[ISN] Linux Advisory Watch - January 20th 2006

From: InfoSec News (isn@private)
Date: Sun Jan 22 2006 - 23:17:40 PST


+---------------------------------------------------------------------+
|  LinuxSecurity.com                               Weekly Newsletter  |
|  January 20th, 2006                            Volume 7, Number 3a  |
+---------------------------------------------------------------------+

  Editors:      Dave Wreski                     Benjamin D. Thomas
                dave@private          ben@private

Linux Advisory Watch is a comprehensive newsletter that outlines the
security vulnerabilities that have been announced throughout the
week.  It includes pointers to updated packages and descriptions of
each vulnerability.

This week, advisories were realeased for httpd, mod_auth_pgsql,
auth_ldap, ethereal, struts, cups, gpdf, apache, and the kernel.
The distributor for this week is Red Hat.

----

Earn an NSA recognized IA Masters Online

The NSA has designated Norwich University a center of Academic
Excellence in Information Security. Our program offers unparalleled
Infosec management education and the case study affords you unmatched
consulting experience. Using interactive e-Learning technology, you
can earn this esteemed degree, without disrupting your career or home
life.

http://www.msia.norwich.edu/linsec

----

IPv6 approach for TCP SYN Flood attack over VoIP, Part V
By: Suhas Desai

In this paper, we describe and analyze a network based DoS attack
for IP based networks. It is known as SYN flooding. It works by an
attacker sending many TCP connection requests with spoofed source
addresses to a victim's machine. Each request causes the targeted
host to instantiate data structures out of a limited pool of
resources to deny further legitimate access.

Part I
http://www.linuxsecurity.com/content/view/121083/49/

Part II
http://www.linuxsecurity.com/content/view/121124/49/

Part III
http://www.linuxsecurity.com/content/view/121169/49/

Part IV
http://www.linuxsecurity.com/content/view/121205/49/


Part V:

7. Result Analysis

7.1 Most powerful and flexible L4-7 security and content networking
test solution proven for:

 - Firewalls, edge routers, session controllers, proxies, IDS/IPS,
   VPN concentrators.

 - Servers, content switches/caches, load balancers, SSL accelerators

7.2 Mix real VoIP calls (H.323 & SIP) over integrated DHCP, IPSec,
PPPoE and 802.1 xs

 - Realistic testing, faster set-up, no need for scripting

7.3 Integrated IPv6, IPsecv6, VLAN, and SNMP support -Rapidly test
next-generation dual-stack devices and Stress the management plane
at the same time

7.4 Create a realistic mix of application traffic with H.323, SIP,
RTSP, SNMP, messaging on each test interface, DoS. /spam /virus
attacks with over 150 measurements.

8. Conclusion

This paper has described and analyzed a network based denial of
service attack, called SYN flooding. It has contributed a detailed
analysis for practical approach to application Performance validation
for VoIP application with IPv6/IPv4 configurations and TCP SYN
Flooding attacks over connection oriented networks.

To protect from DoS attacks for secure, scalable, high-availability
IPV6 services over VoIP performance above methods proven better results.
It has proved working also for spam and virus attacks over TCP
connections with network tester methods of MoonV6.

9. Acknowledgement

We would like to thank Zlata Trhulj for design documentation of IPv6
services and Network tester methods presented at North American IPv6
Coalition Meeting-Reston, VA, 25 May, 2005.

Read Entire Article:
http://www.linuxsecurity.com/content/view/121241/49/

----------------------

EnGarde Secure Community 3.0.3 Released

 Guardian Digital is happy to announce the release of EnGarde
Secure Community 3.0.3 (Version 3.0, Release 3). This release
includes several bug fixes and feature enhancements to the
Guardian Digital WebTool, the SELinux policy, and the LiveCD
environment.

http://www.linuxsecurity.com/content/view/121150/65/

---


Linux File & Directory Permissions Mistakes

One common mistake Linux administrators make is having file and
directory permissions that are far too liberal and allow access
beyond that which is needed for proper system operations. A full
explanation of unix file permissions is beyond the scope of this
article, so I'll assume you are familiar with the usage of such
tools as chmod, chown, and chgrp. If you'd like a refresher, one
is available right here on linuxsecurity.com.

http://www.linuxsecurity.com/content/view/119415/49/

---

Buffer Overflow Basics

A buffer overflow occurs when a program or process tries to
store more data in a temporary data storage area than it was
intended to hold. Since buffers are created to contain a finite
amount of data, the extra information can overflow into adjacent
buffers, corrupting or overwriting the valid data held in them.

http://www.linuxsecurity.com/content/view/119087/49/

--------

-->  Take advantage of the LinuxSecurity.com Quick Reference Card!
-->  http://www.linuxsecurity.com/docs/QuickRefCard.pdf

+---------------------------------+
|  Distribution: Red Hat          | ----------------------------//
+---------------------------------+

* RedHat:  Moderate: httpd security update
  17th, January, 2006

Updated Apache httpd packages that correct three security
issues are now available for Red Hat Enterprise Linux 3 and 4.

This update has been rated as having moderate security impact
by the Red Hat Security Response Team.

http://www.linuxsecurity.com/content/view/121220


* RedHat: Critical: mod_auth_pgsql security update
  17th, January, 2006

Updated mod_auth_pgsql packages that fix format string security
issues are now available for Red Hat Enterprise Linux 3 and 4.

This update has been rated as having critical security impact
by the Red Hat Security Response Team.

http://www.linuxsecurity.com/content/view/121221


* RedHat: Critical: auth_ldap security update
  17th, January, 2006

An updated auth_ldap packages that fixes a format string security
issue is now available for Red Hat Enterprise Linux 2.1.

This update has been rated as having critical security impact by
the Red Hat Security Response Team.

http://www.linuxsecurity.com/content/view/121222


* RedHat: Moderate: ethereal security update
  17th, January, 2006

Updated Ethereal packages that fix various security vulnerabilities
are now available.

This update has been rated as having moderate security impact by the
Red Hat Security Response Team.


http://www.linuxsecurity.com/content/view/121223


* RedHat: Low: struts security update for Red Hat Application Server
  17th, January, 2006

Updated Red Hat Application Server components are now available
including a security update for Struts.

This update has been rated as having low security impact by the Red
Hat Security Response Team.


http://www.linuxsecurity.com/content/view/121224


* RedHat: Important: cups security update
  17th, January, 2006

Updated CUPS packages that fix multiple security issues are now
available for Red Hat Enterprise Linux.

This update has been rated as having important security impact by
the Red Hat Security Response Team.


http://www.linuxsecurity.com/content/view/121225


* RedHat: Important: gpdf security update
  17th, January, 2006

An updated gpdf package that fixes several security issues is now
available for Red Hat Enterprise Linux 4.

This update has been rated as having important security impact by
the Red Hat Security Response Team.


http://www.linuxsecurity.com/content/view/121226


* RedHat: Moderate: apache security update
  17th, January, 2006

Updated Apache httpd packages that correct a security issue are now
available for Red Hat Enterprise Linux 2.1.

This update has been rated as having moderate security impact by
the Red Hat Security Response Team.


http://www.linuxsecurity.com/content/view/121227


* RedHat: Important: kernel security update
  17th, January, 2006

Updated kernel packages that fix several security issues in the Red
Hat Enterprise Linux 4 kernel are now available.

This security advisory has been rated as having important security
impact by the Red Hat Security Response Team.


http://www.linuxsecurity.com/content/view/121228



------------------------------------------------------------------------
Distributed by: Guardian Digital, Inc.                LinuxSecurity.com

     To unsubscribe email vuln-newsletter-request@private
         with "unsubscribe" in the subject of the message.
------------------------------------------------------------------------



_________________________________
InfoSec News v2.0 - Coming Soon! 
http://www.infosecnews.org 



This archive was generated by hypermail 2.1.3 : Sun Jan 22 2006 - 23:32:00 PST