Summary:

Typespeed is a game designed to test typing skills. It is available for
the Linux operating system. Typespeed is installed setgid 'games' by
default on the Debian Linux distribution.

A memory corruption vulnerability has been reported for Typespeed that may
result in code execution with elevated privileges. The vulnerability
exists in the net_swapscore() function of the 'network.c' source file.
Specifically, proper bounds checks are not performed prior to executing
the 'strncpy' function.

A remote attacker may be able to exploit this vulnerability to corrupt
sensitive with attacker-supplied code.

This vulnerability was reported for Typespeed 0.4.1 and earlier.
 
Old 06-16-2003, 07:11 PM   #5
unSpawn
Moderator
 
Registered: May 2001
Posts: 29,415

Original Poster
Blog Entries: 55

Rep: Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600
Jun 16th 2003 (SF) pt. 2/2

SecurityFocus

42. Lyskom Server Unauthenticated User Denial Of Service Vulnerability
BugTraq ID: 7893
Remote: Yes
Date Published: Jun 13 2003 12:00AM
Relevant URL: http://www.securityfocus.com/bid/7893
Summary:

Lyskom server is a tool to facilitate internal conferences and meetings.
It has functionality similar to ICQ and AIM.

A vulnerability has been reported for Lyskom that may result in a denial
of service condition.

The vulnerability exists when the server attempts to process a query sent
by an unauthenticated user.

The precise technical details of this vulnerability are currently unknown.
This BID will be updated as further information becomes available.

This vulnerability was reported to affect Lyskom server 2.0.7 and earlier.

43. Cistron RADIUS Remote Signed NAS-Port Number Expansion Memory Corruption Vulnerability
BugTraq ID: 7892
Remote: Yes
Date Published: Jun 13 2003 12:00AM
Relevant URL: http://www.securityfocus.com/bid/7892
Summary:

A vulnerability has been discovered in the Cistron RADIUS server. The
problem is due to the way the application processes user-supplied NAS-Port
values.

The issue occurs within the make_wtmp function when making a call to
sprintf(). Specifically, the '%03d' format specifier is used to interpret
the user-supplied nas_port variable. The problem lies in the fact that the
nas_port variable could hold a signed integer value. If the value were a
negative value greater then 1 billion (10 digits), the sprintf() function
would expand the integer up to 11 bytes. This is due to a minus '-' symbol
being prepended to the 10 byte value.

Due to this unexpected value expansion, the 'buf[32]' character array may
be overrun by 1 byte. This is due to the sprintf() call also appending a
semicolon ':', 20 bytes of data and a NUL byte to the buffer, after
interpreting the port value.

This issue could pose a security threat as the NUL byte could potentially
corrupt the LSB of the current frames saved frame pointer. This could
result in a situation under which an attacker-supplied memory address
could be popped as an instruction pointer, effectively resulting in the
execution of arbitrary code.

It should be noted that the exploitability of this issue is heavily
dependant on the layout of the process in memory, which is compiler
dependant. It has been reported however that under some circumstances this
issue may affect data stored from previously processed packets or possibly
other sensitive stack variables.
 
  


Reply



Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
LQ weekly security rep - Jun 24th 2003 unSpawn Linux - Security 4 06-24-2003 08:50 PM
LQ weekly security rep - Jun 09th 2003 unSpawn Linux - Security 3 06-09-2003 08:27 PM
LQ weekly security rep - Jun 04th 2003 unSpawn Linux - Security 4 06-04-2003 05:21 AM
LQ weekly security rep - Mon Dec 16th 2002 unSpawn Linux - Security 3 12-22-2002 08:24 AM
LQ weekly security rep - wed jun 16th 2002 unSpawn Linux - Security 6 06-20-2002 04:05 AM

LinuxQuestions.org > Forums > Linux Forums > Linux - Security

All times are GMT -5. The time now is 03:32 PM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration