Résumé de securityfocus: contient les attaques connues contre des
logiciels libres ou open source, voire parfois contre du `matériel'
(firmware). Les problèmes avec des logiciels écrits en PHP ne sont en
général pas mentionnés (il y en a des dizaines chaque semaine, donc ...) 

MIT CGIEmail Arbitrary Recipient Mail Relay Vulnerability
BugTraq ID: 5013
Remote: Yes
Date Published: Jun 14 2002 12:00A
Relevant URL:
http://www.securityfocus.com/bid/5013
Summary:

MIT cgiemail is designed to take the input of web forms and convert it to
an e-mail format defined by the author of the form. It was written for use
on UNIX and Linux variant operating systems.

A vulnerability has been reported for cgiemail that allows cgiemail to act
as an open relay for email. The vulnerability is due to failure of proper
santization of user supplied values. In particular the new line code "%0a"
is not filtered properly.

cgiemail uses templates when generating emails. To exploit this issue, an
attacker must know the exact path of a template file that cgiemail uses.
As well, the attacker must know of the fields that will be included in the
generated email.

As a result, a malicious user may trivially specify any email address,
effectively using the script as an open mail relay. This technique is well
known, and commonly used for sending unsolicited email.

Multiple Vendor Spoofed IGMP Report Denial Of Service Vulnerability
BugTraq ID: 5020
Remote: Yes
Date Published: Jun 14 2002 12:00A
Relevant URL:
http://www.securityfocus.com/bid/5020
Summary:

Internet Group Management Protocol (IGMP) is the specified guidelines for
the management of Internet Multicast Routing management.

A problem with the implementation of the protocol in some operating
systems could lead to a denial of service.

It is possible for an arbitrary host to deny service to a system on the
same segment of network.  In a situation where a multicast router sends a
membership report request, a host sending a unicast membership report
response to the primary responder can prevent the responder from sending a
message to the multicast router.  In doing so, the router will not receive
a response from any host, and thus the transmission will time out and
cease.

This problem could result in an attacker launching a denial of service
against an affected host, and could additionally be used to deny service
to a range of vulnerable hosts on a subnet.

This vulnerability may additionally affect other operating systems, though
it is currently unknown which implementations may be vulnerable.

Apache Chunked-Encoding Memory Corruption Vulnerability
BugTraq ID: 5033
Remote: Yes
Date Published: Jun 17 2002 12:00A
Relevant URL:
http://www.securityfocus.com/bid/5033
Summary:

Apache is a freely available webserver for Unix and Linux variants, as
well as Microsoft operating systems.

The HTTP protocol specifies a method of data coding called 'Chunked
Encoding', designed to facilitate fragmentation of HTTP requests in
transit.  A vulnerability has been discovered in the Apache implementation
of 'Chunked Encoding'.

When processing requests coded with the 'Chunked Encoding' mechanism,
Apache fails to properly calculate required buffer sizes.  This may be due
to improper (signed) interpretation of an unsigned integer value.

Consequently, several conditions may occur that have security
implications.  It has been reported that a buffer overrun and signal race
condition occur.  Exploitation of these conditions may result in the
execution of arbitrary code.

On Windows and Netware platforms, Apache uses threads within a single
server process to handle concurrent connections.  Causing the server
process to crash on these platforms may result in a denial of service.

It has been confirmed that this vulnerability may be exploited to execute
arbitrary code on both Win32 and UNIX platforms.

Note: Products which use or bundle Apache such as Oracle 9iAS or IBM
Websphere may also be affected.

Zyxel Prestige 642R Malformed Packet Denial Of Service Vulnerability
BugTraq ID: 5034
Remote: Yes
Date Published: Jun 17 2002 12:00A
Relevant URL:
http://www.securityfocus.com/bid/5034
Summary:

ZyXEL 642R routers have difficulties handling packets with certain TCP
options enabled.  In particular, it is possible to deny services by
sending a vulnerable router a SYN-ACK packet.  This type of malformed
packet will create a denial of service which can only be remedied by
restarting the device.  To a lesser degree, the router also encounters
difficulties when handling SYN-FIN packets.  SYN-FIN packets have been
reported to deny service for the duration of a few minutes.  This issue
has also been reproduced with other types of malformed packets.

In both instances, some services provided by the router (telnet, FTP and
DHCP) will be denied, however, the device will continue to route network
traffic.

ZyXEL 642R-11 routers are reportedly affected by this vulnerability.  It
is possible that other ZyNOS-based routers are also affected by this
vulnerability.  ZxXEL 643 ADSL routers do not appear to be prone to this
issue.

This issue may be exploited in combination with the vulnerability
described in Bugtraq ID 3346.

[ hardware ]

NetGear RP114 Administrative Access Via External Interface Vulnerability
BugTraq ID: 5036
Remote: Yes
Date Published: Jun 17 2002 12:00A
Relevant URL:
http://www.securityfocus.com/bid/5036
Summary:

The NetGear RP114 router includes administrative support through a variety
of mechanisms, including telnet and HTTP. Access to administration tools
is granted to systems with the address 192.168.0.1, reserved for use on
internal networks.

Reportedly, the RP114 router will accept traffic from addresses in the
192.168.x.x range on it's external interface. An attacker external to the
router may be able to connect to the device from this IP, and access the
administrative interface. An attacker may be able to gain access to
sensitive information, or to create a denial of service condition for
legitimate users of the router.

Authentication is still required, however the device has a commonly known
default username of 'admin' with the password '1234'.

Other related devices may share this vulnerability, this has not however
been confirmed.

[ hardware ]

Successful exploitation may gain the attacker local access on the affected
host.

Cisco uBR7200 / uBR7100 Universal Broadband Routers DOCSIS MIC Bypass Vulnerability
BugTraq ID: 5041
Remote: Yes
Date Published: Jun 17 2002 12:00A
Relevant URL:
http://www.securityfocus.com/bid/5041
Summary:

A vulnerability has been announced which affects Cisco uBR7200 series and
uBR7100 series Universal Broadband Routers under some versions of IOS.

It is possible to sign DOCSIS configuration files with a Message Integrity
Check (MIC) signature. Based on MD5, this provides a cryptographically
secure signing of the configuration file. It is possible for networks to
reject cable modem devices which do not have a properly signed file.

It is possible to create an invalid DOCSIS file which is truncated and
does not include a MIC signature. Vulnerable routers may nonetheless
accept the configuration file as valid, allowing access to the network.

Malicious cable modem users may create DOCSIS files with arbitrary
configurations, possibly allowing them to bypass limitations such as
bandwith consumption restrictions. Exploitation of this vulnerability may
allow these configuration files to be accepted by the network.

This issue is documented as Cisco Defect number CSCdx72740.

[ hardware ]

Interbase GDS_Drop Interbase Environment Variable Buffer Overflow Vulnerability
BugTraq ID: 5044
Remote: No
Date Published: Jun 18 2002 12:00A
Relevant URL:
http://www.securityfocus.com/bid/5044
Summary:

Interbase is a database distributed and maintained by Borland.  It is
available for Unix and Linux operating systems.

A problem with Interbase could make it possible for a local user to gain
elevated privileges.

A buffer overflow has been discovered in the setuid root gds_drop program
packaged with Interbase.  This problem could allow a local user to execute
the program with strings of arbitrary length.  By using a custom crafted
string, the attacker could overwrite stack memory, including the return
address of a function, and potentially execute arbitrary code as root.

The vulnerability occurs in the INTERBASE environment variable.  When the
gds_drop program is executed with a string of arbitrary length (typically
500 or more characters) in the INTERBASE environment variable, the result
in an exploitable buffer overflow.

This could make it possible for a local user to gain administrative
access.

[ open source ]

Interbase GDS_Lock_MGR Interbase Environment Variable Buffer Overflow Vulnerability
BugTraq ID: 5046
Remote: No
Date Published: Jun 18 2002 12:00A
Relevant URL:
http://www.securityfocus.com/bid/5046
Summary:

Interbase is a database distributed and maintained by Borland.  It is
available for Unix and Linux operating systems.

A problem with Interbase could make it possible for a local user to gain
elevated privileges.

A buffer overflow has been discovered in the setuid root program
gds_lock_mgr, packaged with Interbase.  This problem could allow a local
user to execute the program with strings of arbitrary length.  By using a
custom crafted string, the attacker could overwrite stack memory,
including the return address of a function, and potentially execute
arbitrary code as root.

The vulnerability occurs in the INTERBASE environment variable.  When the
gds_lock_mgr program is executed with a string of arbitrary length
(typically 500 or more bytes) in the INTERBASE environment variable, the
result in an exploitable buffer overflow.

This could make it possible for a local user to gain administrative
access.

[ open source ]

WebScripts WebBBS Remote Command Execution Vulnerability
BugTraq ID: 5048
Remote: Yes
Date Published: Jun 18 2002 12:00A
Relevant URL:
http://www.securityfocus.com/bid/5048
Summary:

WebBBS is web-based BBS software, written in Perl.  WebBBS was designed to
run on Unix and Linux variants.

WebBBS does not sufficiently filter shell metacharacters from CGI
parameters.  As a result, remote attackers may execute arbitrary commands
on the underlying shell of the system hosting the vulnerable software.
This issue is known to exist in the 'webbbs_post.pl' script and is due to
insufficient filtering of the 'followup' CGI variable.

Remote attackers may gain local, interactive access to the host with the
privileges of the webserver process as a result of successful
exploitation.

Mandrake 8.2 Msec Insecure Default Permissions Vulnerability
BugTraq ID: 5050
Remote: No
Date Published: Jun 18 2002 12:00A
Relevant URL:
http://www.securityfocus.com/bid/5050
Summary:

Mandrake ships with an interface for setting and maintaining system-wide
security policy during an install of the operating system.  This
functionality is provided by the Mandrake-Security package (msec).
Various settings provide differing levels of security.

The Mandrake 8.2 version of msec installs home directories with
world-readable permissions on the Standard security setting.  This is
misleading as the Standard (msec level 2) security setting is intended to
be ideal for systems which have multiple local users.  This may expose
contents of home directories to other local users.  Additionally, msec
will proactively reset the permissions of home directories if they are
changed from the default world-readable permissions.

msec is a mandatory component of Mandrake 8.2 and may not be deselected
during an install of the operating system.

It should be noted that it is still possible to ensure more secure home
directory permissions by using a more restrictive msec setting.

Apache Tomcat  Web Root Path Disclosure Vulnerability
BugTraq ID: 5054
Remote: Yes
Date Published: Jun 19 2002 12:00A
Relevant URL:
http://www.securityfocus.com/bid/5054
Summary:

Apache Tomcat is a freely available, open source web server maintained by
the Apache Foundation. It is available for use on Unix and Linux variants
as well as Microsoft Windows operating environments.

A vulnerability has been reported for Apache Tomcat 4.0.3 on a Microsoft
Windows platform. Reportedly, it is possible for a remote attacker to make
requests that will result in Apache Tomcat returning an error page
containing information that includes the absolute path to the server's web
root.

For example, submitting a request for LPT9 to Tomcat will result in the
following error message: "java.io.FileNotFoundException: C:\Program
Files\Apache Tomcat 4.0\webapps\ROOT\lpt9 (The system cannot find the file
specified)"

Gaining knowledge of path information could assist an attacker in further
attacks against the host.

IRSSI Long Malformed Topic Denial Of Service Vulnerability
BugTraq ID: 5055
Remote: Yes
Date Published: Jun 19 2002 12:00A
Relevant URL:
http://www.securityfocus.com/bid/5055
Summary:

irssi is a freely available, open source irc client. irssi is available
for the Linux and Unix operating systems.

irssi version 0.8.4 is prone to a denial of service condition when a user
joins a channel with a long, malformed topic.  The vulnerability occurs
when a user attempts to join a channel that has an overly long topic
description. When the string, "\x1b\x5b\x30\x6d\x0d\x0a", is appended to
the topic, irssi will crash resulting in a denial of service.

An attacker can cause irssi clients to crash by changing the topic of a
channel while users are still online or by enticing users to join channels
with malformed topic descriptions.

An attacker may take advantage of this vulnerability to deny service to
legitimate users.


-
Pour poster une annonce: [EMAIL PROTECTED]

Répondre à