Date: 29 Mar 2005 19:37:57 -0000
From:"Peter Laborge" <plaborge@securityfocus.com>
To:linux-secnews@securityfocus.com
Subject: SecurityFocus Linux Newsletter #229
SecurityFocus Linux Newsletter #229
------------------------------------

This Issue is Sponsored By: Wireless Security Conference

WIRELESS SECURITY CONFERENCE & EXPO is the nation's leading event for
corporate wireless security strategies and solutions. Learn everything 
you
need to help your company secure your corporate wireless networks and
mobile devices. Includes hands-on workshops, live hacking sessions, top
keynotes and more. Join hundreds of your colleagues, over 25 of the 
world's
top wireless security experts and our technology solutions expo. Expo 
pass
is free or use priority code WSCSFC to save $100 off conference rates.
April 19-21, 2005, Hyatt Regency Cambridge, Cambridge, MA. Conference
website is: www.wireless-security-conference.com 

http://www.securityfocus.com/sponsor/WirelessSecurityConference_linux-secnews_050329

------------------------------------------------------------------------

Need to know what's happening on YOUR network? Symantec DeepSight 
Analyzer
is a free service that gives you the ability to track and manage 
attacks.
Analyzer automatically correlates attacks from various Firewall and 
network
based Intrusion Detection Systems, giving you a comprehensive view of 
your
computer or general network. Sign up today!

http://www.securityfocus.com/sponsor/Symantec_sf-news_041130

------------------------------------------------------------------------
I. FRONT AND CENTER
     1. Owning A New Phone
     2. Practical Certifications
II. LINUX VULNERABILITY SUMMARY
     1. Icecast XSL Parser Multiple Vulnerabilities
     2. Xzabite DYNDNSUpdate Multiple Remote Buffer Overflow Vulnera...
     3. Samsung DSL Modem Multiple Remote Vulnerabilities
     4. NetWin SurgeMail Multiple Remote HTML Injection and File Upl...
     5. Nortel Contivity VPN Client Local Password Disclosure Weakne...
     6. ImageMagick SGI Parser Heap Overflow Vulnerability
     7. ImageMagick TIFF Image File Unspecified Denial Of Service Vu...
     8. ImageMagick TIFF Image Tag Denial Of Service Vulnerability
     9. Imagemagick Photoshop Document Parsing Unspecified Denial of...
     10. Apache mod_ssl ssl_io_filter_cleanup Remote Denial Of 
Servic...
     11. Mozilla GIF Image Processing Library Remote Heap Overflow 
Vu...
     12. Mozilla Firefox Sidebar Panel Script Injection Vulnerability
     13. Mozilla Browser Remote Insecure XUL Start Up Script Loading 
...
     14. PHPSysInfo Multiple Cross-Site Scripting Vulnerabilities
     15. Invision Power Board HTML Injection Vulnerability
     16. CDRTools CDRecord Local Insecure File Creation Vulnerability
     17. Dnsmasq Multiple Remote Vulnerabilities
     18. OpenMosixview Multiple Insecure Temporary File Creation 
Vuln...
III. LINUX FOCUS LIST SUMMARY
     1. Apache+PHP+ftp security (Thread)
IV. NEW PRODUCTS FOR LINUX PLATFORMS
     1. CoreGuard Core Security System
     2. EnCase Forensic Edition
     3. KeyGhost SX
     4. SafeKit
     5. Astaro Linux Firewall
     6. CAT Cellular Authentication Token and eAuthentication Servic...
V. NEW TOOLS FOR LINUX PLATFORMS
     1. File System Saint 1.02a
     2. Umbrella v0.5
     3. Travesty 1.0
     4. OCS 0.1
     5. KSB - Kernel Socks Bouncer 2.6.10
     6. DigSig 1.3.2
VII. SPONSOR INFORMATION

I. FRONT AND CENTER
-------------------
1. Owning A New Phone
By Scott Granneman
Recent mobile phone and Bluetooth hacks, and the public's response to 
them,
show us how the average person really looks at security.
http://www.securityfocus.com/columnists/310

2. Practical Certifications
By Don Parker
Recent changes to the GIAC makes one question the value of 
certification
for the security industry.
http://www.securityfocus.com/columnists/311

II. LINUX VULNERABILITY SUMMARY
-------------------------------
1. Icecast XSL Parser Multiple Vulnerabilities
BugTraq ID: 12849
Remote: Yes
Date Published: Mar 18 2005
Relevant URL: http://www.securityfocus.com/bid/12849
Summary:
Icecast is reported prone to multiple vulnerabilities. The following 
individual issues are reported:

Icecast XSL parser is reported to be prone to a buffer overflow 
vulnerability. This issue exists due to a lack of sufficient boundary checks 
performed on certain XSL tag values before copying these values into a 
finite buffer in process memory. It is reported that the vulnerability 
manifests when a malicious XSL file is parsed by the affected software.

This issue may potentially be exploited to deny service for legitimate 
users or potentially execute arbitrary code in the context of the user 
that is running the affected software. This is not confirmed.

It is reported that the Icecast XSL parser is prone to an information 
disclosure vulnerability. It is reported that the parser fails to parse 
XSL files when a request for such a file is appended with a dot '.' 
character.

A remote attacker may exploit this vulnerability to disclose the 
contents of XSL files that can be requested publicly.

These vulnerabilities are reported to affect Icecast version 2.20, 
other versions might also be affected.

2. Xzabite DYNDNSUpdate Multiple Remote Buffer Overflow Vulnera...
BugTraq ID: 12858
Remote: Yes
Date Published: Mar 21 2005
Relevant URL: http://www.securityfocus.com/bid/12858
Summary:
Multiple remote buffer overflow vulnerabilities affect Xzabite's 
dyndnsupdate.  These issues are due to a failure of the application to 
properly validate the length of user-supplied strings prior to copying them 
into static process buffers.

An attacker may exploit these issues to execute arbitrary code with the 
privileges of a user that activated the vulnerable application. This 
may facilitate unauthorized access or privilege escalation.

3. Samsung DSL Modem Multiple Remote Vulnerabilities
BugTraq ID: 12864
Remote: Yes
Date Published: Mar 21 2005
Relevant URL: http://www.securityfocus.com/bid/12864
Summary:
Multiple vulnerabilities are reported to exist in Samsung DSL modems.

The first issue is an information disclosure issue due to a failure of 
the device to block access to potentially sensitive files.

The second issue is a default backdoor account vulnerability. It is 
reported that multiple accounts exist on the modem by default, allowing 
remote attackers to gain administrative privileges on the modem.

These vulnerabilities may allow remote attackers to gain access to 
potentially sensitive information, or to gain administrative access to the 
affected device.

Samsung DSL modems running software version SMDK8947v1.2 are reported 
to be affected. Other devices and software versions are also likely 
affected.

4. NetWin SurgeMail Multiple Remote HTML Injection and File Upl...
BugTraq ID: 12866
Remote: Yes
Date Published: Mar 22 2005
Relevant URL: http://www.securityfocus.com/bid/12866
Summary:
Multiple remote file upload and HTML injection vulnerabilities affect 
NetWin SurgeMail. The underlying causes of these issues are a failure ot 
sanitize user-supplied input and a failure to securely handle the file 
upload functionality.

These issues may be leverage to upload arbitrary files into arbitrary 
locations writable to the affected application and carry out HTML 
injection attacks against the SurgeMail administrator. This may facilitate 
theft of credentials and potentially compromise of the email server.

5. Nortel Contivity VPN Client Local Password Disclosure Weakne...
BugTraq ID: 12871
Remote: No
Date Published: Mar 22 2005
Relevant URL: http://www.securityfocus.com/bid/12871
Summary:
Nortel Contivity VPN Client for Microsoft Windows platforms is reported 
prone to a local pre-shared key (password) disclosure weakness. It is 
reported that the VPN user and group password is stored in the memory 
image of the process in plain-text format. 

Credentials that are harvested through the exploitation of this 
weakness may then be used to aid in further attacks.

This weakness is reported to affect Nortel Contivity VPN Client version 
5.01 for Microsoft Windows, versions for the Linux platform are not 
reported to be vulnerable. Other versions might also be affected.

6. ImageMagick SGI Parser Heap Overflow Vulnerability
BugTraq ID: 12873
Remote: Yes
Date Published: Mar 23 2005
Relevant URL: http://www.securityfocus.com/bid/12873
Summary:
ImageMagick is prone to a heap-based buffer overflow vulnerability.  
This vulnerability exists in the SGI image file parser.

Successful exploitation may result in execution of arbitrary code.  
This issue may potentially be exploited through the ImageMagick 
application or in other applications that import the SGI image file parser 
component.

It is noted that the SGI codec is enabled by default in ImageMagick.

7. ImageMagick TIFF Image File Unspecified Denial Of Service Vu...
BugTraq ID: 12874
Remote: Yes
Date Published: Mar 23 2005
Relevant URL: http://www.securityfocus.com/bid/12874
Summary:
A remote, client-side denial of service vulnerability affects 
ImageMagick.  This issue is likely due to a failure of the application to handle 
malformed TIFF image files.

A remote attacker may leverage this issue to cause the affected 
application to crash, potentially causing a loss of data denying service to 
legitimate users.

8. ImageMagick TIFF Image Tag Denial Of Service Vulnerability
BugTraq ID: 12875
Remote: Yes
Date Published: Mar 23 2005
Relevant URL: http://www.securityfocus.com/bid/12875
Summary:
A remote, client-side denial of service vulnerability affects 
ImageMagick.  This issue is likely due to a failure of the application to handle 
malformed TIFF image files.

A remote attacker may leverage this issue to cause the affected 
application to crash, potentially causing a loss of data, and denying service 
to legitimate users.

9. Imagemagick Photoshop Document Parsing Unspecified Denial of...
BugTraq ID: 12876
Remote: Yes
Date Published: Mar 23 2005
Relevant URL: http://www.securityfocus.com/bid/12876
Summary:
A remote, client-side denial of service vulnerability affects 
ImageMagick.  This issue is likely due to a failure of the application to handle 
malformed PSD files.

A remote attacker may leverage this issue to cause the affected 
application to crash, potentially causing a loss of data denying service to 
legitimate users.

10. Apache mod_ssl ssl_io_filter_cleanup Remote Denial Of Servic...
BugTraq ID: 12877
Remote: Yes
Date Published: Mar 23 2005
Relevant URL: http://www.securityfocus.com/bid/12877
Summary:
mod_ssl is prone to a remote denial of service vulnerability. The issue 
exists in the 'ssl_io_filter_cleanup' function.

A remote attacker can exploit this issue to cause a denial of service 
condition in an affected Apache server.

Apache 2.0.49 and prior versions are considered to be affected by this 
vulnerability.

11. Mozilla GIF Image Processing Library Remote Heap Overflow Vu...
BugTraq ID: 12881
Remote: Yes
Date Published: Mar 23 2005
Relevant URL: http://www.securityfocus.com/bid/12881
Summary:
Multiple Mozilla products are affected by a remote heap overflow 
vulnerability.  This issue affects the GIF image processing library used by 
Mozilla Firefox, Mozilla Browser, and Mozilla Thunderbird Mail client.

A successful attack can result in arbitrary code execution and result 
in unauthorized access to the affected computer.  Arbitrary code 
execution will take place in the context of a user running a vulnerable 
application.

12. Mozilla Firefox Sidebar Panel Script Injection Vulnerability
BugTraq ID: 12884
Remote: Yes
Date Published: Mar 23 2005
Relevant URL: http://www.securityfocus.com/bid/12884
Summary:
Mozilla Firefox is prone to a vulnerability that could allow remote 
code execution.  

This may occur if a malicious Web page is bookmarked as a sidebar 
panel.  The malicious page may then reportedly open a privileged page and 
inject JavaScript.  This may be leveraged to execute arbitrary code as 
the victim client user.

13. Mozilla Browser Remote Insecure XUL Start Up Script Loading ...
BugTraq ID: 12885
Remote: Yes
Date Published: Mar 23 2005
Relevant URL: http://www.securityfocus.com/bid/12885
Summary:
Mozilla Suite and Mozilla Firefox are affected by a remote insecure XUL 
script loading vulnerability.  This issue is due to an access 
validation issue that causes the script to be loaded with elevated privileges.

An attacker may leverage this issue to execute XUL startup scripts with 
elevated privileges.  The vendor has reported that the security impact 
of this is currently limited.

14. PHPSysInfo Multiple Cross-Site Scripting Vulnerabilities
BugTraq ID: 12887
Remote: Yes
Date Published: Mar 23 2005
Relevant URL: http://www.securityfocus.com/bid/12887
Summary:
phpSysInfo is reportedly affected by multiple cross-site scripting 
vulnerabilities.  These issues are due to a failure in the application to 
properly sanitize user-supplied input.

An attacker may leverage these issues to have arbitrary script code 
executed in the browser of an unsuspecting user.  This may facilitate the 
theft of cookie-based authentication credentials as well as other 
attacks.

15. Invision Power Board HTML Injection Vulnerability
BugTraq ID: 12888
Remote: Yes
Date Published: Mar 23 2005
Relevant URL: http://www.securityfocus.com/bid/12888
Summary:
Invision Power Board is reported prone to an HTML injection 
vulnerability.  This issue arises due to insufficient sanitization of 
user-supplied data.

It is reported that due to a lack of filtering of HTML tags, an 
attacker can inject an IFRAME through an HTTP POST request.

All version of Invision Power Board are considered vulnerable at the 
moment.

This BID will be updated when more information is available.

16. CDRTools CDRecord Local Insecure File Creation Vulnerability
BugTraq ID: 12891
Remote: No
Date Published: Mar 24 2005
Relevant URL: http://www.securityfocus.com/bid/12891
Summary:
A local insecure file creation vulnerability affects cdrtools cdrecord.  
This issue is due to a failure of the application to securely create 
and write to various files.

An attacker may leverage this issue to corrupt arbitrary files with the 
privileges of an unsuspecting user that activates the application.

17. Dnsmasq Multiple Remote Vulnerabilities
BugTraq ID: 12897
Remote: Yes
Date Published: Mar 25 2005
Relevant URL: http://www.securityfocus.com/bid/12897
Summary:
Dnsmasq is reported prone to multiple remote vulnerabilities.  These 
issues can allow an attacker to exploit an off-by-one overflow condition 
and carry out DNS cache poisoning attacks.

An attacker may leverage these issues to manipulate cache data, 
potentially facilitating man-in-the-middle, site impersonation, or denial of 
service attacks.  A denial of service condition or potential code 
execution may occur due to the off-by-one overflow vulnerability.

These issues affect Dnsmasq 2.20 and prior versions.

Due to a lack of details, further information is not available at the 
moment.  This BID will be updated when more information becomes 
available.

18. OpenMosixview Multiple Insecure Temporary File Creation Vuln...
BugTraq ID: 12902
Remote: No
Date Published: Mar 25 2005
Relevant URL: http://www.securityfocus.com/bid/12902
Summary:
openMosixview is reported prone to multiple local insecure temporary 
file creation vulnerabilities.  These issues are due to design errors 
that cause the application to fail to verify the existence of files before 
writing to them.

An attacker may leverage these issues to overwrite and delete arbitrary 
files with the privileges of an unsuspecting user that activates the 
vulnerable application. 

All versions of openMosixView are reported vulnerable.

III. LINUX FOCUS LIST SUMMARY
-----------------------------
1. Apache+PHP+ftp security (Thread)
Relevant URL:

http://www.securityfocus.com/archive/91/394503

IV. NEW PRODUCTS FOR LINUX PLATFORMS
------------------------------------
1. CoreGuard Core Security System
By: Vormetric
Platforms: AIX, Linux, Solaris, Windows 2000, Windows XP
Relevant URL: http://www.vormetric.com/products/#overview
Summary: 

CoreGuard System profile

The CoreGuard System is the industry's first solution that enforces
acceptable use policy for sensitive digital information assets and
protects personal data privacy across an enterprise IT environment.
CoreGuard's innovative architecture and completeness of technology
provide a comprehensive, extensible solution that tightly integrates 
all
the elements required to protect information across a widespread,
heterogeneous enterprise network, while enforcing separation of duties
between security and IT administration. At the same time, CoreGuard is
transparent to users, applications and storage infrastructures for ease
of deployment and system management.

CoreGuard enables customers to:
* Protect customer personal data privacy and digital information assets 
* Protect data at rest from unauthorized viewing by external attackers
and unauthorized insiders
* Enforce segregation of duties between IT administrators and security
administration
* Ensure host & application integrity * Block malicious code, including
zero-day exploits

2. EnCase Forensic Edition
By: Guidance Software Inc.
Platforms: DOS, FreeBSD, Linux, MacOS, NetBSD, OpenBSD, PalmOS, 
Solaris, UNIX, Windows 2000, Windows 95/98, Windows NT, Windows XP
Relevant URL: 
http://www.guidancesoftware.com/products/EnCaseForensic/index.shtm
Summary: 

EnCase Forensic Edition Version 4 delivers the most advanced features 
for computer forensics and investigations. With an intuitive GUI and 
superior performance, EnCase Version 4 provides investigators with the 
tools to conduct large-scale and complex investigations with accuracy and 
efficiency. Guidance Software?s award winning solution yields 
completely non-invasive computer forensic investigations while allowing 
examiners to easily manage large volumes of computer evidence and view all 
relevant files, including "deleted" files, file slack and unallocated 
space. 

The integrated functionality of EnCase allows the examiner to perform 
all functions of the computer forensic investigation process. EnCase's 
EnScript, a powerful macro-programming language and API included within 
EnCase, allows investigators to build customized and reusable forensic 
scripts.

3. KeyGhost SX
By: KeyGhost Ltd
Platforms: BeOS, DOS, Linux, OS/2, Solaris, SunOS, Windows 2000, 
Windows 95/98, Windows NT, Windows XP
Relevant URL: http://www.keyghost.com/SX/
Summary: 

KeyGhost SX discreetly captures and records all keystrokes typed, 
including chat conversations, email, word processor, or even activity within 
an accounting or specialist system. It is completely undetectable by 
software scanners and provides you with one of the most powerful stealth 
surveillance applications offered anywhere. 

Because KeyGhost uses STRONG 128-Bit encryption to store the recorded 
data in it?s own internal memory (not on the hard drive), it is 
impossible for a network intruder to gain access to any sensitive data stored 
within the device.

4. SafeKit
By: Evidian Inc.
Platforms: AIX, HP-UX, Linux, Solaris, Windows 2000
Relevant URL: http://www.evidian.com/safekit/index.htm
Summary: 

Evidian's SafeKit technology makes it possible to render any 
application available 24 hours per day. With no extra hardware: just use your 
existing servers and install this software-only solution.

This provides ultimate scalability. As your needs grow, all you need to 
do is add more standard servers into the cluster. With the load 
balancing features of SafeKit, you can distribute applications over multiple 
servers. If one system fails completely, the others will continue to 
serve your users.

5. Astaro Linux Firewall
By: Astaro
Platforms: Linux
Relevant URL: http://www.astaro.com/php/statics.php?action=asl&lang=gb
Summary: 

Astaro Linux Firewall: All-in-one firewall, virus protection, content 
filtering and spam protection internet security software package for 
Linux. 
Free download for home users.

6. CAT Cellular Authentication Token and eAuthentication Servic...
By: Mega AS Consulting Ltd
Platforms: Java, Linux, OpenBSD, Os Independent, SecureBSD, Solaris, 
UNIX, Windows 2000, Windows NT
Relevant URL: http://www.megaas.co.nz
Summary: 

Low cost, easy to use Two Factor Authentication One Time Password token 
using the Cellular. Does not use SMS or communication, manages multiple 
OTP accounts - new technology. For any business that want a safer 
access to its Internet Services. More information at our site.
 
