|
|
Subscribe / Log in / New account

Security

Brief items

SuSE and IBM get Common Criteria certified

One of the more highly hyped LinuxWorld announcements this week has been this press release from IBM and SuSE. It seems that the two have worked together to achieve Common Criteria "Evaluation Assurance Level 2+" certification for SuSE Linux Enterprise Server 8 running on the IBM eServer xSeries server. This is a significant development - it is the first Common Criteria certified Linux distribution. Obtaining this certification is said to be expensive (several hundred thousand dollars), but it should make it easier to sell Linux solutions to certain kinds of customers.

An EAL2 certification, however, does not actually mean a whole lot. The Common Criteria is an extensive standard; those who are curious can find it documented on commoncriteria.org; bear in mind that it's several hundred pages of grim technical text in PDF format; print it out and take it to bed. Those documents describe seven evaluation assurance levels. EAL1 is the lowest, described by Jonathan Shapiro as "the vendor showed up for the meeting." EAL7 requires formal designs, proofs that the implementation match the design, independent verification of all test results, etc. EAL2, the level achieved by IBM and SuSE, is described as follows:

EAL2 requires the cooperation of the developer in terms of the delivery of design information and test results, but should not demand more effort on the part of the developer than is consistent with good commercial practice. As such it should not require a substantially increased investment of cost or time.

EAL2 is applicable in those circumstances where developers or users require a low to moderate level of independently assured security in the absence of ready availability of the complete development record. Such a situation may arise when securing legacy systems, or where access to the developer may be limited.

In other words, EAL2 requires the developers to have actually thought a little bit about security, but "should not require a substantially increased investment of cost or time." It does require that the system be tested (by the developer) against known vulnerabilities. But, in the end, EAL2 certification says that the developers thought about security, generated a big pile of paper, and spent a chunk of money. Not much more.

IBM and SuSE are aiming for EAL3 certification later this year. The requirement for EAL3 is:

EAL3 permits a conscientious developer to gain maximum assurance from positive security engineering at the design stage without substantial alteration of existing sound development practices... An EAL3 evaluation provides an analysis supported by "grey box" testing, selective confirmation of the developer test results, and evidence of a developer search for obvious vulnerabilities.

For what it's worth, some versions of Windows and most proprietary Unix systems are certified at EAL4. Red Hat (with Oracle's help) submitted Red Hat Enterprise Linux AS 2.1 for EAL2 certification last February. According to the press release, they planned to be the first CC-certified Linux. Looks like SuSE won that race.

Comments (1 posted)

New vulnerabilities

atari800: buffer overflows

Package(s):atari800 CVE #(s):CAN-2003-0630
Created:August 1, 2003 Updated:September 2, 2003
Description: Steve Kemp discovered multiple buffer overflows in atari800, an Atari emulator. In order to directly access graphics hardware, one of the affected programs is setuid root. A local attacker could exploit this vulnerability to gain root privileges.
Alerts:
Gentoo 200309-07 atari800 2003-09-02
Debian DSA-359-1 atari800 2003-07-31

Comments (none posted)

gallery: cross-site scripting

Package(s):gallery CVE #(s):CAN-2003-0614
Created:July 31, 2003 Updated:September 2, 2003
Description: Larry Nguyen discovered a cross site scripting vulnerability in gallery, a web-based photo album written in php. This security flaw can allow a malicious user to craft a URL that executes Javascript code on your website.
Alerts:
Gentoo 200309-06 gallery 2003-09-02
Debian DSA-355-1 gallery 2003-07-30

Comments (none posted)

man-db: buffer overflow, command execution

Package(s):man-db CVE #(s):CAN-2003-0620 CAN-2003-0645
Created:August 5, 2003 Updated:August 18, 2003
Description: man-db 2.4.1 and earlier contains two separate vulnerabilities. There are several buffer overflows which could perhaps be locally exploited, and some directives in ~/.manpath are executed when they should not be. These vulnerabilities only matter if the package has been installed in the setuid mode.
Alerts:
Debian DSA-364-3 man-db 2003-08-18
Debian DSA-364-2 man-db 2003-08-08
Debian DSA-364-1 man-db 2003-08-04

