Date: 17 Aug 2004 19:03:30 -0000
From:"Peter Laborge" <plaborge@securityfocus.com>
To:linux-secnews@securityfocus.com
Subject: SecurityFocus Linux Newsletter #197
SecurityFocus Linux Newsletter #197
------------------------------------

This Issue is Sponsored By: SecurityFocus 

Want to keep up on the latest security vulnerabilities? Don't have time 
to
visit a myriad of mailing lists and websites to read the news? Just add 
the
new SecurityFocus RSS feeds to your freeware RSS reader, and see all 
the
latest posts for Bugtraq and the SF Vulnernability database in one
convenient place. Or, pull in the latest news, columnists and feature
articles in the SecurityFocus aggregated news feed, and stay on top of
what's happening in the community!

http://www.securityfocus.com/rss/index.shtml

------------------------------------------------------------------------
I. FRONT AND CENTER
     1. Examining a Public Exploit, Part 1
     2. Detecting Worms and Abnormal Activities with NetFlow, Part 1
     3. Big Brother's Last Mile
     4. The Panacea of Information Security
II. LINUX VULNERABILITY SUMMARY
     1. PluggedOut Blog Blog_Exec.PHP Cross-Site Scripting Vulnerabi...
     2. Linux Kernel Unspecified chown Inode Time Vulnerability
     3. Linux Kernel Unspecified Signal Denial Of Service Vulnerabil...
     4. Xine-Lib Remote Buffer Overflow Vulnerability
     5. Linux Kernel Unspecified USB Vulnerability
     6. PluggedOut Blog Calendar Module Cross-Site Scripting Vulnera...
     7. GNU CFEngine AuthenticationDialogue Remote Heap Based Buffer...
     8. GNU CFEngine AuthenticationDialogue Remote Denial Of Service...
     9. KDE Konqueror Cross-Domain Frame Loading Vulnerability
     10. KDE Insecure Temporary Directory Symlink Vulnerability
     11. KDE DCOPServer Insecure Temporary File Creation 
Vulnerabilit...
     12. Mutt PGP/GnuPG Verified Email Signature Spoofing 
Vulnerabili...
     13. Adobe Acrobat Reader Shell Metacharacter Remote Arbitrary 
Co...
     14. RealNetwork RealPlayer Unspecified Remote Vulnerability
     15. Kerio Mailserver Embedded HTTP Server Multiple Unspecified 
V...
     16. Rsync Sanitize_path Function Module Path Escaping 
Vulnerabil...
     17. HanSoft 4tH Unspecified Vulnerability
     18. Sympa List Creation Authentication Bypass Vulnerability
III. LINUX FOCUS LIST SUMMARY
     1. can Hopster traffic be blocked? (Thread)
     2. LIDS 1.2.2rc2 for Linux kernel 2.4.27 released (Thread)
IV. NEW PRODUCTS FOR LINUX PLATFORMS
     1. Cyber-Ark  Inter-Business Vault
     2. EnCase Forensic Edition
     3. KeyGhost SX
     4. SafeKit
     5. Astaro Linux Firewall
     6. CAT Cellular Authentication Token and eAuthentication Servic...
V. NEW TOOLS FOR LINUX PLATFORMS
     1. Pads 1.1
     2. cenfw 0.3b
     3. Firewall Builder 2.0
     4. Lepton's Crack 20031130
     5. popa3d v0.6.4.1
     6. tinysofa enterprise server 2.0-rc1
VII. SPONSOR INFORMATION

I. FRONT AND CENTER
-------------------
1. Examining a Public Exploit, Part 1
By Don Parker

The purpose of this article is to analyze a public exploit in a lab
environment, see the alerts generated by an intrusion detection system, 
and
then do some packet analysis of the malicious binary in order to better
understand it. 

http://www.securityfocus.com/infocus/1795



2. Detecting Worms and Abnormal Activities with NetFlow, Part 1
By Yiming Gong

This paper discusses the use of NetFlow, a traffic profile monitoring
technology available on many routers, for use in the early detection of
worms, spammers, and other abnormal network activity in large 
enterprise
networks and service providers.

http://www.securityfocus.com/infocus/1796


3. Big Brother's Last Mile
By Mark Rasch

The FCC's new ruling on broadband wiretaps will force customers to pay 
for
the privilege of making the Internet less secure.

http://www.securityfocus.com/columnists/261


4. The Panacea of Information Security
By Jason Miller

Step away from all the vendor hype. The one device that will always be 
the
best tool for information security is a competent security 
professional.

http://www.securityfocus.com/columnists/260

II. LINUX VULNERABILITY SUMMARY
-------------------------------
1. PluggedOut Blog Blog_Exec.PHP Cross-Site Scripting Vulnerabi...
BugTraq ID: 10885
Remote: Yes
Date Published: Aug 07 2004
Relevant URL: http://www.securityfocus.com/bid/10885
Summary:
PluggedOut Blog is reported prone to a cross-site scripting 
vulnerability.

This could allow for execution of hostile HTML and script code in the 
web client of a user who visits a malicious link to the vulnerable site. 
This code execution would occur in the security context of the site 
hosting the vulnerable software. 

Exploitation could allow for theft of cookie-based authentication 
credentials. Other attacks are also possible.

2. Linux Kernel Unspecified chown Inode Time Vulnerability
BugTraq ID: 10887
Remote: No
Date Published: Aug 09 2004
Relevant URL: http://www.securityfocus.com/bid/10887
Summary:
An unspecified vulnerability has been announced in the Linux Kernel 
implementation of the chown(2) system call.  This issue is related to how 
inode time data is updated by the system call.  The impact is not known 
at this time, though it is speculated that this could affect system 
integrity.

3. Linux Kernel Unspecified Signal Denial Of Service Vulnerabil...
BugTraq ID: 10888
Remote: No
Date Published: Aug 09 2004
Relevant URL: http://www.securityfocus.com/bid/10888
Summary:
An unspecified denial of service vulnerability has been reported to 
exist in the Linux Kernel.  This issue could occur when signals are 
handled by the kernel.  Further details are not available at this time.

4. Xine-Lib Remote Buffer Overflow Vulnerability
BugTraq ID: 10890
Remote: Yes
Date Published: Aug 08 2004
Relevant URL: http://www.securityfocus.com/bid/10890
Summary:
It is reported that the xine media library is affected by a remote 
buffer overflow vulnerability.  This issue can allow a remote attacker to 
gain unauthorized access to a vulnerable computer.

xine-lib rc-5 and prior versions are reportedly affected by this issue.  
xine versions 0.99.2 and prior are also vulnerable.

5. Linux Kernel Unspecified USB Vulnerability
BugTraq ID: 10892
Remote: No
Date Published: Aug 09 2004
Relevant URL: http://www.securityfocus.com/bid/10892
Summary:
The Linux Kernel implementation of USB is reported prone to an 
unspecified vulnerability. The impact is not known at this time, though it is 
speculated that this vulnerability could affect system stability.

6. PluggedOut Blog Calendar Module Cross-Site Scripting Vulnera...
BugTraq ID: 10894
Remote: Yes
Date Published: Aug 09 2004
Relevant URL: http://www.securityfocus.com/bid/10894
Summary:
The Blog 'calendar' module does not sufficiently sanitize data supplied 
via URI parameters, making it prone to cross-site scripting attacks. 
This could allow for execution of hostile HTML and script code in the web 
client of a user who visits a malicious link to the vulnerable site.

7. GNU CFEngine AuthenticationDialogue Remote Heap Based Buffer...
BugTraq ID: 10899
Remote: Yes
Date Published: Aug 09 2004
Relevant URL: http://www.securityfocus.com/bid/10899
Summary:
GNU cfengine cfservd is reported prone to a remote heap-based buffer 
overrun vulnerability. The vulnerability presents itself in the cfengine 
cfservd  AuthenticationDialogue() function.

The issue exists due to a lack of sufficient boundary checks performed 
on challenge data that is received from a client. 

Because the size of the buffer, the size of data copied in a memcpy() 
operation, and the data copied are all controlled by the attacker, a 
remote attacker may likely exploit this condition to corrupt in-line heap 
based memory management data. 

cfservd employs an IP based access control method. This access control 
must be bypassed prior to exploitation. This may hinder exploitation 
attempts.

This vulnerability is reported to affect versions 2.0.0 to 2.1.7p1 of 
cfengine cfservd.

8. GNU CFEngine AuthenticationDialogue Remote Denial Of Service...
BugTraq ID: 10900
Remote: Yes
Date Published: Aug 09 2004
Relevant URL: http://www.securityfocus.com/bid/10900
Summary:
GNU cfengine cfservd is reported prone to a remote denial of service 
vulnerability. The vulnerability presents itself in the cfengine cfservd 
AuthenticationDialogue() function that is responsible for processing 
SAUTH commands and also performing RSA based authentication. 

The vulnerability presents itself because return values for several 
statements within the AuthenticationDialogue() function are not checked.

This memcpy() operation based on the return values will fail resulting 
in a daemon crash. A remote attacker may exploit this vulnerability to 
crash the affected daemon effectively denying service to legitimate 
users.

cfservd employs an IP based access control method 
(AllowConnectionsFrom). This access control must be bypassed prior to exploitation. This may 
hinder exploitation attempts.

This vulnerability is reported to affect versions 2.0.0 to 2.1.7p1 of 
cfengine cfservd.

9. KDE Konqueror Cross-Domain Frame Loading Vulnerability
BugTraq ID: 10921
Remote: Yes
Date Published: Aug 11 2004
Relevant URL: http://www.securityfocus.com/bid/10921
Summary:
Konqueror reported prone to a cross-domain frame loading vulnerability. 
It is reported that if the name of a frame rendered in a target site is 
known, then an attacker may potentially render arbitrary HTML in the 
frame of the target site. 

An attacker may exploit this vulnerability to spoof an interface of a 
trusted web site.

All versions of KDE up to KDE 3.2.3 are vulnerable to this issue.

10. KDE Insecure Temporary Directory Symlink Vulnerability
BugTraq ID: 10922
Remote: No
Date Published: Aug 11 2004
Relevant URL: http://www.securityfocus.com/bid/10922
Summary:
KDE is reported to contain a temporary directory symlink vulnerability. 
This vulnerability is due to improper validation of the ownership of 
temporary directories.

Local attackers can cause KDE applications to fail, denying service to 
users, or to overwrite arbitrary files with the privileges of the 
target user. Privilege escalation may be possible.

Source patches have been made available by KDE to resolve this issue.

11. KDE DCOPServer Insecure Temporary File Creation Vulnerabilit...
BugTraq ID: 10924
Remote: No
Date Published: Aug 11 2004
Relevant URL: http://www.securityfocus.com/bid/10924
Summary:
KDEs DCOPServer is reported to contain an insecure temporary file 
creation vulnerability. This is due to the use of the mktemp() function.

Since temporary files are used by the DCOP daemon for authentication 
purposes, a local attacker may possibly exploit this vulnerability to 
compromise the account of a targeted user running KDE.

A local attacker may also possibly exploit this vulnerability to 
execute symbolic link file overwrite attacks. This may allow an attacker to 
overwrite arbitrary files with the privileges of the targeted user. 
Privilege escalation may also be possible using this method of attack.

KDE versions from 3.2.0 to 3.2.3 are reported susceptible to this 
vulnerability.

12. Mutt PGP/GnuPG Verified Email Signature Spoofing Vulnerabili...
BugTraq ID: 10929
Remote: Yes
Date Published: Aug 12 2004
Relevant URL: http://www.securityfocus.com/bid/10929
Summary:
It is reported that Mutt contains a vulnerability that allows attackers 
to send email that spoofs the look of a successfully verified PGP/GnuPG 
email message.

An attacker may potentially simulate the look of the PGP/GnuPG output 
that Mutt usually includes when processing signed email messages. If a 
user employs Mutt with a specific configuration, the attacker may make 
email messages look almost identical to a properly signed and verified 
email.

This may allow an attacker to create a message that falsifies a 
correctly verified PGP/GnuPG signature. This could allow an attacker to spoof 
email from trusted sources. This will likely greatly increase the 
effectiveness of social engineering attacks.

In the index mode, messages with signatures have the 's' flag. Verified 
signatures change to 'S'. Ensuring that messages have the proper 
attributes will aid in the mitigation of this vulnerability.

Versions 1.3.28 and 1.5.6 are reported affected by this vulnerability. 
Other versions are also likely affected.

13. Adobe Acrobat Reader Shell Metacharacter Remote Arbitrary Co...
BugTraq ID: 10931
Remote: Yes
Date Published: Aug 12 2004
Relevant URL: http://www.securityfocus.com/bid/10931
Summary:
A remote code execution vulnerability is identified in Adobe Acrobat 
Reader.  This issue may allow an attacker gain unauthorized access to a 
vulnerable computer. 

Acrobat Reader is affected by a shell metacharacter command execution 
vulnerability.  This issue exists due to insufficient sanitization of 
user-supplied data by Acrobat Reader for Unix and Linux platforms.  
Successful exploitation can allow an attacker to use a specially crafted 
file name to execute arbitrary commands and applications through the 
shell.

Adobe Acrobat Reader version 5.0 for Unix and Linux platforms is 
reported vulnerable to this issue.  Acrobat Reader for Microsoft Windows 
platforms is not affected by this issue.

14. RealNetwork RealPlayer Unspecified Remote Vulnerability
BugTraq ID: 10934
Remote: Yes
Date Published: Aug 12 2004
Relevant URL: http://www.securityfocus.com/bid/10934
Summary:
It is reported that RealNetwork RealPlayer contains an unspecified 
vulnerability that allows for execution of arbitrary code in the context of 
the user running the player.

No further information is available at this time. This BID will be 
updated as further information is disclosed.

15. Kerio Mailserver Embedded HTTP Server Multiple Unspecified V...
BugTraq ID: 10936
Remote: Yes
Date Published: Aug 12 2004
Relevant URL: http://www.securityfocus.com/bid/10936
Summary:
Kerio MailServer version 6.0.1 has been released.  This release 
addresses various unspecified security vulnerabilities in the embedded HTTP 
server implemented with the Kerio MailServer application.  The cause and 
impact of these issues is currently unknown.

All versions of Kerio MailServer prior to 6.0.1 are considered 
vulnerable.

16. Rsync Sanitize_path Function Module Path Escaping Vulnerabil...
BugTraq ID: 10938
Remote: Yes
Date Published: Aug 12 2004
Relevant URL: http://www.securityfocus.com/bid/10938
Summary:
If an rsync server is installed as a daemon with a read/write enabled 
module without using the 'chroot' option, it is possible that a remote 
attacker could read/write files outside of the configured module path. 
Rsync does not properly sanitize the paths when not running with chroot.  
The problem exists in the 'sanitize_path' function.

This could potentially be exploited to execute arbitrary code by 
corrupting or place arbitrary files on the system. Destruction of data could 
also result, possibly causing a denial of service condition. Other 
attacks could also occur, depending on the attacker's motives.

17. HanSoft 4tH Unspecified Vulnerability
BugTraq ID: 10939
Remote: Unknown
Date Published: Aug 13 2004
Relevant URL: http://www.securityfocus.com/bid/10939
Summary:
An unspecified vulnerability is reported in the HanSoft 4tH compiler.

This vulnerability is reported to be fixed in version 3.4e-pre4.

No further information was reported. This BID will be updated as new 
information is disclosed.

18. Sympa List Creation Authentication Bypass Vulnerability
BugTraq ID: 10941
Remote: Yes
Date Published: Aug 13 2004
Relevant URL: http://www.securityfocus.com/bid/10941
Summary:
Sympa is reported to be prone to an authentication bypass vulnerability 
when creating new mailing lists.

This vulnerability presents itself upon creating a new mailing list. 
The list master approval process could reportedly be skipped by an 
attacker.

An attacker may exploit this issue to create unauthorized mailing 
lists. This may possibly be used to forward UCE messages, or possibly other 
attacks.

Versions prior to 4.1.2 are reportedly affected by this vulnerability.

III. LINUX FOCUS LIST SUMMARY
-----------------------------
1. can Hopster traffic be blocked? (Thread)
Relevant URL:

http://www.securityfocus.com/archive/91/371590

2. LIDS 1.2.2rc2 for Linux kernel 2.4.27 released (Thread)
Relevant URL:

http://www.securityfocus.com/archive/91/371540

IV. NEW PRODUCTS FOR LINUX PLATFORMS
------------------------------------
1. Cyber-Ark  Inter-Business Vault
By: Cyber-Ark
Platforms: Linux, Windows 2000, Windows NT, Windows XP
Relevant URL: 
http://www.cyber-ark.com/datasecuritysoftware/inter-business_vault.htm
Summary: 

Based on Cyber-Ark Software's Vaulting Technology, the Inter-Business 
Vault, an information security solution that enables organizations to 
safely overcome traditional network boundaries in order to securely share 
business information among customers, business partners, and remote 
branches. It provides a seamless, LAN-like experience over the Internet 
that includes all the security, performance, accessibility, and ease of 
administration required to allow organizations to share everyday 
information worldwide. To learn more about these core attributes of the 
Inter-Business Vault click on the relevant link below:

2. EnCase Forensic Edition
By: Guidance Software Inc.
Platforms: DOS, FreeBSD, Linux, MacOS, NetBSD, OpenBSD, PalmOS, 
Solaris, UNIX, Windows 2000, Windows 95/98, Windows NT, Windows XP
Relevant URL: 
http://www.guidancesoftware.com/products/EnCaseForensic/index.shtm
Summary: 

EnCase Forensic Edition Version 4 delivers the most advanced features 
for computer forensics and investigations. With an intuitive GUI and 
superior performance, EnCase Version 4 provides investigators with the 
tools to conduct large-scale and complex investigations with accuracy and 
efficiency. Guidance Software?s award winning solution yields 
completely non-invasive computer forensic investigations while allowing 
examiners to easily manage large volumes of computer evidence and view all 
relevant files, including "deleted" files, file slack and unallocated 
space. 

The integrated functionality of EnCase allows the examiner to perform 
all functions of the computer forensic investigation process. EnCase's 
EnScript, a powerful macro-programming language and API included within 
EnCase, allows investigators to build customized and reusable forensic 
scripts.

3. KeyGhost SX
By: KeyGhost Ltd
Platforms: BeOS, DOS, Linux, OS/2, Solaris, SunOS, Windows 2000, 
Windows 95/98, Windows NT, Windows XP
Relevant URL: http://www.keyghost.com/SX/
Summary: 

KeyGhost SX discreetly captures and records all keystrokes typed, 
including chat conversations, email, word processor, or even activity within 
an accounting or specialist system. It is completely undetectable by 
software scanners and provides you with one of the most powerful stealth 
surveillance applications offered anywhere. 

Because KeyGhost uses STRONG 128-Bit encryption to store the recorded 
data in it?s own internal memory (not on the hard drive), it is 
impossible for a network intruder to gain access to any sensitive data stored 
within the device.

4. SafeKit
By: Evidian Inc.
Platforms: AIX, HP-UX, Linux, Solaris, Windows 2000
Relevant URL: http://www.evidian.com/safekit/index.htm
Summary: 

Evidian's SafeKit technology makes it possible to render any 
application available 24 hours per day. With no extra hardware: just use your 
existing servers and install this software-only solution.

This provides ultimate scalability. As your needs grow, all you need to 
do is add more standard servers into the cluster. With the load 
balancing features of SafeKit, you can distribute applications over multiple 
servers. If one system fails completely, the others will continue to 
serve your users.

5. Astaro Linux Firewall
By: Astaro
Platforms: Linux
Relevant URL: http://www.astaro.com/php/statics.php?action=asl&lang=gb
Summary: 

Astaro Linux Firewall: All-in-one firewall, virus protection, content 
filtering and spam protection internet security software package for 
Linux. 
Free download for home users.

6. CAT Cellular Authentication Token and eAuthentication Servic...
By: Mega AS Consulting Ltd
Platforms: Java, Linux, OpenBSD, Os Independent, SecureBSD, Solaris, 
UNIX, Windows 2000, Windows NT
Relevant URL: http://www.megaas.co.nz
Summary: 

Low cost, easy to use Two Factor Authentication One Time Password token 
using the Cellular. Does not use SMS or communication, manages multiple 
OTP accounts - new technology. For any business that want a safer 
access to its Internet Services. More information at our site.
 
We also provide eAuthentication service for businesses that will not 
buy an Authentication product but would prefer to pay a monthly charge 
for authentication services from our our CAT Server.

V. NEW TOOLS FOR LINUX PLATFORMS
--------------------------------
1. Pads 1.1
By: Matt Shelton
Relevant URL: 
http://freshmeat.net/projects/pads/?branch_id=52504&release_id=169973
Platforms: Linux
Summary: 

Pads (Passive Asset Detection System) is a signature-based detection 
engine used to passively detect network assets. It is designed to 
complement IDS technology by providing context to IDS alerts.

2. cenfw 0.3b
By: Peter Robinson
Relevant URL: http://www.securegateway.org
Platforms: Linux, Windows 2000, Windows NT, Windows XP
Summary: 

The Centron IPTables Firewall Gui is an object oriented, database 
driven, windows interface to linux IPtables firewall rules.

3. Firewall Builder 2.0
By: Vadim Kurland
Relevant URL: http://www.fwbuilder.org/
Platforms: FreeBSD, Linux, MacOS, Solaris, Windows 2000, Windows XP
Summary: 

Firewall Builder consists of a GUI and set of policy compilers for 
various firewall platforms. It helps users maintain a database of objects 
and allows policy editing using simple drag-and-drop operations. The GUI 
and policy compilers are completely independent, and support for a new 
firewall platform can be added to the GUI without any changes to the 
program (only a new policy compiler is needed). This provides for a 
consistent abstract model and the same GUI for different firewall platforms. 
It currently supports iptables, ipfilter, and OpenBSD pf.

4. Lepton's Crack 20031130
By: Lepton and Nekromancer
Relevant URL: http://www.nestonline.com/lcrack/lcrack-20031130-beta.zip
Platforms: Linux, MacOS, Os Independent, UNIX, Windows 2000, Windows 
NT, Windows XP
Summary: 

Lepton's Crack is a generic password cracker. It is easily-customizable 
with a simple plugin system and allows system administrators to review 
the quality of the passwords being used on their systems. It can 
perform a dictionary-based (wordlist) attack as well as a brute force 
(incremental) password scan. It supports standard MD4 hash, standard MD5 hash, 
NT MD4/Unicode, Lotus Domino HTTP password (R4), and SHA-1 hash 
formats. LM (LAN Manager) plus appending and prepending

5. popa3d v0.6.4.1
By: Solar Designer, solar@openwall.com
Relevant URL: http://www.openwall.com/popa3d/
Platforms: Linux, Solaris
Summary: 

popa3d is a POP3 daemon which attempts to be extremely secure, 
reliable, RFC compliant, and fast (in that order).

6. tinysofa enterprise server 2.0-rc1
By: Omar Kilani
Relevant URL: http://www.tinysofa.org
Platforms: Linux, POSIX
Summary: 

tinysofa enterprise server is a secure server targeted enterprise grade 
operating system. It is based on Trustix Secure Linux and includes a 
complete distribution port to Python 2.3 and RPM 4.2, an overhauled PAM 
authentication system providing system-wide authentication 
configuration, the latest upstream packages, the replacement of ncftp with lftp, the 
addition of gdb and screen, feature additions to the swup updater that 
provide multiple configuration file support, user login FTP support, 
enable/disable support, variable expansion support (allows multiple 
architectures), and many enhancements.

VII. SPONSOR INFORMATION
-----------------------

This Issue is Sponsored By: SecurityFocus 

Want to keep up on the latest security vulnerabilities? Don't have time 
to
visit a myriad of mailing lists and websites to read the news? Just add 
the
new SecurityFocus RSS feeds to your freeware RSS reader, and see all 
the
latest posts for Bugtraq and the SF Vulnernability database in one
convenient place. Or, pull in the latest news, columnists and feature
articles in the SecurityFocus aggregated news feed, and stay on top of
what's happening in the community!

http://www.securityfocus.com/rss/index.shtml

------------------------------------------------------------------------