This week, advisories were released for libpam-ldap, ingol, thttpd, php4, phpmyadmin, firefox, screen, Qt, NVIDIA driver, wireshark, kernel, libx11, rpm, jabber, wv, openssh, texinfo, seamonkey, thunderbird, ruby, bind, and imlib2. The distributors include Debian, Fedora, Gentoo, Mandriva, Red Hat, Slackware, and Ubuntu.


Earn an NSA recognized IA Masters Online - The NSA has designated Norwich University a center of Academic Excellence in Information Security. Our program offers unparalleled Infosec management education and the case study affords you unmatched consulting experience. Using interactive e-Learning technology, you can earn this esteemed degree, without disrupting your career or home life.


EnGarde Secure Linux v3.0.10 Now Available

Guardian Digital is happy to announce the release of EnGarde Secure Community 3.0.10 (Version 3.0, Release 10). This release includes several bug fixes and feature enhancements to Guardian Digital WebTool and the SELinux policy, several updated packages, and several new features.

EnGarde Secure Community is a secure distribution of Linux engineered from the ground-up to provide organizations with the level of security required to create a corporate Web presence or even conduct e-business on the Web. It can be used as a Web, DNS, e-mail, database, e-commerce, and general Internet server where security is a primary concern.

  • Guardian Digital WebTool help system. All of the existing WebTool modules now have help -- just roll your mouse pointer over any help-enabled field for assistance. Special thanks to Ankit Patel and Eric Lubow for all their hard work writing the help text.

  • Guardian Digital WebTool SELinux Control Console. This new WebTool module gives you greater control over the SELinux subsystem of EnGarde Secure Linux. With it you may monitor the audit logs, toggle enforcing mode and booleans, download the policy to your local computer, and trigger a relabel of the filesystems.

  • A new SELinux policy boolean: httpd_script_remote. This boolean was added in response to bug #0000093 and grants PHP and CGI scripts to external websites (such as RSS feeds).

  • Major upgrades of apache (from 2.0.59 to 2.2.3), postfix (2.2.11 to 2.3.3), and snort (2.4.5 to 2.6.0.2).

  • The latest stable versions of MySQL (5.0.27), aide (0.12), asterisk (1.2.13), libapache-mod_mono (1.1.18), mod_perl (2.0.2), postgresql (8.1.5), and zaptel (1.2.10).

Guardian Digital Makes Email Safe For Business - Microsoft 365, Goo....


LinuxSecurity.com Feature Extras:

    RFID with Bio-Smart Card in Linux - In this paper, we describe the integration of fingerprint template and RF smart card for clustered network, which is designed on Linux platform and Open source technology to obtain biometrics security. Combination of smart card and biometrics has achieved in two step authentication where smart card authentication is based on a Personal Identification Number (PIN) and the card holder is authenticated using the biometrics template stored in the smart card that is based on the fingerprint verification. The fingerprint verification has to be executed on central host server for security purposes. Protocol designed allows controlling entire parameters of smart security controller like PIN options, Reader delay, real-time clock, alarm option and cardholder access conditions.

    Linux File & Directory Permissions Mistakes - One common mistake Linux administrators make is having file and directory permissions that are far too liberal and allow access beyond that which is needed for proper system operations. A full explanation of unix file permissions is beyond the scope of this article, so I'll assume you are familiar with the usage of such tools as chmod, chown, and chgrp. If you'd like a refresher, one is available right here on linuxsecurity.com.

Take advantage of our Linux Security discussion list! This mailing list is for general security-related questions and comments. To subscribe send an e-mail to This email address is being protected from spambots. You need JavaScript enabled to view it. with "subscribe" as the subject.

Thank you for reading the LinuxSecurity.com weekly security newsletter. The purpose of this document is to provide our readers with a quick summary of each week's most relevant Linux security headline.


Debian: New libpam-ldap packages fix access control bypass
2nd, November, 2006

Updated package.

advisories/debian/debian-new-libpam-ldap-packages-fix-access-control-bypass
Debian: New ingo1 packages fix arbitrary shell command execution
2nd, November, 2006

Updated package.

advisories/debian/debian-new-ingo1-packages-fix-arbitrary-shell-command-execution
Debian: New thttpd packages fix insecure temporary file creation
3rd, November, 2006

Marco d'Itri discovered that thttpd, a small, fast and secure webserver, makes use of insecure temporary files when its logfiles are rotated, which might lead to a denial of service through a symlink attack.

advisories/debian/debian-new-thttpd-packages-fix-insecure-temporary-file-creation-98706
Debian: New php4 packages fix several vulnerabilities
6th, November, 2006

Updated package.

advisories/debian/debian-new-php4-packages-fix-several-vulnerabilities-67618
Debian: New phpmyadmin packages fix several vulnerabilities
9th, November, 2006

The following CVEIDs are addressed: CVE-2006-1678 CVE-2006-2418 CVE-2005-3621 CVE-2005-3665 CVE-2006-5116

advisories/debian/debian-new-phpmyadmin-packages-fix-several-vulnerabilities-72435
EnGarde Secure Community Release Notes 3.0.10
7th, November, 2006

Guardian Digital is happy to announce the release of EnGarde Secure Community 3.0.10

(Version 3.0, Release 10).

For details, visit our new EnGarde Community News and Updates page where you can also learn more about Guardian Digital's plans for EnGarde Secure Linux:

/modules/index/releases/3.0.10.cgi

Fedora Core 5 Update: firefox-1.5.0.8-1.fc5
9th, November, 2006

Mozilla Firefox is an open source Web browser. Several flaws were found in the way Firefox processes certain malformed Javascript code. A malicious web page could cause the execution of Javascript code in such a way that could cause Firefox to crash or execute arbitrary code as the user running Firefox. (CVE-2006-5463, CVE-2006-5747, CVE-2006-5748) Several flaws were found in the way Firefox renders web pages. A malicious web page could cause the browser to crash or possibly execute arbitrary code as the user running Firefox. (CVE-2006-5464) Users of Firefox are advised to upgrade to this update, which contains Firefox version 1.5.0.8 that corrects these issues.

advisories/fedora/fedora-core-5-update-firefox-1508-1fc5-12-16-00-125654
Fedora Extras [3 4 5 6 devel] / 1.2.1-2 [FE 3 4], 1.3.0-3 [FE 5 6 devel]
9th, November, 2006

CVE IDs: CVE-2006-4806, CVE-2006-4807, CVE-2006-4808, CVE-2006-4809 M. Joonas Pihlaja discovered that imlib2 did not sufficiently verify the validity of ARGB, JPG, LBM, PNG, PNM, TGA, and TIFF images. If a user were tricked into viewing or processing a specially crafted image with an application that uses imlib2, the flaws could be exploited to execute arbitrary code with the user's privileges. Fedora Extras versions earlier then the versions mentioned above are vulnerable to this problem, upgrade to fix this vulnerability.

advisories/fedora/fedora-extras-3-4-5-6-devel-121-2-fe-3-4-130-3-fe-5-6-devel-12-16-00-125656
Gentoo: Screen UTF-8 character handling vulnerability
3rd, November, 2006

Screen contains an error in its UTF-8 character handling code that would allow a remote Denial of Service or possibly the remote execution of arbitrary code.

Gentoo: Qt Integer overflow
6th, November, 2006

An integer overflow flaw in the Qt pixmap handling could possibly lead to a Denial of Service or the remote execution of arbitrary code.

Gentoo: NVIDIA binary graphics driver Privilege escalation vulnerability
7th, November, 2006

The NVIDIA binary graphics driver is vulnerable to a local privilege escalation through an X session.

Mandriva: Updated php packages to address buffer overflow issue
3rd, November, 2006

The Hardened-PHP Project discovered buffer overflows in htmlentities/htmlspecialchars internal routines to the PHP Project. Of course the whole purpose of these functions is to be filled with user input. (The overflow can only be when UTF-8 is used) In addition, selected patches backported from php cvs that address other issues that may or may not have security implications have been applied to this release. Updated packages have been patched to correct these issues. Users must restart Apache for the changes to take effect.

Mandriva: Updated wireshark packages fix multiple vulnerabilities
3rd, November, 2006

Vulnerabilities in the HTTP, LDAP, XOT, WBXML, and MIME Multipart dissectors were discovered in versions of wireshark less than 0.99.4, as well as various other bugs. This updated provides wireshark 0.99.4 which is not vulnerable to these issues.

Mandriva: Updated kernel packages fix multiple vulnerabilities and bugs
3rd, November, 2006

Some vulnerabilities were discovered and corrected in the Linux 2.6 kernel.

Mandriva: Updated imlib2 packages fix several vulnerabilities
6th, November, 2006

M Joonas Pihlaja discovered several vulnerabilities in the Imlib2 graphics library.

Mandriva: Updated libx11 packages fix file descriptor leak vulnerability
6th, November, 2006

The Xinput module (modules/im/ximcp/imLcIm.c) in X.Org libX11 1.0.2 and 1.0.3 opens a file for reading twice using the same file descriptor, which causes a file descriptor leak that allows local users to read files specified by the XCOMPOSEFILE environment variable via the duplicate file descriptor.

Mandriva: Updated rpm packages fix vulnerability
7th, November, 2006

A heap-based buffer overflow was discovered in librpm when the LANG or LC_ALL environment variable is set to ru_RU.UTF-8 (and possibly other locales), which could allow for ser-assisted attackers to execute arbitrary code via crafted RPM packages.

Mandriva: Updated jabber package fix SSL support issue
7th, November, 2006

The OpenSSL library was not properly initialized in the jabber SSL support code, which prevented SSL support for incoming client connections on the jabber server. This update corrects this issue.

Mandriva: Updated pam_ldap packages fix PasswordPolicyReponse coding error
7th, November, 2006

Pam_ldap does not return an error condition when an LDAP directory server responds with a PasswordPolicyResponse control response, which causes the pam_authenticate function to return a success code even if authentication has failed, as originally reported for xscreensaver. This might lead to an attacker being able to login into a suspended system account.

Mandriva: Updated imlib2 packages fix several vulnerabilities
7th, November, 2006

M Joonas Pihlaja discovered several vulnerabilities in the Imlib2 graphics library.

Mandriva: Updated wv packages fix vulnerabilities
7th, November, 2006

Multiple integer overflows in the WV library in wvWare (formerly mswordview) before 1.2.3, as used by AbiWord?, KWord, and possibly other products, allow user-assisted remote attackers to execute arbitrary code via a crafted Microsoft Word (DOC) file that produces (1) large LFO clfolvl values in the wvGetLFO_records function or (2) a large LFO nolfo value in the wvGetFLO_PLF function.

Mandriva: Updated openssh packages fix vulnerability
8th, November, 2006

A vulnerability in the privilege separation functionality in OpenSSH was discovered, caused by an incorrect checking for bad signatures in sshd's privsep monitor. As a result, the monitor and the unprivileged process can get out sync. The OpenSSH team indicated that this bug is not known to be exploitable in the abence of additional vulnerabilities.

Mandriva: Updated texinfo packages fix vulnerability
8th, November, 2006

Miloslav Trmac discovered a buffer overflow in texinfo. This issue can cause texi2dvi or texindex to crash when processing a carefully crafted file. Updated packages have been patched to correct this issue.

RedHat: Important: php security update
6th, November, 2006

Updated PHP packages that fix a security issue are now available. This update has been rated as having important security impact by the Red Hat Security Response Team.

advisories/red-hat/redhat-important-php-security-update-98171
RedHat: Critical: firefox security update
8th, November, 2006

Updated firefox packages that fix several security bugs are now available for Red Hat Enterprise Linux 4. This update has been rated as having critical security impact by the Red Hat Security Response Team.

advisories/red-hat/redhat-critical-firefox-security-update-38591
RedHat: Critical: seamonkey security update
8th, November, 2006

Updated seamonkey packages that fix several security bugs are now available for Red Hat Enterprise Linux 2.1, 3, and 4. This update has been rated as having critical security impact by the Red Hat Security Response Team.

advisories/red-hat/redhat-critical-seamonkey-security-update-3241
RedHat: Critical: thunderbird security update
8th, November, 2006

Updated thunderbird packages that fix several security bugs are now available for Red Hat Enterprise Linux 4. This update has been rated as having critical security impact by the Red Hat Security Response Team.

advisories/red-hat/redhat-critical-thunderbird-security-update-41360
RedHat: Moderate: texinfo security update
8th, November, 2006

New Texinfo packages that fix various security vulnerabilities are now available. This update has been rated as having moderate security impact by the Red Hat Security Response Team.

advisories/red-hat/redhat-moderate-texinfo-security-update-RHSA-2006-0727-01
RedHat: Moderate: ruby security update
8th, November, 2006

Updated ruby packages that fix a denial of service issue for the CGI instance are now available. This update has been rated as having moderate security impact by the Red Hat Security Response Team.

advisories/red-hat/redhat-moderate-ruby-security-update-81302
RedHat: Moderate: wireshark security update
9th, November, 2006

New Wireshark packages that fix various security vulnerabilities are now available. This update has been rated as having moderate security impact by the Red Hat Security Response Team.

advisories/red-hat/redhat-moderate-wireshark-security-update-RHSA-2008-0890-01
Slackware: screen
4th, November, 2006

New screen packages are available for Slackware 8.1, 9.0, 9.1, 10.0, 10.1, 10.2, and 11.0 to fix a security issue. More details about this issue may be found in the Common Vulnerabilities and Exposures (CVE) database.

Slackware: php
4th, November, 2006

New php packages are available for Slackware 10.2 and 11.0 to fix security issues. More details about this issue may be found in the Common Vulnerabilities and Exposures (CVE) database.

Slackware: bind
7th, November, 2006

New bind packages are available for Slackware 8.1, 9.0, 9.1, 10.0, 10.1, 10.2, and 11.0 to fix security issues. The minimum OpenSSL version was raised to OpenSSL 0.9.7l and OpenSSL 0.9.8d to avoid exposure to known security flaws in older versions (these patches were already issued for Slackware). If you have not upgraded yet, get those as well to prevent a potentially exploitable security problem in named.

Ubuntu: PHP vulnerability
2nd, November, 2006

Stefan Esser discovered two buffer overflows in the htmlentities() and htmlspecialchars() functions. By supplying specially crafted input to PHP applications which process that input with these functions, a remote attacker could potentially exploit this to execute arbitrary code with the privileges of the application. (CVE-2006-5465) This update also fixes bugs in the chdir() and tempnam() functions, which did not perform proper open_basedir checks. This could allow local scripts to bypass intended restrictions.

advisories/ubuntu/ubuntu-php-vulnerability
Ubuntu: imlib2 vulnerabilities
3rd, November, 2006

M. Joonas Pihlaja discovered that imlib2 did not sufficiently verify the validity of ARGB, JPG, LBM, PNG, PNM, TGA, and TIFF images. If a user were tricked into viewing or processing a specially crafted image with an application that uses imlib2, the flaws could be exploited to execute arbitrary code with the user's privileges.

advisories/ubuntu/ubuntu-imlib2-vulnerabilities
Ubuntu: NVIDIA vulnerability
3rd, November, 2006

Derek Abdine discovered that the NVIDIA Xorg driver did not correctly verify the size of buffers used to render text glyphs. When displaying very long strings of text, the Xorg server would crash. If a user were tricked into viewing a specially crafted series of glyphs, this flaw could be exploited to run arbitrary code with root privileges.

advisories/ubuntu/ubuntu-nvidia-vulnerability
Ubuntu: RPM vulnerability
3rd, November, 2006

An error was found in the RPM library's handling of query reports. In some locales, certain RPM packages would cause the library to crash. If a user was tricked into querying a specially crafted RPM package, the flaw could be exploited to execute arbitrary code with the user's privileges.

advisories/ubuntu/ubuntu-rpm-vulnerability
Ubuntu: imlib2 regression fix
6th, November, 2006

USN-376-1 provided an update to imlib2 to fix several security vulnerabilities. Unfortunately the update broke JPG file handling in certain situations. This update corrects this problem. We apologize for the inconvenience.

advisories/ubuntu/ubuntu-imlib2-regression-fix
Ubuntu: texinfo vulnerability
9th, November, 2006

Miloslav Trmac discovered a buffer overflow in texinfo's index processor. If a user is tricked into processing a .texi file with texindex, this could lead to arbitrary code execution with user privileges.

advisories/ubuntu/ubuntu-texinfo-vulnerability