We also provide eAuthentication service for businesses that will not 
buy an Authentication product but would prefer to pay a monthly charge 
for authentication services from our our CAT Server.

V. NEW TOOLS FOR LINUX PLATFORMS
--------------------------------
1. File System Saint 1.02a
By: Joshua Fritsch
Relevant URL: http://www.unixgeeks.org/saint
Platforms: Linux, UNIX
Summary: 

A fast, flexible, lightweight perl-based host IDS.

2. Umbrella v0.5
By: Umbrella
Relevant URL: http://umbrella.sf.net/
Platforms: Linux
Summary: 

A combination of process-based access control (PBAC) and authentication 
of binaries (like DigSig) - in addition the binaries have the security 
policy included within the binary, thus when it is executed, the policy 
is applied to the corrosponding process. Umbrella provides developers 
with a "restricted fork" which enables him to further restrict a 
sub-process from e.g. accessing the network.

3. Travesty 1.0
By: Robert Wesley McGrew
Relevant URL: http://cse.msstate.edu/~rwm8/travesty/
Platforms: Linux
Summary: 

Travesty is an interactive program for managing the hardware addresses 
(MAC) of ethernet devices on your computer.  It supports manually 
changing the MAC, generating random addresses, and applying different vendor 
prefixes to the current address.
 It also allows the user to import their own lists of hardware 
addresses and descriptions that can be navigated from within the Travesty 
interface.  Travesty is written in Python, and is very simple to add 
functionality to, or modify.

4. OCS 0.1
By: OverIP
Relevant URL: http://hacklab.altervista.org/download/OCS.c
Platforms: Linux
Summary: 

This is a very reliable and fast mass scanner for Cisco router with 
telnet/enable default password.

5. KSB - Kernel Socks Bouncer 2.6.10
By: Paolo Ardoino
Relevant URL: http://ardoino.altervista.org/kernel.php
Platforms: Linux
Summary: 

KSB26 [Kernel Socks Bouncer] is Linux Kernel 2.6.x patch that redirects 
full tcp connections [SSH, telnet, ...] to follow through socks5. KSB26 
uses a character device to pass socks5 and target ips to the Linux 
Kernel. I have choosen to write in kernel space to enjoy myself [I know 
that there are easier and safer ways to write this in userspace].

6. DigSig 1.3.2
By: 
Relevant URL: http://sourceforge.net/projects/disec/
Platforms: Linux
Summary: 

DigSig Linux kernel load module checks the signature of a binary before 
running it.  It inserts digital signatures inside the ELF binary and 
verify this signature before loading the binary. Therefore, it improves 
the security of the system by avoiding a wide range of malicious 
binaries like viruses, worms, Torjan programs and backdoors from running on 
the system.

VII. SPONSOR INFORMATION
-----------------------

This Issue is Sponsored By: Wireless Security Conference

WIRELESS SECURITY CONFERENCE & EXPO is the nation's leading event for
corporate wireless security strategies and solutions. Learn everything 
you
need to help your company secure your corporate wireless networks and
mobile devices. Includes hands-on workshops, live hacking sessions, top
keynotes and more. Join hundreds of your colleagues, over 25 of the 
world's
top wireless security experts and our technology solutions expo. Expo 
pass
is free or use priority code WSCSFC to save $100 off conference rates.
April 19-21, 2005, Hyatt Regency Cambridge, Cambridge, MA. Conference
website is: www.wireless-security-conference.com 

http://www.securityfocus.com/sponsor/WirelessSecurityConference_linux-secnews_050329

------------------------------------------------------------------------

Need to know what's happening on YOUR network? Symantec DeepSight 
Analyzer
is a free service that gives you the ability to track and manage 
attacks.
Analyzer automatically correlates attacks from various Firewall and 
network
based Intrusion Detection Systems, giving you a comprehensive view of 
your
computer or general network. Sign up today!

http://www.securityfocus.com/sponsor/Symantec_sf-news_041130

------------------------------------------------------------------------