N'installez pas de logiciels testant la vulnérabilité de BIND, c'est un troyan (pas BIND, le logiciel de test de vulnérabilité -- ce n'est pas la première fois). Cf bug-traq. Je publie désormais toutes les attaques contre des logiciels Open Source avec un lien avec Linux ou UNIX. Icecast Buffer Overflow Vulnerability BugTraq ID: 2264 Remote: Yes Date Published: 2001-01-21 Relevant URL: http://www.securityfocus.com/bid/2264 Summary: Icecast is an open source streaming audio server. Versions of icecast up to and including 1.3.8 beta2 exhibit a format string vulnerability in the print_client() function of utility.c. An insecurely-structured call to fd_write() directly passes user supplied characters as part of the format string to a *printf function. As a result, a malicious user can cause the *printf function to overwrite memory at possibly arbitrary addresses. This type of vulnerability can be exploited by a remote attacker to execute arbitrary code on the victim host. bing gethostbyaddr Buffer Overflow Vulnerability BugTraq ID: 2279 Remote: No Date Published: 2001-01-19 Relevant URL: http://www.securityfocus.com/bid/2279 Summary: bing is a freely available, open source software package written by Pierre Beyssac. The package is designed to calculate the capacity between two points by sending various sized ICMP packets and recording their return times. A problem in bing can allow a local user to gain administrative privileges. A static buffer used to store the name of the host using a gethostbyaddr function is allocated a static 80 byte buffer in memory. It is possible for a user with control of their on IN-ADDR.arpa zone to create a custom crafted entry in their zone records, appended with shell code. Upon receiving the IN-ADDR entry, the buffer could overflow, overwriting stack variables up through the return address, and therefore executing the shellcode in the zone entry. This problem makes it possible for a user with malicious motives to gain elevated privleges on a vulnerable system, including administrative access. FreeBSD ipfw Filtering Evasion Vulnerability BugTraq ID: 2293 Remote: Yes Date Published: 2001-01-23 Relevant URL: http://www.securityfocus.com/bid/2293 Summary: FreeBSD, like many other modern operating systems, ships with a packet filtering system built into the kernel. A vulnerability in this system has been uncovered that may allow attackers to evade certain rules. It has to do with FreeBSD's interpretation of the ECE flag in the TCP header. The ECE flag is an experimental extension to TCP, and is part of TCP's reserved options. Its purpose is for notification of network congestion. When the packet filter examines TCP packets that have this ECE flag set, it interprets them as being part of an established TCP connection. Thus if a filtering rule exists that permits packets belonging to an established connection, these packets will qualify and be let through. Attackers could use this vulnerability to circumvent firewall rules. Packets could be constructed so that the ECE flag is set for outgoing traffic and establish connections with services behind the firewall. Under normal circumstances, packets would only be recieved by these services if a TCP connection had already been established. Vulnerable services to be protected by this rule will be exposed to possibly hostile external networks. Wu-Ftpd Debug Mode Client Hostname Format String Vulnerability BugTraq ID: 2296 Remote: Yes Date Published: 2001-01-23 Relevant URL: http://www.securityfocus.com/bid/2296 Summary: Wu-ftpd is a widely used unix ftp server. It contains a format string vulnerability that may be exploitable under certain (perhaps even 'extreme') circumstances. If wu-ftpd is running in debug mode (ie, started by inetd with the -d or -v flag) it may be possible for an attacker to exploit a format string attack. When in debug mode, Wu-ftpd logs user commands and server responses via syslog() with 'DEBUG' designation. When a passive file transfer is initiated by the user (real or anonymous), this message is written to syslog: PASV port X assigned to HOSTNAME This string containing this message is constructed before the call to syslog(). The value of HOSTNAME within the string is resolved by the server. This string is then passed to syslog as its format string argument. As a result, any format specifiers that are within the string will be interpreted and acted upon. This could be exploited in the typical manner format string vulnerabilities are exploited. It is not known if any distributions of Wu-ftpd or distributions of software including Wu-ftpd ship with debug mode on by default. - Pour poster une annonce: [EMAIL PROTECTED]