LinuxQuestions.org
Latest LQ Deal: Latest LQ Deals
Home Forums Tutorials Articles Register
Go Back   LinuxQuestions.org > Forums > Linux Forums > Linux - Security
User Name
Password
Linux - Security This forum is for all security related questions.
Questions, tips, system compromises, firewalls, etc. are all included here.

Notices


Reply
  Search this Thread
Old 03-25-2003, 06:35 PM   #1
unSpawn
Moderator
 
Registered: May 2001
Posts: 29,415
Blog Entries: 55

Rep: Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600
LQ weekly security rep - Tue Mar 25th 2003


Mar 28th 2003
21 issues handled (LAW)
openssl
apcupsd
bonsai
krb5
lpr
mutt
heimdal
kernel
ecartis
glibc
mysql
bitchx
mod_ssl
netpbm
rxvt
zlib
evolution
samba
kerberos
ethereal
file

Mar 24th 2003
37 of 41 issues handled (SF)
1. XChat Server Strings Buffer Overflow Vulnerability
2. EPIC PRIVMSG Remote Heap Corruption Vulnerability
3. TCPDump Malformed RADIUS Packet Denial Of Service Vulnerability
4. ircII Make_Status_One Memory Corruption Vulnerability
5. ircII Client-Side Private Message Handling Memory Corruption Vulnerability
6. ircII Client-Side Cannot_Join_Channel Memory Corruption Vulnerability
7. ircII Status_Make_Printable Memory Corruption Vulnerability
8. OpenSSL Timing Attack RSA Private Key Information Disclosure Vulnerability
9. BitchX Remote Send_CTCP() Memory Corruption Vulnerability
10. BitchX Remote cannot_join_channel() Buffer Overflow Vulnerability
11. BitchX Remote BX_compress_modes() Buffer Overflow Vulnerability
12. BitchX Remote Cluster() Heap Corruption Vulnerability
13. Epic Status Bar Writing Buffer Overflow Vulnerability
14. Epic Userhost_Cmd_Returned Buffer Overflow Vulnerability
15. Filebased Guestbook 'Comment' HTML Injection Vulnerability
17. Samba SMB/CIFS Packet Assembling Buffer Overflow Vulnerability
18. Samba REG File Writing Race Condition Vulnerability
19. RSA ClearTrust Login Page Cross Site Scripting Vulnerability
20. Qpopper Username Information Disclosure Weakness
21. Multiple Vendor Java Virtual Machine java.util.zip Null Value Denial Of Service Vulnerability
23. Linux Kernel Privileged Process Hijacking Vulnerability
25. Multiple Cryptographic Weaknesses in Kerberos 4 Protocol
26. Outblaze Webmail Cookie Authentication Bypass Vulnerability
28. BEA WebLogic Remote Unprivileged Administration Access Vulnerability
29. BEA WebLogic Internal Servlet Input Validation Vulnerabilities
30. Sun XDR Library xdrmem_getbytes() Integer Overflow Vulnerability
31. Kebi Academy 2001 Input Validation Vulnerability
32. Gnome-lokkit Iptables No Forward Chain Rule Vulnerability
33. MyAbraCadaWeb Path Disclosure Vulnerability
34. MyAbraCadaWeb Search Engine Cross-Site Scripting Vulnerability
35. PXE Server Remote Buffer Overrun Vulnerability
36. BEA Systems WebLogic JNDI Tree Modify Access Vulnerability
37. BEA WebLogic Web Application Authentication Bypass Vulnerability
38. HP Tru64/HP-UX C Library Standard I/O File Descriptor Vulnerability
39. SIPS User Information Disclosure Vulnerability
40. Cyber-Cats Chitchat PHP Message Board/Guestbook Password File Viewing Vulnerability
41. Mambo Site Server index.php Cross Site Scripting Vulnerability

Mar 24th 2003
37 of 48 issues handled (ISS)
Kebi Academy 2001 Solution "dot dot" directory
Samba SMB/CIFS packet fragment re-assembly code
Samba .reg file code race condition
GNOME Lokkit FORWARD chain bypasses firewall
Linux kernel ptrace() root privileges
WebLogic Servers internal WebLogic servlet
WebLogic Servers Web application re-authentication
MyABraCaDaWeb index.php could disclose Web root
MyABraCaDaWeb index.php ma_kw cross-site scripting
WebLogic insecure modify permission allows deletion
Business::OnlinePayment::WorldPay::Junior price
Sun JDK multiple system classes integer overflows
SunRPC XDR xdrmem_getbytes integer overflow
HP Tru64 UNIX stdio could allow unauthorized access
MIT Kerberos weak security protocol could allow
WF-Chat stores plaintext passwords and usernames in
SIPS allows attacker to obtain user's information
Multiple ircii-based clients multiple buffer
PHP ChitChat Message Board (GuestBook) passwrd.txt
Ximian Evolution UUEncoded Content-Type: header
Ximian Evolution UUencoded email could cause
Ximian Evolution MIME Content-ID header bypass
PHP-Nuke $referer variable in index.php cross-site
MIT Kerberos principal name buffer overflow and
Mutt long folder name buffer overflow
IBM Tivoli Firewall Security Toolbox TFST relay
Outblaze cookie authentication bypass
Multiple SSL/TLS implementation could leak
XOOPS $xoopsOption Web root path disclosure
NETGEAR FVS318 Web interface denial of service
ProtWare HTML Guardian uses weak encryption
Simple Chat could disclose IP address
PHP-Nuke News module SQL injection
PHP-Nuke banner.php SQL injection
Mambo Site Server ?option index.php cross-site
DCP-Portal search.php and calendar.php cross-site
eZ publish URL request cross-site scripting

Last edited by unSpawn; 03-28-2003 at 05:04 PM.
 
Old 03-25-2003, 06:36 PM   #2
unSpawn
Moderator
 
Registered: May 2001
Posts: 29,415

Original Poster
Blog Entries: 55

Rep: Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600
Mar 24th 2003 (ISS)

Internet Security Systems

Date Reported: 03/17/2003
Brief Description: Kebi Academy 2001 Solution "dot dot" directory
traversal
Risk Factor: Medium
Attack Type: Network Based
Platforms: Kebi Academy 2001 Any version, Linux Any version,
Unix Any version
Vulnerability: kebi-dotdot-directory-traversal
X-Force URL: http://www.iss.net/security_center/static/11549.php

Date Reported: 03/14/2003
Brief Description: Samba SMB/CIFS packet fragment re-assembly code
buffer overflow
Risk Factor: High
Attack Type: Network Based
Platforms: Debian Linux 3.0, Gentoo Linux Any version, IRIX
6.5.x, Mandrake Linux 8.0, Mandrake Linux 8.1,
Mandrake Linux 8.2, Mandrake Linux 9.0, Mandrake
Linux Corporate Server 2.1, Mandrake Multi Network
Firewall 8.2, OpenPKG 1.1, OpenPKG 1.2, OpenPKG
CURRENT, Red Hat Linux 7.2, Red Hat Linux 7.3, Red
Hat Linux 8.0, SuSE eMail Server 3.1, SuSE eMail
Server III Any version, SuSE Linux 7.1, SuSE Linux
7.2, SuSE Linux 7.3, SuSE Linux 8.0, SuSE Linux
8.1, SuSE Linux Database Server Any version, SuSE
Linux Enterprise Server 7, SuSE Linux Enterprise
Server 8, SuSE Linux Enterprise Server for S/390
S/390, SuSE Linux Firewall Any version, SuSE Linux
Office Server Any version, Trustix Secure Linux 1.01,
Trustix Secure Linux 1.1, Trustix Secure Linux 1.2,
Trustix Secure Linux 1.5
Vulnerability: samba-smbcifs-smbd-bo
X-Force URL: http://www.iss.net/security_center/static/11550.php

Date Reported: 03/15/2003
Brief Description: Samba .reg file code race condition
Risk Factor: High
Attack Type: Host Based
Platforms: Debian Linux 3.0, IRIX 6.5.x, Mac OS X prior to
10.2.4, Mac OS X Server 10.2.3, OpenPKG 1.1,
OpenPKG 1.2, OpenPKG CURRENT, Red Hat Linux 7.2,
Red Hat Linux 7.3, Red Hat Linux 8.0, Samba 2.0.x
through 2.2.7a, SuSE eMail Server 3.1, SuSE eMail
Server III Any version, SuSE Linux 7.1, SuSE Linux
7.2, SuSE Linux 7.3, SuSE Linux 8.0, SuSE Linux
8.1, SuSE Linux Connectivity Server Any version,
SuSE Linux Database Server Any version, SuSE Linux
Enterprise Server 7, SuSE Linux Enterprise Server
8, SuSE Linux Enterprise Server for S/390 S/390,
SuSE Linux Firewall Any version, SuSE Linux Office
Server Any version
Vulnerability: samba-reg-race-condition
X-Force URL: http://www.iss.net/security_center/static/11551.php

Date Reported: 03/17/2003
Brief Description: GNOME Lokkit FORWARD chain bypasses firewall
Risk Factor: Medium
Attack Type: Network Based
Platforms: Red Hat Linux 8.0
Vulnerability: gnomelokkit-forward-bypass-firewall
X-Force URL: http://www.iss.net/security_center/static/11552.php

Date Reported: 03/17/2003
Brief Description: Linux kernel ptrace() root privileges
Risk Factor: High
Attack Type: Host Based
Platforms: EnGarde Secure Linux Community Edition, EnGarde
Secure Linux Professional Edition, Linux Any
version, Red Hat Linux 7.1, Red Hat Linux 7.2, Red
Hat Linux 7.3, Red Hat Linux 8.0, Trustix Secure
Linux 1.01, Trustix Secure Linux 1.1, Trustix
Secure Linux 1.2, Trustix Secure Linux 1.5, Unix
Any version
Vulnerability: linux-ptrace-root-privileges
X-Force URL: http://www.iss.net/security_center/static/11553.php

Date Reported: 03/17/2003
Brief Description: WebLogic Servers internal WebLogic servlet
unauthorized access
Risk Factor: High
Attack Type: Network Based
Platforms: Linux Any version, WebLogic Express 6.0, WebLogic
Express 6.1, WebLogic Express 7.0, WebLogic Express
7.0.0.1, WebLogic Server 6.0, WebLogic Server 6.1,
WebLogic Server 7.0, WebLogic Server 7.0.0.1,
Windows 2000 Any version
Vulnerability: weblogic-servlet-unauth-access
X-Force URL: http://www.iss.net/security_center/static/11554.php

Date Reported: 03/17/2003
Brief Description: WebLogic Servers Web application re-authentication
bypass
Risk Factor: Medium
Attack Type: Network Based
Platforms: Linux Any version, WebLogic Server 7.0, WebLogic
Server 7.0.0.1, Windows 2000 Advanced Server
Vulnerability: weblogic-app-reauthentication-bypass
X-Force URL: http://www.iss.net/security_center/static/11555.php

Date Reported: 03/17/2003
Brief Description: MyABraCaDaWeb index.php could disclose Web root
path
Risk Factor: Low
Attack Type: Network Based
Platforms: Linux Any version, MyABraCaDaWeb 1.0.2 and earlier,
Unix Any version
Vulnerability: myabracadaweb-index-path-disclosure
X-Force URL: http://www.iss.net/security_center/static/11556.php

Date Reported: 03/17/2003
Brief Description: MyABraCaDaWeb index.php ma_kw cross-site scripting
Risk Factor: Medium
Attack Type: Network Based
Platforms: Linux Any version, MyABraCaDaWeb 1.0.2 and earlier,
Unix Any version
Vulnerability: myabracadaweb-index-makw-xss
X-Force URL: http://www.iss.net/security_center/static/11557.php

Date Reported: 03/17/2003
Brief Description: WebLogic insecure modify permission allows deletion
of empty sub-contexts
Risk Factor: Low
Attack Type: Network Based
Platforms: Linux Any version, WebLogic Express 7.0, WebLogic
Express 7.0.0.1, WebLogic Server 7.0, WebLogic
Server 7.0.0.1, Windows 2000 Any version
Vulnerability: weblogic-modify-subcontext-delete
X-Force URL: http://www.iss.net/security_center/static/11558.php

Date Reported: 03/15/2003
Brief Description: Business::OnlinePayment::WorldPay::Junior price
modification
Risk Factor: High
Attack Type: Network Based
Platforms: Business::OnlinePayment::WorldPay::Junio prior to
1.05, Linux Any version, Unix Any version, Windows
Any version
Vulnerability: businessonlinepayment-price-modification
X-Force URL: http://www.iss.net/security_center/static/11560.php

Date Reported: 03/14/2003
Brief Description: Sun JDK multiple system classes integer overflows
Risk Factor: Medium
Attack Type: Host Based / Network Based
Platforms: Solaris Any version, Sun JDK 1.4.1_01
Vulnerability: jdk-systemclass-integer-overflow
X-Force URL: http://www.iss.net/security_center/static/11561.php

Date Reported: 03/16/2003
Brief Description: SunRPC XDR xdrmem_getbytes integer overflow
Risk Factor: High
Attack Type: Network Based
Platforms: AIX 4.3.3, AIX 5.1, AIX 5.2, Caldera OpenLinux
Server 3.1, Caldera OpenLinux Server 3.1.1, Caldera
OpenLinux Workstation 3.1, Caldera OpenLinux
Workstation 3.1.1, EnGarde Secure Linux Community
Edition, FreeBSD 4.6-RELEASE, FreeBSD 4.7-RELEASE,
FreeBSD 4.8-RELEASE, FreeBSD 5.0-RELEASE, glibc Any
version, libnsl Any version, Linux Any version, MIT
Kerberos 5 krb5-1.2.7 and prior, Red Hat Linux 6.2,
Red Hat Linux 7.0, Red Hat Linux 7.1, Red Hat Linux
7.2, Red Hat Linux 7.3, Red Hat Linux 8.0, Unix Any
version
Vulnerability: sunrpc-xdrmemgetbytes-interger-overflow
X-Force URL: http://www.iss.net/security_center/static/11563.php

Date Reported: 03/12/2003
Brief Description: HP Tru64 UNIX stdio could allow unauthorized access
Risk Factor: High
Attack Type: Host Based / Network Based
Platforms: Compaq Tru64 UNIX 4.0G
Vulnerability: tru64-stdio-unauth-access
X-Force URL: http://www.iss.net/security_center/static/11564.php

Date Reported: 03/17/2003
Brief Description: MIT Kerberos weak security protocol could allow
user ticket creation
Risk Factor: High
Attack Type: Network Based
Platforms: Linux Any version, MIT Kerberos 5 prior to 1.3,
Unix Any version
Vulnerability: kerberos-protocol-create-tickets
X-Force URL: http://www.iss.net/security_center/static/11570.php

Date Reported: 03/18/2003
Brief Description: WF-Chat stores plaintext passwords and usernames in
!nicks.txt and !pwds.txt
Risk Factor: Medium
Attack Type: Network Based
Platforms: Linux Any version, Unix Any version, WF-Chat 1.0
Beta, Windows Any version
Vulnerability: wf-chat-plaintext-passwords
X-Force URL: http://www.iss.net/security_center/static/11571.php

Date Reported: 03/17/2003
Brief Description: SIPS allows attacker to obtain user's information
file
Risk Factor: Medium
Attack Type: Network Based
Platforms: Linux Any version, Simple Internet Publishing
System (SIPS) 0.2.2, Unix Any version, Windows Any
version
Vulnerability: sips-user-obtain-information
X-Force URL: http://www.iss.net/security_center/static/11572.php

Date Reported: 03/13/2003
Brief Description: Multiple ircii-based clients multiple buffer
overflows
Risk Factor: Medium
Attack Type: Network Based
Platforms: BitchX 1.0c19, EPIC4 4 1.1.7.20020907, ircii
20020912, Linux Any version, Unix Any version,
Windows Any version, XChat IRC 2.0.1
Vulnerability: ircii-multiple-bo
X-Force URL: http://www.iss.net/security_center/static/11573.php

Date Reported: 03/17/2003
Brief Description: PHP ChitChat Message Board (GuestBook) passwrd.txt
information disclosure
Risk Factor: Medium
Attack Type: Network Based
Platforms: Linux Any version, PHP ChitChat Message Board
(GuestBook) 1.0, Unix Any version, Windows Any
version
Vulnerability: chitchat-passwrd-information-disclosure
X-Force URL: http://www.iss.net/security_center/static/11574.php

Date Reported: 03/19/2003
Brief Description: Ximian Evolution UUEncoded Content-Type: header
denial of service
Risk Factor: Medium
Attack Type: Network Based
Platforms: Evolution 1.2.2 and earlier, Linux Any version, Red
Hat Linux 7.3, Red Hat Linux 8.0, Unix Any version
Vulnerability: evolution-uuencoded-header-dos
X-Force URL: http://www.iss.net/security_center/static/11577.php

Date Reported: 03/19/2003
Brief Description: Ximian Evolution UUencoded email could cause
excessive memory consumption
Risk Factor: Medium
Attack Type: Network Based
Platforms: Evolution 1.2.2 and earlier, Linux Any version, Red
Hat Linux 7.3, Red Hat Linux 8.0, Unix Any version
Vulnerability: evolution-uuencoded-memory-consumption
X-Force URL: http://www.iss.net/security_center/static/11578.php

