Americas

  • United States

Linux patch potpourri

Opinion
May 10, 20045 mins
NetworkingSecurity

* Patches from Gentoo, Connectiva, Slackware, others * Beware Lovegate variant * Gartner: Phishing attacks up against U.S. consumers, and other interesting reading

Today’s bug patches and security alerts:

FreeBSD patches heimdal and kadmind

According to an alert from FreeBSD, “A remote attacker may send a specially formatted message to k5admind, causing it to crash or possibly resulting in arbitrary code execution.” For more, go to:

heimdal:

https://www.nwfusion.com/go2/0510bug1a.html

kadmind:

https://www.nwfusion.com/go2/0510bug1b.html

**********

ASP cookied vulnerability

A flaw in the way ASP server pages handle certain cookie requests could expose sensitive server information, according to a post on the BugTraq mailing list. Users should build a custom error page to help protect against server information leaks. For more, go to:

https://support.microsoft.com/?id=834452

**********

Gentoo patches flaws in LCDproc

There are two buffer overflow and one format string vulnerability in Gentoo’s LCDproc package. A fix is available. For more, go to:

https://forums.gentoo.org/viewtopic.php?t=166300

Gentoo patches Samba

A flaw in Samba could be exploited by a remote user to gain root privileges on the affected machine. For more, go to:

https://forums.gentoo.org/viewtopic.php?t=168290

**********

Gentoo, Slackware issue patches for xine

A temporary file vulnerability has been found in xine, which could be exploited by a local user to overwrite arbitrary files. For more, go to:

Gentoo:

https://forums.gentoo.org/viewtopic.php?t=166301

Slackware:

https://www.nwfusion.com/go2/0510bug1c.html

**********

Gentoo, OpenPKG release patches for ssmtp

The ssmtp mail transfer agent contains a format string vulnerability, which could be exploited by an attacker to run arbitrary code on the affected machine. For more, go to:

Gentoo:

https://forums.gentoo.org/viewtopic.php?t=166298

OpenPKG:

https://www.openpkg.org/security/OpenPKG-SA-2004.020-ssmtp.html

**********

Connectiva, Slackware patch lha

A buffer overflow and directory transversal vulnerability in lha could be exploited to run arbitrary code on the affected machine. Fixes are available. For more, go to:

Conectiva:

https://www.nwfusion.com/go2/0510bug1d.html

Slackware:

https://www.nwfusion.com/go2/0510bug1e.html

**********

Debian releases patch for exim

Two stack-based buffer overflows have been found in Debian’s Exim package. Fortunately, the flaws cannot be exploited in the default Debian configuration. For more, go to:

https://www.debian.org/security/2004/dsa-501

**********

SCO releases update for Apache

A new update for SCO’s Apache implementation fixes two vulnerabilities in the popular Web server software. One flaw fixes a weak encryption cipher. The other fixes a buffer overflow that could be exploited in a denial-of-service attack. For more, go to:

ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2004.6

**********

OpenPKG patches kolab

It’s been found that OpenPKG’s kolab stores OpenLDAP passwords in plaintext. Download the update to fix the problem. For more, go to:

https://www.openpkg.org/security/OpenPKG-SA-2004.019-kolab.html

**********

SuSE patches Live CD 9.1

A flaw in the default configuration of SuSE Live CD 9.1, which allows a user to boot SuSE Linux from a CD, could allow a remote user to gain root privileges by logging in via ssh without need for a password. Download the update from:

ftp://ftp.suse.com/pub/suse/i386/live-cd-9.1/LiveCD-9.1-01.iso

**********

Today’s roundup of virus alerts:

W32/Lovgate-V – Another variant of the Lovegate worm, which spreads via e-mail, network shares and file sharing networks. The virus drops a backdoor Trojan on the infected machine that allows an attacker to gain access. The infected file attachment is a ZIP with the name work, setup, important, bak, letter or pass . (Sophos)

W32/Sdbot-JT – Another Sdbot variant that copies itself to the Windows system folder as nmsmtp32.exe. No word on how the infected spreads. (Sophos)

W32/Sdbot-IH – Yet another Sdbot variant that spreads via weakly protected network shares and plants a backdoor Trojan Horse on the infected machine. It also logs the user’s keystrokes. (Sophos)

Briss.A – A memory-resident Trojan horse that downloads malware to the infected machine. Spreads via infected downloads and files. (Sophos)

**********

From the interesting reading department:

German Teen Admits Making The ‘Sasser’ Internet Worm

A teenager in Germany confessed to creating a computer worm that has crashed computers around the world in the past week, German authorities said Saturday. The suspect had been identified by acquaintances seeking a $250,000 reward. Washington Post, 05/09/04.

https://www.nwfusion.com/go2/0510bug1f.html

Gartner: Phishing attacks up against U.S. consumers

A new study by research firm Gartner found that the number of online scams known as “phishing attacks” have spiked in the slast year and that online consumers are frequently tricked into divulging sensitive information to criminals. IDG News Service, 05/06/04.

https://www.nwfusion.com/news/2004/0506gartnphish.html?nl

FTC settles with alleged ‘Married But Lonely’ spammers

The Federal Trade Commission has settled charges against two alleged spammers that used what the FTC called “deceptively bland subject lines,” false return addresses, and other methods to lure unsuspecting consumers, including children, to sexually explicit material. IDG News Service, 05/07/04.

https://www.nwfusion.com/news/2004/0507ftcsettle.html?nl