LinuxQuestions.org
Download your favorite Linux distribution at LQ ISO.
Home Forums Tutorials Articles Register
Go Back   LinuxQuestions.org > Forums > Linux Forums > Linux - Security
User Name
Password
Linux - Security This forum is for all security related questions.
Questions, tips, system compromises, firewalls, etc. are all included here.

Notices


Reply
  Search this Thread
Old 02-17-2003, 06:25 PM   #1
unSpawn
Moderator
 
Registered: May 2001
Posts: 29,415
Blog Entries: 55

Rep: Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600
LQ weekly security rep - Mon Feb 17th 2003


Feb 19th 2003
OpenSSL 0.9.7a available, including important bugfixes.

Feb 17th 2003
15 of 28 issues handled (SF)
1. W3M Frame Enabled Browsing Cross Site Scripting Vulnerability
2. W3M Image Attribute Cross Site Scripting Vulnerability
4. Red Hat Linux User Mode Linux SetUID Installation Vulnerability
7. Netgear FM114P Wireless Firewall File Disclosure Vulnerability
8. Nethack Local Buffer Overflow Vulnerability
10. Opera Username URI Warning Dialog Buffer Overflow Vulnerability
11. Gallery Insecure File Permissions Vulnerability
14. Opera opera.PluginContext Native Method Buffer Overflow Vulnerability
15. Eset Software NOD32 Antivirus Local Buffer Overflow Vulnerability
17. Cedric Email Reader Global Configuration Script Remote File Include Vulnerability
18. Cedric Email Reader Skin Configuration Script Remote File Include Vulnerability
20. Cisco IOS ICMP Redirect Routing Table Modification Vulnerability
21. Ericsson HM220dp DSL Modem World Accessible Web Administration Interface Vulnerability
22. APC apcupsd Client Syslog Format String Vulnerability
24. CGI Lite Perl Module Metacharacter Input Validation Vulnerability

Feb 17th 2003
26 of 48 issues handled (ISS)
Unreal Tournament Server known file directory
Unreal Tournament Server long Unreal URL request
Unreal Tournament Server malformed packet denial of
Unreal Tournament Server request to join denial of
Unreal Tournament Server large negative index
eSafe Gateway Check Point Content Vectoring
Cedric Email Reader PHP file include
NETGEAR FM114P hexadecimal URL encoded "dot dot"
NetHack -s command buffer overflow
Gallery creates an insecure album directory
Abyss Web Server Web management interface brute
NOD32 for UNIX long pathname buffer overflow
Posadis DNS packet denial of service
Ericsson HM220dp could allow an attacker to bypass
Solaris mail(1) could allow unauthorized access to
Cisco IOS invalid ICMP redirects could reroute
CGI::Lite Perl module escape_dangerous_chars()
Oracle Database Server BFILENAME() DIRECTORY buffer
Oracle Database Server TZ_OFFSET() buffer overflow
Oracle Database Server TO_TIMESTAMP_TZ() buffer
Oracle Database Server ORACLE.EXE buffer overflow
Oracle9i Application Server DAV_PUBLIC directory
Oracle9i Application Server MOD_ORADAV module
Lotus Domino Web server "dot" file download
util-linux mcookie utility generates predictable
Apcupsd log_event() function format string attack

Last edited by unSpawn; 02-19-2003 at 12:31 PM.
 
Old 02-17-2003, 06:26 PM   #2
unSpawn
Moderator
 
Registered: May 2001
Posts: 29,415

Original Poster
Blog Entries: 55

Rep: Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600
Feb 17th 2003 (ISS)

Internet Security Systems

Date Reported: 02/05/2003
Brief Description: Unreal Tournament Server known file directory
traversal
Risk Factor: Low
Attack Type: Network Based
Platforms: Linux Any version, Windows Any version, Unreal
Tournament Server 436 and earlier
Vulnerability: ut-file-directory-traversal
X-Force URL: http://www.iss.net/security_center/static/11299.php

Date Reported: 02/05/2003
Brief Description: Unreal Tournament Server long Unreal URL request
memory corruption
Risk Factor: Low
Attack Type: Network Based
Platforms: Linux Any version, Windows Any version, Unreal
Tournament Server 436 and earlier
Vulnerability: ut-url-memory-corruption
X-Force URL: http://www.iss.net/security_center/static/11301.php

Date Reported: 02/05/2003
Brief Description: Unreal Tournament Server malformed packet denial of
service
Risk Factor: Low
Attack Type: Network Based
Platforms: Linux Any version, Windows Any version, Unreal
Tournament Server 436 and earlier
Vulnerability: ut-packet-dos
X-Force URL: http://www.iss.net/security_center/static/11302.php

Date Reported: 02/05/2003
Brief Description: Unreal Tournament Server request to join denial of
service
Risk Factor: Low
Attack Type: Network Based
Platforms: Linux Any version, Windows Any version, Unreal
Tournament Server 436 and earlier
Vulnerability: ut-join-request-dos
X-Force URL: http://www.iss.net/security_center/static/11304.php

Date Reported: 02/05/2003
Brief Description: Unreal Tournament Server large negative index
memory corruption
Risk Factor: High
Attack Type: Host Based
Platforms: Linux Any version, Windows Any version, Unreal
Tournament Server 436 and earlier
Vulnerability: ut-negative-memory-corruption
X-Force URL: http://www.iss.net/security_center/static/11305.php

Date Reported: 02/06/2003
Brief Description: eSafe Gateway Check Point Content Vectoring
Protocol (CVP) messages could bypass content
filtering
Risk Factor: High
Attack Type: Network Based
Platforms: Linux Any version, Windows Any version, eSafe
Gateway 3.5 Build 126
Vulnerability: esafe-gateway-filter-bypass
X-Force URL: http://www.iss.net/security_center/static/11295.php

Date Reported: 02/09/2003
Brief Description: Cedric Email Reader PHP file include
Risk Factor: Medium
Attack Type: Host Based / Network Based
Platforms: Linux Any version, Windows Any version, Unix Any
version, Cedric Email Reader 0.2, Cedric Email
Reader 0.3, Cedric Email Reader 0.4
Vulnerability: cedric-email-file-include
X-Force URL: http://www.iss.net/security_center/static/11278.php

Date Reported: 02/09/2003
Brief Description: NETGEAR FM114P hexadecimal URL encoded "dot dot"
directory traversal
Risk Factor: Medium
Attack Type: Network Based
Platforms: NETGEAR FM114P 1.4 Beta Release 17
Vulnerability: netgear-fm114p-directory-traversal
X-Force URL: http://www.iss.net/security_center/static/11279.php

Date Reported: 02/09/2003
Brief Description: NetHack -s command buffer overflow
Risk Factor: High
Attack Type: Host Based
Platforms: FreeBSD Ports Collection Any version, Red Hat Linux
8.0, NetHack 3.4.0
Vulnerability: nethack-s-command-bo
X-Force URL: http://www.iss.net/security_center/static/11283.php

Date Reported: 02/09/2003
Brief Description: Gallery creates an insecure album directory
Risk Factor: Medium
Attack Type: Host Based
Platforms: Linux Any version, Gallery 1.3.3
Vulnerability: gallery-album-insecure-directory
X-Force URL: http://www.iss.net/security_center/static/11284.php

Date Reported: 02/09/2003
Brief Description: Abyss Web Server Web management interface brute
force attack
Risk Factor: Low
Attack Type: Network Based
Platforms: Linux Any version, Windows Any version, Abyss Web
Server 1.1.2 and prior
Vulnerability: abyss-web-admin-bruteforce
X-Force URL: http://www.iss.net/security_center/static/11310.php

Date Reported: 02/10/2003
Brief Description: NOD32 for UNIX long pathname buffer overflow
Risk Factor: High
Attack Type: Host Based
Platforms: NOD32 for UNIX 1.012 and earlier, Unix Any version
Vulnerability: nod32-pathname-bo
X-Force URL: http://www.iss.net/security_center/static/11282.php

Date Reported: 02/11/2003
Brief Description: Posadis DNS packet denial of service
Risk Factor: Low
Attack Type: Network Based
Platforms: Linux Any version, Windows Any version, Unix Any
version, Posadis 0.50.4, Posadis 0.50.5, Posadis
0.50.6, Posadis 0.50.7, Posadis 0.50.8
Vulnerability: posadis-dns-packet-dos
X-Force URL: http://www.iss.net/security_center/static/11285.php

Date Reported: 02/11/2003
Brief Description: Ericsson HM220dp could allow an attacker to bypass
authentication
Risk Factor: Medium
Attack Type: Network Based
Platforms: Ericsson HM220dp Any version
Vulnerability: ericsson-hm220dp-auth-bypass
X-Force URL: http://www.iss.net/security_center/static/11290.php

Date Reported: 02/11/2003
Brief Description: Solaris mail(1) could allow unauthorized access to
other user's email
Risk Factor: Medium
Attack Type: Host Based
Platforms: Solaris 2.6, Solaris 7, Solaris 8, Solaris 9
Vulnerability: solaris-mail-unauthorized-access
X-Force URL: http://www.iss.net/security_center/static/11303.php

Date Reported: 02/11/2003
Brief Description: Cisco IOS invalid ICMP redirects could reroute
packets
Risk Factor: Medium
Attack Type: Network Based
Platforms: Cisco IOS Any version
Vulnerability: cisco-ios-icmp-redirect
X-Force URL: http://www.iss.net/security_center/static/11306.php

Date Reported: 02/11/2003
Brief Description: CGI::Lite Perl module escape_dangerous_chars()
shell command execution
Risk Factor: High
Attack Type: Network Based
Platforms: Linux Any version, Windows Any version, Unix Any
version, CGI::Lite 2.0
Vulnerability: cgilite-shell-command-execution
X-Force URL: http://www.iss.net/security_center/static/11308.php

Date Reported: 02/11/2003
Brief Description: Oracle Database Server BFILENAME() DIRECTORY buffer
overflow
Risk Factor: High
Attack Type: Network Based
Platforms: AIX Any version, HP-UX Any version, IRIX Any
version, Linux Any version, Solaris Any version,
Tru64 UNIX Any version, Windows NT Any version,
DG/UX Any version, Novell NetWare Any version,
Windows 2000 Any version, Windows XP, OpenVMS Any
version, Oracle9i Database Server Release 2 Any
version, Oracle9i Database Server Release 1 Any
version, Oracle8i Database Server 8.1.7, Oracle8i
Database Server 8.0.6, Caldera UnixWare Any
version, IBM OS/390 Any version
Vulnerability: oracle-bfilename-directory-bo
X-Force URL: http://www.iss.net/security_center/static/11325.php

Date Reported: 02/11/2003
Brief Description: Oracle Database Server TZ_OFFSET() buffer overflow
Risk Factor: High
Attack Type: Network Based
Platforms: AIX Any version, HP-UX Any version, IRIX Any
version, Linux Any version, Solaris Any version,
Tru64 UNIX Any version, Windows NT Any version,
DG/UX Any version, Novell NetWare Any version,
Windows 2000 Any version, Windows XP, OpenVMS Any
version, Oracle9i Database Server Release 2 Any
version, Oracle9i Database Server Release 1 Any
version, Oracle8i Database Server 8.1.7, Oracle8i
Database Server 8.0.6, Caldera UnixWare Any
version, IBM OS/390 Any version
Vulnerability: oracle-tzoffset-bo
X-Force URL: http://www.iss.net/security_center/static/11326.php

