+----------------------------------------------------------------+ | LinuxSecurity.com Linux Advisory Watch | | April 30th, 2004 Volume 5, Number 18a | +----------------------------------------------------------------+ Editors: Dave Wreski Benjamin Thomas dave@private ben@private Linux Advisory Watch is a comprehensive newsletter that outlines the security vulnerabilities that have been announced throughout the week. It includes pointers to updated packages and descriptions of each vulnerability. This week, advisories were released for eterm, mc, the Linux kernel, ssmtp, LCDproc, xine, samba, and sysklogd. The distributors include Debian, Guardian Digital's EnGarde Linux, Fedora, Gentoo, Mandrake, Red Hat, and Slackware. ---- >> FREE GUIDE-128-bit encryption << Thawte is one of the few companies that offers 128 bit supercerts. A Supercert will allow you to extend the highest allowed 128 bit encryption to all your clients even if they use browsers that are limited to 40 bit encryption. Download a guide to learn more: http://ads.linuxsecurity.com/cgi-bin/newad_redirect.pl?id=thawten05 ---- Wireless Security Over the years security and network administrators have been reluctant to adopt wireless networking technologies in corporate environments. Will it provide an easy path of entry into the LAN? Will internal servers be accessible from the outside? Sometimes is necessary to implement wireless networks in an office building because of special circumstances, or pressures from management to adopt the latest technology. Installing a wireless network may be inevitable, if so how should it be approached? As with all security projects, a wireless security policy should be created. This should define the purpose and scope of the wireless network, who is going to be using it, how it should be used, etc. Also, an analysis of newly introduced threats should be formalized. This will enable the network to be designed in a matter that minimizes risk. The wireless network should be treated as an untrusted network. Precautions such as placing a firewall between the wireless network and internal LAN, requiring strong authentication, and conducting regular vulnerability assessments. When connecting to the trusted LAN over a wireless network, a VPN should be used. If not, it is advisable to only stick to secure protocols such as SSH & SSL. Wireless access points should be regularly audited and configured in the most secure manner. Passwords and WEP keys should be as defined in the Wireless Security Policy. Also, it is important to periodically check for rogue wireless access points by warwalking. Access points are ideally placed in the center of buildings. This reduces the available signal strength to outsiders. Because the wireless workstations are on an untrusted network, it is imperative that they are kept secure. This can be done by using host-based firewalls, IDS, keeping patches up-to-date, and configuration scanning. Hosts should be regularly scanned and monitored. By taking these precautions it is possible to implement wireless networking without significantly increasing risks to an organization's information security. Until next time, cheers! Benjamin D. Thomas ben@private ---- Guardian Digital Launches Next Generation Internet Defense & Detection System Guardian Digital has announced the first fully open source system designed to provide both intrusion detection and prevention functions. Guardian Digital Internet Defense & Detection System (IDDS) leverages best-in-class open source applications to protect networks and hosts using a unique multi-layered approach coupled with the security expertise and ongoing security vigilance provided by Guardian Digital. http://www.linuxsecurity.com/feature_stories/feature_story-163.html -------------------------------------------------------------------- Interview with Siem Korteweg: System Configuration Collector In this interview we learn how the System Configuration Collector (SCC) project began, how the software works, why Siem chose to make it open source, and information on future developments. http://www.linuxsecurity.com/feature_stories/feature_story-162.html -------------------------------------------------------------------- >> Internet Productivity Suite: Open Source Security << Trust Internet Productivity Suite's open source architecture to give you the best security and productivity applications available. Collaborating with thousands of developers, Guardian Digital security engineers implement the most technologically advanced ideas and methods into their design. http://ads.linuxsecurity.com/cgi-bin/newad_redirect.pl?id=gdn10 --> Take advantage of the LinuxSecurity.com Quick Reference Card! --> http://www.linuxsecurity.com/docs/QuickRefCard.pdf +---------------------------------+ | Distribution: Debian | ----------------------------// +---------------------------------+ 4/28/2004 - kernel 2.4.16 Multiple vulnerabilities Several serious problems have been discovered in the Linux kernel. This update takes care of Linux 2.4.16 for the ARM (and a few other) architectures. http://www.linuxsecurity.com/advisories/debian_advisory-4280.html 4/29/2004 - eterm Missing Input Sanitising H.D. Moore discovered several terminal emulator security issues http://www.linuxsecurity.com/advisories/debian_advisory-4287.html 4/29/2004 - mc Several Vulnerabilities Jacub Jelinek discovered several vulnerabilities in the Midnight Commander, a powerful file manager for GNU/Linux systems. http://www.linuxsecurity.com/advisories/debian_advisory-4288.html +---------------------------------+ | Distribution: EnGarde | ----------------------------// +---------------------------------+ 4/28/2004 - 'kernel' Several security and bug fixes Several Vulnerabilities This update fixes numerous vulnerabilities in the Linux Kernel. http://www.linuxsecurity.com/advisories/engarde_advisory-4285.html 4/28/2004 - kernel Multiple vulnerabilities This patch resolves a number of kernel vulnerabilities, uncluding ones involving the various journaling filesystems. http://www.linuxsecurity.com/advisories/engarde_advisory-4286.html +---------------------------------+ | Distribution: Fedora | ----------------------------// +---------------------------------+ 4/23/2004 - kernel Multiple vulnerabilities This patch fixes a large variety of vulnerabilities in the 2.4.22 kernel, including some related to journaling filesystems. http://www.linuxsecurity.com/advisories/fedora_advisory-4278.html +---------------------------------+ | Distribution: Gentoo | ----------------------------// +---------------------------------+ 4/28/2004 - ipsec-tools and iputils Denial of service vulnerability Multiple vulnerabilities Attackers may be able to craft an ISAKMP header of sufficient length to consume all available system resources, causing a Denial of Service. Further discussion of advisory at bottom. http://www.linuxsecurity.com/advisories/gentoo_advisory-4279.html 4/28/2004 - ssmtp Multiple vulnerabilities Multiple format string vulnerabilities may allow an attacker to run arbitrary code with ssmtp's privileges. http://www.linuxsecurity.com/advisories/gentoo_advisory-4282.html 4/28/2004 - LCDproc Multiple vulnerabilities Multiple remote vulnerabilities have been found in the LCDd server, allowing execution of arbitrary code with the rights of the LCDd user. http://www.linuxsecurity.com/advisories/gentoo_advisory-4283.html 4/28/2004 - xine Multiple vulnerabilities Several vulnerabilities have been found in xine-ui and xine-lib, potentially allowing an attacker to overwrite files with the rights of the user. http://www.linuxsecurity.com/advisories/gentoo_advisory-4284.html 4/29/2004 - samba Multiple Vulnerabilities There is a bug in smbfs which may allow local users to gain root via a setuid file on a mounted Samba share. Also, there is a tmpfile symlink vulnerability in the smbprint script distributed with Samba. http://www.linuxsecurity.com/advisories/gentoo_advisory-4289.html +---------------------------------+ | Distribution: Mandrake | ----------------------------// +---------------------------------+ 4/28/2004 - kernel Multiple vulnerabilities This patch resolves a large number of kernel vulnerabilities at various levels of seriousness. http://www.linuxsecurity.com/advisories/mandrake_advisory-4281.html 4/29/2004 - sysklogd Vulnerability Steve Grubb discovered a bug in sysklogd where it allocates an insufficient amount of memory which causes sysklogd to write to unallocated memory. http://www.linuxsecurity.com/advisories/mandrake_advisory-4290.html +---------------------------------+ | Distribution: Openwall | ----------------------------// +---------------------------------+ 4/23/2004 - kernel Privilege escalation vulnerability Upgrade to 2.4.26 to fix a local root vulnerability. http://www.linuxsecurity.com/advisories/openwall_advisory-4277.html +---------------------------------+ | Distribution: Red Hat | ----------------------------// +---------------------------------+ 4/23/2004 - kernel Privilege escalation vulnerabilities Updated kernel packages that fix two privilege escalation vulnerabilities are now available. http://www.linuxsecurity.com/advisories/redhat_advisory-4276.html +---------------------------------+ | Distribution: Slackware | ----------------------------// +---------------------------------+ 4/28/2004 - kernel Security Issues New kernel packages are available for Slackware 9.1 and -current to fix security issues http://www.linuxsecurity.com/advisories/slackware_advisory-4291.html ------------------------------------------------------------------------ Distributed by: Guardian Digital, Inc. LinuxSecurity.com To unsubscribe email vuln-newsletter-request@private with "unsubscribe" in the subject of the message. ------------------------------------------------------------------------ _________________________________________ ISN mailing list Sponsored by: OSVDB.org
This archive was generated by hypermail 2b30 : Mon May 03 2004 - 04:36:48 PDT