Date Reported: 03/19/2003
Brief Description: Ximian Evolution MIME Content-ID header bypass
email restrictions
Risk Factor: Medium
Attack Type: Network Based
Platforms: Evolution 1.2.2 and earlier, Linux Any version, Red
Hat Linux 7.3, Red Hat Linux 8.0, Unix Any version
Vulnerability: evolution-mime-bypass-restrictions
X-Force URL: http://www.iss.net/security_center/static/11579.php

Date Reported: 03/19/2003
Brief Description: PHP-Nuke $referer variable in index.php cross-site
scripting
Risk Factor: Medium
Attack Type: Network Based
Platforms: Linux Any version, PHP-Nuke Any version, Unix Any
version, Windows Any version
Vulnerability: phpnuke-index-referer-xss
X-Force URL: http://www.iss.net/security_center/static/11581.php

Date Reported: 03/19/2003
Brief Description: MIT Kerberos principal name buffer overflow and
underflow
Risk Factor: Medium
Attack Type: Network Based
Platforms: Linux Any version, MIT Kerberos 5 1.3-alpha1, MIT
Kerberos 5 prior to 1.2.7, Unix Any version
Vulnerability: kerberos-principal-name-bo
X-Force URL: http://www.iss.net/security_center/static/11582.php

Date Reported: 03/19/2003
Brief Description: Mutt long folder name buffer overflow
Risk Factor: High
Attack Type: Network Based
Platforms: Linux Any version, Mutt 1.4.0 and earlier, Mutt
1.5.3 and earlier, OpenPKG 1.1, OpenPKG 1.2,
OpenPKG CURRENT
Vulnerability: mutt-folder-name-bo
X-Force URL: http://www.iss.net/security_center/static/11583.php

Date Reported: 03/20/2003
Brief Description: IBM Tivoli Firewall Security Toolbox TFST relay
daemon buffer overflow
Risk Factor: High
Attack Type: Network Based
Platforms: IBM Tivoli Firewall Toolbox 1.2, Linux Any version,
Unix Any version, Windows Any version
Vulnerability: tivoli-tfst-relay-bo
X-Force URL: http://www.iss.net/security_center/static/11584.php

Date Reported: 03/19/2003
Brief Description: Outblaze cookie authentication bypass
Risk Factor: Medium
Attack Type: Network Based
Platforms: Linux Any version, Outblaze email Any Version, Unix
Any version, Windows Any version
Vulnerability: outblaze-cookie-auth-bypass
X-Force URL: http://www.iss.net/security_center/static/11585.php

Date Reported: 03/19/2003
Brief Description: Multiple SSL/TLS implementation could leak
premaster-secret value
Risk Factor: Medium
Attack Type: Network Based
Platforms: EnGarde Secure Linux 1.0.1, EnGarde Secure Linux
Community Edition, EnGarde Secure Linux
Professional Edition, Linux Any version, OpenPKG
1.1, OpenPKG 1.2, OpenPKG CURRENT, OpenSSL 0.9.6i
and earlier, OpenSSL 0.9.7, OpenSSL 0.9.7a
Vulnerability: ssl-premaster-information-leak
X-Force URL: http://www.iss.net/security_center/static/11586.php

Date Reported: 03/20/2003
Brief Description: XOOPS $xoopsOption Web root path disclosure
Risk Factor: Low
Attack Type: Network Based
Platforms: Linux Any version, Unix Any version, Windows Any
version, XOOPS 2.0
Vulnerability: xoops-xoopsoption-path-disclosure
X-Force URL: http://www.iss.net/security_center/static/11587.php

Date Reported: 03/20/2003
Brief Description: NETGEAR FVS318 Web interface denial of service
Risk Factor: Medium
Attack Type: Network Based
Platforms: NETGEAR FVS318 1.2
Vulnerability: netgear-fvs318-web-dos
X-Force URL: http://www.iss.net/security_center/static/11596.php

Date Reported: 03/20/2003
Brief Description: ProtWare HTML Guardian uses weak encryption
Risk Factor: Medium
Attack Type: Network Based
Platforms: HTML Guardian Any version, Windows Any version
Vulnerability: html-guardian-weak-encryption
X-Force URL: http://www.iss.net/security_center/static/11597.php

Date Reported: 03/19/2003
Brief Description: Simple Chat could disclose IP address
Risk Factor: Medium
Attack Type: Network Based
Platforms: Linux Any version, Simple Chat 1.3, Unix Any
version, Windows Any version
Vulnerability: simple-chat-ip-disclosure
X-Force URL: http://www.iss.net/security_center/static/11598.php

Date Reported: 03/22/2003
Brief Description: PHP-Nuke News module SQL injection
Risk Factor: Medium
Attack Type: Network Based
Platforms: Linux Any version, PHP-Nuke 5.6, PHP-Nuke 6.0, PHP-
Nuke 6.5, PHP-Nuke 6.5 RC1, PHP-Nuke 6.5 RC2, PHP-
Nuke 6.5 RC3, Unix Any version, Windows Any version
Vulnerability: phpnuke-news-sql-injection
X-Force URL: http://www.iss.net/security_center/static/11599.php

Date Reported: 03/22/2003
Brief Description: PHP-Nuke banner.php SQL injection
Risk Factor: Medium
Attack Type: Network Based
Platforms: Linux Any version, PHP-Nuke 5.6, PHP-Nuke 6.0, PHP-
Nuke 6.5, PHP-Nuke 6.5 RC1, PHP-Nuke 6.5 RC2, PHP-
Nuke 6.5 RC3, Unix Any version, Windows Any version
Vulnerability: phpnuke-banner-sql-injection
X-Force URL: http://www.iss.net/security_center/static/11600.php

Date Reported: 03/18/2003
Brief Description: Mambo Site Server ?option index.php cross-site
scripting
Risk Factor: Medium
Attack Type: Network Based
Platforms: Linux Any version, Mambo Site Server 4.0 build 10,
Solaris Any version, Windows Any version
Vulnerability: mambo-option-index-xss
X-Force URL: http://www.iss.net/security_center/static/11601.php

Date Reported: 03/18/2003
Brief Description: DCP-Portal search.php and calendar.php cross-site
scripting
Risk Factor: Medium
Attack Type: Network Based
Platforms: DCP-Portal 5.3.1, Linux Any version
Vulnerability: dcpportal-search-calendar-xss
X-Force URL: http://www.iss.net/security_center/static/11602.php

Date Reported: 03/18/2003
Brief Description: eZ publish URL request cross-site scripting
Risk Factor: Medium
Attack Type: Network Based
Platforms: eZ publish 2.2.7, Linux Any version, Unix Any
version, Windows Any version
Vulnerability: ezpublish-url-xss
X-Force URL: http://www.iss.net/security_center/static/11604.php
 
Old 03-25-2003, 06:39 PM   #3
unSpawn
Moderator
 
Registered: May 2001
Posts: 29,415

Original Poster
Blog Entries: 55

Rep: Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600
Mar 24th 2003 (SF) pt 1/2

SecurityFocus

1. XChat Server Strings Buffer Overflow Vulnerability
BugTraq ID: 7089
Remote: Yes
Date Published: Mar 14 2003 12:00AM
Relevant URL: http://www.securityfocus.com/bid/7089
Summary:

XChat is a freely available, open source IRC client. It is available for
the the Unix, Linux, and Microsoft Windows platforms.

XChat IRC client has been reported vulnerable, under certain
circumstances, to a buffer overflow condition.

It has been reported that due to a lack of both, sufficient bounds
checking and string termination, two malformed non-terminated server
supplied strings may be stored contiguously in a fixed internal memory
buffer.

As a result of this, a malicious IRC server may be used to pass excessive
data to the client and overwrite memory adjacent to the deficient buffer.
If this memory contains crucial saved program state values the attacker
may be able to influence the programs' flow and execute arbitrary code.

Any code successfully executed would be in the context of the user running
the vulnerable IRC application.

This vulnerability was reported to affect XChat version 2.0.1 other
versions may also be affected.

2. EPIC PRIVMSG Remote Heap Corruption Vulnerability
BugTraq ID: 7088
Remote: Yes
Date Published: Mar 14 2003 12:00AM
Relevant URL: http://www.securityfocus.com/bid/7088
Summary:

Epic is a freely available, open source IRC client. It is maintained by
the Epic project.

A vulnerability has been discovered in EPIC4 1.1.7.20020907. The problem
occurs due to insufficient bounds checking data interchanged between
clients. Specifically, by using the PRIVMSG command to send a message of
excessive length to a vulnerable client, it may be possible to corrupt the
processes heap memory.

It should be noted that this issue might only be exploitable when the
'mangle_inbound' option is set. Secondly, the data which can be written to
sensitive memory is limited to a defined character set, making remote code
execution unlikely.

Successful exploitation of this issue would likely cause the vulnerable
client to crash.

