Date: 30 Nov 2004 18:25:19 -0000
From:"Peter Laborge" <plaborge@securityfocus.com>
To:linux-secnews@securityfocus.com
Subject: SecurityFocus Linux Newsletter #212
SecurityFocus Linux Newsletter #212
------------------------------------

Need to know what's happening on YOUR network? Symantec DeepSight 
Analyzer
is a free service that gives you the ability to track and manage 
attacks.
Analyzer automatically correlates attacks from various Firewall and 
network
based Intrusion Detection Systems, giving you a comprehensive view of 
your
computer or general network. Sign up today!

http://www.securityfocus.com/sponsor/Symantec_sf-news_041130

------------------------------------------------------------------------
I. FRONT AND CENTER
     1. Profitware
II. LINUX VULNERABILITY SUMMARY
     1. PHPBB Login Form Multiple Input Validation Vulnerabilities
     2. W-Channel TC-IDE Embedded Linux Local Privilege Escalation V...
     3. Sun Java Runtime Environment Java Plug-in JavaScript Securit...
     4. Cyrus IMAPD Multiple Remote Vulnerabilities
     5. F-Secure Anti-Virus ZIP Archive Scanner Bypass Vulnerability
     6. ProZilla Multiple Remote Buffer Overflow Vulnerabilities
     7. Soldier Of Fortune 2 Buffer Overflow Vulnerability
     8. Cyrus IMAPD Multiple Remote Unspecified Vulnerabilities
     9. SugarCRM Unspecified Vulnerabilities
     10. Open DC Hub Remote Buffer Overflow Vulnerability
     11. Yard Radius Remote Buffer Overflow Vulnerability
     12. Linux Kernel Unspecified Local Denial Of Service And Memory 
...
     13. Sun Java Applet Invocation Version Specification Weakness
     14. Opera Web Browser Infinite Array Sort Denial Of Service 
Vuln...
     15. YaBB Shadow BBCode Tag JavaScript Injection Vulnerability
III. LINUX FOCUS LIST SUMMARY
     NO NEW POSTS FOR THE WEEK 2004-11-23 to 2004-11-30.
IV. NEW PRODUCTS FOR LINUX PLATFORMS
     1. CoreGuard Core Security System
     2. EnCase Forensic Edition
     3. KeyGhost SX
     4. SafeKit
     5. Astaro Linux Firewall
     6. CAT Cellular Authentication Token and eAuthentication Servic...
V. NEW TOOLS FOR LINUX PLATFORMS
     1. AutoScan b0.92 R6
     2. ksb26-2.6.9 Kernel Socks Bouncer for 2.6.x kernels 2.6.9
     3. rootsh 0.2
     4. Maillog View  v1.03.3
     5. BullDog Firewall 20040918
     6. PIKT - Problem Informant/Killer Tool v1.17.0
VII. SPONSOR INFORMATION

I. FRONT AND CENTER
-------------------
1. Profitware
By Kelly Martin

Some of the largest anti-virus companies have virtually ignored the 
spyware
problem because there is no profit incentive for them to do otherwise.
Meanwhile, spyware companies make millions.

http://www.securityfocus.com/columnists/278

II. LINUX VULNERABILITY SUMMARY
-------------------------------
1. PHPBB Login Form Multiple Input Validation Vulnerabilities
BugTraq ID: 11716
Remote: Yes
Date Published: Nov 20 2004
Relevant URL: http://www.securityfocus.com/bid/11716
Summary:
Multiple input validation vulnerabilities affect the login form of 
phpBB. These issues are due to a failure of the application to perform 
proper sanitization prior to including user-supplied input in dynamically 
generated content and SQL queries.

An attacker may leverage these issues to execute arbitrary client side 
script code in the browser of an unsuspecting user and inject arbitrary 
SQL syntax into SQL queries. This may potentially lead to theft of 
cookie-based authentication credentials, theft of sensitive information or 
corruption of data as well as other attacks. 

It should be noted that it is possible that one or more of these issues 
has been reported in a previous BID.  This BID will be updated as more 
information becomes available.

2. W-Channel TC-IDE Embedded Linux Local Privilege Escalation V...
BugTraq ID: 11718
Remote: No
Date Published: Nov 20 2004
Relevant URL: http://www.securityfocus.com/bid/11718
Summary:
Multiple local privilege escalation vulnerabilities reportedly exist in 
W-Channel TC-IDE.  These issues are due to input handling errors that 
allow a local attacker to start applications with escalated privileges.

A local attacker may leverage these issues to gain superuser access to 
the affected computer, facilitating privilege escalation.

3. Sun Java Runtime Environment Java Plug-in JavaScript Securit...
BugTraq ID: 11726
Remote: Yes
Date Published: Nov 22 2004
Relevant URL: http://www.securityfocus.com/bid/11726
Summary:
A vulnerability is reported to exist in the access controls of the Java 
to JavaScript data exchange within web browsers that employ the Sun 
Java Plug-in. Reports indicate that it is possible for a malicious website 
that contains JavaScript code to exploit this vulnerability to load a 
dangerous Java class and to pass this class to an invoked applet.

** UPDATE: It is reported that the various methods of invoking Java 
applets can be abused to specify which version of a plug-in will be used 
to run an applet. If a vulnerable version is still installed on the 
computer, it may be possible for to specify that this version runs the 
applet instead of an updated version that is not prone to the 
vulnerability. Users affected by this vulnerability should remove earlier versions 
of the plug-in. This functionality could also be abused to prompt users 
to install vulnerable versions of the plug-in, so users should be wary 
of doing so. This general security weakness has been assigned an 
individual BID (11757). It is not known to what degree the Sun Java Runtime 
Environment Java Plug-in JavaScript Security Restriction Bypass 
Vulnerability is affected by this security weakness, though a number of other 
known vulnerabilities could be affected.

4. Cyrus IMAPD Multiple Remote Vulnerabilities
BugTraq ID: 11729
Remote: Yes
Date Published: Nov 23 2004
Relevant URL: http://www.securityfocus.com/bid/11729
Summary:
Several remote buffer overflow and heap corruption vulnerabilities in 
versions of Cyrus IMAPD up to 2.2.8 have been identified.

These vulnerabilities reportedly allow remote, attacker-supplied 
machine code to be executed in the context of the affected server process. 
Cyrus-IMAPD is usually running as a non-privileged user.

5. F-Secure Anti-Virus ZIP Archive Scanner Bypass Vulnerability
BugTraq ID: 11732
Remote: Yes
Date Published: Nov 23 2004
Relevant URL: http://www.securityfocus.com/bid/11732
Summary:
A vulnerability is reported to be present in the F-secure Anti-Virus 
software that may cause the software to fail in detecting malicious ZIP 
archives. It is reported that the software does not filter certain ZIP 
archives.

Exploitation of this vulnerability may result in a false sense of 
security and in the execution of malicious applications.

6. ProZilla Multiple Remote Buffer Overflow Vulnerabilities
BugTraq ID: 11734
Remote: Yes
Date Published: Nov 23 2004
Relevant URL: http://www.securityfocus.com/bid/11734
Summary:
It is reported that multiple buffer overflow vulnerabilities exist in 
ProZilla. These issues are due to a failure of the application to 
properly bounds check user-supplied input prior to copying it into fixed 
sized memory buffers.

These vulnerabilities allow remote attackers to execute arbitrary code 
in the context of a user running the affected application. A victim 
user is required to attempt to download files from an attacker-controlled 
server for an exploit to succeed.

7. Soldier Of Fortune 2 Buffer Overflow Vulnerability
BugTraq ID: 11735
Remote: Yes
Date Published: Nov 23 2004
Relevant URL: http://www.securityfocus.com/bid/11735
Summary:
It is reported that Soldier of Fortune 2 is susceptible to a buffer 
overflow vulnerability. This issue is due to a failure of the application 
to perform sufficient bounds checking on user-supplied input prior to 
copying it to a fixed-sized memory buffer.

A remote attacker may exploit this vulnerability to deny service to 
legitimate users. Due to the nature of this vulnerability, it is 
conjectured that remote code execution may be possible, but this is not 
confirmed.

8. Cyrus IMAPD Multiple Remote Unspecified Vulnerabilities
BugTraq ID: 11738
Remote: Yes
Date Published: Nov 24 2004
Relevant URL: http://www.securityfocus.com/bid/11738
Summary:
Cyrus IMAPD is reported prone to multiple remote unspecified buffer 
overflow vulnerabilities. The following issues are reported:

It is reported that the first issue exists in the 'IMAPMAGICPLUS' 
functionality provided by Cyrus IMAPD. This vulnerability exists prior to 
authentication, and is therefore reportedly exploitable by anonymous 
remote attackers.

Additionally a buffer overflow vulnerability is reported to exist in 
the 'mysasl_canon_user' Cyrus IMAPD function.

These vulnerabilities reportedly may allow remote, attacker-supplied 
machine code to be executed in the context of the affected server 
process.

9. SugarCRM Unspecified Vulnerabilities
BugTraq ID: 11740
Remote: Yes
Date Published: Nov 23 2004
Relevant URL: http://www.securityfocus.com/bid/11740
Summary:
SugarCRM version 2.0.1a has been released to address multiple security 
vulnerabilities.  The vendor has not publicized specific details about 
the vulnerabilities that were addressed in this release.

10. Open DC Hub Remote Buffer Overflow Vulnerability
BugTraq ID: 11747
Remote: Yes
Date Published: Nov 24 2004
Relevant URL: http://www.securityfocus.com/bid/11747
Summary:
A remote buffer overflow vulnerability reportedly affects the Open DC 
Hub.  This issue is due to a failure of the application to properly 
validate the length of user-supplied strings prior to copying them into 
finite process buffers.

An attacker may exploit this issue to execute arbitrary code with the 
privileges of the user that activated the vulnerable application.  This 
may facilitate unauthorized access or privilege escalation.

11. Yard Radius Remote Buffer Overflow Vulnerability
BugTraq ID: 11753
Remote: Yes
Date Published: Nov 25 2004
Relevant URL: http://www.securityfocus.com/bid/11753
Summary:
Yard Radius is prone to a remotely exploitable stack-based buffer 
overflow.  This issue could reportedly be exploited prior to authentication.  
Successful exploitation may result in execution of arbitrary code in 
the context of the server, which may be running as the superuser.

12. Linux Kernel Unspecified Local Denial Of Service And Memory ...
BugTraq ID: 11754
Remote: No
Date Published: Nov 25 2004
Relevant URL: http://www.securityfocus.com/bid/11754
Summary:
The Linux kernel is reported prone to multiple local vulnerabilities. 
The following issues are reported:

Reports indicate that a handcrafted 'a.out' file may be used to trigger 
a local denial of service condition.

A local attacker may exploit this vulnerability to trigger a 
system-wide denial of service, potentially resulting in a kernel panic.

A memory disclosure vulnerability is also reported to affect the Linux 
kernel. 

A local attacker may exploit this vulnerability to disclose random 
pages of physical memory.

This BID will be updated, as further details regarding these 
vulnerabilities are made available.

13. Sun Java Applet Invocation Version Specification Weakness
BugTraq ID: 11757
Remote: Yes
Date Published: Nov 25 2004
Relevant URL: http://www.securityfocus.com/bid/11757
Summary:
Java provides support for dynamic and static versioning when loading 
applets in the Java plug-in.  What this means is that it is possible 
during the invocation of an applet to request that a particular version of 
a plug-in is used to run the applet.  The feature is accessible through 
various HTML tags that allow Java applets to be embedded in HTML 
documents, such as the EMBED, OBJECT, and APPLET tags.

This feature presents a security weakness in that it may be abused to 
cause a previous version of a plug-in, that is known to be prone to 
security vulnerabilities, to be loaded in lieu of a more recent version 
that has been patched for said security vulnerabilities.   For this design 
flaw to pose a security threat, a vulnerable plug-in must either 
already be installed on the host computer or the user must manually install a 
version that is prone to security vulnerabilities.  In this instance 
that a targeted version is not installed, the user may be prompted to 
install the targeted plug-in version.  

This weakness could result in a false sense of security since it is 
believed that installing an updated version will eliminate vulnerabilities 
in previous versions.

It should be noted that this feature is supported in various Web 
browsers, and therefore the browsers themselves may be prone to the issue.  
Some browsers may not allow a Java plug-in that is no longer registered 
with the browser to run.

This design flaw was originally discussed in an update to BID 11726.

14. Opera Web Browser Infinite Array Sort Denial Of Service Vuln...
BugTraq ID: 11762
Remote: Yes
Date Published: Nov 25 2004
Relevant URL: http://www.securityfocus.com/bid/11762
Summary:
The Opera Web browser is prone to a vulnerability that may result in a 
browser crash.  This issue is exposed when the browser performs an 
infinite JavaScript array sort operation.  It is conjectured that this will 
only result in a denial of service and is not further exploitable to 
execute arbitrary code, though this has not been confirmed.

15. YaBB Shadow BBCode Tag JavaScript Injection Vulnerability
BugTraq ID: 11764
Remote: Yes
Date Published: Nov 26 2004
Relevant URL: http://www.securityfocus.com/bid/11764
Summary:
YaBB is reported prone to a JavaScript injection vulnerability. It is 
reported that the BBCode 'shadow' tag is not sufficiently sanitized of 
malicious script content. 

An attacker that has an account on the affected bulletin board may 
exploit this vulnerability to inject arbitrary JavaScript code into forum 
posts through the 'shadow' tag.

III. LINUX FOCUS LIST SUMMARY
-----------------------------
NO NEW POSTS FOR THE WEEK 2004-11-23 to 2004-11-30.

IV. NEW PRODUCTS FOR LINUX PLATFORMS
------------------------------------
1. CoreGuard Core Security System
By: Vormetric
Platforms: AIX, Linux, Solaris, Windows 2000, Windows XP
Relevant URL: http://www.vormetric.com/products/#overview
Summary: 

CoreGuard System profile

The CoreGuard System is the industry's first solution that enforces
acceptable use policy for sensitive digital information assets and
protects personal data privacy across an enterprise IT environment.
CoreGuard's innovative architecture and completeness of technology
provide a comprehensive, extensible solution that tightly integrates 
all
the elements required to protect information across a widespread,
heterogeneous enterprise network, while enforcing separation of duties
between security and IT administration. At the same time, CoreGuard is
transparent to users, applications and storage infrastructures for ease
of deployment and system management.

CoreGuard enables customers to:
* Protect customer personal data privacy and digital information assets 
* Protect data at rest from unauthorized viewing by external attackers
and unauthorized insiders
* Enforce segregation of duties between IT administrators and security
administration
* Ensure host & application integrity * Block malicious code, including
zero-day exploits

2. EnCase Forensic Edition
By: Guidance Software Inc.
Platforms: DOS, FreeBSD, Linux, MacOS, NetBSD, OpenBSD, PalmOS, 
Solaris, UNIX, Windows 2000, Windows 95/98, Windows NT, Windows XP
Relevant URL: 
http://www.guidancesoftware.com/products/EnCaseForensic/index.shtm
Summary: 

EnCase Forensic Edition Version 4 delivers the most advanced features 
for computer forensics and investigations. With an intuitive GUI and 
superior performance, EnCase Version 4 provides investigators with the 
tools to conduct large-scale and complex investigations with accuracy and 
efficiency. Guidance Software?s award winning solution yields 
completely non-invasive computer forensic investigations while allowing 
examiners to easily manage large volumes of computer evidence and view all 
relevant files, including "deleted" files, file slack and unallocated 
space. 

The integrated functionality of EnCase allows the examiner to perform 
all functions of the computer forensic investigation process. EnCase's 
EnScript, a powerful macro-programming language and API included within 
EnCase, allows investigators to build customized and reusable forensic 
scripts.

3. KeyGhost SX
By: KeyGhost Ltd
Platforms: BeOS, DOS, Linux, OS/2, Solaris, SunOS, Windows 2000, 
Windows 95/98, Windows NT, Windows XP
Relevant URL: http://www.keyghost.com/SX/
Summary: 

KeyGhost SX discreetly captures and records all keystrokes typed, 
including chat conversations, email, word processor, or even activity within 
an accounting or specialist system. It is completely undetectable by 
software scanners and provides you with one of the most powerful stealth 
surveillance applications offered anywhere. 

Because KeyGhost uses STRONG 128-Bit encryption to store the recorded 
data in it?s own internal memory (not on the hard drive), it is 
impossible for a network intruder to gain access to any sensitive data stored 
within the device.

4. SafeKit
By: Evidian Inc.
Platforms: AIX, HP-UX, Linux, Solaris, Windows 2000
Relevant URL: http://www.evidian.com/safekit/index.htm
Summary: 

Evidian's SafeKit technology makes it possible to render any 
application available 24 hours per day. With no extra hardware: just use your 
existing servers and install this software-only solution.

This provides ultimate scalability. As your needs grow, all you need to 
do is add more standard servers into the cluster. With the load 
balancing features of SafeKit, you can distribute applications over multiple 
servers. If one system fails completely, the others will continue to 
serve your users.

5. Astaro Linux Firewall
By: Astaro
Platforms: Linux
Relevant URL: http://www.astaro.com/php/statics.php?action=asl&lang=gb
Summary: 

Astaro Linux Firewall: All-in-one firewall, virus protection, content 
filtering and spam protection internet security software package for 
Linux. 
Free download for home users.

6. CAT Cellular Authentication Token and eAuthentication Servic...
By: Mega AS Consulting Ltd
Platforms: Java, Linux, OpenBSD, Os Independent, SecureBSD, Solaris, 
UNIX, Windows 2000, Windows NT
Relevant URL: http://www.megaas.co.nz
Summary: 

Low cost, easy to use Two Factor Authentication One Time Password token 
using the Cellular. Does not use SMS or communication, manages multiple 
OTP accounts - new technology. For any business that want a safer 
access to its Internet Services. More information at our site.
 
We also provide eAuthentication service for businesses that will not 
buy an Authentication product but would prefer to pay a monthly charge 
for authentication services from our our CAT Server.

V. NEW TOOLS FOR LINUX PLATFORMS
--------------------------------
1. AutoScan b0.92 R6
By: Lagarde Thierry
Relevant URL: http://autoscan.free.fr/
Platforms: Linux
Summary: 

AutoScan is an application designed to explore and to manage your 
network. Entire subnets can be scanned simultaneously without human 
intervention. It features OS detection, automatic network discovery, a port 
scanner, a Samba share browser, and the ability to save the network state.

2. ksb26-2.6.9 Kernel Socks Bouncer for 2.6.x kernels 2.6.9
By: Paolo Ardoino
Relevant URL: http://ardoino.altervista.org/kernel.php
Platforms: Linux
Summary: 

KSB26 [Kernel Socks Bouncer] is Linux Kernel 2.6.x patch that redirects 
full tcp connections [SSH, telnet, ...] to follow through socks5. KSB26 
uses a character device to pass socks5 and target ips to the Linux 
Kernel. I have choosen to write in kernel space to enjoy myself [I know 
that there are easier and safer ways to write this in userspace].

3. rootsh 0.2
By: Gerhard Lausser
Relevant URL: http://sourceforge.net/projects/rootsh/
Platforms: AIX, HP-UX, Linux, POSIX, SINIX, Solaris, UNIX
Summary: 

Rootsh is a wrapper for shells which logs all echoed keystrokes and 
terminal output to a file and/or to syslog. It's main purpose is the 
auditing of users who need a shell with root privileges. They start rootsh 
through the sudo mechanism. I's in heavy use here at a big bavarian car 
manufacturer (three letters, fast, cool,...) for project users whom you 
can't deny root privileges.

4. Maillog View  v1.03.3
By: Angelo 'Archie' Amoruso
Relevant URL: http://www.netorbit.it/modules.html
Platforms: Linux
Summary: 

Maillog View is a Webmin module that allows you to easily view all your 
/var/log/maillog.* files. It features autorefresh, message size 
indication, ascending/descending view order, compressed file support, and a 
full statistics page. Sendmail, Postfix, Exim, and Qmail (partially) are 
supported. Courier MTA support is experimental.

5. BullDog Firewall 20040918
By: Robert APM Darin
Relevant URL: http://tanaya.net/BullDog
Platforms: Linux
Summary: 

Bulldog is a powerful but lightweight firewall for heavy use systems. 
With many features, this firewall can be used by anyone who wants to 
protect his/her systems.

This system allow dynamic and static rules sets for maximum protection 
and has several advance features.

This firewall will work for the hobbyist or a military base. Generation 
7 is a complete rewrite and redesign from scratch.

Be prepared to spend some time setting this up.

6. PIKT - Problem Informant/Killer Tool v1.17.0
By: Robert Osterlund, robert.osterlund@gsb.uchicago.edu
Relevant URL: http://pikt.org
Platforms: AIX, FreeBSD, HP-UX, IRIX, Linux, Solaris, SunOS
Summary: 

PIKT is a cross-categorical, multi-purpose toolkit to monitor and 
configure computer systems, organize system security, format documents, 
assist command-line work, and perform other common systems administration 
tasks.

PIKT's primary purpose is to report and fix problems, but its 
flexibility and extendibility evoke many other uses limited only by your 
imagination.

VII. SPONSOR INFORMATION
-----------------------

Need to know what's happening on YOUR network? Symantec DeepSight 
Analyzer
is a free service that gives you the ability to track and manage 
attacks.
Analyzer automatically correlates attacks from various Firewall and 
network
based Intrusion Detection Systems, giving you a comprehensive view of 
your
computer or general network. Sign up today!

http://www.securityfocus.com/sponsor/Symantec_sf-news_041130

------------------------------------------------------------------------