This week, advisories were released for krb5, heimdal, phpgadmin, ekg, heartbeat, affix, zlib, cacti, java, diskdumputils, radvd, bind, kdelibs, freeradius, firefox, thunderbird, ypserv, mysql, setarch, openoffice, pvm, fetchmail, mozilla, epiphany, devhelp, yelp, php, ruby, acroread, phpgroupware, dhcpd, mediawiki, cpio, shorewall, and kdenetwork. The distributors include Debian, Fedora, Gentoo, and Red Hat.


Internet Productivity Suite: Open Source Security - Trust Internet Productivity Suite's open source architecture to give you the best security and productivity applications available. Collaborating with thousands of developers, Guardian Digital security engineers implement the most technologically advanced ideas and methods into their design.


Network Server Monitoring With Nmap
By: Pax Dickinson

Portscanning, for the uninitiated, involves sending connection requests to a remote host to determine what ports are open for connections and possibly what services they are exporting. Portscanning is the first step a hacker will take when attempting to penetrate your system, so you should be preemptively scanning your own servers and networks to discover vulnerabilities before someone unfriendly gets there first.

Any open ports that are unnecessary for proper system operation should be closed. Every open port is a possible access point for an unauthorized user, and every service accepting connections from the world could have a vulnerability. Even if you are diligent about applying patches, any unnecessarily running service is still a window an attacker could possibly climb through.

One way of viewing open ports on your Linux system is with the netstat command. Issue the command netstat --inet -a to view both your established connections and open listening network ports. This command reads from your /etc/services file to determine the service name for a given port number, so seeing *:www under the Local Address heading indicates your server's port 80 is open and listening, not that there is necessarily a webserver running on that port. You should check the list and ensure that the servers listening are indeed desired, and if they are not, they should be disabled. For example, this output shows me that my system is accepting connections on the ports for www, ssh, smtp and https.

Read Complete Article:
features/features/hacks-from-pax-network-server-monitoring-with-nmap

 

LinuxSecurity.com Feature Extras:

Pull The Plug Revisited: An Interview Five Years Later - Five years after our original interview with Brian Gemberling, founder of PullthePlug.org, we catch up with Daniel Alvarez and the rest of the site's administrative management. Its structured management and focus on the community will ensure many years of continued success. You're asking, what is pull the plug? Read more to find out...

Linux File & Directory Permissions Mistakes - One common mistake Linux administrators make is having file and directory permissions that are far too liberal and allow access beyond that which is needed for proper system operations. A full explanation of unix file permissions is beyond the scope of this article, so I'll assume you are familiar with the usage of such tools as chmod, chown, and chgrp. If you'd like a refresher, one is available right here on linuxsecurity.com.

Introduction: Buffer Overflow Vulnerabilities - Buffer overflows are a leading type of security vulnerability. This paper explains what a buffer overflow is, how it can be exploited, and what countermeasures can be taken to prevent the use of buffer overflow vulnerabilities.

 

Take advantage of our Linux Security discussion list! This mailing list is for general security-related questions and comments. To subscribe send an e-mail to This email address is being protected from spambots. You need JavaScript enabled to view it. with "subscribe" as the subject.

Thank you for reading the LinuxSecurity.com weekly security newsletter. The purpose of this document is to provide our readers with a quick summary of each week's most relevant Linux security headline.


  Debian
  Debian: New krb5 packages fix multiple vulnerabilities
  17th, July, 2005

 

Daniel Wachdorf reported two problems in the MIT krb5 distribution used for network authentication.

 

advisories/debian/debian-new-krb5-packages-fix-multiple-vulnerabilities
 
  Debian: New heimdal packages fix arbitrary code execution
  18th, July, 2005

 

A buffer overflow has been discovered in the telnet server from Heimdal, a free implementation of Kerberos 5, that could lead to the execution of arbitrary code.

 

advisories/debian/debian-new-heimdal-packages-fix-arbitrary-code-execution-70803
 
  Debian: New phppgadmin packages fix directory traversal vulnerability
  18th, July, 2005

 

A vulnerability has been discovered in phppgadmin, a set of PHP scripts to administrate PostgreSQL over the WWW, that can lead to disclose sensitive information. Successful exploitation requires that "magic_quotes_gpc" is disabled.

 

advisories/debian/debian-new-phppgadmin-packages-fix-directory-traversal-vulnerability
 
  Debian: New ekg packages fix several vulnerabilities
  18th, July, 2005

 

Several vulnerabilities have been discovered in ekg, a console Gadu Gadu client, an instant messaging program.

 

advisories/debian/debian-new-ekg-packages-fix-several-vulnerabilities
 
  Debian: New heartbeat packages fix insecure temporary files
  19th, July, 2005

 

Eric Romang discovered several insecure temporary file creations in heartbeat, the subsystem for High-Availability Linux.

 

advisories/debian/debian-new-heartbeat-packages-fix-insecure-temporary-files-70055
 
  Debian: New affix packages fix arbitrary command and code execution
  19th, July, 2005

 

Kevin Finisterre discovered two problems in the Bluetooth FTP client from affix, user space utilities for the Affix Bluetooth protocol stack.

 

advisories/debian/debian-new-affix-packages-fix-arbitrary-command-and-code-execution
 
  Debian: New zlib packages fix buffer overflow
  20th, July, 2005

 

Flaw in the way zlib, a library used for file compression and decompression, handles invalid input. This flaw can cause programs which use zlib to crash when opening an invalid file.

 

advisories/debian/debian-new-zlib-packages-fix-buffer-overflow
 
  Debian: New cacti packages fix several vulnerabilities
  21st, July, 2005

 

Several vulnerabilities have been discovered in cacti, a round-robin database (RRD) tool that helps create graphs from database information.

 

advisories/debian/debian-new-cacti-packages-fix-several-vulnerabilities-10204
 
  Fedora
  Fedora Core 4 Update: java-1.4.2-gcj-compat-1.4.2.0-40jpp_31rh.FC4.1
  18th, July, 2005

 

Cope with impending libgcj and eclipse-ecj updates and provide aot-compile-rpm.

 

advisories/fedora/fedora-core-4-update-java-142-gcj-compat-1420-40jpp31rhfc41-11-16-00-119809
 
  Fedora Core 3 Update: diskdumputils-1.1.7-3
  18th, July, 2005

 

Updated package released.

 

advisories/fedora/fedora-core-3-update-diskdumputils-117-3-11-54-00-119810
 
  Fedora Core 4 Update: diskdumputils-1.1.7-4
  18th, July, 2005

 

Updated package released.

 

advisories/fedora/fedora-core-4-update-diskdumputils-117-4-11-54-00-119811
 
  Fedora Core 4 Update: radvd-0.8-1.FC4
  18th, July, 2005

 

New package released.

 

advisories/fedora/fedora-core-4-update-radvd-08-1fc4-16-51-00-119814
 
  Fedora Core 3 Update: radvd-0.8-1.FC3
  18th, July, 2005

 

New package released.

 

advisories/fedora/fedora-core-3-update-radvd-08-1fc3-16-51-00-119815
 
  Fedora Core 4 Update: bind-9.3.1-8.FC4
  19th, July, 2005

 

Fix named.init script bugs.

 

advisories/fedora/fedora-core-4-update-bind-931-8fc4-12-46-00-119820
 
  Fedora Core 3 Update: bind-9.2.5-3
  19th, July, 2005

 

Fix named.init script bugs.

 

advisories/fedora/fedora-core-3-update-bind-925-3-12-47-00-119821
 
  Fedora Core 3 Update: radvd-0.8-2.FC3
  19th, July, 2005

 

Updated package released.

 

advisories/fedora/fedora-core-3-update-radvd-08-2fc3-12-48-00-119822
 
  Fedora Core 4 Update: radvd-0.8-2.FC4
  19th, July, 2005

 

Updated package released.

 

advisories/fedora/fedora-core-4-update-radvd-08-2fc4-12-48-00-119823
 
  Fedora Core 3 Update: kdelibs-3.3.1-2.14.FC3
  19th, July, 2005

 

A flaw was discovered affecting Kate, the KDE advanced text editor, and Kwrite. Depending on system settings it may be possible for a local user to read the backup files created by Kate or Kwrite.

 

advisories/fedora/fedora-core-3-update-kdelibs-331-214fc3-12-49-00-119824
 
  Fedora Core 4 Update: freeradius-1.0.4-1.FC4.1
  20th, July, 2005

 

Fixes missing ldap plugin.

 

advisories/fedora/fedora-core-4-update-freeradius-104-1fc41-10-36-00-119828
 
  Fedora Core 3 Update: firefox-1.0.6-1.1.fc3
  20th, July, 2005

 

Fix various security related bugs.

 

advisories/fedora/fedora-core-3-update-firefox-106-11fc3-15-39-00-119831
 
  Fedora Core 3 Update: thunderbird-1.0.6-1.1.fc3
  20th, July, 2005

 

Fix various security related bugs.

 

advisories/fedora/fedora-core-3-update-thunderbird-106-11fc3-15-40-00-119832
 
  Fedora Core 4 Update: firefox-1.0.6-1.1.fc4
  20th, July, 2005

 

Fix various security related bugs.

 

advisories/fedora/fedora-core-4-update-firefox-106-11fc4-16-04-00-119833
 
  Fedora Core 4 Update: thunderbird-1.0.6-1.1.fc4
  20th, July, 2005

 

Fix various security related bugs.

 

advisories/fedora/fedora-core-4-update-thunderbird-106-11fc4-16-05-00-119834
 
  Fedora Core 4 Update: ypserv-2.13-7
  20th, July, 2005

 

Fix crash with ypxfr caused by failing to zero out data.

 

advisories/fedora/fedora-core-4-update-ypserv-213-7-18-01-00-119836
 
  Fedora Core 4 Update: mysql-4.1.12-2.FC4.1
  20th, July, 2005

 

Update to MySQL 4.1.12 (includes a low-impact security fix, see bz#158689). Repair some issues in openssl support. Re-enable the old ISAM table type.

 

advisories/fedora/fedora-core-4-update-mysql-4112-2fc41-16-30-00-119835
 
  Fedora Core 4 Update: setarch-1.8-1.FC4
  21st, July, 2005

 

Bugfix package release.

 

advisories/fedora/fedora-core-4-update-setarch-18-1fc4-11-27-00-119842
 
  Fedora Core 4 Update: openoffice.org-1.9.117-3.1.0.fc4
  21st, July, 2005

 

Updated package released.

 

advisories/fedora/fedora-core-4-update-openofficeorg-19117-310fc4-11-28-00-119843
 
  Fedora Core 3 Update: pvm-3.4.5-5_FC3
  21st, July, 2005

 

Updated package released.

 

advisories/fedora/fedora-core-3-update-pvm-345-5fc3-12-15-00-119844
 
  Fedora Core 4 Update: pvm-3.4.5-5_FC4
  21st, July, 2005

 

Updated package released.

 

advisories/fedora/fedora-core-4-update-pvm-345-5fc4-12-15-00-119845
 
  Fedora Core 4 Update: fetchmail-6.2.5-7.fc4.1
  21st, July, 2005

 

A buffer overflow was discovered in fetchmail's POP3 client. A malicious server could cause fetchmail to execute arbitrary code. The Common Vulnerabilities and Exposures project has assigned the name CAN-2005-2355 to this issue. All fetchmail users should upgrade to the updated package, which fixes this issue.

 

advisories/fedora/fedora-core-4-update-fetchmail-625-7fc41-14-17-00-119846
 
  Fedora Core 3 Update: fetchmail-6.2.5-7.fc3.1
  21st, July, 2005

 

A buffer overflow was discovered in fetchmail's POP3 client. A malicious server could cause fetchmail to execute arbitrary code. The Common Vulnerabilities and Exposures project has assigned the name CAN-2005-2355 to this issue. All fetchmail users should upgrade to the updated package, which fixes this issue.

 

advisories/fedora/fedora-core-3-update-fetchmail-625-7fc31-14-18-00-119847
 
  Fedora Core 3 Update: mozilla-1.7.10-1.3.1
  22nd, July, 2005

 

Package repairs various vulnerabilities.

 

advisories/fedora/fedora-core-3-update-mozilla-1710-131-00-03-00-119853
 
  Fedora Core 3 Update: epiphany-1.4.4-4.3.5
  22nd, July, 2005

 

There were several security flaws found in the mozilla package, which epiphany depends on. Users of epiphany are advised to upgrade to this updated package which has been rebuilt against a version of mozilla not vulnerable to these flaws.

 

advisories/fedora/fedora-core-3-update-epiphany-144-435-00-04-00-119854
 
  Fedora Core 3 Update: devhelp-0.9.2-2.3.5
  22nd, July, 2005

 

There were several security flaws found in the mozilla package, which devhelp depends on. Users of devhelp are advised to upgrade to this updated package which has been rebuilt against a version of mozilla not vulnerable to these flaws.

 

advisories/fedora/fedora-core-3-update-devhelp-092-235-00-04-00-119855
 
  Fedora Core 4 Update: mozilla-1.7.10-1.5.1
  22nd, July, 2005

 

Package repairs various vulnerabilities.

 

advisories/fedora/fedora-core-4-update-mozilla-1710-151-00-05-00-119856
 
  Fedora Core 4 Update: epiphany-1.6.3-2
  22nd, July, 2005

 

There were several security flaws found in the mozilla package, which epiphany depends on. Users of epiphany are advised to upgrade to this updated package which has been rebuilt against a version of mozilla not vulnerable to these flaws.

 

advisories/fedora/fedora-core-4-update-epiphany-163-2-00-06-00-119857
 
  Fedora Core 4 Update: devhelp-0.10-1.4.1
  22nd, July, 2005

 

There were several security flaws found in the mozilla package, which devhelp depends on. Users of devhelp are advised to upgrade to this updated package which has been rebuilt against a version of mozilla not vulnerable to these flaws.

 

advisories/fedora/fedora-core-4-update-devhelp-010-141-00-06-00-119858
 
  Fedora Core 4 Update: yelp-2.10.0-1.4.1
  22nd, July, 2005

 

There were several security flaws found in the mozilla package, which yelp depends on. Users of yelp are advised to upgrade to this updated package which has been rebuilt against a version of mozilla not vulnerable to these flaws.

 

advisories/fedora/fedora-core-4-update-yelp-2100-141-00-07-00-119859
 
  Gentoo
  Gentoo: Mozilla Firefox Multiple Vulnerabilities
  15th, July, 2005

 

Several vulnerabilities in Mozilla Firefox allow attacks ranging from execution of script code with elevated privileges to information leak.

 

 
  Gentoo: PHP Script injection through XML-RPC
  15th, July, 2005

 

PHP includes an XML-RPC implementation which allows remote attackers to execute arbitrary PHP script commands.

 

 
  Gentoo: Ruby Arbitrary command execution through XML-RPC
  15th, July, 2005

 

A vulnerability in XMLRPC.iPIMethods allows remote attackers to execute arbitrary commands.

 

 
  Gentoo: Adobe Acrobat Reader Buffer overflow vulnerability
  15th, July, 2005

 

Adobe Acrobat Reader is vulnerable to a buffer overflow that could lead to remote execution of arbitrary code.

 

 
  Gentoo: phpGroupWare, eGroupWare PHP script injection vulnerability
  15th, July, 2005

 

phpGroupWare and eGroupWare include an XML-RPC implementation which allows remote attackers to execute arbitrary PHP script commands.

 

 
  Gentoo: dhcpcd Denial of Service vulnerability
  15th, July, 2005

 

A vulnerability in dhcpcd may cause the dhcpcd daemon to crash.

 

 
  Gentoo: Mozilla Thunderbird Multiple Vulnerabilities
  18th, July, 2005

 

Several vulnerabilities in Mozilla Thunderbird allow attacks ranging from execution of script code with elevated privileges to information leak.

 

 
  Gentoo: Mozilla Thunderbird Multiple vulnerabilities
  19th, July, 2005

 

Several vulnerabilities in Mozilla Thunderbird allow attacks ranging from execution of script code with elevated privileges to information leaks.

 

 
  Gentoo: MediaWiki Cross-site scripting vulnerability
  20th, July, 2005

 

MediaWiki is vulnerable to a cross-site scripting attack that could allow arbitrary JavaScript code execution.

 

 
  Gentoo: zlib Buffer overflow
  22nd, July, 2005

 

zlib is vulnerable to a buffer overflow which could potentially lead to execution of arbitrary code.

 

 
  Gentoo: Shorewall Security policy bypass
  22nd, July, 2005

 

A vulnerability in Shorewall allows clients authenticated by MAC address filtering to bypass all other security rules.

 

 
  Red Hat
  RedHat: Important: firefox security update
  21st, July, 2005

 

An updated firefox package that fixes various security bugs is now available for Red Hat Enterprise Linux 4. This update has been rated as having important security impact by the Red Hat Security Response Team.

 

advisories/red-hat/redhat-important-firefox-security-update-89533
 
  RedHat: Low: cpio security update
  21st, July, 2005

 

An updated cpio package that fixes multiple issues is now available. This update has been rated as having low security impact by the Red Hat Security Response Team.

 

advisories/red-hat/redhat-low-cpio-security-update-84799
 
  RedHat: Important: zlib security update
  21st, July, 2005

 

Updated zlib packages that fix a buffer overflow are now available for Red Hat Enterprise Linux 4. This update has been rated as having important security impact by the Red Hat Security Response Team.

 

advisories/red-hat/redhat-important-zlib-security-update-73777
 
  RedHat: Important: thunderbird security update
  21st, July, 2005

 

Updated thunderbird package that fixes various bugs is now available for Red Hat Enterprise Linux 4. This update has been rated as having important security impact by the Red Hat Security Response Team.

 

advisories/red-hat/redhat-important-thunderbird-security-update-66245
 
  RedHat: Critical: kdenetwork security update
  21st, July, 2005

 

Updated kdenetwork packages to correct a security flaw in Kopete are now available for Red Hat Enterprise Linux 4. This update has been rated as having critical security impact by the Red Hat Security Response Team.

 

advisories/red-hat/redhat-critical-kdenetwork-security-update-RHSA-2005-639-01
 
  RedHat: Important: mozilla security update
  22nd, July, 2005

 

Updated mozilla packages that fix various security issues are now available. This update has been rated as having important security impact by the Red Hat Security Response Team.

 

advisories/red-hat/redhat-important-mozilla-security-update-5331