[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[SuSE] SuSE Sammeladvisory - SUSE-SR:2006:026



-----BEGIN PGP SIGNED MESSAGE-----

Liebe Kolleginnen und Kollegen,

soeben erreichte uns nachfolgendes SuSE Security Announcement. Wir geben
diese Informationen unveraendert an Sie weiter.

Avahi ist ein Programm, um Services in einem lokalen Netzwerk zu finden.

CVE-2006-5794 - Schwachstelle in der Signaturueberpruefung von OpenSSH

  In OpenSSH wurde eine Schwachstelle gefunden, welche von einem
  Angreifer ausgenutzt werden kann um Sicherheitsueberpruefungen zu
  umgehen. Der Fehler besteht in der Funktion "monitor_child_preauth()"
  und fuehrt dazu dass bestimmte Signaturen als richtig ueberprueft
  werden. Die Schwachstelle ist nur in Verbindung mit anderen
  Schwachstellen ausnutzbar.

CVE-2006-5864 - Buffer Overflow in ps_gettext Funktion von GNU gv

  In der ps_gettext Funktion (ps.c) von GNU gv werden Kommentare in
  Postscript-Datein in einen Buffer mit fester Groesse kopiert. Die
  Folge davon ist ein Buffer Overflow im Stack Segment. Ein entfernter
  Angreifer kann diese Schwachstelle ausnutzen, um beliebige Befehle mit
  den Rechten des Benutzers auszufuehren, falls dieser ein
  Postscript-Dokument des Angreifers mit gv oeffnet. Ein Exploit ist
  bereits verieffentlicht worden.

CVE-2006-4339 / CVE-2006-4340 / CVE-2006-4790 / MFSA 2006-60 -
Schwachstelle beim Ueberpruefen von RSA Signaturen

  Einige X.509 Implementierungen ueberpruefen in einer RSA Signatur
  nicht ausreichend, ob auf den Hashwert innerhalb des PKCS.1 Felds noch
  weitere Daten folgen. Ein Angreifer kann diese Schwachstelle
  ausnutzen, um Daten, welche eine gefaelschte Signatur besitzen, als
  korrekt signiert verifizieren zu lassen.

Die Schwachstelle CVE-2006-4339 betrifft OpenSSL, CVE-2006-4790 GnuTLS,
CVE-2006-4340 Network Security Services (NSS). Sun Bug ID 6466389
betrifft das JDK.

CVE-2006-5467 - Schwachstelle in CGI-Bibliothek von Ruby

  In der CGI-Bibliothek von Ruby existiert eine Schwachstelle, die die
  Verarbeitung von MIME-Parts mit ungueltiger Trennmarkierung (boundary)
  betrifft. Ein entfernter Angreifer kann diese Schwachstelle durch
  entsprechend konstruierte MIME-Inhalte ausnutzen, um das Ruby-Programm
  in eine Endlosschleife zu bringen (Denial of Service).

CVE-2006-2362 - Buffer Overflow in der Bibliothek libbfd

  In der Bibliothek libbfd (Funktion getsym in tekhex.c) der GNU
  Binutils laesst sich ein Buffer Overflow ausloesen. Ein entfernter
  Angreifer kann diese Schwachstelle mittels einer Datei mit einem
  enthaltenen Tektronix Hex Format Record ausnutzen, um das Programm zum
  Absturz zu bringen. Eventuell ist auch die Ausfuehrung beliebiger
  Befehle mit den Rechten des Benutzers moeglich. Voraussetzung ist,
  dass der Benutzer die Datei mit dem einem Kommando (z.B. strings)
  oeffnet, das die verwundbare Bibliothek verwendet.

CVE-2006-4806 / CVE-2006-4807 / CVE-2006-4808 / CVE-2006-4809 -
Schwachstellen in der Bibliothek imlib2

  In verschiedenen Funktionen der Bibliothek imlib2 befinden sich
  Schwachstellen. Beim Laden von manipulierten ARGB, JPG, LBM, PNG, PNM,
  TGA, und TIFF Bildern kann ein Buffer Overflow ausgeloest werden. Ein
  entfernter Angreifer kann diese Schwachstellen mittels manipulierter
  Bilddateien ausnutzen, um beliebige Befehle mit den Rechten des
  Benutzers der Anwendung auszufuehren, welche die imlib2 verwendet.

CVE-2006-5461 - Schwachstelle in Avahi

  Als Folge einer fehlerhaften Ueberpruefung der Authentizitaet von
  Netlink-Messages kann ein lokaler Angreifer dem Programm Aenderungen
  im Netzwerk vortaeuschen und dadurch Sicherheitseinstellungen umgehen.

CVE-2006-0743 - Format String Schwachstelle im Apache Log4net Release

  Im Programm LocalSyslogAppender vom Apache Log4net Release ist eine
  Format String Schwachstelle vorhanden. Ein Angreifer kann diese
  Schwachstelle verwenden, um das betroffene Programm zum Absturz zu
  bringen. Potentiell ist auch die Ausfuehrung beliebiger Befehle
  moeglich.

Betroffen sind die folgenden Software Pakete und Plattformen:

  Pakete OpenSSH, Gv, Bind, Ruby, Binutils, imlib2-loaders, Avahi
  und Log4net.

  Alle SuSE Linux Produkte

Vom Hersteller werden ueberarbeitete Pakete zur Verfuegung gestellt.

Hersteller Advisory:
  http://www.novell.com/linux/security/securitysupport.html


(c) der deutschen Zusammenfassung bei DFN-CERT Services GmbH; die
Verbreitung, auch auszugsweise, ist nur unter Hinweis auf den Urheber,
DFN-CERT Services GmbH, und nur zu nicht kommerziellen Zwecken
gestattet.

Mit freundlichen Gruessen,
                Klaus Moeller, DFN-CERT Services GmbH


- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

______________________________________________________________________________

                        SUSE Security Summary Report

        Announcement ID:        SUSE-SR:2006:026
        Date:                   Fri, 17 Nov 2006 15:00:00 +0000
        Cross-References:       CVE-2006-5794 CVE-2006-5864 CVE-2006-4339
                                CVE-2006-5467 CVE-2006-2362 CVE-2006-4809
                                CVE-2006-4808 CVE-2006-4807 CVE-2006-4806
                                CVE-2006-5461 CVE-2006-0743

    Content of this advisory:
        1) Solved Security Vulnerabilities:
            - openssh return value checking
            - gv stack overflow
            - bind DNSSEC RSA signature checking problem
            - ruby CGI denial of service problem
            - binutils tekhex overflow
            - imlib2-loaders denial of service and overflows
            - avahi netlink message injection
            - log4net syslog format string problem
        2) Pending Vulnerabilities, Solutions, and Work-Arounds:
            - None listed this week.
        3) Authenticity Verification and Additional Information

______________________________________________________________________________

1) Solved Security Vulnerabilities

   To avoid flooding mailing lists with SUSE Security Announcements for minor
   issues, SUSE Security releases weekly summary reports for the low profile
   vulnerability fixes. The SUSE Security Summary Reports do not list md5 sums
   or download URLs like the SUSE Security Announcements that are released for
   more severe vulnerabilities.

   Fixed packages for the following incidents are already available on our FTP
   server and via the YaST Online Update.

   - openssh return value checking

     The OpenSSH release 4.5 contains a security fix which has been
     back ported to the openssh versions in our old products.

     CVE-2006-5794: Incorrect return argument checking in the privilege
     separation monitor was fixed. In case of an exploitable unprivileged
     helper this could have been used to elevate privileges.

     This is by default not exploitable, it requires another exploitable
     problem in the privilege separated processes.

     All SUSE Linux based products were affected by this problem.


   - gv stack overflow

     A stack overflow in the postscript viewer gv could be used to
     exploited to execute code, if the user could be tricked into
     viewing a prepared postscript file using gv. (CVE-2006-5864)

     All SUSE Linux based products were affected.

   - bind DNSSEC RSA signature checking problem

     The RSA signature problem tracked by the Mitre CVE ID CVE-2006-4339
     also affects the DNSSEC implementation in the BIND nameserver.

     All SUSE Linux based distributions were affected by this problem.

   - ruby CGI denial of service problem

     A denial of service problem in the CGI multipart parsing of
     "ruby" was fixed, which could have allowed remote attackers
     to affect a denial of service attack against ruby based
     web services. (CVE-2006-5467)

     All SUSE Linux based products containing ruby were affected.

   - binutils tekhex overflow

     A buffer overflow was fixed in the tekhex handling in "binutils"
     which could be used by attackers supplying files to "file" to crash
     this program. (CVE-2006-2362)

     All SUSE Linux based products were affected, except SLE 10 and 10.1,
     which already included the fix at ship time.

   - imlib2-loaders denial of service and overflows

     Various security problems have been fixed in the imlib2 image
     loaders:

     CVE-2006-4809: A stack buffer overflow in loader_pnm.c could be used
     by attackers to execute code by supplying a handcrafted PNM image.

     CVE-2006-4808: A heap buffer overflow in loader_tga.c could
     potentially be used by attackers to execute code by supplying a
     handcrafted TGA image.

     CVE-2006-4807: A out of bounds memory read in loader_tga.c could
     be used to crash the imlib2 using application with a handcrafted
     TGA image.

     CVE-2006-4806: Various integer overflows in width*height calculations
     could lead to heap overflows which could potentially be used to
     execute code. Affected here are the ARGB, PNG, LBM, JPEG and TIFF
     loaders.

     Additionally loading of TIFF images on 64bit systems is now possible.

     SUSE Linux 9.2 up to 10.1 and SLED 10 were affected by this problem.

     Since the only common user of imlib2 is digikam, which usually does
     not receive images from the network, chance of exploit-ability is low.

   - avahi netlink message injection

     Avahi did not check that the received netlink messages originated
     from the kernel. This could be used by local attackers to inject
     packets into avahi which could be used to inject bad netlink messages
     into Avahi, confusing its routing code. (CVE-2006-5461).

     SUSE Linux 10.1 and SLED 10 were affected by this problem.


   - log4net syslog format string problem

     This update fixes a format string exploit in the RemoteSyslogAppender
     of the C# log4net.dll. It requires an attacker to be able to inject
     prepared text into the logging framework.

     The issue is tracked by Mitre CVE ID CVE-2006-0743 and was found
     by Sebastian Krahmer of SUSE Security.

     Affected was the log4net package in SUSE Linux 10.1 and all C#
     applications that include a copy of log4net.dll. The latter were
     not updated yet.
______________________________________________________________________________

2) Pending Vulnerabilities, Solutions, and Work-Arounds

   None are listed this week.
______________________________________________________________________________

3) Authenticity Verification and Additional Information

  - Announcement authenticity verification:

    SUSE security announcements are published via mailing lists and on Web
    sites. The authenticity and integrity of a SUSE security announcement is
    guaranteed by a cryptographic signature in each announcement. All SUSE
    security announcements are published with a valid signature.

    To verify the signature of the announcement, save it as text into a file
    and run the command

      gpg --verify <file>

    replacing <file> with the name of the file containing the announcement.
    The output for a valid signature looks like:

      gpg: Signature made <DATE> using RSA key ID 3D25D3D9
      gpg: Good signature from "SuSE Security Team <security@xxxxxxx>"

    where <DATE> is replaced by the date the document was signed.

    If the security team's key is not contained in your key ring, you can
    import it from the first installation CD. To import the key, use the
    command

      gpg --import gpg-pubkey-3d25d3d9-36e12d04.asc

  - Package authenticity verification:

    SUSE update packages are available on many mirror FTP servers all over the
    world. While this service is considered valuable and important to the free
    and open source software community, the authenticity and integrity of a
    package needs to be verified to ensure that it has not been tampered with.

    The internal RPM package signatures provide an easy way to verify the
    authenticity of an RPM package. Use the command

      rpm -v --checksig <file.rpm>

    to verify the signature of the package, replacing <file.rpm> with the
    filename of the RPM package downloaded. The package is unmodified if it
    contains a valid signature from build@xxxxxxx with the key ID 9C800ACA.

    This key is automatically imported into the RPM database (on RPMv4-based
    distributions) and the gpg key ring of 'root' during installation. You can
    also find it on the first installation CD and included at the end of this
    announcement.

  - SUSE runs two security mailing lists to which any interested party may
    subscribe:

    suse-security@xxxxxxxx
        -   General Linux and SUSE security discussion.
            All SUSE security announcements are sent to this list.
            To subscribe, send an e-mail to
                <suse-security-subscribe@xxxxxxxx>.

    suse-security-announce@xxxxxxxx
        -   SUSE's announce-only mailing list.
            Only SUSE's security announcements are sent to this list.
            To subscribe, send an e-mail to
                <suse-security-announce-subscribe@xxxxxxxx>.

    For general information or the frequently asked questions (FAQ)
    send mail to <suse-security-info@xxxxxxxx> or
    <suse-security-faq@xxxxxxxx>.

    =====================================================================
    SUSE's security contact is <security@xxxxxxxx> or <security@xxxxxxx>.
    The <security@xxxxxxx> public key is listed below.
    =====================================================================
______________________________________________________________________________

    The information in this advisory may be distributed or reproduced,
    provided that the advisory is not modified in any way. In particular, the
    clear text signature should show proof of the authenticity of the text.

    SUSE Linux Products GmbH provides no warranties of any kind whatsoever
    with respect to the information contained in this security advisory.

Type Bits/KeyID     Date       User ID
pub  2048R/3D25D3D9 1999-03-06 SuSE Security Team <security@xxxxxxx>
pub  1024D/9C800ACA 2000-10-19 SuSE Package Signing Key <build@xxxxxxx>

- - -----BEGIN PGP PUBLIC KEY BLOCK-----
Version: GnuPG v1.4.2 (GNU/Linux)
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=ypVs
- - -----END PGP PUBLIC KEY BLOCK-----

- -----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.2 (GNU/Linux)

iQEVAwUBRV3Y83ey5gA9JdPZAQLWNwf/RS6dFwpD/Vhn8jo/4fRBMBUP5ztAbfl6
VL4iGah4meJHl4FinQhRE6Uo+i9p1AnaVeP7ylxoQ77YFneJ8P4VfONp4KZq36oM
wwZgxpkSB+mKFid8diaahgbaIbv1teZhKS2S68kUfcFJNEnPaqW1vfYW+elNIomJ
DA2pJ0R/L16j9euNU48/rPJhkB+iqrSxdG60VN48ZhgKwlijJR9Upz9EMqSTgvwA
QNG9iKXu1ry8x3YlusFeFL/E9FhNyA6wqgTKPWol65UByDuXb1FLMh4C0+XBzn/h
9UivJHVL1e7uqb7bwmjcz4ktV0K4vwZ3MFef6D+KXDOLBVi2ncoZpQ==
=py99
- -----END PGP SIGNATURE-----
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.2 (GNU/Linux)

iQEVAwUBRV3hVPBT2+ukQ5RFAQHVEgf+IHvGXnfzFeAVe5P1586OGYIRS41499HJ
5vWNkHnvs08aaclodYNU3gAzZ+qPYkcCA5Uh49bc9A+33KfQjCY5oRRLTsnnZ+Qh
Dgm73xdigjtZ9417J/mHj5YvioccMPQV7u7n986zaHQZuAoCFWfsKWcVXEyi3h8r
xexPFSeBQo3j/vRwXLZMCUXUpTz5QQi8AzwA7z1O/4PbkMIq0J0pP4dSyPdTAzPq
vtwKJyEjkbtfi0VeRFNTvAPbNzOFUhZFAtlubtxU2VqwuF4au51dzr/t/P2Efcxl
boh+/TCriv26SfSZtRygnp0bSRmCEVIQPbEac9c0oxKSTgfMdNLhfQ==
=9FXq
-----END PGP SIGNATURE-----