|
|
Subscribe / Log in / New account

Security

Brief items

Another set of bind vulnerabilities

Here we go again... The Berkeley Internet Domain server (BIND) versions 4 and 8 have a new set of remotely exploitable vulnerabilities. They are well described in this ISS advisory; in short, the problems are:

  • The really nasty one is a buffer overflow in the server's caching code; this one could (and probably will) be used for remote root exploits.

  • The server can be made to terminate (with an assertion failure) when fed a large OPT record with certain kinds of queries.

  • BIND servers can also be made to crash (with a null pointer dereference) when passed information with the right kind of bogus expiration time.

The first vulnerability leaves much of the net open to root exploits, worms, etc. There is no doubt that many servers will not be patched in time, with the result that malware writers will find no shortage of fertile ground for their unpleasant stuff. Business as usual, in other words.

The other result of this set of vulnerabilities is likely to be to force many sites to upgrade, at last, to BIND version 9. That will reduce the diversity of BIND implementations running on the net, thus ensuring that the next vulnerability will affect even more systems. BIND 9 is said to be more secure (having been rewritten with that goal in mind), but there are, beyond doubt, more problems lurking in that body of code. Then we'll get to go through this again.

Comments (8 posted)

Another source distribution trojan

Here we go again... the source distribution of a popular application has been compromised by a trojan horse. This time around, the affected application is tcpdump, which was compromised on November 11 and remained available for download for two days. As with other trojans, this one opens up a connection to a remote host, which can then execute shell commands. The fact that tcpdump was compromised allowed an additional twist, however: tcpdump will not show traffic to and from the hostile remote system.

For more information, see this CERT advisory.

Comments (none posted)

New vulnerabilities

BIND8: Multiple vulnerabilities

Package(s):bind CVE #(s):CAN-2002-1219 CAN-2002-1220 CAN-2002-1221
Created:November 13, 2002 Updated:March 6, 2003
Description: Three new vulnerabilities have been found in version 8 of the Berkeley Internet Domain Server; see this ISS advisory, the CERT Advisory CA-2002-31, or the November 14 LWN Security Page for details.

Red Hat has sent out an alert (not a regular advisory) suggesting that customers apply its previous BIND updates, which upgrade the system to BIND9.

Alerts:
Sorcerer SORCERER2003-03-06 BIND 2003-03-06
SCO Group CSSA-2002-059.0 multiple 2002-12-19
Trustix 2002-0076 bind 2002-11-15
OpenPKG OpenPKG-SA-2002.011 bind, bind8 2002-11-15
Debian DSA-196-1 bind 2002-11-14
Conectiva CLA-2002:546 bind 2002-11-14
Mandrake MDKSA-2002:077 bind 2002-11-14
SuSE SuSE-SA:2002:044 bind8 2002-11-13
EnGarde ESA-20021114-029 bind 2002-11-14

Comments (1 posted)

glibc: DNS stub resolvers contain buffer overflow vulnerability

Package(s):glibc CVE #(s):CAN-2002-1146
Created:November 7, 2002 Updated:February 5, 2004
Description: DNS stub resolvers from multiple vendors contain a buffer overflow vulnerability. The impact of this vulnerability appears to be limited to denial of service. (See CERT Vulnerability Note VU#738331)

The BIND 4 and BIND 8.2.x stub resolver libraries, and other libraries such as glibc 2.2.5 and earlier, libc, and libresolv, uses the maximum buffer size instead of the actual size when processing a DNS response, which causes the stub resolvers to read past the actual boundary ("read buffer overflow"), allowing remote attackers to cause a denial of service (crash).

Alerts:
Mandrake MDKSA-2004:009 glibc 2004-02-04
Red Hat RHSA-2002:197-09 glibc 2002-11-06
Red Hat RHSA-2002:197-06 glibc 2002-10-03

Comments (none posted)

kdenetwork: buffer overflow

Package(s):kdenetwork CVE #(s):CAN-2002-1247
Created:November 11, 2002 Updated:December 20, 2002
Description: iDEFENSE reports a security vulnerability in the klisa package, that provides a LAN information service similar to "Network Neighbourhood", which was discovered by Texonet. It is possible for a local attacker to exploit a buffer overflow condition in resLISa, a restricted version of KLISa. The vulnerability exists in the parsing of the LOGNAME environment variable, an overly long value will overwrite the instruction pointer thereby allowing an attacker to seize control of the executable.
Alerts:
Debian DSA-214-1 kdenetwork 2002-12-20
Mandrake MDKSA-2002:080 kdenetwork 2002-11-21
SuSE SuSE-SA:2002:042 kdenetwork 2002-11-12
Debian DSA-193-1 kdenetwork 2002-11-11

Comments (none posted)

kgpg: keys generated in wizard have an empty passphrase

Package(s):kgpg CVE #(s):
Created:November 11, 2002 Updated:November 13, 2002
Description: A bug in Kgpg's key generation affects all secret keys generated through Kgpg's wizard. (Bug does not affect keys created in console/expert mode). All keys created through the wizard have an empty passphrase, which means that if someone has access to your computer and can read your secret key, he/she can decrypt your files whitout the need of a passphrase. See the full report for details.
Alerts:
Gentoo 200211-002 kgpg 2002-11-10

Comments (none posted)

html2ps: arbitrary code execution

Package(s):html2ps CVE #(s):
Created:November 8, 2002 Updated:December 6, 2002
Description: The SuSE Security Team found a vulnerability in html2ps, a HTML to PostScript converter, that opened files based on unsanitized input insecurely. This problem can be exploited when html2ps is installed as filter within lrpng and the attacker has previously gained access to the lp account.
Alerts:
Debian DSA-192-2 html2ps 2002-12-06
Debian DSA-192-1 html2ps 2002-11-08

Comments (none posted)

masqmail: buffer overflow

Package(s):masqmail CVE #(s):CAN-2002-1279
Created:November 12, 2002 Updated:November 13, 2002
Description: A set of buffer overflows have been discovered in masqmail, a mail transport agent for hosts without a permanent Internet connection. In addition to this privileges were dropped only after reading a user supplied configuration file. Together this could be exploited to gain unauthorized root access to the machine on which masqmail is installed.
Alerts:
Debian DSA-194-1 masqmail 2002-11-12

Comments (none posted)

PHP: vulnerability in mail function

Package(s):php CVE #(s):CAN-2002-0985 CAN-2002-0986
Created:November 13, 2002 Updated:October 1, 2003
Description: Two vulnerabilities exists in the mail() PHP function. The first one allows the execution of any program/script bypassing safe_mode restriction, the second one may give an open-relay script if the mail() function is not carefully used in PHP scripts. See this Bugtraq report for more details. Note that this is a different vulnerability than the previous PHP mail() problem, which affected versions through 4.1.0.

CAN-2002-0985
CAN-2002-0986

Alerts:
SCO Group CSSA-2003-008.0 php 2003-03-04
Gentoo 200211-005 php 2002-11-20
EnGarde ESA-20021122-031 php 2002-11-22
Conectiva CLA-2002:545 php4 2002-11-13
Red Hat RHSA-2002:213-06 php 2002-11-11

Comments (none posted)

traceroute-nanog: buffer overflow and root exploit

Package(s):traceroute-nanog/nkitb CVE #(s):
Created:November 12, 2002 Updated:February 27, 2003
Description: Traceroute is a tool that can be used to track packets in a TCP/IP network to determine it's route or to find out about not working routers. Traceroute-nanog requires root privilege to open a raw socket. It does not relinquish these privileges after doing so. This allows a malicious user to gain root access by exploiting a buffer overflow at a later point.
Alerts:
Debian DSA-254-1 traceroute-nanog 2003-02-27
SuSE SuSE-SA:2002:043 traceroute-nanog/nkitb 2002-11-12

Comments (none posted)

wmaker: buffer overflow in Window Maker image handling code

Package(s):wmaker windowmaker CVE #(s):CAN-2002-1277
Created:November 7, 2002 Updated:February 6, 2003
Description: Al Viro found a problem in the image handling code used in Window Maker, a popular NEXTSTEP like window manager. When creating an image it would allocate a buffer by multiplying the image width and height, but did not check for an overflow. This makes it possible to overflow the buffer. This could be exploited by using specially crafted image files (for example when previewing themes).
Alerts:
Red Hat RHSA-2003:043-12 WindowMaker 2003-02-05
Mandrake MDKSA-2002:085 WindowMaker 2002-12-02
Conectiva CLA-2002:548 windowmaker 2002-11-18
Debian DSA-190-1 wmaker 2002-11-07

Comments (none posted)

Resources

Timing the Application of Security Patches for Optimal Uptime

Steve Beattie, Seth Arnold, Crispin Cowan, Perry Wagle, and Chris Wright published a paper at LISA 2002 entitled "Timing the Application of Security Patches for Optimal Uptime." It is now available for download in PostScript format.

Full Story (comments: none)

Linux Advisory Watch - November 8th 2002

The LinuxSecurity.com Linux Advisory Watch newsletter for November 8 is available.

Full Story (comments: none)

Events

The Conference on Mobile and Wireless Security

MIS Training Institute has announced that the Conference on Mobile and Wireless Security will happen in Scottsdale, Arizona on February 11 to 13, 2003.

Comments (none posted)

Page editor: Jonathan Corbet
Next page: Kernel development>>


Copyright © 2002, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds