Earn an NSA recognized IA Masters Online - The NSA has designated Norwich University a center of Academic Excellence in Information Security. Our program offers unparalleled Infosec management education and the case study affords you unmatched consulting experience. Using interactive e-Learning technology, you can earn this esteemed degree, without disrupting your career or home life.
LinuxSecurity.com Feature Extras:
RFID with Bio-Smart Card in Linux - In this paper, we describe the integration of fingerprint template and RF smart card for clustered network, which is designed on Linux platform and Open source technology to obtain biometrics security. Combination of smart card and biometrics has achieved in two step authentication where smart card authentication is based on a Personal Identification Number (PIN) and the card holder is authenticated using the biometrics template stored in the smart card that is based on the fingerprint verification. The fingerprint verification has to be executed on central host server for security purposes. Protocol designed allows controlling entire parameters of smart security controller like PIN options, Reader delay, real-time clock, alarm option and cardholder access conditions.
Linux File & Directory Permissions Mistakes - One common mistake Linux administrators make is having file and directory permissions that are far too liberal and allow access beyond that which is needed for proper system operations. A full explanation of unix file permissions is beyond the scope of this article, so I'll assume you are familiar with the usage of such tools as chmod, chown, and chgrp. If you'd like a refresher, one is available right here on linuxsecurity.com.
Take advantage of our Linux Security discussion
list! This mailing list is for general security-related questions and comments.
To subscribe send an e-mail to
Thank you for reading the LinuxSecurity.com weekly security newsletter. The purpose of this document is to provide our readers with a quick summary of each week's most relevant Linux security headline.
Fedora | ||
Fedora Core 5 Update: kernel-2.6.20-1.2312.fc5 | ||
13th, April, 2007
The atalk_sum_skb function in AppleTalk for Linux kernel 2.6.x before 2.6.21, and possibly 2.4.x, allows remote attackers to cause a denial of service (crash) via an AppleTalk frame that is shorter than the specified length, which triggers a BUG_ON call when an attempt is made to advisories/fedora/fedora-core-5-update-kernel-2620-12312fc5-15-51-00-127797 |
||
Fedora Core 6 Update: kernel-2.6.20-1.2944.fc6 | ||
13th, April, 2007
The atalk_sum_skb function in AppleTalk for Linux kernel 2.6.x before 2.6.21, and possibly 2.4.x, allows remote attackers to cause a denial of service (crash) via an AppleTalk frame that is shorter than the specified length, which triggers a BUG_ON call when an attempt is made to perform a checksum. advisories/fedora/fedora-core-6-update-kernel-2620-12944fc6-17-57-00-127803 |
||
Fedora Core 6 Update: php-5.1.6-3.5.fc6 | ||
17th, April, 2007
This update fixes a number of security issues in PHP. A denial of service flaw was found in the way PHP processed a deeply nested array. A remote attacker could cause the PHP interpreter to crash by submitting an input variable with a deeply nested array. (CVE-2007-1285) advisories/fedora/fedora-core-6-update-php-516-35fc6-09-44-00-127839 |
||
Fedora Core 5 Update: php-5.1.6-1.5 | ||
18th, April, 2007
This update fixes a number of security issues in PHP. A denial of service flaw was found in the way PHP processed a deeply nested array. A remote attacker could cause the PHP interpreter to crash by submitting an input variable with a deeply nested array. (CVE-2007-1285) A flaw was found in the way the mbstring extension set global variables. A script which used the mb_parse_str() function to set global variables could be forced to enable the register_globals configuration option, possibly resulting in global variable injection. (CVE-2007-1583) advisories/fedora/fedora-core-5-update-php-516-15-21-23-00-127862 |
||
Gentoo | ||
Gentoo: DokuWiki Cross-site scripting vulnerability | ||
12th, April, 2007
DokuWiki is vulnerable to a cross-site scripting attack. An attacker could entice a user to click a specially crafted link and inject CRLF characters into the variable. This would allow the creation of new lines or fields in the returned HTTP Response header, which would permit the attacker to execute arbitrary scripts in the context of the user's browser. |
||
Gentoo: xine-lib Heap-based buffer overflow | ||
14th, April, 2007
xine-lib is vulnerable to a heap-based buffer overflow. An attacker could entice a user to play a specially crafted DMO video file with a player using xine-lib, potentially resulting in the execution of arbitrary code with the privileges of the user running the player. |
||
Gentoo: Inkscape Two format string vulnerabilities | ||
16th, April, 2007
Two format string vulnerabilities have been discovered in Inkscape, allowing for user-assisted execution of arbitrary code. |
||
Gentoo: Vixie Cron Denial of Service | ||
16th, April, 2007
The Gentoo implementation of Vixie Cron is vulnerable to a local Denial of Service.During an internal audit, Raphael Marichez of the Gentoo Linux Security Team found that Vixie Cron has weak permissions set on Gentoo, allowing for a local user to create hard links to system and users cron files, while a st_nlink check in database.c will generate a superfluous error. |
||
Gentoo: OpenOffice.org Multiple vulnerabilities | ||
16th, April, 2007
Multiple vulnerabilities have been discovered in OpenOffice.org, allowing for remote execution of arbitrary code. |
||
Gentoo: File Denial of Service | ||
17th, April, 2007
A vulnerability has been discovered in file allowing for a denial of service. |
||
Gentoo: FreeRADIUS Denial of Service | ||
17th, April, 2007
A memory leak has been discovered in FreeRADIUS, possibly allowing for a Denial of Service. |
||
Gentoo: MadWifi Multiple vulnerabilities | ||
17th, April, 2007
Multiple vulnerabilities have been discovered in the MadWifi driver, possibly leading to a Denial of Service and information disclosure. |
||
Mandriva | ||
Mandriva: Updated ipsec-tools packages fix DoS vulnerability | ||
16th, April, 2007
The ipsec-tools package prior to version 0.6.7 allows remote attackers to cause a Denial of Service (tunnel crash) via crafted DELTE and NOTIFY messages. Updated packages have been patched to correct this issue. |
||
Mandriva: Updated freeradius packages fix DoS vulnerability | ||
16th, April, 2007
Memory leak in freeRADIUS 1.1.5 and earlier allows remote attackers to cause a denial of service (memory consumption) via a large number of EAP-TTLS tunnel connections using malformed Diameter format attributes, which causes the authentication request to be rejected but does not reclaim VALUE_PAIR data structures. Updated packages have been patched to correct this issue. |
||
Mandriva: Updated cups packages fix DoS vulnerability | ||
16th, April, 2007
A flaw was discovered in how CUPS handled SSL negotiation that could allow a remote attacker capable of connecting to the CUPS daemon to cause a DoS to other CUPS users. Updated packages have been patched to correct this issue. |
||
Mandriva: Updated php packages fix multiple vulnerabilities | ||
19th, April, 2007
A heap-based buffer overflow vulnerability was found in PHP's gd extension. A script that could be forced to process WBMP images from an untrusted source could result in arbitrary code execution (CVE-2007-1001). A DoS flaw was found in how PHP processed a deeply nested array. A remote attacker could cause the PHP intrerpreter to creash by submitting an input variable with a deeply nested array (CVE-2007-1285). |
||
Mandriva: Updated php packages fix multiple vulnerabilities | ||
19th, April, 2007
A heap-based buffer overflow vulnerability was found in PHP's gd extension. A script that could be forced to process WBMP images from an untrusted source could result in arbitrary code execution (CVE-2007-1001). |
||
Mandriva: Updated php packages fix multiple vulnerabilities | ||
19th, April, 2007
A heap-based buffer overflow vulnerability was found in PHP's gd extension. A script that could be forced to process WBMP images from an untrusted source could result in arbitrary code execution (CVE-2007-1001). |
||
Mandriva: Updated php packages fix multiple vulnerabilities | ||
19th, April, 2007
A heap-based buffer overflow vulnerability was found in PHP's gd extension. A script that could be forced to process WBMP images from an untrusted source could result in arbitrary code execution (CVE-2007-1001). A DoS flaw was found in how PHP processed a deeply nested array. A remote attacker could cause the PHP intrerpreter to creash by submitting an input variable with a deeply nested array (CVE-2007-1285). |
||
Mandriva: Updated sqlite packages fix vulnerability | ||
19th, April, 2007
A buffer overflow in sqlite could allow context-dependent attackers to execute arbitrary code via an empty value of the 'in' parameter. Updated packages have been patched to correct this issue. |
||
Red Hat | ||
RedHat: Moderate: cups security update | ||
16th, April, 2007
Updated CUPS packages that fix a security issue are now available for Red Hat Enterprise Linux 3, 4, and 5. This update has been rated as having moderate security impact by the Red Hat Security Response Team. advisories/red-hat/redhat-moderate-cups-security-update-9153 |
||
RedHat: Moderate: freetype security update | ||
16th, April, 2007
Updated freetype packages that fix a security flaw are now available for Red Hat Enterprise Linux 3, 4, and 5. This update has been rated as having moderate security impact by the Red Hat Security Response Team. advisories/red-hat/redhat-moderate-freetype-security-update-25518 |
||
RedHat: Moderate: php security update | ||
16th, April, 2007
Updated PHP packages that fix several security issues are now available for Red Hat Application Stack v1.1. This update has been rated as having important security impact by the Red Hat Security Response Team. advisories/red-hat/redhat-moderate-php-security-update-38610 |
||
RedHat: Important: php security update | ||
16th, April, 2007
Updated PHP packages that fix several security issues are now available for Red Hat Enterprise Linux 2.1. This update has been rated as having important security impact by the Red Hat Security Response Team. advisories/red-hat/redhat-important-php-security-update-98171 |
||
RedHat: Important: php security update | ||
16th, April, 2007
Updated PHP packages that fix several security issues are now available for Red Hat Enterprise Linux 3 and 4. This update has been rated as having important security impact by the Red Hat Security Response Team. advisories/red-hat/redhat-important-php-security-update-98171 |
||
RedHat: Moderate: xorg-x11-apps and libX11 security | ||
16th, April, 2007
Updated xorg-x11-apps and libX11 packages that fix a security issue are now available for Red Hat Enterprise Linux 5. This update has been rated as having moderate security impact by the Red Hat Security Response Team. advisories/red-hat/redhat-moderate-xorg-x11-apps-and-libx11-security-RHSA-2007-0157-01 |
||
Ubuntu | ||
Ubuntu: X.org vulnerability | ||
18th, April, 2007
Multiple integer overflows were found in the XGetPixel function of libx11. If a user were tricked into opening a specially crafted XWD image, remote attackers could execute arbitrary code with user privileges. advisories/ubuntu/ubuntu-xorg-vulnerability |
||