LinuxSecurity.com
Share your story
The central voice for Linux and Open Source security news
Home News Topics Advisories HOWTOs Features Newsletters About Register

Welcome!
Sign up!
EnGarde Community
Login
Polls
What is the most important Linux security technology?
 
Advisories
Community
Linux Events
Linux User Groups
Link to Us
Security Center
Book Reviews
Security Dictionary
Security Tips
SELinux
White Papers
Featured Blogs
All About Linux
DanWalsh LiveJournal
Securitydistro
Latest Newsletters
Linux Security Week: September 15th, 2014
Linux Security Week: September 8th, 2014
Subscribe
LinuxSecurity Newsletters
E-mail:
Choose Lists:
About our Newsletters
RSS Feeds
Get the LinuxSecurity news you want faster with RSS
Powered By

  
Linux Advisory Watch: February 25th 2005 Print E-mail
User Rating:      How can I rate this item?
Source: LinuxSecurity.com Contributors - Posted by Benjamin D. Thomas   
Linux Advisory Watch This week, advisories were released for emacs, gftp, bidwatcher, mailman, squid, mod_python, kdeedu, gamin, pcmcia, openssh, postgresql, gimp, midnight commander, gproftpd, cyrus imap, cups, kdelibs, xpdf, uim, cpio, and vim. The distributors include Debian, Fedora, Gentoo, Mandrake, Red Hat, and SuSE.


Internet Productivity Suite: Open Source Security - Trust Internet Productivity Suite's open source architecture to give you the best security and productivity applications available. Collaborating with thousands of developers, Guardian Digital security engineers implement the most technologically advanced ideas and methods into their design. Click to find out more!

VULNERABILITIES IN WEB APPLICATIONS
By Raymond Ankobia

The Internet has made the world smaller. In our routine usage we tend to overlook that "www" really does mean "world wide web" making virtually instant global communication possible. It has altered the rules of marketing and retailing. An imaginative website can give the small company as much impact and exposure as its much larger competitors. In the electronics, books, travel and banking sectors long established retail chains are increasingly under pressure from e-retailers. All this, however, has come at a price ­ ever more inventive and potentially damaging cyber crime. This paper aims to raise awareness by discussing common vulnerabilities and mistakes in web application development. It also considers mitigating factors, strategies and corrective measures.

The Internet has become part and parcel of the corporate agenda. But does the risk of exposing information assets get sufficient management attention? Extension of corporate portals for Business-to Business (B2B) or developments of websites for Business-to-Customer (B2C) transactions have been largely successful. But the task of risk assessing vulnerabilities and the threats to corporate information assets is still avoided by many organisations. The desire to stay ahead of the competition while minimising cost by leveraging technology means the process is driven by pressure to achieve results. What suffers in the end is the application development cycle; - this is achieved without security in mind. Section 1 of this paper introduces the world of e-business and sets the stage for further discussions. Section 2 looks at common vulnerabilities inherent in web application development. Section 3 considers countermeasures and strategies that will minimise, if not eradicate. some of the vulnerabilities. Sections 4 and 5 draw conclusions and look at current trends and future expectations.

The TCP/IP protocol stack, the underlying technology is known for lack of security on many of its layers. Most applications written for use on the Internet use the application layer, traditionally using HTTP on port 80 on most web servers. The HTTP protocol is stateless and does not provide freshness mechanisms for a session between a client and server; hence, many hackers take advantage of these inherent weaknesses. TCP/IP may be reliable in providing delivery of Internet packets, but it does not provide any guarantee of confidentiality, integrity and little identification. As emphasised in [1], Internet packets may traverse several hosts between source and destination addresses. During its journey it can be intercepted by third parties, who may copy, alter or substitute them before final delivery. Failure to detect and prevent attacks in web applications is potentially catastrophic. Attacks are loosely grouped into two types, passive and active. Passive attackers [6] engage in eavesdropping on, or monitoring of, transmissions. Active attacks involve some modification of the data stream or creation of false data streams [6].

Read full feature:
http://www.linuxsecurity.com/content/view/118427/49/

 

LinuxSecurity.com Feature Extras:

Getting to Know Linux Security: File Permissions - Welcome to the first tutorial in the 'Getting to Know Linux Security' series. The topic explored is Linux file permissions. It offers an easy to follow explanation of how to read permissions, and how to set them using chmod. This guide is intended for users new to Linux security, therefore very simple. If the feedback is good, I'll consider creating more complex guides for advanced users. Please let us know what you think and how these can be improved.

The Tao of Network Security Monitoring: Beyond Intrusion Detection - To be honest, this was one of the best books that I've read on network security. Others books often dive so deeply into technical discussions, they fail to provide any relevance to network engineers/administrators working in a corporate environment. Budgets, deadlines, and flexibility are issues that we must all address. The Tao of Network Security Monitoring is presented in such a way that all of these are still relevant.

Encrypting Shell Scripts - Do you have scripts that contain sensitive information like passwords and you pretty much depend on file permissions to keep it secure? If so, then that type of security is good provided you keep your system secure and some user doesn't have a "ps -ef" loop running in an attempt to capture that sensitive info (though some applications mask passwords in "ps" output).

 

Bulletproof Virus Protection - Protect your network from costly security breaches with Guardian Digital’s multi-faceted security applications. More then just an email firewall, on demand and scheduled scanning detects and disinfects viruses found on the network. Click to find out more!

Take advantage of our Linux Security discussion list! This mailing list is for general security-related questions and comments. To subscribe send an e-mail to security-discuss-request@linuxsecurity.com with "subscribe" as the subject.

Thank you for reading the LinuxSecurity.com weekly security newsletter. The purpose of this document is to provide our readers with a quick summary of each week's most relevant Linux security headline.


   Debian
  Debian: New emacs21 packages fix arbitrary code execution
  17th, February, 2005

Updated package.

http://www.linuxsecurity.com/content/view/118356
 
  Debian: New gftp packages fix directory traversal vulnerability
  17th, February, 2005

Updated package.

http://www.linuxsecurity.com/content/view/118362
 
  Debian: New bidwatcher packages fix format string vulnerability
  18th, February, 2005

Updated package.

http://www.linuxsecurity.com/content/view/118384
 
  Debian: New mailman packages really fix several vulnerabilities
  21st, February, 2005

Updated package.

http://www.linuxsecurity.com/content/view/118391
 
  Debian: New squid packages fix denial of service
  23rd, February, 2005

Updated packages.

http://www.linuxsecurity.com/content/view/118411
 
  Debian: New mod_python packages fix information leak
  23rd, February, 2005

Updated packages.

http://www.linuxsecurity.com/content/view/118416
 
   Fedora
  Fedora Core 3 Update: kdeedu-3.3.1-2.3
  17th, February, 2005

Updated package.

http://www.linuxsecurity.com/content/view/118361
 
  Fedora Core 3 Update: selinux-policy-targeted-1.17.30-2.80
  17th, February, 2005

Updated.

http://www.linuxsecurity.com/content/view/118364
 
  Fedora Core 3 Update: policycoreutils-1.18.1-2.9
  17th, February, 2005

Updated.

http://www.linuxsecurity.com/content/view/118365
 
  Fedora Core 3 Update: gamin-0.0.24-1.FC3
  18th, February, 2005

This update fixes a number of annoying bugs in gamin especially the Desktop update problem in the GNOME environment that affected a number of users.

http://www.linuxsecurity.com/content/view/118386
 
  Fedora Core 3 Update: pcmcia-cs-3.2.7-2.2
  21st, February, 2005

Updated package.

http://www.linuxsecurity.com/content/view/118397
 
  Fedora Core 2 Update: gaim-1.1.3-1.FC2
  22nd, February, 2005

Updated package.

http://www.linuxsecurity.com/content/view/118404
 
  Fedora Core 3 Update: gaim-1.1.3-1.FC3
  22nd, February, 2005

Updated package.

http://www.linuxsecurity.com/content/view/118405
 
  Fedora Core 3 Update: openssh-3.9p1-8.0.1
  22nd, February, 2005

This update changes default ssh client configuration so the trusted X11 forwarding is enabled. Untrusted X11 forwarding is not supported by X11 clients and doesn't work with Xinerama.

http://www.linuxsecurity.com/content/view/118406
 
  Fedora Core 3 Update: postgresql-7.4.7-3.FC3.1
  22nd, February, 2005

Updated package.

http://www.linuxsecurity.com/content/view/118407
 
  Fedora Core 2 Update: postgresql-7.4.7-3.FC2.1
  22nd, February, 2005

Updated package.

http://www.linuxsecurity.com/content/view/118408
 
  Fedora Core 2 Update: squid-2.5.STABLE8-1.FC2.1
  22nd, February, 2005

This update fixes CAN-2005-0446 Squid DoS from bad DNS response

http://www.linuxsecurity.com/content/view/118409
 
  Fedora Core 3 Update: squid-2.5.STABLE8-1.FC3.1
  22nd, February, 2005

This update fixes CAN-2005-0446 Squid DoS from bad DNS response

http://www.linuxsecurity.com/content/view/118410
 
  Fedora Core 3 Update: gimp-help-2-0.1.0.7.0.fc3.1
  24th, February, 2005

Updated package.

http://www.linuxsecurity.com/content/view/118424
 
   Gentoo
  Gentoo: Midnight Commander Multiple vulnerabilities
  17th, February, 2005

Midnight Commander contains several format string errors, buffer overflows and one buffer underflow leading to execution of arbitrary code.

http://www.linuxsecurity.com/content/view/118363
 
  Gentoo: Squid Denial of Service through DNS responses
  18th, February, 2005

Squid contains a bug in the handling of certain DNS responses resulting in a Denial of Service.

http://www.linuxsecurity.com/content/view/118382
 
  Gentoo: GProFTPD gprostats format string vulnerability
  18th, February, 2005

gprostats, distributed with GProFTPD, is vulnerable to a format string vulnerability, potentially leading to the execution of arbitrary code.

http://www.linuxsecurity.com/content/view/118383
 
  Gentoo: gFTP Directory traversal vulnerability
  19th, February, 2005

gFTP is vulnerable to directory traversal attacks, possibly leading to the creation or overwriting of arbitrary files.

http://www.linuxsecurity.com/content/view/118388
 
  Gentoo: PuTTY Remote code execution
  21st, February, 2005

PuTTY was found to contain vulnerabilities that can allow a malicious SFTP server to execute arbitrary code on unsuspecting PSCP and PSFTP clients.

http://www.linuxsecurity.com/content/view/118395
 
  Gentoo: Cyrus IMAP Server Multiple overflow vulnerabilities
  23rd, February, 2005

The Cyrus IMAP Server is affected by several overflow vulnerabilities which could potentially lead to the remote execution of arbitrary code.

http://www.linuxsecurity.com/content/view/118417
 
   Mandrake
  Mandrake: Updated cups packages fix
  17th, February, 2005

Previous updates to correct integer overflow issues affecting xpdf overlooked certain conditions when built for a 64 bit platform. (formerly CAN-2004-0888). This also affects applications like cups, that use embedded versions of xpdf. The updated packages are patched to deal with these issues.

http://www.linuxsecurity.com/content/view/118367
 
  Mandrake: Updated gpdf packages fix
  17th, February, 2005

Previous updates to correct integer overflow issues affecting xpdf overlooked certain conditions when built for a 64 bit platform. (formerly CAN-2004-0888). This also affects applications like gpdf, that use embedded versions of xpdf. The updated packages are patched to deal with these issues.

http://www.linuxsecurity.com/content/view/118368
 
  Mandrake: Updated kdelibs packages fix
  17th, February, 2005

A bug in the way kioslave handles URL-encoded newline (%0a) characters before the FTP command was discovered. Because of this, it is possible that a specially crafted URL could be used to execute any ftp command on a remote server, or even send unsolicited email.

http://www.linuxsecurity.com/content/view/118369
 
  Mandrake: Updated KDE packages address
  17th, February, 2005

Updated package.

http://www.linuxsecurity.com/content/view/118370
 
  Mandrake: Updated xpdf packages fix
  17th, February, 2005

Previous updates to correct integer overflow issues affecting xpdf overlooked certain conditions when built for a 64 bit platform. (formerly CAN-2004-0888). This also affects applications that use embedded versions of xpdf. The updated packages are patched to deal with these issues.

http://www.linuxsecurity.com/content/view/118371
 
  Mandrake: Updated PostgreSQL packages
  17th, February, 2005

A number of vulnerabilities were found.

http://www.linuxsecurity.com/content/view/118372
 
  Mandrake: Updated tetex packages fix
  17th, February, 2005

Previous updates to correct integer overflow issues affecting xpdf overlooked certain conditions when built for a 64 bit platform. (formerly CAN-2004-0888). This also affects applications like tetex, that use embedded versions of xpdf. The updated packages are patched to deal with these issues.

http://www.linuxsecurity.com/content/view/118373
 
  Mandrake: Updated uim packages fix
  24th, February, 2005

Takumi ASAKI discovered that uim always trusts environment variables which can allow a local attacker to obtain elevated privileges when libuim is linked against an suid/sgid application. This problem is only exploitable in 'immodule for Qt' enabled Qt applications. The updated packages are patched to fix the problem.

http://www.linuxsecurity.com/content/view/118425
 
  Mandrake: Updated squid packages fix
  24th, February, 2005

The squid developers discovered that a remote attacker could cause squid to crash via certain DNS responses. The updated packages are patched to fix the problem.

http://www.linuxsecurity.com/content/view/118426
 
   Red Hat
  RedHat: Low: cpio security update
  18th, February, 2005

An updated cpio package that fixes a umask bug and supports large files (>2GB) is now available. This update has been rated as having low security impact by the Red Hat Security Response Team

http://www.linuxsecurity.com/content/view/118378
 
  RedHat: Low: imap security update
  18th, February, 2005

Updated imap packages that fix a security issue are now available for Red Hat Enterprise Linux 2.1. This update has been rated as having low security impact by the Red Hat Security Response Team.

http://www.linuxsecurity.com/content/view/118379
 
  RedHat: Low: vim security update
  18th, February, 2005

Updated vim packages that fix a security vulnerability are now available. This update has been rated as having low security impact by the Red Hat Security Response Team.

http://www.linuxsecurity.com/content/view/118380
 
  RedHat: Important: cups security update
  18th, February, 2005

Updated cups packages that fix a security issue are now available. This update has been rated as having important security impact by the Red Hat Security Response Team.

http://www.linuxsecurity.com/content/view/118381
 
  RedHat: Important: kernel security update
  18th, February, 2005

Updated kernel packages that fix several security issues are now available for Red Hat Enterprise Linux 4. This update has been rated as having important security impact by the Red Hat Security Response Team.

http://www.linuxsecurity.com/content/view/118385
 
  RedHat: Moderate: imap security update
  23rd, February, 2005

Updated imap packages to correct a security vulnerability in CRAM-MD5 authentication are now available for Red Hat Enterprise Linux 3. This update has been rated as having moderate security impact by the Red Hat Security Response Team.

http://www.linuxsecurity.com/content/view/118418
 
   SuSE
  SuSE: squid remote denial of service
  22nd, February, 2005

Squid is an Open Source web proxy. A remote attacker was potentially able to crash the Squid web proxy if the log_fqdn option was set to "on" and the DNS replies were manipulated.

http://www.linuxsecurity.com/content/view/118403
 
  SuSE: cyrus-imapd buffer overflows
  24th, February, 2005

This update fixes one-byte buffer overruns in the cyrus-imapd IMAP server package.

http://www.linuxsecurity.com/content/view/118423
 

Only registered users can write comments.
Please login or register.

Powered by AkoComment!

 
< Prev   Next >
    
Partner

 

Latest Features
Peter Smith Releases Linux Network Security Online
Securing a Linux Web Server
Password guessing with Medusa 2.0
Password guessing as an attack vector
Squid and Digest Authentication
Squid and Basic Authentication
Demystifying the Chinese Hacking Industry: Earning 6 Million a Night
Free Online security course (LearnSIA) - A Call for Help
What You Need to Know About Linux Rootkits
Review: A Practical Guide to Fedora and Red Hat Enterprise Linux - Fifth Edition
Yesterday's Edition
Infosec geniuses hack a Canon PRINTER and install DOOM
How network virtualization is used as a security tool
Here's What Hackers Can Do With Your CRM Data
Partner Sponsor

Community | HOWTOs | Blogs | Features | Book Reviews | Networking
 Security Projects |  Latest News |  Newsletters |  SELinux |  Privacy |  Home
 Hardening |   About Us |   Advertise |   Legal Notice |   RSS |   Guardian Digital
(c)Copyright 2014 Guardian Digital, Inc. All rights reserved.