3. TCPDump Malformed RADIUS Packet Denial Of Service Vulnerability
BugTraq ID: 7090
Remote: Yes
Date Published: Mar 14 2003 12:00AM
Relevant URL: http://www.securityfocus.com/bid/7090
Summary:

tcpdump is a freely available, open source network monitoring tool. It is
available for the Unix, Linux, and Microsoft Windows operating systems.

A vulnerability in the processing of some packet types may result in an
inability to further use the tcpdump application.

It has been reported that tcpdump is vulnerable to a denial of service
when some packet types are received. By sending a maliciously formatted
packet to a system using a vulnerable version of tcpdump, it is possible
for a remote user to cause tcpdump to ignore network traffic from the time
the packet is received until the application is terminated and restarted.

The problem is in the handling of RADIUS packets. When tcpdump receives a
maliciously crafted RADIUS packet, the application enters an infinite loop
and ceases to further monitor network traffic. This could allow the
passing of undetected network traffic that would typically be seen by
tcpdump.

4. ircII Make_Status_One Memory Corruption Vulnerability
BugTraq ID: 7093
Remote: Yes
Date Published: Mar 14 2003 12:00AM
Relevant URL: http://www.securityfocus.com/bid/7093
Summary:

ircII is an IRC and ICB client for Unix and Linux platforms.

A buffer overflow vulnerability has been reported in ircII. The
vulnerability is related to the way ircII refreshes its status bar.
Specifically, the make_status_one() function in the status.c source file
does not properly account for some control characters when attempting to
refresh the status bar.

This issue is exploitable by a malicious IRC server that sends an overly
long response to the vulnerable ircII client. As the client does not make
proper checks for control characters when updating the status bar, it will
result in the corruption of sensitive memory.

This will cause the client to crash thus resulting in a denial of service
condition.

This issue was reported in ircII build 20020912. Other versions may also
be affected.

This issue was originally described in BID 7087 "Multiple IrcII Remote
Client-Side Buffer Overflow Vulnerabilities" and is now being assigned a
separate BID.

5. ircII Client-Side Private Message Handling Memory Corruption Vulnerability
BugTraq ID: 7094
Remote: Yes
Date Published: Mar 14 2003 12:00AM
Relevant URL: http://www.securityfocus.com/bid/7094
Summary:

ircII is an IRC and ICB client for Unix and Linux platforms.

A buffer overflow vulnerability has been reported for ircII. This issue is
due to insufficient bounds checking of server-supplied data and may
potentially result in denial of service in the IRC client. This overflow
occurs during client handling of private message data supplied by an IRC
server, allowing for the 'ctcp_buffer' to be overrun. Though unconfirmed,
exploitation may also allow for execution of arbitrary code in the context
of the client.

This could result in corruption of sensitive regions of memory with
attacker-supplied data. It may be possible for another client to trigger
this condition, though this is also unconfirmed.

This issue was originally described in BID 7087 "Multiple IrcII Remote
Client-Side Buffer Overflow Vulnerabilities" and is now being assigned a
separate BID.

This issue was reported in ircII build 20020912. Other versions may also
be affected.

6. ircII Client-Side Cannot_Join_Channel Memory Corruption Vulnerability
BugTraq ID: 7095
Remote: Yes
Date Published: Mar 14 2003 12:00AM
Relevant URL: http://www.securityfocus.com/bid/7095
Summary:

ircII is an IRC and ICB client for Unix and Linux platforms.

A buffer overflow vulnerability has been reported in ircII. This issue is
due to insufficient bounds checking of server-supplied data and may
potentially result in denial of service in the IRC client. This issue
exists in the cannot_join_channel() function and could be triggered by a
channel length of excessive length.

This could result in corruption of memory (including stack variables) with
attacker-supplied data.

This issue was originally described in BID 7087 "Multiple IrcII Remote
Client-Side Buffer Overflow Vulnerabilities" and is now being assigned a
separate BID.

7. ircII Status_Make_Printable Memory Corruption Vulnerability
BugTraq ID: 7098
Remote: Yes
Date Published: Mar 14 2003 12:00AM
Relevant URL: http://www.securityfocus.com/bid/7098
Summary:

ircII is an IRC and ICB client for Unix and Linux platforms.

A buffer overflow vulnerability has been reported in ircII. The
vulnerability is related to the way ircII refreshes its status bar.
Specifically, the status_make_printable() function in the status.c source
file does not properly account for some control characters when attempting
to refresh the status bar.

This issue is exploitable by a malicious IRC server that sends an overly
long response to the vulnerable ircII client. As the client does not make
proper checks for control characters when updating the status bar, it will
result in the corruption of sensitive memory with attacker-supplied
values.

This will cause the client to behave in an unpredictable manner and
possibly execute attacker-supplied code.

This issue was reported in ircII build 20020912. Other versions may also
be affected.

This issue was originally described in BID 7087 "Multiple IrcII Remote
Client-Side Buffer Overflow Vulnerabilities" and is now being assigned a
separate BID.

8. OpenSSL Timing Attack RSA Private Key Information Disclosure Vulnerability
BugTraq ID: 7101
Remote: Yes
Date Published: Mar 14 2003 12:00AM
Relevant URL: http://www.securityfocus.com/bid/7101
Summary:

OpenSSL is an open source implementation of the SSL protocol.

A side-channel attack in the OpenSSL implementation has been published in
a recent paper that may ultimately result in an active adversary gaining
the RSA private key of a target server. The attack involves analysis of
the timing of certain operations during client-server session key
negotiation.

Session negotiation occurs using the RSA PKCS 1 type public key
cryptography standard. During the client-server negotiation, the client
constructs a proto-session-key using PKCS 1 formatted random bytes and
encrypts it with the RSA public key of the server. The client then
transmits this value to the server, which uses it to compute the shared
session key. The server will generate a session key on its own and send
an alert message to the client if the client-supplied proto-key decrypted
by the server using its RSA private key is not properly PKCS 1 formatted.

It is possible for an adversary, acting as a client, to obtain bits of
information about the server RSA private key by observing the time elapsed
between the transmission of an invalid proto-key value and reception of
the alert message from the server that is sent in response. The
information is leaked during the decryption process and may, through
successive observations, reveal the factorization of the private key to
the adversary. An attacker may perform this attack by repeatedly
establishing sessions with invalid proto-key values.

Upon successful compromise of a RSA private key, it is possible for an
attacker to monitor the establishing of all future sessions with the
server. This may additionally allow an attacker to impersonate the server
based on the compromised private key. This problem also affects other SSL
implementations that do not implement RSA blinding by default.

9. BitchX Remote Send_CTCP() Memory Corruption Vulnerability
BugTraq ID: 7097
Remote: Yes
Date Published: Mar 14 2003 12:00AM
Relevant URL: http://www.securityfocus.com/bid/7097
Summary:

BitchX is a freely available, open source IRC client. It is available for
Unix, Linux, and Microsoft operating systems.

A memory corruption vulnerability has been reported in the send_ctcp()
function which is used when handling server-supplied data. The function
takes the length of an argument, char *to, and uses it to allocate a
buffer on the stack. This occurs by calling the alloca() function with an
argument of 512 - (12 + strlen(to)). Delimiter characters are later
appended to the buffer returned by alloca().

If a hostile IRC server were to supply a 'to' argument containing a
length, -12, which is larger then 512 bytes, it would be possible to
supply a negative value as the argument to alloca(). If this were to occur
the negative value would be interpreted and a stack address used by a
previous frame will be returned. This may allow for delimiter characters
and a NULL value to be written to arbitrary stack memory.

Successful exploitation of this issue may allow a malicious server to
execute arbitrary commands on the client system with the privileges of the
user running the vulnerable client.

This vulnerability has been reported to affect BitchX 1.0c19. Other
versions may also be affected.

This issue was originally described in BID 7086 "Multiple BitchX Remote
Client-Side Buffer Overflow Vulnerabilities" and is now being assigned a
separate BID.

10. BitchX Remote cannot_join_channel() Buffer Overflow Vulnerability
BugTraq ID: 7099
Remote: Yes
Date Published: Mar 14 2003 12:00AM
Relevant URL: http://www.securityfocus.com/bid/7099
Summary:

BitchX is a freely available, open source IRC client. It is available for
Unix, Linux, and Microsoft operating systems.

A memory corruption vulnerability has been discovered in BitchX 1.0c19.
This issue occurs when calling the cannot_join_channel() function. If a
channel of excessive length is supplied a buffer overflow could occur
which may result in predefined strings being written over sensitive stack
memory.

As a result, it may be possible for a malicious IRC server to crash a
vulnerable client. Although unconfirmed this vulnerability could
potentially be leveraged to execute arbitrary commands within a target
client.

This vulnerability has been reported to affect BitchX 1.0c19. Other
versions may also be affected.

This issue was originally described in BID 7086 "Multiple BitchX Remote
Client-Side Buffer Overflow Vulnerabilities" and is now being assigned a
separate BID.