Comments (none posted)

postfix: denial of service vulnerabilities

Package(s):postfix CVE #(s):CAN-2003-0468 CAN-2003-0540
Created:August 5, 2003 Updated:May 27, 2004
Description: The postfix MTA, versions through 1.1.12 (but not 2.0) is subject to two remotely exploitable denial of service vulnerabilities; see this advisory from Michal Zalewski for details.
Alerts:
Mandrake MDKA-2004:028 postfix 2004-05-26
Trustix 2003-0029 postfix 2003-08-04
Mandrake MDKSA-2003:081 postfix 2003-08-04
EnGarde ESA-20030804-019 postfix 2003-08-04
Conectiva CLA-2003:717 postfix 2003-08-04
SuSE SuSE-SA:2003:033 postfix 2003-08-04
Red Hat RHSA-2003:251-01 postfix 2003-08-04
Debian DSA-363-1 postfix 2003-08-03

Comments (none posted)

wget: buffer overflow

Package(s):wget CVE #(s):CAN-2003-1565
Created:August 5, 2003 Updated:December 10, 2003
Description: The wget utility contains a buffer overflow which, when exploited with an over-long URL, can enable arbitrary code execution.
Alerts:
Red Hat RHSA-2003:372-01 wget 2003-12-10
SCO Group CSSA-2003-025.0 wget 2003-10-03
Conectiva CLA-2003:716 wget 2003-08-04

Comments (1 posted)

wu-ftpd: off-by-one bug

Package(s):wu-ftpd CVE #(s):CAN-2003-0466
Created:July 31, 2003 Updated:October 5, 2003
Description: An off-by-one bug has been discovered in versions of wu-ftpd up to and including 2.6.2. On a vulnerable system, a remote attacker would be able to exploit this bug to gain root privileges. See this advisory for more details.
Alerts:
SCO Group CSSA-2003-024.0 wu-ftpd 2003-09-26
Immunix IMNX-2003-7+-019-01 wu-ftpd 2003-08-06
Conectiva CLA-2003:715 wu-ftpd 2003-08-01
Debian DSA-357-1 wu-ftpd 2003-07-31
SuSE SuSE-SA:2003:032 wuftpd 2003-07-31
Mandrake MDKSA-2003:080 wu-ftpd 2003-07-31
Red Hat RHSA-2003:245-01 wu-ftpd 2003-07-31

Comments (none posted)

xconq: buffer overflows

Package(s):xconq CVE #(s):CAN-2003-0607
Created:July 31, 2003 Updated:August 5, 2003
Description: Steve Kemp discovered a buffer overflow in xconq, in processing the USER environment variable. In the process of fixing this bug, a similar problem was discovered with the DISPLAY environment variable. This vulnerability could be exploited by a local attacker to gain gid 'games'.
Alerts:
Debian DSA-354-1 xconq 2003-07-29

Comments (none posted)

xfstt: remote exploits

Package(s):xfstt CVE #(s):CAN-2003-0581 CAN-2003-0625
Created:August 1, 2003 Updated:August 5, 2003
Description: xfstt, a TrueType font server for the X window system was found to contain two classes of vulnerabilities:
  • CAN-2003-0581: a remote attacker could send requests crafted to trigger any of several buffer overruns, causing a denial of service or possibly executing arbitrary code on the server with the privileges of the "nobody" user.

  • CAN-2003-0625: certain invalid data sent during the connection handshake could allow a remote attacker to read certain regions of memory belonging to the xfstt process. This information could be used for fingerprinting, or to aid in exploitation of a different vulnerability.
Alerts:
Debian DSA-360-1 xfstt 2003-08-01

Comments (none posted)

xtokkaetama: buffer overflows

Package(s):xtokkaetama CVE #(s):CAN-2003-0611
Created:July 31, 2003 Updated:August 8, 2003
Description: Steve Kemp discovered two buffer overflows in xtokkaetama, a puzzle game, when processing the -display command line option and the XTOKKAETAMADIR environment variable. These vulnerabilities could be exploited by a local attacker to gain gid 'games'.
Alerts:
Debian DSA-367-1 xtokkaetama 2003-08-08
Debian DSA-356-1 xtokkaetama 2003-07-30

Comments (none posted)

Events

RAID 2003

The Sixth International Symposium on Recent Advances in Intrusion Detection will be held in Pittsburgh, PA on September 8 to 10.

Full Story (comments: none)

Page editor: Jonathan Corbet
Next page: Kernel development>>


Copyright © 2003, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds