LinuxQuestions.org
Welcome to the most active Linux Forum on the web.
Home Forums Tutorials Articles Register
Go Back   LinuxQuestions.org > Forums > Linux Forums > Linux - Security
User Name
Password
Linux - Security This forum is for all security related questions.
Questions, tips, system compromises, firewalls, etc. are all included here.

Notices


Reply
  Search this Thread
Old 05-06-2003, 05:38 AM   #1
unSpawn
Moderator
 
Registered: May 2001
Posts: 29,415
Blog Entries: 55

Rep: Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600
LQ weekly security rep - Tue May 02nd 2003


May 5th 2003
12 of 28 issues handled (SF)
1. Truegalerie Unauthorized Administrative Access Vulnerability
4. Xoops MyTextSanitizer HTML Injection Vulnerability
5. Linux-ATM LES Command Line Argument Buffer Overflow Vulnerability
8. Invision Board Restricted Forum Plaintext Password Vulnerability
9. Onecenter Forum IMG Tag Script Injection Vulnerability
11. Macromedia ColdFusion MX Error Message Path Disclosure Vulnerability
12. Mike Bobbit Album.PL Remote Command Execution Vulnerability
15. Qualcomm Qpopper Poppassd Local Arbitrary Command Execution Vulnerability
16. Apache Mod_Auth_Any Remote Command Execution Vulnerability
22. Oracle Net Services Link Buffer Overflow Vulnerability
23. Netscape Navigator Directory Cross-Domain Scripting Vulnerability
28. Worker Filemanager Directory Creation Race Condition Vulnerability

May 05th 2003
18 of 50 issues handled (ISS)
Bugzilla bug summary cross-site scripting
Bugzilla temporary file symlink attack
ForumOne HTML IMG tag cross-site scripting
Invision Power Board stores administrator password
XOOPS MyTextSanitizer() function cross-site
Qpopper poppassd root access
album.pl command execution
Macromedia ColdFusion MX physical path disclosure
SAP DB SDBINST race condition
MDaemon POP3 negative number denial of service
OpenBB multiple scripts SQL Injection
Oracle Database Servers 'CREATE DATABASE LINK'
Truegalerie verif_admin.php and check_admin.php
Truegalerie upload form could allow an attacker to
Red Hat Enterprise Linux mod_auth_any command
OpenSSH PAM support enabled information leak
ATM on Linux "les" executable command line buffer
IdeaBox file include

May 2nd 2003
18 issues handled (LAW)
apcupsd
sendmail
apache
balsa
pptp
kdebase
snort
tcpdump
monkeyd
mgetty
ethereal
squirrelmail
lprng
micq
zlib
mysql
man
xinetd
 
Old 05-06-2003, 05:41 AM   #2
unSpawn
Moderator
 
Registered: May 2001
Posts: 29,415

Original Poster
Blog Entries: 55

Rep: Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600
May 2nd 2003 (LAW)

Linux Advisory Watch

Package: apcupsd
Description:
Multiple buffer overflows in apcupsd may allow attackers to cause a denial
of service or execute arbitrary code, related to usage of the vsprintf
function.
Caldera Vendor Advisory:
http:http://www.linuxsecurity.com/advisor...sory-3057.html

Package: sendmail
Description:
>From CERT CA-2003-12: There is a vulnerability in sendmail that can be
exploited to cause a denial-of-service condition and could allow a remote
attacker to execute arbitrary code with the privileges of the sendmail
daemon, typically root.
Caldera Vendor Advisory:
http:http://www.linuxsecurity.com/advisor...sory-3057.html
Conectiva Vendor Advisory:
http:http://www.linuxsecurity.com/advisor...sory-3220.html

Package: apache
Description:
There is a memory leak in these apache versions which can be remotely
triggered by sending large chunks of consecutive linefeed characters. Each
linefeed will cause the server to allocate 80 bytes of memory.
Conectiva Vendor Advisory:
http:http://www.linuxsecurity.com/advisor...sory-3219.html

Package: balsa
Description:
An attacker who is able to control an IMAP server accessed by balsa can
exploit this vulnerability to remotely crash the client or execute
arbitrary code with the privileges of the user running it. This update
fixes this vulnerability.
Conectiva Vendor Advisory:
http:http://www.linuxsecurity.com/advisor...sory-3221.html
Gentoo Vendor Advisory:
http:http://www.linuxsecurity.com/advisor...sory-3216.html

Package: pptp
Description:
Timo Sirainen discovered a vulnerability in pptpd, a Point to Point
Tunneling Server, which implements PPTP-over-IPSEC and is commonly used to
create Virtual Private Networks (VPN). By specifying a small packet length
an attacker is able to overflow a buffer and execute code under the user
id that runs pptpd, probably root. An exploit for this problem is already
circulating.
Debian Vendor Advisory:
http:http://www.linuxsecurity.com/advisor...sory-3214.html
Gentoo Vendor Advisory:
http:http://www.linuxsecurity.com/advisor...sory-3209.html

Package: kdebase
Description:
The KDE team discoverd a vulnerability in the way KDE uses Ghostscript
software for processing of PostScript (PS) and PDF files. An attacker
could provide a malicious PostScript or PDF file via mail or websites that
could lead to executing arbitrary commands under the privileges of the
user viewing the file or when the browser generates a directory listing
with thumbnails.
Debian Vendor Advisory:
http:http://www.linuxsecurity.com/advisor...sory-3215.html
SuSE Vendor Advisory:
http:http://www.linuxsecurity.com/advisor...sory-3201.html

Package: snort
Description:
Two vulnerabilities have been discoverd in Snort, a popular network
intrusion detection system.Snort comes with modules and plugins that
perform a variety of functions such as protocol analysis.
Debian Vendor Advisory:
http:http://www.linuxsecurity.com/advisor...sory-3223.html
EnGarde Vendor Advisory:
http:http://www.linuxsecurity.com/advisor...sory-3217.html
Gentoo Vendor Advisory:
http:http://www.linuxsecurity.com/advisor...sory-3207.html
Mandrake Vendor Advisory:
http:http://www.linuxsecurity.com/advisor...sory-3212.html

Package: tcpdump
Description:
There are several vulnerabilities in the tcpdump package shipped with
EnGarde Secure Linux.
EnGarde Vendor Advisory:
http:http://www.linuxsecurity.com/advisor...sory-3218.html

Package: monkeyd
Description:
A buffer overflow vulnerability exists in Monkey's handling of forms
submitted with the POST request method.The unchecked buffer lies in the
PostMethod() procedure.
Gentoo Vendor Advisory:
http:http://www.linuxsecurity.com/advisor...sory-3208.html

Package: mgetty
Description:
Buffer overflow in cnd-program for mgetty before 1.1.29 allows remote
attackers to cause a denial of service and possibly execute arbitrary code
via a Caller ID string with a long CallerName argument.
Gentoo Vendor Advisory:
http:http://www.linuxsecurity.com/advisor...sory-3210.html

Package: ethereal
Description:
A vulnerability was discovered in Ethereal 0.9.9 and earlier that allows a
remote attacker to use specially crafted SOCKS packets to cause a denial
of service (DoS) and possibly execute arbitrary code.
Mandrake Vendor Advisory:
http:http://www.linuxsecurity.com/advisor...sory-3203.html

Package: squirrelmail
Description:
Cross-site scripting vulnerabilities in SquirrelMail version 1.2.10 and
earlier allow remote attackers to execute script as other Web users via
mailbox displays, message displays, or search results displays.The
Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned
the name CAN-2003-0160 to these issues.
Mandrake Vendor Advisory:
http:http://www.linuxsecurity.com/advisor...sory-3204.html

Package: lprng
Description:
A vulnerability has been found in psbanner, which creates a temporary file
with a known filename in an insecure manner.An attacker could create a
symbolic link and cause arbitrary files to be written as the 'lp' user.
Mandrake Vendor Advisory:
http:http://www.linuxsecurity.com/advisor...sory-3205.html

Package: micq
Description:
mICQ versions 0.4.9 and earlier allow remote attackers to cause a denial
of service (crash) using malformed ICQ message types without a 0xFE
separator character.
Red Hat Vendor Advisory:
http:http://www.linuxsecurity.com/advisor...sory-3206.html

Package: zlib
Description:
Updated zlib packages are now available which fix a buffer overflow
vulnerability.
Red Hat Vendor Advisory:
http:http://www.linuxsecurity.com/advisor...sory-3211.html

Package: mysql
Description:
A double-free vulnerability in mysqld, for MySQL before version 3.23.55,
allows attackers with MySQL access to cause a denial of service (crash) by
creating a carefully crafted client application. The Common
Vulnerabilities and Exposures project (cve.mitre.org) has assigned the
name CAN-2003-0073 to this issue.
Red Hat Vendor Advisory:
http:http://www.linuxsecurity.com/advisor...sory-3211.html

Package: man
Description:
Updated man packages fix a minor security vulnerability.
Red Hat Vendor Advisory:
http:http://www.linuxsecurity.com/advisor...sory-3224.html

Package: xinetd
Description:
The remote attackers can create DoS condition on the xined server.
Turbo Linux Vendor Advisory:
http:http://www.linuxsecurity.com/advisor...sory-3202.html
 
Old 05-06-2003, 05:44 AM   #3
unSpawn
Moderator
 
Registered: May 2001
Posts: 29,415

Original Poster
Blog Entries: 55

Rep: Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600
May 05th 2003 (ISS)

Internet Security Systems

Date Reported: 04/25/2003
Brief Description: Bugzilla bug summary cross-site scripting
Risk Factor: Medium
Attack Type: Network Based
Platforms: BSD Any version, Bugzilla 2.16.2, Linux Any
version, Unix Any version, Windows Any version
Vulnerability: bugzilla-bug-summary-xss
X-Force URL: http://www.iss.net/security_center/static/11866.php

Date Reported: 04/25/2003
Brief Description: Bugzilla temporary file symlink attack
Risk Factor: Medium
Attack Type: Host Based
Platforms: BSD Any version, Bugzilla 2.16.2 and earlier,
Bugzilla 2.17.3 and earlier, Linux Any version,
Unix Any version, Windows Any version
Vulnerability: bugzilla-tmpfile-symlink
X-Force URL: http://www.iss.net/security_center/static/11867.php

Date Reported: 04/24/2003
Brief Description: ForumOne HTML IMG tag cross-site scripting
Risk Factor: Medium
Attack Type: Network Based
Platforms: ForumOne 4.0, Linux Any version, Unix Any version,
Windows Any version
Vulnerability: forumone-img-tag-xss
X-Force URL: http://www.iss.net/security_center/static/11870.php

Date Reported: 04/25/2003
Brief Description: Invision Power Board stores administrator password
in plain text
Risk Factor: Medium
Attack Type: Network Based
Platforms: Invision Power Board Any version, Linux Any
version, Unix Any version, Windows Any version
Vulnerability: invision-admin-plaintext-password
X-Force URL: http://www.iss.net/security_center/static/11871.php

Date Reported: 04/25/2003
Brief Description: XOOPS MyTextSanitizer() function cross-site
scripting
Risk Factor: Medium
Attack Type: Network Based
Platforms: Linux Any version, Unix Any version, Windows Any
version, XOOPS 1.3.5 through 1.3.9, XOOPS 2.0
through 2.0.1
Vulnerability: xoops-mytextsanitizer-xss
X-Force URL: http://www.iss.net/security_center/static/11872.php

Date Reported: 04/28/2003
Brief Description: Qpopper poppassd root access
Risk Factor: High
Attack Type: Host Based
Platforms: Linux Any version, Qpopper 4.0.x, Unix Any version
Vulnerability: qpopper-poppassd-root-access
X-Force URL: http://www.iss.net/security_center/static/11877.php

Date Reported: 04/26/2003
Brief Description: album.pl command execution
Risk Factor: High
Attack Type: Network Based
Platforms: album.pl 6.1 and earlier, Linux Any version, Unix
Any version, Windows Any version
Vulnerability: albumpl-command-execution
X-Force URL: http://www.iss.net/security_center/static/11878.php

Date Reported: 04/26/2003
Brief Description: Macromedia ColdFusion MX physical path disclosure
Risk Factor: Low
Attack Type: Network Based
Platforms: ColdFusion MX Any version, Windows 2000 Any
version, Windows NT Any version, Windows XP Any
version
Vulnerability: coldfusion-mx-path-disclosure
X-Force URL: http://www.iss.net/security_center/static/11879.php

