-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1


Attached are security advisories for the packages analog, cvsweb,
dialog, ed, glibc, ncurses, netscape-communicator, squid, vixie-cron, and
xntp3.  Also included are advisories regarding the Adore worm and Ramen
worm.

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.4 (GNU/Linux)
Comment: pgpenvelope 2.10.0 - http://pgpenvelope.sourceforge.net/

iD8DBQE7BDGNcpw52/ZatwoRAlG/AJ4qQ2uh5suoUsur8oPVLxM4elshOQCfUaB5
io5wt/ZAECv5KZ5QQIzwOOo=
=dDi2
-----END PGP SIGNATURE-----


_____________________________________________________________________________________________


                     TurboLinux Security Announcement

        Package: analog
        Vulnerable Packages: All Turbolinux versions previous to 4.16-2
        Date: 05/03/2001 5:00 PDT


        Affected TurboLinux platforms:  Turbolinux versions 6.0.5 and earlier
                                      
        TurboLinux Advisory ID#:  TLSA2001007
        Credits:  Vulnerability discovered by Stephen Turner
                  <[EMAIL PROTECTED]> 
    
        References:  
http://www.securityfocus.com/vdb/bottom.html?section=discussion&vid=2377


_____________________________________________________________________________________________


A security hole was discovered in the package mentioned above. Please
update the package in your installation as soon as possible.
_____________________________________________________________________________________________


1. Problem Summary(From the BugTraq database of securityfocus.com, id#2377)

   As designed, the software makes it possible for a user to remotely
   access network statistics using cgi scripts and HTTP FORM
   methods. When queried, the cgi accesses analog, and outputs
   statistics to a web page. Due to a buffer overflow in analog, and
   improper checking of input by the cgi program, it is possible for a
   user to supply a long ALIAS field to the analog program, which will
   result in a buffer overflow.

2. Impact(Also from the BugTraq database, id#2377)

   A user can remotely execute code and execute commands with privileges equal
   to the httpd process.

3. Solution

   First, uninstall the package analog-form using the command:

   rpm -e analog-form-3.0-1.i386.rpm, or whatever version of analog-form
   you are currently running
     
   Then, update the analog package from our ftp server by running the following 
command:

   rpm -Uvh ftp_path_to_filename

   Where ftp_path_to_filename is the following:

   ftp://ftp.turbolinux.com/pub/updates/6.0/security/analog-4.16-2.i386.rpm

   The source RPM can be downloaded here:

   ftp://ftp.turbolinux.com/pub/updates/6.0/SRPMS/analog-4.16-2.src.rpm

  **Note: You must rebuild and install the RPM if you choose to download
  and install the SRPM.  Simply installing the SRPM alone WILL NOT CLOSE
  THE SECURITY HOLE.

 Please verify the MD5 checksums of the updates before you install:

  MD5 sum                               Package Name
---------------------------------------------------------------------------------------------


  717b0f32867e30c4423b077faf93bc96      analog-4.16-2.i386.rpm
  5900b3a42477b5a8da1ac6275eb2360b      analog-4.16-2.src.rpm
  
_____________________________________________________________________________________________


These packages are GPG signed by TurboLinux for security. Our key
is available here:

 http://www.turbolinux.com/security/tlgpgkey.asc

To verify a package, use the following command:

 rpm --checksig name_of_rpm

To examine only the md5sum, use the following command:

 rpm --checksig --nogpg name_of_rpm

**Note: Checking GPG keys requires RPM 3.0 or higher.

________________________________________________________________________________________________

You can find more updates on our ftp server:

   ftp://ftp.turbolinux.com/pub/updates/6.0/security/ 

for TL6.0 Workstation and Server security updates

Our webpage for security announcements:

   http://www.turbolinux.com/security

If you want to report vulnerabilities, please contact:

   [EMAIL PROTECTED]
________________________________________________________________________________________________


Subscribe to the TurboLinux Security Mailing lists:

  TL-security - A moderated list for discussing security issues
                TurboLinux products.
  Subscribe at http://www.turbolinux.com/mailman/listinfo/tl-security

  TL-security-announce - An announce-only mailing list for security updates
  and alerts.

  Subscribe at:

      http://www.turbolinux.com/mailman/listinfo/tl-security-announce


_____________________________________________________________________________________________


                     TurboLinux Security Announcement

        Package: cvsweb
        Vulnerable Packages: All Turbolinux versions previous to 1.91-3
        Date: 05/03/2001 5:00 PDT


        Affected TurboLinux versions: TL Server 6.5, TL Workstation 6.1,
                                      Turbolinux versions 6.0.5 and earlier
                                      
        TurboLinux Advisory ID#:  TLSA2001010
        Credits:  Vulnerability discovered by Joey Hess

_____________________________________________________________________________________________


A security hole was discovered in the package mentioned above. Please
update the package in your installation as soon as possible or disable the
service.
_____________________________________________________________________________________________


1. Problem Summary

Current and previous version of cvsweb allow remote users to access/write
files as the default web user via the cvsweb.cgi script.

2. Impact

Remote read/write access to arbitrary files owned by the default web user
is possible via this exploit.


3. Solution
     
   Update the packages from our ftp server by running the following command:

   rpm -Uvh ftp_path_to_filename

   Where ftp_path_to_filename is the following:

   ftp://ftp.turbolinux.com/pub/updates/6.0/security/cvsweb-1.93-1.noarch.rpm


   The source RPM can be downloaded here:

   ftp://ftp.turbolinux.com/pub/updates/6.0/SRPMS/cvsweb-1.93-1.src.rpm

  **Note: You must rebuild and install the RPM if you choose to download
  and install the SRPM.  Simply installing the SRPM alone WILL NOT CLOSE
  THE SECURITY HOLE.

 Please verify the MD5 checksums of the updates before you install:

  MD5 sum                               Package Name
---------------------------------------------------------------------------------------------


701bc3687dd2259fa6090e845d37fe4a        cvsweb-1.93-1.noarch.rpm
210077135b6aa6df2d693c5be9771910        cvsweb-1.93-1.src.rpm
  
_____________________________________________________________________________________________


These packages are GPG signed by TurboLinux for security. Our key
is available here:

 http://www.turbolinux.com/security/tlgpgkey.asc

To verify a package, use the following command:

 rpm --checksig name_of_rpm

To examine only the md5sum, use the following command:

 rpm --checksig --nogpg name_of_rpm

**Note: Checking GPG keys requires RPM 3.0 or higher.

________________________________________________________________________________________________

You can find more updates on our ftp server:

   ftp://ftp.turbolinux.com/pub/updates/6.0/security/ 

for TL6.0 Workstation and Server security updates

Our webpage for security announcements:

   http://www.turbolinux.com/security

If you want to report vulnerabilities, please contact:

   [EMAIL PROTECTED]
________________________________________________________________________________________________


Subscribe to the TurboLinux Security Mailing lists:

  TL-security - A moderated list for discussing security issues
                TurboLinux products.
  Subscribe at http://www.turbolinux.com/mailman/listinfo/tl-security

  TL-security-announce - An announce-only mailing list for security updates
  and alerts.

  Subscribe at:

      http://www.turbolinux.com/mailman/listinfo/tl-security-announce


_____________________________________________________________________________________________


                     TurboLinux Security Announcement

        Package: dialog
        Vulnerable Packages: All Turbolinux versions previous to 0.9a-2
        Date: 05/03/2001 5:00 PDT


        Affected TurboLinux platforms:  TL Server 6.5, TL Workstation 6.1
                                        Turbolinux versions 6.0.5 and earlier
                                      
        TurboLinux Advisory ID#:  TLSA2001006
        Credits:  Reported by Matt Kraai
                  
    
        References:  
http://linuxtoday.com/news_story.php3?ltsn=2000-12-25-020-04-SC-DB


_____________________________________________________________________________________________


A security hole was discovered in the package mentioned above. Please
update the package in your installation as soon as possible.
_____________________________________________________________________________________________


1. Problem Summary

   Dialog creates lock-files insecurely, which makes it vulnerable
   to a symlink attack.


2. Solution

   Update the package from our ftp server by running the following command:

   rpm -Uvh ftp_path_to_filename

   Where ftp_path_to_filename is the following:

   ftp://ftp.turbolinux.com/pub/updates/6.0/security/dialog-0.9a-2.i386.rpm

   The source RPM can be downloaded here:

   ftp://ftp.turbolinux.com/pub/updates/6.0/SRPMS/dialog-0.9a-2.src.rpm

  **Note: You must rebuild and install the RPM if you choose to download
  and install the SRPM.  Simply installing the SRPM alone WILL NOT CLOSE
  THE SECURITY HOLE.

 Please verify the MD5 checksums of the updates before you install:

  MD5 sum                               Package Name
---------------------------------------------------------------------------------------------


  660babb1fbef04abbfb9dc326a8f4f16      dialog-0.9a-2.i386.rpm
  5e858ac44ac97f32c7ba3935da2efa44      dialog-0.9a-2.src.rpm
  
_____________________________________________________________________________________________


These packages are GPG signed by TurboLinux for security. Our key
is available here:

 http://www.turbolinux.com/security/tlgpgkey.asc

To verify a package, use the following command:

 rpm --checksig name_of_rpm

To examine only the md5sum, use the following command:

 rpm --checksig --nogpg name_of_rpm

**Note: Checking GPG keys requires RPM 3.0 or higher.

________________________________________________________________________________________________

You can find more updates on our ftp server:

   ftp://ftp.turbolinux.com/pub/updates/6.0/security/ 

for TL6.0 Workstation and Server security updates

Our webpage for security announcements:

   http://www.turbolinux.com/security

If you want to report vulnerabilities, please contact:

   [EMAIL PROTECTED]
________________________________________________________________________________________________


Subscribe to the TurboLinux Security Mailing lists:

  TL-security - A moderated list for discussing security issues
                TurboLinux products.
  Subscribe at http://www.turbolinux.com/mailman/listinfo/tl-security

  TL-security-announce - An announce-only mailing list for security updates
  and alerts.

  Subscribe at:

      http://www.turbolinux.com/mailman/listinfo/tl-security-announce


___________________________________________________________________________

                     TurboLinux Security Announcement

        Package:  ed
        Vulnerable Packages: All versions previous to 0.2-16
        Date: 05/04/2001 5:00 PDT

        Affected TurboLinux versions: TL 6.1 WorkStation,
                                      All TurboLinux versions
                                      6.0.5 and earlier

        TurboLinux Advisory ID#:  TLSA2001006

        Credits: Vulnerability first discovered by Alan Cox
___________________________________________________________________________

A security hole has been discovered in this package.  Please update
the package in your installation as soon as possible.
___________________________________________________________________________

1. Problem Summary

    Ed creates temp files insecurely.


2. Impact

   It is possible for a local user with malicious intent to carry out a
   symbolic link attack, overwriting or corrupting files created by the
   user running ed.

3. Solution

  Update each package from our ftp server by running the following command:

  rpm -Uvh ftp_path_to_filename

  Where ftp_path_to_filename is the following:

  ftp://ftp.turbolinux.com/pub/updates/6.0/security/ed-0.2-16.i386.rpm

  The source RPM can be downloaded here:

  ftp://ftp.turbolinux.com/pub/updates/6.0/SRPMS/ed-0.2-16.src.rpm

  **Note: You must rebuild and install the RPM if you choose to download
  and install the SRPM.  Simply installing the SRPM alone WILL NOT CLOSE
  THE SECURITY HOLE.

 Please verify the MD5 checksums of the updates before you install:

  MD5 sum                               Package Name
---------------------------------------------------------------------------
cb081d1dd7ae26f70dec3d8d96fdc8bd       ed-0.2-16.i386.rpm
292af57ec7d30da281df7a7169ac1a0d       ed-0.2-16.src.rpm
___________________________________________________________________________

These packages are GPG signed by TurboLinux for security. Our key
is available here:

 http://www.turbolinux.com/security/tlgpgkey.asc

To verify a package, use the following command:

 rpm --checksig name_of_rpm

To examine only the md5sum, use the following command:

 md5sum name_of_rpm

**Note: Checking GPG keys requires RPM 3.0 or higher.

___________________________________________________________________________
You can find more updates on our ftp server:

   ftp://ftp.turbolinux.com/pub/updates/6.0/security/ for TL6.0 Workstation
   and Server security updates

Our webpage for security announcements:

   http://www.turbolinux.com/security

If you want to report vulnerabilities, please contact:

   [EMAIL PROTECTED]
___________________________________________________________________________

Subscribe to the TurboLinux Security Mailing lists:

  TL-security - A moderated list for discussing security issues
                TurboLinux products.
  Subscribe at http://www.turbolinux.com/mailman/listinfo/tl-security

  TL-security-announce - An announce-only mailing list for security updates
  and alerts.

  Subscribe at:

      http://www.turbolinux.com/mailman/listinfo/tl-security-announce


___________________________________________________________________________

                        TurboLinux Security Announcement


        Vulnerable Packages: All versions prior to glibc-2.1.3-33
        Date: 05/01/2001 5:00 PDT

        Affected TurboLinux versions:TL WorkStation Server 6.5,
                                     TL 6.1 WorkStation,
                                     All TurboLinux versions
                                     6.0.5 and earlier

        TurboLinux Advisory ID#:  TLSA2001009

   Credits: Fixes made by Ulrich Drepper of Red Hat

___________________________________________________________________________

A security hole was discovered in the package mentioned above.
Please update the packages in your installation as soon as possible.
___________________________________________________________________________

1. Problem Summary(From the BugTraq advisory at securityfocus.com, id#1634)

   A format string vulnerability exists in the locale subsystem.  The locale
   subsystem consists of databases that contain language and country spe-
   cific information. Whenever a program needs to display a message to a 
   user, it accesses a database within the subsystem and retrieves the proper
   language-specific string using the original message as the search key.
   The string(s) retrieved by the program are displayed using printf().
   It is possible for an attacker to control the output by building and 
   installing a custom database.


2. Impact(Also from the BugTraq advisory on securityfocus.com)

   An attacker can execute arbitrary code as a user with elevated
   privileges(root) using almost any setuid program on the 
   vulnerable system.

   In some operating systems, it is also possible to exploit the problem 
   remotely using the environment variable passing off options to telnetd,
   but the attacker must first install his customized database onto
   the target host.


3. Solution

**************   If you are using TurboLinux Server 6.5:   *********************
             
   Update the packages from our ftp server by running the following command
   for each package:

   rpm -Uvh ftp_path_to_filename

   Where ftp_path_to_filename is the following:

  ftp://ftp.turbolinux.com/pub/updates/6.0/security/glibc-2.1.3-33.i386.rpm
  ftp://ftp.turbolinux.com/pub/updates/6.0/security/glibc-devel-2.1.3-33.i386.rpm
  ftp://ftp.turbolinux.com/pub/updates/6.0/security/glibc-profile-2.1.3-33.i386.rpm


**************   If you are using TurboLinux Workstation 6.1:    ***************

   First, uninstall the package glibc-2.1.3-2jaJP using the command:

   rpm -e glibc-2.1.3-2jaJP

   Next, install the following packages by running the following command:

   rpm -Uvh ftp_path_to_filename

   Where ftp_path_to_filename is the following: 

   ftp://ftp.turbolinux.com/pub/updates/6.0/security/glibc-2.1.3-33.i386.rpm
   ftp://ftp.turbolinux.com/pub/updates/6.0/security/glibc-locale-2.1.3-10.i386.rpm
   ftp://ftp.turbolinux.com/pub/updates/6.0/security/glibc-profile-2.1.3-33.i386.rpm

   Finally, upgrade the package glibc-devel with the following command:

   rpm -Uvh --force ftp_path_to_filename

   Where ftp_path_to_filename is the following:

   ftp://ftp.turbolinux.com/pub/updates/6.0/security/glibc-devel-2.1.3-33.i386.rpm 

**************   If you are using TurboLinux Server 6.0.5:    *****************


 Update the package glibc from our ftp server by running the following command:

   rpm -Uvh --force ftp_path_to_filename

   Where ftp_path_to_filename is the following:

   ftp://ftp.turbolinux.com/pub/updates/6.0/security/glibc-2.1.3-33.i386.rpm

   Next, update the packages glibc-devel and glibc-profile from our ftp server 
   by running the following command:

   rpm -Uvh ftp_path_to_filename

   Where ftp_path_to_filename is the following:

   ftp://ftp.turbolinux.com/pub/updates/6.0/security/glibc-devel-2.1.3-33.i386.rpm
   ftp://ftp.turbolinux.com/pub/updates/6.0/security/glibc-profile-2.1.3-33.i386.rpm

******************************************************************************* 

The source RPM can be downloaded here:

  ftp://ftp.turbolinux.com/pub/updates/6.0/SRPMS/glibc-2.1.3-33.src.rpm

  **Note: You must rebuild and install the RPM if you choose to download
  and install the SRPM.  Simply installing the SRPM alone WILL NOT CLOSE
  THE SECURITY HOLE.

 Please verify the MD5 checksums of the updates before you install:

  MD5 sum                               Package Name
---------------------------------------------------------------------------
985c3946d8b659ddc36c15428056be51       glibc-2.1.3-33.i386.rpm
115c757d2fd29d8ad6281e5bb96a08df       glibc-locale-2.1.3-10.noarch.rpm
955fc79bddbf80918fe51810b2fd2045       glibc-devel-2.1.3-33.i386.rpm
61c21f8ce865de4ff319e162474bd4d5       glibc-profile-2.1.3-33.i386.rpm
ada28c27fca1f259e1a4fee6686a5862       glibc-2.1.3-33.src.rpm
___________________________________________________________________________

These packages are GPG signed by Turbolinux for security. Our key
is available here:

 http://www.turbolinux.com/security/tlgpgkey.asc

To verify a package, use the following command:

 rpm --checksig name_of_rpm

To examine only the md5sum, use the following command:

 rpm --checksig --nogpg name_of_rpm

**Note: Checking GPG keys requires RPM 3.0 or higher.

___________________________________________________________________________

You can find more updates on our ftp server:

   ftp://ftp.turbolinux.com/pub/updates/6.0/security/ 

for TL6.0 Workstation and Server security updates
   
Our webpage for security announcements:

   http://www.turbolinux.com/security

If you want to report vulnerabilities, please contact:

   [EMAIL PROTECTED]
___________________________________________________________________________

Subscribe to the TurboLinux Security Mailing lists:

  TL-security - A moderated list for discussing security issues
                TurboLinux products.
  Subscribe at http://www.turbolinux.com/mailman/listinfo/tl-security

  TL-security-announce - An announce-only mailing list for security updates
  and alerts.  Subscribe at:

      http://www.turbolinux.com/mailman/listinfo/tl-security-announce


___________________________________________________________________________

                     TurboLinux Security Announcement

        Package:  ncurses
        Vulnerable Packages: All versions previous to 5.2
        Date: 05/04/2001 5:00 PDT


        Affected TurboLinux versions: TL 6.1 WorkStation,
                                      All TurboLinux versions
                                      6.0.5 and earlier

        TurboLinux Advisory ID#:  TLSA2001007

        Credits: Vulnerability discovered by Jouko Pynnonen
                 < [EMAIL PROTECTED] >
___________________________________________________________________________

A security hole has been discovered in this package.  Please update
the packages in your installation as soon as possible.
___________________________________________________________________________

1. Problem Summary

   Ncurses contains buffer overflow vulnerabilities.  It searches for term-
   cap entries in a file called .terminfo in the home directory.  If it
   exists, it makes string copies of data in the file to local buffers in
   the process' stack.  The copy process is insecure because it does not
   check to ensure that the amount of bytes copied does not exceed the pre-
   determined buffer size.  Therefore, an attacker can easily create a
   .terminfo file with excessive data.  The excess data would overwrite
   bytes on the stack beyond the defined boundary of the buffer when copied.

2. Impact

   Attackers may be able to exploit setuid or setgid programs linked to
   ncurses and elevate their privileges.

   A program linked to ncurses isn't immediately vulnerable.  It must use
   certain functions within ncurses in some way in order for the vulnera-
   bility to be exploitable.

3. Solution

  Update each package from our ftp server by running the following command:

  rpm -Uvh ftp_path_to_filename

  Where ftp_path_to_filename is the following:

  ftp://ftp.turbolinux.com/pub/updates/6.0/security/ncurses-5.2-2.i386.rpm
  ftp://ftp.turbolinux.com/pub/updates/6.0/security/ncurses-devel-5.2-2.i386.rpm

  The source RPM can be downloaded here:

  ftp://ftp.turbolinux.com/pub/updates/6.0/SRPMS/ncurses-5.2-2.src.rpm

  **Note: You must rebuild and install the RPM if you choose to download
  and install the SRPM.  Simply installing the SRPM alone WILL NOT CLOSE
  THE SECURITY HOLE.

 Please verify the MD5 checksums of the updates before you install:

  MD5 sum                               Package Name
---------------------------------------------------------------------------
 3249e53e7dd90f9e632db0455b160671      ncurses-5.2-2.i386.rpm
 945afabba59f62903cb676a5a52dec87      ncurses-devel-5.2-2.i386.rpm
 f8464c82ab7300551b0aca27060e8302      ncurses-5.2-2.src.rpm
___________________________________________________________________________

These packages are GPG signed by TurboLinux for security. Our key
is available here:

 http://www.turbolinux.com/security/tlgpgkey.asc

To verify a package, use the following command:

 rpm --checksig name_of_rpm

To examine only the md5sum, use the following command:

 md5sum name_of_rpm

**Note: Checking GPG keys requires RPM 3.0 or higher.

___________________________________________________________________________

You can find more updates on our ftp server:

   ftp://ftp.turbolinux.com/pub/updates/6.0/security/ for TL6.0 Workstation
   and Server security updates

Our webpage for security announcements:

   http://www.turbolinux.com/security

If you want to report vulnerabilities, please contact:

   [EMAIL PROTECTED]
___________________________________________________________________________

Subscribe to the TurboLinux Security Mailing lists:

  TL-security - A moderated list for discussing security issues
                TurboLinux products.
  Subscribe at http://www.turbolinux.com/mailman/listinfo/tl-security

  TL-security-announce - An announce-only mailing list for security updates
  and alerts.

  Subscribe at:

      http://www.turbolinux.com/mailman/listinfo/tl-security-announce


_____________________________________________________________________________________________


                     TurboLinux Security Announcement

        Package:  netscape-communicator
        Vulnerable Packages: All Turbolinux versions previous to 4.77-3
        Date: 05/02/2001 5:00 PDT


        Affected TurboLinux versions: TL Server 6.5,
                                      TL 6.1 WorkStation,
                                      All TurboLinux versions
                                      6.0.5 and earlier

        TurboLinux Advisory ID#:  TLSA2001013

        Credits:  Vulnerability discovered by Florian Wesch < [EMAIL PROTECTED] >
        References:  http://www.securityfocus.com/archive/1/175060

_____________________________________________________________________________________________


A security hole has been discovered in the netscape-communicator  package.  
Please update the packages in your installation as soon as possible.
_____________________________________________________________________________________________


1. Problem Summary

   The Netscape browser does not escape the gif file comment in the
   image information page. This allows javascript execution in the
   "about:" protocol and can for example be used to upload the
   History (about:global) to a webserver.

2. Impact

   It is possible for a user to view a history of URLs visited on a remote system.

3. Solution
     
   Update the packages from our ftp server by running the following command:

   rpm -Uvh ftp_path_to_filename

   Where ftp_path_to_filename is the following:

   
ftp://ftp.turbolinux.com/pub/updates/6.0/security/netscape-communicator-4.77-3.i386.rpm
 

   The source RPM can be downloaded here:

   ftp://ftp.turbolinux.com/pub/updates/6.0/SRPMS/netscape-communicator-4.77-3.src.rpm

  **Note: You must rebuild and install the RPM if you choose to download
  and install the SRPM.  Simply installing the SRPM alone WILL NOT CLOSE
  THE SECURITY HOLE.

 Please verify the MD5 checksums of the updates before you install:

  MD5 sum                               Package Name
---------------------------------------------------------------------------------------------

                                       
  1c22d82709154a5541cf01e8561651c4      netscape-communicator-4.77-3.i386.rpm
  a0973f4123b0a6bba0279e403cae4772      netscape-communicator-4.77-3.src.rpm
_____________________________________________________________________________________________


These packages are GPG signed by TurboLinux for security. Our key
is available here:

 http://www.turbolinux.com/security/tlgpgkey.asc

To verify a package, use the following command:

 rpm --checksig name_of_rpm

To examine only the md5sum, use the following command:

 rpm --checksig --nogpg name_of_rpm

**Note: Checking GPG keys requires RPM 3.0 or higher.

________________________________________________________________________________________________

You can find more updates on our ftp server:

   ftp://ftp.turbolinux.com/pub/updates/6.0/security/ 

for TL6.0 Workstation and Server security updates

Our webpage for security announcements:

   http://www.turbolinux.com/security

If you want to report vulnerabilities, please contact:

   [EMAIL PROTECTED]
________________________________________________________________________________________________


Subscribe to the TurboLinux Security Mailing lists:

  TL-security - A moderated list for discussing security issues
                TurboLinux products.
  Subscribe at http://www.turbolinux.com/mailman/listinfo/tl-security

  TL-security-announce - An announce-only mailing list for security updates
  and alerts.

  Subscribe at:

      http://www.turbolinux.com/mailman/listinfo/tl-security-announce


___________________________________________________________________________

                     TurboLinux Security Announcement

        Package: Squid
        Vulnerable Packages: All versions previous to 2.3.STABLE4-1
        Date: 05/04/2001 5:00 PDT

        Affected TurboLinux versions:TL 6.1 WorkStation,
                                     All TurboLinux versions
                                     6.0.5 and earlier

        TurboLinux Advisory ID#:  TLSA2001008

   Credits: Vulnerability discovered by Greg KH<[EMAIL PROTECTED]>
___________________________________________________________________________

A security hole has been discovered in the package squid.  Please update
this package in your installation as soon as possible.
___________________________________________________________________________

1. Problem Summary(From the BugTraq database at securityfocus.com, id#2184)

   A /tmp file race condition vulnerability exists.  Squid can be
   set up to send emails notifying the administrator of any updates.
   Whenever the email is created, files are created insecurely
   in the /tmp directory and the pre-existence of these files is
   not queried.  Usually, the file creations occur when the system clock is
   reporting an incorrect time or a development version of squid is used.
   Therefore, it is possible for a user with malicious motives to guess the
   handle of a future /tmp file, and create a symbolic link to a file writ-
   able by the UID of the squid process, thus overwriting a file owned by
   the squid user, or appending to and corrupting the file.

2. Solution

  Update the package from our ftp server by running the following command:

  rpm -Uvh ftp_path_to_filename

  Where ftp_path_to_filename is the following:

ftp://ftp.turbolinux.com/pub/updates/6.0/security/squid-2.3.STABLE4-1.i386.rpm

  The source RPM can be downloaded here:

  ftp://ftp.turbolinux.com/pub/updates/6.0/SRPMS/squid-2.3.STABLE4-1.src.rpm

  **Note: You must rebuild and install the RPM if you choose to download
  and install the SRPM.  Simply installing the SRPM alone WILL NOT CLOSE
  THE SECURITY HOLE.

 Please verify the MD5 checksums of the updates before you install:

  MD5 sum                               Package Name
---------------------------------------------------------------------------
d9844e9082390dc146893c836e3ea2a2        squid-2.3.STABLE4-1.i386.rpm
2412fc6befc100bd757de8fc91ecfc6c        squid-2.3.STABLE4-1.src.rpm
___________________________________________________________________________

These packages are GPG signed by TurboLinux for security. Our key
is available here:

 http://www.turbolinux.com/security/tlgpgkey.asc

To verify a package, use the following command:

 rpm --checksig name_of_rpm

To examine only the md5sum, use the following command:

 md5sum name_of_rpm

**Note: Checking GPG keys requires RPM 3.0 or higher.

___________________________________________________________________________

You can find more updates on our ftp server:

   ftp://ftp.turbolinux.com/pub/updates/6.0/security/ for TL6.0 Workstation
   and Server security updates
   ftp://ftp.turbolinux.com/pub/updates/4.0/security/ for TL4.0 Workstation
   and Server security updates

Our webpage for security announcements:

   http://www.turbolinux.com/security

If you want to report vulnerabilities, please contact:

   [EMAIL PROTECTED]
___________________________________________________________________________

Subscribe to the TurboLinux Security Mailing lists:

  TL-security - A moderated list for discussing security issues
                TurboLinux products.
  Subscribe at http://www.turbolinux.com/mailman/listinfo/tl-security

  TL-security-announce - An announce-only mailing list for security updates
  and alerts.

  Subscribe at:

      http://www.turbolinux.com/mailman/listinfo/tl-security-announce


_____________________________________________________________________________________________


                     TurboLinux Security Announcement

        Package:  vixie-cron
        Vulnerable Packages: All Turbolinux versions previous to 3.0.1-46
        Date: 05/02/2001 5:00 PDT


        Affected TurboLinux versions: TL Server 6.5,
                                      TL 6.1 WorkStation,
                                      All TurboLinux versions
                                      6.0.5 and earlier

        TurboLinux Advisory ID#:  TLSA2001012

        Credits: Vulnerability first discovered by flatline<[EMAIL PROTECTED]>
        References:  http://marc.theaimsgroup.com/?l=bugtraq&m=98200814418344&w=2

_____________________________________________________________________________________________


A security hole has been discovered in the package vixie-cron.  Please update
the packages in your installation as soon as possible.
_____________________________________________________________________________________________


1. Problem Summary

   There is a buffer overflow vulnerability associated with the crontab function.  
When crontab
   determines the name of the user calling the crontab function, it stores this name
   in a 20 byte buffer using the strcpy() function, which does no bounds checking.  
The
   command "useradd" accepts more than 20 characters.  Therefore, a username greater 
than
   20 characters will crash a system when passed to the crontab function.

2. Impact

   It is possible for a local user to gain elevated privileges.

3. Solution
     
   Update the packages from our ftp server by running the following command:

   rpm -Uvh ftp_path_to_filename

   Where ftp_path_to_filename is the following:

   ftp://ftp.turbolinux.com/pub/updates/6.0/security/vixie-cron-3.0.1-46.i386.rpm 

   The source RPM can be downloaded here:

   ftp://ftp.turbolinux.com/pub/updates/6.0/SRPMS/vixie-cron-3.0.1-46.src.rpm

  **Note: You must rebuild and install the RPM if you choose to download
  and install the SRPM.  Simply installing the SRPM alone WILL NOT CLOSE
  THE SECURITY HOLE.

 Please verify the MD5 checksums of the updates before you install:

  MD5 sum                               Package Name
---------------------------------------------------------------------------------------------

                                       
  c79c05f0044f88812908b17730a308ee      vixie-cron-3.0.1-46.i386.rpm
  cdfd064650b8839a3d7f3eb18a494165      vixie-cron-3.0.1-46.src.rpm
_____________________________________________________________________________________________


These packages are GPG signed by TurboLinux for security. Our key
is available here:

 http://www.turbolinux.com/security/tlgpgkey.asc

To verify a package, use the following command:

 rpm --checksig name_of_rpm

To examine only the md5sum, use the following command:

 rpm --checksig --nogpg name_of_rpm

**Note: Checking GPG keys requires RPM 3.0 or higher.

________________________________________________________________________________________________


You can find more updates on our ftp server:

   ftp://ftp.turbolinux.com/pub/updates/6.0/security/ 

for TL6.0 Workstation and Server security updates

Our webpage for security announcements:

   http://www.turbolinux.com/security

If you want to report vulnerabilities, please contact:

   [EMAIL PROTECTED]
________________________________________________________________________________________________


Subscribe to the TurboLinux Security Mailing lists:

  TL-security - A moderated list for discussing security issues
                TurboLinux products.
  Subscribe at http://www.turbolinux.com/mailman/listinfo/tl-security

  TL-security-announce - An announce-only mailing list for security updates
  and alerts.

  Subscribe at:

      http://www.turbolinux.com/mailman/listinfo/tl-security-announce


_____________________________________________________________________________________________


                     TurboLinux Security Announcement

        Package: xntp3
        Vulnerable Packages: All Turbolinux versions previous to 5.93-10
        Date: 05/02/2001 5:00 PDT


        Affected TurboLinux versions: TL Server 6.5,
                                      TL 6.1 WorkStation,
                                      All TurboLinux versions
                                      6.0.5 and earlier

        TurboLinux Advisory ID#:  TLSA2001014

        Credits:  Vulnerability discovered by Przemyslaw 
Frasunek<[EMAIL PROTECTED]>
       
        References: http://www.securityfocus.com/vdb/bottom.html?vid=2540

_____________________________________________________________________________________________


A security hole has been discovered in the xntp3 packages.  Please update
the packages in your installation as soon as possible.
_____________________________________________________________________________________________


1. Problem Summary

   A remote buffer overflow vulnerability exists in the network time protocol daemon.
   It is remotely exploitable and a user with malicious intent can crash the daemon
   or execute arbitrary code on the affected host.

2. Impact

   Remote exploitation can result in an attacker gaining remote root access or a 
denial of ntp 
   service on the affected system.

3. Solution
     
   Update the packages from our ftp server by running the following command:

   rpm -Uvh ftp_path_to_filename

   Where ftp_path_to_filename is the following:

   ftp://ftp.turbolinux.com/pub/updates/6.0/security/xntp3-5.93-10.i386.rpm
   ftp://ftp.turbolinux.com/pub/updates/6.0/security/xntp3-server-5.93-10.i386.rpm 

   The source RPM can be downloaded here:

   ftp://ftp.turbolinux.com/pub/updates/6.0/SRPMS/xntp3-5.93-10.src.rpm

  **Note: You must rebuild and install the RPM if you choose to download
  and install the SRPM.  Simply installing the SRPM alone WILL NOT CLOSE
  THE SECURITY HOLE.

 Please verify the MD5 checksums of the updates before you install:

  MD5 sum                               Package Name
---------------------------------------------------------------------------------------------

                                       
  1acc3320414d9cf0c95359ee441f670c      xntp3-5.93-10.i386.rpm
  dfb4610caddfe8970e7c9f37c4fc9ec7      xntp3-server-5.93-10.i386.rpm
  b68734be1f493230aa773f19a0bfb0b5      xntp3-5.93-10.src.rpm
_____________________________________________________________________________________________


These packages are GPG signed by TurboLinux for security. Our key
is available here:

 http://www.turbolinux.com/security/tlgpgkey.asc

To verify a package, use the following command:

 rpm --checksig name_of_rpm

To examine only the md5sum, use the following command:

 rpm --checksig --nogpg name_of_rpm

**Note: Checking GPG keys requires RPM 3.0 or higher.

________________________________________________________________________________________________

You can find more updates on our ftp server:

   ftp://ftp.turbolinux.com/pub/updates/6.0/security/ 

for TL6.0 Workstation and Server security updates

Our webpage for security announcements:

   http://www.turbolinux.com/security

If you want to report vulnerabilities, please contact:

   [EMAIL PROTECTED]
________________________________________________________________________________________________


Subscribe to the TurboLinux Security Mailing lists:

  TL-security - A moderated list for discussing security issues
                TurboLinux products.
  Subscribe at http://www.turbolinux.com/mailman/listinfo/tl-security

  TL-security-announce - An announce-only mailing list for security updates
  and alerts.

  Subscribe at:

      http://www.turbolinux.com/mailman/listinfo/tl-security-announce


_____________________________________________________________________________________________


                     TurboLinux Security Announcement

                               Adore Worm
     
        Vulnerable TurboLinux platforms:  TL Workstation 6.1
                                          Turbolinux Server versions 6.0.5 and earlier
                                      
        TurboLinux Advisory ID#:  TLSA2001017
                  
        References:  http://www.securityfocus.com/headlines/10964 


_____________________________________________________________________________________________


Although we have not received any security alerts about Turbolinux systems being 
infected
by the Adore Worm, the Turbolinux platforms mentioned above can be susceptible to it. 
Please
take the proper precaution by updating the packages in your installation as soon as 
possible.
_____________________________________________________________________________________________


1. Problem Summary

   Adore is a variant of the Ramen worm that creates a backdoor to a Linux system.  It 

   then sends information about the compromised system to four email addresses:  two 
in the
   United States and two in China.  The worm gets its name from the username 
associated 
   with each email address:  adore9000 or adore9001. 

   To create this backdoor, the Adore worm seeks out four flaws associated with the 
packages
   nfs-utils, wu-ftpd, LPRng, and bind.  

   The four security flaws sought out by the Adore worm are:

        a. wu-ftpd:  Buffer overrun;  due to improper bounds checking, SITE EXEC may 
                     enable remote root execution, without having any local user 
account 
                     required.

        b. nfs-utils:  Flaw in the rpc.statd daemon can lead to remote root break in.
                       Please note that the nfs-utils package will replace the 
                       packages knfsd and knfsd-client.  The package knfsd-client
                       contains the rpc.statd daemon

        c. LPRng:  Vulnerability due to incorrect usage of the syslog() function.
                   Local and remote users can send string-formatting operators to the 
print-
                   er daemon to corrupt the daemon's execution, potentially gaining 
root
                   access.

        d. bind:  Buffer overflow in transaction signature (TSIG) handling code.
                  This vulnerability may allow an attacker to execute code with the 
same
                  privileges as the BIND server. Because BIND is typically run by a
                  superuser account, the execution would occur with superuser 
privileges.

   Once in a system, it replaces an application called PS--used by administrators to 
list the 
   currently running programs on a system--with a copy that will list all programs 
except the 
   worm.  It also sends important system files to the four email addresses.  After 
infecting a 
   machine and sending information about the computer through e-mail, the worm waits 
until 
   4:02 a.m. and then deletes all its files, except the backdoor. 


2. Solution

   Update the packages from our ftp server by running the following command:

   rpm -Uvh ftp_path_to_filename

   Where ftp_path_to_filename is the following:

   ftp://ftp.turbolinux.com/pub/updates/6.0/security/nfs-utils-0.2.1-7.i386.rpm
   ftp://ftp.turbolinux.com/pub/updates/6.0/security/wu-ftpd-2.6.1-5.i386.rpm
   ftp://ftp.turbolinux.com/pub/updates/6.0/security/LPRng-3.6.26-1.i386.rpm
   ftp://ftp.turbolinux.com/pub/updates/6.0/security/bind-8.2.3-2.i386.rpm
   ftp://ftp.turbolinux.com/pub/updates/6.0/security/bind-contrib-8.2.3-2.i386.rpm
   ftp://ftp.turbolinux.com/pub/updates/6.0/security/bind-devel-8.2.3-2.i386.rpm
   ftp://ftp.turbolinux.com/pub/updates/6.0/security/bind-utils-8.2.3-2.i386.rpm


   The source RPMs can be downloaded here:

   ftp://ftp.turbolinux.com/pub/updates/6.0/SRPMS/nfs-utils-0.2.1-7.src.rpm
   ftp://ftp.turbolinux.com/pub/updates/6.0/SRPMS/wu-ftpd-2.6.1-5.src.rpm
   ftp://ftp.turbolinux.com/pub/updates/6.0/SRPMS/LPRng-3.6.26-1.src.rpm
   ftp://ftp.turbolinux.com/pub/updates/6.0/SRPMS/bind-8.2.3-2.src.rpm

  **Note: You must rebuild and install the RPM if you choose to download
  and install the SRPM.  Simply installing the SRPM alone WILL NOT CLOSE
  THE SECURITY HOLE.

 Please verify the MD5 checksums of the updates before you install:

  MD5 sum                               Package Name
---------------------------------------------------------------------------------------------


  a11507768f746e6dfbe1b55705ac9b0a      wu-ftpd-2.6.1-5.i386.rpm
  aec472f299ad23e8e1030f3aeb6733c7      wu-ftpd-2.6.1-5.src.rpm
  ddb4b4c0d50650c4a8acc5692b8c0f1a      nfs-utils-0.2.1-7.i386.rpm
  948e3c6b45db0d18b57713572575d6c8      nfs-utils-0.2.1-7.src.rpm
  b4366ecf26b2156d9de3c0bbdce320ca      LPRng-3.6.26-1.i386.rpm
  a6d6ce0f0291ba42d7fa4ef063bc1107      LPRng-3.6.26-1.src.rpm
  dec967e3a1dd16bdcca0c6fe6e9114d6      bind-8.2.3-2.i386.rpm
  2e84bbbcd6a09d7c5060dd01480ff3de      bind-contrib-8.2.3-2.i386.rpm
  06612093126372f8d618ea842fd402ec      bind-devel-8.2.3-2.i386.rpm
  3f390ce4d1b7ceaa477df62cc3fe3174      bind-utils-8.2.3-2.i386.rpm
  25c701c7158af3f773d1a478c8872d05      bind-8.2.3-2.src.rpm
_____________________________________________________________________________________________


These packages are GPG signed by TurboLinux for security. Our key
is available here:

 http://www.turbolinux.com/security/tlgpgkey.asc

To verify a package, use the following command:

 rpm --checksig name_of_rpm

To examine only the md5sum, use the following command:

 md5sum name_of_rpm

**Note: Checking GPG keys requires RPM 3.0 or higher.

________________________________________________________________________________________________

You can find more updates on our ftp server:

   ftp://ftp.turbolinux.com/pub/updates/6.0/security/ 

for TL6.x Workstation and Server security updates

Our webpage for security announcements:

   http://www.turbolinux.com/security

If you want to report vulnerabilities, please contact:

   [EMAIL PROTECTED]
________________________________________________________________________________________________


Subscribe to the TurboLinux Security Mailing lists:

  TL-security - A moderated list for discussing security issues
                TurboLinux products.
  Subscribe at http://www.turbolinux.com/mailman/listinfo/tl-security

  TL-security-announce - An announce-only mailing list for security updates
  and alerts.

  Subscribe at:

      http://www.turbolinux.com/mailman/listinfo/tl-security-announce


_________________________________________________________________________________________


                     TurboLinux Security Announcement

                               Ramen Worm
     
        Vulnerable TurboLinux platforms:  TL Workstation 6.1
                                          Turbolinux Server versions 6.0.5 and earlier
                                      
        TurboLinux Advisory ID#:  TLSA2001016
                  
        References: http://www.securityfocus.com/headlines/10072 
                    http://www.securityfocus.com/headlines/10073
                    http://www.securityfocus.com/archive/12/158975
                    http://www.linuxsecurity.com/advisories/redhat_advisory-572.html


_____________________________________________________________________________________________


Although we have not received any security alerts about Turbolinux systems being 
infected
by the Ramen Worm, the Turbolinux platforms mentioned above can be susceptible to it. 
Please
take the proper precaution by updating the packages in your installation as soon as 
possible.
_____________________________________________________________________________________________


1. Problem Summary

   Ramen is a Linux-based Internet worm that has infiltrated web servers running Red 
Hat 6.2
   or Red Hat 7.0 Linux using three security breaches associated with the packages 
nfs-utils, 
   wu-ftpd, and LPRng.  Once the worm detects the vulnerabilities, it exploits them, 
copies
   itself onto the server, and takes over root access rights.  The Ramen worm can 
damage web-
   related and system files.  It defaces the web site and modifies the index.html 
file, ul-
   timately replacing it with the words:  

                "RameN Crew" and "Hackers looooooooooooooooove noodles."

   The main page of the web site displays the message "This site powered by" and a 
picture
   of a Top Ramen Noodles package.  According to an advisory put out by CERT, it can 
also 
   create denial of service attacks if altered or when destroyed files are not 
available.
   A system compromised by the worm is at high risk for "being party to attacks on 
other 
   Internet sites."  

   The three security breaches sought out by the Ramen worm are as follows:

        a. wu-ftpd:  Buffer overrun;  due to improper bounds checking, SITE EXEC may 
                     enable remote root execution, without having any local user 
account 
                     required.

        b. nfs-utils:  Flaw in the rpc.statd daemon can lead to remote root break in.
                       Please note that the nfs-utils package will replace the 
                       packages knfsd and knfsd-client.  The package knfsd-client
                       contains the rpc.statd daemon

        c. LPRng:  Vulnerability due to incorrect usage of the syslog() function.
                   Local and remote users can send string-formatting operators to the 
print-
                   er daemon to corrupt the daemon's execution, potentially gaining 
root
                   access.


2. Solution

   Update the packages from our ftp server by running the following command:

   rpm -Uvh ftp_path_to_filename

   Where ftp_path_to_filename is the following:

   ftp://ftp.turbolinux.com/pub/updates/6.0/security/nfs-utils-0.2.1-7.i386.rpm
   ftp://ftp.turbolinux.com/pub/updates/6.0/security/wu-ftpd-2.6.1-5.i386.rpm
   ftp://ftp.turbolinux.com/pub/updates/6.0/security/LPRng-3.6.26-1.i386.rpm

   The source RPMs can be downloaded here:

   ftp://ftp.turbolinux.com/pub/updates/6.0/SRPMS/nfs-utils-0.2.1-7.src.rpm
   ftp://ftp.turbolinux.com/pub/updates/6.0/SRPMS/wu-ftpd-2.6.1-5.src.rpm
   ftp://ftp.turbolinux.com/pub/updates/6.0/SRPMS/LPRng-3.6.26-1.src.rpm

  **Note: You must rebuild and install the RPM if you choose to download
  and install the SRPM.  Simply installing the SRPM alone WILL NOT CLOSE
  THE SECURITY HOLE.

 Please verify the MD5 checksums of the updates before you install:

  MD5 sum                               Package Name
---------------------------------------------------------------------------------------------


  a11507768f746e6dfbe1b55705ac9b0a      wu-ftpd-2.6.1-5.i386.rpm
  aec472f299ad23e8e1030f3aeb6733c7      wu-ftpd-2.6.1-5.src.rpm
  ddb4b4c0d50650c4a8acc5692b8c0f1a      nfs-utils-0.2.1-7.i386.rpm
  948e3c6b45db0d18b57713572575d6c8      nfs-utils-0.2.1-7.src.rpm
  b4366ecf26b2156d9de3c0bbdce320ca      LPRng-3.6.26-1.i386.rpm
  a6d6ce0f0291ba42d7fa4ef063bc1107      LPRng-3.6.26-1.src.rpm
  
_____________________________________________________________________________________________


These packages are GPG signed by TurboLinux for security. Our key
is available here:

 http://www.turbolinux.com/security/tlgpgkey.asc

To verify a package, use the following command:

 rpm --checksig name_of_rpm

To examine only the md5sum, use the following command:

 md5sum name_of_rpm

**Note: Checking GPG keys requires RPM 3.0 or higher.

________________________________________________________________________________________________

You can find more updates on our ftp server:

   ftp://ftp.turbolinux.com/pub/updates/6.0/security/ 

for TL6.x Workstation and Server security updates

Our webpage for security announcements:

   http://www.turbolinux.com/security

If you want to report vulnerabilities, please contact:

   [EMAIL PROTECTED]
________________________________________________________________________________________________


Subscribe to the TurboLinux Security Mailing lists:

  TL-security - A moderated list for discussing security issues
                TurboLinux products.
  Subscribe at http://www.turbolinux.com/mailman/listinfo/tl-security

  TL-security-announce - An announce-only mailing list for security updates
  and alerts.

  Subscribe at:

      http://www.turbolinux.com/mailman/listinfo/tl-security-announce

Reply via email to