[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Linux Advisory Watch: December 12th, 2008

| LinuxSecurity.com                                  Weekly Newsletter |
| December 12th, 2008                              Volume 9, Number 50 |
|                                                                      |
| Editorial Team:              Dave Wreski <dwreski@xxxxxxxxxxxxxxxxx> |
|                       Benjamin D. Thomas <bthomas@xxxxxxxxxxxxxxxxx> |

Thank you for reading the LinuxSecurity.com weekly security newsletter.
The purpose of this document is to provide our readers with a quick
summary of each week's most relevant Linux security headlines.

This week, advisories were released for uw-imap, lcms, streamripper,
cups, java, tar, opensc, mgetty, vinagre, vim, clamav, bluez-utils,
libsamplerate, apahche2, ruby, php, and nfs-utils.  The distributors
include Debian, Fedora, Gentoo, Mandriva, Red Hat, Slackware, and


Earn your MS in Info Assurance online

Norwich University's Master of Science in Information Assurance (MSIA)
program, designated by the National Security Agency as providing
academically excellent education in Information Assurance, provides
you with the skills to manage and lead an organization-wide
information security program and the tools to fluently communicate
the intricacies of information security at an executive level.



A Secure Nagios Server
Nagios is a monitoring software designed to let you know about problems
on your hosts and networks quickly. You can configure it to be used on
any network. Setting up a Nagios server on any Linux distribution is a
very quick process however to make it a secure setup it takes some
work. This article will not show you how to install Nagios since there
are tons of them out there but it will show you in detail ways to
improve your Nagios security.



Never Installed a Firewall on Ubuntu? Try Firestarter
When I typed on Google "Do I really need a firewall?" 695,000 results
came across.  And I'm pretty sure they must be saying  "Hell yeah!".
In my opinion, no one would ever recommend anyone to sit naked on the
internet keeping in mind the insecurity internet carries these days,
unless you really know what you are doing.

Read on for more information on Firestarter.


-->  Take advantage of the LinuxSecurity.com Quick Reference Card!  <--
-->  http://www.linuxsecurity.com/docs/QuickRefCard.pdf             <--


* EnGarde Secure Community 3.0.22 Now Available! (Dec 9)
  Guardian Digital is happy to announce the release of EnGarde Secure
  Community 3.0.22 (Version 3.0, Release 22).  This release includes
  many updated packages and bug fixes and some feature enhancements to
  the EnGarde Secure Linux Installer and the SELinux policy.



* Debian: New uw-imap packages fix multiple vulnerabilities (Dec 12)
  It was discovered that several buffer overflows can be triggered via
  a long folder extension argument to the tmail or dmail program. This
  could lead to arbitrary code execution (CVE-2008-5005).


* Debian: New lcms packages fix multiple vulnerabilities (Dec 10)
  Inadequate enforcement of fixed-length buffer limits allows an
  attacker to overflow a buffer on the stack, potentially enabling
  the execution of arbitrary code when a maliciously-crafted	 image
  is opened.


* Debian: New streamripper packages fix potential code execution (Dec 8)
  Multiple buffer overflows involving HTTP header and playlist parsing
  have been discovered in streamripper (CVE-2007-4337, CVE-2008-4829).


* Debian: New Linux 2.6.24 packages fix several vulnerabilities (Dec 4)
  Eugene Teo reported a local DoS issue in the ext2 and ext3
  filesystems.	Local users who have been granted the privileges
  necessary to mount a filesystem would be able to craft a corrupted
  filesystem that causes the kernel to output error messages in an
  infinite loop.


* Debian: New clamav packages fix potential code execution (Dec 4)
  Moritz Jodeit discovered that ClamAV, an anti-virus solution, suffers
  from an off-by-one-error in its VBA project file processing, leading
  to a heap-based buffer overflow and potentially arbitrary code
  execution (CVE-2008-5050).



* Fedora 8 Update: cups-1.3.9-2.fc8 (Dec 9)
  Security update to fix CVE-2008-5183.  Also included is a fix for
  incorrect form-feed handling in the textonly filter.


* Fedora 9 Update: cups-1.3.9-2.fc9 (Dec 9)
  Security update to fix CVE-2008-5183.    Also fixed in this update
  are a bug that caused cups-polld to fail to resolve hostnames, a bug
  that could cause libcups to get stuck in a loop, and incorrect
  form-feed handling in the textonly filter.


* Fedora 10 Update: cups-1.3.9-4.fc10 (Dec 9)
  Security update to fix CVE-2008-5183.    Also changed in this update:
     * a bug that caused cups-polld to fail to resolve hostnames has
  been fixed  * a bug that could cause libcups to get stuck in a loop
  has been fixed  * the dnssd backend has been removed as it is not
  working correctly and can prevent printers being added


* Fedora 10 Update: java-1.6.0-openjdk- (Dec 6)
  OpenJDK security patches applied.



* Gentoo: CUPS Multiple vulnerabilities (Dec 10)
  Several remotely exploitable bugs have been found in CUPS, which
  allow remote execution of arbitrary code.


* Gentoo: Archive:Tar: Directory traversal vulnerability (Dec 10)
  A directory traversal vulnerability has been discovered in


* Gentoo: OpenSC Insufficient protection of smart card PIN (Dec 10)
  Smart cards formatted using OpenSC do not sufficiently protect the
  PIN, allowing attackers to reset it.


* Gentoo: Mgetty Insecure temporary file usage (Dec 6)
  =3D=3D=3D=3D=3D=3D=3D=3D Mgetty uses temporary files in an insecure
  manner, allowing for symlink attacks.



* Mandriva: Subject: [Security Announce] [ MDVA-2008:197 ] mandriva-kde-config (Dec 10)
  On Mandriva Linux 2009.0, every time a web page was opened under
  Konqueror, or opened in a new tab, it showed the HTML code in an
  editor instead of the website.  This update makes Konqueror display
  websites correctly instead of pure HTML code.


* Mandriva: Subject: [Security Announce] [ MDVSA-2008:240 ] vinagre (Dec 10)
  Alfredo Ortega found a flaw in how Vinagre uses format strings. A
  remote attacker could exploit this vulnerability if they were able to
  trick a user into connecting to a malicious VNC server, or opening a
  specially crafted URI with Vinagre.  With older versions of Vinagre,
  it was possible to execute arbitrary code with user privileges. In
  later versions, Vinagre would abort, leading to a denial of service.
  The updated packages have been patched to prevent this issue.


* Mandriva: Subject: [Security Announce] [ MDVSA-2008:236-1 ] vim (Dec 8)
  Several vulnerabilities were found in the vim editor: A number of
  input sanitization flaws were found in various vim system functions.
  If a user were to open a specially crafted file, it would be possible
  to execute arbitrary code as the user running vim (CVE-2008-2712).


* Mandriva: Subject: [Security Announce] [ MDVSA-2008:239 ] clamav (Dec 5)
  Ilja van Sprundel found that ClamAV contained a denial of service
  vulnerability in how it handled processing JPEG files, due to it not
  limiting the recursion depth when processing JPEG thumbnails
  (CVE-2008-5314). Other bugs have also been corrected in 0.94.2 which
  is being provided with this update.


* Mandriva: Subject: [Security Announce] [ MDVA-2008:189 ] bluez-utils (Dec 5)
  An incorrect configuration was preventing PIN authentication for
  Bluetooth devices under GNOME and KDE4.  This package updates fixes
  the issue.


* Mandriva: Subject: [Security Announce] [ MDVSA-2008:238 ] libsamplerate (Dec 4)
  A buffer overflow was found by Russell O'Conner in the libsamplerate
  library versions prior to 0.1.4 that could possibly lead to the
  execution of arbitrary code via a specially crafted audio file


* Mandriva: Subject: [Security Announce] [ MDVSA-2008:237 ] apache2 (Dec 4)
  A vulnerability was discovered in the mod_proxy module in Apache
  where it did not limit the number of forwarded interim responses,
  allowing remote HTTP servers to cause a denial of service (memory
  consumption) via a large number of interim responses (CVE-2008-2364).
  This update also provides HTTP/1.1 compliance fixes. The updated
  packages have been patched to prevent this issue.



* RedHat: Moderate: Red Hat Application Stack v2.2 (Dec 4)
  Red Hat Application Stack v2.2 is now available.  This update fixes
  several security issues and adds various enhancements.A flaw was
  found in the mod_proxy module. An attacker  who has control of a web
  server to which requests are being proxied could cause a limited
  denial of service due to CPU consumption and stack exhaustion.


* RedHat: Critical: java-1.5.0-sun security update (Dec 4)
  Updated java-1.5.0-sun packages that correct several security issues
  are now available for Red Hat Enterprise Linux 4 Extras and 5
  Supplementary. This update has been rated as having critical security
  impact by the Red Hat Security Response Team.


* RedHat: Moderate: ruby security update (Dec 4)
  Updated ruby packages that fix a security issue are now available for
  Red Hat Enterprise Linux 4 and 5. This update has been rated as
  having moderate security impact by the Red Hat Security Response


* RedHat: Critical: java-1.6.0-sun security update (Dec 4)
  Updated java-1.6.0-sun packages that correct several security issues
  are now available for Red Hat Enterprise Linux 4 Extras and 5
  Supplementary. This update has been rated as having critical security
  impact by the Red Hat Security Response Team.



* Slackware:   php (Dec 5)
  New php packages are available for Slackware 12.0, 12.1, and -current
  to fix security issues, as well as make improvements and fix bugs.



* Ubuntu:  nfs-utils vulnerability (Dec 4)
  It was discovered that nfs-utils did not properly enforce netgroup
  restrictions when using TCP Wrappers. Remote attackers could bypass
  the netgroup restrictions enabled by the administrator and possibly
  gain access to sensitive information.


Distributed by: Guardian Digital, Inc.                LinuxSecurity.com

     To unsubscribe email vuln-newsletter-request@xxxxxxxxxxxxxxxxx
         with "unsubscribe" in the subject of the message.

[Fedora Announce]     [Linux Crypto]     [Kernel]     [Netfilter]     [Video for Linux]     [Bugtraq]     [USB]     [Fedora Security]

Add to Google Powered by Linux