[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

UNIRAS Brief - 789/06 - Three Gentoo Linux Security Advisories:



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ---------------------------------------------------------------------------------------
       UNIRAS (UK Government CERT) Briefing - 789/06 Dated 30.11.06 Time 13:15  

UNIRAS is part of NISCC (the UK National Infrastructure Security  Co-ordination Centre)
- ---------------------------------------------------------------------------------------
 	UNIRAS material is available from the NISCC website at www.niscc.gov.uk
- ---------------------------------------------------------------------------------------

Title
=====

Three Gentoo Linux Security Advisories:

1. GLSA 200611-23 - Mono: Insecure temporary file creation

2. GLSA 200611-25 - OpenLDAP: Denial of Service vulnerability

3. GLSA 200611-24 - LHa: Multiple vulnerabilities

Detail
======

1. Sebastian Krahmer of the SuSE Security Team discovered that the System.CodeDom.Compiler classes of Mono create temporary files
with insecure permissions.

2. Evgeny Legerov has discovered that the truncation of an incoming authcid longer than 255 characters and ending with a space as
the 255th character will lead to an improperly computed name length. This will trigger an assert in the libldap code.

3. Tavis Ormandy of the Google Security Team discovered several vulnerabilities in the LZH decompression component used by LHa. The
make_table function of unlzh.c contains an array index error and a buffer overflow vulnerability. The build_tree function of
unpack.c contains a buffer underflow vulnerability. Additionally, unlzh.c contains a code that could run in an infinite loop.





1.



- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory                           GLSA 200611-23
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
                                            http://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

  Severity: Normal
     Title: Mono: Insecure temporary file creation
      Date: November 28, 2006
      Bugs: #150264
        ID: 200611-23

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Synopsis
========

Mono is vulnerable to linking attacks, potentially allowing a local user to overwrite arbitrary files.

Background
==========

Mono provides the necessary software to develop and run .NET client and server applications.

Affected packages
=================

    -------------------------------------------------------------------
     Package        /   Vulnerable   /                      Unaffected
    -------------------------------------------------------------------
  1  dev-lang/mono     < 1.1.13.8.1                      >= 1.1.13.8.1

Description
===========

Sebastian Krahmer of the SuSE Security Team discovered that the System.CodeDom.Compiler classes of Mono create temporary files with
insecure permissions.

Impact
======

A local attacker could create links in the temporary file directory, pointing to a valid file somewhere on the filesystem. When an
affected class is called, this could result in the file being overwritten with the rights of the user running the script.

Workaround
==========

There is no known workaround at this time.

Resolution
==========

All Mono users should upgrade to the latest version:

    # emerge --sync
    # emerge --ask --oneshot --verbose ">=dev-lang/mono-1.1.13.8.1"

References
==========

  [ 1 ] CVE-2006-5072
        http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5072

Availability
============

This GLSA and any updates to it are available for viewing at the Gentoo Security Website:

  http://security.gentoo.org/glsa/glsa-200611-23.xml

Concerns?
=========

Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users machines is of utmost
importance to us. Any security concerns should be addressed to security@xxxxxxxxxx or alternatively, you may file a bug at
http://bugs.gentoo.org.

License
=======

Copyright 2006 Gentoo Foundation, Inc; referenced text belongs to its owner(s).

The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license.

http://creativecommons.org/licenses/by-sa/2.5



2.


- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory                           GLSA 200611-25
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
                                            http://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

  Severity: Normal
     Title: OpenLDAP: Denial of Service vulnerability
      Date: November 28, 2006
      Bugs: #154349
        ID: 200611-25

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Synopsis
========

A flaw in OpenLDAP allows remote unauthenticated attackers to cause a Denial of Service.

Background
==========

OpenLDAP is a suite of LDAP-related applications and development tools.

Affected packages
=================

    -------------------------------------------------------------------
     Package           /   Vulnerable   /                   Unaffected
    -------------------------------------------------------------------
  1  net-nds/openldap      < 2.3.27-r3                    >= 2.3.27-r3
                                                         *>= 2.2.28-r5
                                                         *>= 2.1.30-r8

Description
===========

Evgeny Legerov has discovered that the truncation of an incoming authcid longer than 255 characters and ending with a space as the
255th character will lead to an improperly computed name length. This will trigger an assert in the libldap code.

Impact
======

By sending a BIND request with a specially crafted authcid parameter to an OpenLDAP service, a remote attacker can cause the service
to crash.

Workaround
==========

There is no known workaround at this time.

Resolution
==========

All OpenLDAP users should upgrade to the latest version:

    # emerge --sync
    # emerge --ask --oneshot --verbose "net-nds/openldap"

References
==========

  [ 1 ] CVE-2006-5779
        http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5779

Availability
============

This GLSA and any updates to it are available for viewing at the Gentoo Security Website:

  http://security.gentoo.org/glsa/glsa-200611-25.xml

Concerns?
=========

Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users machines is of utmost
importance to us. Any security concerns should be addressed to security@xxxxxxxxxx or alternatively, you may file a bug at
http://bugs.gentoo.org.

License
=======

Copyright 2006 Gentoo Foundation, Inc; referenced text belongs to its owner(s).

The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license.

http://creativecommons.org/licenses/by-sa/2.5



3.


- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory                           GLSA 200611-24
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
                                            http://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

  Severity: Normal
     Title: LHa: Multiple vulnerabilities
      Date: November 28, 2006
      Bugs: #151252
        ID: 200611-24

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Synopsis
========

LHa is affected by several vulnerabilities including the remote execution of arbitrary code.

Background
==========

LHa is a console-based program for packing and unpacking LHarc archives.

Affected packages
=================

    -------------------------------------------------------------------
     Package       /  Vulnerable  /                         Unaffected
    -------------------------------------------------------------------
  1  app-arch/lha      < 114i-r6                            >= 114i-r6

Description
===========

Tavis Ormandy of the Google Security Team discovered several vulnerabilities in the LZH decompression component used by LHa. The
make_table function of unlzh.c contains an array index error and a buffer overflow vulnerability. The build_tree function of
unpack.c contains a buffer underflow vulnerability. Additionally, unlzh.c contains a code that could run in an infinite loop.

Impact
======

By enticing a user to uncompress a specially crafted archive, a remote attacker could cause a Denial of Service by CPU consumption
or execute arbitrary code with the rights of the user running the application.

Workaround
==========

There is no known workaround at this time.

Resolution
==========

All LHa users should upgrade to the latest version:

    # emerge --sync
    # emerge --ask --oneshot --verbose ">=app-arch/lha-114i-r6"

References
==========

  [ 1 ] CVE-2006-4335
        http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4335
  [ 2 ] CVE-2006-4336
        http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4336
  [ 3 ] CVE-2006-4337
        http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4337
  [ 4 ] CVE-2006-4338
        http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4338

Availability
============

This GLSA and any updates to it are available for viewing at the Gentoo Security Website:

  http://security.gentoo.org/glsa/glsa-200611-24.xml

Concerns?
=========

Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users machines is of utmost
importance to us. Any security concerns should be addressed to security@xxxxxxxxxx or alternatively, you may file a bug at
http://bugs.gentoo.org.

License
=======

Copyright 2006 Gentoo Foundation, Inc; referenced text belongs to its owner(s).

The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license.

http://creativecommons.org/licenses/by-sa/2.5



- ---------------------------------------------------------------------------------------
NISCC values your feedback.

1. Which of the following most reflects the value of the briefing to you?
   (Place an 'X' next to your choice)

	Very useful:__ Useful:__ Not useful:__ 

2. If you did not find it useful, why not?


3. Any other comments? How could we improve our briefings?


Thank you for your contribution.
- ---------------------------------------------------------------------------------------

For additional information or assistance, please contact our help desk by telephone.  
You may send Not Protectively Marked information via e-mail to uniras@xxxxxxxxxxxxx

Office hours:

Mon - Fri: 08:30 - 17:00 hours
Tel: +44 (0) 870 487 0748 and follow the voice prompts
Fax: +44 (0) 870 487 0749

On-call duty officer outside office hours:
Tel: +44 (0) 870 487 0748 and follow the voice prompts

- ---------------------------------------------------------------------------------------
UNIRAS wishes to acknowledge the contributions of Gentoo for the information contained 

in this briefing.
- ---------------------------------------------------------------------------------------

This notice contains information released by the original author. Some of the information may have changed since it was released. If
the vulnerability affects you, it may be prudent to retrieve the advisory from the site of the original source to ensure that you
receive the most current information concerning that problem.

Reference to any specific commercial product, process, or service by trade name, trademark manufacturer, or otherwise, does not
constitute or imply its endorsement, recommendation, or favouring by UNIRAS or NISCC. The views and opinions of authors expressed
within this notice shall not be used for advertising or product endorsement purposes.

Neither UNIRAS or NISCC shall also accept responsibility for any errors or omissions contained within this briefing notice. In
particular, they shall not be liable for any loss or damage whatsoever, arising from or in connection with the usage of information
contained within this notice.

UNIRAS is a member of the Forum of Incident Response and Security Teams (FIRST) and has contacts with other international Incident
Response Teams (IRTs) in order to foster cooperation and coordination in incident prevention, to prompt rapid reaction to incidents,
and to promote information sharing amongst its members and the community at large.
- ---------------------------------------------------------------------------------------
<End of UNIRAS Briefing>



-----BEGIN PGP SIGNATURE-----
Version: PGP 8.1

iQA/AwUBRW7ZA2l7oeQsXfKvEQIFKgCg3EHoPc9XsI8TyConSikd3zmA074AoNZ0
62BZ99i5RNUXmWOkhhctS1tw
=sooB
-----END PGP SIGNATURE-----


______________________________________________________________________
This email has been scanned by the MessageLabs Email Security System.
For more information please visit http://www.messagelabs.com/email 
______________________________________________________________________

______________________________________________________________________
This email has been scanned by the MessageLabs Email Security System.
For more information please visit http://www.messagelabs.com/email 
______________________________________________________________________