Date Reported: 02/11/2003
Brief Description: Oracle Database Server TO_TIMESTAMP_TZ() buffer
overflow
Risk Factor: High
Attack Type: Network Based
Platforms: AIX Any version, HP-UX Any version, IRIX Any
version, Linux Any version, Solaris Any version,
Tru64 UNIX Any version, Windows NT Any version,
DG/UX Any version, Novell NetWare Any version,
Windows 2000 Any version, Windows XP, OpenVMS Any
version, Oracle9i Database Server Release 2 Any
version, Oracle9i Database Server Release 1 Any
version, Oracle8i Database Server 8.1.7, Oracle8i
Database Server 8.0.6, Caldera UnixWare Any
version, IBM OS/390 Any version
Vulnerability: oracle-totimestamptz-bo
X-Force URL: http://www.iss.net/security_center/static/11327.php

Date Reported: 02/11/2003
Brief Description: Oracle Database Server ORACLE.EXE buffer overflow
Risk Factor: High
Attack Type: Network Based
Platforms: AIX Any version, HP-UX Any version, IRIX Any
version, Linux Any version, Solaris Any version,
Tru64 UNIX Any version, Windows NT Any version,
DG/UX Any version, Novell NetWare Any version,
Windows 2000 Any version, Windows XP, OpenVMS Any
version, Oracle9i Database Server Release 2 Any
version, Oracle9i Database Server Release 1 Any
version, Oracle8i Database Server 8.1.7, Oracle8i
Database Server 8.0.6, Caldera UnixWare Any
version, IBM OS/390 Any version
Vulnerability: oracle-oracle-exe-bo
X-Force URL: http://www.iss.net/security_center/static/11328.php

Date Reported: 02/11/2003
Brief Description: Oracle9i Application Server DAV_PUBLIC directory
denial of service
Risk Factor: Medium
Attack Type: Network Based
Platforms: AIX Any version, HP-UX Any version, Linux Any
version, Solaris Any version, Tru64 UNIX Any
version, Windows NT Any version, Windows 2000 Any
version, Oracle9i Application Server 9.0.2
Vulnerability: oracle-appserver-davpublic-dos
X-Force URL: http://www.iss.net/security_center/static/11330.php

Date Reported: 02/11/2003
Brief Description: Oracle9i Application Server MOD_ORADAV module
denial of service
Risk Factor: Medium
Attack Type: Network Based
Platforms: AIX Any version, HP-UX Any version, Linux Any
version, Solaris Any version, Tru64 UNIX Any
version, Windows NT Any version, Windows 2000 Any
version, Oracle9i Application Server 9.0.2,
Oracle9i Application Server 9.0.3
Vulnerability: oracle-appserver-modoradav-dos
X-Force URL: http://www.iss.net/security_center/static/11331.php

Date Reported: 02/12/2003
Brief Description: Lotus Domino Web server "dot" file download
Risk Factor: Medium
Attack Type: Network Based
Platforms: Linux Any version, Windows Any version, Unix Any
version, Lotus Domino 5.x, Lotus Domino 6.x
Vulnerability: lotus-domino-dot-file-download
X-Force URL: http://www.iss.net/security_center/static/11311.php

Date Reported: 02/13/2003
Brief Description: util-linux mcookie utility generates predictable
cookies
Risk Factor: Low
Attack Type: Host Based
Platforms: Mandrake Linux 8.2, Mandrake Linux 9.0
Vulnerability: utillinux-mcookie-cookie-predictable
X-Force URL: http://www.iss.net/security_center/static/11318.php

Date Reported: 02/15/2003
Brief Description: Apcupsd log_event() function format string attack
Risk Factor: High
Attack Type: Network Based
Platforms: Linux Any version, Unix Any version, Apcupsd 3.8.5
and earlier, Apcupsd 3.10.4 and earlier
Vulnerability: apcupsd-logevent-format-string
X-Force URL: http://www.iss.net/security_center/static/11334.php
 
Old 02-17-2003, 06:29 PM   #3
unSpawn
Moderator
 
Registered: May 2001
Posts: 29,415

Original Poster
Blog Entries: 55

Rep: Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600
Feb 17th 2003 (SF)

SecurityFocus

1. W3M Frame Enabled Browsing Cross Site Scripting Vulnerability
BugTraq ID: 6793
Remote: Yes
Date Published: Feb 07 2003 12:00AM
Relevant URL: http://www.securityfocus.com/bid/6793
Summary:

W3M is a text-based Web browser. It is developed for several platforms
including Linux and Unix variant operating systems.

