Americas

  • United States

Bug Alert: CERT warns of DHCP vulnerabilities

Opinion
Jan 16, 20036 mins
NetworkingSecurity

* Patches from Red Hat, Gentoo, others * Beware Sobig worm * Sun releases standards-based Identity Server, and other interesting reading

Today’s bug patches and security alerts:

CERT warns of DHCP vulnerabilities

Several potentially serious security flaws exist in the Internet Software Consortium’s Dynamic Host Configuration Protocol software, which is shipped as part of several operating systems, the CERT Coordination Center warned Thursday. IDG News Service, 01/16/03.

Story:

https://www.nwfusion.com/news/2003/0116certwarns.html

CERT advisory:

https://www.cert.org/advisories/CA-2003-01.html

Related patches:

Red Hat:

https://rhn.redhat.com/errata/RHSA-2003-011.html

**********

Red Hat patches CUPS vulnerabilities

Numerous vulnerabilities have been found in the CUPS printing service for Unix and Linux. These range from local denial-of-service to remote root access vulnerabilities. For more, go to:

https://rhn.redhat.com/errata/RHSA-2002-295.html

Red Hat issues patch for PostgreSQL packages

A couple of bugs and flaws have been patched in the PostgreSQL packages for Red Hat. One bug could lead to an unrecoverable data loss, while two security flaws could be exploited in a denial-of-service attack or to execute arbitrary commands on the affected machine. For more, go to:

https://rhn.redhat.com/errata/RHSA-2003-001.html

Red Hat updates vim

According to an alert from Red Hat, “VIM allows a user to set the modeline differently for each edited text file by placing special comments in the files.  Georgi Guninski found that these comments can be carefully crafted in order to call external programs. This could allow an attacker to create a text file such that when it is opened arbitrary commands are executed.” For more, go to:

Red Hat advisory:

https://rhn.redhat.com/errata/RHSA-2002-297.html

Guninsk’s advisory:

https://www.guninski.com/vim1.html

MySQL patch available for Red Hat users

As we’ve reported with other flavors of Linux, two vulnerabilities have been found in the popular MySQL database application. One flaw could be exploited to crash the affected machine, the other to bypass a password check and execute arbitrary code on the machine. For more, go to:

https://rhn.redhat.com/errata/RHSA-2002-288.html

**********

OpenLDAP fix available

A number of buffer overflow vulnerabilities have been discovered in implementations of the OpenLDAP package. These flaws could be exploited to gain remote access to the affected system. Other local vulnerabilities have been patched as well. For more, go to:

Mandrake Linux:

https://www.mandrakesecure.net/en/advisories/advisory.php?name=MDKSA-2003:006

Debian:

https://www.debian.org/security/2003/dsa-227

**********

Gentoo patches mod_php, php

A buffer overflow vulnerability has been found in php’s wordwrap() function. Gentoo has released a patch for its implementation of the product:

https://forums.gentoo.org/viewtopic.php?t=30004

**********

Mandrake Linux patches KDE

A flaw in the KDE shell command implementation could allow a remote user to access files and data on the affected system. It is also possible to run arbitrary commands on the a machine as well. For more, go to:

https://www.mandrakesecure.net/en/advisories/advisory.php?name=MDKSA-2003:004

**********

SuSE, OpenPKG patch libpng vulnerability

A buffer overflow flaw in PNG image handling software libpng could be exploited to run arbitrary code on the affected machine. An attacker would have to craft a PNG file to trigger the overflow. For more, go to:

SuSE:

https://www.suse.com/de/security/2003_004_libpng.html

OpenPKG:

https://www.openpkg.org/security/OpenPKG-SA-2003.001-png.html

**********

BIND DNS patch update for SCO UnixWare

SCO has released a patch for the BIND DNS implementation that fixes a number of flaws. One vulnerability could be exploited to gain root access to the affected machine. Others could be used in denial-of-service attacks against the affected name server. For more, go to:

ftp://ftp.sco.com/pub/updates/UnixWare/CSSA-2003-SCO.2

**********

Debian releases new IMP packages

A SQL injection vulnerability in the IMP Web-based IMAP mail program could be used by an attacker to run unauthorized SQL queries. For more, go to:

https://www.debian.org/security/2003/dsa-229

**********

Microsoft, Orange to patch smart phone bug

Microsoft and mobile phone operator Orange SA are working to patch a security bug that affects the first mobile phone to use Microsoft’s Windows Powered Smartphone software, Orange said Thursday. IDG News Service, 01/16/03.

https://www.nwfusion.com/news/2003/0116microorang.html

**********

Today’s roundup of virus alerts:

Sobig worm getting bigger

Sobig is a worm that uses e-mail and shared network folders to infect machines running Microsoft’s Windows operating system, according to information posted on the Web site of Helsinki antivirus company F-Secure. IDG News Service, 01/14/03.

https://www.nwfusion.com/news/2003/0114sobigworm.html

W32/Oror-L – A Windows virus that spreads via e-mail, network shares and the Kazaa file-swapping network. The virus uses a number of filenames in attempt to hide itself. It tried to terminate antivirus applications running on the infected machine. (Sophos)

W32/Smelles-A – This virus spreads via an infected file called “Setup.exe.” No word on the damage it causes. (Sophos)

VBS/Moon-B – A VBS-based virus that attempts to dial out to an adult Web service. The virus spreads via an e-mail message entitled “Have a good new year” with an attachment called “fotompg.vbs.” (Sophos)

**********

From the interesting reading department:

Trend Micro broadens offer

Trend Micro is expanding its Enterprise Protection Strategy (EPS), a combination of products, services and centralized management tools that is designed to help IT managers thwart attacks from computer viruses and worms. The company introduced EPS in May. Network World Fusion, 01/15/03.

https://www.nwfusion.com/news/2003/0115tmicro.html

More computer viruses expected in 2003

Computer users should brace for a new onslaught of viruses this year, especially worms deployed into instant messaging systems that allow users to chat quickly and cheaply across the Web, an antivirus expert said Tuesday. DigitalMass.com, 01/14/03.

https://digitalmass.boston.com/news/2003/01/14/viruses.html

Sun releases standards-based Identity Server

Sun Monday released SunONE Identity Server 6.0, one of the first commercially available products to support two key standards for unifying user identity credentials. Network World Fusion, 01/13/03.

https://www.nwfusion.com/news/2003/0113sunships.html

Symantec reports healthy Q3 results

Computer security company Symantec reported third quarter income of $72 million or 44 cents per share, on revenue of $376 million Wednesday, a healthy increase from the company’s performance for the same quarter last year, when it reported net income of just $100,000, or less than 1 cent per share, on revenue of $290 million. IDG News Service, 01/15/03.

https://www.nwfusion.com/news/2003/0115symantec.html

A little fun: Automobile virus spreading through gas nozzles

Americans already upset by rising fuel prices have a new worry at the gas pump, an automobile virus that can take control of their vehicles. The Office of Homeland Security has issued a Fuchsia Alert to all motorists. The virus, Autocae Electrophallus, spreads through infected gas pump nozzles during refueling. BBSpot, 01/13/03.

https://bbspot.com/News/2003/01/nozzle.html

**********

Archives online:

If you need archives, we’ve got ’em:

https://www.nwfusion.com/newsletters/bug/