This week, advisories were released for ncheecktraceker, clamav, seamonkey, hylafax, python, squid, wxpythongtk, smbldap-tools, libksba, kdelibs, mysql, imagemagick, libxfont, php, bind, mailman, kernel, gnutls, gzip, thunderbird, firefox, openssl, gdb, mono, ffmpeg, awstats, libmusicbrainz, linux-restricted- module, Xsession, binutils, and pike. The distributors include Debian, Gentoo, Mandriva, Red Hat, SuSE, and Ubuntu.

Earn an NSA recognized IA Masters Online - The NSA has designated Norwich University a center of Academic Excellence in Information Security. Our program offers unparalleled Infosec management education and the case study affords you unmatched consulting experience. Using interactive e-Learning technology, you can earn this esteemed degree, without disrupting your career or home life.


Review: SELinux by Example
By: Ryan W. Maple

If you use Linux then you've most probably at least heard of Security-Enhanced Linux (SELinux). In this feature story R yan W. Maple gives a review and his opinion of the latest and greatest book to cover SELinux: SELinux by Example: Using Security Enhanced Linux. Read on for Ryan's review.

"SELinux by Example" is a hands-on book aimed towards anybody interested in Security-Enhanced Linux (SELinux). Whether you want to learn how to write SELinux policy or administer a machine running SELinux, you will find tremendous value in this book. Each chapter conveniently wraps up with a bullet-point summary of the material that was covered and some exercises which do an excellent job of driving the points home, giving this book it's "hands-on" feel.

The book is written by Frank Mayer (the co-founder and CTO of Tresys Technology), David Caplan (a senior security engineer with Tresys), and Karl Macmillan (a very active contributor to the SELinux community), three of the most qualified people to write a book on this complicated subject. It consists of 14 chapters and four appendices, grouped into three main parts: SELinux Overview, SELinux Policy Language, and Creating and Writing SELinux Security Policies.

This is a very good book and is easily the best I've seen yet on the subject of SELinux. If you've been tasked with maintaining an SELinux-enabled machine, would like to write or enhance existing SELinux policy, or just want to understand what SELinux is and how it came to be, then this is the book for you. This book and an SELinux-enabled Linux distribution, such as the easy to use EnGarde Secure Linux, are all you need to get involved in the growing world of Security Enhanced Linux.


EnGarde Secure Linux v3.0.9 Now Available

Guardian Digital is happy to announce the release of EnGarde Secure Community 3.0.9 (Version 3.0, Release 9). This release includes several bug fixes and feature enhancements to the Guardian Digital WebTool and the SELinux policy, several updated packages, and a couple of new packages available for installation.

news/vendors-products/engarde-secure-linux-v309-now-available

LinuxSecurity.com Feature Extras:

    RFID with Bio-Smart Card in Linux - In this paper, we describe the integration of fingerprint template and RF smart card for clustered network, which is designed on Linux platform and Open source technology to obtain biometrics security. Combination of smart card and biometrics has achieved in two step authentication where smart card authentication is based on a Personal Identification Number (PIN) and the card holder is authenticated using the biometrics template stored in the smart card that is based on the fingerprint verification. The fingerprint verification has to be executed on central host server for security purposes. Protocol designed allows controlling entire parameters of smart security controller like PIN options, Reader delay, real-time clock, alarm option and cardholder access conditions.

    Linux File & Directory Permissions Mistakes - One common mistake Linux administrators make is having file and directory permissions that are far too liberal and allow access beyond that which is needed for proper system operations. A full explanation of unix file permissions is beyond the scope of this article, so I'll assume you are familiar with the usage of such tools as chmod, chown, and chgrp. If you'd like a refresher, one is available right here on linuxsecurity.com.

Take advantage of our Linux Security discussion list! This mailing list is for general security-related questions and comments. To subscribe send an e-mail to This email address is being protected from spambots. You need JavaScript enabled to view it. with "subscribe" as the subject.

Thank you for reading the LinuxSecurity.com weekly security newsletter. The purpose of this document is to provide our readers with a quick summary of each week's most relevant Linux security headline.


Debian
Debian: New cheesetraceker packages fix buffer overflow
13th, October, 2006

This update to DSA-1166 adds the architectures which were missing from the previous advisory. Luigi Auriemma discovered a buffer overflow in the loading component of cheesetracker, a sound module tracking program, which could allow a maliciously constructed input file to execute arbitary code.

advisories/debian/debian-new-cheesetraceker-packages-fix-buffer-overflow-57316
Debian: New clamav packages fix arbitrary code execution
19th, October, 2006

Updated package.

advisories/debian/debian-new-clamav-packages-fix-arbitrary-code-execution-21324
Gentoo
Gentoo: Seamonkey Multiple vulnerabilities
16th, October, 2006

The Seamonkey project has reported multiple security vulnerabilities in the application.