11. BitchX Remote BX_compress_modes() Buffer Overflow Vulnerability
BugTraq ID: 7100
Remote: Yes
Date Published: Mar 14 2003 12:00AM
Relevant URL: http://www.securityfocus.com/bid/7100
Summary:

BitchX is a freely available, open source IRC client. It is available for
Unix, Linux, and Microsoft operating systems.

BitchX has been reported prone to a buffer overflow vulnerability.

Reportedly, when the BitchX option 'compress_modes' is activated a
potential circumstance for a buffer overflow condition may be created. If
an excessive amount of data is supplied to the BitchX
'BX_Compress_modes()' function an internal memory buffer, 'nmodes[16]',
will be overflowed. This action may cause adjacent memory to be corrupted
with attacker-supplied values.

There is a potential that this issue could be exploited to corrupt crucial
program management variables on the stack and thus seize control of
program flow. As a result, a hostile IRC server may be capable of
executing arbitrary code on a target client.

Any arbitrary code executed would be in the context of the user running
the vulnerable software.

This vulnerability was reported to affect BitchX 1.0c19 earlier versions
may also be affected.

This issue was originally described in BID 7086 "Multiple BitchX Remote
Client-Side Buffer Overflow Vulnerabilities" and is now being assigned a
separate BID.

12. BitchX Remote Cluster() Heap Corruption Vulnerability
BugTraq ID: 7096
Remote: Yes
Date Published: Mar 14 2003 12:00AM
Relevant URL: http://www.securityfocus.com/bid/7096
Summary:

BitchX is a freely available, open source IRC client. It is available for
Unix, Linux, and Microsoft operating systems.

BitchX has been reported prone to a heap based memory corruption
vulnerability. Reportedly when an excessively long hostname is supplied to
the BitchX 'cluster()' function an internal static memory buffer is
overflowed.

It has been reported that 1500 bytes of data may be written past the
buffer, potentially corrupting sensitive values located in the heap.

Although unconfirmed, due to the nature of heap corruption
vulnerabilities, there is a potential that this issue could be exploited
to corrupt memory management information. As a result, a hostile IRC
server may be capable of executing arbitrary code on a target client.

This vulnerability was reported to affect BitchX 1.0c19 earlier versions
may also be affected.

This issue was originally described in BID 7086 "Multiple BitchX Remote
Client-Side Buffer Overflow Vulnerabilities" and is now being assigned a
separate BID.

13. Epic Status Bar Writing Buffer Overflow Vulnerability
BugTraq ID: 7103
Remote: Yes
Date Published: Mar 14 2003 12:00AM
Relevant URL: http://www.securityfocus.com/bid/7103
Summary:

Epic is a freely available, open source IRC client. It is maintained by
the Epic project.

A problem with the software may make it possible for an attacker to gain
access to a vulnerable client system.

It has been reported that Epic does not properly handle some types of
server replies. This particular problem occurs when the status bar is
written to by the server. Because of this, an attacker may be able to
gain access to a vulnerable client system with the privileges of the Epic
user.

The client does not perform sufficient bounds checking on the data
returned by the server. Because of this, data that is passed by the
server that may be written to the status bar may make it is possible for a
malicious server to send a response of arbitrary length that will result
in a client-side overflow, and potentially the execution of arbitrary
code.

This issue was originally described in BID 7077 "Multiple Epic Remote
Client-Side Buffer Overflow Vulnerabilities" and is now being assigned a
separate BID.

14. Epic Userhost_Cmd_Returned Buffer Overflow Vulnerability
BugTraq ID: 7091
Remote: Yes
Date Published: Mar 14 2003 12:00AM
Relevant URL: http://www.securityfocus.com/bid/7091
Summary:

Epic is a freely available, open source IRC client. It is maintained by
the Epic project.

A problem with the software may make it possible for an attacker to gain
access to a vulnerable client system.

It has been reported that Epic does not properly handle some types of
server replies. This particular problem occurs in the userhost returned by
the server. Because of this, an attacker may be able to gain access to a
vulnerable client system with the privileges of the Epic user.

The client does not perform sufficient bounds checking on the data
returned by the server when the userhost is sent. Because of this, it is
possible for a malicious server to send a response of arbitrary length
that will result in a client-side overflow, and potentially the execution
of arbitrary code.

This issue was originally described in BID 7077 "Multiple Epic Remote
Client-Side Buffer Overflow Vulnerabilities" and is now being assigned a
separate BID.

15. Filebased Guestbook 'Comment' HTML Injection Vulnerability
BugTraq ID: 7104
Remote: Yes
Date Published: Mar 14 2003 12:00AM
Relevant URL: http://www.securityfocus.com/bid/7104
Summary:

Filebased Guestbook is a text-based guestbook written in PHP.

It has been reported that Filebased Guestbook is prone to HTML injection
attacks. This problem occurs due to Filebased Guestbook insufficiently
sanitizing user-supplied input. Specifically, embedded HTML and script
code is not filtered from the 'comment' guestbook field.

As a result, attackers may embed malicious script code or HTML into forum
posts. When a malicious post is viewed by another user, the
attacker-supplied code will be interpreted in their web browser in the
security context of the site hosting the software.

It may be possible to steal the unsuspecting user's cookie-based
authentication credentials, as well as other sensitive information. Other
attacks are also possible.

17. Samba SMB/CIFS Packet Assembling Buffer Overflow Vulnerability
BugTraq ID: 7106
Remote: Yes
Date Published: Mar 15 2003 12:00AM
Relevant URL: http://www.securityfocus.com/bid/7106
Summary:

Samba is a freely available file and printer sharing application
maintained and developed by the Samba Development Team. Samba allows file
and printer sharing between operating systems on the Unix and Microsoft
platforms. The Samba daemon is typically run with super user privileges.

A buffer overflow vulnerability has been reported for Samba. The
vulnerability occurs when the smbd service attempts to re-assemble
specially crafted SMB/CIFS packets.

An attacker can exploit this vulnerability by creating a specially
formatted SMB/CIFS packet and sending it to a vulnerable Samba server. The
overflow condition will be triggered when smbd attempts to re-assemble the
malformed packet fragments. smbd will overwrite sensitive areas of memory
with attacker-supplied values resulting in the execution of malicious
code.

This vulnerability is further exacerbated by the fact that the smbd
service runs with root privileges.

This vulnerability affects Samba 2.0.0 to 2.2.7a. Additionally, HP
CIFS/9000 server versions up to A.01.09.01 on HP-UX 11.0, 11.11(11i), and
11.22 are vulnerable.

18. Samba REG File Writing Race Condition Vulnerability
BugTraq ID: 7107
Remote: No
Date Published: Mar 15 2003 12:00AM
Relevant URL: http://www.securityfocus.com/bid/7107
Summary:

Samba is a freely available file and printer sharing application
maintained and developed by the Samba Development Team. Samba allows file
and printer sharing between operating systems on the Unix and Microsoft
platforms. The Samba daemon is typically run with super user privileges.

A race condition vulnerability has been reported for Samba. The
vulnerability occurs when Samba attempts to write reg files. However, it
may be possible to create a symbolic link in a crucial point of program
execution that would result in the overwriting of files pointed to by the
link. This will only occur if the files are writeable by the Samba
process.

Successful exploitation may cause local files to be corrupted. If files
can be corrupted with custom data, this may result in privilege elevation.

Full details of this vulnerability are not currently known. The BID will
be updated as further details are disclosed.

This vulnerability is reported to exist for Samba 2.0.0 to 2.2.7a.

19. RSA ClearTrust Login Page Cross Site Scripting Vulnerability
BugTraq ID: 7108
Remote: Yes
Date Published: Mar 15 2003 12:00AM
Relevant URL: http://www.securityfocus.com/bid/7108
Summary:

RSA ClearTrust is a Web-based access management application that provides
secure access to resources.

A cross-site scripting vulnerability has been discovered in ClearTrust.
Specifically, the login page for the management application is not
properly sanitized of some user-supplied values. The login page is called
ct_logon.asp and the values for the 'CTLoginErrorMsg' parameter is not
properly sanitized of malicious HTML code.

An attacker can exploit this vulnerability by creating a specially crafted
URL that includes malicious HTML code for the login page used by
ClearTrust.

This may allow for theft of cookie-based authentication credentials and
other attacks.

20. Qpopper Username Information Disclosure Weakness
BugTraq ID: 7110
Remote: Yes
Date Published: Mar 15 2003 12:00AM
Relevant URL: http://www.securityfocus.com/bid/7110
Summary:

Qpopper is a POP3 mail server available for Linux and Unix based systems.

An information disclosure weakness has been reported for Qpopper when
authenticating. The weakness is due to the fact that if a valid username
is sent with a bad password, Qpopper will wait a small amount of time
prior to disconnecting the client. If the username that is sent is
invalid, Qpopper immediately disconnects the client.

A determined attacker can exploit this weakness to gather a list of valid
usernames on a vulnerable system using Qpopper.

Any information obtained in this manner may be used by the attacker to
launch other attacks against a victim user or system.

This weakness was reported for Qpopper 3.1 and 4.0.4. It is not known
whether other versions are affected.

21. Multiple Vendor Java Virtual Machine java.util.zip Null Value Denial Of Service Vulnerability
BugTraq ID: 7109
Remote: Yes
Date Published: Mar 15 2003 12:00AM
Relevant URL: http://www.securityfocus.com/bid/7109
Summary:

Several implementations of the Java Virtual Machine have been reported to
be prone to a denial of service condition.

This vulnerability occurs in several methods in the java.util.zip class. The following native methods have been reported to be vulnerable to this issue:
java.util.zip.Adler32().update();
java.util.zip.Deflater().setDictionary();
java.util.zip.CRC32().update();
java.util.zip.Deflater().deflate();
java.util.zip.CheckedOutputStream().write();
java.util.zip.CheckedInputStream().read();

The methods can be called with certain types of parameters however, there
does not appear to be proper checks to see whether the parameters are NULL
values. When these native methods are called with NULL values, this will
cause the JVM to reach an undefined state which will cause it to behave in
an unpredictable manner and possibly crash.

This BID will be separated into individual entries where appropriate.
 
Old 03-25-2003, 06:41 PM   #4
unSpawn
Moderator
 
Registered: May 2001
Posts: 29,415

Original Poster
Blog Entries: 55

Rep: Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600
Mar 24th 2003 (SF) pt 2/2

23. Linux Kernel Privileged Process Hijacking Vulnerability
BugTraq ID: 7112
Remote: No
Date Published: Mar 17 2003 12:00AM
Relevant URL: http://www.securityfocus.com/bid/7112
Summary:

The Linux Kernel is the core of the Linux operating system and is
distributed by various Linux distributions.

A vulnerability has been discovered related to the automatic loading of
kernel modules via kmod. This feature allows for modules to be loaded at
run-time when required by certain system calls. When such a module is
required, the kernel will create a privileged process and exec the
modprobe executable. It should be noted that, although the process loading
the module is owned by the root user its parent process is the process
calling the function requiring the module.

The vulnerability presents itself because the kernel fails to restrict
tracing permissions on the privileged process. As a result, by
anticipating the PID of the process probing the module and making a
ptrace() call at the correct time interval, an attacker may be able to
attach to the privileged process. This may give an attacker the ability to
inject arbitrary instructions into memory and thus execute arbitrary
commands.

Successful exploitation of this vulnerability could allow a local
attacker, on a Linux system running a 2.2 or 2.4 kernel tree, to gain root
privileges.

25. Multiple Cryptographic Weaknesses in Kerberos 4 Protocol
BugTraq ID: 7113
Remote: Yes
Date Published: Mar 17 2003 12:00AM
Relevant URL: http://www.securityfocus.com/bid/7113
Summary:

Multiple cryptographic weaknesses have recently been reported to affect
the Kerberos 4 protocol. These are design faults and affect every full
implementation of the protocol. The most serious allows for an adversary
to impersonate any principal in a realm. This can result in a complete
compromise of the Kerberos Domain Controller and any hosts which rely on
it for authentication. Another weakness allow fabrication of Kerberos 4
tickets for unauthorized client principals if triple-DES keys are used to
key Kerberos 4 services.

It should be noted that Kerberos 5 implementations may also be affected in
some environments.

This record will be updated as more information becomes available.
Depending on analysis by Symantec, this entry may be split into multiple
BIDs.

26. Outblaze Webmail Cookie Authentication Bypass Vulnerability
BugTraq ID: 7115
Remote: Yes
Date Published: Mar 17 2003 12:00AM
Relevant URL: http://www.securityfocus.com/bid/7115
Summary:

Outblaze is a Web based e-mail service that supports SMTP and POP3
Internet protocols, which allows it to be used as a front-end to an e-mail
account.

Outblaze web mail service has been reported prone to an authentication
cookie spoofing vulnerability.

This issue may allow a malicious attacker to bypass the cookie based
authentication mechanisms used by the affected Outblaze web mail server.
If the attacker has a valid authentication cookie that was created and
saved during the Outblaze login process the attacker can manipulate the
domain name, mail id and user credentials. Using this malicious cookie the
attacker may access the victim's information page and thereby retrieve the
victim's password.

If successful the attacker may disclose a user's authentication
credentials and gain full administrative access to the user's e-mail
account.

28. BEA WebLogic Remote Unprivileged Administration Access Vulnerability
BugTraq ID: 7124
Remote: Yes
Date Published: Mar 17 2003 12:00AM
Relevant URL: http://www.securityfocus.com/bid/7124
Summary:

BEA Systems WebLogic Server is an enterprise level Java web application
server.

The WebLogic server contains undocumented applications that are normally
used during data replication between servers and for supporting
application deployment, including source code distribution.

These applications may be accessed remotely by any unprivileged user.
The unprivileged user could modify applications, source code, and access
various administrative functions on the underlying server.

29. BEA WebLogic Internal Servlet Input Validation Vulnerabilities
BugTraq ID: 7122
Remote: Yes
Date Published: Mar 17 2003 12:00AM
Relevant URL: http://www.securityfocus.com/bid/7122
Summary:

BEA Systems WebLogic is an enterprise level Java web application server.

Input validation issues have been reported in a WebLogic internal servlet
that is used by the web management interface. Unauthenticated users may
exploit these issues in the internal servlet to upload malicious files to
a host running the vulnerable software. It has been reported that
arbitrary files may be overwritten when a file is uploaded via the
internal servlet. It will also be possible to retrieve arbitrary server
readable files from the host.

Exploitation could result in execution of arbitrary commands in the
context of the server or disclosure of sensitive information would may aid
in further attacks.

WebLogic 6.0 and 6.1 allow unauthenticated users to upload files via the
internal servlet. WebLogic 6.0, 6.1 and 7.0 are prone to various file
disclosure attacks. It is not known whether 7.0.0.1 is affected.

These issues were reported to affect BEA WebLogic Server. BEA WebLogic
Express may also be affected, so users of WebLogic Express are also
advised to apply the provided patches.

30. Sun XDR Library xdrmem_getbytes() Integer Overflow Vulnerability
BugTraq ID: 7123
Remote: Yes
Date Published: Mar 17 2003 12:00AM
Relevant URL: http://www.securityfocus.com/bid/7123
Summary:

The Sun XDR (External Data Representation) library is used to for various
functions including interprocess communication (IPC) and is typically
implemented by RPC services. XDR library code is implemented by a variety
of system libraries including GNU libc, BSD libc, and Sun Microsystem's
libnsl.

A vulnerability has been discovered in the xdrmem_getbytes() function
defined by the XDR library. Due to an integer overflow in the function,
multiple applications linking to the library may be prone to a variety of
vulnerabilities.

By passing a malicious integer to the function, it may be possible for an
attacker to trigger an unexpected allocation of process memory. This may
cause implemented bounds checking to be insufficient. Furthermore,
previously used memory may be allocated which could contain sensitive
information.

Successful exploitation of this issue on a vulnerable application may
allow an attacker to execute arbitrary commands with root privileges.

31. Kebi Academy 2001 Input Validation Vulnerability
BugTraq ID: 7125
Remote: Yes
Date Published: Mar 17 2003 12:00AM
Relevant URL: http://www.securityfocus.com/bid/7125
Summary:

Kebi Academy 2001 is web-based mail/community software. It is available
for Unix and Linux variants.

Kebi Academy 2001 does not sufficiently validate input supplied via URI
parameters. As a result, it has been reported that it is possible to
retrieve arbitrary files which are readable by the web server. This is
due to insufficient sanitization of directory traversal sequences from
requests.

It has also been reported that it is possible to upload malicious files to
the server. This could result in disclosure of sensitive information
which may be useful in mounting further attacks against the system.
Execution of arbitrary commands in the context of the web server is also
possible if a malicious file can be uploaded and then requested by the
remote attacker.

32. Gnome-lokkit Iptables No Forward Chain Rule Vulnerability
BugTraq ID: 7128
Remote: Yes
Date Published: Mar 17 2003 12:00AM
Relevant URL: http://www.securityfocus.com/bid/7128
Summary:

Gnome-lokkit is a utility that provides firewalling for the average Linux
end user based on responses to a small number of simple questions.

Gnome-lokkit for Red Hat 8.0 was modified to configure iptables instead of
ipchains based firewalls. Gnome-lokkit has been reported prone to a
condition where FORWARD chains in iptables rulesets are not configured by
default. This situation may result in a variety of security
vulnerabilities depending on system configuration.

It should be noted that a vulnerability might only present itself if an
administrator were to enable packet forwarding, without adding rules to
the FORWARD chain.

The vulnerability was reported to affect Gnome-lokkit for Red Hat Linux
8.0. Previous versions of Gnome-lokkit are not reported to be affected.

33. MyAbraCadaWeb Path Disclosure Vulnerability
BugTraq ID: 7126
Remote: Yes
Date Published: Mar 17 2003 12:00AM
Relevant URL: http://www.securityfocus.com/bid/7126
Summary:

MyABraCaDaWeb is a web content management system. It is implemented in
PHP and available for Unix and Linux variants and Microsoft Windows
operating systems.

MyABraCaDaWeb is reported to disclose path information in error messages
when handling some invalid requests. This may occur when an invalid
administrative ID is requested or in some other cases. The full path to
the web root directory will be included in the error output. This
information could be useful in further attacks against a system hosting
the software.

34. MyAbraCadaWeb Search Engine Cross-Site Scripting Vulnerability
BugTraq ID: 7127
Remote: Yes
Date Published: Mar 17 2003 12:00AM
Relevant URL: http://www.securityfocus.com/bid/7127
Summary:

MyABraCaDaWeb is a web content management system. It is implemented in
PHP and available for Unix and Linux variants and Microsoft Windows
operating systems.

MyABraCaDaWeb provides a facility that allows users to search for
keywords. A cross-site scripting vulnerability has been reported in
MyABraCaDaWeb's search engine. HTML and script code are not sufficiently
sanitized when included in URI parameters of the vulnerable search
facility.

This could allow creation of malicious links to the vulnerable script
which include hostile HTML and script code. If such a link was visited by
a web user, attacker-supplied HTML and script code could be interpreted by
the user's browser. This would occur in the security context of the site
hosting the software.

35. PXE Server Remote Buffer Overrun Vulnerability
BugTraq ID: 7129
Remote: Yes
Date Published: Mar 17 2003 12:00AM
Relevant URL: http://www.securityfocus.com/bid/7129
Summary:

Red Hat Linux includes a Preboot eXecution Environment (PXE) server. PXE
can be used to boot a Linux based system from a remote disk image.

A vulnerability has been discovered in PXE which is included with Red Hat
Linux. Specifically, it is possible for a remote attacker to overrun a
buffer by passing 10000 bytes of data to the service. This may result in
the corruption of sensitive process memory, such as a saved instruction
pointer, and as such may allow an attacker to execute arbitrary commands.

Successful exploitation of this issue could allow an attacker to execute
commands with root privileges.

This issue has been reported to exist in PXE 2.0 Beta-1 on Red Hat Linux.
Other versions may also be affected by this vulnerability.

36. BEA Systems WebLogic JNDI Tree Modify Access Vulnerability
BugTraq ID: 7131
Remote: Yes
Date Published: Mar 18 2003 12:00AM
Relevant URL: http://www.securityfocus.com/bid/7131
Summary:

BEA Systems WebLogic Server is an enterprise level Java web application
server.

A problem with the software may allow unauthorized information deletion to
be performed by any user.

It has been reported that BEA Systems WebLogic allows the performance of
some unauthorized functions in the JNDI tree by users. Because of this,
an attacker may be able to destroy data, and potentially cause a denial of
service.

The problem is in the handling of the 'modify' function. Due to an issue
in the WebLogic server, an attacker could potentially use the modify
command to delete empty sub-contexts. This could result in a potential
denial of service, and the violation of local security policies.


37. BEA WebLogic Web Application Authentication Bypass Vulnerability
BugTraq ID: 7130
Remote: Yes
Date Published: Mar 18 2003 12:00AM
Relevant URL: http://www.securityfocus.com/bid/7130
Summary:

BEA Systems WebLogic Server is an enterprise level Java web application
server.

BEA WebLogic reported vulnerable to an authentication bypass vulnerability
under certain circumstances.

When a BEA WebLogic web application that implements session persistence is
redistributed without a server reboot, an authenticated session, in some
cases, can be reused for a variable period of time without requiring valid
authentication credentials.

It should be noted that only systems which use BEA WebLogic web based
applications, session persistence functionality and dynamic redeployment
are reported vulnerable to this problem.

This vulnerability may be exploited to gain access to the WebLogic server
without prior authentication.

38. HP Tru64/HP-UX C Library Standard I/O File Descriptor Vulnerability
BugTraq ID: 7132
Remote: Yes
Date Published: Mar 18 2003 12:00AM
Relevant URL: http://www.securityfocus.com/bid/7132
Summary:

It has been reported that HP Tru64 and HP-UX based kernels do not check to
ensure that the C library standard I/O file descriptors 0-2 are valid open
files before exec()ing setuid images. Consequently, I/O channels that are
opened by a setuid process may be assigned file descriptors equivelent to
those defined in the C library as 'standard input','standard output', and
'standard error'.

When file descriptors are assigned, the lowest numerical value that is not
already open is used. If a process has closed 0-2 prior to executing a
setuid image, these file descriptors will be assigned to the first I/O
resources opened or created by the process.

If a sensitive I/O channel has been opened by a setuid/setgid process and
assigned a standard I/O file descriptor, untrusted data may be written to
the sensitive channel by C library functions, due to the preprocessor
definitions of 'STDOUT' and 'STDIN'. Data may also be read (and then
output, depending on the application) from the I/O resource corresponding
to the STDIN file descriptor.

Exploitation and consequence are dependent on the particular setuid/setgid
application.

39. SIPS User Information Disclosure Vulnerability
BugTraq ID: 7134
Remote: Yes
Date Published: Mar 18 2003 12:00AM
Relevant URL: http://www.securityfocus.com/bid/7134
Summary:

SIPS is a weblog and link indexing system. It is available for Unix and
Linux variants in addition to Microsoft Windows operating systems.

It has been reported that SIPS fails to authenticate users before granting
users to user account information. As a result, it may be possible for an
attacker to access sensitive data by making a request to a specific
location, including the first letter of a username, followed by the full
username.

By gaining access to sensitive user account data it may be possible for an
attacker to launch further attacks.

It should be noted that this vulnerability was reported in SIPS v0.2.2
however, other versions may also be affected.

40. Cyber-Cats Chitchat PHP Message Board/Guestbook Password File Viewing Vulnerability
BugTraq ID: 7136
Remote: Yes
Date Published: Mar 19 2003 12:00AM
Relevant URL: http://www.securityfocus.com/bid/7136
Summary:

Cyber-Cats Chitchat PHP Message Board/Guestbook permits users to interact
and communicate via a virtual community. It is available for Unix, Linux,
and Microsoft Operating Systems.

A problem with the software may allow a remote user unauthorized access to
the board.

Cyber-Cats Chitchat PHP Message Board/Guestbook does not sufficiently
limit access to files on the local system. Because of this, an attacker
could potentially gain access to sensitive files.

The problem is in the limiting of access to the password file. User names
and passwords for the board are stored in the
$guest_board_directory/files/passwd.txt file. An attacker could gain
access to this file and launch a brute force attack against the encrypted
password hashes contained in the file, gaining unauthorized access to user
accounts.

41. Mambo Site Server index.php Cross Site Scripting Vulnerability
BugTraq ID: 7135
Remote: Yes
Date Published: Mar 18 2003 12:00AM
Relevant URL: http://www.securityfocus.com/bid/7135
Summary:

Mambo Site Server has been reported prone to a cross-site scripting
vulnerability.

It has been reported that user supplied URI parameters are not
sufficiently sanitized by the Mambo Site Server. Specifically the
'searchword' parameter of the search option in the 'index.php' page. As a
result of this deficiency an attacker may exploit this vulnerability by
creating a specially crafted URL that includes malicious HTML code as URI
parameters for the Mambo Site server 'index.php' page.

This may allow for theft of cookie-based authentication credentials and
other attacks.

This vulnerability was reported to affect Mambo Site Server version 4.0.10
it is not currently known if other versions are affected.
 
