From security-announce@turbolinux.co.jp Wed Aug 27 15:49:15 2003 From: Turbolinux Resent-From: security-announce@turbolinux.co.jp To: security-announce@turbolinux.co.jp Resent-To: server-users-e@turbolinux.co.jp (moderated) Date: Wed, 27 Aug 2003 19:32:50 +0900 Reply-To: server-users-e@turbolinux.co.jp Subject: [Full-Disclosure] [TURBOLINUX SECURITY INFO] 27/Aug/2003 -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 This is an announcement only email list for the x86 architecture. ============================================================ Turbolinux Security Announcement 27/Aug/2003 ============================================================ The following page contains the security information of Turbolinux Inc. - Turbolinux Security Center http://www.turbolinux.com/security/ (1) gdm -> Multiple vulnerabilities in gdm (2) perl -> Cross-site scripting vulnerability =========================================================== * gdm -> Multiple vulnerabilities in gdm =========================================================== More information : Gdm (the GNOME Display Manager) is a highly configurable reimplementation of xdm, the X Display Manager. GDM contains a bug where GDM will run as root when examining the ~/.xsession-errors file when using the "examine session errors" feature, allowing local users the ability to read any text file on the system by creating a symlink. The vulnerability in the XDMCP ( X Display Manager Control Protocol) support for GDM allows attackers to cause a denial of service. The XDMCP is disabled by default Impact : These vulnerabilities may allow local users to read arbitrary files on the system by creating a symlink and allow an attacker to create a DoS condition on the GDM. Affected Products : - Turbolinux 8 Server - Turbolinux 8 Workstation - Turbolinux 7 Server - Turbolinux 7 Workstation - Turbolinux Server 6.5 - Turbolinux Advanced Server 6 - Turbolinux Server 6.1 - Turbolinux Workstation 6.0 Solution : Please use turbopkg tool to apply the update. Source Packages Size : MD5 gdm-2.2.0-8.src.rpm 839151 2745751916d7d6a0c6497cc1d4623f99 Binary Packages Size : MD5 gdm-2.2.0-8.i586.rpm 292402 8109780f85b19b6e4189cf225e1b2c38 Source Packages Size : MD5 gdm-2.2.0-8.src.rpm 839151 8c61ac0da13c4c995719847f482a5c22 Binary Packages Size : MD5 gdm-2.2.0-8.i586.rpm 292384 6cbfaf701d9b7d350d26b0d9c508e12b Source Packages Size : MD5 gdm-2.2.0-8.src.rpm 839151 02bda77040bb605843c8aaf66f1e2a75 Binary Packages Size : MD5 gdm-2.2.0-8.i586.rpm 289789 189fc1febae0810d8883e8542f86a299 Source Packages Size : MD5 gdm-2.2.0-8.src.rpm 839151 2f2a9b8e33ed92fecfeab0aa5ddf2085 Binary Packages Size : MD5 gdm-2.2.0-8.i586.rpm 290002 19e30a0035b272225d4c2b59e1258431 Source Packages Size : MD5 gdm-2.0beta4-26.src.rpm 413935 d91de875c999c2a2e3f3467d421299ea Binary Packages Size : MD5 gdm-2.0beta4-26.i386.rpm 160220 38244a585d0202b6ee52c382ebadb811 Source Packages Size : MD5 gdm-2.0beta4-26.src.rpm 413935 88c4a62750a21df37c4d4a9ada946c49 Binary Packages Size : MD5 gdm-2.0beta4-26.i386.rpm 160239 deba6007079ecca771564fe224cef472 Source Packages Size : MD5 gdm-2.0beta4-26.src.rpm 413935 0dd49d4c79840727bb66d15c6f1c44ec Binary Packages Size : MD5 gdm-2.0beta4-26.i386.rpm 160260 5beea74732e7730db54d975ea44ce4a6 Source Packages Size : MD5 gdm-2.0beta4-26.src.rpm 413935 344ad57f0d9eb057a03107f9b2d5eace Binary Packages Size : MD5 gdm-2.0beta4-26.i386.rpm 160172 719323f6e65acd14f808831a1666e6a3 References : CVE [CAN-2003-0547] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0547 [CAN-2003-0548] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0548 -------------------------------------------------------------------------- Revision History 27 Aug 2003 Initial release -------------------------------------------------------------------------- =========================================================== * perl -> Cross-site scripting vulnerability =========================================================== More information : Perl is a high-level programming language with roots in C, sed, awk and shell scripting. A cross-site scripting vulnerability exists in the start_form() function from CGI.pm Impact : This vulnerability may allow an attacker to execute arbitrary web script within the context of the generated page. Affected Products : - Turbolinux 8 Server - Turbolinux 8 Workstation - Turbolinux 7 Server - Turbolinux 7 Workstation - Turbolinux Server 6.5 - Turbolinux Advanced Server 6 - Turbolinux Server 6.1 - Turbolinux Workstation 6.0 Solution : Please use turbopkg tool to apply the update. Source Packages Size : MD5 perl-5.6.1-10.src.rpm 5978264 161122e722aa4b12f493a280f5ffae5b Binary Packages Size : MD5 perl-5.6.1-10.i586.rpm 6136602 dad9a80f98ea3e6b9863064b308dd6e0 Source Packages Size : MD5 perl-5.6.1-10.src.rpm 5978264 12062a758554d2f15f11c9ae00fec8f0 Binary Packages Size : MD5 perl-5.6.1-10.i586.rpm 6138917 8c3f2f1aa9aa7db37ea3ee26614473b9 Source Packages Size : MD5 perl-5.6.1-10.src.rpm 5978264 9a79eb0b0f9c3ae0aa5c36d8669fc14d Binary Packages Size : MD5 perl-5.6.1-10.i586.rpm 6144484 51f6034c17d857ae205133c4f8a4dc24 Source Packages Size : MD5 perl-5.6.1-10.src.rpm 5978264 78604c309ecf01cb534c4bc8e7a0a618 Binary Packages Size : MD5 perl-5.6.1-10.i586.rpm 6143560 32de01ffd3b43e0d0310560c5a62ed58 Source Packages Size : MD5 perl-5.00503-9.src.rpm 3691300 1c948e0b20cc3b5275f67e78026a2cc2 Binary Packages Size : MD5 perl-5.00503-9.i386.rpm 5001209 06cce83129d2e0726df16ad8ab1cad58 Source Packages Size : MD5 perl-5.00503-9.src.rpm 3691300 534ac5e7390a1a1e65d0460cc4e1b433 Binary Packages Size : MD5 perl-5.00503-9.i386.rpm 5001282 80e8a1034dcf7571ffc3dc765659db64 Source Packages Size : MD5 perl-5.00503-9.src.rpm 3691300 a48e668417213d17b8e2505261de124a Binary Packages Size : MD5 perl-5.00503-9.i386.rpm 5002105 ada00e70a55c05e04368bd0456ebf93b Source Packages Size : MD5 perl-5.00503-9.src.rpm 3691300 e59332920321d362c5409499ba863140 Binary Packages Size : MD5 perl-5.00503-9.i386.rpm 3817193 ee9799db6e988aa888b5912402a88989 References : CVE [CAN-2003-0615] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0615 -------------------------------------------------------------------------- Revision History 27 Aug 2003 Initial release -------------------------------------------------------------------------- * You may need to update the turbopkg tool before applying the update. Please refer to the following URL for detailed information. http://www.turbolinux.com/download/zabom.html http://www.turbolinux.com/download/zabomupdate.html Package Update Path http://www.turbolinux.com/update ============================================================ * To obtain the public key Here is the public key http://www.turbolinux.com/security/ * To unsubscribe from the list If you ever want to remove yourself from this mailing list, you can send a message to with the word `unsubscribe' in the body (don't include the quotes). unsubscribe * To change your email address If you ever want to chage email address in this mailing list, you can send a message to with the following command in the message body: chaddr 'old address' 'new address' If you have any questions or problems, please contact Thank you! -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.3 (GNU/Linux) iD8DBQE/TIjVK0LzjOqIJMwRAs08AKClvYsnMbJbxSIOJBInVNfiX0DeIACfUz8n Q/8nP7VKL4Z9ufS60yFmZjQ= =oOrJ -----END PGP SIGNATURE----- _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-disclosure-charter.html