A cross site scripting vulnerability has been reported for W3M if frames
support is enabled. Due to inadequate sanitization of some HTML tags, it
is possible for an attacker to steal another user's cookie information or
other sensitive data. Specifically, W3M does not fully sanitize malicious
HTML code from FRAME tags.

It should be noted that this vulnerability is exploitable only if W3M is
executed with the '-F' commandline option.

This vulnerability has been reported to affect W3M 0.3.2. It is likely
that earlier versions are affected.

2. W3M Image Attribute Cross Site Scripting Vulnerability
BugTraq ID: 6794
Remote: Yes
Date Published: Feb 07 2003 12:00AM
Relevant URL: http://www.securityfocus.com/bid/6794
Summary:

W3M is a text-based Web browser. It is developed for several platforms
including Linux and Unix variant operating systems.

A cross site scripting vulnerability has been reported for W3M. Due to
inadequate sanitization of some HTML tags, it is possible for an attacker
to steal another user's cookie information or other sensitive data.
Specifically, W3M does not fully sanitize malicious HTML code from IMAGE
tags.

This vulnerability has been reported to affect W3M 0.3.2.2 and earlier.

4. Red Hat Linux User Mode Linux SetUID Installation Vulnerability
BugTraq ID: 6801
Remote: No
Date Published: Feb 07 2003 12:00AM
Relevant URL: http://www.securityfocus.com/bid/6801
Summary:

Red Hat Linux is a freely available, open source operating system
distributed by Red Hat Incorporated.

A problem with a component of the kernel-utils package may make it
possible for local users to perform unauthorized activities.

It has been reported that under some circumstances, Red Hat Linux may
allow unauthorized actions through User-Mode-Linux compatibility. Due to
permissions on some components installed with the User-Mode-Linux
utilities, a local user could perform actions on the system that require
privilege, potentially affecting local host security.

The problem is in the setuid bit given to the uml_net program. When
installed with the kernel-utils package, the program is installed setuid
root. A local user could execute this program to control network
interfaces, or manipulate some network settings.

7. Netgear FM114P Wireless Firewall File Disclosure Vulnerability
BugTraq ID: 6807
Remote: Yes
Date Published: Feb 10 2003 12:00AM
Relevant URL: http://www.securityfocus.com/bid/6807
Summary:

Netgear FM114P Cable/DSL Prosafe 802.11b Wireless Firewall is a hardware
appliance that can allow several systems to share a single broadband
Internet connection. The device also includes a firewall and is managed
through a web interface.

A directory traversal vulnerability exists in the FM114P's web
administration interface.

The firewall does not properly sanitize URL requests. Starting from the
upnp/service directory on the firewall, it is possible for an
unauthenticated user to traverse out of this directory using escaped
character sequences. Submitting the following request to the firewall
would retrieve the configuration file:
http://<ip-or-hostname>:<port>/upnp/service/%2e%2e%2fnetgear.cfg

This could allow an unauthenticated user to retrieve the firewall's
configuration file and possibly other sensitive information.

This vulnerability was reported to affect firmware version 1.4 Beta 17.
Other versions may also be affected.

8. Nethack Local Buffer Overflow Vulnerability
BugTraq ID: 6806
Remote: No
Date Published: Feb 10 2003 12:00AM
Relevant URL: http://www.securityfocus.com/bid/6806
Summary:

Nethack is a game included with several distributions of Linux including
RedHat Linux. It has been reported that Nethack fails to drop privileges,
potentially resulting in privilege escalation.

A buffer overflow has been discovered in Nethack when invoked with the
'-s' command line option. By passing an overly large string, consisting of
at least 1000 characters, to the '-s' command line option of
/usr/games/lib/nethackdir/nethack, it is possible to corrupt memory.

By exploiting this issue it may be possible for an attacker to overwrite
values in sensitive areas of memory, resulting in the execution of
arbitrary attacker-supplied code.

Nethack distributed with RedHat Linux is shipped with setgid 'games'
privileges. Successful exploitation would result in the escalation of
privileges to the 'games' group, which could result in the corruption of
saved game data, as well as storage consumption.

10. Opera Username URI Warning Dialog Buffer Overflow Vulnerability
BugTraq ID: 6811
Remote: Yes
Date Published: Feb 10 2003 12:00AM
Relevant URL: http://www.securityfocus.com/bid/6811
Summary:

Opera is a web client available for a number of platforms including Unix
and Linux variants, and Microsoft Windows operating systems.

For security purposes, Opera will display a warning any time a user of the
client visits a link containing a username as part of the URI. Bounds
checking is not performed on the length of the username when it is copied
into a local buffer for display in the warning message.

An excessively long username in a link will trigger a buffer overflow
condition that may overwrite the stack frame of the affected function.
Attackers may exploit this vulnerability to execute instructions on client
systems. This condition may be exploited from a malicious webpage.
Exploitation may occur through links, image tags, frames or other means.

This issue was reported for Opera on Microsoft Windows platforms. It is not known if other platforms are affected.

11. Gallery Insecure File Permissions Vulnerability
BugTraq ID: 6809
Remote: No
Date Published: Feb 10 2003 12:00AM
Relevant URL: http://www.securityfocus.com/bid/6809
Summary:

Gallery is a web based photo album written using PHP. Gallery is used to
create and maintain albums of photos via a web-based interface.

A problem has been reported in the Gallery application. When creating
'temp' and 'albums' directories and managing image files, Gallery uses
unsafe file permissions. Specifically, Gallery creates these folders with
the same group and owner permissions of the web server.

As a result anyone who may have access to local web server resources may
gain access to other users' Gallery albums.

This vulnerability could lead to local users obtaining unauthorized access
to sensitive files by causing the web server to execute a malicious
script.

This vulnerability was reported for Gallery version 1.3.3. It is not known
if earlier versions are affected by this vulnerability.

14. Opera opera.PluginContext Native Method Buffer Overflow Vulnerability
BugTraq ID: 6814
Remote: Yes
Date Published: Feb 10 2003 12:00AM
Relevant URL: http://www.securityfocus.com/bid/6814
Summary:

Opera is a web client available for a number of platforms including Unix
and Linux variants, and Microsoft Windows operating systems.

Opera ships with a trusted Java class ('opera.PluginContext') that
includes a native method that is reportedly vulnerable to a buffer
overflow condition. This issue exists in the 'showDocument' method of the
'opera.PluginContext' class. If a URL object containing a URL String of
excessive length is passed to the method, the JVM and browser will crash.
This may be due to a buffer overflow condition in the native method
(native methods can be written in C).

This issue was reported in versions of Opera for Microsoft Windows
operating systems. It is not known if other platforms are also affected.
Java support must enabled for this issue to be present and can be disabled
to prevent attacks.

15. Eset Software NOD32 Antivirus Local Buffer Overflow Vulnerability
BugTraq ID: 6803
Remote: No
Date Published: Feb 10 2003 12:00AM
Relevant URL: http://www.securityfocus.com/bid/6803
Summary:

Eset Software's NOD32 Antivirus System is a cross-platform anti-virus
application. It is available for a variety of platforms including the
Microsoft Windows, Linux, and BSD-derived operating systems.

A vulnerability has been discovered in NOD32 for the Linux and Unix
platforms. Due to insufficient bounds checking a buffer overflow occurs
when NOD32 processes file system paths of excessive length. Specifically,
a path name containing 500, or more, bytes of data will trigger memory
corruption.

This vulnerability could be exploited by coaxing a user to scan a
malicious location with the NOD32 Antivirus software. When the path of
excessive length is processed by NOD32, sensitive memory will be
corrupted. By exploiting this issue to execute code it is possible run
arbitrary commands with the privileges of the user running NOD32.

This issue affects NOD32 versions 1.012 and earlier.

17. Cedric Email Reader Global Configuration Script Remote File Include Vulnerability
BugTraq ID: 6820
Remote: Yes
Date Published: Feb 09 2003 12:00AM
Relevant URL: http://www.securityfocus.com/bid/6820
Summary:

Cedric Email Reader is a web mail application. It is implemented in PHP
and available for Unix and Linux variants as well as Microsoft Windows
operating systems.

It has been reported that Cedric Email Reader is prone to an issue that
may allow remote attackers to include files located on remote servers.
This issue is present in the 'emailreader_execute_on_each_page.inc.php'
script.

Under some circumstances, it is possible for remote attackers to influence
the include path for a configuration file to point to an external file on
a remote server. The attacker may cause this to occur by submitting a
path to an external file as the '$emailreader_ini' URI parameter.

If the remote file is a PHP script, this may be exploited to execute
arbitrary system commands in the context of the web server.

It has also been reported that it is possible to cause local files to be
included, resulting in disclosure of webserver readable files to the
attacker. This has not been confirmed.

18. Cedric Email Reader Skin Configuration Script Remote File Include Vulnerability
BugTraq ID: 6818
Remote: Yes
Date Published: Feb 09 2003 12:00AM
Relevant URL: http://www.securityfocus.com/bid/6818
Summary:

Cedric Email Reader is a web mail application. It is implemented in PHP
and available for Unix and Linux variants as well as Microsoft Windows
operating systems.

It has been reported that Cedric Email Reader is prone to an issue that
may allow remote attackers to include files located on remote servers.
This issue is present in the 'email.php' script.

Under some circumstances, it is possible for remote attackers to influence
the include path for a configuration file to point to an external file on
a remote server. The attacker may cause this to occur by submitting a
path to an external file as the '$cer_skin' URI parameter.

If the remote file is a PHP script, this may be exploited to execute
arbitrary system commands in the context of the web server.

It has also been reported that it is possible to cause local files to be
included, resulting in disclosure of webserver readable files to the
attacker. This has not been confirmed.

20. Cisco IOS ICMP Redirect Routing Table Modification Vulnerability
BugTraq ID: 6823
Remote: Yes
Date Published: Feb 11 2003 12:00AM
Relevant URL: http://www.securityfocus.com/bid/6823
Summary:

Internet Operating System (IOS) is the firmware used on Cisco routers. It
is distributed and maintained by Cisco.

It has been reported that it is possible to make arbitrary remote
modifications to the Cisco IOS routing table.

If IP routing is disabled on a vulnerable router, the router will accept
malicious ICMP redirect packets and modify its routing table accordingly.
ICMP redirect messages are normally sent to indicate inefficient routing,
a new route or a routing change. An attacker may specify a default gateway
on the local network that does not exist this would effectively deny
service to any destination that is outside the local subnet. This
vulnerability requires that IP routing be explicitly disabled on the
system using an affected version of Cisco IOS, thus making the router a
host on the network.

The attacker may also intercept network data by making routing table
modifications to redirect network communications through the attacker's
machine.

21. Ericsson HM220dp DSL Modem World Accessible Web Administration Interface Vulnerability
BugTraq ID: 6824
Remote: Yes
Date Published: Feb 11 2003 12:00AM
Relevant URL: http://www.securityfocus.com/bid/6824
Summary:

The Ericsson HM220dp DSL Modem is a broadband modem used in homes and
small office environments.

The modem uses a web interface to allow remote administration and
configuration. This interface does not require users to authenticate in
any way in order to access it. The modem also does not allow users to
enable any form of authentication.

