|
|
Subscribe / Log in / New account

Security

The SANS top-20 list

SANS has posted a new version of its 20 most critical Internet security vulnerabilities list. As always, this list is a good starting point for those looking for potential security problems on their networks. Here are some highlights from the current version:

  • Five of the twenty items concern Windows and other Microsoft software.

  • There are ten vulnerabilities in "cross-platform applications" listed. Some of these (commercial DNS servers, for example) do not apply to most Linux systems. But others do, including anti-virus software (ClamAV in particular), PHP-based applications (several vulnerabilities), database managers, file-sharing applications, media players, and Mozilla-based browsers.

  • There are only two Unix-specific vulnerabilities, and one of those is a general item on Mac OS X. The other vulnerability is "configuration weaknesses," with an emphasis on SSH attacks.

Once upon a time, this list was evenly divided between Windows and Unix vulnerabilities. A casual reading of the current list suggests that things have shifted in favor of Unix-based systems. While it may be true that Unix-based systems are easier to keep secure on the net, there is still no reason to be overly complacent. A system compromised by way of a Firefox or PHP vulnerability is still compromised.

Comments (3 posted)

New vulnerabilities

apache2: memory leak

Package(s):apache2 CVE #(s):CVE-2005-2970
Created:December 6, 2005 Updated:December 19, 2005
Description: A memory leak was found in the Apache 2 'worker' module in the handling of aborted TCP connections. By repeatedly triggering this situation, a remote attacker could drain all available memory, which eventually led to a Denial of Service.
Alerts:
Mandriva MDKSA-2005:233 apache2 2005-12-19
Ubuntu USN-225-1 apache2 2005-12-06

Comments (none posted)

ktools: buffer overflow

Package(s):centericq CVE #(s):CVE-2005-3863
Created:December 7, 2005 Updated:August 29, 2006
Description: From the Debian-Testing alert: Mehdi Oudad "deepfear" and Kevin Fernandez "Siegfried" from the Zone-H Research Team discovered a buffer overflow in kkstrtext.h of the ktools library, which is included in (at least) centericq and motor.
Alerts:
Gentoo 200608-27 motor 2006-08-29
Debian DSA-1088-1 centericq 2006-06-03
Debian DSA-1083-1 motor 2006-05-31
Gentoo 200512-11 centericq 2005-12-20
Debian-Testing DTSA-23-1 centericq 2005-12-05

Comments (none posted)

helix-player: integer overflow

Package(s):helix-player CVE #(s):CVE-2005-2629
Created:December 2, 2005 Updated:December 7, 2005
Description: An integer overflow has been discovered in helix-player, the helix audio and video player. This flaw could allow a remote attacker to run arbitrary code on a victims computer by supplying a specially crafted network resource.
Alerts:
Debian DSA-915-1 helix-player 2005-12-02

Comments (none posted)

inkscape: insecure temp files

Package(s):inkscape CVE #(s):CVE-2005-3885
Created:December 5, 2005 Updated:December 7, 2005
Description: Javier Fernández-Sanguino Peña discovered that Inkscape's ps2epsi.sh script, which converts PostScript files to Encapsulated PostScript format, creates a temporary file in an insecure way. A local attacker could exploit this with a symlink attack to create or overwrite arbitrary files with the privileges of the user running Inkscape.
Alerts:
Ubuntu USN-223-1 inkscape 2005-12-05

Comments (1 posted)

ipsec-tools: denial of service

Package(s):ipsec-tools CVE #(s):CVE-2005-3732
Created:December 1, 2005 Updated:June 8, 2006
Description: ipsec-tools has a remote denial of service vulnerability in the racoon daemon. If racoon is running in aggressive mode, it fails to check all peer payloads during When the daemon the IKE negotiation phase, allowing a malicious peer to crash the daemon. One should always be careful around aggressive racoons.
Alerts:
Fedora-Legacy FLSA:190941 ipsec-tools 2006-06-06
Red Hat RHSA-2006:0267-01 ipsec-tools 2006-04-25
Debian DSA-965-1 ipsec-tools 2006-02-06
Mandriva MDKSA-2006:020 ipsec-tools 2006-01-25
SuSE SUSE-SA:2005:070 ipsec-tools,freeswan,openswan 2005-12-20
Gentoo 200512-04 openswan 2005-12-12
Ubuntu USN-221-1 ipsec-tools 2005-12-01

Comments (none posted)

mailman: denial of service

Package(s):mailman CVE #(s):CVE-2005-3573
Created:December 2, 2005 Updated:March 8, 2006
Description: Scrubber.py in Mailman 2.1.4 - 2.1.6 does not properly handle UTF8 character encodings in filenames of e-mail attachments, which allows remote attackers to cause a denial of service.
Alerts:
Red Hat RHSA-2006:0204-01 mailman 2006-03-07
Debian DSA-955-1 mailman 2006-01-25
Ubuntu USN-242-1 mailman 2006-01-16
Mandriva MDKSA-2005:222 mailman 2005-12-02

Comments (none posted)

perl: integer overflow

Package(s):perl CVE #(s):CVE-2005-3962 CVE-2005-3912
Created:December 1, 2005 Updated:February 27, 2006
Description: Perl has an sprintf integer overflow vulnerability that may be used for a denial of service, remote code execution and information leakage.
Alerts:
Fedora-Legacy FLSA:176731 perl 2006-02-25
Debian DSA-943-1 perl 2006-01-16
Red Hat RHSA-2005:881-01 Perl 2005-12-20
Red Hat RHSA-2005:880-01 Perl 2005-12-20
SuSE SUSE-SA:2005:071 perl 2005-12-20
Fedora FEDORA-2005-1145 perl 2005-12-14
Fedora FEDORA-2005-1144 perl 2005-12-14
Ubuntu USN-222-2 perl 2005-12-12
Trustix TSLSA-2005-0070 multi 2005-12-09
Mandriva MDKSA-2005:225 perl 2005-12-08
Gentoo 200512-02 webmin 2005-12-07
Gentoo 200512-01 perl 2005-12-07
OpenPKG OpenPKG-SA-2005.025 perl 2005-12-03
Mandriva MDKSA-2005:223 webmin 2005-12-02
Ubuntu USN-222-1 perl 2005-12-02
Fedora FEDORA-2005-1116 perl 2005-12-01
Fedora FEDORA-2005-1113 perl 2005-12-01

Comments (none posted)

trackballs: symlink vulnerability

Package(s):trackballs CVE #(s):
Created:December 7, 2005 Updated:December 7, 2005
Description: Trackballs follows symbolic links, possibly allowing unprivileged users to access and modify files accessible by the games group.
Alerts:
Debian-Testing DTSA-26-1 trackballs 2005-12-05

Comments (none posted)

xpdf: arbitrary code execution

Package(s):xpdf CVE #(s):CVE-2005-3193
Created:December 6, 2005 Updated:January 11, 2006
Description: Several flaws were discovered in Xpdf. An attacker could construct a carefully crafted PDF file that could cause Xpdf to crash or possibly execute arbitrary code when opened.
Alerts:
Fedora FEDORA-2005-027 xpdf 2006-01-11
Gentoo 200601-02 kdegraphics 2006-01-04
Red Hat RHSA-2005:840-02 xpdf 2005-12-20
Red Hat RHSA-2005:867-01 gpdf 2005-12-20
Fedora FEDORA-2005-1170 xpdf 2005-12-17
Fedora FEDORA-2005-1169 xpdf 2005-12-17
Gentoo 200512-08 xpdf 2005-12-16
Fedora FEDORA-2005-1146 gpdf 2005-12-14
Fedora FEDORA-2005-1142 cups 2005-12-14
Fedora FEDORA-2005-1141 cups 2005-12-14
Ubuntu USN-227-1 xpdf/cupsys/tetex-bin/kdegraphics/koffice 2005-12-12
Fedora FEDORA-2005-1126 tetex 2005-12-07
Fedora FEDORA-2005-1127 tetex 2005-12-07
Fedora FEDORA-2005-1125 gpdf 2005-12-07
Fedora FEDORA-2005-1122 xpdf 2005-12-06
Fedora FEDORA-2005-1121 xpdf 2005-12-06
Red Hat RHSA-2005:840-01 xpdf 2005-12-06

Comments (none posted)

Page editor: Jonathan Corbet
Next page: Kernel development>>


Copyright © 2005, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds