Originally to: All

SecurityFocus Linux Newsletter #123
-----------------------------------

I. FRONT AND CENTER
     1. Open Source Honeypots, Part Two: Deploying Honeyd in the Wild
     2. IP Spoofing: An Introduction
     3. Iraqi Cyberwar: an Ageless Joke
     4. SecurityFocus DPP Program
II. LINUX VULNERABILITY SUMMARY
     1. SimpleBBS Users.php Insecure File Permissions Vulnerability
     2. Ethereal SOCKS Dissector Format String Vulnerability
     3. Ethereal NTLMSSP Dissector Heap Corruption Vulnerability
     4. MySQL mysqld Privilege Escalation Vulnerability
     5. PHP-Nuke Multiple SQL Injection Vulnerabilities
     6. MySQL Control Center Insecure Default File Permission...
     7. DeleGate HTTP Proxy Robot.TXT User-Agent: Buffer Overflow...
     8. Multiple PHP-Nuke Forums/Private_Messages SQL Injection...
     9. SaveMyModem Statusbar_Set_Text Buffer Overflow Vulnerability
     10. Multiple Vendor 802.11b Authentication-Failed DOS...
     11. GreyMatter WebLog Remote Command Execution Vulnerability
     12. Man Program Unsafe Return Value Command Execution Vulnerability
     13. Opera Long Filename Download Buffer Overrun Vulnerability
     14. Qpopper Remote Memory Corruption Vulnerability
III. LINUX FOCUS LIST SUMMARY
     1. Port 113 security (Thread)
     2. Traffic Shaping. (Thread)
     3. SecurityFocus Article Announcement (Thread)
IV. NEW PRODUCTS FOR LINUX PLATFORMS
     1. EverLink SRAC Gateway
     2. iChain
     3. NetOp Remote Control
V.  NEW TOOLS FOR LINUX PLATFORMS
     1. eXtended Allow - Deny list for PAM v0.4
     2. C-Kermit v8.0.208
     3. trafcalc v1.0


I. FRONT AND CENTER
-------------------
1. Open Source Honeypots, Part Two: Deploying Honeyd in the Wild By Lance 
Spitzner

This is the second part of a three-part series looking at Honeyd, the open 
source honeypot. In this paper we we will deploy Honeyd on the Internet for one 
week and watch what happens. The intent is to test Honeyd by letting real bad 
guys interact with and attack it. We will then analyze how the honeypot 
performed and what it discovered

http://www.securityfocus.com/infocus/1675

2. IP Spoofing: An Introduction
by Matthew Tanase

Criminals have long employed the tactic of masking their true identity, from 
disguises to aliases to caller-id blocking. It should come as no surprise then, 
that criminals who conduct their nefarious activities on networks and computers 
should employ such techniques. IP spoofing is one of the most common forms of 
on-line camouflage. In IP spoofing, an attacker gains unauthorized access to a 
computer or a network by making it appear that a malicious message has come from 
a trusted machine by spoofing” the IP address of that machine. In this article, 
we will examine the concepts of IP spoofing: why it is possible, how it works, 
what it is used for and how to defend against it.

http://www.securityfocus.com/infocus/1674

3. Iraqi Cyberwar: an Ageless Joke
By George Smith

Did U.S. infowar commandos smuggle a deadly computer virus into Iraq inside a 
printer? Of course not. So why does it keep getting reported?

http://www.securityfocus.com/columnists/147

4. SecurityFocus DPP Program

Attention Universities!! Sign-up now for preferred pricing on the only global 
early-warning system for cyber attacks - SecurityFocus DeepSight Threat 
Management System.

Click here for more information:
http://www.securityfocus.com/corporate/products/dpsection.shtml


II. BUGTRAQ SUMMARY
-------------------
1. SimpleBBS Users.php Insecure File Permissions Vulnerability BugTraq ID: 7045
Remote: Yes
Date Published: Mar 07 2003 12:00AM Relevant URL:
http://www.securityfocus.com/bid/7045
Summary:

SimpleBBS is a freely available, open source PHP Bulletin Board. It is available 
for the Unix and Linux operating systems.

SimpleBBS reportedly creates the user database 'users.php' with world-readable 
permissions in the SimpleBBS web root. User credentials are stored in plain text 
format. As a result anyone who may have access to the SimpleBBS website may view 
stored user information contained in the SimpleBBS user database.

This vulnerability was reported for SimpleBBS 1.0.6. It is not known if earlier 
versions are affected by this vulnerability.

2. Ethereal SOCKS Dissector Format String Vulnerability BugTraq ID: 7049
Remote: Yes
Date Published: Mar 08 2003 12:00AM Relevant URL:
http://www.securityfocus.com/bid/7049
Summary:

Ethereal is a freely available, open source network traffic analysis tool. It is 
maintained by the Ethereal Project and is available for most Unix and Linux 
variants as well as Microsoft Windows operating systems.

The Ethereal SOCKS dissector is a mechanism for decoding the SOCKS protocol. A 
format string vulnerability has been reported in some versions of this 
dissector. The vulnerability exists in the packet-socks.c source file.

An attacker can exploit this vulnerability by connecting to a vulnerable SOCKS 
server and sending malicious format string specifiers to the SOCKS server. If 
Ethereal is being used as a security tool to monitor network packets, it is 
possible that sensitive memory may be corrupted.

This has been confirmed to result in a denial of service condition. 
Additionally, it may be possible to cause Ethereal to execute malicious 
attacker-supplied code.

This vulnerability affects Ethereal 0.9.9 and earlier.

3. Ethereal NTLMSSP Dissector Heap Corruption Vulnerability BugTraq ID: 7050
Remote: Yes
Date Published: Mar 08 2003 12:00AM Relevant URL:
http://www.securityfocus.com/bid/7050
Summary:

Ethereal is a freely available, open source network traffic analysis tool. It is 
maintained by the Ethereal Project and is available for most Unix and Linux 
variants as well as Microsoft Windows operating systems.

The NTLMSSP (NTLM Security Support Provider) dissector is a mechanism for 
evaluating packets that use the NTLM protocol. A heap corruption vulnerability 
has been reported for some versions of the dissector.

The precise technical details of this vulnerability are currently unknown. This 
BID will be updated as further information is available.

An attacker may be able to exploit this vulnerability by crafting a specially 
formed packet and sending it to a system using the NTLMSSP dissector or by 
convincing a victim user to use Ethereal to read a malformed packet trace file.

Due to the nature of this vulnerability it may be possible for an attacker to 
create a situation in which sensitive memory could be overwritten. If successful 
this may allow for the execution of arbitrary code with the privileges of the 
Ethereal process.

This vulnerability affects Ethereal 0.9.9 and earlier.

4. MySQL mysqld Privilege Escalation Vulnerability BugTraq ID: 7052
Remote: Yes
Date Published: Mar 08 2003 12:00AM Relevant URL:
http://www.securityfocus.com/bid/7052
Summary:

MySQL is an open source relational database project. It is available for the 
Microsoft Windows, Linux, and Unix operating systems.

A vulnerability has been discovered for MySQL that may allow the mysqld service 
to start with elevated privileges.

MySQL uses a series of configuration files to set the privileges of the service. 
The configuration files are typically stored in /etc/my.cnf, DATADIR/my.cnf and 
~/.my.cnf. When executed, the mysqld service reads configuration information 
from /etc/my.cnf first, then DATADIR/my.cnf and finally ~/.my.cnf.

An attacker can exploit this vulnerability by creating a DATADIR/my.cnf that 
includes the line 'user=root' under the '[mysqld]' option section. Furthermore, 
the ~/.my.cnf file must not exist.

When the mysqld service is executed, it will run as the root user instead of the 
default user.

This may allow an attacker to obtain elevated privileges on a compromised 
system.

This vulnerability was reported for MySQL 3.23.55.

5. PHP-Nuke Multiple SQL Injection Vulnerabilities BugTraq ID: 7031
Remote: Yes
Date Published: Mar 06 2003 12:00AM Relevant URL:
http://www.securityfocus.com/bid/7031
Summary:

PHP-Nuke is a web-based portal system. Implemented in PHP, it is available for a 
range of systems, including Unix, Linux, and Microsoft Windows.

Multiple SQL injection vulnerabilities were reported in the
'Members_List' and 'Your_Account' modules of PHP-Nuke.  This is due to
insufficient sanitization of externally supplied data which is used to construct 
SQL queries.  This data may be supplied via URI parameters in requests for 
certain module functions.  A remote attacker may take advantage of these issues 
to inject malicious data into SQL queries, possibly resulting in modification of 
query logic.

The consequences may vary depending on the particular database implementation 
and the nature of the specific queries.  At the very least, it is possible to 
compromise the PHP-Nuke web portal.  SQL injection also makes it possible, under 
some circumstances, to exploit vulnerabilities that may exist in the database 
implementation.

This BID will be divided into separate BIDs for each distinct issue and retired 
when further analysis of these vulnerabilities is complete.

6. MySQL Control Center Insecure Default File Permission Vulnerability BugTraq 
ID: 7041
Remote: No
Date Published: Mar 07 2003 12:00AM Relevant URL:
http://www.securityfocus.com/bid/7041
Summary:

MySQL Control Center (MySQLCC) is a visual administration interface for MySQL 
database servers and is available for multiple platforms.

A vulnerability has been discovered in MySQLCC. The problem lies in the 
permissions set on various files used by MySQLCC. Specifically, configuration 
and connection files used by the application are set world-readable. This may 
allow a malicious local user to obtain access to sensitive information regarding 
various MySQL configuration settings.

Access to these files may allow an attacker to obtain information required to 
carry out further attacks against a target system.

This issue has been addressed in MySQLCC 0.8.9.

7. DeleGate HTTP Proxy Robot.TXT User-Agent: Buffer Overflow Vulnerability 
BugTraq ID: 7054
Remote: Yes
Date Published: Mar 10 2003 12:00AM Relevant URL:
http://www.securityfocus.com/bid/7054
Summary:

DeleGate is an open source proxy server developed by Yutaka Sato. DeleGate 
allows for proxying of several application protocols, including HTTP.  It is 
available for multiple platforms, including Microsoft Windows and Unix and Linux 
variants.

The DeleGate HTTP Proxy component is prone to a remotely exploitable buffer 
overflow vulnerability.  This is due to insufficient bounds checking of 
User-Agent: fields in remote 'robot.txt' files.  It is reported that it is 
possible to trigger this issue by specifying multiple lines of User-Agent: data 
in the file, which will cause an internal array of pointers to be overflowed 
with attacker-supplied data.  This will occur when a malicious 'robot.txt' file 
is retrieved via the proxy.

Successful exploitation may result in execution of malicious code in the 
security context of the DeleGate proxy server.

This issue was reported in DeleGate versions 8.3.4 and 8.4.0.  Other versions 
may also be affected.

8. Multiple PHP-Nuke Forums/Private_Messages SQL Injection Vulnerabilities 
BugTraq ID: 7060
Remote: Yes
Date Published: Mar 10 2003 12:00AM Relevant URL:
http://www.securityfocus.com/bid/7060
Summary:

PHP-Nuke is a web-based portal system. Implemented in PHP, it is available for a 
range of systems, including Unix, Linux, and Microsoft Windows.

Multiple SQL injection vulnerabilities were reported in the Forums scripts and 
'Private_Messages' module of PHP-Nuke.  This is due to insufficient sanitization 
of externally supplied data which is used to construct SQL queries.  This data 
may be supplied via URI parameters in requests for certain functions.  A remote 
attacker may take advantage of these issues to inject malicious data into SQL 
queries, possibly resulting in modification of query logic.

The consequences may vary depending on the particular database implementation 
and the nature of the specific queries.  At the very least, it is possible to 
compromise the PHP-Nuke web portal.  SQL injection also makes it possible, under 
some circumstances, to exploit vulnerabilities that may exist in the database 
implementation.

This BID will be divided into separate BIDs for each distinct issue and retired 
when further analysis of these vulnerabilities is complete.

9. SaveMyModem Statusbar_Set_Text Buffer Overflow Vulnerability BugTraq ID: 7068
Remote: Yes
Date Published: Mar 10 2003 12:00AM Relevant URL:
http://www.securityfocus.com/bid/7068
Summary:

SaveMyModem is mail filtering software.  It is available for Microsoft Windows 
and Unix and Linux platforms.

SaveMyModem is prone to a buffer overflow in the 'statusbar_set_text' function.  
In some instances, this function will be called with externally supplied data, 
such as when messages are processed.  The vulnerable function includes a call to 
vsnprintf(), specifying a source buffer that is much larger than the destination 
buffer.

When the vulnerable function is called with externally supplied data, it may be 
possible to corrupt sensitive regions of data.  This may potentially occur if a 
message is processed with an excessively long subject.

Successful exploitation will result in code execution in the context of the 
SaveMyModem process.

10. Multiple Vendor 802.11b Authentication-Failed Denial Of Service 
Vulnerability
BugTraq ID: 7069
Remote: Yes
Date Published: Mar 11 2003 12:00AM Relevant URL:
http://www.securityfocus.com/bid/7069
Summary:

A vulnerability has been reported in some operating systems that are capable of 
handling 802.11b traffic.  This issue has been reported as affecting Linux and 
Microsoft Windows operating systems.

Some operating systems do not handle specific types of 802.11b traffic properly. 
 Upon receiving maliciously crafted packets, the client driver may drop all 
active sessions and fail.  A reboot may be required to resume normal 
functionality.

The problem is in the handling of Authentication-Failed packets.  By sending a 
Authentication-Failed packet to a host with a reason code of failed 
authentication that has previously occurred, a host may react unpredictably, 
dropping all sessions, and the client software potentially failing.  It should 
be noted that the source and destination MAC addresses of the 
Authentication-Failed packets are spoofed to appear as though their origin is 
the Wireless Access Point.

The attack is typically performed by sending the packets directly to a 802.11b 
client.  Therefore, this type of attack will evade network intrusion detection, 
and may additionally circumvent WEP.

11. GreyMatter WebLog Remote Command Execution Vulnerability BugTraq ID: 7055
Remote: Yes
Date Published: Mar 10 2003 12:00AM Relevant URL:
http://www.securityfocus.com/bid/7055
Summary:

GreyMatter WebLog is an open source weblog software package available for the 
Unix and Linux operating systems.

A problem in the software may allow unauthorized access to systems using the 
vulnerable software.

It has been reported that a problem in GreyMatter weblog may allow unauthorized 
access to systems.  Due to improper sanitization of untrusted input, it may be 
possible for a remote user to execute commands on the local system.

The problem is in the handling of user comments by the weblog software. Due to 
improper sanitization of the input passed through the weblog comments fields, an 
attacker could potentially insert specially crafted commands such as <?php 
system(echo($cmd)) ?>.  This would in turn result in the execution of these 
commands with the privileges of the web server process.

12. Man Program Unsafe Return Value Command Execution Vulnerability BugTraq ID: 
7066
Remote: No
Date Published: Mar 11 2003 12:00AM Relevant URL:
http://www.securityfocus.com/bid/7066
Summary:

Man is a freely available, open source manual page program.  It is available 
mainly for Linux operating systems, though it can be used on other UNIX 
operating system variants.

A problem with the program may make it possible to launch local attacks on users 
through malicious man pages.

It has been reported that the man program does not properly handle some types of 
input.  When a man page is processed that could pose a potential security risk, 
the program reacts in a way that may open a window of opportunity for an 
attacker to execute arbitrary commands.

The problem is in the value returned by the man program when a potentially 
dangerous man page is processed.  The man program returns the string 'unsafe' 
which is in turn passed to a system() call.  If a program located in the user's 
path was named 'unsafe' the program would be executed with the privileges of the 
man program user.

13. Opera Long Filename Download Buffer Overrun Vulnerability BugTraq ID: 7056
Remote: Yes
Date Published: Mar 10 2003 12:00AM Relevant URL:
http://www.securityfocus.com/bid/7056
Summary:

Opera is a web browser available for a number of platforms, including Microsoft 
Windows, Linux and Unix variants and Apple MacOS.

A vulnerability has been discovered in various versions of Opera on the 
Microsoft Windows platform.

When specific types of files are downloaded by Opera, the transfer is displayed 
within a 'Download Dialog'. Due to insufficient bounds checking when processing 
the requested filename, it may be possible for memory to be corrupted.

Specifically, when a filename is to be displayed within the 'Download Dialog' 
the type of file must be verified. When this occurs, the filename in question is 
copied into a static buffer on the stack.

By hosting a downloadable file containing a name of excessive length, it may be 
possible for an attacker to overwrite sensitive memory locations within Opera. 
Successful exploitation of this issue would result in the execution of arbitrary 
attacker-supplied commands.

It should be noted that this issue affects Opera versions 6 and 7 on the 
Microsoft Windows platform.

14. Qpopper Remote Memory Corruption Vulnerability BugTraq ID: 7058
Remote: Yes
Date Published: Mar 10 2003 12:00AM Relevant URL:
http://www.securityfocus.com/bid/7058
Summary:

Qpopper is a POP3 mail server available for Linux and Unix based systems. A 
vulnerability has been discovered when calling the 'mdef' command. The issue 
presents itself due to the incorrect assumption of the Qvsnprintf() function. 
The function is meant to be a replacement for the C function vsnprintf() but, 
unlike the latter function, Qvsnprintf() fails to NULL terminate buffers.

A memory corruption vulnerability has been discovered in Qpopper when processing 
a malicious 'mdef' command, as a result of the lack of NULL termination by 
Qvsnprintf(). The vulnerability specifically occurs in the pop_msg() function 
when filling the 'message' buffer with a user-supplied macro name. The pop_msg() 
function incorrectly assumes that the 'message' buffer will be null terminated 
after being filled via the Qvsnprintf() function. A CRLF sequence and null 
terminator (CRLF+N) is later appended to the data which may overwrite memory at 
a location adjacent to the buffer.

By exploiting this to overwrite the LSB of a saved frame pointer, it is possible 
to influence the program in such a way that attacker-supplied instructions can 
be executed.

This vulnerability affects Qpopper versions 4.0.4 and earlier. It should be 
noted that the exploitability of this issue is highly dependant on the memory 
layout, which will likely be influenced by compiler optimization.


III. LINUX FOCUS LIST SUMMARY
----------------------------
1. Port 113 security (Thread)
Relevant URL:

http://online.securityfocus.com/archive/91/314827

2. Traffic Shaping. (Thread)
Relevant URL:

http://online.securityfocus.com/archive/91/314730

3. SecurityFocus Article Announcement (Thread) Relevant URL:

http://online.securityfocus.com/archive/91/314566


IV. NEW PRODUCTS FOR LINUX PLATFORMS
------------------------------------
1. EverLink SRAC Gateway
by Anyware Technology
Platforms: N/A
Relevant URL:
http://www.anywareusa.com/products/srac_gateway.htm
Summary:

EverLink SRAC Gateway is a high performance network appliance that integrates 
many security technologies into a simple network device. Operating at the 
application layer, the Gateway allows enterprises to build fully secured Virtual 
Private Network as easy as PLUG AND PLAY. By incorporating all authentication 
methods, including PKI and dynamic password, the Gateway provides the most 
thorough check of a user's identity. For those who have installed VPNs, the 
Gateway provides enterprises with significant added functionalities and security 
features to instantly accommodate mobile users anywhere in the world.

2. iChain
by Novell
Platforms: N/A
Relevant URL:
http://www.novell.com/products/ichain/
Summary:

iChain provides identity-based web security services that control access to 
application and network resources across technical and organizational 
boundaries, as one Net.

3. NetOp Remote Control
by CrossTec Corporation
Platforms: DOS, Linux, OS/2, Windows 2000, Windows 95/98, Windows CE, Windows 
NT, Windows XP
Relevant URL:
http://www.crossteccorp.com/netopremote/index.html
Summary:

With New NetOp Remote Control v7.5 you can easily reach any Windows, Linux, Sun 
Solaris or legacy OS/2 and DOS PC from your desktop or even via any Internet 
connected PC via our new IE browser Guest. View the remote PC's screen, control 
its keyboard and mouse, synchronize files, inventory its hardware and software, 
launch applications or chat with someone at the remote PC -- just as if you were 
seated at that computer.


V.  NEW TOOLS FOR LINUX PLATFORMS
---------------------------------
eXtended Allow - Deny list for PAM v0.4 by Adrian Ber [EMAIL PROTECTED]
Relevant URL:
http://www.geocities.com/beradrian/soft/xad/index.html
Platforms: Linux, POSIX
Summary:

XAD is a very easy to configure PAM module. Through a very easy language you can 
allow/deny access to users.

2. C-Kermit v8.0.208
by Frank da Cruz
Relevant URL:
http://www.columbia.edu/kermit/ckermit.html
Platforms: AIX, FreeBSD, HP-UX, Linux, MacOS, NetBSD, OpenBSD, SCO, Solaris, 
SunOS
Summary:

C-Kermit is a combined serial and network communication software package 
offering a consistent, medium-independent, cross-platform approach to connection 
establishment, terminal sessions, file transfer, character-set translation, 
numeric and alphanumeric paging, and automation of communication tasks. Recent 
versions include FTP and HTTP clients as well as an SSH interface, all of which 
can be scripted and aware of character-sets. It supports built-in security 
methods, including Kerberos IV, Kerberos V, SSL/TLS, and SRP, FTP protocol 
features such as MLSD, and source-code parity with Kermit 95 2.1 for Windows and 
OS/2.

3. trafcalc v1.0
by cyberny
Relevant URL:
http://trafcalc.sourceforge.net/
Platforms: Linux, POSIX
Summary:

Trafcalc calculates the size of the TCP-payload on a system via packet capturing 
and connection tracking at the user level instead of the IP level.


Posted at TCOB1 - Must not be crossposted to any other echo or network without 
the prior permission of Sean Rima


-
To unsubscribe from this list: send the line "unsubscribe linux-newbie" in
the body of a message to [EMAIL PROTECTED]
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.linux-learn.org/faqs

Reply via email to