|
|
Subscribe / Log in / New account

Security

Safe configuration of DNS

A group called The Measurement Factory has put out a press release to call attention to a recent survey of DNS servers. It seems that, according to TMF, the majority of publicly-available nameservers are configured incorrectly, and are vulnerable to denial of service and pharming attacks. In most cases, fixing the problems is a relatively straightforward operation.

Pharming refers to the use of cache poisoning attacks to hijack a domain name. If an attacker can convince your nameserver to return a bogus address for a known domain, your attempts to access a bank or other online financial-related site can be redirected to a malicious site. Many users have learned to enter domains for financial sites themselves, rather than, say, clicking on a random link which showed up in their mailbox. A pharming attack, however, can lead to the same result as a successful phish: account names, passwords, and credit card numbers can be captured.

So what are all of those DNS administrators doing wrong? The biggest problem, according to TMF, is that publicly-available nameservers are configured to perform recursive lookups for anybody who asks. If an attacker can request an arbitrary, recursive lookup, that attacker can get the target nameserver to contact - and accept data from - a malicious server. The malicious server can pass back incorrect information, which the target server may then cache and return to users. The solution in this case is to limit recursive queries to internal hosts; with bind, the allow-recursion option can be used to this effect.

The survey also notes that some 40% of sites on the net allow zone transfers to arbitrary sites. These transfers can disclose more information than one might like; they also represent a denial of service opportunity. Finally, the survey notes that a fair number of sites place their secondary servers on the same subnet as the primary, leading to obvious single point of failure issues.

Security issues with DNS servers have been relatively rare in recent times. A nameserver is only as secure as its configuration, however. Auditing nameservers for these issues in the near future might not be a bad idea.

Comments (15 posted)

New vulnerabilities

chkstat: information disclosure

Package(s):chkstat CVE #(s):
Created:October 24, 2005 Updated:October 25, 2005
Description: SUSE LINUX ships with three pre defined sets of permissions, 'easy', 'secure' and 'paranoid'. The chkstat program contained in the permissions package is used to set those permissions to the chosen level. Level 'easy' which is the default allows some world writeable directories. /usr/src/packages/RPMS and subdirectories is among them. To prevent users from playing tricks in there e.g. linking to /etc/shadow chkstat doesn't touch symlinks or files with an hardlink count != 1.

Stefan Nordhausen discovered a way to trick this check. To gain access to e.g. /etc/shadow a malicious user has to place a hardlink to that file at a place that is modified by chkstat. chkstat will not touch the file because it has a hardlink count of two. However, if the administrator modifies the user database the original /etc/shadow gets deleted and replaced by a new one. That means the hardlink count of the file created by the malicious user drops to one. At this point chkstat will modify the file's permissions so anyone can read it. So it's technically impossible for chkstat to modify permissions of files in world writeable directories in a secure way.

Alerts:
SuSE SUSE-SA:2005:062 permissions 2005-10-24

Comments (none posted)

enigmail: information disclosure

Package(s):enigmail CVE #(s):CVE-2005-3256
Created:October 20, 2005 Updated:December 13, 2005
Description: The key selection dialog from the Mozilla Thunderbird enigmail plugin has an information disclosure vulnerability. A key with an empty user id from a user's keyring will be used by default, allowing a message to be decrypted. This can lead to an unauthorized information disclosure.
Alerts:
Mandriva MDKSA-2005:226 mozilla-thunderbird 2005-12-12
Debian DSA-889-1 enigmail 2005-11-08
Ubuntu USN-211-1 enigmail 2005-10-20

Comments (none posted)

eric: missing input sanitizing

Package(s):eric CVE #(s):CAN-2005-3068
Created:October 21, 2005 Updated:October 25, 2005
Description: The developers of eric, a full featured Python IDE, have fixed a bug in the processing of project files that could lead to the execution of arbitrary code.
Alerts:
Debian DSA-869-1 eric 2005-10-21

Comments (none posted)

ethereal: multiple vulnerabilities

Package(s):ethereal CVE #(s):CVE-2005-3241 CVE-2005-3242 CVE-2005-3243 CVE-2005-3244 CVE-2005-3245 CVE-2005-3246 CVE-2005-3247 CVE-2005-3248 CVE-2005-3249 CVE-2005-3184
Created:October 25, 2005 Updated:January 10, 2006
Description: A number of security flaws have been discovered in Ethereal. On a system where Ethereal is running, a remote attacker could send malicious packets to trigger these flaws and cause Ethereal to crash or potentially execute arbitrary code.
Alerts:
Fedora-Legacy FLSA:152922 ethereal 2006-01-09
Mandriva MDKSA-2005:193-2 ethereal 2005-10-31
Gentoo 200510-25 ethereal 2005-10-30
Mandriva MDKSA-2005:193-1 ethereal 2005-10-26
Mandriva MDKSA-2005:193 ethereal 2005-10-25
Red Hat RHSA-2005:809-01 Ethereal 2005-10-25

Comments (none posted)

fetchmailconf: insecure file creation

Package(s):fetchmail CVE #(s):CVE-2005-3088
Created:October 26, 2005 Updated:November 22, 2005
Description: The fetchmailconf utility can create files which are world-readable for a brief period. These files may contain passwords, and thus should not be created in this manner.
Alerts:
Debian DSA-900-3 fetchmail 2005-11-22
Debian DSA-900-2 fetchmail 2005-11-21
Debian DSA-900-1 fetchmail 2005-11-18
Mandriva MDKSA-2005:209 fetchmail 2005-11-09
Ubuntu USN-215-1 fetchmail 2005-11-07
Gentoo 200511-06 fetchmail 2005-11-06
Red Hat RHSA-2005:823-01 fetchmail 2005-10-26

Comments (none posted)

libgda2: format string vulnerabilities

Package(s):libgda2 CVE #(s):CAN-2005-2958
Created:October 25, 2005 Updated:November 18, 2005
Description: Steve Kemp discovered two format string vulnerabilities in libgda2, the GNOME Data Access library for GNOME2, which may lead to the execution of arbitrary code in programs that use this library.
Alerts:
SuSE SUSE-SR:2005:027 multi 2005-11-11
Fedora FEDORA-2005-1029 libgda 2005-11-07
Mandriva MDKSA-2005:203 gda2.0 2005-11-01
Gentoo 200511-01 libgda 2005-11-02
Ubuntu USN-212-1 libgda2 2005-10-28
Debian DSA-871-2 libgda2 2005-10-25
Debian DSA-871-1 libgda2 2005-10-25

Comments (none posted)

module-assistant: insecure temp file

Package(s):module-assistant CVE #(s):CAN-2005-3121
Created:October 20, 2005 Updated:October 25, 2005
Description: The module-assistant package creation tool creates an insecure temporary file.
Alerts:
Debian DSA-867-1 module-assistant 2005-10-20

Comments (none posted)

pam: brute-force vulnerability

Package(s):pam CVE #(s):CVE-2005-2977
Created:October 26, 2005 Updated:October 28, 2005
Description: The pam unix_chkpwd utility can, when SELinux is enabled, be used by a local attacker to perform brute-force password guessing.
Alerts:
Fedora FEDORA-2005-1031 pam 2005-10-27
Gentoo 200510-22 pam 2005-10-28
Red Hat RHSA-2005:805-01 pam 2005-10-26
Fedora FEDORA-2005-1030 pam 2005-10-26

Comments (none posted)

phpMyAdmin: local file inclusion and XSS

Package(s):phpmyadmin CVE #(s):CVE-2005-2869 CVE-2005-3300 CVE-2005-3301
Created:October 25, 2005 Updated:November 18, 2005
Description: Stefan Esser discovered that by calling certain PHP files directly, it was possible to workaround the grab_globals.lib.php security model and overwrite the $cfg configuration array. Systems running PHP in safe mode are not affected. Futhermore, Tobias Klein reported several cross-site-scripting issues resulting from insufficient user input sanitizing. A local attacker may exploit this vulnerability by sending malicious requests, causing the execution of arbitrary code with the rights of the user running the web server. Furthermore, the cross-site scripting issues give a remote attacker the ability to inject and execute malicious script code or to steal cookie-based authentication credentials, potentially compromising the victim's browser.
Alerts:
SuSE SUSE-SA:2005:066 phpMyAdmin 2005-11-18
Slackware SSA:2005-310-05 php 2005-11-07
Debian DSA-880-1 phpmyadmin 2005-11-02
Gentoo 200510-21 phpmyadmin 2005-10-25

Comments (none posted)

squid: denial of service

Package(s):squid CVE #(s):CVE-2005-3258
Created:October 20, 2005 Updated:October 27, 2005
Description: Squid, a proxy caching server for Web clients, has a denial of service vulnerability, it can be caused to crash by sending a malformed FTP response.
Alerts:
Mandriva MDKSA-2005:195 squid 2005-10-26
Fedora FEDORA-2005-1010 squid 2005-10-20

Comments (none posted)

sudo: missing input sanitizing

Package(s):sudo CVE #(s):CVE-2005-2959
Created:October 25, 2005 Updated:February 19, 2006
Description: Tavis Ormandy noticed that sudo, a program that provides limited super user privileges to specific users, does not clean the environment sufficiently. The SHELLOPTS and PS4 variables are dangerous and are still passed through to the program running as privileged user. This can result in the execution of arbitrary commands as privileged user when a bash script is executed. These vulnerabilities can only be exploited by users who have been granted limited super user privileges.
Alerts:
OpenPKG OpenPKG-SA-2006.002 sudo 2006-02-18
Trustix TSLSA-2005-0062 multi 2005-11-04
Ubuntu USN-213-1 sudo 2005-10-28
Mandriva MDKSA-2005:201 sudo 2005-10-27
Debian DSA-870-1 sudo 2005-10-25

Comments (none posted)

Zope: file inclusion through RestructuredText

Package(s):zope CVE #(s):
Created:October 25, 2005 Updated:October 25, 2005
Description: Zope honors file inclusion directives in RestructuredText objects by default. An attacker could exploit the vulnerability by sending malicious input that would be interpreted in a RestructuredText Zope object, potentially resulting in the execution of arbitrary Zope code with the rights of the Zope server.
Alerts:
Gentoo 200510-20 zope 2005-10-25

Comments (none posted)

Resources

What Is Phishing (O'ReillyNet)

The O'Reilly Network has put up a lengthy and academic article on phishing by Simson Garfinkel and Lorrie Faith Cranor. "When a user faces a phishing attack, the user's mental model about the interaction disagrees with the system model. For example, the user's intention may be 'go to eBay,' but the actual implementation of the hyperlink may be 'go to a server in South Korea.' It is this discrepancy that enables the attack, and it is this discrepancy that makes phishing attacks very hard to defend against."

Comments (15 posted)

Page editor: Jonathan Corbet
Next page: Kernel development>>


Copyright © 2005, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds