• United States

Linux vendors issue variety of patches

May 19, 20034 mins

* Patches from Red Hat, Debian, Mandrake Linux, others * Beware Microsoft support worm * Network Associates speeds up Sniffer, and other interesting reading

Today’s bug patches and security alerts:

DoS vulnerability in Cisco IOS Service Assurance Agent

A flaw in the way the Cisco Service Assurance Agent (SAA) responds to Response Time Reporter packets could be exploited to cause the a device running the service to crash. For more, go to:


Red Hat, Debian patch lv

A flaw the way lv, a multilingual file viewer, reads options from a configuration file on the current directly could be exploited by a malicious user to run arbitrary code with the privileges of lv, which could be root. For more, go to:

Red Hat:



Mandrake Linux, Debian release patch for MySQL

A flaw in MySQL could allow an attacker to use the  “SELECT * INTO OUTFILE” operator to overwrite a certain configuration file. The action could be used to restart the MySQL daemon with root privileges. For more, go to:

Mandrake Linux:



Debian patches sendmail

A flaw in three scripts used by the sendmail application could be exploited by a malicious user to gain elevated privileges on the affected machine, including root. For more, go to:


Mandrake Linux issues patch for xinetd

A flaw in the way memory was handled by xinetd could be exploited by a malicious user to cause a denial-of-service against the affected machine. A fix is available. For more, go to:

Mandrake Linux releases fix for cdrecord

The cdrecord application shipped with Mandrake Linux had certain privileges set wrong, which could be exploited to gain root access on the affected machine. For more, go to:


EnGarde, OpenPKG release patches for gnupg

A flaw in the way keys held my multiple users is validated could allow certain users greater access than they’re intended to recieve. For more, go to:




EnGarde fixes kernel

A number of bugs and security vulnerabilities in the kernel for EnGarde’s Linux implementation have been fixed. For more, go to:

EnGarde patches vulnerability in Sudo

A heap corruption vulnerability exists in Sudo that could be exploited by a malicious user to run arbitrary commands. For more, go to:


Immunix releases fix for fileutils

A race condition in the fileutils suite for ImmunixOS could be exploited by a local user to gain root access on the affected machine. For more, go to:


Today’s roundup of virus alerts:

New Microsoft support worm very unhelpful

A new mass mailing e-mail worm is spreading on the Internet, masking itself as a message from Microsoft’s support organization. The new worm is known both as W32/Palyh and W32.HLLW.Mankx@mm and arrives as an executable attachment to e-mail messages with a variety of subjects and messages. All messages containing the new virus purport to come from the same address:, according to alerts posted by a number of leading antivirus software vendors. IDG News Service, 05/19/03.

W32/Lovgate-I – A minor variant of the W32/Lovgate-J worm, which installs a Trojan horse on the infected machine. (Sophos)

Trifor – A Trojan horse that spreads via an iFrame vulnerability in Internet Explorer. The virus resets the IE home page, but does not seem to cause any permanent damage. (Panda Software)


From the interesting reading department:

Johnson & Johnson solidifies security

Information security managers at healthcare giant Johnson & Johnson have begun the large-scale rollout of digital certificates that eventually will replace passwords at the corporation. Network World, 05/19/03.

Tricky worm triggers new P2P alarms

A dangerous worm called Fizzer that last week was discovered sneaking its way into U.S. corporate networks via the Kazaa peer-to-peer program has raised anew concerns that such file-sharing networks are risky business. Network World, 05/19/03.

Network Associates speeds up Sniffer

Network Associates this week is scheduled to announce a protocol analyzer that boasts a packet-capture rate four times as high as its previous model and will serve as a platform for forthcoming antivirus and intrusion-detection capabilities. Network World, 05/19/03.

Federal government cracks down on Internet fraud

More than 130 people have been arrested and $17 million worth of property seized in an Internet fraud sweep announced Friday by three U.S. government agencies. IDG News Service, 05/16/03.