Earn an NSA recognized IA Masters Online - The NSA has designated Norwich University a center of Academic Excellence in Information Security. Our program offers unparalleled Infosec management education and the case study affords you unmatched consulting experience. Using interactive e-Learning technology, you can earn this esteemed degree, without disrupting your career or home life.
LinuxSecurity.com Feature Extras:
RFID with Bio-Smart Card in Linux - In this paper, we describe the integration of fingerprint template and RF smart card for clustered network, which is designed on Linux platform and Open source technology to obtain biometrics security. Combination of smart card and biometrics has achieved in two step authentication where smart card authentication is based on a Personal Identification Number (PIN) and the card holder is authenticated using the biometrics template stored in the smart card that is based on the fingerprint verification. The fingerprint verification has to be executed on central host server for security purposes. Protocol designed allows controlling entire parameters of smart security controller like PIN options, Reader delay, real-time clock, alarm option and cardholder access conditions.
Linux File & Directory Permissions Mistakes - One common mistake Linux administrators make is having file and directory permissions that are far too liberal and allow access beyond that which is needed for proper system operations. A full explanation of unix file permissions is beyond the scope of this article, so I'll assume you are familiar with the usage of such tools as chmod, chown, and chgrp. If you'd like a refresher, one is available right here on linuxsecurity.com.
Take advantage of our Linux Security discussion
list! This mailing list is for general security-related questions and comments.
To subscribe send an e-mail to
Thank you for reading the LinuxSecurity.com weekly security newsletter. The purpose of this document is to provide our readers with a quick summary of each week's most relevant Linux security headline.
Debian | ||
Debian: New Mozilla packages fix several vulnerabilities | ||
10th, March, 2007
Updated package. advisories/debian/debian-new-mozilla-packages-fix-several-vulnerabilities-49307 |
||
Debian: New gnupg packages fix signature forgery | ||
13th, March, 2007
Updated package. advisories/debian/debian-new-gnupg-packages-fix-signature-forgery |
||
Gentoo | ||
Gentoo: SeaMonkey Multiple vulnerabilities | ||
9th, March, 2007
Multiple vulnerabilities have been reported in SeaMonkey, some of which may allow user-assisted arbitrary remote code execution. |
||
Gentoo: Smb4K Multiple vulnerabilities | ||
9th, March, 2007
Multiple vulnerabilities have been identified in Smb4K. |
||
Gentoo: KHTML Cross-site scripting (XSS) vulnerability | ||
10th, March, 2007
The KHTML component shipped with the KDE libraries is prone to a cross-site scripting (XSS) vulnerability. |
||
Gentoo: Amarok User-assisted remote execution of arbitrary code | ||
13th, March, 2007
The Magnatune component shipped with Amarok is vulnerable to the injection of arbitrary shell code from a malicious Magnatune server. |
||
Mandriva | ||
Mandriva: Updated xine-lib packages to address buffer overflow vulnerability | ||
8th, March, 2007
The DMO_VideoDecoder_Open function in dmo/DMO_VideoDecoder.c in xine-lib does not set the biSize before use in a memcpy, which allows user-assisted remote attackers to cause a buffer overflow and possibly execute arbitrary code. Updated packages have been patched to address this issue. |
||
Mandriva: Updated tcpdump packages address off-by-one overflow | ||
8th, March, 2007
Off-by-one buffer overflow in the parse_elements function in the 802.11 printer code (print-802_11.c) for tcpdump 3.9.5 and earlier allows remote attackers to cause a denial of service (crash) via a crafted 802.11 frame. NOTE: this was originally referred to as heap-based, but it might be stack-based. Updated packages have been patched to address this issue. |
||
Mandriva: Updated mplayer packages to address buffer overflow vulnerability | ||
8th, March, 2007
The DMO_VideoDecoder_Open function in loader/dmo/DMO_VideoDecoder.c in MPlayer 1.0rc1 and earlier does not set the biSize before use in a memcpy, which allows user-assisted remote attackers to cause a buffer overflow and possibly execute arbitrary code. Updated packages have been patched to address this issue. |
||
Mandriva: Updated kdelibs packages to address DoS issue in KDE Javascript | ||
8th, March, 2007
ecma/kjs_html.cpp in KDE JavaScript (KJS), as used in Konqueror, allows remote attackers to cause a denial of service (crash) by accessing the content of an iframe with an ftp:// URI in the src attribute, probably due to a NULL pointer dereference. Updated packages have been patched to address this issue. |
||
Mandriva: Updated ekiga packages fix string vulnerabilities. | ||
9th, March, 2007