Gentoo: CAPI4Hylafax fax receiver Execution of arbitrary code
17th, October, 2006

CAPI4Hylafax allows remote attackers to execute arbitrary commands.

Gentoo: Mozilla Network Security Service (NSS) RSA signature forgery
17th, October, 2006

NSS fails to properly validate PKCS #1 v1.5 signatures.

Gentoo: Python Buffer Overflow
17th, October, 2006

A buffer overflow in Python's "repr()" function can be exploited to cause a Denial of Service and potentially allows the execution of arbitrary code.

Gentoo: Python Buffer Overflow
18th, October, 2006

Updated package.

Mandriva
Mandriva: Updated squid package corrects bug on x86_64
13th, October, 2006

This update fixes a problem in the squid package as shipped for Mandriva Linux 2007 which affects only the x86_64 architecture. On that platform, squid would not start, giving the following message:

Mandriva: Updated squid package correct transparent proxy issue
13th, October, 2006

An issue in Squid's transparent proxy mode prevented it from working correctly, giving back to the client an error page stating "Unable to forward this request at this time".

Mandriva: Updated wxPythonGTK package correct path issue on x86_64
16th, October, 2006

A problem with wxPythonGTK would prevent some python programs, such as pyshell, from starting due to incorrect path locations. The updated packages correct this issue.

Mandriva: Updated smbldap-tools package fix smb.conf parsing bug
16th, October, 2006

This update fixes a problem with the smbldap-tools package shipped with Mandriva Linux 2006 where it would issue warnings if the smb.conf configuration file had continuation lines using the "\" character. The updated packages correct this issue.

Mandriva: Updated libksba packages correct DoS vulnerability
17th, October, 2006

The libksba library, as used by gpgsm in the gnupg2 package, allows attackers to cause a denial of service (application crash) via a malformed X.509 certificate in a signature. libksba-0.9.15 in Mandriva 2007.0 is not affected by this issue. Updated packages have been patched to correct this issue.

Mandriva: Updated clamav packages fix vulnerabilities
17th, October, 2006

An integer overflow in previous versions of ClamAV could allow a remote attacker to cause a Denial of Service (scanning service crash) and execute arbitrary code via a Portable Executable (PE) file (CVE-2006-4182).

Mandriva: Updated php packages to address multiple vulnerabilities
18th, October, 2006

PHP 4.x up to 4.4.4 and PHP 5 up to 5.1.6 allows local users to bypass certain Apache HTTP Server httpd.conf options, such as safe_mode and open_basedir, via the ini_restore function, which resets the values to their php.ini (Master Value) defaults. (CVE-2006-4625).

Red Hat
RedHat: Critical: kdelibs security update
18th, October, 2006

Updated kdelibs packages that correct an integer overflow flaw are now available. This update has been rated as having critical security impact by the Red Hat Security Response Team.

advisories/red-hat/redhat-critical-kdelibs-security-update-42140
SuSE
SuSE: clamav security problems
18th, October, 2006

Updated package.

Ubuntu
Ubuntu: MySQL vulnerabilities
16th, October, 2006

There are multiple vulnerabilities in MySQL. The following CVEIDs have been addressed: CVE-2006-4227 CVE-2006-4031

advisories/ubuntu/ubuntu-mysql-vulnerabilities-82610
Ubuntu: OpenSSL vulnerability
16th, October, 2006

Philip Mackenzie, Marius Schilder, Jason Waddle and Ben Laurie of Google Security discovered that the OpenSSL library did not sufficiently check the padding of PKCS #1 v1.5 signatures if the exponent of the public key is 3 (which is widely used for CAs). This could be exploited to forge signatures without the need of the secret key.

advisories/ubuntu/ubuntu-openssl-vulnerability-15959
Ubuntu: imagemagick vulnerabilities
16th, October, 2006

Tavis Ormandy discovered several buffer overflows in imagemagick's Sun Raster and XCF (Gimp) image decoders. By tricking a user or automated system into processing a specially crafted image, this could be exploited to execute arbitrary code with the users' privileges.

advisories/ubuntu/ubuntu-imagemagick-vulnerabilities-95420
Ubuntu: libxfont vulnerability
16th, October, 2006

An integer overflow has been discovered in X.org's font handling library. By using a specially crafted font file, this could be exploited to crash the X server or execute arbitrary code with root privileges.

advisories/ubuntu/ubuntu-libxfont-vulnerability
Ubuntu: PHP vulnerabilities
16th, October, 2006

There are multiple vulnerabilities in PHP. The following CVEIDs have been addressed: CVE-2006-4020 CVE-2006-4481 CVE-2006-4482 CVE-2006-4484

advisories/ubuntu/ubuntu-php-vulnerabilities-97448
Ubuntu: bind9 vulnerabilities
16th, October, 2006

bind did not sufficiently verify particular requests and responses from other name servers and users. By sending a specially crafted packet, a remote attacker could exploit this to crash the name server.

advisories/ubuntu/ubuntu-bind9-vulnerabilities
Ubuntu: X.org vulnerabilities
16th, October, 2006

iDefense security researchers found several integer overflows in X.org's font handling library. By using a specially crafted Type1 CID font file, a local user could exploit these to crash the X server or execute arbitrary code with root privileges.

advisories/ubuntu/ubuntu-xorg-vulnerabilities
Ubuntu: mailman vulnerabilities
16th, October, 2006

Steve Alexander discovered that mailman did not properly handle attachments with special filenames. A remote user could exploit that to stop mail delivery until the server administrator manually cleaned these posts. (CVE-2006-2941) Various cross-site scripting vulnerabilities have been reported by Barry Warsaw. By using specially crafted email addresses, names, and similar arbitrary user-defined strings, a remote attacker could exploit this to run web script code in the list administrator's web browser. (CVE-2006-3636) URLs logged to the error log file are now checked for invalid characters. Before, specially crafted URLs could inject arbitrary messages into the log.

advisories/ubuntu/ubuntu-mailman-vulnerabilities
Ubuntu: Linux kernel vulnerabilities
16th, October, 2006

There are multiple vulnerabilities in the linux kernel. THe following CVEIDs have been addressed: CVE-2006-2934 CVE-2006-2935 CVE-2006-2936 CVE-2006-3468 CVE-2006-3745 CVE-2006-4093 CVE-2006-4145

advisories/ubuntu/ubuntu-linux-kernel-vulnerabilities-39223
Ubuntu: GnuTLS vulnerability
16th, October, 2006

The GnuTLS library did not sufficiently check the padding of PKCS #1 v1.5 signatures if the exponent of the public key is 3 (which is widely used for CAs). This could be exploited to forge signatures without the need of the secret key.

advisories/ubuntu/ubuntu-gnutls-vulnerability
Ubuntu: Linux kernel vulnerabilities
16th, October, 2006

Sridhar Samudrala discovered a local Denial of Service vulnerability in the handling of SCTP sockets. By opening such a socket with a special SO_LINGER value, a local attacker could exploit this to crash the kernel. (CVE-2006-4535) Kirill Korotaev discovered that the ELF loader on the ia64 and sparc platforms did not sufficiently verify the memory layout. By attempting to execute a specially crafted executable, a local user could exploit this to crash the kernel. (CVE-2006-4538)

advisories/ubuntu/ubuntu-linux-kernel-vulnerabilities-39223
Ubuntu: gzip vulnerabilities
16th, October, 2006

Tavis Ormandy discovered that gzip did not sufficiently verify the validity of gzip or compress archives while unpacking. By tricking an user or automated system into unpacking a specially crafted compressed file, this could be exploited to execute arbitrary code with the user's privileges.

advisories/ubuntu/ubuntu-gzip-vulnerabilities
Ubuntu: Thunderbird vulnerabilities
16th, October, 2006

This update upgrades Thunderbird from 1.0.8 to 1.5.0.7. This step was necessary since the 1.0.x series is not supported by upstream any more. Various flaws have been reported that allow an attacker to execute arbitrary code with user privileges by tricking the user into opening a malicious email containing JavaScript. Please note that JavaScript is disabled by default for emails, and it is not recommended to enable it. The following CVEIDs have been addressed: CVE-2006-3113, CVE-2006-3802, CVE-2006-3803, CVE-2006-3805, CVE-2006-3806, CVE-2006-3807, CVE-2006-3809, CVE-2006-3810, CVE-2006-3811, CVE-2006-3812, CVE-2006-4253, CVE-2006-4565, CVE-2006-4566, CVE-2006-4571 CVE-2006-3804, CVE-2006-4340, CVE-2006-4567, CVE-2006-4570

advisories/ubuntu/ubuntu-thunderbird-vulnerabilities-67510
Ubuntu: firefox vulnerabilities
16th, October, 2006

Various flaws have been reported that allow an attacker to execute arbitrary code with user privileges by tricking the user into opening a malicious web page containing JavaScript. The following CVEIDs have been addressed: CVE-2006-4253, CVE-2006-4565, CVE-2006-4566, CVE-2006-4568, CVE-2006-4569, CVE-2006-4571, CVE-2006-4340, CVE-2006-4567

advisories/ubuntu/ubuntu-firefox-vulnerabilities-99643
Ubuntu: Thunderbird vulnerabilities
16th, October, 2006

Various flaws have been reported that allow an attacker to execute arbitrary code with user privileges by tricking the user into opening a malicious email containing JavaScript. Please note that JavaScript is disabled by default for emails, and it is not recommended to enable it. The following CVEIDs have been addressed: CVE-2006-4253, CVE-2006-4565, CVE-2006-4566, CVE-2006-4571, CVE-2006-4340, CVE-2006-4567, CVE-2006-4570

advisories/ubuntu/ubuntu-thunderbird-vulnerabilities-67510
Ubuntu: openssl vulnerabilities
16th, October, 2006

Dr. Henson of the OpenSSL core team and Open Network Security discovered a mishandled error condition in the ASN.1 parser. By sending specially crafted packet data, a remote attacker could exploit this to trigger an infinite loop, which would render the service unusable and consume all available system memory. (CVE-2006-2937) Certain types of public key could take disproportionate amounts of time to process. The library now limits the maximum key exponent size to avoid Denial of Service attacks. (CVE-2006-2940) Tavis Ormandy and Will Drewry of the Google Security Team discovered a buffer overflow in the SSL_get_shared_ciphers() function. By sending specially crafted packets to applications that use this function (like Exim, MySQL, or the openssl command line tool), a remote attacker could exploit this to execute arbitrary code with the server's privileges. (CVE-2006-3738) Tavis Ormandy and Will Drewry of the Google Security Team reported that the get_server_hello() function did not sufficiently check the client's session certificate. This could be exploited to crash clients by remote attackers sending specially crafted SSL responses. (CVE-2006-4343)

advisories/ubuntu/ubuntu-openssl-vulnerabilities-29155
Ubuntu: gdb vulnerability
16th, October, 2006

Will Drewry, of the Google Security Team, discovered buffer overflows in GDB's DWARF processing. This would allow an attacker to execute arbitrary code with user privileges by tricking the user into using GDB to load an executable that contained malicious debugging information.

advisories/ubuntu/ubuntu-gdb-vulnerability
Ubuntu: openssh vulnerabilities
16th, October, 2006

Tavis Ormandy discovered that the SSH daemon did not properly handle authentication packets with duplicated blocks. By sending specially crafted packets, a remote attacker could exploit this to cause the ssh daemon to drain all available CPU resources until the login grace time expired. (CVE-2006-4924) Mark Dowd discovered a race condition in the server's signal handling. A remote attacker could exploit this to crash the server. (CVE-2006-5051)

advisories/ubuntu/ubuntu-openssh-vulnerabilities
Ubuntu: Mono vulnerability
16th, October, 2006

Sebastian Krahmer of the SuSE security team discovered that the System.CodeDom.Compiler classes used temporary files in an insecure way. This could allow a symbolic link attack to create or overwrite arbitrary files with the privileges of the user invoking the program. Under some circumstances, a local attacker could also exploit this to inject arbitrary code into running Mono processes.

advisories/ubuntu/ubuntu-mono-vulnerability
Ubuntu: ffmpeg, xine-lib vulnerabilities
16th, October, 2006

XFOCUS Security Team discovered that the AVI decoder used in xine-lib did not correctly validate certain headers. By tricking a user into playing an AVI with malicious headers, an attacker could execute arbitrary code with the target user's privileges. (CVE-2006-4799) Multiple integer overflows were discovered in ffmpeg and tools that contain a copy of ffmpeg (like xine-lib and kino), for several types of video formats. By tricking a user into running a video player that uses ffmpeg on a stream with malicious content, an attacker could execute arbitrary code with the target user's privileges. (CVE-2006-4800)

advisories/ubuntu/ubuntu-ffmpeg-xine-lib-vulnerabilities
Ubuntu: OpenSSL vulnerability
16th, October, 2006

USN-353-1 fixed several vulnerabilities in OpenSSL. However, Mark J Cox noticed that the applied patch for CVE-2006-2940 was flawed. This update corrects that patch. For reference, this is the relevant part of the original advisory: Certain types of public key could take disproportionate amounts of time to process. The library now limits the maximum key exponent size to avoid Denial of Service attacks. (CVE-2006-2940)

advisories/ubuntu/ubuntu-openssl-vulnerability-15959
Ubuntu: Python vulnerability
16th, October, 2006

Benjamin C. Wiley Sittler discovered that Python's repr() function did not properly handle UTF-32/UCS-4 strings. If an application uses repr() on arbitrary untrusted data, this could be exploited to execute arbitrary code with the privileges of the python application.

advisories/ubuntu/ubuntu-python-vulnerability
Ubuntu: awstats vulnerabilities
16th, October, 2006

awstats did not fully sanitize input, which was passed directly to the user's browser, allowing for an XSS attack. If a user was tricked into following a specially crafted awstats URL, the user's authentication information could be exposed for the domain where awstats was hosted. (CVE-2006-3681) awstats could display its installation path under certain conditions. However, this might only become a concern if awstats is installed into an user's home directory. (CVE-2006-3682)

advisories/ubuntu/ubuntu-awstats-vulnerabilities
Ubuntu: Mozilla vulnerabilities
16th, October, 2006

Various flaws have been reported that allow an attacker to execute arbitrary code with user privileges by tricking the user into opening a malicious URL. The following CVEIDs are addressed: CVE-2006-2788, CVE-2006-3805, CVE-2006-3806, CVE-2006-3807, CVE-2006-3809, CVE-2006-3811, CVE-2006-4565, CVE-2006-4568, CVE-2006-4571, CVE-2006-3808, CVE-2006-4340, CVE-2006-4570

advisories/ubuntu/ubuntu-mozilla-vulnerabilities
Ubuntu: PHP vulnerabilities
16th, October, 2006

The stripos() function did not check for invalidly long or empty haystack strings. In an application that uses this function on arbitrary untrusted data this could be exploited to crash the PHP interpreter. (CVE-2006-4485) An integer overflow was discovered in the PHP memory allocation handling. On 64-bit platforms, the "memory_limit" setting was not enforced correctly. A remote attacker could exploit this to cause a Denial of Service attack through memory exhaustion. (CVE-2006-4486) Maksymilian Arciemowicz discovered that security relevant configuration options like open_basedir and safe_mode (which can be configured in Apache's httpd.conf) could be bypassed and reset to their default value in php.ini by using the ini_restore() function. (CVE-2006-4625) Stefan Esser discovered that the ecalloc() function in the Zend engine did not check for integer overflows. This particularly affected the unserialize() function. In applications which unserialize untrusted user-defined data, this could be exploited to execute arbitrary code with the application's privileges. (CVE-2006-4812)

advisories/ubuntu/ubuntu-php-vulnerabilities-97448
Ubuntu: libmusicbrainz vulnerability
16th, October, 2006

Luigi Auriemma discovered multiple buffer overflows in libmusicbrainz. When a user made queries to MusicBrainz servers, it was possible for malicious servers, or man-in-the-middle systems posing as servers, to send a crafted reply to the client request and remotely gain access to the user's system with the user's privileges.

advisories/ubuntu/ubuntu-libmusicbrainz-vulnerability
Ubuntu: Fixed linux-restricted-modules-2.6.15
16th, October, 2006

USN-346-1 provided an updated Linux kernel to fix several security vulnerabilities. Unfortunately the update broke the binary 'nvidia' driver from linux-restricted-modules. This update corrects this problem. We apologize for the inconvenience.

advisories/ubuntu/ubuntu-fixed-linux-restricted-modules-2615
Ubuntu: Xsession vulnerability
16th, October, 2006

A race condition existed that would allow other local users to see error messages generated during another user's X session. This could allow potentially sensitive information to be leaked.

advisories/ubuntu/ubuntu-xsession-vulnerability
Ubuntu: libksba vulnerability
16th, October, 2006

A parsing failure was discovered in the handling of X.509 certificates that contained extra trailing data. Malformed or malicious certificates could cause services using libksba to crash, potentially creating a denial of service.

advisories/ubuntu/ubuntu-libksba-vulnerability
Ubuntu: binutils vulnerability
18th, October, 2006

A buffer overflow was discovered in gas (the GNU assembler). By tricking an user or automated system (like a compile farm) into assembling a specially crafted source file with gcc or gas, this could be exploited to execute arbitrary code with the user's privileges.

advisories/ubuntu/ubuntu-binutils-vulnerability
Ubuntu: Pike vulnerability
18th, October, 2006

An SQL injection was discovered in Pike's PostgreSQL module. Applications using a PostgreSQL database and uncommon character encodings could be fooled into running arbitrary SQL commands, which could result in privilege escalation within the application, application data exposure, or denial of service.

advisories/ubuntu/ubuntu-pike-vulnerability