Date: 16 Nov 2004 21:13:06 -0000
From:"Peter Laborge" <plaborge@securityfocus.com>
To:linux-secnews@securityfocus.com
Subject: SecurityFocus Linux Newsletter #210
SecurityFocus Linux Newsletter #210
------------------------------------

This Issue is Sponsored By: Symantec

Need to know what's happening on YOUR network? Symantec DeepSight 
Analyzer
is a free service that gives you the ability to track and manage 
attacks.
Analyzer automatically correlates attacks from various Firewall and 
network
based Intrusion Detection Systems, giving you a comprehensive view of 
your
computer or general network. Sign up today!

http://www.securityfocus.com/sponsor/Symantec_linux-secnews_041116

------------------------------------------------------------------------
I. FRONT AND CENTER
     1. The Worst Case Scenario
II. LINUX VULNERABILITY SUMMARY
     1. Gentoo Linux Multiple PDF EBuild Updates Unspecified Vulnera...
     2. Gentoo Portage Dispatch-Conf Insecure Temporary File Creatio...
     3. Gentoo Gentoolkit QPKG Insecure Temporary File Creation Vuln...
     4. Yukihiro Matsumoto Ruby CGI Module Unspecified Denial Of Ser...
     5. Samba Remote Wild Card Denial Of Service Vulnerability
     6. EGroupWare JiNN Application Unspecified Vulnerability
     7. Pavuk Multiple Unspecified Remote Buffer Overflow Vulnerabil...
     8. Up-IMAPProxy Multiple Remote Vulnerabilities
     9. Nucleus CMS Multiple Unspecified Input Validation Vulnerabil...
     10. SQLgrey Postfix Greylisting Service SQL Injection 
Vulnerabil...
     11. Samhain Labs Samhain Database Update Local Heap Overflow 
Vul...
     12. MTink Insecure Temporary File Creation Vulnerability
     13. Mozilla Firefox Download Dialogue Box File Name Spoofing 
Vul...
     14. Mozilla Firefox Insecure Default Installation Vulnerability
     15. Linux Kernel BINFMT_ELF Loader Local Privilege Escalation 
Vu...
     16. BNC getnickuserhost IRC Server Response Buffer Overflow 
Vuln...
     17. SquirrelMail decodeHeader HTML Injection Vulnerability
     18. JWhois Double Free Memory Corruption Vulnerability
     19. EZ-IPupdate Remote Format String Vulnerability
     20. Davfs2 Insecure Temporary File Creation Vulnerability
     21. GD Graphics Library Multiple Unspecified Remote Buffer 
overf...
     22. ARJ Software UNARJ Remote Buffer Overflow Vulnerability
     23. OpenSkat Weak Encryption Key Generation Vulnerability
     24. GratiSoft Sudo Restricted Command Execution Bypass 
Vulnerabi...
III. LINUX FOCUS LIST SUMMARY
     NO NEW POSTS FOR THE WEEK 2004-11-09 to 2004-11-16.
IV. NEW PRODUCTS FOR LINUX PLATFORMS
     1. Cyber-Ark  Inter-Business Vault
     2. EnCase Forensic Edition
     3. KeyGhost SX
     4. SafeKit
     5. Astaro Linux Firewall
     6. CAT Cellular Authentication Token and eAuthentication Servic...
V. NEW TOOLS FOR LINUX PLATFORMS
     1. ksb26-2.6.9 Kernel Socks Bouncer for 2.6.x kernels 2.6.9
     2. rootsh 0.2
     3. Maillog View  v1.03.3
     4. BullDog Firewall 20040918
     5. PIKT - Problem Informant/Killer Tool v1.17.0
     6. ID-Synch 3.1
VII. SPONSOR INFORMATION

I. FRONT AND CENTER
-------------------
1. The Worst Case Scenario
By Mark Rasch

The fine print in an insurance policy becomes an issue when a bizarre 
chain
of IT disasters leaves a company without a single copy of the source 
code
to its flagship product.

http://www.securityfocus.com/columnists/276

II. LINUX VULNERABILITY SUMMARY
-------------------------------
1. Gentoo Linux Multiple PDF EBuild Updates Unspecified Vulnera...
BugTraq ID: 11614
Remote: Yes
Date Published: Nov 06 2004
Relevant URL: http://www.securityfocus.com/bid/11614
Summary:
Gentoo Linux released updated Xpdf, CUPS, GPdf, KPDF and KOffice 
eBuilds to address the vulnerability described in BID 11501 (Xpdf PDFTOPS 
Multiple Integer Overflow Vulnerabilities) on October 28, 2004.

The vendor has reported that these updated eBuilds introduced an 
unspecified vulnerability. The vulnerability is reported to present itself 
only on 64-bit platforms.

2. Gentoo Portage Dispatch-Conf Insecure Temporary File Creatio...
BugTraq ID: 11616
Remote: No
Date Published: Nov 07 2004
Relevant URL: http://www.securityfocus.com/bid/11616
Summary:
The Gentoo dispatch-conf script is affected by an unspecified insecure 
temporary file creation vulnerability. This issue is likely due to a 
design error that causes the application to fail to verify the existence 
of a file before writing to it.

An attacker may leverage this issue to overwrite arbitrary files with 
the privileges of an unsuspecting user that activates the vulnerable 
application.

3. Gentoo Gentoolkit QPKG Insecure Temporary File Creation Vuln...
BugTraq ID: 11617
Remote: No
Date Published: Nov 07 2004
Relevant URL: http://www.securityfocus.com/bid/11617
Summary:
The qpkg utility is affected by an unspecified insecure temporary file 
creation vulnerability.  This issue is likely due to a design error 
that causes the application to fail to verify the existence of a file 
before writing to it.

An attacker may leverage this issue to overwrite arbitrary files with 
the privileges of an unsuspecting user that activates the vulnerable 
application.

4. Yukihiro Matsumoto Ruby CGI Module Unspecified Denial Of Ser...
BugTraq ID: 11618
Remote: Yes
Date Published: Nov 08 2004
Relevant URL: http://www.securityfocus.com/bid/11618
Summary:
Ruby is reported prone to a remote denial of service vulnerability. It 
is reported that when the Ruby CGI module handles certain requests, it 
may fall into an infinite loop and consume system CPU resources.

A remote attacker may exploit this vulnerability to deny service to a 
computer that is running the affected Ruby CGI module.

5. Samba Remote Wild Card Denial Of Service Vulnerability
BugTraq ID: 11624
Remote: Yes
Date Published: Nov 08 2004
Relevant URL: http://www.securityfocus.com/bid/11624
Summary:
A remote denial of service vulnerability affects the wild card file 
name functionality of Samba.  This issue is caused due to a failure of the 
application to properly validate malformed user-supplied strings.

An attacker may leverage this issue to cause the affected application 
to hang, effectively denying service to legitimate users.

6. EGroupWare JiNN Application Unspecified Vulnerability
BugTraq ID: 11625
Remote: Yes
Date Published: Nov 08 2004
Relevant URL: http://www.securityfocus.com/bid/11625
Summary:
eGroupWare JiNN application is reported prone to an unspecified 
vulnerability.

Further details of this issue are not available at the time of writing. 
This BID will be updated as details are released.

7. Pavuk Multiple Unspecified Remote Buffer Overflow Vulnerabil...
BugTraq ID: 11626
Remote: Yes
Date Published: Nov 08 2004
Relevant URL: http://www.securityfocus.com/bid/11626
Summary:
Pavuk is reported prone to multiple unspecified remote buffer overflow 
vulnerabilities.  These issue exist due to insufficient boundary checks 
performed by the application.  A remote attacker may exploit these 
vulnerabilities to cause a denial of service condition or execute arbitrary 
code on a vulnerable computer.

In addition to these vulnerabilities, Pavuk is reported prone to other 
buffer overflow vulnerabilities affecting the digest authentication 
handler and the HTTP header processing functionality.  It is likely that 
these issues are related to BIDS 10633 and 10797.  This information 
cannot be confirmed at the moment.  This BID will be updated as more 
information becomes available.

Pavuk versions 0.9pl30b and prior are affected by these 
vulnerabilities.

8. Up-IMAPProxy Multiple Remote Vulnerabilities
BugTraq ID: 11630
Remote: Yes
Date Published: Nov 08 2004
Relevant URL: http://www.securityfocus.com/bid/11630
Summary:
up-imapproxy is reported prone to multiple remote vulnerabilities. The 
following specific issues are reported:

It is reported that multiple denial of service conditions exist in the 
way up-imapproxy handles literal values. Literal data processed by 
affected functions will result in a denial of service. Additionally, a 
literal value passed as a command to the affected service will result in a 
denial of service if the command does not exist.

A remote attacker may exploit these vulnerabilities to crash the 
affected service effectively denying service to legitimate users.

Finally, it is reported that literal value sizes are stored in signed 
integer format. The discoverer of these vulnerabilities reports that 
this may result in a boundary condition on 64-bit platforms.

A remote attacker may potentially exploit this condition to reveal 
potentially sensitive data. 

It should be noted that reports indicate that up-imapproxy may not 
actually execute on 64-bit platforms.

9. Nucleus CMS Multiple Unspecified Input Validation Vulnerabil...
BugTraq ID: 11631
Remote: Yes
Date Published: Nov 09 2004
Relevant URL: http://www.securityfocus.com/bid/11631
Summary:
Multiple unspecified vulnerabilities reportedly affect Nucleus CMS.  
These issue are due to a failure of the application to properly sanitize 
user-supplied input prior to employing it in critical locations 
including dynamic content and database queries.

A remote attacker may leverage these issues to steal cookie-based 
authentication credentials, reveal sensitive data and corrupt database 
contents.

10. SQLgrey Postfix Greylisting Service SQL Injection Vulnerabil...
BugTraq ID: 11633
Remote: Yes
Date Published: Nov 08 2004
Relevant URL: http://www.securityfocus.com/bid/11633
Summary:
SQLgrey Postfix Greylisting Service is prone to an SQL injection 
vulnerability.  This issue is reportedly due to insufficient sanitization of 
SQL syntax from fields in email processed by the software.  

The issue could be exploited to influence SQL queries, potentially 
allowing for compromise of the software or other attacks that impact 
database security.

11. Samhain Labs Samhain Database Update Local Heap Overflow Vul...
BugTraq ID: 11635
Remote: No
Date Published: Nov 08 2004
Relevant URL: http://www.securityfocus.com/bid/11635
Summary:
A locally exploitable heap-based buffer overflow exists in Samhain.  
This issue is exposed when the database is run in update mode and may 
allow a malicious local user to execute arbitrary code with superuser 
privileges if successfully exploited.

12. MTink Insecure Temporary File Creation Vulnerability
BugTraq ID: 11640
Remote: No
Date Published: Nov 09 2004
Relevant URL: http://www.securityfocus.com/bid/11640
Summary:
The MTink package is affected by an unspecified insecure temporary file 
creation vulnerability.  This issue is likely due to a design error 
that causes the application to fail to verify the existence of a file 
before writing to it.

An attacker may leverage this issue to overwrite arbitrary files with 
the privileges of an unsuspecting user that activates the vulnerable 
application.

13. Mozilla Firefox Download Dialogue Box File Name Spoofing Vul...
BugTraq ID: 11643
Remote: Yes
Date Published: Nov 10 2004
Relevant URL: http://www.securityfocus.com/bid/11643
Summary:
A download dialogue box file name spoofing vulnerability affects 
Mozilla Firefox.  This issue is due to a design error that facilitates the 
spoofing of file names.

An attacker may leverage this issue to spoof downloaded file names to 
unsuspecting users.  This issue may lead to a compromise of the target 
computer as well as other consequences.

NOTE:  This issue has been fixed by reducing the number of space 
characters displayed in the dialogue box.  It should be noted that this issue 
may still be triggered by using other characters to fill the space such 
as non-displayable characters and even extremely long file names.  
Users should be cautious about downloading files with the affected 
application.

14. Mozilla Firefox Insecure Default Installation Vulnerability
BugTraq ID: 11644
Remote: No
Date Published: Nov 10 2004
Relevant URL: http://www.securityfocus.com/bid/11644
Summary:
Mozilla Firefox is a Web browser developed and supported by the Mozilla 
Organization. It is freely available for most UNIX and Linux based 
operating systems as well as Microsoft Windows.

An insecure default installation vulnerability affects Mozilla Firefox.  
This issue is due to a failure of the application to place secure 
permissions on installed files.  It should be noted that this issue only 
affects the vulnerable application installed on the Apple Mac OS X 
platform.

An unsuspecting user that double-clicks on such an affected application 
may have attacker-specified code executing with their privileges, 
potentially facilitating privilege escalation.

15. Linux Kernel BINFMT_ELF Loader Local Privilege Escalation Vu...
BugTraq ID: 11646
Remote: No
Date Published: Nov 10 2004
Relevant URL: http://www.securityfocus.com/bid/11646
Summary:
Multiple vulnerabilities have been identified in the Linux ELF binary 
loader.  These issues can allow local attackers to gain elevated 
privileges.  The source of these issues is present in the 'load_elf_binary' 
function of the 'binfmt_elf.c' file.

The first issue results from an improper check performed on the return 
value of the 'kernel_read' function.  An attacker may gain control over 
execution flow of a setuid binary by modifying the memory layout of a 
binary. 

The second issue results from improper error handling when the mmap() 
function fails.

The third vulnerability results from a bad return value when the 
program interpreter (linker) is mapped into memory.  It is reported that this 
issue only occurs in the 2.4.x versions of the Linux kernel.

The fourth vulnerable condition presents itself because a user can 
execute a binary with a malformed interpreter name string.  This issue can 
lead to a system crash.

The final issue exists in the execve() code.  This issue may allow an 
attacker to disclose sensitive data that can potentially be used to gain 
elevated privileges.

These issues are currently undergoing further analysis.  This BID will 
be updated and divided into separate BIDS in the future.

16. BNC getnickuserhost IRC Server Response Buffer Overflow Vuln...
BugTraq ID: 11647
Remote: Yes
Date Published: Nov 10 2004
Relevant URL: http://www.securityfocus.com/bid/11647
Summary:
A remotely exploitable stack-based buffer overflow has been reported in 
BNC.  This issue may be triggered when a malformed IRC (Internet Relay 
Chat) server response is handled by the proxy.  

If successfully exploited, this would allow execution of arbitrary code 
in the context of the proxy.

17. SquirrelMail decodeHeader HTML Injection Vulnerability
BugTraq ID: 11653
Remote: Yes
Date Published: Nov 10 2004
Relevant URL: http://www.securityfocus.com/bid/11653
Summary:
SquirrelMail is reported to be prone to an email header HTML injection 
vulnerability. This issue is due to a failure of the application to 
properly sanitize user-supplied email header strings.

An attacker can exploit this issue to gain access to an unsuspecting 
user's cookie based authentication credentials; disclosure of personal 
email is possible. Other attacks are also possible.

18. JWhois Double Free Memory Corruption Vulnerability
BugTraq ID: 11656
Remote: Yes
Date Published: Nov 10 2004
Relevant URL: http://www.securityfocus.com/bid/11656
Summary:
It is reported that jwhois is susceptible to a double free 
vulnerability.

If jwhois attempts to process whois requests that result in more than 
one redirection, it is reported that a double free condition will occur.

It is conjectured that it may be possible for remote attackers to 
exploit this vulnerability to write to arbitrary locations in memory, 
facilitating the execution of attacker-supplied code. This has not been 
confirmed.

This vulnerability may not actually be exploitable. This BID will be 
updated or retired as further information is disclosed.

19. EZ-IPupdate Remote Format String Vulnerability
BugTraq ID: 11657
Remote: Yes
Date Published: Nov 11 2004
Relevant URL: http://www.securityfocus.com/bid/11657
Summary:
EZ-IPupdate is vulnerable to a remotely exploitable format string 
vulnerability when running in daemon-mode.  The vulnerability is present 
even if "quiet" mode is enabled.

20. Davfs2 Insecure Temporary File Creation Vulnerability
BugTraq ID: 11661
Remote: No
Date Published: Nov 11 2004
Relevant URL: http://www.securityfocus.com/bid/11661
Summary:
Davfs2 is affected by an insecure temporary file creation 
vulnerability. This issue is likely due to a design error that causes the 
application to fail to verify a files existence before writing to it.

An attacker may leverage this issue to overwrite arbitrary files with 
the privileges of an unsuspecting user that activates the vulnerable 
application.

21. GD Graphics Library Multiple Unspecified Remote Buffer overf...
BugTraq ID: 11663
Remote: Yes
Date Published: Nov 12 2004
Relevant URL: http://www.securityfocus.com/bid/11663
Summary:
Multiple unspecified remote buffer overflow vulnerabilities have been 
identified in the GD Graphics Library.  These issues are due to a 
failure of the library to do sufficient bounds checking prior to processing 
user-specified strings.

An attacker may leverage these issues to remotely execute arbitrary 
code on a computer with the privileges of a user that views a malicious 
image file.  This may facilitate unauthorized access or privilege 
escalation.

22. ARJ Software UNARJ Remote Buffer Overflow Vulnerability
BugTraq ID: 11665
Remote: Yes
Date Published: Nov 12 2004
Relevant URL: http://www.securityfocus.com/bid/11665
Summary:
A remote buffer overflow vulnerability affects ARJ Software's unarj.  
This issue is caused by a failure of the application to carry out 
sufficient bounds checking on user-supplied strings prior to processing.

A remote attacker may leverage this issue to execute arbitrary code 
with the privileges of a user that process a malicious file with the 
affected application.  This may facilitate unauthorized access or privilege 
escalation.

23. OpenSkat Weak Encryption Key Generation Vulnerability
BugTraq ID: 11667
Remote: Yes
Date Published: Nov 12 2004
Relevant URL: http://www.securityfocus.com/bid/11667
Summary:
A weak encryption key generation vulnerability affects openSkat.  This 
issue is due to a design error that causes the application to generate 
weak encryption keys.

An attacker may leverage this issue to derive the private keys of a 
user running the vulnerable application through factorization attacks.

24. GratiSoft Sudo Restricted Command Execution Bypass Vulnerabi...
BugTraq ID: 11668
Remote: No
Date Published: Nov 12 2004
Relevant URL: http://www.securityfocus.com/bid/11668
Summary:
A restricted command execution bypass vulnerability affects GratiSoft's 
Sudo application.  This issue is due to a design error that causes the 
application to fail to properly sanitize user-supplied environment 
variables.

An attacker with sudo privileges may leverage this issue to execute 
commands that are explicitly disallowed.  This may facilitate privileges 
escalation and certainly leads to a false sense of security.

III. LINUX FOCUS LIST SUMMARY
-----------------------------
NO NEW POSTS FOR THE WEEK 2004-11-09 to 2004-11-16.

IV. NEW PRODUCTS FOR LINUX PLATFORMS
------------------------------------
1. Cyber-Ark  Inter-Business Vault
By: Cyber-Ark
Platforms: Linux, Windows 2000, Windows NT, Windows XP
Relevant URL: 
http://www.cyber-ark.com/datasecuritysoftware/inter-business_vault.htm
Summary: 

Based on Cyber-Ark Software's Vaulting Technology, the Inter-Business 
Vault, an information security solution that enables organizations to 
safely overcome traditional network boundaries in order to securely share 
business information among customers, business partners, and remote 
branches. It provides a seamless, LAN-like experience over the Internet 
that includes all the security, performance, accessibility, and ease of 
administration required to allow organizations to share everyday 
information worldwide. To learn more about these core attributes of the 
Inter-Business Vault click on the relevant link below:

2. EnCase Forensic Edition
By: Guidance Software Inc.
Platforms: DOS, FreeBSD, Linux, MacOS, NetBSD, OpenBSD, PalmOS, 
Solaris, UNIX, Windows 2000, Windows 95/98, Windows NT, Windows XP
Relevant URL: 
http://www.guidancesoftware.com/products/EnCaseForensic/index.shtm
Summary: 

EnCase Forensic Edition Version 4 delivers the most advanced features 
for computer forensics and investigations. With an intuitive GUI and 
superior performance, EnCase Version 4 provides investigators with the 
tools to conduct large-scale and complex investigations with accuracy and 
efficiency. Guidance Software?s award winning solution yields 
completely non-invasive computer forensic investigations while allowing 
examiners to easily manage large volumes of computer evidence and view all 
relevant files, including "deleted" files, file slack and unallocated 
space. 

The integrated functionality of EnCase allows the examiner to perform 
all functions of the computer forensic investigation process. EnCase's 
EnScript, a powerful macro-programming language and API included within 
EnCase, allows investigators to build customized and reusable forensic 
scripts.

3. KeyGhost SX
By: KeyGhost Ltd
Platforms: BeOS, DOS, Linux, OS/2, Solaris, SunOS, Windows 2000, 
Windows 95/98, Windows NT, Windows XP
Relevant URL: http://www.keyghost.com/SX/
Summary: 

KeyGhost SX discreetly captures and records all keystrokes typed, 
including chat conversations, email, word processor, or even activity within 
an accounting or specialist system. It is completely undetectable by 
software scanners and provides you with one of the most powerful stealth 
surveillance applications offered anywhere. 

Because KeyGhost uses STRONG 128-Bit encryption to store the recorded 
data in it?s own internal memory (not on the hard drive), it is 
impossible for a network intruder to gain access to any sensitive data stored 
within the device.

4. SafeKit
By: Evidian Inc.
Platforms: AIX, HP-UX, Linux, Solaris, Windows 2000
Relevant URL: http://www.evidian.com/safekit/index.htm
Summary: 

Evidian's SafeKit technology makes it possible to render any 
application available 24 hours per day. With no extra hardware: just use your 
existing servers and install this software-only solution.

This provides ultimate scalability. As your needs grow, all you need to 
do is add more standard servers into the cluster. With the load 
balancing features of SafeKit, you can distribute applications over multiple 
servers. If one system fails completely, the others will continue to 
serve your users.

5. Astaro Linux Firewall
By: Astaro
Platforms: Linux
Relevant URL: http://www.astaro.com/php/statics.php?action=asl&lang=gb
Summary: 

Astaro Linux Firewall: All-in-one firewall, virus protection, content 
filtering and spam protection internet security software package for 
Linux. 
Free download for home users.

6. CAT Cellular Authentication Token and eAuthentication Servic...
By: Mega AS Consulting Ltd
Platforms: Java, Linux, OpenBSD, Os Independent, SecureBSD, Solaris, 
UNIX, Windows 2000, Windows NT
Relevant URL: http://www.megaas.co.nz
Summary: 

Low cost, easy to use Two Factor Authentication One Time Password token 
using the Cellular. Does not use SMS or communication, manages multiple 
OTP accounts - new technology. For any business that want a safer 
access to its Internet Services. More information at our site.
 
We also provide eAuthentication service for businesses that will not 
buy an Authentication product but would prefer to pay a monthly charge 
for authentication services from our our CAT Server.

V. NEW TOOLS FOR LINUX PLATFORMS
--------------------------------
1. ksb26-2.6.9 Kernel Socks Bouncer for 2.6.x kernels 2.6.9
By: Paolo Ardoino
Relevant URL: http://ardoino.altervista.org/kernel.php
Platforms: Linux
Summary: 

KSB26 [Kernel Socks Bouncer] is Linux Kernel 2.6.x patch that redirects 
full tcp connections [SSH, telnet, ...] to follow through socks5. KSB26 
uses a character device to pass socks5 and target ips to the Linux 
Kernel. I have choosen to write in kernel space to enjoy myself [I know 
that there are easier and safer ways to write this in userspace].

2. rootsh 0.2
By: Gerhard Lausser
Relevant URL: http://sourceforge.net/projects/rootsh/
Platforms: AIX, HP-UX, Linux, POSIX, SINIX, Solaris, UNIX
Summary: 

Rootsh is a wrapper for shells which logs all echoed keystrokes and 
terminal output to a file and/or to syslog. It's main purpose is the 
auditing of users who need a shell with root privileges. They start rootsh 
through the sudo mechanism. I's in heavy use here at a big bavarian car 
manufacturer (three letters, fast, cool,...) for project users whom you 
can't deny root privileges.

3. Maillog View  v1.03.3
By: Angelo 'Archie' Amoruso
Relevant URL: http://www.netorbit.it/modules.html
Platforms: Linux
Summary: 

Maillog View is a Webmin module that allows you to easily view all your 
/var/log/maillog.* files. It features autorefresh, message size 
indication, ascending/descending view order, compressed file support, and a 
full statistics page. Sendmail, Postfix, Exim, and Qmail (partially) are 
supported. Courier MTA support is experimental.

4. BullDog Firewall 20040918
By: Robert APM Darin
Relevant URL: http://tanaya.net/BullDog
Platforms: Linux
Summary: 

Bulldog is a powerful but lightweight firewall for heavy use systems. 
With many features, this firewall can be used by anyone who wants to 
protect his/her systems.

This system allow dynamic and static rules sets for maximum protection 
and has several advance features.

This firewall will work for the hobbyist or a military base. Generation 
7 is a complete rewrite and redesign from scratch.

Be prepared to spend some time setting this up.

5. PIKT - Problem Informant/Killer Tool v1.17.0
By: Robert Osterlund, robert.osterlund@gsb.uchicago.edu
Relevant URL: http://pikt.org
Platforms: AIX, FreeBSD, HP-UX, IRIX, Linux, Solaris, SunOS
Summary: 

PIKT is a cross-categorical, multi-purpose toolkit to monitor and 
configure computer systems, organize system security, format documents, 
assist command-line work, and perform other common systems administration 
tasks.

PIKT's primary purpose is to report and fix problems, but its 
flexibility and extendibility evoke many other uses limited only by your 
imagination.

6. ID-Synch 3.1
By: M-Tech Information Technology, Inc.
Relevant URL: http://idsynch.com/
Platforms: AIX, AS/400, DG-UX, Digital UNIX/Alpha, HP-UX, IRIX, Linux, 
MacOS, MPE/iX, Netware, OpenBSD, OpenVMS, OS/2, OS/390, RACF, Solaris, 
SunOS, True64 UNIX, Ultrix, VM, VMS, VSE, Windows 2000, Windows NT
Summary: 

ID-Synch is enterprise user provisioning software. It reduces the cost 
of user administration, helps new and reassigned users get to work more 
quickly, and ensures prompt and reliable access termination. This is 
accomplished through automatic propagation of changes to user profiles 
from systems of record to managed systems, with self service workflow for 
security change requests, through consolidated and delegated user 
administration, and with federation.

VII. SPONSOR INFORMATION
-----------------------

This Issue is Sponsored By: Symantec

Need to know what's happening on YOUR network? Symantec DeepSight 
Analyzer
is a free service that gives you the ability to track and manage 
attacks.
Analyzer automatically correlates attacks from various Firewall and 
network
based Intrusion Detection Systems, giving you a comprehensive view of 
your
computer or general network. Sign up today!

http://www.securityfocus.com/sponsor/Symantec_linux-secnews_041116