Remote attackers may connect to the interface and change configuration
settings to render the modem unusable until it is reset or reconfigured.

22. APC apcupsd Client Syslog Format String Vulnerability
BugTraq ID: 6828
Remote: Unknown
Date Published: Feb 11 2003 12:00AM
Relevant URL: http://www.securityfocus.com/bid/6828
Summary:

Apcupsd provides UPS power management under Linux and BSD systems for APC
Products.

A vulnerability has been reported for apcupsd client that may result in an
attacker obtaining elevated privileges on the vulnerable system.

The 'log_event' function in 'apclog.c' contains an insecure instance of a
syslog() call. Due to this programming error, it may be possible to
exploit a format string vulnerability in the apcupsd 'log_event' function.

When the program is invoked using the vulnerable function, it may be
possible to exploit a format string vulnerability through the generation
of a malicious log event that contains attacker-supplied format strings.
In the event that this vulnerability is exploited, an attacker could cause
arbitrary locations in memory to be corrupted with attacker-specified data
and execute code with the privileges of the apcupsd user.

24. CGI Lite Perl Module Metacharacter Input Validation Vulnerability
BugTraq ID: 6833
Remote: Yes
Date Published: Feb 11 2003 12:00AM
Relevant URL: http://www.securityfocus.com/bid/6833
Summary:

CGI Lite is a freely available Perl module that is used to decode form and
query information, including file uploads and cookies.

A vulnerability has been reported in the escape_dangerous_chars()
function, which is a part of the CGI Lite Perl module.

The function does not sufficiently sanitize all instances of potentially
dangerous characters. As the end result, externally supplied input may not
be adequately sanitized before being used in other Perl functions. This
will create a false sense of security and may allow an attacker to execute
arbitrary commands via a CGI program which depends on the vulnerable
function.

The following characters are not sanitized by the function:

\, ?, ~, ^, \n, \r

If the function is used as part of a CGI application to sanitize
externally supplied input before passing it to Perl functions such as
system() or open(), it may be possible to execute commands on the
underlying shell of the host. It should be noted that these other
functions would need to be called in an unsafe manner for this issue to be
exploited.

Commands executed as a consequence of exploiting this issue will be in the
context of the webserver process.
 
Old 02-19-2003, 12:35 PM   #4
unSpawn
Moderator
 
Registered: May 2001
Posts: 29,415

Original Poster
Blog Entries: 55

Rep: Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600
Feb 19th 2003

OpenSSL 0.9.7a available, including important bugfixes.

Security: Important security related bugfixes. [0.9.7a and 0.9.6i]
Enhanced compatibility with MIT Kerberos. [0.9.7a]
Can be built without the ENGINE framework. [0.9.7a]
IA32 assembler enhancements. [0.9.7a]
Support for new platforms: FreeBSD/IA64 and FreeBSD/Sparc64. [0.9.7a]
Configuration: the no-err option now works properly. [0.9.7a]
SSL/TLS: now handles manual certificate chain building. [0.9.7a]
SSL/TLS: certain session ID malfunctions corrected. [0.9.7a]
 
  


Reply



Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
LQ weekly security rep - Mon Mar 17th 2003 unSpawn Linux - Security 3 03-21-2003 02:14 PM
LQ weekly security rep - Mon Mar 10th 2003 unSpawn Linux - Security 5 03-14-2003 03:22 PM
LQ weekly security rep - Mon Feb 24th 2003 unSpawn Linux - Security 2 02-24-2003 08:00 PM
LQ weekly security rep - Tue Feb 11th 2003 unSpawn Linux - Security 4 02-17-2003 06:16 AM
LQ weekly security rep - Tue Feb 04th 2003 unSpawn Linux - Security 2 02-04-2003 05:47 AM

LinuxQuestions.org > Forums > Linux Forums > Linux - Security

All times are GMT -5. The time now is 02:55 PM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration