AOH :: ISNQ3785.HTM

Linux Advisory Watch - March 16th 2007




Linux Advisory Watch - March 16th 2007
Linux Advisory Watch - March 16th 2007



+---------------------------------------------------------------------+
| LinuxSecurity.com                               Weekly Newsletter  |
| March 16th 2007                               Volume 8, Number 11a |
+---------------------------------------------------------------------+

Editors:      Dave Wreski                     Benjamin D. Thomas
dave@linuxsecurity.com ben@linuxsecurity.com 

Linux Advisory Watch is a comprehensive newsletter that outlines the
security vulnerabilities that have been announced throughout the
week. It includes pointers to updated packages and descriptions of
each vulnerability.

This week, advisories were released for Mozilla, gnupg, SeaMonkey,
Smb4K, Amarok, xine-lib, tcpdump, mplayer, kdelibs, ekiga, gnupg,
timezone, kernel, php, and ktorrent.  The distributors include
Debian, Gentoo, Mandriva, Ubuntu.

---

Earn an NSA recognized IA Masters Online

The NSA has designated Norwich University a center of Academic
Excellence in Information Security. Our program offers unparalleled
Infosec management education and the case study affords you unmatched
consulting experience. Using interactive e-Learning technology, you
can earn this esteemed degree, without disrupting your career or home
life.

http://www.msia.norwich.edu/linsec/ 

---

* EnGarde Secure Linux v3.0.13 Now Available

Guardian Digital is happy to announce the release of EnGarde Secure
Community 3.0.13 (Version 3.0, Release 13). This release includes
several bug fixes and feature enhancements to the SELinux policy
and several updated packages.

http://wiki.engardelinux.org/index.php/ReleaseNotes3.0.13 

---

RFID with Bio-Smart Card in Linux

In this paper, we describe the integration of fingerprint template
and RF smart card for clustered network, which is designed on Linux
platform and Open source technology to obtain biometrics security.
Combination of smart card and biometrics has achieved in two step
authentication where smart card authentication is based on a
Personal Identification Number (PIN) and the card holder is
authenticated using the biometrics template stored in the smart
card that is based on the fingerprint verification. The fingerprint
verification has to be executed on central host server for
security purposes. Protocol designed allows controlling entire
parameters of smart security controller like PIN options, Reader
delay, real-time clock, alarm option and cardholder access
conditions.

http://www.linuxsecurity.com/content/view/125052/171/ 

---

Packet Sniffing Overview

The best way to secure you against sniffing is to use encryption.
While this won't prevent a sniffer from functioning, it will ensure
that what a sniffer reads is pure junk.

http://www.linuxsecurity.com/content/view/123570/49/ 

--------

--> Take advantage of the LinuxSecurity.com Quick Reference Card!
--> http://www.linuxsecurity.com/docs/QuickRefCard.pdf 


+---------------------------------+
| Distribution: Debian           | ----------------------------//
+---------------------------------+

* Debian: New Mozilla packages fix several vulnerabilities
  10th, March, 2007

Updated package.

http://www.linuxsecurity.com/content/view/127389 


* Debian: New gnupg packages fix signature forgery
  13th, March, 2007

Updated package.

http://www.linuxsecurity.com/content/view/127426 


+---------------------------------+
| Distribution: Gentoo           | ----------------------------//
+---------------------------------+

* Gentoo: SeaMonkey Multiple vulnerabilities
  9th, March, 2007

Multiple vulnerabilities have been reported in SeaMonkey, some of
which may allow user-assisted arbitrary remote code execution.

http://www.linuxsecurity.com/content/view/127384 


* Gentoo: Smb4K Multiple vulnerabilities
  9th, March, 2007

Multiple vulnerabilities have been identified in Smb4K.

http://www.linuxsecurity.com/content/view/127385 


* Gentoo: KHTML Cross-site scripting (XSS) vulnerability
  10th, March, 2007

The KHTML component shipped with the KDE libraries is prone to a
cross-site scripting (XSS) vulnerability.

http://www.linuxsecurity.com/content/view/127388 


* Gentoo: Amarok User-assisted remote execution of arbitrary code
  13th, March, 2007

The Magnatune component shipped with Amarok is vulnerable to the
injection of arbitrary shell code from a malicious Magnatune server.

http://www.linuxsecurity.com/content/view/127427 


+---------------------------------+
| Distribution: Mandriva         | ----------------------------//
+---------------------------------+

* Mandriva: Updated xine-lib packages to address buffer overflow
  vulnerability
  8th, March, 2007

The DMO_VideoDecoder_Open function in dmo/DMO_VideoDecoder.c in
xine-lib does not set the biSize before use in a memcpy, which allows
user-assisted remote attackers to cause a buffer overflow and
possibly execute arbitrary code. Updated packages have been patched
to address this issue.

http://www.linuxsecurity.com/content/view/127374 


* Mandriva: Updated tcpdump packages address off-by-one overflow
  8th, March, 2007

Off-by-one buffer overflow in the parse_elements function in the
802.11 printer code (print-802_11.c) for tcpdump 3.9.5 and earlier
allows remote attackers to cause a denial of service (crash) via a
crafted 802.11 frame. NOTE: this was originally referred to as
heap-based, but it might be stack-based. Updated packages have been
patched to address this issue.

http://www.linuxsecurity.com/content/view/127375 


* Mandriva: Updated mplayer packages to address buffer overflow
  vulnerability
  8th, March, 2007

The DMO_VideoDecoder_Open function in loader/dmo/DMO_VideoDecoder.c
in MPlayer 1.0rc1 and earlier does not set the biSize before use in a
memcpy, which allows user-assisted remote attackers to cause a buffer
overflow and possibly execute arbitrary code. Updated packages have
been patched to address this issue.

http://www.linuxsecurity.com/content/view/127376 


* Mandriva: Updated kdelibs packages to address DoS issue in KDE
  Javascript
  8th, March, 2007

ecma/kjs_html.cpp in KDE JavaScript (KJS), as used in Konqueror,
allows remote attackers to cause a denial of service (crash) by
accessing the content of an iframe with an ftp:// URI in the src
attribute, probably due to a NULL pointer dereference. Updated
packages have been patched to address this issue.

http://www.linuxsecurity.com/content/view/127377 


* Mandriva: Updated ekiga packages fix string vulnerabilities.
  9th, March, 2007

A format string flaw was discovered in how ekiga processes certain
messages, which could permit a remote attacker that can connect to
ekiga to potentially execute arbitrary code with the privileges of
the user running ekiga. This is similar to the previous
CVE-2007-1006, but the original evaluation/patches were incomplete.
Updated package have been patched to correct this issue.

http://www.linuxsecurity.com/content/view/127381 


* Mandriva: Updated gnupg packages provide enhanced forgery detection
  9th, March, 2007

GnuPG prior to 1.4.7 and GPGME prior to 1.1.4, when run from the
command
line, did not visually distinguish signed and unsigned portions of
OpenPGP messages with multiple components.  This could allow a remote
attacker to forge the contents of an email message without detection.
GnuPG 1.4.7 is being provided with this update and GPGME has been
patched on Mandriva 2007.0 to provide better visual notification on
these types of forgeries.

http://www.linuxsecurity.com/content/view/127382 


* Mandriva: Updated timezone packages provide updated DST information
  10th, March, 2007

Updated timezone packages are being provided for older Mandriva Linux
systems that do not contain the new Daylight Savings Time information
for 2007 for certain time zones.  These updated packages contain the
new information.

http://www.linuxsecurity.com/content/view/127390 


* Mandriva: Updated kernel packages fix multiple vulnerabilities and
  bugs
  10th, March, 2007

The 2.6.17 kernel and earlier, when running on IA64 and SPARC
platforms would allow a local user to cause a DoS (crash) via a
malformed ELF file (CVE-2006-4538).

http://www.linuxsecurity.com/content/view/127391 


* Mandriva: Updated mplayer packages to address buffer overflow
  vulnerability
  13th, March, 2007

The DS_VideoDecoder_Open function in loader/dshow/DS_VideoDecoder.c
in MPlayer 1.0rc1 and earlier does not set the biSize before use in a
memcpy, which allows user-assisted remote attackers to cause a buffer
overflow and possibly execute arbitrary code. Updated packages have
been patched to address this issue.

http://www.linuxsecurity.com/content/view/127424 


* Mandriva: Updated xine-lib packages to address buffer overflow
  vulnerability
  13th, March, 2007

The DS_VideoDecoder_Open function in DirectShow/DS_VideoDecoder.c in
xine-lib does not set the biSize before use in a memcpy, which allows
user-assisted remote attackers to cause a buffer overflow and
possibly execute arbitrary code. packages have been patched to
address this issue.

http://www.linuxsecurity.com/content/view/127425 


+---------------------------------+
| Distribution: Ubuntu           | ----------------------------//
+---------------------------------+

* Ubuntu:  GnuPG vulnerability
  8th, March, 2007

Gerardo Richarte from Core Security Technologies discovered that when
gnupg is used without --status-fd, there is no way to distinguish
initial unsigned messages from a following signed message.

http://www.linuxsecurity.com/content/view/127368 


* Ubuntu:  PHP regression
  8th, March, 2007

USN-424-1 fixed vulnerabilities in PHP.  However, some upstream
changes  were not included, which caused errors in the stream
filters.  This update fixes the problem.

http://www.linuxsecurity.com/content/view/127369 


* Ubuntu:  Xine vulnerability
  8th, March, 2007

Moritz Jodeit discovered that the DMO loader of Xine did not
correctly  validate the size of an allocated buffer.  By tricking a
user into opening a specially crafted media file, an attacker could
execute arbitrary code with the user's privileges.

http://www.linuxsecurity.com/content/view/127378 


* Ubuntu:  Ekiga vulnerability
  8th, March, 2007

It was discovered that Ekiga had format string vulnerabilities beyond 
those fixed in USN-426-1.  If a user was running Ekiga and listening for 
incoming calls, a remote attacker could send a crafted call request, and 
execute arbitrary code with the user's privileges.


http://www.linuxsecurity.com/content/view/127380 


* Ubuntu:  Xine vulnerability
  12th, March, 2007

Moritz Jodeit discovered that the DirectShow loader of Xine did not
correctly validate the size of an allocated buffer.  By tricking a
user into opening a specially crafted media file, an attacker could
execute arbitrary code with the user's privileges.

http://www.linuxsecurity.com/content/view/127411 


* Ubuntu:  KTorrent vulnerabilities
  12th, March, 2007

Bryan Burns of Juniper Networks discovered that KTorrent did not
correctly validate the destination file paths nor the HAVE statements
sent by torrent peers.	A malicious remote peer could send specially
crafted messages to overwrite files or execute arbitrary code with
user privileges.

http://www.linuxsecurity.com/content/view/127413 


* Ubuntu:  GnuPG2, GPGME vulnerability
  13th, March, 2007

USN-432-1 fixed a vulnerability in GnuPG.  This update provides the
corresponding updates for GnuPG2 and the GPGME library. Original
advisory details:  Gerardo Richarte from Core Security Technologies
discovered that when  gnupg is used without --status-fd, there is no
way to distinguish  initial unsigned messages from a following signed
message.  An attacker  could inject an unsigned message, which could
fool the user into thinking the message was entirely signed by the
original sender.

http://www.linuxsecurity.com/content/view/127422 
------------------------------------------------------------------------
Distributed by: Guardian Digital, Inc.                LinuxSecurity.com

To unsubscribe email vuln-newsletter-request@linuxsecurity.com 
         with "unsubscribe" in the subject of the message.
------------------------------------------------------------------------


_________________________________________
Visit the InfoSec News Security Bookstore
http://www.shopinfosecnews.org 

Site design & layout copyright © 1986-2014 CodeGods