+----------------------------------------------------------------+ | LinuxSecurity.com Linux Advisory Watch | | May 24th, 2002 Volume 3, Number 21a | +----------------------------------------------------------------+ Editors: Dave Wreski Benjamin Thomas daveat_private benat_private Linux Advisory Watch is a comprehensive newsletter that outlines the security vulnerabilities that have been announced throughout the week. It includes pointers to updated packages and descriptions of each vulnerability. This week, advisories were released for php, fetchmail, webmin, and dhcp. The vendors include Cadera, Mandrake, Red Hat, and SuSE. Are you subscribed to the Linux security discussion list? Take advantage of it! To subscribe send an e-mail to security-discuss-requestat_private with "subscribe" as the subject. ** Build Complete Internet Presence Quickly and Securely! ** EnGarde Secure Linux has everything necessary to create thousands of virtual Web sites, manage e-mail, DNS, firewalling, and database functions for an entire organization, all using a secure Web-based front-end. Engineered to be secure and easy to use! --> http://www.guardiandigital.com/promo/ls230502.html * FTP Attack Case Study Part I: The Analysis * This article presents a case study of a company network server compromise. The attack and other intruder's actions are analyzed. Computer forensics investigation is undertaken and results are presented. The article provides an opportunity to follow the trail of incident response for the real case. http://www.linuxsecurity.com/feature_stories/ftp-analysis-part1.html +---------------------------------+ | php | ----------------------------// +---------------------------------+ Several flaws have been found in the way PHP handles multipart/form-data POST requests. Each of the flaws could allow an attacker to execute arbitrary code on the victim's system. Caldera: ftp://ftp.caldera.com/pub/updates/OpenLinux/3.1.1/Server/current/RPMS php-4.0.6-3.2.i386.rpm 1bbbc55e7dfd717f02b3668c57891edf php-doc-4.0.6-3.2.i386.rpm 20c0812616f3df9c48078134c7e7fac6 Caldera Vendor Advisory: http://www.linuxsecurity.com/advisories/caldera_advisory-2079.html +---------------------------------+ | fetchmail | ----------------------------// +---------------------------------+ When retrieving mail from an IMAP server, the fetchmail e-mail client will allocate an array to store the sizes of the messages which it will attempt to fetch. The size of the array is determined by the number of messages that the server claims to have. Unpatched versions of fetchmail prior to 5.9.10 did not check whether the number of e-mails the server claimed was too high, allowing a malicious server to cause the fetchmail process to write data outside of the array bounds. Red Hat Linux 7.3 i386: ftp://updates.redhat.com/7.3/en/os/i386/ fetchmail-5.9.0-11.i386.rpm 8ac6d5614b18de67e5dd53ea8de64e16 ftp://updates.redhat.com/7.3/en/os/i386/ fetchmailconf-5.9.0-11.i386.rpm 51eeebc63b4e44bbf9de2d3ba3d408ff Red Hat Vendor Advisory: http://www.linuxsecurity.com/advisories/redhat_advisory-2080.html +---------------------------------+ | webmin | ----------------------------// +---------------------------------+ A vulnerability exists in all versions of Webmin prior to 0.970 that allows a remote attacker to login to Webmin as any user. All users of Webmin are encouraged to upgrade immediately. Mandrake Linux 8.2:8.2 http://www.mandrakesecure.net/en/ftp.php /RPMS/webmin-0.970-1.1mdk.noarch.rpm 00b798a4d1d59c53d644809846e9980b Mandrake Vendor Advisory: http://www.linuxsecurity.com/advisories/mandrake_advisory-2081.html +---------------------------------+ | dhcp | ----------------------------// +---------------------------------+ A remote exploitable format string vulnerability was found in the logging routines of the dynamic DNS code of dhcpd. This vulnerability allows an attacker, usually within the LAN served by the DHCP server, to get remote root access to the host running dhcpd. i386 Intel Platform: SuSE-8.0 ftp://ftp.suse.com/pub/suse/i386/update/8.0/n2/ dhcp-server-3.0.1rc6-8.i386.rpm 754569c059f5f2c4f71397f6c6498f53 SuSE Vendor Advisory: http://www.linuxsecurity.com/advisories/suse_advisory-2082.html ------------------------------------------------------------------------ Distributed by: Guardian Digital, Inc. LinuxSecurity.com To unsubscribe email vuln-newsletter-requestat_private with "unsubscribe" in the subject of the message. ------------------------------------------------------------------------ - ISN is currently hosted by Attrition.org To unsubscribe email majordomoat_private with 'unsubscribe isn' in the BODY of the mail.
This archive was generated by hypermail 2b30 : Tue May 28 2002 - 05:12:05 PDT