[ISN] Linux Advisory Watch - June 9th 2006

InfoSec News isn at c4i.org
Fri Jun 9 12:45:02 EDT 2006

|  LinuxSecurity.com                         Weekly Newsletter        |
|  June 9th, 2006                             Volume 7, Number 24n    |
|                                                                     |
|  Editorial Team:  Dave Wreski             dave at linuxsecurity.com    |
|                   Benjamin D. Thomas      ben at linuxsecurity.com     |

Thank you for reading the LinuxSecurity.com weekly security newsletter.
The purpose of this document is to provide our readers with a quick
summary of each week's most relevant Linux security headlines.

This week, advisories were released for motor, typespeed, lynx-cur,
xmcd, postgresql, centericq, freeradius, spamassassin, dia, tetex,
squirrelmail, mc, gdm, gnome-panel, dovecot, evolution, x11, libtiff,
openldap, MySQL, postgresql, quagga, zebra, and rug.  The distributors
include Debian, Fedora, Mandriva, Red Hat, and SuSE.


Security on your mind?

Protect your home and business networks with the free, community
version of EnGarde Secure Linux.  Don't rely only on a firewall to
protect your network, because firewalls can be bypassed.  EnGarde
Secure Linux is a security-focused Linux distribution made to protect
your users and their data.

The security experts at Guardian Digital fortify every download of
EnGarde Secure Linux with eight essential types of open source
packages.  Then we configure those packages to provide maximum
security for tasks such as serving dynamic websites, high
availability mail, transport, network intrusion detection,
and more.  The result for you is high security, easy
administration, and automatic updates.

The Community edition of EnGarde Secure Linux is completely
free and open source.  Updates are also freely available when
you register with the Guardian Digital Secure Network.



EnGarde Secure Linux v3.0.7 Now Available

Guardian Digital is happy to announce the release of EnGarde
Secure Community 3.0.7 (Version 3.0, Release 7).  This
release includes several bug fixes and feature enhancements
to the Guardian Digital WebTool and the SELinux policy,
several updated packages, and several new packages
available for installation.

The following reported bugs from bugs.engardelinux.org
are fixed in this release:

#0000067 SIMAP AND SPOP3 packages are built
disabling plaintext auth

Several other bugs are fixed in this release as well.
New features include:

* A new package (hwlister) which can be used to
  generate an inventory of all the hardware which
  comprises your system.  This package is now
  installed by default with EnGarde Secure Linux.

* PHP was re-build with cURL support and a race
  condition was fixed in shadow-utils.

* The latest stable versions of: MySQL (5.0.22),
   apache (2.0.58), asterisk (1.2.8), bacula (1.38.9),
   imap (2004g), openssl (0.9.8b), php5 (5.1.4),
   postfix (2.2.10), snort (2.4.4), sudo (1.6.8p12),
   syslog-ng (1.6.11), vim (6.4.010), and zaptel (1.2.6).

* Several new packages:
  - binstats (1.08)
  Binstats is a statistics generation tool for installed
  programs. It is also useful for cleaning up a system by
  helping find duplicate executables, unused libraries,
  statically linked binaries and duplicate man pages.

- bitchx (1.1)
 BitchX is an IRC (Internet Relay Chat) client that is
 based on ircII (but heavily modified).  It is ncurses based
 and allows the user to get onto IRC without requiring the
 use of GUI client.

- bittorrent (4.9.2)
  Bittorrent is a scatter-gather network file transfer
  protocol used for distributing files.  It works in the
  opposite method of regular downloads with regard to the
  fact that the more people are currently downloading a
   file using bittorrent, the faster it will go.

- ethereal (0.99.0)
  Ethereal is a network protocol analyzer.  This version is
  ncurses based and allows the user to examine and capture
  data from a live network.

- hyperion (1.0.2)
  Hyperion is an IRC daemon that allows clients to connect
  to it. This is the server that is used by Freenode.

- john (
  "John" is a password cracker whose primary purpose is to
   detect weak passwords in order to strengthen the overall
   security of a system.

- libapache-mod_fcgid (1.09)
  mod_fcgid is an apache web server module that acts as a
  binary compatibility alternative to mod_fastcgi.  It comes
  with a new process management strategy.

- libapache-mod_mono (1.1.14)
  mod_mono is an apache web server module that provides
  ASP.NET support for the apache web server.

- libapache-mod_security (1.9.3)
  mod_security is an apache web server module that acts as an
  intrusion detection and prevention engine for web applications.
  It acts as another line of defense between improperly coded
  applications and the webserver.

- makejail (0.0.5)
  Makejail, in conjunction with binstats, determines which binaries
  a program is going to need to be chrooted and creates a chroot
  jail for it.

- mc (4.6.0)
  Midnight Commander is a console based ncurses visual file manager
  similar to Norton Commander.  It has the ability to handle
  archives, FTP site, and many other files built in.

- paketto (1.10)
  The Paketto Keiretsu is a collection of tools that use new and
  unusual strategies for manipulating TCP/IP networks. scanrand is
  said to be faster than nmap and more useful in some scenarios.

- psad (1.4.5)
  PSAD is a collection of utilities that work with the linux
  firewalling code (IPTables) to detect port scans and other
  suspect traffic.  It also includes the ability to configure
  threshold levels based on how stringent your ruleset is.

- slat (2.0)
  SLAT provides a systematic way of determining if your SE Linux
  policy achieves your desired security goal.  This is a useful
  tool when creating or modifying SELinux policy.

All new users downloading EnGarde Secure Linux for the first
time or users who use the LiveCD environment should download this

Users who are currently using EnGarde Secure Linux do not need
to download this release -- they can update their machines via
the Guardian Digital Secure Network WebTool module.



Linux File & Directory Permissions Mistakes

One common mistake Linux administrators make is having file and
directory permissions that are far too liberal and allow access
beyond that which is needed for proper system operations. A full
explanation of unix file permissions is beyond the scope of this
article, so I'll assume you are familiar with the usage of such
tools as chmod, chown, and chgrp. If you'd like a refresher, one
is available right here on linuxsecurity.com.



-->  Take advantage of the LinuxSecurity.com Quick Reference Card!
-->  http://www.linuxsecurity.com/docs/QuickRefCard.pdf

|  Distribution: Debian           | ----------------------------//

* Debian: New motor packages fix arbitrary code execution
  31st, May, 2006

Updated package.


* Debian: New typespeed packages fix arbitrary code execution
  31st, May, 2006

Niko Tyni discovered a buffer overflow in the processing of network
data in typespeed, a game for testing and improving typing speed,
which could lead to the execution of arbitrary code.


* Debian: New lynx-cur packages fix several vulnerabilities
  1st, June, 2006

Updated package.


* Debian: New xmcd packages fix denial of service
  2nd, June, 2006

The xmcdconfig creates directories world-writeable allowing local
users to fill the /usr and /var partition and hence cause a denial of
service.  This problem has been half-fixed since version 2.3-1.


* Debian: New PostgreSQL packages fix encoding vulnerabilities
  3rd, June, 2006

Updated package.


* Debian: New centericq packages fix arbitrary code execution
  3rd, June, 2006

Updated package.


* Debian: New freeradius packages fix arbitrary code execution
  3rd, June, 2006

Updated package.


* Debian: New spamassassin packages fix remote command execution
  6th, June, 2006

Updated package.


|  Distribution: Fedora           | ----------------------------//

* Fedora Extras 5 update: dia-0.95-3
  6th, June, 2006

This update fixes CVE-2006-1550, CVE-2006-2453, CVE-2006-2480.


* Fedora Core 4 Update: spamassassin-3.0.6-1.fc4
  6th, June, 2006

Resolves CVE-2006-2447.  Note that you are affected by this bug only
if you launched spamd with both --vpopmail and --paranoid, which is
not a common configuration.


* Fedora Core 5 Update: spamassassin-3.1.3-1.fc5
  6th, June, 2006

3.1.3 Resolves CVE-2006-2447. Note that you are affected by this bug
only if you launched spamd with both --vpopmail and --paranoid, which
is not a common configuration.	Also included are bug fixes from


* Fedora Core 4 Update: tetex-3.0-10.FC4
  7th, June, 2006

Updated package.


* Fedora Core 4 Update: squirrelmail-1.4.6-7.fc4
  7th, June, 2006

CVE-2006-2842 Squirrelmail File Inclusion


* Fedora Core 5 Update: mc-4.6.1a-13.FC5
  7th, June, 2006

Updated package.


* Fedora Core 5 Update: gdm-2.14.4-1.fc5.3
  7th, June, 2006

This update resolves an issue in gdm-2.14.4-1.fc5.2 where GDM would
choose the wrong X server path.


* Fedora Core 5 Update: gnome-panel-2.14.2-1.fc5.1
  7th, June, 2006

The gnome-panel package has been rebuilt against the latest
evolution-data-server package.


* Fedora Core 5 Update: squirrelmail-1.4.6-7.fc5
  7th, June, 2006

CVE-2006-2842 Squirrelmail File Inclusion Vulnerability


* Fedora Core 5 Update: dovecot-1.0-0.beta8.1.fc5
  7th, June, 2006

Updated package.


|  Distribution: Mandriva         | ----------------------------//

* Mandriva: Updated evolution packages fix DoS (crash) vulnerability
on certain messages.
  1st, June, 2006

Evolution, as shipped in Mandriva Linux 2006.0, can crash displaying
certain carefully crafted images.


* Mandriva: Updated xorg-x11 packages to address bug with keyboard
  5th, June, 2006

A misapplied patch in a recent X.org updated caused keyboard layout
problems which resulted in some users being unable to use the
CTRL-ALT-function key combination to switch to a console, as well as
other keyboard mapping issues.
Updated packages have been re-patched to correct these issues.


* Mandriva: Updated libtiff packages fixes tiffsplit vulnerability
  5th, June, 2006

A stack-based buffer overflow in the tiffsplit command in libtiff
and earlier might might allow attackers to execute arbitrary code via
a long filename.


* Mandriva: Updated openldap packages fixes buffer overflow
  7th, June, 2006

A stack-based buffer overflow in st.c in slurpd for OpenLDAP might
allow attackers to execute arbitrary code via a long hostname.
Packages have been patched to correct this issue.


* Mandriva: Updated MySQL packages fixes SQL injection vulnerability.
  7th, June, 2006

SQL injection vulnerability in MySQL 4.1.x before 4.1.20 and 5.0.x
before 5.0.22 allows context-dependent attackers to execute arbitrary
SQL commands via crafted multibyte encodings in character sets such
as SJIS, BIG5, and GBK, which are not properly handled when the
mysql_real_escape function is used to escape the input. MySQL 4.0.18
in Corporate 3.0 and MNF 2.0 is not affected by this issue. Packages
have been patched to correct this issue.


* Mandriva: Updated postgresql packages fixes SQL injection
  7th, June, 2006

Updated package.


|  Distribution: Red Hat          | ----------------------------//

* RedHat: Moderate: quagga security update
  1st, June, 2006

Updated quagga packages that fix several security vulnerabilities are
now available. This update has been rated as having moderate security
impact by the Red Hat Security Response Team.


* RedHat: Moderate: zebra security update
  1st, June, 2006

Updated zebra packages that fix several security vulnerabilities are
now available. This update has been rated as having moderate security
impact by the Red Hat Security Response Team.


* RedHat: Moderate: dia security update
  1st, June, 2006

Updated Dia packages that fix several buffer overflow bugs are now
available. This update has been rated as having moderate security
impact by the Red Hat Security Response Team.


* RedHat: Moderate: spamassassin security update
  6th, June, 2006

Updated spamassassin packages that fix an arbitrary code execution
flaw are now available. This update has been rated as having moderate
security impact by the Red Hat Security Response Team.


|  Distribution: SuSE             | ----------------------------//

* SuSE: cron local privilege escalation
  31st, May, 2006

The code in do_command.c in Vixie cron does not check the return code
of a setuid call, which might allow local users to gain root
privileges if setuid fails in cases such as PAM failures or resource
limits.  This problem is known to affect only distributions with
Linux 2.6 kernels, but the package was updated for all distributions
for completeness.  This problem is tracked by the Mitre CVE ID


* SuSE: kernel (SUSE-SA:2006:028)
  31st, May, 2006

Multiple vulnerabilities have been fixed in the linux kernel.


* SuSE: rug (SUSE-SA:2006:029)
  31st, May, 2006

Updated package.


Distributed by: Guardian Digital, Inc.                LinuxSecurity.com

     To unsubscribe email vuln-newsletter-request at linuxsecurity.com
         with "unsubscribe" in the subject of the message.

More information about the ISN mailing list