[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

UNIRAS Brief - 283/04 - Two Mandrake Security Advisories:



 
-----BEGIN PGP SIGNED MESSAGE-----

- ----------------------------------------------------------------------------------
   UNIRAS (UK Govt CERT) Briefing Notice - 283/04 dated 11.06.04  Time: 12:10  
  UNIRAS is part of NISCC (National Infrastructure Security Co-ordination Centre)
- ---------------------------------------------------------------------------------- 
  UNIRAS material is also available from its website at www.uniras.gov.uk and
         Information about NISCC is available from www.niscc.gov.uk
- ----------------------------------------------------------------------------------

Title
=====

Two Mandrake Security Advisories:

1. cvs - MDKSA-2004:058

2. ksymoops - MDKSA-2004:060


Detail
====== 


1. Another vulnerability was discovered related to "Entry" lines in  cvs, by the 
development team (CAN-2004-0414). As well, Stefan Esser and Sebastian Krahmer 
performed an audit on the  cvs source code and discovered a number of other problems


2. Geoffrey Lee discovered a problem with the ksymoops-gznm script  distributed with 
Mandrakelinux.  The script fails to do proper checking  when copying a file to the /tmp 
directory.  Because of this, a local  attacker can setup a symlink to point to a file 
that they do not have  permission to remove.  The problem is difficult to exploit because  
someone with root privileges needs to run ksymoops on a particular  module for which a 
symlink for the same filename already exists.




1.




- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

 _______________________________________________________________________

                 Mandrakelinux Security Update Advisory  

 Package name:           cvs
 Advisory ID:            MDKSA-2004:058
 Date:                   June 9th, 2004

 Affected versions:	 10.0, 9.1, 9.2, Corporate Server 2.1
 ______________________________________________________________________

 Problem Description:

 Another vulnerability was discovered related to "Entry" lines in  cvs, by the 
development team (CAN-2004-0414).
 
 As well, Stefan Esser and Sebastian Krahmer performed an audit on the  cvs source 
code and discovered a number of other problems, including:
 
 A double-free condition in the server code is exploitable  (CAN-2004-0416).
 
 By sending a large number of arguments to the CVS server, it is  possible to cause 
it to allocate a huge amount of memory which does  not fit into the address space, 
causing an error (CAN-2004-0417).
 
 It was found that the serve_notify() function would write data out  of bounds 
(CAN-2004-0418).
 
 The provided packages update cvs to 1.11.16 and include patches to  correct all 
of these problems.  

 References:

  http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0414
  http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0416
  http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0417
  http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0418
 ______________________________________________________________________

 Updated Packages:
  
 Mandrakelinux 10.0:
 1a502935f4df6e42c85ff1fb1ef27d30  10.0/RPMS/cvs-1.11.16-1.1.100mdk.i586.rpm
 0f095c91db34af290ceba3dc9df6aa6c  10.0/SRPMS/cvs-1.11.16-1.1.100mdk.src.rpm

 Mandrakelinux 10.0/AMD64:
 5460c0dcc9d535d4813f999e0ffa9f85  amd64/10.0/RPMS/cvs-1.11.16-1.1.100mdk.amd64.rpm
 0f095c91db34af290ceba3dc9df6aa6c  amd64/10.0/SRPMS/cvs-1.11.16-1.1.100mdk.src.rpm

 Corporate Server 2.1:
 e46d86d0b5641c4a73ec5160acf17204  corporate/2.1/RPMS/cvs-1.11.16-1.1.C21mdk.i586.rpm
 bb46882dbf757203299558ce1cfde165  corporate/2.1/SRPMS/cvs-1.11.16-1.1.C21mdk.src.rpm

 Corporate Server 2.1/x86_64:
 8185d289207e8357abb251a1ca3f571d  x86_64/corporate/2.1/RPMS/cvs-1.11.16-1.1.C21mdk.x86_64.rpm
 bb46882dbf757203299558ce1cfde165  x86_64/corporate/2.1/SRPMS/cvs-1.11.16-1.1.C21mdk.src.rpm

 Mandrakelinux 9.1:
 ec87f6b23f81a443057383e7181ae61f  9.1/RPMS/cvs-1.11.16-1.1.91mdk.i586.rpm
 18e7ac2121ddde681ee4bd52780a0399  9.1/SRPMS/cvs-1.11.16-1.1.91mdk.src.rpm

 Mandrakelinux 9.1/PPC:
 f63540702537363c388fcccbe7786cd6  ppc/9.1/RPMS/cvs-1.11.16-1.1.91mdk.ppc.rpm
 18e7ac2121ddde681ee4bd52780a0399  ppc/9.1/SRPMS/cvs-1.11.16-1.1.91mdk.src.rpm

 Mandrakelinux 9.2:
 c78ec66461805bae870f32fc42a40c7c  9.2/RPMS/cvs-1.11.16-1.1.92mdk.i586.rpm
 8a4973fd2577fb20bf5fcec3d5081c4d  9.2/SRPMS/cvs-1.11.16-1.1.92mdk.src.rpm

 Mandrakelinux 9.2/AMD64:
 43ef377093ecf7a6d9034ad60993827a  amd64/9.2/RPMS/cvs-1.11.16-1.1.92mdk.amd64.rpm
 8a4973fd2577fb20bf5fcec3d5081c4d  amd64/9.2/SRPMS/cvs-1.11.16-1.1.92mdk.src.rpm
 _______________________________________________________________________

 To upgrade automatically use MandrakeUpdate or urpmi.  The verification  of md5 checksums 
and GPG signatures is performed automatically for you.

 All packages are signed by Mandrakesoft for security.  You can obtain  the GPG public key 
of the Mandrakelinux Security Team by executing:

  gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

 You can view other update advisories for Mandrakelinux at:

  http://www.mandrakesoft.com/security/advisories

 If you want to report vulnerabilities, please contact

  security_linux-mandrake.com

 Type Bits/KeyID     Date       User ID
 pub  1024D/22458A98 2000-07-10 Linux Mandrake Security Team
  <security linux-mandrake.com>
- -----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.7 (GNU/Linux)

iD8DBQFAx4QmmqjQ0CJFipgRAiQEAJ4qHjWP98N82HMMGLw5DEvMwxNW9QCfUUir
2y0ZQWzPUO1XZR/LQTQTbsg=
=HxL7
- -----END PGP SIGNATURE-----




2.




- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

 _______________________________________________________________________

                 Mandrakelinux Security Update Advisory  

 Package name:           ksymoops
 Advisory ID:            MDKSA-2004:060
 Date:                   June 10th, 2004

 Affected versions:	 10.0, 9.1, 9.2, Corporate Server 2.1
 ______________________________________________________________________

 Problem Description:

 Geoffrey Lee discovered a problem with the ksymoops-gznm script  distributed with 
Mandrakelinux.  The script fails to do proper checking  when copying a file to the /tmp 
directory.  Because of this, a local  attacker can setup a symlink to point to a file 
that they do not have  permission to remove.  The problem is difficult to exploit 
because  someone with root privileges needs to run ksymoops on a particular  module 
for which a symlink for the same filename already exists.  

 Updated Packages:
  
 Mandrakelinux 10.0:
 fd71046851d3f6f78aed37139dba5801  10.0/RPMS/ksymoops-2.4.9-2.1.100mdk.i586.rpm
 bc77b3b817f0405fc756b774e1cd8b2b  10.0/SRPMS/ksymoops-2.4.9-2.1.100mdk.src.rpm

 Mandrakelinux 10.0/AMD64:
 0069cbfa72e078a575a61b47ae8d7db4  amd64/10.0/RPMS/ksymoops-2.4.9-2.1.100mdk.amd64.rpm
 bc77b3b817f0405fc756b774e1cd8b2b  amd64/10.0/SRPMS/ksymoops-2.4.9-2.1.100mdk.src.rpm

 Corporate Server 2.1:
 55e5b60446af97754617854ae007c076  corporate/2.1/RPMS/ksymoops-2.4.5-1.1.C21mdk.i586.rpm
 371e1e2e5c13fe3f3d4d69f7640d62df  corporate/2.1/SRPMS/ksymoops-2.4.5-1.1.C21mdk.src.rpm

 Corporate Server 2.1/x86_64:
 c7b36de07cf6e4730d19c1c70d5ae4f4  x86_64/corporate/2.1/RPMS/ksymoops-2.4.5-1.1.C21mdk.x86_64.rpm
 371e1e2e5c13fe3f3d4d69f7640d62df  x86_64/corporate/2.1/SRPMS/ksymoops-2.4.5-1.1.C21mdk.src.rpm

 Mandrakelinux 9.1:
 4d5bba5a89df40aa948d1ab109dae1fd  9.1/RPMS/ksymoops-2.4.8-1.1.91mdk.i586.rpm
 90dc1f924e31cb629c2be369aa369be0  9.1/SRPMS/ksymoops-2.4.8-1.1.91mdk.src.rpm

 Mandrakelinux 9.1/PPC:
 2af8ce77771cc51c21c17f3966a80d07  ppc/9.1/RPMS/ksymoops-2.4.8-1.1.91mdk.ppc.rpm
 90dc1f924e31cb629c2be369aa369be0  ppc/9.1/SRPMS/ksymoops-2.4.8-1.1.91mdk.src.rpm

 Mandrakelinux 9.2:
 c841d77df648a31b1c4abbef5ed81164  9.2/RPMS/ksymoops-2.4.9-2.1.92mdk.i586.rpm
 da2871cd2185de4399dca040a4917d36  9.2/SRPMS/ksymoops-2.4.9-2.1.92mdk.src.rpm

 Mandrakelinux 9.2/AMD64:
 f6e07e8051ff88692b1ecf25ca6df67c  amd64/9.2/RPMS/ksymoops-2.4.9-2.1.92mdk.amd64.rpm
 da2871cd2185de4399dca040a4917d36  amd64/9.2/SRPMS/ksymoops-2.4.9-2.1.92mdk.src.rpm
 _______________________________________________________________________

 To upgrade automatically use MandrakeUpdate or urpmi.  The verification  of md5 checksums 
and GPG signatures is performed automatically for you.

 All packages are signed by Mandrakesoft for security.  You can obtain  the GPG public key 
of the Mandrakelinux Security Team by executing:

  gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

 You can view other update advisories for Mandrakelinux at:

  http://www.mandrakesoft.com/security/advisories

 If you want to report vulnerabilities, please contact

  security_linux-mandrake.com

 Type Bits/KeyID     Date       User ID
 pub  1024D/22458A98 2000-07-10 Linux Mandrake Security Team
  <security linux-mandrake.com>
- -----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.7 (GNU/Linux)

iD8DBQFAyMqBmqjQ0CJFipgRAuokAJ0SSWvououbDUUbZs7HoMdBFt6H3ACfYA9J
iKgT6JLXVhY9eT8l32AtjEE=
=1wlA
- -----END PGP SIGNATURE-----

- ----------------------------------------------------------------------------------

For additional information or assistance, please contact the HELP Desk by 
telephone or Not Protectively Marked information may be sent via 
EMail to: uniras@xxxxxxxxxxxx

Office Hours:
Mon - Fri: 08:30 - 17:00 Hrs
Tel: +44 (0) 20 7821 1330 Ext 4511
Fax: +44 (0) 20 7821 1686

Outside of Office Hours:
On Call Duty Officer:
Tel: +44 (0) 20 7821 1330 and follow the prompts

- ----------------------------------------------------------------------------------
UNIRAS wishes to acknowledge the contributions of Mandrakesoft for the information 
contained in this Briefing. 
- ----------------------------------------------------------------------------------
This Briefing contains the information released by the original author. Some 
of the information may have changed since it was released. If the vulnerability 
affects you, it may be prudent to retrieve the advisory from the canonical site 
to ensure that you receive the most current information concerning that problem.

Reference to any specific commercial product, process, or service by trade 
name, trademark manufacturer, or otherwise, does not constitute or imply 
its endorsement, recommendation, or favouring by UNIRAS or NISCC.  The views 
and opinions of authors expressed within this notice shall not be used for 
advertising or product endorsement purposes.

Neither UNIRAS or NISCC shall also accept responsibility for any errors 
or omissions contained within this briefing notice. In particular, they shall 
not be liable for any loss or damage whatsoever, arising from or in connection 
with the usage of information contained within this notice.

UNIRAS is a member of the Forum of Incident Response and Security Teams (FIRST) 
and has contacts with other international Incident Response Teams (IRTs) in 
order to foster cooperation and coordination in incident prevention, to prompt 
rapid reaction to incidents, and to promote information sharing amongst its 
members and the community at large. 
- ----------------------------------------------------------------------------------
<End of UNIRAS Briefing>

-----BEGIN PGP SIGNATURE-----
Version: PGP 8.0

iQCVAwUBQMmS0Ypao72zK539AQH83gP/X0LcDznMlqT4BSFwg1rdN4hrkYubDVMP
G/eAI7ZtPfz0JYhUVt7eqHt7ayC4MkDPiP6NASJGMTMl858mnb6HAXGhxDdj1n9B
BtRN4cCAgrID+XsXmpheHgu6exBoAmSz/NrZjPEMbYZhfxsb/mto4vU2TcGWIjSD
qIsJwPIE7xc=
=PfJi
-----END PGP SIGNATURE-----