Date Reported: 04/27/2003
Brief Description: SAP DB SDBINST race condition
Risk Factor: High
Attack Type: Host Based
Platforms: Linux Any version, SAP DB 7.3.0.29, SAP DB 7.4.3.7
beta, Unix Any version
Vulnerability: sap-db-sdbinst-race
X-Force URL: http://www.iss.net/security_center/static/11881.php

Date Reported: 04/28/2003
Brief Description: MDaemon POP3 negative number denial of service
Risk Factor: Low
Attack Type: Network Based
Platforms: MDaemon 6.0.7 and earlier, Windows Any version
Vulnerability: mdaemon-pop3-negative-dos
X-Force URL: http://www.iss.net/security_center/static/11882.php

Date Reported: 04/25/2003
Brief Description: OpenBB multiple scripts SQL Injection
Risk Factor: Medium
Attack Type: Network Based
Platforms: Linux Any version, OpenBB 1.1.0, Unix Any version,
Windows Any version
Vulnerability: openbb-multiple-sql-injection
X-Force URL: http://www.iss.net/security_center/static/11884.php

Date Reported: 04/25/2003
Brief Description: Oracle Database Servers 'CREATE DATABASE LINK'
buffer overflow
Risk Factor: High
Attack Type: Network Based
Platforms: Oracle7 Database Server 7.3.x, Oracle8i Database
Server 8.0.x, Oracle8i Database Server 8.1.x,
Oracle9i Database Server Release 1 Any version,
Oracle9i Database Server Release 2 Any version
Vulnerability: oracle-database-link-bo
X-Force URL: http://www.iss.net/security_center/static/11885.php

Date Reported: 04/25/2003
Brief Description: Truegalerie verif_admin.php and check_admin.php
could allow administrative access
Risk Factor: Medium
Attack Type: Network Based
Platforms: Linux Any version, Truegalerie 1.0, Unix Any
version, Windows Any version, Windows XP Any
version
Vulnerability: truegalerie-verifadmin-admin-access
X-Force URL: http://www.iss.net/security_center/static/11886.php

Date Reported: 04/25/2003
Brief Description: Truegalerie upload form could allow an attacker to
view files
Risk Factor: Medium
Attack Type: Network Based
Platforms: Linux Any version, Truegalerie 1.0, Unix Any
version, Windows Any version
Vulnerability: truegalerie-upload-view-files
X-Force URL: http://www.iss.net/security_center/static/11888.php

Date Reported: 04/28/2003
Brief Description: Red Hat Enterprise Linux mod_auth_any command
execution
Risk Factor: High
Attack Type: Network Based
Platforms: Red Hat Advanced Workstation 2.1, Red Hat
Enterprise Linux 2.1AS, Red Hat Enterprise Linux
2.1ES, Red Hat Enterprise Linux 2.1WS, Red Hat
Linux 7.2, Red Hat Linux 7.3
Vulnerability: modauthany-command-execution
X-Force URL: http://www.iss.net/security_center/static/11893.php

Date Reported: 04/30/2003
Brief Description: OpenSSH PAM support enabled information leak
Risk Factor: Medium
Attack Type: Network Based
Platforms: Gentoo Linux Any version, OpenSSH 3.6.1p1 and
earlier, Unix Any version
Vulnerability: openssh-pam-info-leak
X-Force URL: http://www.iss.net/security_center/static/11902.php

Date Reported: 04/28/2003
Brief Description: ATM on Linux "les" executable command line buffer
overflow
Risk Factor: High
Attack Type: Host Based
Platforms: ATM on Linux 2.4.0, Linux Any version
Vulnerability: atmonlinux-les-command-bo
X-Force URL: http://www.iss.net/security_center/static/11903.php

Date Reported: 04/29/2003
Brief Description: IdeaBox file include
Risk Factor: Medium
Attack Type: Network Based
Platforms: IdeaBox 1.0, Linux Any version, Unix Any version,
Windows Any version
Vulnerability: ideabox-file-include
X-Force URL: http://www.iss.net/security_center/static/11907.php
 
Old 05-06-2003, 05:46 AM   #4
unSpawn
Moderator
 
Registered: May 2001
Posts: 29,415

Original Poster
Blog Entries: 55

Rep: Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600
May 5th 2003 (SF)

SecurityFocus

1. Truegalerie Unauthorized Administrative Access Vulnerability
BugTraq ID: 7427
Remote: Yes
Date Published: Apr 25 2003 12:00AM
Relevant URL: http://www.securityfocus.com/bid/7427
Summary:

Truegalerie is web-based photo album software implemented in PHP and is
available for a variety of platforms including Microsoft Windows and Linux
variant systems.

A vulnerability has been reported for Truegalerie that may result in
unauthorized administrative access. The vulnerability exists due to
insufficient sanitization of some URI values. Specifically, the values for
the URI parameter 'loggedin' are not properly verified.

An attacker can exploit this vulnerability by manipulating the 'loggedin'
URI parameter to obtain administrative access to the site hosting
Truegalerie.

This vulnerability was reported for Truegalerie 1.0.

4. Xoops MyTextSanitizer HTML Injection Vulnerability
BugTraq ID: 7434
Remote: Yes
Date Published: Apr 25 2003 12:00AM
Relevant URL: http://www.securityfocus.com/bid/7434
Summary:

Xoops is open-source, freely available web portal software written in
object-oriented PHP. It is back-ended by a MySQL database and will run on
most Unix and Linux distributions.

The MyTextSanitizer script is used by Xoops to filter unsupported and
malicious characters. It is also capable of filtering malicious scripts.

A script code injection vulnerability has been discovered in the
MyTextSanitizer script. The problem occurs due to insufficient filtering
of script code embedded within HTML 'img' tags. As a result, an attacker
may be capable of placing malicious HTML or script code within 'newbb'
posts, private messages, and news posts.

Successful exploitation of this vulnerability may allow a malicious Xoops
user to execute arbitrary HTML or script code within the browser of a
legitimate user. This may allow for the theft of cookie-based
authentication credentials that may escalate to session hijacking. Other
attacks are also possible.

This vulnerability affects Xoops releases prior to 1.3.10 and 2.0.1.

5. Linux-ATM LES Command Line Argument Buffer Overflow Vulnerability
BugTraq ID: 7437
Remote: No
Date Published: Apr 25 2003 12:00AM
Relevant URL: http://www.securityfocus.com/bid/7437
Summary:

Linux-atm is a set of drivers and tools designed to support ATM networking
under Linux.

The linux-atm 'les' executable has been reported prone to a buffer
overflow vulnerability.

This issue is due to a lack of sufficient bounds checking performed on
data supplied via the '-f' command line argument to the 'les' executable.
Excessive supplied data may overrun the bounds of an internal memory
buffer (of approximately 244 bytes in size) and corrupt adjacent memory.
Because adjacent memory may contain values that are crucial to the control
of execution flow, arbitrary code execution is possible.

Although this vulnerability reportedly affects linux-atm 2.4.0, previous
versions may also be affected.

It should be noted that it is not currently known whether this application
requires elevated privileges to run. No distributions are currently known
which install LES setuid.

8. Invision Board Restricted Forum Plaintext Password Vulnerability
BugTraq ID: 7440
Remote: No
Date Published: Apr 25 2003 12:00AM
Relevant URL: http://www.securityfocus.com/bid/7440
Summary:

Invision Board is an online bulletin board designed to facilitate
forum-based conversation.

Invision Board has been reported to store restricted forum credentials as
plain text embedded in cookie data.

If the Invision Board admin 'pass protected' option is activated for a
specific forum, on attempted access to the controlled area, the restricted
forum password is reportedly stored as plaintext in a local cookie. The
plaintext password may be recovered from the local cookie and used to
bypass the authentication method used to restrict the private areas of the
board.

It should be noted that although unconfirmed this vulnerability was
reported to affect all versions of Invision Power Board.

9. Onecenter Forum IMG Tag Script Injection Vulnerability
BugTraq ID: 7441
Remote: Yes
Date Published: Apr 25 2003 12:00AM
Relevant URL: http://www.securityfocus.com/bid/7441
Summary:

OneCenter ForumOne 4.0 is a full-featured, web-based group discussion
forum.

A problem with Onecenter ForumOne could allow remote users to execute
arbitrary code in the context of the web site hosting ForumOne. The
problem occurs due to the lack of sanitization performed on data embedded
within HTML tags.

Specifically, Onecenter ForumOne does not sanitize code embedded within
HTML IMG tags. As a result, a malicious user may be able to submit a post
to the site containing embedded script code. This code would be executed
by a user's browser in the context of the site.

This issue may be exploited to steal cookie-based authentication
credentials from legitimate users of the website running the vulnerable
software. The attacker may hijack the session of the legitimate by using
cookie-based authentication credentials. Other attacks are also possible.

Altough this vulnerability was reported to affect OneCenter ForumOne
version 4.0, previous version may also be affected.

11. Macromedia ColdFusion MX Error Message Path Disclosure Vulnerability
BugTraq ID: 7443
Remote: Yes
Date Published: Apr 26 2003 12:00AM
Relevant URL: http://www.securityfocus.com/bid/7443
Summary:

ColdFusion MX is the application server for developing and hosting
infrastructure distributed by Macromedia. It is available as a standalone
product for Unix, Linux, and Microsoft Operating Systems.

A vulnerability has been reported for Macromedia ColdFusion MX that may
reveal the physical path information to attackers.

When certain malformed URL requests are received by the server, an error
message is returned containing the full path of the ColdFusion
installation. Specifically, when a request for the /CFIDE/probe.cfm page
is made on the server process on port 8500, an error message is returned
which contains path information.

Information obtained in this manner may be used by an attacker to launch
further attacks against a vulnerable system.

12. Mike Bobbit Album.PL Remote Command Execution Vulnerability
BugTraq ID: 7444
Remote: Yes
Date Published: Apr 26 2003 12:00AM
Relevant URL: http://www.securityfocus.com/bid/7444
Summary:

Mike Bobbit Album.pl is a web-based photo album implemented in Perl. It is
available for a variety of platforms including Windows and Linux variant
operating systems.

A remote command execution vulnerability has been reported for Album.pl.
The vulnerability reportedly exists when alternate configuration files are
used. Thus, it may be possible for a remote attacker to execute arbitrary
commands in the context of the web server process.

A remote attacker may exploit this condition to gain local, interactive
access to the underlying host.

The precise technical details of this vulnerability are currently unknown.
This BID will be updated as further information is available.

15. Qualcomm Qpopper Poppassd Local Arbitrary Command Execution Vulnerability
BugTraq ID: 7447
Remote: No
Date Published: Apr 28 2003 12:00AM
Relevant URL: http://www.securityfocus.com/bid/7447
Summary:

Qualcomm Qpopper poppassd is a daemon that facilitates the modification of
email account passwords.

Qualcomm Qpopper poppassd has been reported prone to a local arbitrary
command execution vulnerability.

poppassd is installed with setUID root permissions set by default and is
executable by all local system users. There has been an issue reported in
poppassd that may allow a local user to execute arbitrary commands in the
context of the root user. An attacker may specify a path to the
'smbpasswd' executable via the '-s' poppassd command line switch. A
malicious executable may be supplied via the path to 'smbpasswd' option,
for example '-s /tmp/smbpasswd' and the executable will be called as
poppassd is run.

An attacker may exploit this condition to elevate privileges on the local
system. Because poppassd is by default setUID root, privileges attained
may be root.

16. Apache Mod_Auth_Any Remote Command Execution Vulnerability
BugTraq ID: 7448
Remote: Yes
Date Published: Apr 28 2003 12:00AM
Relevant URL: http://www.securityfocus.com/bid/7448
Summary:

mod_auth_any is an Apache module designed to carry out user authentication
using any program via the command-line.

A vulnerability has been discovered in the mod_auth_any Apache module.
When running commands which require user-supplied arguments, mod_auth_any
fails to sufficiently escape various user-supplied data. As a result, it
may be possible for a remote attacker to embed malicious shell
metacharacters, such as (`) or (;) within command-line arguments. These
metacharacters may result in the authentication procedure prematurely
ending and may cause attacker-supplied commands to be executed.

Successful exploitation of this vulnerability could allow an attacker to
gain access to a host using the vulnerable software with the privileges of
the Apache HTTPD server.

22. Oracle Net Services Link Buffer Overflow Vulnerability
BugTraq ID: 7453
Remote: Yes
Date Published: Apr 29 2003 12:00AM
Relevant URL: http://www.securityfocus.com/bid/7453
Summary:

Oracle has announced a buffer overflow vulnerability in Oracle Net
Services for the Oracle Database Server.

The vulnerability exists due to insufficient boundary checks performed by
the Oracle server for values supplied to the 'CREATE DATABASE LINK' query.

The 'CREATE DATABASE LINK' privileges are assigned to the CONNECT role
thus low privileged accounts are able to create database links.

A malicious attacker with CONNECT privileges can exploit this
vulnerability to create a specially crafted database link and then
executing a select query from the link. Once the link is selected the
buffer overflow condition will be triggered resulting in the corruption of
sensitive stack memory. Successful exploitation will result in the
execution of attacker-supplied code with the privileges of the database
server. On Windows systems, the Oracle Database Server is executed with
SYSTEM privileges and on Unix and Linux systems, the Database Server runs
as the 'oracle' user.

23. Netscape Navigator Directory Cross-Domain Scripting Vulnerability
BugTraq ID: 7456
Remote: Yes
Date Published: Apr 29 2003 12:00AM
Relevant URL: http://www.securityfocus.com/bid/7456
Summary:

Netscape is a web browser which is available for a number of platforms,
including Microsoft Windows and Unix and Linux variants.

A vulnerability has been reported that could allow an attacker to fool
Netscape into running script in a foreign domain. If a dot (.) is
appended to the end of the hostname in a URI, Netscape may accept the
directory name as the actual domain. This could permit a malicious web
page to access the DOM (Document Object Model) of another foreign domain.

An attacker could exploit this by enticing a user to visit a malicious URI
and then running malicious script code which can access the properties of
a foreign domain. This could lead to theft of cookie-based authentication
credentials, information disclosure or other attacks.

This issue was reported for Netscape Navigator 7.02. It is likely that
other versions of Netscape are vulnerable to this issue. As well, browsers
based on Mozilla may be vulnerable too.

28. Worker Filemanager Directory Creation Race Condition Vulnerability
BugTraq ID: 7460
Remote: No
Date Published: Apr 29 2003 12:00AM
Relevant URL: http://www.securityfocus.com/bid/7460
Summary:

Worker is a file management utility for the Unix X windowing system. It is
modeled after the Directory Opus 4 application and is available for
Unix-based operating systems.

A vulnerability has been discovered in Worker Filemanager 2.7. The problem
lies in a destination directory that is given world-readable and
executable permissions during data transfer. As a result, during a
specific time window, an attacker may be capable of modifying or accessing
sensitive files located in the directory. Permissions are changed to a
secure setting after the data transfer has completed.

Files located in this directory may contain sensitive data, which may aid
an attacker in launching further attacks against a target system. Though
unconfirmed, if these temporarily accessible files are writeable and later
used by a user or some application to carry out an operation, an attacker
may be capable of corrupting data or executing malicious commands. All
actions carried out would be done with the privileges of the user running
Worker Filemanager, possibly root.
 
  


Reply



Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
LQ weekly security rep - Tue Apr 29th 2003 unSpawn Linux - Security 3 04-29-2003 06:13 AM
LQ weekly security rep - Tue Apr 22th 2003 unSpawn Linux - Security 3 04-22-2003 01:59 PM
LQ weekly security rep - Tue Mar 04th 2003 unSpawn Linux - Security 4 03-09-2003 11:31 AM
LQ weekly security rep - Tue Feb 11th 2003 unSpawn Linux - Security 4 02-17-2003 06:16 AM
LQ weekly security rep - Tue Feb 04th 2003 unSpawn Linux - Security 2 02-04-2003 05:47 AM

LinuxQuestions.org > Forums > Linux Forums > Linux - Security

All times are GMT -5. The time now is 12:32 AM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration