[SECURITY] [DSA 586-1] New ruby packages fix denial of service

2004-11-08 Thread Martin Schulze
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

- --
Debian Security Advisory DSA 586-1 [EMAIL PROTECTED]
http://www.debian.org/security/ Martin Schulze
November 8th, 2004  http://www.debian.org/security/faq
- --

Package: ruby
Vulnerability  : infinite loop
Problem-Type   : remote
Debian-specific: no
CVE ID : CAN-2004-0983

The upstream developers of Ruby have corrected a problem in the CGI
module for this language.  Specially crafted requests could cause an
infinite loop and thus cause the program to eat up cpu cycles.

For the stable distribution (woody) this problem has been fixed in
version ruby_1.6.7-3woody4.

For the unstable distribution (sid) this problem has been fixed in
version 1.6.8-12 of ruby1.6 and in version 1.8.1+1.8.2pre2-4 of
ruby1.8.

We recommend that you upgrade your ruby packages.


Upgrade Instructions
- 

wget url
will fetch the file for you
dpkg -i file.deb
will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
will update the internal database
apt-get upgrade
will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.


Debian GNU/Linux 3.0 alias woody
- 

  Source archives:

http://security.debian.org/pool/updates/main/r/ruby/ruby_1.6.7-3woody4.dsc
  Size/MD5 checksum:  909 199360fc56e90c03e2db35898539962f

http://security.debian.org/pool/updates/main/r/ruby/ruby_1.6.7-3woody4.diff.gz
  Size/MD5 checksum:43409 c4c76a272d9d57142b2376146bc57297
http://security.debian.org/pool/updates/main/r/ruby/ruby_1.6.7.orig.tar.gz
  Size/MD5 checksum:   996835 a8859c679ee9acbfdf5056cdf26fcad3

  Architecture independent components:


http://security.debian.org/pool/updates/main/r/ruby/irb_1.6.7-3woody4_all.deb
  Size/MD5 checksum:51190 b6580615493b7f8c808f4f5eb515f477

http://security.debian.org/pool/updates/main/r/ruby/ruby-elisp_1.6.7-3woody4_all.deb
  Size/MD5 checksum:30256 88bcceab112fe1bcd53257744131eae1

http://security.debian.org/pool/updates/main/r/ruby/ruby-examples_1.6.7-3woody4_all.deb
  Size/MD5 checksum:37868 0cf747524848e0d2efa3645fb7c92689

  Alpha architecture:


http://security.debian.org/pool/updates/main/r/ruby/libcurses-ruby_1.6.7-3woody4_alpha.deb
  Size/MD5 checksum:   129432 3cbff5f492c63cdc9f8fb4d024545ea1

http://security.debian.org/pool/updates/main/r/ruby/libdbm-ruby_1.6.7-3woody4_alpha.deb
  Size/MD5 checksum:   128536 c81d37ad31fff057cf78609483e7271a

http://security.debian.org/pool/updates/main/r/ruby/libgdbm-ruby_1.6.7-3woody4_alpha.deb
  Size/MD5 checksum:   129916 3719a9eb879e07a1e57b3296008f6f69

http://security.debian.org/pool/updates/main/r/ruby/libnkf-ruby_1.6.7-3woody4_alpha.deb
  Size/MD5 checksum:   134810 0f9dd8734048519d8b5e0816390c2378

http://security.debian.org/pool/updates/main/r/ruby/libpty-ruby_1.6.7-3woody4_alpha.deb
  Size/MD5 checksum:   131850 8e272284f74f85a3d3eebdc913770658

http://security.debian.org/pool/updates/main/r/ruby/libreadline-ruby_1.6.7-3woody4_alpha.deb
  Size/MD5 checksum:   128418 b733779d7cd49e56b5d66aebd19f37e7

http://security.debian.org/pool/updates/main/r/ruby/libruby_1.6.7-3woody4_alpha.deb
  Size/MD5 checksum:   644334 87212bd04df1281c6a1d1a4193224c78

http://security.debian.org/pool/updates/main/r/ruby/libsdbm-ruby_1.6.7-3woody4_alpha.deb
  Size/MD5 checksum:   132306 9ad79ac47ca27342fd43067f401d8022

http://security.debian.org/pool/updates/main/r/ruby/libsyslog-ruby_1.6.7-3woody4_alpha.deb
  Size/MD5 checksum:   128898 2e1a420e607eb122b44d4569ed78b62d

http://security.debian.org/pool/updates/main/r/ruby/libtcltk-ruby_1.6.7-3woody4_alpha.deb
  Size/MD5 checksum:   147450 2dd530d288433af42f4ab618d6fca175

http://security.debian.org/pool/updates/main/r/ruby/libtk-ruby_1.6.7-3woody4_alpha.deb
  Size/MD5 checksum:   161412 bb9d3de7e3762fae64988cdb32058542

http://security.debian.org/pool/updates/main/r/ruby/ruby_1.6.7-3woody4_alpha.deb
  Size/MD5 checksum:   142598 06bb7a48e88f88b1181f84ea5afdc6f0

http://security.debian.org/pool/updates/main/r/ruby/ruby-dev_1.6.7-3woody4_alpha.deb
  Size/MD5 checksum:   625952 d061059d60fbba454b4fecb82a379142

  ARM architecture:


http://security.debian.org/pool/updates/main/r/ruby/libcurses-ruby_1.6.7-3woody4_arm.deb
  Size/MD5 checksum:   128410 9e3bd9c043823c09cc125147c822895c

http://security.debian.org/pool/updates/main/r/ruby/libdbm-ruby_1.6.7-3woody4_arm.deb
  Size/MD5 checksum:   127288 aa864c4c7f530ccf721c9fd93f099dc8


[SECURITY] [DSA 587-1] New freeam packages fix arbitrary code execution

2004-11-08 Thread Martin Schulze
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

- --
Debian Security Advisory DSA 587-1 [EMAIL PROTECTED]
http://www.debian.org/security/ Martin Schulze
November 8th, 2004  http://www.debian.org/security/faq
- --

Package: freeamp
Vulnerability  : buffer overflow
Problem-Type   : remote
Debian-specific: no
CVE ID : CAN-2004-0964

Luigi Auriemma discovered a buffer overflow condition in the playlist
module of freeamp which could lead to arbitrary code execution.
Recent versions of freeamp were renamed into zinf.

For the stable distribution (woody) this problem has been fixed in
version 2.1.1.0-4woody2.

For the unstable distribution (sid) this problem does not exist in the
zinf packageas the code in question was rewritten.

We recommend that you upgrade your freeamp packages.


Upgrade Instructions
- 

wget url
will fetch the file for you
dpkg -i file.deb
will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
will update the internal database
apt-get upgrade
will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.


Debian GNU/Linux 3.0 alias woody
- 

  Source archives:


http://security.debian.org/pool/updates/main/f/freeamp/freeamp_2.1.1.0-4woody2.dsc
  Size/MD5 checksum:  944 39d51f9def21f5b1d5542ccbcbc01e29

http://security.debian.org/pool/updates/main/f/freeamp/freeamp_2.1.1.0-4woody2.diff.gz
  Size/MD5 checksum:32347 783b34ce5201a8e4e10a8722fd00ad8f

http://security.debian.org/pool/updates/main/f/freeamp/freeamp_2.1.1.0.orig.tar.gz
  Size/MD5 checksum:  3116888 d465da9fcdcc6ee7991e9b6cd968127b

  Architecture independent components:


http://security.debian.org/pool/updates/main/f/freeamp/freeamp-doc_2.1.1.0-4woody2_all.deb
  Size/MD5 checksum:   282330 ffb91e1362db38b0e063839afdb7eefa

  Alpha architecture:


http://security.debian.org/pool/updates/main/f/freeamp/freeamp_2.1.1.0-4woody2_alpha.deb
  Size/MD5 checksum:  2399962 187f779ad3fa78a1bcb6f79837a733ba

http://security.debian.org/pool/updates/main/f/freeamp/freeamp-extras_2.1.1.0-4woody2_alpha.deb
  Size/MD5 checksum:90476 d184dd97abf70f5db80579e76bdca43a

http://security.debian.org/pool/updates/main/f/freeamp/libfreeamp-alsa_2.1.1.0-4woody2_alpha.deb
  Size/MD5 checksum:34752 97704f6cd7245b6821d4683ee7999015

http://security.debian.org/pool/updates/main/f/freeamp/libfreeamp-esound_2.1.1.0-4woody2_alpha.deb
  Size/MD5 checksum:33376 77bbee46f4b02464e387d40fd850fac9

  ARM architecture:


http://security.debian.org/pool/updates/main/f/freeamp/freeamp_2.1.1.0-4woody2_arm.deb
  Size/MD5 checksum:  2194684 c37e64837c2353be71062e9c74934028

http://security.debian.org/pool/updates/main/f/freeamp/freeamp-extras_2.1.1.0-4woody2_arm.deb
  Size/MD5 checksum:82794 6e6e0079c0f912c6aba7e3a73bc7963d

http://security.debian.org/pool/updates/main/f/freeamp/libfreeamp-alsa_2.1.1.0-4woody2_arm.deb
  Size/MD5 checksum:29440 615324c7d033b4c327a883239b5afe9c

http://security.debian.org/pool/updates/main/f/freeamp/libfreeamp-esound_2.1.1.0-4woody2_arm.deb
  Size/MD5 checksum:29342 d745a17d3a3c59dd6d004babcfa7563b

  Intel IA-32 architecture:


http://security.debian.org/pool/updates/main/f/freeamp/freeamp_2.1.1.0-4woody2_i386.deb
  Size/MD5 checksum:  2032164 5c68a2b2940d9bfa3f5f3320f9a85d5b

http://security.debian.org/pool/updates/main/f/freeamp/freeamp-extras_2.1.1.0-4woody2_i386.deb
  Size/MD5 checksum:73482 091fe47ddd9308edcd2df707b00fefc8

http://security.debian.org/pool/updates/main/f/freeamp/libfreeamp-alsa_2.1.1.0-4woody2_i386.deb
  Size/MD5 checksum:29382 3b22fa0992c89e05542d06b78ca263df

http://security.debian.org/pool/updates/main/f/freeamp/libfreeamp-esound_2.1.1.0-4woody2_i386.deb
  Size/MD5 checksum:28476 0142da2d0ed0d50e7fe454171d7066da

  Intel IA-64 architecture:


http://security.debian.org/pool/updates/main/f/freeamp/freeamp_2.1.1.0-4woody2_ia64.deb
  Size/MD5 checksum:  2367142 c43140e99b8dd87934e9611a060fe1bc

http://security.debian.org/pool/updates/main/f/freeamp/freeamp-extras_2.1.1.0-4woody2_ia64.deb
  Size/MD5 checksum:84638 6e55107e3071f451b08d77aed3260d44

http://security.debian.org/pool/updates/main/f/freeamp/libfreeamp-esound_2.1.1.0-4woody2_ia64.deb
  Size/MD5 checksum:27532 84b0e8df2b31326b378ce79e404ec4cd

  HP Precision architecture:


http://security.debian.org/pool/updates/main/f/freeamp/freeamp_2.1.1.0-4woody2_hppa.deb
  Size/MD5 checksum:  2184294 

[SECURITY] [DSA 588-1] New gzip packages fix insecure temporary files

2004-11-08 Thread Martin Schulze
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

- --
Debian Security Advisory DSA 588-1 [EMAIL PROTECTED]
http://www.debian.org/security/ Martin Schulze
November 8th, 2004  http://www.debian.org/security/faq
- --

Package: gzip
Vulnerability  : insecure temporary files
Problem-Type   : local
Debian-specific: no
CVE ID : CAN-2004-0970
BugTraq ID : 11288

Trustix developers discovered insecure temporary file creation in
supplemental scripts in the gzip package which may allow local users
to overwrite files via a symlink attack.

For the stable distribution (woody) these problems have been fixed in
version 1.3.2-3woody3.

The unstable distribution (sid) is not affected by these problems.

We recommend that you upgrade your gzip package.


Upgrade Instructions
- 

wget url
will fetch the file for you
dpkg -i file.deb
will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
will update the internal database
apt-get upgrade
will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.


Debian GNU/Linux 3.0 alias woody
- 

  Source archives:

http://security.debian.org/pool/updates/main/g/gzip/gzip_1.3.2-3woody3.dsc
  Size/MD5 checksum:  577 3b5fd05de61de0a41973facf1edc6692

http://security.debian.org/pool/updates/main/g/gzip/gzip_1.3.2-3woody3.diff.gz
  Size/MD5 checksum: 6371 cdb2a28b380ba84bae2c652eb156ca5a
http://security.debian.org/pool/updates/main/g/gzip/gzip_1.3.2.orig.tar.gz
  Size/MD5 checksum:   311011 57bff96b6b4bcbb060566bdbed29485d

  Alpha architecture:


http://security.debian.org/pool/updates/main/g/gzip/gzip_1.3.2-3woody3_alpha.deb
  Size/MD5 checksum:76456 3b8b2991a66b675198febc281ca59e84

  ARM architecture:


http://security.debian.org/pool/updates/main/g/gzip/gzip_1.3.2-3woody3_arm.deb
  Size/MD5 checksum:68776 c049ef9bec9ac21c99c1f7eefc6ceb2e

  Intel IA-32 architecture:


http://security.debian.org/pool/updates/main/g/gzip/gzip_1.3.2-3woody3_i386.deb
  Size/MD5 checksum:62076 536b666d29bcc648a1f105b3e5ef0708

  Intel IA-64 architecture:


http://security.debian.org/pool/updates/main/g/gzip/gzip_1.3.2-3woody3_ia64.deb
  Size/MD5 checksum:86840 dd973820227968197c4da091db22bf18

  HP Precision architecture:


http://security.debian.org/pool/updates/main/g/gzip/gzip_1.3.2-3woody3_hppa.deb
  Size/MD5 checksum:72594 70eb93310c314cd923091c93e0eded97

  Motorola 680x0 architecture:


http://security.debian.org/pool/updates/main/g/gzip/gzip_1.3.2-3woody3_m68k.deb
  Size/MD5 checksum:61278 a47c8230f4f721e2a1adc6545aa25198

  Big endian MIPS architecture:


http://security.debian.org/pool/updates/main/g/gzip/gzip_1.3.2-3woody3_mips.deb
  Size/MD5 checksum:71762 68707f5373f065430d43cd2700902b60

  Little endian MIPS architecture:


http://security.debian.org/pool/updates/main/g/gzip/gzip_1.3.2-3woody3_mipsel.deb
  Size/MD5 checksum:71660 50646d0590343e2b90dc9f32fade4d54

  PowerPC architecture:


http://security.debian.org/pool/updates/main/g/gzip/gzip_1.3.2-3woody3_powerpc.deb
  Size/MD5 checksum:69280 9f49c09ec45ae1d4135e384e94914b72

  IBM S/390 architecture:


http://security.debian.org/pool/updates/main/g/gzip/gzip_1.3.2-3woody3_s390.deb
  Size/MD5 checksum:66726 c2a0ca55f66fa0a6631756fc68d14b8d

  Sun Sparc architecture:


http://security.debian.org/pool/updates/main/g/gzip/gzip_1.3.2-3woody3_sparc.deb
  Size/MD5 checksum:70298 88378dc40c8e762b97da5a16058190af


  These files will probably be moved into the stable distribution on
  its next update.

- 
-
For apt-get: deb http://security.debian.org/ stable/updates main
For dpkg-ftp: ftp://security.debian.org/debian-security 
dists/stable/updates/main
Mailing list: [EMAIL PROTECTED]
Package info: `apt-cache show pkg' and http://packages.debian.org/pkg

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.2.5 (GNU/Linux)

iD8DBQFBj5IwW5ql+IAeqTIRAoYJAJ41JFb6u0yuf2fomIzGcYNNPgrkIACgmfz/
ljBz6K9A7PBxJLYAzXHFUbc=
=L+Am
-END PGP SIGNATURE-


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: TCP SYN packets which have the FIN flag set.

2004-11-08 Thread George Georgalis
On Mon, Nov 08, 2004 at 09:36:43AM +0100, Giacomo Mulas wrote:
On Fri, 5 Nov 2004, George Georgalis wrote:

and for anybody who is interested, I've found the limit function works
well to manage logging and types of deny.

 -m limit --limit-burst 50 --limit 1/s

At the end of my NEW ACCEPT set, I call a chain that, within the
limit, logs and rejects remaining connections, beyond the limit it
returns. the next two rules log some (with limit again) of the remaining
connections and drops them all. The setup gives a balance between the
problems of logging and rejecting everything bad and just dropping
everything bad.

Doesn't that open the possibility for a DOS, simply by sending a stream of 
new attempted connections to your computers? Then this would continuously 
saturate the rate of new attempted connections, and your legitimate 
connections would be virtually impossible. Or is the netfilter limit code 
as smart as to use separate limits to separate source IP numbers?

Unfortunately the limit function doesn't easily apply
to specific ip addresses (I think there is a way to do
it but it's not easy and I don't know how).

and a stream of new connections will dos me. :)

Maybe I wasn't clear, I don't limit good connections.
(though it might be a good idea to limit port 80 to
a rate my apache can sustain, otherwise route to a
lightweight httpd that responds with try again later).

I'm using limit for REJECT of bad connections when
they connect, when the limit is reached I stop
rejecting the bad ones and just DROP them.

for logging, I log the rejected ones but only some
of the dropped ones.

REJECT means I respond, DROP means the client may
continue to try until it times out, So generally
there is less bandwidth with REJECT, unless you
are being attacked, then there is less with DROP.

and for certain abusive subnets I request that
they be dropped (or whatever) at my ISP router.

// George


-- 
George Georgalis, systems architect, administrator Linux BSD IXOYE
http://galis.org/george/ cell:646-331-2027 mailto:[EMAIL PROTECTED]


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: [SECURITY] [DSA 588-1] New gzip packages fix insecure temporary files

2004-11-08 Thread Andrew Jackson
all updated.


platypus.netregistry.net: gzip 1.3.2-3woody3
mix.netregistry.net: gzip 1.3.2-3woody3
www.jp.com: gzip not installed
cthulhu.netregistry.net: gzip 1.3.2-3woody3
caelum.netregistry.net: gzip 1.3.2-3woody3
proxy.netregistry.net: gzip 1.3.2-3woody3
asp.netregistry.net: gzip 1.3.2-3woody3
ws-1.netregistry.net: gzip 1.3.2-3woody3
ws-2.netregistry.net: gzip 1.3.2-3woody3
ws-3.netregistry.net: gzip 1.3.2-3woody3
lb1.netregistry.net: gzip 1.3.2-3woody3
lb2.netregistry.net: gzip 1.3.2-3woody3
ns.au.com: gzip 1.3.2-3woody3
ns2.au.com: gzip 1.3.2-3woody3
redirector.netregistry.net: gzip 1.3.2-3woody3
mail.netregistry.net: gzip 1.3.2-3woody3
mx1.au.com: gzip 1.3.2-3woody3
mx-1.netregistry.net: gzip 1.3.2-3woody3
mx-2.netregistry.net: gzip 1.3.2-3woody3
mx1.netregistry.net: gzip 1.3.2-3woody3
webmail.netregistry.net: gzip 1.3.2-3woody3
theconsole.netregistry.net: gzip 1.3.2-3woody3
azathoth.nro.au.com: gzip 1.3.2-3woody3
smarthost.nro.au.com: gzip not installed
logs.netregistry.net: gzip 1.3.2-3woody3
pop3-1.netregistry.net: gzip 1.3.2-3woody3
pop3-2.netregistry.net: gzip 1.3.2-3woody3
support.netregistry.net: gzip 1.3.5-9




On Tue, 2004-11-09 at 02:35, Martin Schulze wrote:
 -BEGIN PGP SIGNED MESSAGE-
 Hash: SHA1
 
 - --
 Debian Security Advisory DSA 588-1 [EMAIL PROTECTED]
 http://www.debian.org/security/ Martin Schulze
 November 8th, 2004  http://www.debian.org/security/faq
 - --
 
 Package: gzip
 Vulnerability  : insecure temporary files
 Problem-Type   : local
 Debian-specific: no
 CVE ID : CAN-2004-0970
 BugTraq ID : 11288
 
 Trustix developers discovered insecure temporary file creation in
 supplemental scripts in the gzip package which may allow local users
 to overwrite files via a symlink attack.
 
 For the stable distribution (woody) these problems have been fixed in
 version 1.3.2-3woody3.
 
 The unstable distribution (sid) is not affected by these problems.
 
 We recommend that you upgrade your gzip package.
 
 
 Upgrade Instructions
 - 
 
 wget url
 will fetch the file for you
 dpkg -i file.deb
 will install the referenced file.
 
 If you are using the apt-get package manager, use the line for
 sources.list as given below:
 
 apt-get update
 will update the internal database
 apt-get upgrade
 will install corrected packages
 
 You may use an automated update by adding the resources from the
 footer to the proper configuration.
 
 
 Debian GNU/Linux 3.0 alias woody
 - 
 
   Source archives:
 
 http://security.debian.org/pool/updates/main/g/gzip/gzip_1.3.2-3woody3.dsc
   Size/MD5 checksum:  577 3b5fd05de61de0a41973facf1edc6692
 
 http://security.debian.org/pool/updates/main/g/gzip/gzip_1.3.2-3woody3.diff.gz
   Size/MD5 checksum: 6371 cdb2a28b380ba84bae2c652eb156ca5a
 http://security.debian.org/pool/updates/main/g/gzip/gzip_1.3.2.orig.tar.gz
   Size/MD5 checksum:   311011 57bff96b6b4bcbb060566bdbed29485d
 
   Alpha architecture:
 
 
 http://security.debian.org/pool/updates/main/g/gzip/gzip_1.3.2-3woody3_alpha.deb
   Size/MD5 checksum:76456 3b8b2991a66b675198febc281ca59e84
 
   ARM architecture:
 
 
 http://security.debian.org/pool/updates/main/g/gzip/gzip_1.3.2-3woody3_arm.deb
   Size/MD5 checksum:68776 c049ef9bec9ac21c99c1f7eefc6ceb2e
 
   Intel IA-32 architecture:
 
 
 http://security.debian.org/pool/updates/main/g/gzip/gzip_1.3.2-3woody3_i386.deb
   Size/MD5 checksum:62076 536b666d29bcc648a1f105b3e5ef0708
 
   Intel IA-64 architecture:
 
 
 http://security.debian.org/pool/updates/main/g/gzip/gzip_1.3.2-3woody3_ia64.deb
   Size/MD5 checksum:86840 dd973820227968197c4da091db22bf18
 
   HP Precision architecture:
 
 
 http://security.debian.org/pool/updates/main/g/gzip/gzip_1.3.2-3woody3_hppa.deb
   Size/MD5 checksum:72594 70eb93310c314cd923091c93e0eded97
 
   Motorola 680x0 architecture:
 
 
 http://security.debian.org/pool/updates/main/g/gzip/gzip_1.3.2-3woody3_m68k.deb
   Size/MD5 checksum:61278 a47c8230f4f721e2a1adc6545aa25198
 
   Big endian MIPS architecture:
 
 
 http://security.debian.org/pool/updates/main/g/gzip/gzip_1.3.2-3woody3_mips.deb
   Size/MD5 checksum:71762 68707f5373f065430d43cd2700902b60
 
   Little endian MIPS architecture:
 
 
 http://security.debian.org/pool/updates/main/g/gzip/gzip_1.3.2-3woody3_mipsel.deb
   Size/MD5 checksum:71660 50646d0590343e2b90dc9f32fade4d54
 
   PowerPC architecture:
 
 
 http://security.debian.org/pool/updates/main/g/gzip/gzip_1.3.2-3woody3_powerpc.deb
   Size/MD5 checksum:69280 9f49c09ec45ae1d4135e384e94914b72
 
   IBM S/390 architecture: