Date: Tue, 17 Jan 2006 12:59:42 -0700
From:"Peter Laborge" <plaborge@securityfocus.com>
To:linux-secnews@securityfocus.com
Subject: SecurityFocus Linux Newsletter #269
SecurityFocus Linux Newsletter #269
----------------------------------------

This Issue is Sponsored By: SpiDynamics

ALERT: Learn to Think Like a Hacker- Simulate a Hacker Breaking into 
Your Web Apps
The speed with which Web Applications are developed make them prime 
targets for attackers, often these applications were developed so quickly 
that they are not coded properly or subjected to any security testing. 
Hackers know this and use it as their weapon. Download this *FREE* test 
guide from SPI Dynamics to check for Web application vulnerabilities.

https://download.spidynamics.com/1/ad/web.asp?Campaign_ID=701300000003P6V

------------------------------------------------------------------
I.   FRONT AND CENTER
      1. Wiretapping, FISA, and the NSA
      2. Sebek 3: tracking the attackers, part one
II.  LINUX VULNERABILITY SUMMARY
       1. BSD SecureLevel Time Setting Security Restriction Bypass 
Vulnerability
       2. Bogofilter Multiple Remote Buffer Overflow Vulnerabilities
       3. Dave Carrigan Auth_LDAP Remote Format String Vulnerability
       4. Sudo Python Environment Variable Handling Security Bypass 
Vulnerability
       5. Stefan Frings SMS Server Tools Local Format String 
Vulnerability
       6. Petris Local Buffer Overflow Vulnerability
       7. Clam Anti-Virus ClamAV UPX Compressed File Heap Buffer 
Overflow Vulnerability
       8. PostgreSQL Postmaster Denial Of Service Vulnerability
       9. XMame Multiple Local Command Line Argument Buffer Overflow 
Vulnerabilities
III. LINUX FOCUS LIST SUMMARY
       1. Sendmail/Blacklists rejecting authenticated users
       2. Hide internal address (Postfix)
       3. IPS project - wanted translators
IV.  UNSUBSCRIBE INSTRUCTIONS
V.   SPONSOR INFORMATION

I.   FRONT AND CENTER
---------------------
1. Wiretapping, FISA, and the NSA
By Mark Rasch
U.S. wiretapping laws, FISA and Presidential powers given to the NSA to 
intercept communications make for interesting times when coupled with 
technology. What are the issues surrounding privacy, search, seizure and 
surveillance?
http://www.securityfocus.com/columnists/379

2. Sebek 3: tracking the attackers, part one
By Raul Siles, GSE
The first of this two-part series will discuss what Sebek is and what 
makes it so interesting, first by looking at the new capabilities of 
version 3 and how it integrates with GenIII Honeynet infrastructures.
http://www.securityfocus.com/infocus/1855


II.  LINUX VULNERABILITY SUMMARY
------------------------------------
1. BSD SecureLevel Time Setting Security Restriction Bypass 
Vulnerability
BugTraq ID: 16170
Remote: No
Date Published: 2006-01-09
Relevant URL: http://www.securityfocus.com/bid/16170
Summary:
BSD securelevels are susceptible to a security restriction bypass 
vulnerability that allows local attackers to set the system clock to any 
arbitrary value.

This vulnerability allows local attackers to set the system clock to 
any arbitrary value they desire, even those in the past, circumventing 
the securelevel restriction. Various further attacks against 
time-sensitive systems are then possible.

2. Bogofilter Multiple Remote Buffer Overflow Vulnerabilities
BugTraq ID: 16171
Remote: Yes
Date Published: 2006-01-09
Relevant URL: http://www.securityfocus.com/bid/16171
Summary:
Multiple remote buffer overflow vulnerabilities affect Bogofilter. 
These issues are due to a failure of the application to properly handle 
invalid input sequences and validate the length of user-supplied strings 
prior to copying them into static process buffers.

An attacker may exploit these issue to cause a denial of service 
condition. It may also be possible to execute arbitrary code with the 
privileges of the vulnerable application. This may facilitate unauthorized 
access or privilege escalation.

It should be noted that successful exploitation requires that 
Bogofilter is used with an unicode database.


3. Dave Carrigan Auth_LDAP Remote Format String Vulnerability
BugTraq ID: 16177
Remote: Yes
Date Published: 2006-01-09
Relevant URL: http://www.securityfocus.com/bid/16177
Summary:
Dave Carrigan's auth_ldap is susceptible to a remote format string 
vulnerability. This issue is due to a failure of the application to 
properly sanitize user-supplied input prior to utilizing it in the 
format-specifier of a formatted printing function.

These issues likely only arise if auth_ldap has been enabled and is 
used for user authentication. 

This issue allows remote attackers to execute arbitrary machine code in 
the context of Apache Web servers that utilize the affected module. 
This may facilitate the compromise of affected computers.

4. Sudo Python Environment Variable Handling Security Bypass 
Vulnerability
BugTraq ID: 16184
Remote: No
Date Published: 2006-01-09
Relevant URL: http://www.securityfocus.com/bid/16184
Summary:
Sudo is prone to a security bypass vulnerability that could lead to 
arbitrary code execution. This issue is due to an error in the application 
when handling environment variables.

A local attacker with the ability to run Python scripts can exploit 
this vulnerability to gain access to an interactive Python prompt. 
Attackers may then execute arbitrary code with elevated privileges, 
facilitating the complete compromise of affected computers.

An attacker must have the ability to run Python scripts through Sudo to 
exploit this vulnerability.

This issue is similar to BID 15394 ( Sudo Perl Environment Variable 
Handling Security Bypass Vulnerability).

5. Stefan Frings SMS Server Tools Local Format String Vulnerability
BugTraq ID: 16188
Remote: No
Date Published: 2006-01-09
Relevant URL: http://www.securityfocus.com/bid/16188
Summary:
A local format string vulnerability affects Stefan Frings SMS Server 
Tools.

The problem presents itself when the affected application attempts to 
log messages using a formatted print function. User-supplied input is 
improperly sanitized prior to its inclusion in the format specifier 
argument of a formatted print function.

An attacker may leverage this issue to execute arbitrary code with 
superuser privileges, ultimately facilitating privilege escalation.

Version 1.14.8 of SMS Server Tools is vulnerable to this issue; other 
versions may also be affected.

6. Petris Local Buffer Overflow Vulnerability
BugTraq ID: 16190
Remote: No
Date Published: 2006-01-09
Relevant URL: http://www.securityfocus.com/bid/16190
Summary:
petris is vulnerable to a locally exploitable buffer overflow 
vulnerability.  It has been reported that a local attacker may exploit this 
condition to execute attacker-supplied code with group games privileges. 

Due to a lack of information, further details cannot be provided at the 
moment.  This BID will be updated when more information becomes 
available.

7. Clam Anti-Virus ClamAV UPX Compressed File Heap Buffer Overflow 
Vulnerability
BugTraq ID: 16191
Remote: Yes
Date Published: 2006-01-09
Relevant URL: http://www.securityfocus.com/bid/16191
Summary:
ClamAV is prone to a heap buffer overflow vulnerability. This issue is 
due to a failure of the application to properly bounds check 
user-supplied data prior to copying it to an insufficiently sized memory buffer.

This issue occurs when the application attempts to handle compressed 
UPX files.

Exploitation of this issue could allow attacker-supplied machine code 
to be executed in the context of the affected application. The issue 
would occur when the malformed file is scanned manually or automatically 
in deployments such as email gateways.

8. PostgreSQL Postmaster Denial Of Service Vulnerability
BugTraq ID: 16201
Remote: Yes
Date Published: 2006-01-10
Relevant URL: http://www.securityfocus.com/bid/16201
Summary:
PostgreSQL is prone to a denial of service vulnerability. This issue is 
due to a failure in the application to properly handle exceptional 
conditions.

A remote attacker can exploit this issue to crash the postmaster 
service, thus denying future connections until the service is manually 
restarted.

This issue only affects PostgreSQL for Microsoft Windows.

9. XMame Multiple Local Command Line Argument Buffer Overflow 
Vulnerabilities
BugTraq ID: 16203
Remote: No
Date Published: 2006-01-10
Relevant URL: http://www.securityfocus.com/bid/16203
Summary:
XMame is prone to locally exploitable buffer overflow vulnerabilities. 
These issues are due to insufficient bounds checking of command line 
parameters.

Successful exploitation on some systems could result in execution of 
malicious instructions with elevated privileges, as XMame may be 
installed with setuid-superuser privileges.

XMame version 0.102 is vulnerable to these issues; other versions may 
also be affected.

This issue may be related to BID 7773 (XMame Lang Local Buffer Overflow 
Vulnerability).

III. LINUX FOCUS LIST SUMMARY
---------------------------------
1. Sendmail/Blacklists rejecting authenticated users
http://www.securityfocus.com/archive/91/421577

2. Hide internal address (Postfix)
http://www.securityfocus.com/archive/91/421374

3. IPS project - wanted translators
http://www.securityfocus.com/archive/91/421243

V.   SPONSOR INFORMATION
------------------------
This Issue is Sponsored By: SpiDynamics

ALERT: Learn to Think Like a Hacker- Simulate a Hacker Breaking into 
Your Web Apps
The speed with which Web Applications are developed make them prime 
targets for attackers, often these applications were developed so quickly 
that they are not coded properly or subjected to any security testing. 
Hackers know this and use it as their weapon. Download this *FREE* test 
guide from SPI Dynamics to check for Web application vulnerabilities.

https://download.spidynamics.com/1/ad/web.asp?Campaign_ID=701300000003P6V