Old 03-28-2003, 05:10 PM   #5
unSpawn
Moderator
 
Registered: May 2001
Posts: 29,415

Original Poster
Blog Entries: 55

Rep: Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600
Mar 28th 2003 (LAW)

Linux Advisory Watch

Package: openssl
Date: 03-22-2003
Description:

Researchers have discovered a timing attack on RSA keys, to which OpenSSL
is generally vulnerable, unless RSA blinding has been turned on.
Caldera Vendor Advisory:
http:http://www.linuxsecurity.com/advisor...sory-3039.html
FreeBSD:
FreeBSD Vendor Advisory:
http:http://www.linuxsecurity.com/advisor...sory-3035.html
Gentoo:
Gentoo Vendor Advisory:
http:http://www.linuxsecurity.com/advisor...sory-3042.html
Mandrake:
Mandrake Vendor Advisory:
http:http://www.linuxsecurity.com/advisor...sory-3063.html
NetBSD:
NetBSD Vendor Advisory:
http:http://www.linuxsecurity.com/advisor...sory-3069.html
Trustix:
Trustix Vendor Advisory:
http:http://www.linuxsecurity.com/advisor...sory-3074.html
TurboLinux:
TurboLInux Vendor Advisory:
http:http://www.linuxsecurity.com/advisor...sory-3075.html

Package: apcupsd
Date: 03-22-2003
Description:
Multiple vulnerabilities in apcupsd including a buffer overflow and format
string vulnerability have been fixed.
Caldera Vendor Advisory:
http:http://www.linuxsecurity.com/advisor...sory-3057.html
SuSE Vendor Advisory:
http:http://www.linuxsecurity.com/advisor...sory-3060.html

Package: bonsai
Date: 03-21-2003
Description:
Several security related bugs have been fix in bonsai.
Debian Vendor Advisory:
http:http://www.linuxsecurity.com/advisor...sory-3025.html

Package: krb5
Date: 03-21-2003
Description:
Several vulnerabilities have been discovered in krb5, an
implementation of MIT Kerberos.
Debian Vendor Advisory:
http:http://www.linuxsecurity.com/advisor...sory-3040.html

Package: lpr
Date: 03-24-2003
Description:
A buffer overflow has been discovered in lpr, a BSD lpr/lpd line
printer spooling system. This problem can be exploited by a local
user to gain root privileges, even if the printer system is set up
properly.
Debian Vendor Advisory:
http:http://www.linuxsecurity.com/advisor...sory-3050.html
TurboLinux:
TurboLinux Vendor Advisory:
http:http://www.linuxsecurity.com/advisor...sory-3047.html

Package: mutt
Date: 03-25-2003
Description:
Core Security Technologies discovered a buffer overflow in the IMAP
code of Mutt, a text-oriented mail reader supporting IMAP, MIME, GPG,
PGP and threading. This problem allows a remote malicious IMAP
server to cause a denial of service (crash) and possibly execute
arbitrary code via a specially crafted mail folder.
Debian Vendor Advisory:
http:http://www.linuxsecurity.com/advisor...sory-3064.html
Gentoo Vendor Advisory:
http:http://www.linuxsecurity.com/advisor...sory-3041.html
SuSE Vendor Advisory:
http:http://www.linuxsecurity.com/advisor...sory-3045.html

Package: heimdal
Date: 03-25-2003
Description:
A cryptographic weakness in version 4 of the Kerberos protocol allows an
attacker to use a chosen-plaintext attack to impersonate any principal in
a realm. Additional cryptographic weaknesses in the krb4 implementation
permit the use of cut-and-paste attacks to fabricate krb4 tickets for
unauthorized client principals if triple-DES keys are used to key krb4
services. These attacks can subvert a site's entire Kerberos
authentication infrastructure.
Debian Vendor Advisory:
http:http://www.linuxsecurity.com/advisor...sory-3065.html

Package: kernel
Date: 03-27-2003
Description:
The kernel module loader in Linux 2.2 and Linux 2.4 kernels has a flaw in
ptrace. This hole allows local users to obtain root privileges by using
ptrace to attach to a child process that is spawned by the kernel. Remote
exploitation of this hole is not possible.
Debian Vendor Advisory:
http:http://www.linuxsecurity.com/advisor...sory-3071.html
SuSE Vendor Advisory:
http:http://www.linuxsecurity.com/advisor...sory-3060.html

Package: ecartis
Date: 03-27-2003
Description:
A problem has been discovered in ecartis, a mailing list manager, formerly
known as listar. This vulnerability enables an attacker to reset the
password of any user defined on the list server, including the list
admins.
Debian Vendor Advisory:
http:http://www.linuxsecurity.com/advisor...sory-3076.html

Package: glibc
Date: 03-21-2003
Description:
This update fixes an integer overflow in the xdrmem_getbytes() function of
glibc.
EnGarde Vendor Advisory:
http:http://www.linuxsecurity.com/advisor...sory-3024.html
Gentoo Vendor Advisory:
http:http://www.linuxsecurity.com/advisor...sory-3051.html
Mandrake Vendor Advisory:
http:http://www.linuxsecurity.com/advisor...sory-3059.html
NetBSD Vendor Advisory:
http:http://www.linuxsecurity.com/advisor...sory-3067.html
Trustix Vendor Advisory:
http:http://www.linuxsecurity.com/advisor...sory-3073.html

Package: mysql
Date: 03-21-2003
Description:
Versions of MySQL prior to 3.23.56 contained a vulnerability which
could allow MySQL users to gain root privileges by using "SELECT *
INFO OUTFILE" to overwrite a configuration file, causing MySQL to run
as root upon its next restart.
EnGarde Vendor Advisory:
http:http://www.linuxsecurity.com/advisor...sory-3046.html

Package: bitchx
Date: 03-24-2003
Description:
Bitchx is full of sprintf() calls and relying on BIG_BUFFER_SIZE
being large enough.
Gentoo Vendor Advisory:
http:http://www.linuxsecurity.com/advisor...sory-3046.html

Package: mod_ssl
Date: 03-22-2003
Description:
"Researchers have discovered a timing attack on RSA keys, to which
OpenSSL is generally vulnerable, unless RSA blinding has been turned
on."
Gentoo Vendor Advisory:
http:http://www.linuxsecurity.com/advisor...sory-3052.html

Package: netpbm
Date: 03-25-2003
Description:
Several math overflow errors were found in NetPBM by Al Viro and Alan Cox.
While these programs are not installed suid root, they are often used to
prepare data for processing. These errors may permit remote attackers to
cause a denial of service or execute arbitrary code in any programs or
scripts that use these graphics conversion tools.
Mandrake Vendor Advisory:
http:http://www.linuxsecurity.com/advisor...sory-3058.html

Package: rxvt
Date: 03-25-2003
Description:
Digital Defense Inc. released a paper detailing insecurities in various
terminal emulators, including rxvt. Many of the features supported by
these programs can be abused when untrusted data is displayed on the
screen. This abuse can be anything from garbage data being displayed to
the screen or a system compromise.
Mandrake Vendor Advisory:
http:http://www.linuxsecurity.com/advisor...sory-3062.html
TurboLinux Vendor Advisory:
http:http://www.linuxsecurity.com/advisor...sory-3047.html

Package: zlib
Date: 03-25-2003
Description:
The gzprintf function in zlib did not do bounds checking on user supplied
data. Depending on how the function is used in an application, malign
source data can be designed to overflow a buffer and execute arbitrary
code as the user of the application.
NetBSD Vendor Advisory:
http:http://www.linuxsecurity.com/advisor...sory-3070.html

Package: evolution
Date: 03-25-2003
Description:
Updated Evolution packages are available which fix several
vulnerabilities.

Package: samba
Date: 03-21-2003
Description:
Updated samba packages are now available to fix security
vulnerabilities found during a code audit.
Red Hat Vendor Advisory:
http:http://www.linuxsecurity.com/advisor...sory-3054.html

Package: kerberos
Date: 03-26-2003
Description:
Updated Kerberos packages fix a number of vulnerabilities found in
MIT Kerberos.
Red Hat Vendor Advisory:
http:http://www.linuxsecurity.com/advisor...sory-3072.html

Package: ethereal
Date: 03-26-2003
Description:
Ethereal is a GUI for analyzing and displaying network traffic.
Ethereal is vulnerable to a format string bug in it's SOCKS code and
to a heap buffer overflow in it's NTLMSSP code. These bugs can be
abused to crash ethereal or maybe to execute arbitrary code on the
machine running ethereal.
SuSE Vendor Advisory:
http:http://www.linuxsecurity.com/advisor...sory-3031.html

Package: file
Date: 03-21-2003
Description:
The file command can be used to determine the type of files.
iDEFENSE published a security report about a buffer overflow in the
handling-routines for the ELF file-format.
SuSE Vendor Advisory:
http:http://www.linuxsecurity.com/advisor...sory-3029.html
 
  


Reply



Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
LQ weekly security rep - Sep 25th 2003 unSpawn Linux - Security 3 09-25-2003 04:35 PM
LQ weekly security rep - Mon Mar 17th 2003 unSpawn Linux - Security 3 03-21-2003 02:14 PM
LQ weekly security rep - Mon Mar 10th 2003 unSpawn Linux - Security 5 03-14-2003 03:22 PM
LQ weekly security rep - Tue Mar 04th 2003 unSpawn Linux - Security 4 03-09-2003 11:31 AM
LQ weekly security rep - Tue Jun 25th 2002 unSpawn Linux - Security 4 06-25-2002 03:49 PM

LinuxQuestions.org > Forums > Linux Forums > Linux - Security

All times are GMT -5. The time now is 01:55 AM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration