openSUSE Security Announce
Threads by month
- ----- 2024 -----
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2023 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2022 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2021 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2020 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2019 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2018 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2017 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2016 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2015 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2014 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2013 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2012 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2011 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2010 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2009 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2008 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2007 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2006 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2005 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2004 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2003 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2002 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2001 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2000 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 1999 -----
- December
- November
- October
- September
- August
- 2 participants
- 10531 discussions
-----BEGIN PGP SIGNED MESSAGE-----
Dear suse-linux-announce subscribers,
due to both organisational as well as techinal difficulties, postings to
suse-security-announce got delayed. These difficulties have now been
resolved.
Security announcements as well as warnings and SuSE-related official
security statements (f. ex. that SuSE distributions are not vulnerable to
a known problem) will be posted to suse-security-announce _prior_ to any
other forum.
To make sure that all subscribers are up-to-date with the currently known
security issues, all SuSE Security Announcements filed after August 10th
will be sent again in short succession (~5 minute seperation).
These advisories are:
SuSE Security Announcement: rpc.kstatd (knfsd)
SuSE Security Announcement: suidperl (perl)
SuSE Security Announcement: Netscape
SuSE Security Announcement: Netscape (addition with download URLs to
ftp.suse.com)
SuSE Security Announcement: shlibs (glibc)
SuSE Security Announcement: screen
SuSE Security Announcement: apache
The last in the chain will be the (yet) unreleased announcement about
pam_smb.
We apologize for the inconvenience that the recent problems with the list
may have caused.
Sincerely,
Roman Drahtmüller.
-----BEGIN PGP SIGNATURE-----
Version: 2.6.3i
Charset: noconv
iQEVAwUBOb9D7ney5gA9JdPZAQFDRggAkzpQ+dZA+0Xlr9ReG4ob+mRkyJORJ5U3
FYzvdRBnMJS5izSFmG0q4VMAsQtK55d+uyD3Au6eZO6mwoOwy77wkY5Kz7Dy+d0i
rk0mbwau3Mb+nTAAJ6mh817Kexzq9icDTzcUnW7rz5w+dVeht7t6hiYnfcBEEgfx
/b/nFU9O8/xPxLqMdghf5VQRpqoZoxUuRDqWtg10cd1BwjqbD4+ZUiLdQR2RTCMk
fqK0jcUPU2R4JSea/PBX5AZBZvZ/CVcteQm4jvEroBN5xoWdJ9FoYOEq7jMoFtym
uENw3m37EzrNsAsK7THp3WyqWenMpCaGSHfadi4h2HMVaHm9EiUQvg==
=F63r
-----END PGP SIGNATURE-----
1
0
-----BEGIN PGP SIGNED MESSAGE-----
______________________________________________________________________________
SuSE Security Announcement
Package: apache
Date: Thursday, September 7th, 2000 20:00 MEST
Affected SuSE versions: 6.1, 6.2, 6.3, 6.4, 7.0
Vulnerability Type: remote file viewing
Severity (1-10): 2
SuSE default package: yes
Other affected systems: none, as of the release date of this advisory
Content of this advisory:
1) security vulnerability resolved: apache
problem description, discussion, solution and upgrade information
2) credits: @stake
3) standard appendix (further information)
<p>______________________________________________________________________________
1) problem description, brief discussion, solution, upgrade information
The default package selection in SuSE distributions includes apache.
The configuration file that comes with the package contains two
security relevant errors:
a) Starting in SuSE-6.0, a section in apache's configuration file
/etc/httpd/httpd.conf reads
Alias /cgi-bin-sdb/ /usr/local/httpd/cgi-bin/
This allows remote users to read the cgi script sources of the server,
located in /usr/local/httpd/cgi-bin/.
b) Starting with SuSE-6.3, the distribution comes with the apache module
WebDAV. It is contained in a seperate package, named mod_dav, and it
is installed if selected by hand or if a network server configuration
has been selected in the installation process. mod_dav is not contained
in the default package selection. WebDAV stands for "Web-based
Distributed Authoring and Versioning" and allows users to
collaboratively edit and manage files on remote web servers (see
http://www.webdav.org/ for further details!).
If WebDAV is installed, apache will automatically run with the module
activated. Opposing the recommendations on the WebDAV homepage under
http://www.webdav.org/mod_dav/#security, there is no access control or
authentification activated. This should most definitely be considered
a security problem.
The overall policy wrt activating an installed package will adopt to this
conclusion in future releases of the SuSE Linux distribution.
Problem a) and b) can be easily solved by changing the relevant parts
of apache's configuration file /etc/httpd/httpd.conf:
a) Change "Alias /cgi-bin-sdb/ /usr/local/httpd/cgi-bin/" to read:
"ScriptAlias /cgi-bin-sdb/ /usr/local/httpd/cgi-bin/"
Then, restart apache: `/sbin/init.d/apache restart'
b) Change "DAV On" to read: "DAV Off". This removes the problem,
regardless of the package being installed or not. Alternatively,
you may wish to remove the mod_dav package using the command
`rpm -e mod_dav'.
Then, restart apache: `/sbin/init.d/apache restart'
SuSE strongly recommends to have these changes applied as soon as
possible. In addition, SuSE provides an update for the vulnerable
misconfigured packages for the case that the admin of a SuSE Linux
machine did not change the configuration file yet.
Download the update package from locations desribed below and install
the package with the command `rpm -Fhv file.rpm'. The md5sum for each
file is in the line below. You can verify the integrity of the rpm
files using the command
`rpm --checksig --nogpg file.rpm',
independently from the md5 signatures below.
<p> i386 Intel Platform:
SuSE-7.0
ftp://ftp.suse.com/pub/suse/i386/update/7.0/n1/apache-1.3.12-107.i386.rpm
65bac933de7676ad3d8f63b32c608dad
source rpm:
ftp://ftp.suse.com/pub/suse/i386/update/7.0/zq1/apache-1.3.12-107.nosrc.rpm
5b0f9ce9b5e2c3a45356fcd9cdff07ba
SuSE-6.4
ftp://ftp.suse.com/pub/suse/i386/update/6.4/n1/apache-1.3.12-107.i386.rpm
a4bea77974c9d300ac13698e6f9812eb
source rpm:
ftp://ftp.suse.com/pub/suse/i386/update/6.4/zq1/apache-1.3.12-107.nosrc.rpm
39cf311c44bc760159c711c7ec97685f
SuSE-6.3
ftp://ftp.suse.com/pub/suse/i386/update/6.3/n1/apache-1.3.9-70.i386.rpm
87d7a6426857e6f3afcf991c273fc1a5
source rpm:
ftp://ftp.suse.com/pub/suse/i386/update/6.3/zq1/apache-1.3.9-70.nosrc.rpm
ab81b76d0c4e6c765b77a69fd4143620
SuSE-6.2
ftp://ftp.suse.com/pub/suse/i386/update/6.2/n1/apache-1.3.6-52.i386.rpm
d7c513bb4aad15a9f3dfb11ff1302405
source rpm:
ftp://ftp.suse.com/pub/suse/i386/update/6.2/zq1/apache-1.3.6-52.nosrc.rpm
bdabbdf7df648c3b4b8c5fd031e65cfc
SuSE-6.1
ftp://ftp.suse.com/pub/suse/i386/update/6.1/n1/apache-1.3.6-53.i386.rpm
db40e37d1931fb4e5830358b37acee5e
source rpm:
ftp://ftp.suse.com/pub/suse/i386/update/6.1/zq1/apache-1.3.6-53.nosrc.rpm
8ad785cb5f16456b8540982f1175b0b0
SuSE-6.0
Please use the update packages from the 6.1 directory for SuSE-6.0!
<p> Sparc Platform:
SuSE-7.0
ftp://ftp.suse.com/pub/suse/sparc/update/7.0/n1/apache-1.3.12-109.sparc.rpm
66f87cb2100960ee72ae1110fa077424
source rpm:
ftp://ftp.suse.com/pub/suse/sparc/update/7.0/zq1/apache-1.3.12-109.nosrc.rpm
fff4bd1d37a7e9d430e8a60898865567
<p> AXP Alpha Platform:
SuSE-6.4
The update packages will be available soon at the usual location
ftp://ftp.suse.com/pub/suse/axp/update/6.4/n1/ .
Until then, please correct the configuration file by hand as
described above.
SuSE-6.3
The update packages will be available soon at the usual location
ftp://ftp.suse.com/pub/suse/axp/update/6.3/n1/ .
Until then, please correct the configuration file by hand as
described above.
SuSE-6.1
ftp://ftp.suse.com/pub/suse/axp/update/6.1/n1/apache-1.3.6-43.alpha.rpm
eaca8f06c54c669d60f6a06fbe7301dc
source rpm:
ftp://ftp.suse.com/pub/suse/axp/update/6.1/zq1/apache-1.3.6-43.nosrc.rpm
2227de2e6d5faf268413cd474175d126
<p> PPC Power PC Platform:
SuSE-6.4
ftp://ftp.suse.com/pub/suse/ppc/update/6.4/n1/apache-1.3.12-108.ppc.rpm
0c830d4d33f2bac33d6a44ab0efc34e7
source rpm:
ftp://ftp.suse.com/pub/suse/ppc/update/6.4/zq1/apache-1.3.12-108.nosrc.rpm
f5fd7575d67e369f87fb2e5c47b61eaf
SuSE-6.3
The update packages will be available soon at the usual location
ftp://ftp.suse.com/pub/suse/ppc/update/6.3/n1/ .
Until then, please correct the configuration file by hand as
described above.
______________________________________________________________________________
2) Credits:
SuSE would like to express its sincere appreciation for the efforts
and the working style of the Cerberus Security Team/@Stake Inc., in
particular to mnemonix (David Litchfield <dlitchfield(a)atstake.com>)
and to weld <weld(a)atstake.com>.
Have a look at their website at http://www.atstake.com/ for further
information.
______________________________________________________________________________
3) standard appendix:
SuSE runs two security mailing lists to which any interested party may
subscribe:
suse-security(a)suse.com
- general/linux/SuSE security discussion.
All SuSE security announcements are sent to this list.
To subscribe, send an email to
<suse-security-subscribe(a)suse.com>.
suse-security-announce(a)suse.com
- SuSE's announce-only mailing list.
Only SuSE's security annoucements are sent to this list.
To subscribe, send an email to
<suse-security-announce-subscribe(a)suse.com>.
For general information or the frequently asked questions (faq)
send mail to:
<suse-security-info(a)suse.com> or
<suse-security-faq(a)suse.com> respectively.
===============================================
SuSE's security contact is <security(a)suse.com>.
===============================================
Regards,
Roman Drahtmüller.
- - --
- -
| Roman Drahtmüller <draht(a)suse.de> // "Caution: Cape does |
SuSE GmbH - Security Phone: // not enable user to fly."
| Nürnberg, Germany +49-911-740530 // (Batman Costume warning label) |
- -
______________________________________________________________________________
The information in this advisory may be distributed or reproduced,
provided that the advisory is not modified in any way.
SuSE GmbH makes no warranties of any kind whatsoever with respect
to the information contained in this security advisory.
Type Bits/KeyID Date User ID
pub 2048/3D25D3D9 1999/03/06 SuSE Security Team <security(a)suse.de>
- -----BEGIN PGP PUBLIC KEY BLOCK-----
Version: 2.6.3i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=pIeS
- -----END PGP PUBLIC KEY BLOCK-----
-----BEGIN PGP SIGNATURE-----
Version: 2.6.3i
Charset: noconv
iQEVAwUBObfXOHey5gA9JdPZAQHhzwf+KIt1AysU1WAwQXlQTssfVFEM0nh6fT2O
FRqoAF+2FpC3FaTZBmTqYTuNtegSG0cndg/NzWy2Q2CTFxbEzm7aJqOxtS/R6Am2
GPKV6k51gW0lmL7Pl9j15s9kngW/U9fRnMX/SCw4CiHnuMTD+AuERFYEQOAVFaQy
Qvw03BYRJnr36DOl3PUovir5TyIrBQloPr6IxfJPvL/mbHz63h8ISBgLjfITpAY0
7FJtUN4SM86pXcuO7LGyOTQciAzvIChSqelaZnqGEUVhmGBcTzTsaoMrwf43w2NP
KQ61Ez34EwNN1AA/jhY9ARdenNUKCTXcWC6hFcXibMKTdqgJJq6waA==
=x36R
-----END PGP SIGNATURE-----
1
0
-----BEGIN PGP SIGNED MESSAGE-----
______________________________________________________________________________
SuSE Security Announcement
Package: screen
Date: Wednesday, September 6th, 2000 19:35 MEST
Affected SuSE versions: 5.3, 6.0, 6.1, 6.2, 6.3, 6.4, 7.0
Vulnerability Type: local root compromise
Severity (1-10): 8
SuSE default package: yes
Other affected systems: all linux systems with the screen program
installed suid root
Content of this advisory:
1) security vulnerability resolved: screen
problem description, discussion, solution and upgrade information
2) pending vulnerabilities, temporary workarounds
3) standard appendix (further information)
<p>______________________________________________________________________________
1) problem description, brief discussion, solution, upgrade information
screen, a tty multiplexer, is installed suid root by default on SuSE
Linux distributions. By supplying a thoughtfully designed string as
the visual bell message, local users can obtain root privilege.
Exploit information has been published on security forums.
The temporary workaround for this problem would be to remove the suid
bit from /usr/bin/screen*. This also requires mode changes in the
/tmp/screens directory where the pipes for communication between
the client and server part of screen are placed upon start of screen.
SuSE provides an update for the vulnerable screen package. It is
strongly recommended to upgrade to the latest version found on our
ftp server as described below. The update packages remove all currently
known security problems in the glibc package.
Download the update package from locations desribed below and install
the package with the command `rpm -Fhv file.rpm'. The md5sum for each
file is in the line below. You can verify the integrity of the rpm
files using the command
`rpm --checksig --nogpg file.rpm',
independently from the md5 signatures below.
<p> i386 Intel Platform:
SuSE-7.0
ftp://ftp.suse.com/pub/suse/i386/update/7.0/ap1/screen-3.9.8-1.i386.rpm
84b6330f0b9ac7600cc5ec53a9dfdbe9
source rpm:
ftp://ftp.suse.com/pub/suse/i386/update/7.0/zq1/screen-3.9.8-1.src.rpm
883d80abf603a4eab2238a4e857301e2
SuSE-6.4
ftp://ftp.suse.com/pub/suse/i386/update/6.4/ap1/screen-3.9.8-0.i386.rpm
52f451ce0c8c49e02311dd16961aa028
source rpm:
ftp://ftp.suse.com/pub/suse/i386/update/6.4/zq1/screen-3.9.8-0.src.rpm
a3cb0fb2c90664c6deb986fcbf4e74fd
SuSE-6.3
ftp://ftp.suse.com/pub/suse/i386/update/6.3/ap1/screen-3.9.8-0.i386.rpm
2c244140d346b16a3d5fb77e2cf1f860
source rpm:
ftp://ftp.suse.com/pub/suse/i386/update/6.3/zq1/screen-3.9.8-0.src.rpm
2c84eadb44a5694dc3088000fff5ec82
SuSE-6.2
ftp://ftp.suse.com/pub/suse/i386/update/6.2/ap1/screen-3.9.8-0.i386.rpm
a72973a281467a1b390453ba2cbf3b59
source rpm:
ftp://ftp.suse.com/pub/suse/i386/update/6.2/zq1/screen-3.9.8-0.src.rpm
a379e5b4ca81cf4118002c3064d1c3da
SuSE-6.1
ftp://ftp.suse.com/pub/suse/i386/update/6.1/ap1/screen-3.9.8-0.i386.rpm
d64479b7ba3740299acf717fe36c3834
source rpm:
ftp://ftp.suse.com/pub/suse/i386/update/6.1/zq1/screen-3.9.8-0.src.rpm
e0b08bc5887c40d9f6e3176936c7150b
SuSE-6.0
Please use the update packages from the 6.1 directory for SuSE-6.0!
SuSE-5.3
ftp://ftp.suse.com/pub/suse/i386/update/5.3/ap1/screen-3.9.8-0.i386.rpm
cd3ef3bc018973d8907000a8a23bafb6
source rpm:
ftp://ftp.suse.com/pub/suse/i386/update/5.3/zq1/screen-3.9.8-0.src.rpm
f94c9664219649a2f2100344a88cdd22
<p><p> Sparc Platform:
SuSE-7.0
ftp://ftp.suse.com/pub/suse/sparc/update/7.0/ap1/screen-3.9.8-0.sparc.rpm
3adce8a1bcf2464266d5db728b8d8af9
source rpm:
ftp://ftp.suse.com/pub/suse/sparc/update/7.0/zq1/screen-3.9.8-0.src.rpm
26b1186598be0f873732fa5bf7b7b77b
<p><p> AXP Alpha Platform:
SuSE-6.4
ftp://ftp.suse.com/pub/suse/axp/update/6.4/ap1/screen-3.9.8-0.alpha.rpm
aa64d979f33d3c03b5bc0c5074892df8
source rpm:
ftp://ftp.suse.com/pub/suse/axp/update/6.4/zq1/screen-3.9.8-0.src.rpm
11f2261b54e8a329c8b0d1bfd9d0c96f
SuSE-6.3
ftp://ftp.suse.com/pub/suse/axp/update/6.3/ap1/screen-3.9.8-0.alpha.rpm
8e5acd8e3fe9efa7d82e2710489c7300
source rpm:
ftp://ftp.suse.com/pub/suse/axp/update/6.3/zq1/screen-3.9.8-0.src.rpm
6a1c04d9dd4f8c351e189a38f6f5d614
SuSE-6.1
ftp://ftp.suse.com/pub/suse/axp/update/6.1/ap1/screen-3.9.8-0.alpha.rpm
54828e3e9f0c72cc022fb35660c687e8
source rpm:
ftp://ftp.suse.com/pub/suse/axp/update/6.1/zq1/screen-3.9.8-0.src.rpm
e1ff18f05b40afa7849e7d07ae5b8755
<p> PPC Power PC Platform:
SuSE-6.4
ftp://ftp.suse.com/pub/suse/ppc/update/6.4/ap1/screen-3.9.8-0.ppc.rpm
7418b948cf1e92622814c8aae3fa9aa6
source rpm:
ftp://ftp.suse.com/pub/suse/ppc/update/6.4/zq1/screen-3.9.8-0.src.rpm
25c8979ec0f63f09a3e39cdadf2ef657
SuSE-6.3
ftp://ftp.suse.com/pub/suse/ppc/update/6.3/ap1/screen-3.9.8-0.ppc.rpm
ea459ccb8c91b293e8b2b321df39be89
source rpm:
ftp://ftp.suse.com/pub/suse/ppc/update/6.3/zq1/screen-3.9.8-0.src.rpm
aa87f61ec2fa912be6c83711c0630129
______________________________________________________________________________
2) Pending vulnerabilities in SuSE Distributions and Workarounds:
This section addresses currently known vulnerabilities in Linux/Unix
systems that have not been resolved yet as of the release date of
this advisory.
- zope
SuSE distributions before 7.0 do not contain zope as a package.
An updated package for the freshly released SuSE-7.0 is on the way.
- xchat
A fix for the URL handler vulnerabilty is in progress and will
be released within a few days. There is currently no effective
and easy workaround other than removing the package by hand
(`rpm -e xchat'). More information on xchat can be found in
xchat's documentation directory /usr/doc/packages/xchat or
/usr/share/doc/packages/xchat for SuSE-7.0.
______________________________________________________________________________
3) standard appendix:
SuSE runs two security mailing lists to which any interested party may
subscribe:
suse-security(a)suse.com
- general/linux/SuSE security discussion.
All SuSE security announcements are sent to this list.
To subscribe, send an email to
<suse-security-subscribe(a)suse.com>.
suse-security-announce(a)suse.com
- SuSE's announce-only mailing list.
Only SuSE's security annoucements are sent to this list.
To subscribe, send an email to
<suse-security-announce-subscribe(a)suse.com>.
For general information or the frequently asked questions (faq)
send mail to:
<suse-security-info(a)suse.com> or
<suse-security-faq(a)suse.com> respectively.
===============================================
SuSE's security contact is <security(a)suse.com>.
===============================================
Regards,
Roman Drahtmüller.
- - --
- -
| Roman Drahtmüller <draht(a)suse.de> // "Caution: Cape does |
SuSE GmbH - Security Phone: // not enable user to fly."
| Nürnberg, Germany +49-911-740530 // (Batman Costume warning label) |
- -
______________________________________________________________________________
The information in this advisory may be distributed or reproduced,
provided that the advisory is not modified in any way.
SuSE GmbH makes no warranties of any kind whatsoever with respect
to the information contained in this security advisory.
Type Bits/KeyID Date User ID
pub 2048/3D25D3D9 1999/03/06 SuSE Security Team <security(a)suse.de>
- -----BEGIN PGP PUBLIC KEY BLOCK-----
Version: 2.6.3i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=pIeS
- -----END PGP PUBLIC KEY BLOCK-----
-----BEGIN PGP SIGNATURE-----
Version: 2.6.3i
Charset: noconv
iQEVAwUBObaAlXey5gA9JdPZAQHi5gf9FE0NBzriT2G37ogRKRdENNXEZhWmj5fa
vUcFBeGXvJzRxIabFbyqGfIlONp+SKdbxJqVpxBBXB+NaFYAAEtLIgjKA+DUOThQ
DZjFVouMiuzwROl8JZU33GCNjqGh+97ImBA4LlVymFm603fgRllYZV2+TsqeWarE
s2xIzB9z4GlLbyG/X/bM0tAOoPKiEl3hiTdWM7tAgXVoiTkdVBOYGDR/9wmMNiEU
ZNkxdq5OJUcNd4Pa4vbnxTLPUEdBhQmZgWvfP+9v45FylkgTuRXrcCcyRj6YVVdC
oOgB050z1zr56fVCClGKeOvgTKACwrUMX7pyIeG0HZCWGU+Ag+SsHw==
=WVPy
-----END PGP SIGNATURE-----
1
0
-----BEGIN PGP SIGNED MESSAGE-----
______________________________________________________________________________
SuSE Security Announcement
Package: shlibs (glibc-2.0, glibc-2.1)
Date: Wednesday, September 6th, 2000 12:30 MEST
Affected SuSE versions: 6.0, 6.1, 6.2, 6.3, 6.4, 7.0
Vulnerability Type: local root compromise
Severity (1-10): 9
SuSE default package: yes
Other affected systems: all glibc based linux systems, other
Un*x systems
Content of this advisory:
1) security vulnerability resolved: shlibs (glibc)
problem description, discussion, solution and upgrade information
2) pending vulnerabilities, temporary workarounds
3) standard appendix (further information)
<p>______________________________________________________________________________
1) problem description, brief discussion, solution, upgrade information
The glibc implementations in all SuSE distributions starting with
SuSE-6.0 have multiple security problems where at least one of them
allows any local user to gain root access to the system.
a) ld-linux.so.2, the runtime linker, is supposed to clean environment
variables that may influence the execution of programs ran by a
suid program. Variables of that kind include LD_LIBRARY_PATH and
LD_PRELOAD. These variables do not have any effect on the suid
application itself since the linker ignores them. However, if the
suid program executes another non-suid application without dropping
privileges and without cleaning the environment, the LD_* variables
would allow an attacker to execute arbitrary code as the effective
uid of the calling suid program. There is currently no program in the
SuSE distribution known to be susceptible to this problem.
b) locale handling portions of the glibc code fails to properly check
given environment settings such as the variable LANGUAGE. This could
lead to arbitrary code being executed as root, depending on the
permissions and ownerships of the program being used for the exploit.
c) A bug in the mutex handling code in the shlibs version for SuSE-7.0
could cause multithreaded applications to hang or crash. This has also
been fixed.
There is only one way to temporarily circumvent the exploit: Disable
all suid applications in the system.
SuSE provides a updated packages for the vulnerable libraries. It is
strongly recommended to upgrade to the latest version found on our
ftp server as described below. The update packages remove all currently
known security problems in the glibc package.
Download the update packages as described below and install the
package with the command `rpm -Fhv file.rpm'. The md5sum for each
file is in the line below. You can verify the integrity of the rpm
files using the command
`rpm --checksig --nogpg file.rpm',
independently from the md5 signatures below.
SPECIAL INSTALL INSTRUCTIONS:
Note that the complete update consists of three (3) binary rpm
packages and one source rpm package per distribution and platform.
libc-*.rpm contains the static libraries, libd is the package for
the profiling+debugging version of the libraries.
If at all possible, keep your machine calm while you perform the
update. Execute the following commands after the rpm update has been
applied:
/sbin/ldconfig # alternatively, use SuSEconfig
/sbin/init u # will restart init to make a clean shutdown
# possible once needed.
i386 Intel Platform:
SuSE-7.0
ftp://ftp.suse.com/pub/suse/i386/update/7.0/a1/shlibs-2.1.3-154.i386.rpm
753176172ebf628c6567c70a9b950933
ftp://ftp.suse.com/pub/suse/i386/update/7.0/d1/libc-2.1.3-154.i386.rpm
0f0696fc359cdb7b13f40a52d6676f09
ftp://ftp.suse.com/pub/suse/i386/update/7.0/d2/libd-2.1.3-154.i386.rpm
4ca3268f91a9294313cf871e9f7cb8b8
source rpm:
ftp://ftp.suse.com/pub/suse/i386/update/7.0/zq1/libc-2.1.3-154.src.rpm
a6af3232fe6d474d6309c68469c126ec
SuSE-6.4
ftp://ftp.suse.com/pub/suse/i386/update/6.4/a1/shlibs-2.1.3-154.i386.rpm
150dcb3854b066c021c396b4a0fe25e6
ftp://ftp.suse.com/pub/suse/i386/update/6.4/d1/libc-2.1.3-154.i386.rpm
75c9aef75d6e7e4b196c21bb500d00e0
ftp://ftp.suse.com/pub/suse/i386/update/6.4/d2/libd-2.1.3-154.i386.rpm
47fff508b0b67a82356361aa23c8beae
source rpm:
ftp://ftp.suse.com/pub/suse/i386/update/6.4/zq1/libc-2.1.3-154.src.rpm
bfeaa4e15ecbe1fea986b710152b5fec
SuSE-6.3
ftp://ftp.suse.com/pub/suse/i386/update/6.3/a1/shlibs-2.1.2-47.i386.rpm
8e88f237414a4d8f96131b17267b4d53
ftp://ftp.suse.com/pub/suse/i386/update/6.3/d1/libc-2.1.2-47.i386.rpm
575bb0c94474add7ae02333cbb77cba0
ftp://ftp.suse.com/pub/suse/i386/update/6.3/d2/libd-2.1.2-47.i386.rpm
8728db143b6393a261aa9060d9321345
source rpm:
ftp://ftp.suse.com/pub/suse/i386/update/6.3/zq1/libc-2.1.2-47.src.rpm
eea1810dceafe5e7f77b4b5137829834
SuSE-6.2
ftp://ftp.suse.com/pub/suse/i386/update/6.2/a1/shlibs-2.1.1-29.i386.rpm
78360eddc58f3897a14327d2fa214191
ftp://ftp.suse.com/pub/suse/i386/update/6.2/d1/libc-2.1.1-29.i386.rpm
456cad1d8034d40ebbf8337d1308c4de
ftp://ftp.suse.com/pub/suse/i386/update/6.2/d2/libd-2.1.1-29.i386.rpm
6dccdf557c6d329b40238a1644368564
source rpm:
ftp://ftp.suse.com/pub/suse/i386/update/6.2/zq1/libc-2.1.1-29.src.rpm
cec489c212826cb2dcc65a602da61da3
SuSE-6.1
ftp://ftp.suse.com/pub/suse/i386/update/6.1/a1/shlibs-2000.9.5-0.i386.rpm
7a272e7f15fd2dec69401d4c788de015
ftp://ftp.suse.com/pub/suse/i386/update/6.1/d1/libc-2000.9.5-0.i386.rpm
c748944bbe8a55f69478e6ef0bda843a
ftp://ftp.suse.com/pub/suse/i386/update/6.1/d2/libd-2000.9.5-0.i386.rpm
7fce2e2e41b62dc985e48ee31f6dac1c
source rpm:
ftp://ftp.suse.com/pub/suse/i386/update/6.1/zq1/libc-2000.9.5-0.src.rpm
77fa60f5a3a10e02460bd1960b1f78f6
Please use the packages from the SuSE-6.1 directory for SuSE-6.0!
<p><p> Sparc Platform:
SuSE-7.0:
ftp://ftp.suse.com/pub/suse/sparc/update/7.0/a1/shlibs-2.1.3-154.sparc.rpm
1563171d7ee17a3048500afd4424927d
ftp://ftp.suse.com/pub/suse/sparc/update/7.0/d1/libc-2.1.3-154.sparc.rpm
a907fbb3e5e48664cadb6b75570e15b2
ftp://ftp.suse.com/pub/suse/sparc/update/7.0/d2/libd-2.1.3-154.sparc.rpm
f60071e3a497e3af48078338b3bd6610
source rpm:
ftp://ftp.suse.com/pub/suse/sparc/update/7.0/zq1/libc-2.1.3-154.src.rpm
690a34f9ddb6bd6edf41a07d5fba0ad4
<p><p> AXP Alpha Platform:
SuSE-6.4
ftp://ftp.suse.com/pub/suse/axp/update/6.4/a1/shlibs-2.1.3-154.alpha.rpm
d08a782d1dc1cc406b2141727295befe
ftp://ftp.suse.com/pub/suse/axp/update/6.4/d1/libc-2.1.3-154.alpha.rpm
730c9b3c98f9d243c09ce41c5c4240a5
ftp://ftp.suse.com/pub/suse/axp/update/6.4/d2/libd-2.1.3-154.alpha.rpm
0c2ba3d11a42d84f48b1ee79a15e36b2
source rpm:
ftp://ftp.suse.com/pub/suse/axp/update/6.4/zq1/libc-2.1.3-154.src.rpm
a5f2a207c6f8b179bbd91cea9c96711d
SuSE-6.3
ftp://ftp.suse.com/pub/suse/axp/update/6.3/a1/shlibs-2.1.2-47.alpha.rpm
afc0ac7f3db066702fbd19bfaa216751
ftp://ftp.suse.com/pub/suse/axp/update/6.3/d1/libc-2.1.2-47.alpha.rpm
3530ef711231a5b378d14fe70e2971f6
ftp://ftp.suse.com/pub/suse/axp/update/6.3/d2/libd-2.1.2-47.alpha.rpm
5836a7a1557046b0c3498b7dec1ee436
source rpm:
ftp://ftp.suse.com/pub/suse/axp/update/6.3/zq1/libc-2.1.2-47.src.rpm
0100769ad09d68563a7540ba73c826d7
SuSE-6.1
ftp://ftp.suse.com/pub/suse/axp/update/6.1/a1/shlibs-2000.9.5-0.alpha.rpm
64c59dcb13069293694faf845446463e
ftp://ftp.suse.com/pub/suse/axp/update/6.1/d1/libc-2000.9.5-0.alpha.rpm
2b8df961dcfb42933cdf298f9229cffd
ftp://ftp.suse.com/pub/suse/axp/update/6.1/d2/libd-2000.9.5-0.alpha.rpm
75dd4bcfb0bf2cc64fe8dd5bfc4a69f0
source rpm:
ftp://ftp.suse.com/pub/suse/axp/update/6.1/zq1/libc-2000.9.5-0.src.rpm
11871baa8279f8c0c79f6c9d95ca531c
<p> PPC Power PC Platform:
SuSE-6.4
ftp://ftp.suse.com/pub/suse/ppc/update/6.4/a1/shlibs-2.1.3-154.ppc.rpm
8565cd463e4fbbccc39aa96f1eefdc70
ftp://ftp.suse.com/pub/suse/ppc/update/6.4/d1/libc-2.1.3-154.ppc.rpm
987ed3d338fb7c42083cf6dd2057ce0b
ftp://ftp.suse.com/pub/suse/ppc/update/6.4/d2/libd-2.1.3-154.ppc.rpm
a212f188cf31d55c2016236d2c313cf4
source rpm:
ftp://ftp.suse.com/pub/suse/ppc/update/6.4/zq1/libc-2.1.3-154.src.rpm
401b4f2f306a065fb04edd89cd153364
______________________________________________________________________________
2) Pending vulnerabilities in SuSE Distributions and Workarounds:
This section addresses currently known vulnerabilities in Linux/Unix
systems that have not been resolved yet as of the release date of
this advisory.
- screen
local root compromise. Update+advisory follows this advisory.
- zope
SuSE distributions before 7.0 do not contain zope as a package.
An updated package for the freshly released SuSE-7.0 is on the way.
- xchat
A fix for the URL handler vulnerabilty is in progress and will
be released within a few days. There is currently no effective
and easy workaround other than removing the package by hand
(`rpm -e xchat'). More information on xchat can be found in
xchat's documentation directory /usr/doc/packages/xchat or
/usr/share/doc/packages/xchat for SuSE-7.0.
______________________________________________________________________________
3) standard appendix:
SuSE runs two security mailing lists to which any interested party may
subscribe:
suse-security(a)suse.com
- general/linux/SuSE security discussion.
All SuSE security announcements are sent to this list.
To subscribe, send an email to
<suse-security-subscribe(a)suse.com>.
suse-security-announce(a)suse.com
- SuSE's announce-only mailing list.
Only SuSE's security annoucements are sent to this list.
To subscribe, send an email to
<suse-security-announce-subscribe(a)suse.com>.
For general information or the frequently asked questions (faq)
send mail to:
<suse-security-info(a)suse.com> or
<suse-security-faq(a)suse.com> respectively.
===============================================
SuSE's security contact is <security(a)suse.com>.
===============================================
Regards,
Roman Drahtmüller.
- - --
- -
| Roman Drahtmüller <draht(a)suse.de> // "Caution: Cape does |
SuSE GmbH - Security Phone: // not enable user to fly."
| Nürnberg, Germany +49-911-740530 // (Batman Costume warning label) |
- -
______________________________________________________________________________
The information in this advisory may be distributed or reproduced,
provided that the advisory is not modified in any way.
SuSE GmbH makes no warranties of any kind whatsoever with respect
to the information contained in this security advisory.
Type Bits/KeyID Date User ID
pub 2048/3D25D3D9 1999/03/06 SuSE Security Team <security(a)suse.de>
- -----BEGIN PGP PUBLIC KEY BLOCK-----
Version: 2.6.3i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=pIeS
- -----END PGP PUBLIC KEY BLOCK-----
-----BEGIN PGP SIGNATURE-----
Version: 2.6.3i
Charset: noconv
iQEVAwUBObYa53ey5gA9JdPZAQHOcwf/Xwz2AsyelEXHA9KA+9/b5ZpEPu0hnySF
KjADn6wLGDGdUBb70IszsIWbxg5XUXkQ4rjmHgE2IXmZG+euD+KW7Y9QPNTGpt5/
JD9lQAaqlqSOFr6/CuD44ZaU/hUGELeMIyG0YDCG27zQwWGigjJwdeyuDeqif0+M
MGDnBqW+GS/LXaLd7Yb4QIocFDKzYFHqGPbYIP3vEAkTpT/gBV6C51E7NBDE8Bwm
3k8PvrHIoq/ovlUEqMbeEETskjMuGQfkUPHfVDV0um96RpsdKEHQIBdCfeMBTe5P
ZL/aLeMwDdN6kKNAeouKDszWz453uXuWo0h8cZCJG2/Z1bNtoEi9Aw==
=iM4f
-----END PGP SIGNATURE-----
1
0
-----BEGIN PGP SIGNED MESSAGE-----
______________________________________________________________________________
SuSE Security Announcement
Package: Netscape, Versions 4.x, possibly others
Date: Wednesday, August 23rd, 2000 03:30 MEST
Affected SuSE versions: All
Vulnerability Type: remote file viewing, remote buffer overflow
Severity (1-10): 4, 7
SuSE default package: yes
Other affected systems: all linux systems using this package
Content of this advisory:
1) security vulnerability resolved: Netscape
problem description, discussion, solution and upgrade information
2) Correction/apology for perl thread, pending vulnerabilities,
temporary workarounds
3) standard appendix (further information)
<p>______________________________________________________________________________
1) problem description, brief discussion, solution, upgrade information
Two security problems exist in the netscape package as shipped with
SuSE Linux distributions.
a) Improper verification in Netscape's jpeg processing code can lead
to a buffer overflow where data read from the network can overwrite
memory. As a result, arbitrary code from a remote origin could be
executed. The attack is particularly dangerous since it can penetrate
firewall setups. Netscape version 4.74 fixes (fixed) this
vulnerability.
b) Due to an error in the java implementation in Netscape, it is
possible for an attacker to view files and directories with the
priviledges of the user running Netscape if the user visits a
malisciously crafted webpage. This issue is known as "Brown
Orifice" and requires the user to have Java enabled in her browser
configuration. Again, this attack can penetrate firewall setups.
See http://www.brumleve.com/BrownOrifice for details.
Problem a) can be circumvented by disabling the automatic image
loading in Netscape's configuration.
The temporary workaround for problem b) is to disable Java in
Netscape's configuration menu (to protect against other
vulnerabilities, disable JavaScript, too!). Both countermeasures
may widely be found inacceptable.
<p> SuSE provides an updated package for the vulnerable software. It is
strongly recommended to upgrade to the latest version found on our
ftp server as described below. The update package introduces
Netscape version 4.75, including the SuSE-specific libraries that fix
some of Netscape's "irregular" behaviour. Please note that
Netscape-4.75 is not available for the glibc-2.0-based SuSE
Distributions SuSE-6.0 and 6.1 because Netscape doesn't provide
any files for this glibc version. For these distributions, we
provide Netscape Version 4.74 which fixes problem a) only.
Alternatively, the package for the libc5-based SuSE-5.3
distribution can be used as well if the package 'shlibs5' is
installed. This is recommended, since the 5.3 package may be
faster and more reliable.
<p> Download the update package as described below and install the
package with the command `rpm -Fhv file.rpm'. The md5sum for each
file is in the line below. You can verify the integrity of the rpm
files using the command
`rpm --checksig --nogpg file.rpm',
independently from the md5 signatures below.
Due to US-American export restrictions for cryptographical software,
we are unable to provide update packages on our US ftp server
ftp.suse.com. Instead, the packages can be found on ftp.suse.de. For
bandwidth reasons, please use our mirrors or our primary mirror
ftp.gwdg.de and follow the directory to your distribution.
Example: For SuSE-6.4 use the path
ftp://ftp.gwdg.de/pub/linux/suse/6.4_update_de/xap1/netscape.rpm.
***********************************************************************
Please note that the path to netscape.rpm in the 6.0 and 6.1 update
directories point to Netscape version 4.74 which doesn't fix problem b!
See section above!
***********************************************************************
Further mirrors can be found at
http://www.suse.de/de/support/download/ftp/inland.html, but be
advised that not all sites mirror the German part of the update
directories.
md5sums for the i386 Intel Platform (the only one supported):
SuSE Versions 6.2, 6.3, 6.4, 7.0:
70289f88b4c9fc1a9867ba7dac985982 netscape-4.75.glibc21.i386.rpm
SuSE Version 5.3 (libc5-based, probably faster, can be used on
glibc2-based systems if the package shlibs5 is installed)
679aaf67592244a07733bdabdab67729 netscape-4.75.libc5.i386.rpm
SuSE Version 6.0 and 6.1, Netscape-4.74 with incomplete fixes:
4bcc31fe37f7c8d226b437c1daa9b944 netscape-4.74.glibc20.i386.rpm
<p>______________________________________________________________________________
2) Correction/Apology: In my posting to suse-security(a)suse.de and to
bugtraq(a)securityfocus.com about the suidperl thread, Subject: "SuSE
Security Announcement: suidperl (perl)", dated 10 Aug 2000, I wrote:
"A maliciously implemented feature causes the interpreter to spawn
the /bin/mail program to"..."
This is a bad and embarrassing mistake because of a confusion about
the word "maliciously" in this context - it was meant to read
"inconsiderate".
I apologize to the perl folks for this mistake.
<p> Pending vulnerabilities in SuSE Distributions and Workarounds:
This section addresses currently known vulnerabilities in Linux/Unix
systems that have not been resolved yet as of the release date of
this advisory.
- ntop
ntop is a network statistics visualization utility which offers
graphical analysis of network traffic and other statistics with
a web browser. By default, ntop listens on port 3000 and requires
no or a commonly known authentication password to view the data.
ntop is only installed in network server selections and is not
activated by default in SuSE Linux installations.
The ntop packages shipped with SuSE Linux did not exhibit the
unsafe behaviour when a file like /../../etc/passwd is referenced.
However, Thomas Biege has reviewed the source of the package and
there are still some potential problems with the package that
require a major overhaul of the code.
Currently, we recommend to disable or even remove the ntop package
(`rpm -e ntop') in an environment where security considerations
play a role. More information on ntop can be found in
ntop's documentation directory /usr/doc/packages/ntop or
/usr/share/doc/packages/ntop for SuSE-7.0.
- zope
SuSE distributions before 7.0 do not contain zope as a package.
An updated package for the freshly released SuSE-7.0 is on the way.
- xchat
A fix for the URL handler vulnerabilty is in progress and will
be released within a few days. There is currently no effective
and easy workaround other than removing the package by hand
(`rpm -e xchat'). More information on xchat can be found in
xchat's documentation directory /usr/doc/packages/xchat or
/usr/share/doc/packages/xchat for SuSE-7.0.
- minicom
SuSE's minicom doesn't exhibit the problem with files created
belonging to group uucp because /usr/bin/minicom isn't installed
sgid uucp by default. Changing this to 2755 root.uucp (manually
and in /etc/permissions) doesn't show any defective behaviour
either.
- xlockmore: After a review of the relevant part of xlock's code
we've found that the format string parsing bug posted by
bind(a)SUBTERRAIN.NET on bugtraq on August 15th 2000 is not
critical wrt security. xlock drops all privs as soon as it could
get hold of the user's encrypted password (which is before it
crashes). Other encrypted passwords can't be found in xlock's
memory. Since xlock on SuSE distributions runs sgid shadow, it
can't dump a core file upon segmentation fault (search
/usr/src/linux/kernel/sys.c for "dumpable".) and also can't be
traced (/usr/src/linux/arch/i386/kernel/ptrace.c).
The bug will be fixed in future releases of the SuSE Linux
distribution.
The following packages are not contained in SuSE distributions.
Therefore, they do not impose any security risks on SuSE systems
unless an administrator installed (compiled) the vulnerable
software by hand.
- FlagShip permissions, from Narrow <nss(a)privacyx.com> on bugtraq dated
10 Aug 2000
- VariCAD permissions with RedHat 6.0, from Narrow <nss(a)privacyx.com>
on bugtraq dated 10 Aug 2000
- usermode, from Connectiva on bugtraq, dated 2000-08-10
- gopherd 2.x, from Mike Schiffman <michael.schiffman(a)guardent.com>
(guardent) on bugtraq, dated 10 Aug 2000, + Chris Sharp
<v9(a)FAKEHALO.ORG> on bugtraq dated 20 Aug 2000.
- diskcheck perl script, Connectiva sec. adv. on bugtraq dated
2000-08-10
- Statistics Server 5.02x, overflow, from |Zan <izan(a)DEEPZONE.ORG> on
bugtraq, dated 10 Aug 2000
- Helix GNOME Updater (helix-update), versions 0.1 through 0.5, from
HELIX CODE, INC., on bugtraq, dated 20 Aug 2000
- Darxite overflows, from Guido Bakker <guidob(a)MAINNET.NL> on bugtraq,
dated 21 Aug 2000
- Gnome-Lokkit ports left exposed, from Alan Cox
<alan(a)LXORGUK.UKUU.ORG.UK> on bugtraq dated 19 Aug 2000
______________________________________________________________________________
3) standard appendix:
SuSE runs two security mailing lists to which any interested party may
subscribe:
suse-security(a)suse.com
- general/linux/SuSE security discussion.
All SuSE security announcements are sent to this list.
To subscribe, send an email to
<suse-security-subscribe(a)suse.com>.
suse-security-announce(a)suse.com
- SuSE's announce-only mailing list.
Only SuSE's security annoucements are sent to this list.
To subscribe, send an email to
<suse-security-announce-subscribe(a)suse.com>.
For general information or the frequently asked questions (faq)
send mail to:
<suse-security-info(a)suse.com> or
<suse-security-faq(a)suse.com> respectively.
===============================================
SuSE's security contact is <security(a)suse.com>.
===============================================
Regards,
Roman Drahtmüller.
- - --
- -
| Roman Drahtmüller <draht(a)suse.de> // "Caution: Cape does |
SuSE GmbH - Security Phone: // not enable user to fly."
| Nürnberg, Germany +49-911-740530 // (Batman Costume warning label) |
- -
______________________________________________________________________________
The information in this advisory may be distributed or reproduced,
provided that the advisory is not modified in any way.
SuSE GmbH makes no warranties of any kind whatsoever with respect
to the information contained in this security advisory.
Type Bits/KeyID Date User ID
pub 2048/3D25D3D9 1999/03/06 SuSE Security Team <security(a)suse.de>
- -----BEGIN PGP PUBLIC KEY BLOCK-----
Version: 2.6.3i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=pIeS
- -----END PGP PUBLIC KEY BLOCK-----
-----BEGIN PGP SIGNATURE-----
Version: 2.6.3i
Charset: noconv
iQEVAwUBOaMtk3ey5gA9JdPZAQECJAf/eWj7H2yFpHj2Rl812BmXD26brkI7wKCR
NoxhboH2XcHxxOLK2A1gmFjde5lm9g7iatdytOLYiczz0QqigLgMkqeXGGRxmL6a
ODWM+qdHOzIJ+f6G+DsECtYiH+Ez7O1tkuXfFxhW0457dp6o4Vngs2ykF5ITX3Af
i0F9KJwb7P7ZNyhQ+q8jwLpts58cCAoyAASVy3vRzGNYFggoj4reXf82Bo+cbYpE
+0jd9UpBtkVUACWdf3HaXcVaq7SyVnuNAsXIbSz/5XvH54WJLggmUV0sn+siy/lF
gIe/68wtuAJI27LeDcIrskzxFBNs4L5+/QmDqGI1slIM+CtrWbRPBw==
=t7fJ
-----END PGP SIGNATURE-----
1
1
-----BEGIN PGP SIGNED MESSAGE-----
______________________________________________________________________________
SuSE Security Announcement
Package: perl, all versions
Date: Thursday, August 10th, 2000
Affected SuSE versions: 6.0-6.4, 7.0
Vulnerability Type: local root compromise
Severity (1-10): 5
SuSE default package: yes, but not configured exploitable.
Other affected systems: all linux systems using this package
Content of this advisory:
1) security vulnerability resolved: suidperl (local root compromise)
problem description, discussion, solution and upgrade information
2) pending vulnerabilities, temporary workarounds
(Netscape)
3) standard appendix (further information)
<p>______________________________________________________________________________
1) problem description, brief discussion, solution, upgrade information
suidperl is the perl interpreter for suid perl scripts, a part of the
perl package. A maliciously implemented feature causes the interpreter
to spawn the /bin/mail program to inform the superuser of its usage,
thereby passing on untrusted environment that causes /bin/mail to
execute arbitrary commands as user root.
SuSE distributions are not susceptible to this problem because
/usr/bin/suidperl is mode 755 (not suid) by default. Administrators
must explicitly have enabled suidperl by changing the permission modes
of the interpreter to 4755 root.root (suid root) for the exploit
mechanism to work.
In SuSE-Linux, activating suidperl is done by changing one of the
files /etc/permissions.(easy|secure) and running SuSEconfig or
`chkstat -set /etc/permissions.(easy|secure)', alternatively,
depending on the setting of PERMISSION_SECURITY in /etc/rc.config.
If SuSEconfig is turned off completely, the administrator of the
system is obliged to change the permission modes by hand.
The decision to not activate suidperl has been made because
security problems were expected in the wild.
O/S vendors have provided updated packages for both suidperl and
mailx, the package containing /bin/mail. Basically, /bin/mail's
fetures are not the origin of the security hole because the
hostile environment is passed on by the suidperl interpreter,
despite the fact that the interpreter runs suid root.
Note: The upcoming SuSE-7.0 distribution _is_ vulnerable to the
problem of this advisory if /usr/bin/suidperl is setuid root.
However, suidperl is installed with mode 755 after the
installation like in older SuSE Linux distributions and
therefore can't be exploited without prior manual activation
of suidperl by the system administrator.
SuSE provides an updated package for the vulnerable software. It is
strongly recommended to upgrade to the latest version found on our
ftp server as described below. The package removes the mail
notification and uses the syslog facility (priority warning) instead.
Chose one of the following paths to download the package from our
ftp server and install the package with the command `rpm -Fhv file.rpm'.
The md5sum for each file is in the line below.
You can verify the integrity of the rpm files using the command
`rpm --checksig --nogpg file.rpm', independently from the md5
signatures below.
i386 Intel Platform:
SuSE-7.0
ftp://ftp.suse.com/pub/suse/i386/update/7.0/a1/perl.rpm
01c855f752b835536403c7bcc74d8114
source rpm:
ftp://ftp.suse.com/pub/suse/i386/update/7.0/zq1/perl.spm
16c850efed03cc5bd5b9bff3910dd6e4
SuSE-6.4
ftp://ftp.suse.com/pub/suse/i386/update/6.4/a1/perl.rpm
0640e11ba0b87f0d8a01b4b5dedbb8eb
source rpm:
ftp://ftp.suse.com/pub/suse/i386/update/6.4/zq1/perl.spm
a68ade45a65e73805b2276ad35266d46
SuSE-6.3
ftp://ftp.suse.com/pub/suse/i386/update/6.3/a1/perl.rpm
7a3c2adae0c556a7ccb647eaca34e6c7
source rpm:
ftp://ftp.suse.com/pub/suse/i386/update/6.3/zq1/perl.spm
6bc207d360a1349f8f8067a83061f848
SuSE-6.2
ftp://ftp.suse.com/pub/suse/i386/update/6.2/a1/perl.rpm
6403b21d3795def485ad4a577a38c3be
source rpm:
ftp://ftp.suse.com/pub/suse/i386/update/6.2/zq1/perl.spm
47760a9798dc1489ca9fd2ee3a1756f6
SuSE-6.1
ftp://ftp.suse.com/pub/suse/i386/update/6.1/a1/perl.rpm
ac14b4fccfb10e5465f377b095621730
source rpm:
ftp://ftp.suse.com/pub/suse/i386/update/6.1/zq1/perl.spm
7d3aec7879fabcac3d2b7e4996340c31
AXP Alpha Platform:
SuSE-6.4
ftp://ftp.suse.com/pub/suse/axp/update/6.4/a1/perl.rpm
47853649c4683748558dbb72f759d739
source rpm:
ftp://ftp.suse.com/pub/suse/axp/update/6.4/zq1/perl.spm
5949a68b6126afdca98224cd6ed4be74
SuSE-6.3
ftp://ftp.suse.com/pub/suse/axp/update/6.3/a1/perl.rpm
994804e426adf718df64162c92a1ce84
source rpm:
ftp://ftp.suse.com/pub/suse/axp/update/6.3/zq1/perl.spm
879238a9e443bbe32cc4d421ed9a5d28
SuSE-6.1
ftp://ftp.suse.com/pub/suse/axp/update/6.1/a1/perl.rpm
cf2d763fb562a75395c5e613704cbd10
source rpm:
ftp://ftp.suse.com/pub/suse/axp/update/6.1/zq1/perl.spm
e0aa5d0c91f474592e56eed2a8b3fae0
PPC Power PC Platform:
SuSE-6.4
ftp://ftp.suse.com/pub/suse/ppc/update/6.4/a1/perl.rpm
828a210ef2b3aa462161010d4d19416a
source rpm:
ftp://ftp.suse.com/pub/suse/ppc/update/6.4/zq1/perl.spm
9253498d7c474ad2e9f8dabe576d2c96
______________________________________________________________________________
2) Pending vulnerabilities in SuSE Distributions and Workarounds
This section addresses currently known vulnerabilities in Linux/Unix
systems that have not been resolved up to the release date of this
advisory.
- Netscape, versions from 3.0 to 4.73:
The latest version of Netscape is currently being tested. SuSE
Netscape rpms contain efficient workarounds against some "morbid"
properties of Netscape in order to provide stable packages.
These additions are being reworked right now.
Also, cryprographical software export regulations require us to
wait for the permission to redistribute the netscape package from
our US-American ftp server.
There are currently two known vulnerabilities in Netscape versions
from 3.0 to 4.73:
a) a buffer overflow in the jpeg image handling code
b) a security flaw in Netscape's Java implementation
a) has been fixed in Netscape version 4.74. Updated packages
from SuSE will follow very soon.
Temporary fix/workaround:
problem a) Turn off automatic image loading and do not
click on images to trigger the download. This may
be a fairly unsatisfying solution.
problem b) Turn off Java and JavaScript.
- ntop
ntop is a network statistics visualization utility which offers
graphical analysis of network traffic and other statistics with
a web browser. By default, ntop listens on port 3000 and requires
no or a commonly known authentication password to view the data.
ntop is only installed in network server selections and is not
activated by default in SuSE Linux installations.
The ntop packages shipped with SuSE Linux did not exhibit the
unsafe behaviour when a file like /../../etc/passwd is referenced.
______________________________________________________________________________
3) standard appendix:
SuSE runs two security mailing lists to which any interested party may
subscribe:
suse-security(a)suse.com
- general/linux/SuSE security discussion.
All SuSE security announcements are sent to this list.
To subscribe, send an email to
<suse-security-subscribe(a)suse.com>.
suse-security-announce(a)suse.com
- SuSE's announce-only mailing list.
Only SuSE's security annoucements are sent to this list.
To subscribe, send an email to
<suse-security-announce-subscribe(a)suse.com>.
For general information or the frequently asked questions (faq)
send mail to:
<suse-security-info(a)suse.com> or
<suse-security-faq(a)suse.com> respectively.
===============================================
SuSE's security contact is <security(a)suse.com>.
===============================================
Regards,
Roman Drahtmüller.
- --
- -
| Roman Drahtmüller <draht(a)suse.de> // "Caution: Cape does |
SuSE GmbH - Security Phone: // not enable user to fly."
| Nürnberg, Germany +49-911-740530 // (Batman Costume warning label) |
- -
______________________________________________________________________________
The information in this advisory may be distributed or reproduced,
provided that the advisory is not modified in any way.
SuSE GmbH makes no warranties of any kind whatsoever with respect
to the information contained in this security advisory.
Type Bits/KeyID Date User ID
pub 2048/3D25D3D9 1999/03/06 SuSE Security Team <security(a)suse.de>
- -----BEGIN PGP PUBLIC KEY BLOCK-----
Version: 2.6.3i
mQENAzbhLQQAAAEIAKAkXHe0lWRBXLpn38hMHy03F0I4Sszmoc8aaKJrhfhyMlOA
BqvklPLE2f9UrI4Xc860gH79ZREwAgPt0pi6+SleNFLNcNFAuuHMLQOOsaMFatbz
JR9i4m/lf6q929YROu5zB48rBAlcfTm+IBbijaEdnqpwGib45wE/Cfy6FAttBHQh
1Kp+r/jPbf1mYAvljUfHKuvbg8t2EIQz/5yGp+n5trn9pElfQO2cRBq8LFpf1l+U
P7EKjFmlOq+Gs/fF98/dP3DfniSd78LQPq5vp8RL8nr/o2i7jkAQ33m4f1wOBWd+
cZovrKXYlXiR+Bf7m2hpZo+/sAzhd7LmAD0l09kABRG0JVN1U0UgU2VjdXJpdHkg
VGVhbSA8c2VjdXJpdHlAc3VzZS5kZT6JARUDBRA24S1H5Fiyh7HKPEUBAVcOB/9b
yHYji1/+4Xc2GhvXK0FSJN0MGgeXgW47yxDL7gmR4mNgjlIOUHZj0PEpVjWepOJ7
tQS3L9oP6cpj1Fj/XxuLbkp5VCQ61hpt54coQAvYrnT9rtWEGN+xmwejT1WmYmDJ
xG+EGBXKr+XP69oIUl1E2JO3rXeklulgjqRKos4cdXKgyjWZ7CP9V9daRXDtje63
Om8gwSdU/nCvhdRIWp/Vwbf7Ia8iZr9OJ5YuQl0DBG4qmGDDrvImgPAFkYFzwlqo
choXFQ9y0YVCV41DnR+GYhwl2qBd81T8aXhihEGPIgaw3g8gd8B5o6mPVgl+nJqI
BkEYGBusiag2pS6qwznZiQEVAwUQNuEtBHey5gA9JdPZAQFtOAf+KVh939b0J94u
v/kpg4xs1LthlhquhbHcKNoVTNspugiC3qMPyvSX4XcBr2PC0cVkS4Z9PY9iCfT+
x9WM96g39dAF+le2CCx7XISk9XXJ4ApEy5g4AuK7NYgAJd39PPbERgWnxjxir9g0
Ix30dS30bW39D+3NPU5Ho9TD/B7UDFvYT5AWHl3MGwo3a1RhTs6sfgL7yQ3U+mvq
MkTExZb5mfN1FeaYKMopoI4VpzNVeGxQWIz67VjJHVyUlF20ekOz4kWVgsxkc8G2
saqZd6yv2EwqYTi8BDAduweP33KrQc4KDDommQNDOXxaKOeCoESIdM4p7Esdjq1o
L0oixF12Cg==
=pIeS
- -----END PGP PUBLIC KEY BLOCK-----
-----BEGIN PGP SIGNATURE-----
Version: 2.6.3i
Charset: noconv
iQEVAwUBOZKEsXey5gA9JdPZAQFC7QgAlEgNyaJD76ACM/at0kHGPwNTby2P3gr4
Z8eQwoQ6N4CCh6BaJV+3AWRx0EELOu+vJ4mD6HMwTZDYS5GKxsvquz3ZD7ygLYDS
RZnj9INehSp+LRdznqzE8LO0lHY3hy7budshTT4tLBrL90Ic6K3r76NokSH8Td6W
AJVXtDyzxfCUx5h8grrmalVAJVh9kqdwls8X0o+Vco3fGl1vYrQxz4tx9JQQ2Uuf
G4NNuD5fxs5fvYzpM5cpUggvbugTVzUQ+4eecGoE2A2pZWkLEtX8Dcogh08LOW7B
tydQ8ZCOEJP0mqLtX2tFjpuZZNjUHbqiVtufVstIGUW1vw/dccDAaw==
=DQ80
-----END PGP SIGNATURE-----
1
0
-----BEGIN PGP SIGNED MESSAGE-----
______________________________________________________________________________
SuSE Security Announcement
Package: knfsd, all versions
Date: Thursday, August 10th, 2000
Affected SuSE versions: 6.1-6.4
Vulnerability Type: remote root compromise
Severity (1-10): 9
SuSE default package: yes
Other affected systems: all linux systems using this package
Content of this advisory:
1) security vulnerability resolved: knfsd (remote root compromise)
problem description, discussion, solution and upgrade information
2) pending vulnerabilities, temporary workarounds
(Netscape, suidperl)
3) standard appendix (further information)
<p>______________________________________________________________________________
1) problem description, brief discussion, solution, upgrade information
Due to incorrect string parsing in the code, a remote attacker could
gain root priviledges on the machine running the vulnerable rpc.kstatd.
The rpc.kstatd daemon contained in the package linuxnfs (SuSE-6.1, 6.2)
or knfsd (SuSE-6.3, 6.4) is used by the NFS file locking service to
implement lock recovery when the NFS server crashes or reboots.
The network status monitor as shipped with SuSE distributions including
and following SuSE-6.1 is called `rpc.kstatd' in order not to confuse
it with the `rpc.rstatd', the kernel statistics server that comes with
SuSE, too (See manual pages for rpc.kstatd and rpc.rstatd). Other
distributors might use the term `rpc.statd'.
Note: The upcoming SuSE-7.0 distribution is _not_ vulnerable to the
problem with rpc.kstatd.
SuSE provides updated packages for the vulnerable software. It is
strongly recommended to upgrade to the latest version found on our
ftp server as described below.
For the kernel-based NFS server to operate properly, it is strongly
recommended to upgrade to the latest kernel version as announced in
http://www.suse.de/de/support/security/suse_security_announce_54.txt .
Chose one of the following paths to download the package from our
ftp server and install the package with the command `rpm -Fhv file.rpm'.
The md5sum for each file is in the line below.
You can verify the integrity of the rpm files using the command
`rpm --checksig --nogpg file.rpm', independently from the md5
signatures below.
i386 Intel Platform:
SuSE-6.4 (package name is knfsd!):
ftp://ftp.suse.com/pub/suse/i386/update/6.4/n1/knfsd.rpm
1a7214f921ebeea7bbcfce8187e7ba65
source rpm:
ftp://ftp.suse.com/pub/suse/i386/update/6.4/zq1/knfsd.spm
fa4bb28382515648f1c667cbbc019695
SuSE-6.3 (package name is knfsd!):
ftp://ftp.suse.com/pub/suse/i386/update/6.3/n1/knfsd.rpm
9425557d97676df139c3b3cfbcbfb686
source rpm:
ftp://ftp.suse.com/pub/suse/i386/update/6.3/zq1/knfsd.spm
1d4f69b00eedee3530cbd14ede55b985
SuSE-6.2 (package name is linuxnfs!):
ftp://ftp.suse.com/pub/suse/i386/update/6.2/n1/linuxnfs.rpm
c4fbbcbdac7c8640b8ff92643e666ea2
source rpm:
ftp://ftp.suse.com/pub/suse/i386/update/6.2/zq1/linuxnfs.spm
7a006bcc0a8132e8a35e43c087edd493
SuSE-6.1 (package name is linuxnfs!):
ftp://ftp.suse.com/pub/suse/i386/update/6.1/n1/linuxnfs.rpm
e4ae4db716613a94d7f5a2acc5f4ee05
source rpm:
ftp://ftp.suse.com/pub/suse/i386/update/6.1/zq1/linuxnfs.spm
879318dd2985fc29d879691044ccc982
AXP Alpha Platform:
SuSE-6.4 (package name is knfsd!):
ftp://ftp.suse.com/pub/suse/axp/update/6.4/n1/knfsd.rpm
6596ee4207f3f03b570a872af714a263
source rpm:
ftp://ftp.suse.com/pub/suse/axp/update/6.4/zq1/knfsd.spm
14d8c202a1d136e7d88ae02e428925a1
SuSE-6.3 (package name is knfsd!):
ftp://ftp.suse.com/pub/suse/axp/update/6.3/n1/knfsd.rpm
728896064200e3fe2e303eba3246a295
source rpm:
ftp://ftp.suse.com/pub/suse/axp/update/6.3/zq1/knfsd.spm
6e755c651af95c4f8fd05138a373e8f3
SuSE-6.1 (package name is linuxnfs!):
ftp://ftp.suse.com/pub/suse/axp/update/6.1/n1/linuxnfs.rpm
589a11bd867608cb00c93f4b91ba6dce
source rpm:
ftp://ftp.suse.com/pub/suse/axp/update/6.1/zq1/linuxnfs.spm
8196c617e9585a4906407bf666055508
PPC Power PC Platform:
SuSE-6.4 (package name is knfsd!):
ftp://ftp.suse.com/pub/suse/ppc/update/6.4/n1/knfsd.rpm
52d64f1104530dac74ab03c508aa2ff4
source rpm:
ftp://ftp.suse.com/pub/suse/ppc/update/6.4/zq1/knfsd.spm
5cdff95c21484fe01552a0ed80252adc
______________________________________________________________________________
2) Pending vulnerabilities in SuSE Distributions and Workarounds
This section addresses currently known vulnerabilities in Linux/Unix
systems that have not been resolved up to the release date of this
advisory.
- Netscape, versions from 3.0 to 4.73:
The latest version of Netscape is currently being tested. SuSE
Netscape rpms contain efficient workarounds against some "morbid"
properties of Netscape in order to provide stable packages.
These additions are being reworked right now.
Also, cryprographical software export regulations require us to
wait for the permission to redistribute the netscape package from
our US-American ftp server.
There are currently two known vulnerabilities in Netscape versions
from 3.0 to 4.73:
a) a buffer overflow in the jpeg image handling code
b) a security flaw in Netscape's Java implementation
a) has been fixed in Netscape version 4.74. Updated packages
from SuSE will follow soon.
Temporary fix/workaround:
problem a) Turn off automatic image loading and do not
click on images to trigger the download.
problem b) Turn off Java and JavaScript.
<p> - suidperl
The /usr/bin/suidperl perl interpreter in the SuSE Distributions
has file permissions 755 by default. If the admin of a SuSE Linux
system did not change the permission modes and/or the respective
entry in /etc/permissions*, the SuSE Linux system is not vulnerable
to the attack as published on bugtraq.
An advisory announcing updated suidperl packages follows this
announcement on the way to the mailing lists. Further details will
be discussed therein.
Temporary fix/workaround:
chmod -s /usr/bin/suidperl # this is the default.
<p>______________________________________________________________________________
3) standard appendix:
SuSE runs two security mailing lists to which any interested party may
subscribe:
suse-security(a)suse.com
- general/linux/SuSE security discussion.
All SuSE security announcements are sent to this list.
To subscribe, send an email to
<suse-security-subscribe(a)suse.com>.
suse-security-announce(a)suse.com
- SuSE's announce-only mailing list.
Only SuSE's security annoucements are sent to this list.
To subscribe, send an email to
<suse-security-announce-subscribe(a)suse.com>.
For general information or the frequently asked questions (faq)
send mail to:
<suse-security-info(a)suse.com> or
<suse-security-faq(a)suse.com> respectively.
===============================================
SuSE's security contact is <security(a)suse.com>.
===============================================
<p>Regards,
Roman Drahtmüller.
- --
- -
| Roman Drahtmüller <draht(a)suse.de> // "Caution: Cape does |
SuSE GmbH - Security Phone: // not enable user to fly."
| Nürnberg, Germany +49-911-740530 // (Batman Costume warning label) |
- -
______________________________________________________________________________
The information in this advisory may be distributed or reproduced,
provided that the advisory is not modified in any way.
SuSE GmbH makes no warranties of any kind whatsoever with respect
to the information contained in this security advisory.
<p>Type Bits/KeyID Date User ID
pub 2048/3D25D3D9 1999/03/06 SuSE Security Team <security(a)suse.de>
- -----BEGIN PGP PUBLIC KEY BLOCK-----
Version: 2.6.3i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=pIeS
- -----END PGP PUBLIC KEY BLOCK-----
-----BEGIN PGP SIGNATURE-----
Version: 2.6.3i
Charset: noconv
iQEVAwUBOZKEqHey5gA9JdPZAQF6qwf7Bg+FyrocbRBGDA1fpA48D29/jTbZhPDJ
eVSZiYJvUdr1S3FfgqOVwe5TEjeazC3qdUoUdP4LS7SYJikZiYhKESuFjqgg8x1d
0OmX2+EH9v/ji6kKMOh9Ad8lpZ+b70UUe39/Hp1HGKxtTEPdWkaiulD5PCwo3FIf
XiaXB00cFxGz997I3ttGXJp0VHJYubZFpy3atDk/bNd2SQzmol+GI9O2vwKZhraX
dzf1bPZ4z488GmH/Y1KeJ0z4yHqN4Hn3xtXWF6VG6GC4IGjDGXKxLbXeZPlJzu4g
Um25GSBedkwAYgRxqfJgJK1i9kUhS3E5zHzlwwJc8CfCjAPDG75Phg==
=RH2l
-----END PGP SIGNATURE-----
1
0
-----BEGIN PGP SIGNED MESSAGE-----
August 3rd, 2000
This notice addresses the latest security advisories from various
Linux Vendors as well as private contributors.
The list of packages:
netscape
knfsd
system user account nobody
pam_console
gpm
openldap
mailman
cvsweb.cgi
kon2
<p>There will be SuSE Security Announcements for the packages where work is
in progress as indicated in the respective section below.
<p><p>* jpeg buffer overflows in netscape:
The latest version of netscape is currently being tested. SuSE netscape
rpms contain efficient workarounds against some "morbid" properties of
netscape - it is necessary to provide stable packages. These additions
are being reworked right now.
_________________________________________________________________________
* rpc.kstatd
The SuSE package containing rpc.kstatd (other vendors named it
rpc.statd) is called knfsd.rpm. An updated package is currently
being tested.
_________________________________________________________________________
* user `nobody's HOME directory set to / and misconfigured webservers:
SuSE Linux used to have user nobody's HOME directory set to /tmp for
years. Starting with SuSE-7.0, it will be set to /var/lib/nobody .
Apache, as distributed with SuSE, is configured `UserDir public_html'
and is therefore not vulnerable for the http://machine/~nobody/-problem.
However, we encourage admins to change this user's home using the
commands
mkdir -p /var/lib/nobody
chown nobody.nogroup /var/lib/nobody
usermod -d /var/lib/nobody
Make sure that you move files belonging to user nobody from the former
location to the new home and that you don't rely on the old absolute
path in your scripts.
_________________________________________________________________________
* problems around pam_console:
SuSE Linux does not contain the said pam-module because it isn't
included in the official pam release. The idea of it is intriguing, but
we have decided not to include the module into the distribution as a
consequence of the problems that accompany its use.
See Linux-Mandrake Security Update Advisory ID MDKSA-2000:029.
_________________________________________________________________________
* gpm DoS, setgid() return value:
We ship a slightly older version of gpm because of some grief with the
latest versions. The vulnerabilities in gpm have been addressed to the
fully necessary extent back in April 5.
As mentioned above, there is no pam_console module that could change the
ownerships of the gpm control socket /dev/gpmctl. By consequence, a
local denial of service attack against gpm is possible. However, we
believe that the most effective measure against this is userdel(8),
since hogging disk space/performance, CPU, bandwidth etc is still
possible in the wild even with appropriate permissions on the gpm
socket.
_________________________________________________________________________
* modes of openldap package files:
The files are installed 755 or 644.
There is no problem with this package in SuSE-Linux.
_________________________________________________________________________
* mailman problem
cvsweb.cgi (TurboLinux Advisory ID#: TLSA2000016-1):
kon2 (Linux-Mandrake Security Update Advisory ID: MDKSA-2000:028)
SuSE-Linux either does not contain these packages or the files therein
causing the publically announced security vulnerabilities.
_________________________________________________________________________
<p><p>Regards,
Roman Drahtmüller.
- --
- -
| Roman Drahtmüller <draht(a)suse.de> // "Caution: Cape does |
SuSE GmbH - Security Phone: // not enable user to fly."
| Nürnberg, Germany +49-911-740530 // (Batman Costume warning label) |
- -
Type Bits/KeyID Date User ID
pub 2048/3D25D3D9 1999/03/06 SuSE Security Team <security(a)suse.de>
- -----BEGIN PGP PUBLIC KEY BLOCK-----
Version: 2.6.3i
mQENAzbhLQQAAAEIAKAkXHe0lWRBXLpn38hMHy03F0I4Sszmoc8aaKJrhfhyMlOA
BqvklPLE2f9UrI4Xc860gH79ZREwAgPt0pi6+SleNFLNcNFAuuHMLQOOsaMFatbz
JR9i4m/lf6q929YROu5zB48rBAlcfTm+IBbijaEdnqpwGib45wE/Cfy6FAttBHQh
1Kp+r/jPbf1mYAvljUfHKuvbg8t2EIQz/5yGp+n5trn9pElfQO2cRBq8LFpf1l+U
P7EKjFmlOq+Gs/fF98/dP3DfniSd78LQPq5vp8RL8nr/o2i7jkAQ33m4f1wOBWd+
cZovrKXYlXiR+Bf7m2hpZo+/sAzhd7LmAD0l09kABRG0JVN1U0UgU2VjdXJpdHkg
VGVhbSA8c2VjdXJpdHlAc3VzZS5kZT6JARUDBRA24S1H5Fiyh7HKPEUBAVcOB/9b
yHYji1/+4Xc2GhvXK0FSJN0MGgeXgW47yxDL7gmR4mNgjlIOUHZj0PEpVjWepOJ7
tQS3L9oP6cpj1Fj/XxuLbkp5VCQ61hpt54coQAvYrnT9rtWEGN+xmwejT1WmYmDJ
xG+EGBXKr+XP69oIUl1E2JO3rXeklulgjqRKos4cdXKgyjWZ7CP9V9daRXDtje63
Om8gwSdU/nCvhdRIWp/Vwbf7Ia8iZr9OJ5YuQl0DBG4qmGDDrvImgPAFkYFzwlqo
choXFQ9y0YVCV41DnR+GYhwl2qBd81T8aXhihEGPIgaw3g8gd8B5o6mPVgl+nJqI
BkEYGBusiag2pS6qwznZiQEVAwUQNuEtBHey5gA9JdPZAQFtOAf+KVh939b0J94u
v/kpg4xs1LthlhquhbHcKNoVTNspugiC3qMPyvSX4XcBr2PC0cVkS4Z9PY9iCfT+
x9WM96g39dAF+le2CCx7XISk9XXJ4ApEy5g4AuK7NYgAJd39PPbERgWnxjxir9g0
Ix30dS30bW39D+3NPU5Ho9TD/B7UDFvYT5AWHl3MGwo3a1RhTs6sfgL7yQ3U+mvq
MkTExZb5mfN1FeaYKMopoI4VpzNVeGxQWIz67VjJHVyUlF20ekOz4kWVgsxkc8G2
saqZd6yv2EwqYTi8BDAduweP33KrQc4KDDommQNDOXxaKOeCoESIdM4p7Esdjq1o
L0oixF12Cg==
=pIeS
- -----END PGP PUBLIC KEY BLOCK-----
-----BEGIN PGP SIGNATURE-----
Version: 2.6.3i
Charset: noconv
iQEVAwUBOYnpPney5gA9JdPZAQEUOQf8DKKIHhn7oUvTW5Ol7gww2/aIwXmG2e5c
4iKyQgGoU94YZURlGxRRI5Zf1Yydfj8JrKiUvnwxRCcQF2WWWCWkGNqQkJzt+c00
BiEyU16fklxMV17JeI6zmb9rTrne0JftjAycAPubzYeDpheVDbmPtGvotanRwVUn
j2zaE3uLIBjie2025q8nZnYeTylXua4ulnTW0+PFDZnWgyxCMXvvu/1Lsf715vi6
1M6L78IlYkng5OV4OTeBVY5gm7sdy3eg/CQ/FiEHmIDgI33ywRVGQhXqhpp3QOrX
OA7UoIl6xAhNHBEX9lSPwNpfFaTsQrEAWVbihnzFYSLlBz3kxd1jdQ==
=5DM/
-----END PGP SIGNATURE-----
1
0
-----BEGIN PGP SIGNED MESSAGE-----
______________________________________________________________________________
SuSE Security Announcement
Package: nkitb < 2000.7.11-0
Date: Fri Jul 14 14:38:37 CEST 2000
Affected SuSE versions: 6.1-6.4
Vulnerability Type: (possible) remote root compromise
SuSE default package: yes
Other affected systems: all linux systems using this package
______________________________________________________________________________
A security hole was discovered in the package mentioned above.
Please update it as soon as possible or disable the service if you are using
this software on your SuSE Linux installation(s).
Other Linux distributions or operating systems might be affected as
well, please contact your vendor for information about this issue.
Please note that we provide this information on an "as-is" basis only.
There is no warranty whatsoever and no liability for any direct, indirect or
incidental damage arising from this information or the installation of
the update package.
_____________________________________________________________________________
1. Problem Description
The standard ftp server does directly pass untrusted data from a
DNS server to the setproctitle() function in a unsecure manner.
2. Impact
It may be possible for an attacker to modify his/her DNS record
to execute abitrary machine code as root while connecting to
the standard ftp daemon.
3. Solution
Update the package from our FTP server.
______________________________________________________________________________
Please verify these md5 checksums of the updates before installing:
(For SuSE 6.0, please use the 6.1 updates)
AXP:
77ee118ac0790b775c08cecf28b3f5c3 ftp://ftp.suse.com/pub/suse/axp/update/6.3/a1/nkitb-2000.7.11-1.alpha.rpm
5eac90efb3c82a948b7843a8d29b1c65 ftp://ftp.suse.com/pub/suse/axp/update/6.4/a1/nkitb-2000.7.11-0.alpha.rpm
i386:
c85b8c047395f87a61fe7ef1938facd6 ftp://ftp.suse.com/pub/suse/i386/update/6.1/a1/nkitb-2000.7.11-0.i386.rpm
9fec7f48504f7c4134ac1ae78ee99060 ftp://ftp.suse.com/pub/suse/i386/update/6.2/a1/nkitb-2000.7.11-0.i386.rpm
34540a50d4a562b02fbb4bc56f23e1b6 ftp://ftp.suse.com/pub/suse/i386/update/6.3/a1/nkitb-2000.7.11-0.i386.rpm
118075b7fc295be86b3659bf9b3fa778 ftp://ftp.suse.com/pub/suse/i386/update/6.4/a1/nkitb-2000.7.11-0.i386.rpm
PPC:
9ab22ed85cf0efb875c0c4f8fc878c3d ftp://ftp.suse.com/pub/suse/ppc/update/6.3/a1/nkitb-2000.7.11-0.ppc.rpm
61608e1f8e8bd4f20d9f47bea6a70740 ftp://ftp.suse.com/pub/suse/ppc/update/6.4/a1/nkitb-2000.7.11-0.ppc.rpm
______________________________________________________________________________
You can find updates on our ftp-Server:
ftp://ftp.suse.com/pub/suse/i386/update for Intel processors
ftp://ftp.suse.com/pub/suse/axp/update for Alpha processors
or try the following web pages for a list of mirrors:
http://www.suse.de/ftp.html
http://www.suse.com/ftp_new.html
Our webpage for patches:
http://www.suse.de/patches/index.html
Our webpage for security announcements:
http://www.suse.de/security
If you want to report vulnerabilities, please contact
security(a)suse.de
______________________________________________________________________________
SuSE runs two free security mailing list services to which any
interested party may subscribe:
use-security(a)suse.com - moderated and for general/linux/SuSE
security discussions. All SuSE security
announcements are sent to this list.
use-security-announce(a)suse.com - SuSE's announce-only mailing list.
Only SuSE's security annoucements are sent
to this list.
To subscribe to the list, send a message to:
<suse-security-subscribe(a)suse.com>
To remove your address from the list, send a message to:
<suse-security-unsubscribe(a)suse.com>
Send mail to the following for info and FAQ for this list:
<suse-security-info(a)suse.com>
<suse-security-faq(a)suse.com>
_____________________________________________________________________________
This information is provided freely to everyone interested and may
be redistributed provided that it is not altered in any way.
Type Bits/KeyID Date User ID
pub 2048/3D25D3D9 1999/03/06 SuSE Security Team <security(a)suse.de>
- ------BEGIN PGP PUBLIC KEY BLOCK-----
Version: 2.6.3i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=pIeS
- ------END PGP PUBLIC KEY BLOCK-----
-----BEGIN PGP SIGNATURE-----
Version: 2.6.3i
Charset: noconv
iQEVAwUBOXKe1Hey5gA9JdPZAQGmNwf/Tlpj/I+38kI21SiBAzt+ggX9YRFzCjO6
B6/lPpm5BenPwDDusqs3K1a2y1bn2W30dAyuZiC4cWnmoAT0JE3liP1gqvmt6pXS
IY3XfH3qrd6SXpyD9fOfixrGzNTLvzaK+AcOFiZcOBoHXOaLGlmZeS3eu1h8dSwm
3hWoEfVaQuVGCJg/0REnJkD/B+hHCmmld7iMrslbRFvtNCMld/J8UV+aeMwbQUNw
tCxzWzfPckuxdUhBqtkMfNIBH/zaEF3U7idtewgrdXo1TkNCQTCD+qPYwHGo8QM9
6Onaev9bhOLi/Znn/gZsP1f2lfbn4StelWSLrNMs80181RRNt9eMCw==
=nw86
-----END PGP SIGNATURE-----
1
0
-----BEGIN PGP SIGNED MESSAGE-----
______________________________________________________________________________
SuSE Security Announcement
Package: dhclient < 2.0
Date: Tue Jul 11 15:12:22 CEST 2000
Affected SuSE versions: 6.1-6.4
Vulnerability Type: remote root compromise
SuSE default package: no
Other affected systems: all unix systems using this package
______________________________________________________________________________
A security hole was discovered in the package mentioned above.
Please update it as soon as possible or disable the service if you are using
this software on your SuSE Linux installation(s).
Other Linux distributions or operating systems might be affected as
well, please contact your vendor for information about this issue.
Please note that we provide this information on an "as-is" basis only.
There is no warranty whatsoever and no liability for any direct, indirect or
incidental damage arising from this information or the installation of
the update package.
_____________________________________________________________________________
1. Problem Description
The client side program of the ISC DHCP package, dhclient,
does not do quoting of server messages before passing them to
/sbin/dhclient-script. This script is executed with root privileges.
2. Impact
Dhclient could be tricked by a rogue DHCP server to execute commands
as user root.
This leads to a remote root compromise of the system using dhclient.
3. Solution
Update the package from our FTP server.
______________________________________________________________________________
Please verify these md5 checksums of the updates before installing:
(For SuSE 6.0, please use the 6.1 updates)
AXP:
262677203e3b1dada23e65ae60d08264 ftp://ftp.suse.com/pub/suse/axp/update/6.3/n1/dhclient-2.0pl2-3.alpha.rpm
910097426b5771c82abf8f323086b5ba ftp://ftp.suse.com/pub/suse/axp/update/6.4/n1/dhclient-2.0pl2-3.alpha.rpm
<p>i386:
300a7c8220d3b9f65a2aef3ed4fdb7b3 ftp://ftp.suse.com/pub/suse/i386/update/6.1/n1/dhclient-2.0pl2-3.i386.rpm
7be68cd54e7fd3766b7eb36fc2e854c5 ftp://ftp.suse.com/pub/suse/i386/update/6.2/n1/dhclient-2.0pl2-3.i386.rpm
44fad0cee0cb53627ed7c507077d5d2b ftp://ftp.suse.com/pub/suse/i386/update/6.3/n1/dhclient-2.0pl2-3.i386.rpm
320d4414841e29bd08584fc5d8592d99 ftp://ftp.suse.com/pub/suse/i386/update/6.4/n1/dhclient-2.0pl2-3.i386.rpm
<p>PPC:
a8a19501e4821ab6c7b375972eb1e5ce ftp://ftp.suse.com/pub/suse/ppc/update/6.3/n1/dhclient-2.0pl2-3.ppc.rpm
b4ea052ba25b10586cc14f6fea5b2d9f ftp://ftp.suse.com/pub/suse/ppc/update/6.4/n1/dhclient-2.0pl2-3.ppc.rpm
______________________________________________________________________________
You can find updates on our ftp-Server:
ftp://ftp.suse.com/pub/suse/i386/update for Intel processors
ftp://ftp.suse.com/pub/suse/axp/update for Alpha processors
or try the following web pages for a list of mirrors:
http://www.suse.de/ftp.html
http://www.suse.com/ftp_new.html
Our webpage for patches:
http://www.suse.de/patches/index.html
Our webpage for security announcements:
http://www.suse.de/security
If you want to report vulnerabilities, please contact
security(a)suse.de
______________________________________________________________________________
SuSE has got two free security mailing list services to which any
interested party may subscribe:
use-security(a)suse.com - moderated and for general/linux/SuSE
security discussions. All SuSE security
announcements are sent to this list.
use-security-announce(a)suse.com - SuSE's announce-only mailing list.
Only SuSE's security annoucements are sent
to this list.
To subscribe to the list, send a message to:
<suse-security-subscribe(a)suse.com>
To remove your address from the list, send a message to:
<suse-security-unsubscribe(a)suse.com>
Send mail to the following for info and FAQ for this list:
<suse-security-info(a)suse.com>
<suse-security-faq(a)suse.com>
_____________________________________________________________________________
This information is provided freely to everyone interested and may
be redistributed provided that it is not altered in any way.
Type Bits/KeyID Date User ID
pub 2048/3D25D3D9 1999/03/06 SuSE Security Team <security(a)suse.de>
- ------BEGIN PGP PUBLIC KEY BLOCK-----
Version: 2.6.3i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=pIeS
- ------END PGP PUBLIC KEY BLOCK-----
-----BEGIN PGP SIGNATURE-----
Version: 2.6.3i
Charset: noconv
iQEVAwUBOWsm93ey5gA9JdPZAQHseQf9EfascZdwdTCEgeCVELHPYjERcwQeXcb8
nisoW6eXveVVR1FaVpuX/gUeh5u4WNfyBNMuYQV1p7+0gis5f59vFJ7IxFWV/TLm
h24/bx7TjufPCCFW16Ye1GWrGb5TIVdC6ORYV4A4BY74sByiKazlFbtT9qAtcAjD
kqmbdIFwc1b0rYIREr1WGdwr1tfNVsRUJgKdyAco+miKXGjwM8rGw415A9o1zsrI
OjC3sNeDDQi64uEFyODsr/LZpt06HFu0cNif4RbPi2LEd4UTfE2CNj5WGHq7NeEM
XFjQ9+fp4/m4mngAsM7/RrlHoNQ09lOdmF7Dj8jWJS4r0c2pKuDzaQ==
=ksUb
-----END PGP SIGNATURE-----
1
0