Date: Tue, 25 Apr 2006 17:11:57 -0600
From:"Peter Laborge" <plaborge@securityfocus.com>
To:linux-secnews@securityfocus.com
Subject: SecurityFocus Linux Newsletter #283
SecurityFocus Linux Newsletter #283
----------------------------------------

This Issue is Sponsored By: SPI Dynamics

ALERT: "How A Hacker Launches A Blind SQL Injection Attack 
Step-by-Step!" - White Paper
Blind SQL Injection can deliver total control of your server to a 
hacker giving them the ability to read, write and manipulate all data stored 
in your backend systems! Download this *FREE* white paper from SPI 
Dynamics for a complete guide to protection!

https://download.spidynamics.com/1/ad/bsq.asp?Campaign_ID=70130000000CGKl

------------------------------------------------------------------
I.   FRONT AND CENTER
        1. Forensic felonies
II.  LINUX VULNERABILITY SUMMARY
        1. FCheck Insecure Temporary File Creation Vulnerability
        2. Linux Kernel Intel EM64T SYSRET Local Denial of Service 
Vulnerability
        3. Asterisk JPEG File Handling Integer Overflow Vulnerability
        4. Xine Playlist Handling Remote Format String Vulnerability
        5. Linux Kernel Shared Memory Security Restriction Bypass 
Vulnerability
        6. Linux Kernel IP_ROUTE_INPUT Local Denial of Service 
Vulnerability
        7. Multiple Vendor AMD CPU Local FPU Information Disclosure 
Vulnerability
        8. Multiple Linux-Based Cisco Products Local Privilege 
Escalation Vulnerability
        9. Beagle Helper Applications Arbitrary Code Execution 
Vulnerability
        10. GNOME Foundation GDM .ICEauthority Improper File 
Permissions Vulnerability
        11. Linux Kernel RCU signal handling __group_complete_signal 
Function Unspecified Vulnerability
        12. Yukihiro Matsumoto Ruby XMLRPC Server Denial of Service 
Vulnerability
        13. DNSmasq Broadcast Reply Denial Of Service Vulnerability
        14. Blender BVF File Import Python Code Execution Vulnerability
        15. Mozilla Firefox iframe.contentWindow.focus Buffer Overflow 
Vulnerability
        16. Fenice Remote Buffer Overflow and Denial Of Service 
Vulnerabilities
        17. ABC2PS ABC Music Files Remote Buffer Overflow Vulnerability
        18. Invision Power Board Index.PHP CK Parameter SQL Injection 
Vulnerability
III. LINUX FOCUS LIST SUMMARY
        1. Content management solution w/ linux server?
        2. about /dev/shm?
        3. Syncing iptables rules between two servers
IV.  UNSUBSCRIBE INSTRUCTIONS
V.   SPONSOR INFORMATION

I.   FRONT AND CENTER
---------------------
1. Forensic felonies
By Mark Rasch
A new law in Georgia on private investigators extends to computer 
forensics and computer incident response, meaning that forensics experts who 
testify in court without a PI license may be committing a felony.
http://www.securityfocus.com/columnists/399


II.  LINUX VULNERABILITY SUMMARY
------------------------------------
1. FCheck Insecure Temporary File Creation Vulnerability
BugTraq ID: 17524
Remote: No
Date Published: 2006-04-15
Relevant URL: http://www.securityfocus.com/bid/17524
Summary:
FCheck creates temporary files in an insecure manner.

An attacker with local access could potentially exploit this issue to 
view files and obtain privileged information. The attacker may also 
perform symlink attacks, overwriting arbitrary files in the context of the 
affected application.

A successful attack would most likely result in loss of confidentiality 
and theft of privileged information. Successful exploitation of a 
symlink attack may allow an attacker to overwrite sensitive files. This may 
result in a denial of service; other attacks may also be possible.

2. Linux Kernel Intel EM64T SYSRET Local Denial of Service 
Vulnerability
BugTraq ID: 17541
Remote: No
Date Published: 2006-04-17
Relevant URL: http://www.securityfocus.com/bid/17541
Summary:
The Linux kernel is prone to a local denial-of-service vulnerability. 
This issue arises in Intel EM64T CPUs when returning program control 
using SYSRET.

This vulnerability allows local users to crash the kernel, denying 
further service to legitimate users.

3. Asterisk JPEG File Handling Integer Overflow Vulnerability
BugTraq ID: 17561
Remote: Yes
Date Published: 2006-04-17
Relevant URL: http://www.securityfocus.com/bid/17561
Summary:
Asterisk is prone to an integer-overflow vulnerability.

This issue arises when the application handles a malformed JPEG file.

An attacker could exploit this vulnerability to execute arbitrary code 
in the context of the vulnerable application.

4. Xine Playlist Handling Remote Format String Vulnerability
BugTraq ID: 17579
Remote: Yes
Date Published: 2006-04-18
Relevant URL: http://www.securityfocus.com/bid/17579
Summary:
The xine package is reported prone to a remote format-string 
vulnerability.

This issue arises when the application handles specially crafted 
playlist files. An attacker can exploit this vulnerability by crafting a 
malicious file that contains format specifiers and then sending the file to 
an unsuspecting user.

A successful attack may crash the application or lead to arbitrary code 
execution.

All versions of xine are considered vulnerable at the moment.

5. Linux Kernel Shared Memory Security Restriction Bypass Vulnerability
BugTraq ID: 17587
Remote: No
Date Published: 2006-04-18
Relevant URL: http://www.securityfocus.com/bid/17587
Summary:
The Linux kernel is prone to a vulnerability regarding access to shared 
memory.

A local attacker could potentially gain read and write access to shared 
memory and write access to read-only tmpfs filesystems, bypassing 
security restrictions.

An attacker can exploit this issue to possibly corrupt applications and 
their data when the applications use temporary files or shared memory.

6. Linux Kernel IP_ROUTE_INPUT Local Denial of Service Vulnerability
BugTraq ID: 17593
Remote: No
Date Published: 2006-04-19
Relevant URL: http://www.securityfocus.com/bid/17593
Summary:
The Linux kernel is prone to a local denial-of-service vulnerability. 
This issue is due to a design error in the 'ip_route_input()' function.

This vulnerability allows local users to panic the kernel, denying 
further service to legitimate users.

This issue affects Linux kernel versions prior to 2.6.16.8.

7. Multiple Vendor AMD CPU Local FPU Information Disclosure 
Vulnerability
BugTraq ID: 17600
Remote: No
Date Published: 2006-04-19
Relevant URL: http://www.securityfocus.com/bid/17600
Summary:
Multiple vendors' operating systems are prone to a local 
information-disclosure vulnerability. This issue is due to a flaw in the operating 
systems that fail to properly use AMD CPUs.

Local attackers may exploit this vulnerability to gain access to 
potentially sensitive information regarding other processes executing on 
affected computers. This may aid attackers in retrieving information 
regarding cryptographic keys or other sensitive information.

This issue affects Linux and FreeBSD operating systems that use 
generations 7 and 8 AMD CPUs.

8. Multiple Linux-Based Cisco Products Local Privilege Escalation 
Vulnerability
BugTraq ID: 17609
Remote: No
Date Published: 2006-04-19
Relevant URL: http://www.securityfocus.com/bid/17609
Summary:
Multiple Linux-based Cisco products are prone to a local 
privilege-escalation vulnerability. The applications fail to properly sanitize 
user-supplied input.

This issue allows attackers with telnet or SSH access to affected 
devices to execute arbitrary shell commands with superuser privileges. This 
facilitates the complete compromise of affected devices.

9. Beagle Helper Applications Arbitrary Code Execution Vulnerability
BugTraq ID: 17611
Remote: Yes
Date Published: 2006-04-19
Relevant URL: http://www.securityfocus.com/bid/17611
Summary:
Beagle is susceptible to an insecure indexing issue when dealing with 
helper applications. This can lead to arbitrary code execution.

An attacker can exploit this issue to execute arbitrary code with the 
privileges of the user running the vulnerable application.

10. GNOME Foundation GDM .ICEauthority Improper File Permissions 
Vulnerability
BugTraq ID: 17635
Remote: No
Date Published: 2006-04-20
Relevant URL: http://www.securityfocus.com/bid/17635
Summary:
GDM is prone to an improper file-permissions vulnerability.

An attacker can exploit this issue to gain access to sensitive or 
privileged information that may facilitate a complete compromise of the 
vulnerable computer.

11. Linux Kernel RCU signal handling __group_complete_signal Function 
Unspecified Vulnerability
BugTraq ID: 17640
Remote: No
Date Published: 2006-04-21
Relevant URL: http://www.securityfocus.com/bid/17640
Summary:
Linux Kernel is prone to a local unspecified vulnerability.

This issue exists in the '__group_complete_signal' function of the RCU 
signal-handling facility.

Due to a lack of details, further information cannot be provided at the 
moment. This BID will be updated when more details are available.

12. Yukihiro Matsumoto Ruby XMLRPC Server Denial of Service 
Vulnerability
BugTraq ID: 17645
Remote: Yes
Date Published: 2006-04-21
Relevant URL: http://www.securityfocus.com/bid/17645
Summary:
Ruby is affected by a denial-of-service vulnerability in the WEBrick 
HTTP server. This issue is due to the use of blocking network operations. 
Ruby's implementation of XML/RPC is also affected, as it utilizes the 
vulnerable WEBrick server.

This issue allows remote attackers to cause affected web servers to 
fail to respond to further legitimate requests.

Ruby versions prior to 1.8.3 are affected by this issue.

13. DNSmasq Broadcast Reply Denial Of Service Vulnerability
BugTraq ID: 17662
Remote: Yes
Date Published: 2006-04-24
Relevant URL: http://www.securityfocus.com/bid/17662
Summary:
Dnsmasq is prone to a remote denial-of-service vulnerability.

An attacker can exploit this issue to cause the application to crash by 
sending a 'broadcast reply' request to the server application.

By causing the application to crash, the attacker can deny service to 
legitimate users.

14. Blender BVF File Import Python Code Execution Vulnerability
BugTraq ID: 17663
Remote: Yes
Date Published: 2006-04-24
Relevant URL: http://www.securityfocus.com/bid/17663
Summary:
Blender is susceptible to a Python code-execution vulnerability. This 
issue is due to the application's failure to properly sanitize 
user-supplied input before using it in a Python 'eval' statement.

This issue allows attackers to execute arbitrary Python code in the 
context of the user running the affected application.

15. Mozilla Firefox iframe.contentWindow.focus Buffer Overflow 
Vulnerability
BugTraq ID: 17671
Remote: Yes
Date Published: 2006-04-24
Relevant URL: http://www.securityfocus.com/bid/17671
Summary:
Mozilla Firefox is prone to a buffer-overflow vulnerability when 
rendering malformed JavaScript content. An attacker could exploit this issue 
to cause the browser to fail or potentially execute arbitrary code.

Firefox version 1.5.0.2 and earlier versions running on Windows and 
Linux platforms are affected.

16. Fenice Remote Buffer Overflow and Denial Of Service Vulnerabilities
BugTraq ID: 17678
Remote: Yes
Date Published: 2006-04-24
Relevant URL: http://www.securityfocus.com/bid/17678
Summary:
Fenice is susceptible to multiple remote vulnerabilities:

- A buffer-overflow vulnerability. The application fails to perform 
sufficient bounds checking of user-supplied data before copying it to an 
insufficiently sized memory buffer. This issue potentially allows remote 
attackers to execute arbitrary machine code in the context of the 
affected server process. Failed exploit attempts will likely crash the 
application, denying service to legitimate users.

- A denial-of-service vulnerability due to an integer-overflow flaw. 
This issue allows remote attackers to crash the affected application, 
denying service to legitimate users.

Version 1.10 of Fenice is vulnerable to these issues; other versions 
may also be affected.

17. ABC2PS ABC Music Files Remote Buffer Overflow Vulnerability
BugTraq ID: 17689
Remote: Yes
Date Published: 2006-04-25
Relevant URL: http://www.securityfocus.com/bid/17689
Summary:
abc2ps is prone to a remote buffer-overflow vulnerability.

A remote attacker can exploit this issue to execute arbitrary code in 
the context of a user running the application. As a result, the attacker 
can gain unauthorized access to the vulnerable computer.

18. Invision Power Board Index.PHP CK Parameter SQL Injection 
Vulnerability
BugTraq ID: 17690
Remote: Yes
Date Published: 2006-04-25
Relevant URL: http://www.securityfocus.com/bid/17690
Summary:
Invision Power Board is prone to an SQL injection vulnerability. This 
issue is due to a failure in the application to properly sanitize 
user-supplied input before using it in an SQL query.

A successful exploit could result in a compromise of the application, 
disclosure or modification of data, or may permit an attacker to exploit 
vulnerabilities in the underlying database implementation.

III. LINUX FOCUS LIST SUMMARY
---------------------------------
1. Content management solution w/ linux server?
http://www.securityfocus.com/archive/91/431513

2. about /dev/shm?
http://www.securityfocus.com/archive/91/431111

3. Syncing iptables rules between two servers
http://www.securityfocus.com/archive/91/430423

V.   SPONSOR INFORMATION
------------------------
This Issue is Sponsored By: SPI Dynamics

ALERT: "How A Hacker Launches A Blind SQL Injection Attack 
Step-by-Step!" - White Paper
Blind SQL Injection can deliver total control of your server to a 
hacker giving them the ability to read, write and manipulate all data stored 
in your backend systems! Download this *FREE* white paper from SPI 
Dynamics for a complete guide to protection!

https://download.spidynamics.com/1/ad/bsq.asp?Campaign_ID=70130000000CGKl