A format string flaw was discovered in how ekiga processes certain messages, which could permit a remote attacker that can connect to ekiga to potentially execute arbitrary code with the privileges of the user running ekiga. This is similar to the previous CVE-2007-1006, but the original evaluation/patches were incomplete. Updated package have been patched to correct this issue. |
||
Mandriva: Updated gnupg packages provide enhanced forgery detection | ||
9th, March, 2007
GnuPG prior to 1.4.7 and GPGME prior to 1.1.4, when run from the command line, did not visually distinguish signed and unsigned portions of OpenPGP messages with multiple components. This could allow a remote attacker to forge the contents of an email message without detection. GnuPG 1.4.7 is being provided with this update and GPGME has been patched on Mandriva 2007.0 to provide better visual notification on these types of forgeries. |
||
Mandriva: Updated timezone packages provide updated DST information | ||
10th, March, 2007
Updated timezone packages are being provided for older Mandriva Linux systems that do not contain the new Daylight Savings Time information for 2007 for certain time zones. These updated packages contain the new information. |
||
Mandriva: Updated kernel packages fix multiple vulnerabilities and bugs | ||
10th, March, 2007
The 2.6.17 kernel and earlier, when running on IA64 and SPARC platforms would allow a local user to cause a DoS (crash) via a malformed ELF file (CVE-2006-4538). |
||
Mandriva: Updated mplayer packages to address buffer overflow vulnerability | ||
13th, March, 2007
The DS_VideoDecoder_Open function in loader/dshow/DS_VideoDecoder.c in MPlayer 1.0rc1 and earlier does not set the biSize before use in a memcpy, which allows user-assisted remote attackers to cause a buffer overflow and possibly execute arbitrary code. Updated packages have been patched to address this issue. |
||
Mandriva: Updated xine-lib packages to address buffer overflow vulnerability | ||
13th, March, 2007
The DS_VideoDecoder_Open function in DirectShow/DS_VideoDecoder.c in xine-lib does not set the biSize before use in a memcpy, which allows user-assisted remote attackers to cause a buffer overflow and possibly execute arbitrary code. packages have been patched to address this issue. |
||
Ubuntu | ||
Ubuntu: GnuPG vulnerability | ||
8th, March, 2007
Gerardo Richarte from Core Security Technologies discovered that when gnupg is used without --status-fd, there is no way to distinguish initial unsigned messages from a following signed message. advisories/ubuntu/ubuntu-gnupg-vulnerability-58303 |
||
Ubuntu: PHP regression | ||
8th, March, 2007
USN-424-1 fixed vulnerabilities in PHP. However, some upstream changes were not included, which caused errors in the stream filters. This update fixes the problem. advisories/ubuntu/ubuntu-php-regression |
||
Ubuntu: Xine vulnerability | ||
8th, March, 2007
Moritz Jodeit discovered that the DMO loader of Xine did not correctly validate the size of an allocated buffer. By tricking a user into opening a specially crafted media file, an attacker could execute arbitrary code with the user's privileges. advisories/ubuntu/ubuntu-xine-vulnerability-70937 |
||
Ubuntu: Ekiga vulnerability | ||
8th, March, 2007
It was discovered that Ekiga had format string vulnerabilities beyond those fixed in USN-426-1. If a user was running Ekiga and listening for incoming calls, a remote attacker could send a crafted call request, and execute arbitrary code with the user's privileges. advisories/ubuntu/ubuntu-ekiga-vulnerability |
||
Ubuntu: Xine vulnerability | ||
12th, March, 2007
Moritz Jodeit discovered that the DirectShow loader of Xine did not correctly validate the size of an allocated buffer. By tricking a user into opening a specially crafted media file, an attacker could execute arbitrary code with the user's privileges. advisories/ubuntu/ubuntu-xine-vulnerability-70937 |
||
Ubuntu: KTorrent vulnerabilities | ||
12th, March, 2007
Bryan Burns of Juniper Networks discovered that KTorrent did not correctly validate the destination file paths nor the HAVE statements sent by torrent peers. A malicious remote peer could send specially crafted messages to overwrite files or execute arbitrary code with user privileges. advisories/ubuntu/ubuntu-ktorrent-vulnerabilities |
||
Ubuntu: GnuPG2, GPGME vulnerability | ||
13th, March, 2007
USN-432-1 fixed a vulnerability in GnuPG. This update provides the corresponding updates for GnuPG2 and the GPGME library. Original advisory details: Gerardo Richarte from Core Security Technologies discovered that when gnupg is used without --status-fd, there is no way to distinguish initial unsigned messages from a following signed message. An attacker could inject an unsigned message, which could fool the user into thinking the message was entirely signed by the original sender. advisories/ubuntu/ubuntu-gnupg2-gpgme-vulnerability |
||